
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years


New U.S. Law Will Dramatically Impact Scammers and Terrorists
S.3643 – 118th Congress
The United States Just Changed How Financial Crime Is Defined
Governmental Actions – A SCARS Institute Analysis
Authors:
• Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Polymath, Director of the Society of Citizens Against Relationship Scams Inc.
• Debby Montgomery Johnson, President and CEO of BenfoComplete.com, Online Scam/Fraud Survivors Advocate, Author, Keynote Speaker, Trainer, Podcast Host, USAF Veteran, Chair and Director of the Society of Citizens Against Relationship Scams Inc.
Author Biographies Below
Article Abstract
The United States has proposed a significant shift in financial crime enforcement through new federal legislation that would redefine money laundering to focus on systems, patterns, and enabling infrastructure rather than isolated transactions. The measure would expand prosecutorial authority to aggregate linked transactions, criminalize unlicensed money service operations as standalone felonies, and explicitly include informal value transfer systems, digital assets, and substitute currencies within anti-money laundering statutes. It would restore and broaden investigative tools such as wiretap authority and elevate remittance analysis and counterfeiting tools to national security priorities. The proposal would re-center the U.S. Secret Service as a lead financial crime agency, emphasizing disruption of payment corridors, identity fabrication, and laundering networks, while enabling parallel investigations targeting both financial infrastructure and organized criminal ecosystems that support transnational scams and fraud.

To Make This Law A Reality Requires Your Action!
As of now (date of this publication), the Combating Money Laundering, Terrorist Financing, and Counterfeiting Act of 2024 (S.3643) has not yet been approved by the U.S. Senate or the House of Representatives. According to the official legislative record, the measure was introduced in the U.S. Senate and referred to the Senate Judiciary Committee, but there is no current action showing that it has been passed by either the full Senate or sent to and passed by the House.
Here’s the current status based on Congress.gov and public legislative tracking:
- The bill was introduced in the Senate and referred to committee for consideration. Where it is now stuck.
- It must be passed by the Committee and passed by both the Senate and the House of Representatives before it can go to the President’s desk for signing.
In other words, while the bill has been introduced and discussed, it has not yet completed the legislative process required to become law. It still needs to be passed by both chambers of Congress — the Senate and the House — and then be signed by the President before it becomes a binding law.
Taking Action
Passing this legislation will not happen without public pressure, and victims and the people who care about them play a critical role. Members of the U.S. Congress pay attention to constituent contact, especially when it comes from people directly harmed by crime. When victims, family members, and friends take the time to email or call their U.S. Senator and U.S. Representative, it signals that this issue is not abstract or theoretical. It is real, it is widespread, and it affects ordinary people in every district. Laws targeting money movement, laundering networks, and scam/criminal infrastructure only move forward when lawmakers understand that inaction leaves their constituents exposed.
Contacting your elected officials is easier than most people realize, and you do not need to be an expert or write a long message. You simply explain that you or someone you love was harmed by financial crimes (scams/fraud) and that you support the “Combating Money Laundering, Terrorist Financing, and Counterfeiting Act” because it targets the financial systems that organized criminals and scammers depend on.
To find contact information, go to congress.gov or house.gov to look up your Representative, and senate.gov to look up your Senators. Each official’s page lists email contact forms and office phone numbers. Use the email form, select a topic like financial crime or public safety, and write in your own words. Personal messages matter far more than perfect wording. When victims and their support networks speak together, it increases the likelihood that this bill moves forward and that future victims are protected from the same harm.
The United States Just Changed How Financial Crime Is Defined
The Game Is About To Change
This new law marks a turning point in how the United States confronts financial crime by shifting enforcement from isolated transactions to the systems that move and hide money. While it targets terrorism, it also directly impacts scams and fraud. It directly targets the infrastructure that enables scams, organized crime, and cross-border fraud, closing gaps that criminals have exploited for years. By focusing on patterns, networks, and money movement, it gives law enforcement the tools needed to disrupt scams at scale rather than reacting after victims are harmed.
New U.S. Senate Bill S.3643 – 118th Congress
In January 2024, the U.S. Congress quietly introduced one of the most consequential financial crime reforms in decades. The U.S. Congress introduced the Combating Money Laundering, Terrorist Financing, and Counterfeiting Act of 2024, a bipartisan measure introduced by Chuck Grassley and Amy Klobuchar. While publicly framed around terrorism and national security, the law reaches far beyond those boundaries.
This legislation fundamentally rewrites how money laundering is prosecuted in the United States. Rather than focusing primarily on “dirty money” after a crime has occurred, the new law targets money movement itself. It shifts enforcement away from isolated transactions and toward patterns, networks, and systems.
That change has major implications for transnational organized crime, including global scam operations that rely on fragmented payments, informal remittance channels, crypto intermediaries, and synthetic identities to move and conceal proceeds.
For years, large-scale scam syndicates have exploited gaps between outdated statutes and modern financial behavior. They structured transactions below reporting thresholds, relied on unlicensed money services, used crypto kiosks and peer-to-peer platforms, and leveraged informal value-transfer systems to move funds across borders. Much of this activity existed in a legal gray zone where intent was difficult to prove, and enforcement tools were limited.
That Gray Zone has Now Narrowed Dramatically
The new law allows prosecutors to aggregate multiple small transactions into a single laundering offense when they are linked by timing, purpose, or participants. It explicitly brings informal value-transfer systems, digital assets, and substitute currencies into the legal definition of money laundering. It makes operating an unlicensed or non-compliant money service business a standalone felony, even without proof that the operator understood the rules. It restores and expands wiretap authority for financial crime investigations. It elevates remittances to a national-security concern requiring coordinated analysis across Treasury, regulators, and law enforcement. It also treats counterfeiting tools and fake documents as core financial crime enablers, recognizing their role in mule networks, shell companies, and synthetic KYC schemes.
Taken together, these provisions signal a strategic shift. The United States is no longer waiting for illicit money to surface inside the banking system before acting. Instead, it is criminalizing the infrastructure and behaviors that move money, regardless of the form that money takes or the jurisdiction it crosses.
