Reevol

The 12 fraud patterns every cross-border exporter must know

BEC payment redirection, identity spoofing, document forgery, fake-buyer marketplaces, sanctions-evasion shells, freight-forwarder scams: patterns, signals, and prevention.

By Carrie Zerby··22 min read

The 12 Fraud Patterns Every Cross-Border Exporter Must Know

Your new buyer in Southeast Asia placed a $180,000 order. The company website looked professional. The purchase order matched your product specs. You shipped the goods.

Three months later, you're still waiting for payment. The phone number disconnects. The company address leads to a vacant lot. The buyer never existed.

This scenario plays out thousands of times yearly. Global Financial Integrity estimates trade-based fraud and misinvoicing exceeds $500 billion annually. The FBI's Internet Crime Complaint Center reported $2.9 billion in business email compromise losses in 2023 alone.

SME exporters bear disproportionate risk. Large corporations maintain dedicated compliance teams, fraud detection software, and legal departments. You have an operations manager wearing five hats and a spreadsheet.

The detection lag compounds the problem. Industry data suggests export fraud typically takes 90 to 180 days to detect after shipment. By then, the fraudster has vanished, your goods are gone, and recovery options have narrowed to near zero.

This guide presents 12 fraud patterns mapped to your actual workflow. Each pattern includes specific red flags you can spot from your desk, detection touchpoints where verification matters most, and practical prevention steps that don't require a compliance certification.

How We Categorized These 12 Fraud Patterns

We analyzed fraud frameworks from FATF, the ICC Banking Commission, FBI IC3, and the World Customs Organization. Then we translated their compliance-speak into operator-accessible categories based on three criteria:

Transaction stage: Where in your export workflow does this fraud occur? First inquiry? Documentation? Payment?

Loss type: Do you lose goods, money, or both? Is there regulatory exposure?

Detection difficulty: Can you spot this with basic verification, or does it require specialized tools?

Fraud Pattern Severity/Frequency Matrix

Use this matrix to prioritize. If you're resource-constrained, focus first on the high-severity, high-frequency quadrant. Those patterns cause the most damage and occur most often.

Pattern 1: Payment Diversion and Business Email Compromise

BEC is the most financially devastating fraud pattern for exporters. The mechanics are straightforward: fraudsters compromise email accounts (yours or your buyer's), then insert themselves into payment conversations to redirect funds.

Here's how it works in export operations:

  1. Attacker gains access to email through phishing or credential theft
  2. They monitor conversations, learning your communication patterns and pending transactions
  3. At the critical moment, they send payment instructions from a legitimate-looking email
  4. Your buyer wires $180,000 to the fraudster's account instead of yours
  5. By the time anyone notices, the money has moved through multiple jurisdictions

According to the FBI's Internet Crime Complaint Center, BEC schemes caused $2.9 billion in losses in 2023 alone. Export transactions are prime targets because they involve large sums, international wire transfers, and communication gaps across time zones.

Red flags to watch:

  • Sudden requests to change bank account details, especially close to payment date
  • Urgency language: "wire today" or "CEO needs this done immediately"
  • Slight email domain variations: reevol-trade.com instead of reevoltrade.com
  • Requests to bypass normal approval processes
  • Communication exclusively via email when phone calls were previously normal

Detection touchpoint: Payment instruction verification workflow

Before processing any bank account change, implement mandatory callback verification. Call the buyer at a phone number you have on file (not one provided in the suspicious email) to confirm the change. This single step prevents most BEC losses.

business-email-compromise

Pattern 2: Advance Fee Fraud

This classic scam targets eager sellers hungry for large orders. A "buyer" contacts you with an attractive purchase order, then requests upfront payments for supposed customs fees, permits, or facilitation costs.

The mechanics:

  1. Unsolicited contact from a buyer you've never worked with
  2. Large order, often at favorable prices
  3. Request for advance payment to cover "import permits," "customs bonds," or "government fees"
  4. Once you pay, the buyer disappears or invents additional fees

The International Trade Administration warns that legitimate buyers never ask sellers to pay import-side fees. Those costs belong to the importer under standard trade terms.

Red flags to watch:

  • Unsolicited orders significantly larger than your typical transaction
  • Requests for payment to third parties for "government fees"
  • Pressure to pay quickly before "permits expire"
  • Communication from free email accounts (Gmail, Yahoo) rather than corporate domains
  • Buyer unwilling to provide verifiable business references

Detection touchpoint: Pre-shipment verification

Before investing time in any large unsolicited order, verify the buyer exists. Check business registration databases, request trade references, and confirm the company address via satellite imagery. A legitimate buyer will understand your due diligence requirements.

