Money Laundering
Easy Prey18 Helmi

Money Laundering

Organized crime is often imagined as something violent, chaotic, and obvious. But today, it looks far more polished than that. It operates like a multinational business, spread across borders, built on trust networks, specialization, and efficiency rather than brute force. This episode looks at how modern scams, fraud, and money laundering actually work and why they're so hard to spot before serious damage is done.

My guest is Geoff White, an investigative journalist who has spent decades covering organized crime, cybercrime, and financial fraud. His reporting has appeared on BBC News, Sky News, The Sunday Times, and other major outlets, and he is also the creator of The Lazarus Heist, the hit podcast and book series exploring North Korea's global hacking operations. His latest book, Rinsed, examines how technology has transformed the world of money laundering.

We talk about how modern criminal networks are structured, why scams now rely on patience and psychology rather than speed, and how money laundering functions as a service industry that quietly supports fraud at scale. The conversation also explores why victims are sometimes unknowingly used to move stolen funds, how urgency is weaponized to override judgment, and why slowing down remains one of the most effective defenses people have.

Show Notes:
  • [01:08] Geoff shares his background and why the organized crime + technology overlap is where he's spent his career.
  • [02:52] Why longer-form work (books, podcasts) is often the only way to explain complex crimes that don't fit into a quick news segment.
  • [03:56] Old-school enforcement was violence; modern crime groups often can't use that when partners are anonymous and overseas.
  • [04:23] The trust networks holding global crime together can be more fragile than people assume.
  • [05:06] The strange "trust inside crime" dynamic especially in ransomware, where criminals must appear "reliable."
  • [06:18] Competition today looks more like corporate rivalry than street violence, especially in ransomware affiliate ecosystems.
  • [07:41] Do these groups evolve from traditional cartels or arise from new tech-native criminals? Geoff says it depends on the region.
  • [09:58] The skill split of elite coders builds ransomware, while newer recruits use social engineering to get initial access.
  • [11:34] Money laundering adapts fast with crypto, game currencies, NFTs while the core "service business" model stays the same.
  • [12:46] The "cost" of laundering: fees can be extreme for newcomers, and lower for experienced players with connections.
  • [13:53] A disturbing case where victims are daisy-chained to launder money and reinforce the romance-scam illusion.
  • [15:12] Why money mules are treated as disposable and how many don't realize the seriousness until law enforcement shows up.
  • [16:48] The tactic of letting victims withdraw a little money to make a platform feel legitimate and why it works so well.
  • [18:09] Geoff connects today's tactics to classic con mechanics ("putting the mark on the send") and the psychology behind it.
  • [19:22] Geoff describes seeing an "escalator scam" firsthand: small payouts early, then pressure to pay to "unlock" higher earnings.
  • [21:51] The scary shift is that scams now look polished and patient, stretching across multiple channels and weeks (or longer).
  • [23:12] The more we "self-custody" money and identity online, the more security responsibility shifts onto individuals.
  • [24:32] A major crypto seizure case raises a messy question when seized assets grow in value, who gets the upside?
  • [28:46] Geoff's practical defense: slow down on anything money-related, create space, and don't let urgency steer decisions.
  • [31:17] Why today's scammers play the long game of months of relationship-building can lead to life-changing losses.
  • [34:29] Repeat victimization: recovery scams and fake "investigators" often target people right after they've been hit.
  • [36:08] "Traceable" doesn't mean "recoverable," why freezing and returning stolen crypto is legally and logistically hard.
  • [38:44] UK reimbursement changes shift liability between sending and receiving banks but there are tradeoffs and open questions.
  • [41:28] Geoff reacts to US payment quirks (card taken away, tip written in pen) and why it still surprises outsiders.
  • [45:11] Closing advice is to learn from other people's stories and run "what would I do?" scenarios before a crisis hits.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit