Overview
Financial crime is rarely understood as infrastructure. Enforcement actions, designation lists, and prosecution records document incidents — individual transactions, individual entities, individual violations. The Financial Integrity Monitor exists to document something different: the architecture that makes those incidents possible and allows them to recur at scale.
The FIM's defining analytical position is that illicit finance is infrastructure, not event. A structural assessment of an enabler jurisdiction — its legal framework design, registry effectiveness, enforcement record, and systemic significance — is more analytically significant than any individual enforcement action, however prominent. The monitor tracks the jurisdictions, professional networks, corporate structures, and regulatory gaps that allow illicit financial flows to function continuously. It is not a compliance service, an AML tool, or a financial-crime news aggregator.
The FIM is produced by Asymmetric Intelligence and operates as part of the commons intelligence network at asym-intel.info. The public dashboard is available at asym-intel.info/monitors/financial-integrity/.
01
Purpose and scope
The monitor tracks illicit financial flows, sanctions-evasion architecture, beneficial-ownership opacity, kleptocratic asset networks, and enabler-jurisdiction dynamics. Coverage is global, with standing analytical requirements for major financial centres (London, New York, Singapore, Hong Kong, Dubai, Zurich, Luxembourg), EU/EEA regulatory developments, FATF-assessed jurisdictions, and any jurisdiction hosting documented sanctions-evasion or kleptocratic-asset infrastructure. Mandatory regional coverage includes Sub-Saharan Africa, Central Asia, and the Pacific — where trade-based money laundering and extractive-industry corruption are concentrated but persistently under-covered.
The monitor covers five analytical domains:
D1 — Sanctions Architecture and Evasion. Sanctions-regime design, implementation, enforcement, and evasion infrastructure. The analytical focus is on architecture: which jurisdictions, intermediaries, corporate structures, and financial channels enable sanctioned actors to maintain access to the international financial system at scale.
D2 — Beneficial Ownership and Corporate Transparency. Registry implementation, corporate-transparency legislation, and the use of opaque structures — trusts, foundations, nominee arrangements, layered corporate chains — to conceal beneficial ownership. The monitor assesses whether registries function in practice, not merely whether they exist in law.
D3 — Enabler Jurisdictions and Professional Facilitators. The role of professional intermediaries (lawyers, accountants, corporate service providers) and permissive jurisdictions in enabling illicit flows. The monitor distinguishes jurisdictions that enable by political choice from those that enable by capacity deficit — the distinction matters for assessing what reform would require.
D4 — Conflict Finance and Extractive-Industry Integrity. Financial flows that fund, sustain, or profit from armed conflict, and corruption in extractive industries. Traced by source, channel, and deployment — the money's origin, how it moves, and what it finances.
D5 — Crypto, Digital Assets, and Financial Innovation. Where digital assets and financial technology create new channels for illicit finance or new tools for transparency and enforcement. Assessed for systemic integrity implications, not technology developments per se.
What the monitor is not: a compliance product; an AML screening tool; a financial-crime news aggregator; a service based on classified, proprietary, or FIU data; or a source of legal or regulatory advice. Individual cases are covered only where they illuminate structural architecture.
02
Source hierarchy
Every claim is sourced to a specific primary document. The monitor operates a four-tier source hierarchy. When tiers conflict, higher-tier sources take precedence; discrepancies between investigative findings and regulatory acknowledgement are flagged as signals in their own right — the gap between what Tier 2 sources document and what Tier 1 enforcement has acted on is analytically significant.
Tier 1 — Institutional and Regulatory. FATF Mutual Evaluation Reports and grey/black list decisions, OFAC, HM Treasury OFSI, and EU Council sanctions designations, FinCEN advisories and enforcement actions, Egmont Group and national FIU public reports, national regulators (FCA, MAS, DFSA, FINMA), UNODC assessments. Always cited first; always linked to the primary regulatory document, never to press coverage of it.
Tier 2 — Investigative and Forensic. OCCRP, ICIJ (Pandora, Panama, and Paradise Papers investigations), Global Witness, Bellingcat, Finance Uncovered, Forbidden Stories, and established cross-border financial-crime investigation outlets. Primary source for identifying illicit-finance architecture ahead of regulatory acknowledgement.
Tier 3 — Quality Journalism and Data. Financial Times, Bloomberg, Reuters, and Wall Street Journal for financial-crime and sanctions reporting. Kpler and Windward for dark-fleet and commodity-flow tracking. Used for timeline, enforcement-response context, and market-impact framing.
Tier 4 — Think Tanks and Academic. RUSI Centre for Financial Crime, Chatham House, Carnegie Endowment, Transparency International, Global Financial Integrity, Basel Institute on Governance, Tax Justice Network, and peer-reviewed AML and sanctions literature. Used for structural framing and policy analysis.
03
Analytical framework
Architecture over incident
Individual enforcement actions and money-laundering cases are symptoms. The FIM tracks the enabling infrastructure — the jurisdictions, professional networks, corporate structures, and regulatory gaps that allow illicit financial flows to function at scale and to persist after any individual scheme is disrupted.
When an enforcement action occurs, the analytical question is not "what was prosecuted?" but "what does this reveal about the architecture that remains in place?" An OFAC designation against a shell company in a specific jurisdiction triggers a reassessment of that jurisdiction's structural role in the broader evasion architecture — not merely a record of the designation itself. The monitor maintains five standing trackers that carry forward week to week, updated when material evidence warrants change:
- 1 Russian Sanctions-Evasion Architecture — dark-fleet operations, technology-procurement networks, financial intermediaries, commodity-trade rerouting through Central Asian and Caucasus jurisdictions, and the role of UAE, Turkey, and Chinese entities as facilitation nodes
- 2 EU AML Package Implementation — AMLA establishment, 6th AML Directive transposition, beneficial-ownership registry interconnection, and the gap between legislative ambition and regulatory reality
- 3 FATF Grey List — current grey-listed jurisdictions, mutual evaluation outcomes, and compliance trajectories, assessed for strategic significance rather than technical compliance alone
- 4 Beneficial-Ownership Register Status — global registry implementation tracked through FATF evaluations, Transparency International assessments, and investigative ground truth on registry effectiveness
- 5 Crypto and Digital-Asset Integrity — crypto-facilitated sanctions evasion, DeFi mixing-service enforcement, MiCA implementation, and stablecoin regulatory frameworks
Confidence framework
Each tracked finding carries a confidence label. Confidence is not upgraded without new evidence and is downgraded if rebuttal evidence emerges or a source withdraws or qualifies its reporting.
| Level | Evidentiary standard |
|---|---|
| Confirmed | Documented by Tier 1 source with stated evidential basis; independently corroborated |
| High | Strong evidence from Tier 1–2 sources; consistent with documented patterns; no credible alternative explanation |
| Assessed | Credible evidence from Tier 2–3 sources; alternative explanations not ruled out; published with explicit caveat |
| Possible | Preliminary indicators only; single-source or uncorroborated; published where strategically significant, flagged as unconfirmed |
Severity ratings
Active schemes and structural findings are rated for systemic significance. Severity reflects analytical weight, not headline prominence — a regulatory gap enabling billions in trade-based money laundering may carry higher severity than a high-profile but contained enforcement action.
| Rating | Criteria |
|---|---|
| CRITICAL | Systemic sanctions-evasion architecture sustaining a conflict or weapons programme; state-level complicity documented; multi-jurisdictional enabling infrastructure |
| HIGH | Large-scale illicit flow with documented strategic consequences; professional-enabler network identified; regulatory enforcement gap confirmed |
| ELEVATED | Significant illicit-finance scheme documented but strategic consequences not yet fully assessed; architecture partially mapped |
| MONITORED | Credible indicators of illicit flow or enabler-jurisdiction risk; under investigation or active assessment |
04
Analytical filters
Four analytical filters are applied to every finding to ensure structural depth and cross-domain awareness. Each filter defines what it detects and why that matters; findings that meet a filter's trigger are assessed against the full criteria before a routing decision is made.
F1 — State Capture Filter. Triggered when the distinction between state and private criminal interest has collapsed — where state institutions protect illicit financial flows rather than prevent them. The filter distinguishes between financial architecture exploiting regulatory weakness and financial architecture that has captured the state directing it. The former is a financial-integrity finding; the latter signals a hand-off to the World Democracy Monitor.
F2 — Sanctions Architecture Filter. Triggered by any documented sanctions-evasion scheme. Requires three-level analysis: the scheme (what is being evaded and how), the enabling architecture (which jurisdictions, intermediaries, corporate structures, and financial channels make the evasion possible), and the strategic consequence (what the evasion achieves — sustaining a war effort, preserving kleptocratic wealth, maintaining technology access, or funding proliferation).
F3 — Enabler Jurisdiction Filter. Triggered when a jurisdiction's legal or regulatory framework facilitates illicit financial flows. Assesses four dimensions: legal framework design (does the law enable opacity?), enforcement reality (is the framework enforced?), the capacity-deficit vs. political-choice distinction, and systemic significance (what volume of illicit flows does the jurisdiction facilitate?). The absence of enforcement action is itself a signal — this filter actively searches for non-enforcement.