Pattern 3: Fictitious Buyer Schemes

Fraudsters create convincing fake companies to place orders, receive goods on credit terms, and disappear. The sophistication varies from amateur operations to professional fraud rings with registered companies, professional websites, and forged documentation.

How they build credibility:

  • Register a company with a name similar to a legitimate business
  • Create a professional website with stock photos and copied content
  • Establish a virtual office address in a business district
  • Generate fake trade references from other fictitious companies
  • Provide forged bank references and financial statements

Red flags to watch:

  • Company registered within the past 12 months
  • Business address is a virtual office or mail forwarding service
  • No verifiable trade history with other suppliers
  • Website domain registered recently
  • Company officers have no LinkedIn presence or professional history
  • Trade references that can't be independently verified

Detection touchpoint: Buyer onboarding verification

The Export Administration Regulations require know-your-customer procedures for compliance reasons, but the same verification protects against fraud. Verify company registration, confirm physical presence, and check officer identities before extending credit terms.

Reevol's buyer-verification workflow automates these checks, pulling data from business registries, sanctions lists, and adverse media sources to flag high-risk buyers before you ship.

Pattern 4: Documentary and Letter of Credit Fraud

Documentary fraud involves manipulating trade documents to obtain payment for goods that don't exist, don't match specifications, or were never shipped. The ICC Banking Commission reports that documentary fraud accounts for roughly 80% of trade finance fraud cases.

Common document manipulation tactics:

  • Forged bills of lading showing shipment of goods still in warehouse
  • Manipulated inspection certificates certifying quality never tested
  • Fake insurance documents for coverage that doesn't exist
  • Altered commercial invoices showing different quantities or values
  • Backdated documents to meet LC deadlines

The Hin Leong Trading collapse in 2020 revealed $3.5 billion in trade finance fraud involving forged documents. The company had presented the same cargo as collateral to multiple banks, using forged bills of lading to support each financing arrangement.

What fraudsters exploit in UCP 600:

Banks examine documents on their face, not underlying transactions. If documents appear compliant with LC terms, banks pay. Fraudsters exploit this by creating documents that look correct but represent false information.

Red flags to watch:

  • Documents with inconsistent fonts, formatting, or paper quality
  • Bill of lading dates that don't align with vessel schedules
  • Inspection certificates from unknown or unverifiable inspection companies
  • Insurance documents with policy numbers that can't be confirmed
  • Shipping marks that don't match across documents

Detection touchpoint: Document verification before shipment release

For high-value transactions, verify documents independently. Call the shipping line to confirm the bill of lading. Contact the inspection company to verify the certificate. Check vessel tracking to confirm the ship was actually at the stated port on the stated date.

letter-of-credit

Pattern 5: Duplicate Financing Fraud

In duplicate financing schemes, the same invoice or shipment is used to obtain financing from multiple sources simultaneously. Exporters can be victims (when buyers use your invoices fraudulently) or unwitting participants (when your own staff colludes with financiers).

Industry reports indicate dual financing fraud increased approximately 40% between 2021 and 2023. The growth reflects both economic pressure on traders and gaps in information sharing between financial institutions.

The Agritrade International case demonstrated the pattern at scale. The Singapore commodity trader obtained financing from multiple banks using the same cargo as collateral, eventually collapsing with over $1.5 billion in debt.

How it works:

  1. Trader obtains financing from Bank A using Invoice #1234
  2. Same trader obtains financing from Bank B using the same Invoice #1234
  3. Banks don't share information, so neither knows about the other's exposure
  4. When the trader defaults, both banks claim the same collateral

Red flags to watch:

  • Pressure to use specific financiers or factoring companies
  • Unusual financing terms that seem too favorable
  • Requests to provide invoices in specific formats or with specific details
  • Buyer or intermediary involvement in your financing arrangements
  • Multiple parties requesting copies of the same documentation

Detection touchpoint: Financing documentation review

Maintain clear records of which invoices have been financed and with whom. If you use invoice factoring or trade finance, ensure your agreements include exclusivity clauses and notification requirements.

Pattern 6: Invoice Manipulation (Over/Under Invoicing)

Invoice manipulation serves trade-based money laundering, tax evasion, and capital flight. Global Financial Integrity estimates trade misinvoicing exceeds $500 billion annually. As an exporter, you can be pulled into these schemes as an unwitting participant.