For global scam networks, this is a direct challenge to their operating model. Romance scams, investment fraud, business email compromise, pig-butchering schemes, and other transnational frauds depend on distributed payment pathways and deniability at each step. By targeting aggregation, informal systems, unlicensed intermediaries, and identity fabrication, the law attacks the connective tissue that allows these crimes to scale.
This will serve as an introduction to what the new law does, why it matters, and how it reshapes the enforcement landscape. What follows is a deeper analysis of the statute’s key provisions and their likely impact on transnational organized crime, financial institutions, compliance professionals, and the future of scam enforcement.
The rules of money laundering enforcement will change, and the consequences will extend far beyond terrorism cases and into the core financial mechanics of global fraud.
Why the U.S. Secret Service Now Sits at the Center of Financial-Crime Enforcement
One of the most significant but least publicly discussed elements of the new law is the expanded statutory role of the U.S. Secret Service (part of DHS). While commonly associated with protective duties, the Secret Service was originally created to combat financial crime, and this legislation deliberately re-centers that mission.
The United States Secret Service (.gov) was originally created on July 5, 1865, as the “Secret Service Division” within the Department of the Treasury. Established to combat rampant currency counterfeiting after the Civil War, it was often referred to as the Treasury’s “secret service” before becoming an official agency.
The law explicitly strengthens the Secret Service’s authority to investigate money laundering, illegal money service businesses, counterfeiting, bulk cash smuggling, and related financial crime networks. This is not a symbolic change. It reflects a recognition that modern financial crime, including large-scale scam operations, now functions as a networked economic system, not a series of isolated fraud incidents.
The Secret Service is uniquely positioned for this role. Unlike agencies that primarily focus on victims or predicate offenses, the Secret Service specializes in tracing money movement, dismantling payment infrastructure, and targeting the operational backbone of criminal enterprises. This law expands its ability to pursue those objectives earlier and more aggressively.
A critical component of that expansion is the restoration and broadening of wiretap authority tied specifically to financial crimes. Scam syndicates and transnational laundering networks rely heavily on encrypted messaging platforms, layered intermediaries, and compartmentalized communications. By expanding surveillance authority connected to illegal money services and laundering conspiracies, the law allows investigators to penetrate coordination layers that were previously difficult to reach under narrower statutes.
The law also reinforces the Secret Service’s role in addressing counterfeiting as a financial crime enabler. Fake documents, synthetic identities, and counterfeit credentials are not peripheral tools. They are central to how scam networks establish mule accounts, open shell companies, bypass KYC controls, and move funds across borders. By treating possession of counterfeiting tools as a serious felony connected to laundering activity, the statute aligns enforcement authority with real-world scam operations.
For transnational scam networks, this matters because the Secret Service does not simply pursue individuals. It targets systems. Its investigations often focus on payment processors, crypto on-ramps, unlicensed remitters, mule recruitment pipelines, and document-forgery supply chains. The new law expands the legal foundation for those investigations and lowers the barriers to acting before proceeds fully disappear offshore.
This expanded role also signals a broader strategic shift within U.S. enforcement. Financial crime is no longer viewed as a downstream consequence of scams, trafficking, or cybercrime. It is treated as the primary attack surface. By empowering the Secret Service to lead complex, multi-jurisdictional financial investigations, Congress is emphasizing disruption over reaction.
In practical terms, this means scam enforcement will increasingly focus on collapsing the economic infrastructure that allows fraud to scale. Payment corridors, informal value-transfer systems, crypto kiosks, shadow MSBs, and identity-fabrication networks now fall squarely within a strengthened investigative mandate.
The expansion of the Secret Service’s authority under this law is not about increasing penalties alone. It is about changing who leads, how cases are built, and where enforcement pressure is applied. For global scam organizations that depend on fragmented money movement and anonymity, this represents a substantial and structural threat.
How the Expanded Secret Service Role Shifts the FBI’s Focus in Financial-Crime and Scam Enforcement
The expanded authority granted to the U.S. Secret Service under the new law does not sideline the Federal Bureau of Investigation. Instead, it rebalances federal enforcement roles in a way that reflects how modern scam networks actually operate.
At a high level, the shift separates financial-infrastructure disruption from predicate crime and victim-impact investigation, allowing each agency to concentrate on what it does best.
From Case-Centric to Infrastructure-Centric Enforcement
Historically, the FBI has led most large scam and fraud cases because scams were framed primarily as criminal deception offenses. Investigations focused on identifying perpetrators, documenting victim losses, establishing intent, and proving individual criminal acts.
The new law reframes scams as financial systems crimes as much as deception crimes. That reclassification naturally elevates the Secret Service, whose core expertise lies in tracing money movement, dismantling payment channels, and attacking money laundering infrastructure.
As a result:
- The Secret Service increasingly leads investigations targeting unlicensed MSBs, shadow payment processors, crypto on-ramps, mule networks, and counterfeit-enabled identity systems.
- The FBI concentrates more heavily on the human and organizational dimensions of scams: recruitment, coercion, trafficking, cyber intrusion, extortion, conspiracy, and victimization patterns.
This is not duplication. It is functional specialization.
FBI Focus Shifts Upstream Toward Criminal Ecosystems
As the Secret Service applies pressure on the money layer, the FBI’s role shifts upstream toward:
- Identifying scam-compound operators, recruiters, and controllers.
- Investigating forced labor, human trafficking, and coercion within scam operations.
- Pursuing cyber intrusion, business email compromise, ransomware, and platform abuse.
- Building conspiracy cases that link fraud proceeds to broader organized-crime structures.
The FBI remains the primary agency for:
- Victim identification and victim-impact evidence.
- Intelligence on criminal hierarchies and leadership.
- International criminal coordination beyond pure financial flows.
In effect, the FBI focuses more on who is running the crime, while the Secret Service focuses more on how the crime is financed and scaled.
Reduced FBI Burden on Technical AML Prosecution
Before this law, FBI cases often stalled at the laundering stage because:
- Transactions were individually below thresholds.
- Informal remittance systems fell outside clear statutory definitions.
- Intent and knowledge were difficult to prove.
By making aggregation easier, criminalizing unlicensed MSBs outright, and expanding wiretap authority for financial crimes, the new statute reduces the FBI’s burden of proving complex AML elements inside fraud cases.
That allows the FBI to:
- Move faster on arrests and indictments.
- Focus resources on violent, coercive, and cyber-enabled aspects of scam networks.
- Rely on Secret Service-led financial cases to neutralize the profit engine in parallel.
Parallel Investigations Instead of Sequential Ones
Previously, scam enforcement often followed a linear path:
fraud → victim loss → delayed financial tracing → limited recovery
Under the new framework:
- The Secret Service can initiate investigations based on money-movement patterns alone.
- The FBI can pursue criminal conspiracies and human exploitation simultaneously.
- Financial seizures and infrastructure shutdowns can occur before full criminal attribution is complete.
This parallel model is far more disruptive to transnational scam networks, which depend on time, anonymity, and fragmentation to survive.
Strategic Implications for Transnational Scam Networks
For global scam organizations, this division of labor creates sustained pressure from two directions:
- The FBI targets leadership, recruitment, coercion, cyber access, and victim harm.
- The Secret Service targets payment corridors, laundering nodes, mule pipelines, and identity infrastructure.
The result is not just prosecution, but operational collapse. Even if scammers evade arrest, losing access to payment systems, remittance channels, or identity tools can cripple their ability to function.
What This Shift Signals at the Policy Level
This change reflects a broader realization by Congress:
- Modern scams are not merely frauds with financial consequences. They are financial enterprises that commit fraud.
By re-empowering the Secret Service as a lead financial crime agency, the law frees the FBI to concentrate on complex criminal ecosystems while ensuring that the economic engine of those ecosystems is systematically dismantled.
Bottom Line
The expanded Secret Service role does not diminish the FBI’s importance. It sharpens it.
The FBI becomes more focused on people, power, coercion, cybercrime, and victim harm.
The Secret Service becomes more focused on money movement, financial infrastructure, and systemic disruption.
Together, they form a coordinated enforcement model that is far better suited to dismantling transnational scam networks than either agency acting alone.
What This Means for Individual Scam Victims
The expanded role of the U.S. Secret Service does not change one essential fact for victims:
- You are not responsible for figuring out which federal agency investigates your case.
- The shift affects how cases are built and enforced inside the government. It does not move the burden onto victims.
What has changed is what happens after a report is made.
Who Victims Should Contact First
Local Law Enforcement
Victims should still begin by filing a report with local police or sheriff’s departments.
Why this still matters:
- It creates an official incident record.
- It is often required by banks, insurers, and recovery processes.
- It anchors jurisdiction for later federal involvement.
Even when local police cannot investigate international crimes directly, their report remains a critical first step.
The FBI’s Internet Crime Complaint Center (IC3)
Victims of online scams should file a report with the Internet Crime Complaint Center.
IC3 remains the primary intake point for:
- Romance scams
- Investment fraud
- Business email compromise
- Crypto-related scams
- Tech support scams
This does not change under the new law.
What does change is what happens next. IC3 data is now more likely to trigger parallel investigations, including Secret Service-led financial cases, even if victims never hear directly from those investigators.
Federal Trade Commission (FTC)
Victims should also report to the Federal Trade Commission.
The FTC:
- Tracks scam trends.
- Supports civil enforcement.
- Feeds intelligence into broader federal action.
- Helps shape future policy and enforcement priorities.
FTC reporting strengthens the collective response, even when individual cases cannot be prosecuted.
Should Victims Contact the Secret Service Directly?
In most cases, no.
This is a change. However, while it is understandable, the SCARS Institute recommends that victims contact the USSS as long as they will accept the report. This is because the USSS provides the best victim experience with law enforcment, which is fundamentally important for victims to regain a measure of control and confidence,
The Secret Service is not a victim intake agency. It rarely contacts victims directly unless:
- A case is already under active investigation.
- Financial infrastructure tied to the victim’s losses is being targeted.
- Asset seizure or restitution becomes possible.
Under the new law, the Secret Service is more likely to act behind the scenes, using financial data from banks, platforms, and reports to dismantle scam infrastructure.
Victims may never receive a call, even when action is taken. That silence does not mean nothing happened.
What Has Changed for Victims Behind the Scenes
The biggest change is not visibility, but effectiveness.
Before this law:
- Many cases stalled because transactions were small or fragmented.
- Informal payment systems fell outside clear enforcement authority.
- Financial facilitators avoided liability.
Now:
- Aggregated losses matter.
- Money movement patterns trigger investigations.
- Unlicensed payment operators face felony exposure.
- Financial infrastructure can be shut down earlier.
That increases the chance that:
- Scam operations are disrupted faster.
- Mule networks are dismantled.
- Payment corridors are closed.
- Future victims are protected.
It does not guarantee recovery of funds, but it improves the odds of systemic disruption.
Why Victims Often Do Not Hear Back
This is one of the hardest realities for victims.
Federal investigations:
- Can take months or years.
- Often involves sealed actions.
- May focus on infrastructure, not individual restitution.
- Prioritize disruption over communication.
- Law enforcement rarely, if ever, comments on ongoing investigations.
Silence does not mean disbelief, dismissal, or inaction.
It usually means:
- The information was logged.
- The data was correlated with other cases.
- Enforcement action, if any, is not public yet.
The Bottom Line for Victims
For victims, the reporting path remains simple:
- Local law enforcement
- FBI IC3
- FTC
The expanded Secret Service role works behind the curtain, targeting the financial systems that make scams possible. Victims are not expected to navigate agency boundaries or understand jurisdictional shifts.
The system is changing so that your report does more, even if you never see the machinery move.
SCARS Institute Analysis
1. Core Structural Changes in Law Enforcement Tools
a) Aggregate Transactions & Course of Conduct Liability
-
- The bill explicitly amends 18 U.S.C. § 1957 and related statutes to allow prosecutors to aggregate multiple small-value transactions into one laundering violation when they are connected by timing, parties, and purpose.
- Why this matters: Traditional “smurfing” – breaking criminal proceeds into many transactions below reporting thresholds – is a signature tactic used not only by drug cartels and terror networks, but by international scam syndicates to disguise proceeds. Treating multiple connected transactions as a single laundering offense removes a key procedural loophole.
- Impact on scam networks: Scam operations often split victim proceeds across dozens or hundreds of microtransactions (e.g., to avoid detection in banks or on crypto platforms). Prosecutors will now more easily characterize such behavior as an intentional course of criminal conduct.
b) Expanded Definitions to Encompass Modern Value Transfer Systems (VTS)
-
- The legislation explicitly brings hawala, other informal VTS, crypto exchanges, and value substitutes into the scope of anti-money laundering law.
- Impact on organized crimes: Transnational fraud rings, especially those operating in jurisdictions with minimal oversight, rely heavily on unregulated or informal value transfer systems to move funds offshore. Making these systems criminally actionable empowers prosecutors and agents to pursue cases they previously could not.
c) Reinstated Wiretap and Investigative Tools
-
- The bill restores and expands wiretap authority for money laundering, bulk cash smuggling, illegal money service businesses (MSBs), and counterfeiting investigations.
- Strategic effect: Transnational scammers often coordinate via encrypted communications. Enhanced wiretap authority – connected specifically to financial crime – allows law enforcement to penetrate network communications that were previously “off limits” under narrower statutes.
2. New Criminal Offenses and Categories
a) Illegal Money Services Business (MSB) as a Standalone Felony
-
- Operating an MSB without proper licensing/compliance is now a felony regardless of knowledge or intent, with escalated penalties when volumes exceed defined thresholds or involve criminal proceeds.
- Operational impact: Many scam ecosystems rely on informal remittance networks, unregistered payment processors, or “shadow” crypto services to repatriate illicit proceeds. This provision targets the infrastructure rather than just the scammers themselves.
b) Blank Check Transports and Cross-Border Evasion Schemes
-
- Transporting blank bearer instruments that could be filled in later to avoid reporting is now treated as if they have value for reporting thresholds – blocking a classic evasion tactic.
- Why this matters: Networks that move large volumes of illicit funds without entering traditional financial systems frequently resort to physical or semi-physical instruments. This closes a reporting gap.
c) Counterfeiting Tools as Enablers of Financial Crime
-
- Possessing counterfeiting tools and materials becomes a felony that facilitates money laundering, synthetic identity fraud, mule recruitment, shell company creation, and fake KYCs.
- Scam linkage: Organized scam operations often use synthetic identities and counterfeit credentials to set up accounts, payment channels, or cross-border mule networks.
3. Remittances and Supply Chain Analysis as a National Security Priority
- Treasury is mandated to map remittance flows used in drug trafficking, terrorism, human trafficking, and financial crime, producing a coordinated enforcement strategy with all relevant regulators.
- Scam relevance: International remittances – including those from diaspora, informal corridor networks, and third-party payment providers – are frequently exploited by scam syndicates to extract and launder proceeds. Formalizing this into a national security priority means that data collection and analytical capability will expand substantially.
4. International Reach, Foreign Banks, and Jurisdictional Authority
- The bill strengthens the authority to obtain records from foreign financial institutions and clarifies that foreign barriers cannot impede U.S. financial investigations when jurisdiction is established.
- This is a game-changer for transnational networks that base parts of their infrastructure in jurisdictions with weak compliance regimes or regulatory safeguards.
5. Broader Criminal Justice and Enforcement Implications
a) Course of Conduct Doctrine & Pattern-Based Prosecution
-
- The shift toward prosecuting behavior patterns – rather than individual transactions – aligns anti-money laundering law with how sophisticated criminal networks actually operate.
- This approach is especially effective against long-running scam syndicates that fractionate their financial flows to avoid detection.
b) Enhanced Interagency Tools and Coordination
-
- Explicit Secret Service authority, expanded wiretap powers, and remittance analysis requirements indicate a more network-centric enforcement posture – moving beyond reactive investigations to proactive disruption.
6. Impact on Transnational Organized Crime and Global Scam Networks
Greater Enforcement Leverage Against Scam Syndicate Models:
- Network Disruption Over Single Incident Prosecution: The law allows cases to be framed around a course of conduct, meaning entire networks of transactions and actors can be prosecuted as a single laundering enterprise.
- Ancillary Infrastructure Is Now Criminal Target No. 1:
– Unlicensed MSBs, informal VTS, and shadow remittance networks will be treated as criminal infrastructure.
– Operators – even without knowledge of scam linkage – risk felony charges. - Crypto and Alternative Value Flows Under AML’s Umbrella: Explicit inclusion of digital assets and substitute value transfer systems brings crypto mixers, decentralized protocols, and P2P transfers into the realm of enforceable money laundering statutes.
- Cross-Border Operations Face Higher Risk: Enhanced reach into foreign banks and enforcement data sharing mechanisms builds pressure on jurisdictions that serve as safe havens for scam proceeds.
- Counterfeiting and Synthetic Identity Law Reinforcement: By criminalizing possession of tools that facilitate identity fraud, the law disrupts the front-end mechanisms that scam networks use to establish financial personas and accounts.
7. Operational Challenges & Implementation Considerations
- Data and Analytics Capacity: Effective enforcement will depend on sophisticated pattern recognition (both public and private sector) to aggregate transactions and identify laundering schemes.
- International Coordination: Stronger U.S. law does not automatically compel cooperation from foreign regulators – although enhanced authority increases leverage.
- Compliance Burden on Financial Institutions: Banks, MSBs, and fintech providers will need to align policies with expanded definitions, increasing reporting and monitoring obligations.
Summary
The Combating Money Laundering, Terrorist Financing, and Counterfeiting Act of 2024 represents a fundamental shift in U.S. financial crime enforcement – from the prosecution of individual “bad acts” to the prosecution of behavioral patterns, network structures, and enabling infrastructures.
It aligns law with how modern criminal ecosystems, including transnational scam syndicates, actually operate:
- Aggregation of transactions eliminates classic smurfing tactics.
- Informal and crypto systems are now squarely within AML enforcement.
- Unlicensed payment infrastructure becomes a prosecutable offense.
- Counterfeiting, synthetic identity tools, and remittance flows are treated as part of the laundering supply chain.
Overall, this bill dramatically expands tools available to U.S. law enforcement and regulatory agencies to disrupt, dismantle, and prosecute sophisticated cross-border criminal enterprises – especially those whose financial flows have historically slipped through gaps in statutes written decades before modern financial technologies emerged.
The full text of the new law is below

Glossary
- Aggregate Transactions Doctrine — A prosecutorial approach that allows multiple small financial transfers to be treated as one laundering offense when they share timing, purpose, or participants. This closes a common loophole used by scam networks to hide proceeds through repeated low-value transfers that avoid reporting thresholds.
- Alternative Value Transfer Systems — Nontraditional methods of moving value outside formal banking channels, including informal networks and substitute instruments. These systems are frequently exploited by transnational scam operations to move funds across borders with limited oversight or documentation.
- Anti Money Laundering Statutes Expansion — Legislative changes that broaden existing money laundering laws to include modern payment methods and behaviors. This expansion aligns legal definitions with how contemporary financial crime actually operates in digital and cross-border environments.
- Behavior Pattern Prosecution — A legal strategy that focuses on repeated conduct and system-level activity rather than isolated criminal acts. This approach better reflects how organized scam networks function over time and across multiple victims.
- Blank Bearer Instruments — Financial documents that can be completed later to represent monetary value and evade reporting rules. Treating these instruments as having inherent value blocks a long-used method of cross-border laundering.
- Business Email Compromise Networks — Organized fraud schemes that hijack or imitate legitimate business communications to redirect payments. These schemes rely heavily on mule accounts and rapid money movement to avoid detection.
- Counterfeiting Tools as Financial Enablers — Equipment and materials used to produce fake documents or credentials that support fraud and money laundering. These tools enable scam networks to create synthetic identities and open accounts used to move illicit funds.
- Course of Conduct Liability — A legal concept that treats connected actions as part of a single criminal scheme. This reduces the burden of proving intent for each individual transaction within a broader laundering operation.
- Crypto Asset Inclusion — The explicit recognition of digital assets within money laundering enforcement frameworks. This removes ambiguity that previously allowed crypto-based laundering activity to fall into regulatory gray areas.
- Crypto On Ramp Infrastructure — Services that convert traditional currency into digital assets. Scam networks frequently exploit weak controls at these access points to move victim funds quickly into harder-to-trace channels.
- Decentralized Payment Pathways — Distributed financial routes that lack a single controlling institution. These pathways provide scammers with speed and anonymity but are increasingly targeted under expanded enforcement authority.
- Distributed Mule Networks — Groups of individuals recruited or coerced to move funds on behalf of criminal operations. Mule networks are central to scam scalability and are increasingly treated as core infrastructure rather than incidental participants.
- Economic Infrastructure Disruption — An enforcement strategy aimed at disabling the systems that allow crime to operate. This focuses on payment corridors and identity tools rather than solely pursuing individual offenders.
- Encrypted Communication Reliance — The use of secure messaging platforms by scam and money laundering networks to coordinate activity. Expanded investigative authority is designed to penetrate these coordination layers when linked to financial crimes.
- Financial Crime Reclassification — A policy shift that treats scams as system-based financial enterprises rather than isolated deception events. This reframing changes how investigations are prioritized and conducted.
- Financial Pattern Recognition — Analytical methods used to detect linked transactions across accounts and platforms. These tools are critical for identifying laundering activity that appears fragmented on the surface.
- Fragmented Payment Structuring — The deliberate splitting of funds into many small transfers to avoid detection. New aggregation authority directly targets this tactic used by scam syndicates.
- Hawala Style Transfer Networks — Informal value transfer systems operating on trust rather than formal records. These networks have historically been difficult to regulate and are now explicitly included in enforcement frameworks.
- Illegal Money Services Business — A payment operation that functions without required licensing or compliance. Treating this activity as a standalone felony targets the infrastructure that enables scams to function.
- Infrastructure First Enforcement — A strategic emphasis on dismantling systems before focusing on individual crimes. This approach aims to prevent future victimization by collapsing scam operations at scale.
- Interagency Role Rebalancing — A redistribution of investigative focus among federal agencies based on expertise. This allows financial specialists to target money flows, while others address human and organizational aspects of crime.
- Jurisdictional Barrier Reduction — Legal clarification that limits the ability of foreign secrecy laws to block investigations. This strengthens enforcement against cross-border scam networks.
- Know Your Customer Circumvention — Techniques used to bypass identity verification requirements. Synthetic identities and counterfeit documents are commonly used to defeat these controls.
- Layered Intermediaries — Multiple financial middlemen used to obscure the origin and destination of funds. Each layer adds distance between the crime and the proceeds.
- Money Movement Focus — A shift away from tracing funds after crimes toward monitoring how money flows. This enables earlier intervention before funds disappear offshore.
- National Security Financial Lens — The treatment of certain financial flows as security concerns rather than purely criminal matters. This elevates enforcement priority and coordination.
- Network Centric Investigations — Investigations designed to map relationships among actors and systems. This method reflects the reality of organized scam operations.
- Parallel Investigative Model — A framework that allows financial and criminal investigations to proceed simultaneously. This reduces delays and increases disruption effectiveness.
- Payment Corridor Mapping — The identification of common routes used to move illicit funds. Closing these corridors can disable multiple scam operations at once.
- Peer-to-Peer Payment Abuse — The misuse of direct transfer platforms to move scam proceeds quickly. These platforms are attractive to criminals due to speed and perceived anonymity.
- Predicate Offense Separation — The distinction between the underlying scam and the laundering activity that follows. Separating these elements allows specialized agencies to act more efficiently.
- Proactive Disruption Strategy — An enforcement philosophy focused on prevention rather than reaction. This strategy seeks to stop scams before widespread harm occurs.
- Remittance Flow Analysis — The systematic study of cross-border money transfers to identify misuse. Scam networks often rely on remittance channels to move funds internationally.
- Reporting Threshold Avoidance — The intentional structuring of transactions below mandatory reporting limits. Aggregation authority directly neutralizes this tactic.
- Shadow Payment Processors — Unregulated services that move funds outside formal oversight. These processors are a frequent backbone of large-scale scam operations.
- Smurfing Tactics — A laundering method involving many small transactions across accounts. Treating connected transfers as a single offense undermines this approach.
- Synthetic Identity Schemes — The creation of fictitious identities using real and fake data. These identities are used to open accounts and facilitate laundering.
- Systemic Scam Enablement — The collection of tools and services that allow scams to operate efficiently. Enforcement now targets these enablers as primary threats.
- Transnational Scam Syndicates — Organized groups operating across national borders to commit fraud. Their scale depends on flexible payment and identity infrastructure.
- Unlicensed Remittance Channels — Informal or illegal services used to move money internationally. Criminalizing these channels removes a key laundering pathway.
- Victim Impact Deprioritization — An enforcement reality where communication with victims may be limited during investigations. This reflects a focus on infrastructure disruption rather than individual case updates.
- Wiretap Authority Restoration — The reauthorization of surveillance tools for financial crime investigations. This enables access to coordination communications tied to laundering activity.
- Workflow-Based Crime Models — An understanding of scams as repeatable operational processes. This perspective supports pattern-based enforcement rather than isolated case analysis.
TEXT OF NEW LAW
118th CONGRESS
2d Session
S. 3643
To improve the prohibitions on money laundering, and for other purposes.
Mr. Grassley (for himself, Ms. Klobuchar, and Mr. Cornyn) introduced the following bill; which was read twice and referred to the Committee on the Judiciary
To improve the prohibitions on money laundering, and for other purposes.
Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,
SECTION 1. Short title; table of contents.
(a) Short title.—This Act may be cited as the “Combating Money Laundering, Terrorist Financing, and Counterfeiting Act of 2024”.
(b) Table of contents.—The table of contents for this Act is as follows:
Sec. 1. Short title; table of contents.
Sec. 2. Transportation or transhipment of blank checks in bearer form.
Sec. 3. Bulk cash smuggling.
Sec. 4. Section 1957 violations involving commingled funds and aggregated transactions.
Sec. 5. Charging money laundering as a course of conduct.
Sec. 6. Illegal money services businesses.
Sec. 7. Prohibiting money laundering through hawalas, other informal value transfer systems, and closely related transactions.
Sec. 8. Technical amendment to restore wiretap authority for certain money laundering and counterfeiting offenses.
Sec. 9. Making the international money laundering statute apply to tax evasion.
Sec. 10. Conduct in aid of counterfeiting.
Sec. 11. Danger pay allowance.
Sec. 12. Clarification of Secret Service authority to investigate money laundering.
Sec. 13. Remittances and money laundering threat analysis.
Sec. 14. Rule of construction.
SEC. 2. Transportation or transhipment of blank checks in bearer form.
Section 5316 of title 31, United States Code, is amended by adding at the end the following:
“(e) Monetary instruments with amount left blank.—For purposes of this section, a monetary instrument in bearer form that has the amount left blank, such that the amount could be filled in by the bearer, and that is possessed by the bearer for the purpose of avoiding a reporting requirement, shall be considered to have a value of more than $10,000 if the instrument was drawn on an account that contained, or was intended to contain more than $10,000 at the time—
“(1) the instrument was transported; or
Section 5332(b) of title 31, United States Code, is amended—
(1) in paragraph (1), by striking “5 years” and inserting “10 years”;
(2) by redesignating paragraphs (2), (3), and (4), as paragraphs (3), (4), and (5), respectively;
(3) by inserting after paragraph (1) the following:
“(B) ENHANCED FINE FOR AGGRAVATED CASES.—Whoever violates this section while violating another law of the United States, other than section 5316 or 5324(c) of this title, or as a part of a pattern of any unlawful activity, including a violation of section 5316 or 5324(c) of this title, shall be fined double the amount provided in subsection (b)(3) or (c)(3) (as applicable) of section 3571 of title 18.”; and
(4) in paragraph (5), as so redesignated, by striking “paragraph (2)” and inserting “paragraph (3)”.
SEC. 4. Section 1957 violations involving commingled funds and aggregated transactions.
Section 1957 of title 18, United States Code, is amended—
(1) by redesignating subsection (f) as subsection (g); and
(2) by inserting after subsection (e) the following:
“(f) In a prosecution for an offense under this section, the Government may satisfy the $10,000 monetary transaction value requirement under subsection (a) by showing that—
“(1) the monetary transaction involved the transfer, withdrawal, encumbrance, or other disposition of more than $10,000 from an account in which more than $10,000 in proceeds of specified unlawful activity was commingled with other funds; or
“(2) the defendant conducted a series of monetary transactions in amounts of not more than $10,000 that—
“(A) exceeded $10,000 in the aggregate; and
“(B) were closely related to each other as demonstrated by factors such as—
“(i) the time period between the transactions;
“(ii) the identity of the parties involved;
“(iii) the nature or purpose of the transactions; and
“(iv) the manner in which the transactions were conducted.”.
SEC. 5. Charging money laundering as a course of conduct.
Section 1956 of title 18, United States Code, is amended—
(1) in subsection (h), by striking “or section 1957” and inserting “, section 1957, or section 1960”; and
(2) by adding at the end the following:
“(k) Multiple violations.—Multiple violations of this section that are part of the same scheme or continuing course of conduct may be charged, at the election of the Government, in a single count in an indictment or information.”.
SEC. 6. Illegal money services businesses.
(a) In general.—Section 1960 of title 18, United States Code, is amended by striking subsections (a) and (b) and inserting the following:
“(1) IN GENERAL.—Whoever knowingly conducts, controls, manages, supervises, directs, or owns all or part of a covered money services business described under paragraph (2) shall be punished as provided in subsection (b).
“(2) MONEY SERVICES BUSINESSES DESCRIBED.—A covered money services business described in this paragraph is a covered money services business that—
“(A) is operated without an appropriate license in a State where such operation is punishable as a misdemeanor or a felony under State law, whether or not the person knows that the operation is required to be licensed or that the operation is so punishable;
“(B) fails to comply with the money services business registration requirements under section 5330 of title 31, or regulations prescribed under that section, whether or not the person knows that the operation is required to comply with those registration requirements; or
“(C) otherwise engages in a transaction involving funds that the person knows have been derived from a criminal offense or are intended to be used to promote or support unlawful activity.
“(b) Criminal penalty.—Any person who violates—
“(1) subsection (a) shall be fined in accordance with this title, imprisoned for not more than 5 years, or both; or
“(2) subsection (a) by conducting, controlling, managing, supervising, directing, or owning all or part of a covered money services business that engaged in activity as a covered money services business involving more than $1,000,000 during a 12-month period, or by engaging in a transaction or transactions involving more than $1,000,000 during a 12-month period, shall be fined double the amount provided in subsection (b)(3) or (c)(3) (as applicable) of section 3571, imprisoned for not more than 10 years, or both.
“(c) Definitions.—In this section—
“(1) the term ‘covered money services business’ means a money services business that—
“(A) operates on behalf of the public; and
“(B) affects interstate or foreign commerce in any manner or degree;
“(2) the term ‘money services business’—
“(A) has the meaning given the term in section 5330 of title 31 and any regulations prescribed under that section; and
“(B) includes a person that engages in the transfer, transportation, or exchange of currency, funds, or value that substitutes for currency by any and all means, even when not performed for profit; and
“(3) the term ‘State’ means any State of the United States, the District of Columbia, the Northern Mariana Islands, and any commonwealth, territory, or possession of the United States.”.
(b) Technical and conforming amendments.—
(1) TITLE 18, UNITED STATES CODE.—
(A) SECTION HEADING.—Section 1960 of title 18, United States Code, is amended in the section heading—
(i) by striking “unlicensed” and inserting “illegal”; and
(ii) by striking “transmitting” and inserting “services”.
(B) TABLE OF SECTIONS.—The table of sections for chapter 95 of title 18, United States Code, is amended by striking the item relating to section 1960 and inserting the following:
“1960. Prohibition of illegal money services businesses.”.
(2) TITLE 31, UNITED STATES CODE.—
(i) HEADINGS.—Section 5330 of title 31, United States Code, is amended—
(I) in the section heading, by striking “transmitting” and inserting “services”;
(aa) in the subsection heading, by striking “transmitting” and inserting “services”;
(bb) in paragraph (1), in the paragraph heading, by striking “transmitting” and inserting “services”; and
(cc) in paragraph (2), in the paragraph heading, by striking “transmitting” and inserting “services”; and
(III) in subsection (d)(1), in the paragraph heading, by striking “transmitting” and inserting “services”.
(ii) TEXT.—Section 5330 of title 31, United States Code, is amended—
(I) by striking “money transmitting business” each place that term appears and inserting “money services business”; and
(II) in subsection (a)(3), by striking “money transmitting businesses” and inserting “a money services business”.
(B) SECTION 5336.—Section 5336(a)(11)(B)(vi) of title 31, United States Code, is amended by striking “money transmitting business” and inserting “money services business”.
(C) SECTION 5362.—Section 5362 of title 31, United States Code, is amended—
(i) by striking “money transmitting business” each place that term appears and inserting “money services business”; and
(ii) in paragraph (11)(E), in the subparagraph heading, by striking “transmitting” and inserting “services”.
(D) SECTION 5363.—Section 5363(2) of title 31, United States Code, is amended by striking “money transmitting business” and inserting “money services business”.
(E) TABLE OF SECTIONS.—The table of sections for subchapter II of chapter 53 of title 31, United States Code, is amended by striking the item relating to section 5330 and inserting the following:
“5330. Registration of money services businesses.”.
(3) FEDERAL DEPOSIT INSURANCE ACT.—Section 21(b)(3)(A) of the Federal Deposit Insurance Act (12 U.S.C. 1829b(b)(3)(A)) is amended—
(A) in the matter preceding clause (i), by striking “money transmitting businesses” and inserting “money services businesses (as that term is defined in section 1960 of title 18, United States Code)”; and
(B) in clause (ii), by striking “money transmitting business” and inserting “money services business”.
SEC. 7. Prohibiting money laundering through hawalas, other informal value transfer systems, and closely related transactions.
The matter following section 1956(a)(1)(B)(ii) of title 18, United States Code, is amended by striking “For purposes of this paragraph, a financial transaction” and inserting “For purposes of this paragraph and section 1957, a financial transaction or a monetary transaction, as applicable,”.
SEC. 8. Technical amendment to restore wiretap authority for certain money laundering and counterfeiting offenses.
(a) Currency reporting offenses.—Section 2516(1)(g) of title 18, United States Code, is amended by striking “or section 5324 of title 31, United States Code (relating to structuring transactions to evade reporting requirement prohibited)” and inserting “or section 5324 or 5332 of that title (relating to evasion of Federal transaction reporting requirements)”.
(b) Money laundering.—Section 2516(1)(c) of title 18, United States Code, is amended by inserting “section 1960 (relating to illegal money services businesses),” before “section 659”.
(c) Counterfeiting.—Section 2516(1)(d) of title 18, United States Code, is amended by striking “or 473” and inserting “473, 474, or 474A”.
SEC. 9. Making the international money laundering statute apply to tax evasion.