F4 — Conflict Finance Filter. Triggered by any financial flow documented as funding, sustaining, or profiting from armed conflict. Traces source (where the money originates), channel (through what financial infrastructure it moves), and deployment (what it finances). Cross-referenced with the Strategic Conflict & Escalation Monitor for conflict context and the Environmental Risks Monitor for commodity-flow data.
05
Cross-monitor signals
The FIM operates within the Asymmetric Intelligence hub-and-spoke network. When a financial-integrity finding has direct relevance to another monitor's analytical domain, a cross-monitor signal is issued. The monitor also receives signals from companion monitors where external developments require financial-integrity reassessment.
| Monitor | Relationship | Cross-monitor trigger |
|---|---|---|
| Strategic Conflict & Escalation | Sends and receives | Sanctions-evasion architecture documented as sustaining a conflict; conflict-theatre update requiring conflict-finance reassessment |
| Resources & Energy Monitor | Sends and receives | Dark-fleet operations or commodity-flow evasion documented; energy-trade sanctions-evasion or commodity-flow data requiring financial-integrity assessment |
| World Elections Monitor | Sends | Financial flows to political actors or foreign campaign finance documented in an election-adjacent state |
| World Democracy Monitor | Sends and receives | Kleptocratic capture of state institutions documented; state-capture status change affecting financial-integrity environment |
| FIMI & Cognitive Warfare | Sends and receives | Covert funding of information operations documented; FIMI campaigns with financial-flow dimensions requiring FIM assessment |
| European Strategic Autonomy | Sends | EU regulatory gap enabling illicit financial flows documented; EU-dimension AML or sanctions-regime failure |
| Global Macro Monitor | Sends | Sanctions enforcement or evasion assessed as affecting macro indicators; AML regime functioning as macroeconomic variable |
06
Data lifecycle
Tracked findings are classified into three lifecycle types, determining how long they remain active in the monitor and under what conditions they are closed or archived.
| Type | Meaning | Lifecycle rule |
|---|---|---|
| Persistent | Structural data — enabler-jurisdiction assessments, sanctions-architecture mapping, standing regulatory frameworks | Carried forward until material change or documented resolution |
| Episode | Bounded event — enforcement action, legislative process, specific evasion scheme under investigation | Active until resolution; archived with close date and resolution summary |
| Transient | Single announcement or one-off event with no ongoing structural significance | Rolled up once implications are captured; never deleted, archived |
Findings are updated when new evidence materially changes the assessment, confidence level, or severity rating. Updates are not made merely because a week has passed. All changes are tracked in a changelog; findings are never silently overwritten.
07
Limitations
- OSINT only. FIU suspicious-transaction reports, classified sanctions-enforcement intelligence, and law-enforcement operational data are not available to the monitor. All sourcing is open-source.
- Beneficial-ownership verification gap. Even where registries exist, the accuracy of registered data is unverifiable without enforcement access. The monitor reports registered data and flags verification gaps explicitly.
- TBML opacity. Trade-based money laundering is the largest-volume channel for illicit finance and the least visible. Assessment relies on customs-data anomalies, investigative journalism, and academic estimates, all with significant uncertainty.
- Professional-privilege barrier. Legal professional privilege restricts visibility into the role of lawyers and law firms in enabling illicit financial architecture.
- Crypto-tracing limitations. On-chain analysis provides transaction visibility but not necessarily beneficial-ownership identification. Mixing services and privacy chains create structural tracing gaps.
- Geographic scope. The monitor's cross-border focus may under-capture domestic corruption that does not generate international flows but still degrades institutional integrity in the originating jurisdiction.
08
The analytical ecosystem
The Financial Integrity Monitor is part of the Asymmetric Intelligence commons network — a suite of open-source monitors covering the interconnected domains of financial integrity, democratic integrity, conflict escalation, information warfare, energy and resources, European strategic autonomy, artificial intelligence governance, global macro, and world elections. The commons network is available without subscription at asym-intel.info.
Sentinel.gi provides a commercial interface to the Financial Integrity Monitor — enhanced delivery, subscriber briefings, and direct access to the weekly analytical output. The underlying intelligence is produced by the same methodology documented here and published simultaneously to the public commons.
Editor
Editor: Peter Howitt, Asymmetric Intelligence.
Correspondence on methodology and analytical questions: via the Asymmetric Intelligence network.
Version history
| Version | Date | Changes |
|---|---|---|
| 1.1 | 2026-04-16 | Restructured to process-doc template: added data lifecycle table, expanded cross-monitor signal table with trigger column, added geographic-scope limitation, added editor section, consolidated scope boundaries into Purpose section |
| 1.0 | 2026-04-15 | Initial publication |
Source commons: asym-intel.info/monitors/financial-integrity/