Over-invoicing: Buyer pays more than goods are worth, exporter returns the difference through unofficial channels. This moves money out of the buyer's country.

Under-invoicing: Buyer pays less than goods are worth, with the difference paid separately. This evades import duties or moves money into the buyer's country.

How exporters get pulled in:

  • Buyer requests you invoice at a different price than agreed
  • Intermediary offers a "commission" for adjusting invoice values
  • Buyer asks for multiple invoices showing different values
  • Request to split payment between official and "unofficial" channels

The Financial Action Task Force has identified over 25 red flag indicators that may signal trade-based money laundering. Invoice manipulation triggers several of them.

Red flags to watch:

  • Pricing significantly above or below market rates
  • Requests to change invoice values after agreement
  • Payments from third parties not named on the invoice
  • Buyer indifferent to price negotiations (suggests price isn't the real transaction)
  • Requests for invoices to entities different from the actual buyer

Detection touchpoint: Pricing anomaly checks

Compare transaction prices against market benchmarks. If a buyer offers 30% above market rate without negotiation, ask why. Document your pricing rationale for each transaction. This protects you if regulators later question the transaction.

trade-based-money-laundering

Pattern 7: Cargo Diversion and Theft

Physical goods fraud costs exporters through cargo theft, diversion, and fictitious pickup schemes. The TT Club and BSI report global cargo theft losses exceeding $30 billion annually, with fictitious pickup fraud increasing 67% in recent years.

Fictitious pickup fraud:

  1. Fraudster monitors your shipment schedules (often through compromised email)
  2. They contact your carrier or warehouse claiming to be the legitimate pickup party
  3. Using forged documentation, they collect your goods before the real buyer arrives
  4. Your goods disappear; you're left explaining to your buyer why their shipment never arrived

Cargo diversion:

  1. Goods are legitimately shipped to the correct destination
  2. At some point in transit, fraudsters redirect the shipment to a different location
  3. This can involve compromised logistics staff, forged delivery instructions, or bribed drivers

Red flags to watch:

  • Last-minute changes to delivery addresses or pickup arrangements
  • Requests to use carriers you haven't vetted
  • Pressure to release goods before payment confirmation
  • Pickup requests from parties not named in the original order
  • Communication about logistics from different email addresses than the main buyer contact

Detection touchpoint: Carrier verification and tracking

Verify all carriers independently before releasing goods. Use GPS tracking for high-value shipments. Implement callback verification for any changes to delivery instructions. Under incoterms-2020, understand exactly when risk transfers and ensure your insurance covers the full transit period.

Pattern 8: Origin Certificate Fraud

Fraudsters manipulate certificates of origin to evade tariffs, circumvent sanctions, or qualify for preferential trade agreements. The World Customs Organization's Commercial Fraud Compendium documents patterns across jurisdictions.

How it works:

  • Goods manufactured in Country A are documented as originating in Country B
  • This can reduce tariff rates, avoid anti-dumping duties, or circumvent trade restrictions
  • Certificates may be forged, obtained through bribery, or issued by complicit chambers of commerce

Why exporters should care:

If you unknowingly participate in origin fraud, you face customs penalties, shipment seizures, and potential criminal liability. Even if you didn't create the false certificate, using it exposes you to enforcement action.

Red flags to watch:

  • Certificates from chambers of commerce you can't verify
  • Origin claims inconsistent with the supplier's actual manufacturing location
  • Pressure to accept certificates without verification
  • Goods transshipped through multiple countries before reaching you
  • Pricing inconsistent with the claimed origin (goods from high-cost countries priced like goods from low-cost countries)

Detection touchpoint: Origin documentation verification

For goods where origin matters (tariff preference, sanctions compliance), verify certificates independently. Contact the issuing chamber of commerce. Check that the manufacturer actually operates in the claimed country. Document your verification steps.

Pattern 9: Quality and Specification Fraud

Bait-and-switch tactics in cross-border trade exploit the distance between buyer and seller. You order Grade A product; you receive Grade C. You order 1,000 units; you receive 800. You order new equipment; you receive refurbished.

