In 2024, TD Bank pleaded guilty to $18.3 trillion in unmonitored transaction activity tied to money laundering, and here is how to trace the beneficial owners behind the shell networks using agents.
- FinCEN reported the United States loses approximately $70 billion annually to shell company exploitation, masking illicit funds behind layered LLCs and nominee directors.
- Most compliance teams pull the corporate registration, find a law firm address or nominee name, and hit a dead end when the real owner does not appear on the paper.
- Stopping the flow requires tracing the digital footprint of the formation email, the shared registered agent, and cross-platform public records to find the human controller.
- We use our agents to cross reference entity names against breach data, court filings, and public registries to map the hidden human network in minutes.
In 2024, the United States Department of Justice forced TD Bank to plead guilty to Bank Secrecy Act violations. The institution failed to monitor $18.3 trillion in transaction activity over six years. Much of this unmonitored flow moved through layered corporate entities designed specifically to obscure the beneficial owner.
We call the primary evasion tactic the shell-LLC chain. We define this as multiple LLCs registered to the same agent address, identifying coordinated networks rather than isolated businesses. A second pattern is nominee shielding, where an operator uses a localized registered attorney to sign formation documents while the controller remains completely off the record.
The current patchwork of AML/CFT requirements creates regulatory gaps that criminals and foreign adversaries exploit to launder money, hide illicit wealth, and compromise American innovation. — Andrea Gacki, Director at FinCEN
Consider the DOJ findings in the Onur Aksoy counterfeit ring. The operator controlled at least 15 different shell entities. Each entity shielded a portion of the fraudulent Cisco network from direct attribution. When investigators shut down one LLC, another absorbed the volume immediately.
The human operator never used his real name on the initial Amazon seller applications. Instead, investigators found an email address tied to a formation document. That email had surfaced in a 2018 data breach. Cross referencing the compromised email pulled up a specific burner phone number.
That same phone number appeared on a completely separate domain registration two years prior. The domain registration included a physical address. That physical address matched the registered agent for four additional LLCs operating in the exact same marketplace.
The network collapses when you map the human history behind the entity. A shell company is an abstract legal wrapper, but a human operator leaves a permanent digital footprint.
Here is how our agents resolve the network. The input is a single piece of evidence. Investigators can often start with just an entity name, a formation email, a phone number, or a law firm address.
The Search Surfaces
We query Sixtyfour proprietary identity databases, dark web sources, and underground marketplace mentions in parallel. We check breach records for compromised emails, phones, and password reuse. We scan social profiles across LinkedIn, GitHub, Reddit, and Telegram memberships. We pull clear web public records including LLC registries, court filings, and news mentions.
Resolving the Graph
A flagged phone number surfaces in a 2023 breach record tied to an email. The same email is the registered owner of two other corporate entities under different names. The output returns a mapped visual of connected accounts, confidence scores per edge, and the exact surfaced identifiers linking them.
As FinCEN rolls out stricter beneficial ownership reporting, operators will rely even more heavily on synthetic identities and dark web nominee rentals.
The institutions that survive the next decade of enforcement will not be the ones that collect the most corporate formation documents. They will be the ones that can accurately trace the single human operator hiding behind the paper.