Common tactics:

  • Substituting lower-quality goods after samples are approved
  • Short-shipping quantities while documenting full amounts
  • Mixing compliant goods with non-compliant goods in the same shipment
  • Providing accurate inspection certificates for goods that are later swapped

Red flags to watch:

  • Suppliers resistant to independent inspection
  • Inspection certificates from unknown or supplier-affiliated inspectors
  • Significant price differences from market rates (too cheap often means quality compromise)
  • Reluctance to provide production facility access
  • History of "shipping errors" or "documentation mistakes"

Detection touchpoint: Pre-shipment inspection protocols

For significant orders, use independent inspection services. Specify inspection requirements in your purchase contracts. Consider container loading supervision for high-value shipments. The cost of inspection is far less than the cost of receiving non-conforming goods.

Pattern 10: Phantom Shipment Fraud

Phantom shipments involve creating paper trails for goods that don't exist. This supports trade-based money laundering, sanctions evasion, or simple theft of trade finance.

FATF identifies phantom shipment indicators:

  • Shipments with no corresponding vessel movements
  • Bills of lading for containers that don't exist
  • Documentation for goods that were never manufactured
  • Circular trading patterns where goods appear to move but never actually ship

How it affects exporters:

You might be asked to participate in phantom shipment schemes through requests to issue invoices for goods you didn't sell, provide documentation for shipments you didn't make, or accept payment for transactions that didn't occur.

Red flags to watch:

  • Requests to invoice for goods you haven't shipped
  • Payments received before goods are ready
  • Buyer indifferent to actual delivery dates
  • Documentation requests that don't match your actual operations
  • Transactions where the buyer seems uninterested in receiving the goods

Detection touchpoint: Shipment verification and tracking

Maintain clear records linking every invoice to actual goods movement. Use vessel tracking to confirm shipments. If something doesn't match, investigate before proceeding.

Pattern 11: Collateral and Warehouse Receipt Fraud

Warehouse receipt fraud involves using the same stored goods as collateral for multiple loans, or creating receipts for goods that don't exist. The 2014 Qingdao Port warehouse receipt fraud resulted in losses exceeding $900 million.

The Qingdao case:

Traders stored metal (copper and aluminum) in Qingdao port warehouses. They obtained warehouse receipts and used them as collateral for bank loans. The problem: they obtained multiple receipts for the same metal, pledging it to different banks simultaneously. When banks tried to claim their collateral, they discovered multiple parties claiming the same inventory.

How it affects exporters:

If you store goods in third-party warehouses, fraudulent warehouse operators might issue duplicate receipts. If you accept warehouse receipts as security, you might be holding worthless paper.

Red flags to watch:

  • Warehouse operators unwilling to allow independent verification
  • Receipts from warehouses you can't physically inspect
  • Collateral values that seem too high for the storage location
  • Pressure to accept receipts without verification
  • Warehouses with limited track record or unclear ownership

Detection touchpoint: Collateral verification

Before accepting warehouse receipts as security, verify the warehouse independently. Conduct physical inspections. Use collateral management services for high-value inventory. Don't rely solely on paper documentation.

Pattern 12: Identity Fraud and Buyer Impersonation

Sophisticated fraudsters impersonate legitimate companies to place orders, receive goods, and disappear. This goes beyond fictitious buyers to actively stealing the identity of real, established businesses.

Common tactics:

  • Registering domains similar to legitimate companies (reevol-trade.com vs reevoltrade.com)
  • Creating email addresses that appear to come from real companies
  • Using real company information (address, registration numbers) with fraudulent contact details
  • Impersonating executives of legitimate companies
  • Intercepting communications between real buyers and sellers

Red flags to watch:

  • Email domains that don't exactly match the company's official website
  • Contact information that differs from publicly available company details
  • Requests to communicate through personal email or messaging apps
  • Urgency that prevents normal verification procedures
  • Reluctance to participate in video calls or in-person meetings

Detection touchpoint: Multi-channel verification

Never rely on a single communication channel. If you receive an order via email, verify by phone using a number from the company's official website (not from the email). Check that the email domain exactly matches the company's web domain. For large orders, request a video call with the buyer's team.

The 25 Red Flags Checklist: Warning Signs by Transaction Stage

The Financial Action Task Force has identified over 25 red flag indicators that may signal trade-based money laundering. We've organized these and additional fraud indicators by transaction stage for practical use.

Pre-Transaction Red Flags

  1. Unsolicited contact for unusually large orders
  2. Buyer unwilling to provide verifiable business references
  3. Company registered within the past 12 months
  4. Business address is a virtual office or mail forwarding service
  5. Buyer indifferent to price negotiations
  6. Pressure to bypass normal due diligence procedures
  7. Communication exclusively through free email services
  8. Buyer's stated business doesn't match the products ordered

Documentation Red Flags

  1. Documents with inconsistent formatting, fonts, or quality
  2. Certificates from organizations you can't verify
  3. Dates that don't align with known vessel schedules or logistics
  4. Multiple versions of the same document with different details
  5. Reluctance to provide original documents
  6. Documents that appear altered or have visible corrections
  7. Inspection certificates from unknown or supplier-affiliated inspectors

Payment Behavior Red Flags

  1. Requests to change bank account details close to payment date
  2. Payments from third parties not named on the invoice
  3. Requests to split payments between multiple accounts
  4. Payments significantly above or below invoice value
  5. Requests for refunds or returns immediately after payment
  6. Pressure to process payments outside normal banking hours

Communication Red Flags

  1. Urgency language designed to bypass verification
  2. Reluctance to communicate by phone or video
  3. Email domains that don't exactly match company websites
  4. Changes in communication style or language mid-transaction
  5. Requests to keep transaction details confidential from others in your organization

Building Your Fraud Prevention Stack

Fraud prevention requires both process and technology. Here's how to build a practical prevention stack without enterprise-level resources.

Buyer Verification Workflows

Manual verification steps:

  1. Check business registration in the buyer's home country
  2. Verify physical address via satellite imagery and street view
  3. Confirm company officers exist (LinkedIn, professional registries)
  4. Request and verify trade references
  5. Check sanctions lists and adverse media

Automated verification:

Platform-based verification pulls data from multiple sources simultaneously. Reevol's buyer verification workflow checks business registries, sanctions lists, adverse media, and corporate ownership structures, flagging high-risk buyers before you invest time in the relationship.

Document Authentication

For high-value transactions, verify key documents independently:

  • Bills of lading: Contact the shipping line directly
  • Inspection certificates: Call the inspection company
  • Insurance documents: Verify with the insurer
  • Bank references: Contact the bank through official channels

Payment Security Protocols

Callback verification: Before processing any bank account change, call the buyer at a known phone number to confirm.

Multi-approval requirements: Require two people to approve payment instruction changes.

Payment milestones: Structure payments around verified milestones rather than single large transfers.

Reevol's payment milestone feature structures transactions around verified delivery and acceptance events, reducing the window for payment diversion fraud.

SWIFT Fraud Prevention

SWIFT's Customer Security Programme provides guidelines for protecting payment infrastructure. Key recommendations:

  • Restrict and control operator access
  • Implement multi-factor authentication
  • Monitor for anomalous payment patterns
  • Verify payment instructions through independent channels
Fraud Prevention Approaches
ApproachCostCoverageImplementation Time
Manual verificationLow (staff time)Limited to what staff can checkImmediate
Third-party verification servicesMedium ($50-500/check)Comprehensive but transaction-by-transaction1-3 days per check
Platform-based verificationMedium (subscription)Continuous monitoring, automated alerts1-2 weeks setup
Enterprise compliance teamHigh ($200K+/year)Full coverage with custom procedures3-6 months to build

Case Study Deep Dive: What Qingdao and Hin Leong Teach SME Exporters

Two major fraud cases from the past decade offer lessons applicable to SME operations.

Qingdao Port (2014): Warehouse Receipt Fraud

What happened:

Traders stored copper and aluminum in Qingdao port warehouses. They obtained warehouse receipts and used them as collateral for loans from multiple banks. The same metal was pledged to different lenders simultaneously. When commodity prices dropped and traders defaulted, banks discovered they were all claiming the same collateral.

Total losses: Exceeding $900 million

Red flags that were missed:

  • Warehouse operators issued multiple receipts for the same inventory
  • Banks didn't verify physical collateral independently
  • No system existed for banks to check if collateral was already pledged elsewhere
  • Traders had complex corporate structures that obscured their total borrowing

Lessons for SME exporters:

  1. If you accept warehouse receipts as security, verify the warehouse independently
  2. Conduct physical inspections of stored goods
  3. Use collateral management services for high-value inventory
  4. Be skeptical of counterparties with complex corporate structures

Hin Leong Trading (2020): Documentary Fraud at Scale

What happened:

Hin Leong, a major Singapore oil trader, presented forged documents to banks to obtain trade financing. They created bills of lading for cargoes that didn't exist or had already been sold. They also hid $800 million in losses through fraudulent accounting.

Total losses: $3.5 billion

Red flags that were missed:

  • Documents were accepted at face value without independent verification
  • Banks relied on the company's reputation rather than transaction-level verification
  • Auditors didn't verify physical inventory against documentation
  • Warning signs in financial statements were overlooked

Lessons for SME exporters:

  1. Verify documents independently, regardless of counterparty reputation
  2. Check vessel tracking to confirm ships were actually at stated ports
  3. Don't rely solely on documentary compliance; verify underlying transactions
  4. Be wary of counterparties resistant to independent verification

What verification steps would have caught these earlier:

Fraud Detection Verification Steps
  1. STEP 01
    Physical Verification
    Independent inspection of goods, not just documents
  2. STEP 02
    Cross-Reference Checks
    Verify documents against independent sources (vessel tracking, registry checks)
  3. STEP 03
    Collateral Registry
    Check if assets are already pledged elsewhere
  4. STEP 04
    Pattern Analysis
    Look for unusual transaction patterns or volumes

From Reactive to Proactive: Your Fraud Defense Implementation Plan

Priority Matrix: Which Patterns to Guard Against First

Your exposure depends on your business model:

If you extend credit terms: Prioritize fictitious buyer detection (Pattern 3) and identity fraud (Pattern 12)

If you use trade finance: Prioritize documentary fraud (Pattern 4) and duplicate financing (Pattern 5)

If you ship high-value goods: Prioritize cargo diversion (Pattern 7) and BEC (Pattern 1)

If you source from new suppliers: Prioritize quality fraud (Pattern 9) and origin fraud (Pattern 8)

Quick Wins: 3 Verification Steps to Implement This Week

  1. Implement callback verification for payment changes. Before processing any bank account change, call the buyer at a phone number you have on file. This single step prevents most BEC losses.

  2. Verify new buyers before extending credit. Check business registration, confirm physical address, and request verifiable trade references. Don't ship on credit terms until verification is complete.

  3. Cross-reference documents against independent sources. For your next shipment, verify the bill of lading with the shipping line and check vessel tracking to confirm the ship was at the stated port.

Building Fraud Awareness Into Team Culture

Fraud prevention isn't just a compliance function. Everyone who touches transactions should understand the patterns:

  • Share this guide with your operations team
  • Discuss red flags in regular team meetings
  • Create a simple reporting process for suspicious activity
  • Celebrate catches (when someone spots and prevents fraud)
  • Conduct periodic reviews of near-misses and lessons learned

Systematic Verification Through Technology

Manual verification works for low transaction volumes. As you scale, platform-based verification becomes essential.

Reevol's buyer verification and payment milestone features automate the detection steps outlined in this guide. The platform checks buyers against business registries, sanctions lists, and adverse media sources. Payment milestones structure transactions around verified events, reducing fraud exposure at each stage.

Frequently asked questions

What is the most common type of export fraud?+
Business email compromise (BEC) and payment diversion cause the largest financial losses, with the FBI reporting $2.9 billion in BEC losses in 2023. Documentary fraud is the most common in trade finance specifically, accounting for approximately 80% of trade finance fraud cases according to the ICC Banking Commission.
How can I verify if a new international buyer is legitimate?+
Check business registration in the buyer's home country, verify the physical address via satellite imagery, confirm company officers exist through LinkedIn or professional registries, request and verify trade references, and check sanctions lists. For automated verification, platforms like Reevol pull data from multiple sources simultaneously.
What are the red flags for trade-based money laundering?+
FATF identifies over 25 red flag indicators including pricing significantly above or below market rates, payments from third parties not named on invoices, requests to change invoice values after agreement, and buyers indifferent to price negotiations. Invoice manipulation (over or under invoicing) is a primary mechanism for trade-based money laundering.
How do I protect against business email compromise in export transactions?+
Implement callback verification for any payment instruction changes. Call the buyer at a phone number you have on file (not one provided in a suspicious email) to confirm bank account changes. Watch for slight email domain variations, urgency language, and requests to bypass normal approval processes.
What should I do if I suspect export fraud?+
Stop the transaction immediately if goods haven't shipped or payment hasn't been made. Document all communications and evidence. Report to relevant authorities (FBI IC3 for US-based fraud, local law enforcement, and your bank's fraud department). Consult legal counsel about recovery options. Review your verification procedures to prevent similar incidents.
How long does it typically take to detect export fraud?+
Industry data suggests export fraud typically takes 90 to 180 days to detect after shipment. This detection lag is why prevention and early verification are critical. By the time fraud is discovered months later, recovery options have significantly narrowed.