Section 1956(a)(2)(A) of title 18, United States Code, is amended—
(1) by inserting “(i)” before “with the intent to promote”; and
(2) by adding at the end the following:
“(ii) with the intent to engage in conduct constituting a violation of section 7201 or 7206 of the Internal Revenue Code of 1986; or”.
SEC. 10. Conduct in aid of counterfeiting.
(a) In general.—Section 474(a) of title 18, United States Code, is amended by inserting after the paragraph beginning “Whoever has in his control, custody, or possession any plate” the following:
“ Whoever, with intent to defraud, has custody, control, or possession of any material, tool, machinery, or other equipment that can be used to make, alter, forge, or counterfeit any obligation or other security of the United States or any part of such obligation or security, except under the authority of the Secretary of the Treasury; or”.
(b) Foreign obligations and securities.—Section 481 of title 18, United States Code, is amended by inserting after the paragraph beginning “Whoever, with intent to defraud” the following:
“ Whoever, with intent to defraud, has custody, control, or possession of any material, tool, machinery, or other equipment that can be used to make, alter, forge, or counterfeit any obligation or other security of any foreign government, bank, or corporation; or”.
(c) Counterfeit acts.—Section 470 of title 18, United States Code, is amended by striking “or 474” and inserting “474, or 474A”.
(d) Strengthening deterrents to counterfeiting.—Section 474A of title 18, United States Code, is amended—
(1) in subsection (a), by inserting “, custody,” after “control”;
(B) by striking “any essentially identical feature or device adapted to the making of any such obligation or security,” and inserting “any material or other thing made after or in similitude of any such deterrent,”;
(3) by redesignating subsection (c) as subsection (d); and
(4) by inserting after subsection (b) the following:
“(c) Whoever has in his control, custody, or possession any obligation or security of the United States or any foreign government from which the ink or other distinctive counterfeit deterrent has been completely or partially removed, except under the authority of the Secretary of the Treasury, is guilty of a class B felony.”.
Section 151 of the Foreign Relations Authorization Act, Fiscal Years 1990 and 1991 (5 U.S.C. 5928 note) is amended by striking “or the United States Marshals Service” and inserting “the United States Marshals Service, U.S. Immigration and Customs Enforcement, U.S. Customs and Border Protection, or the United States Secret Service”.
SEC. 12. Clarification of Secret Service authority to investigate money laundering.
Section 3056(b)(3) of title 18, United States Code, is amended—
(1) by inserting “money laundering, structured transactions, unlicensed money transmitting,” after “documents or devices,”; and
(2) by striking “federally insured”.
(a) Definitions.—In this section—
(1) the term “appropriate congressional committees” means—
(A) the Committee on the Judiciary of the Senate;
(B) the Committee on Homeland Security and Governmental Affairs of the Senate;
(C) the Caucus on International Narcotics Control of the Senate;
(D) the Committee on Banking, Housing, and Urban Affairs of the Senate;
(E) the Committee on the Judiciary of the House of Representatives;
(F) the Committee on Homeland Security of the House of Representatives; and
(G) the Committee on Financial Services of the House of Representatives;
(2) the term “drug kingpins, crime syndicates, and other persons”, with respect to the use of remittances to finance terrorism, narcotics trafficking, human trafficking, money laundering, and other forms of illicit financing, domestically or internationally, means any persons who—
(A) are connected to individuals and organizations associated with financing terrorism, narcotics trafficking, human trafficking, money laundering, and other forms of illicit financing, domestically or internationally; and
(i) a significant foreign narcotics trafficker under the Foreign Narcotics Kingpin Designation Act (21 U.S.C. 1901 et seq.);
(ii) a significant transnational criminal organization under Executive Order 13581 (76 Fed. Reg. 44757, 84 Fed. Reg. 10255; relating to blocking property of transnational criminal organizations); or
(iii) a Specially Designated Global Terrorist under Executive Order 13224 (66 Fed. Reg. 49079, 67 Fed. Reg. 44751, 68 Fed. Reg. 4075, 70 Fed. Reg. 8499; relating to blocking property and prohibiting transactions with persons who commit, threaten to commit, or support terrorism);
(3) the term “human trafficking” has the meaning given the term “severe forms of trafficking in persons” in section 103 of the Trafficking Victims Protection Act of 2000 (22 U.S.C. 7102);
(4) the term “money services business” has the meaning given the term in section 5330 of title 31, United States Code, as amended by section 6(b)(2)(A); and
(5) the term “money transmitting service” has the meaning given the term in section 5330 of title 31, United States Code.
(1) REQUIREMENT.—Not later than 1 year after the date of enactment of this Act, the Secretary of the Treasury, in consultation with the Attorney General, the Secretary of Homeland Security, and the head of any other appropriate Federal law enforcement agency, shall submit to the appropriate congressional committees a threat and operational analysis of the use of remittances by drug kingpins, crime syndicates, and other persons to finance terrorism, narcotics trafficking, human trafficking, money laundering, and other forms of illicit financing, domestically or internationally.
(2) CONTENTS.—The Secretary of the Treasury shall include in the threat and operational analysis required under paragraph (1) the following:
(A) Current and potential threats posed by individuals and organized groups seeking—
(i) to exploit security vulnerabilities with respect to remittances and money transmitting services; or
(ii) to unlawfully use remittances to finance terrorism, narcotics trafficking, human trafficking, money laundering, or other forms of illicit financing, domestically or internationally.
(B) Methods and pathways used to exploit security vulnerabilities.
(C) Challenges presented by identity theft in the use of remittances and money transmitting services.
(D) Improvements needed to enhance cooperation between and among Federal, State, and local officials, including State regulators, State and local prosecutors, and other law enforcement officials.
(E) Improvements needed to enhance cooperation between money services businesses and Federal, State, and local officials, including State regulators, State and local prosecutors, and other law enforcement officials.
(3) ANALYSIS REQUIREMENTS.—In compiling the threat and operational analysis required under paragraph (1), the Secretary of the Treasury, in consultation with the Attorney General, the Secretary of Homeland Security, and the head of any other appropriate Federal law enforcement agency, shall consider and examine the personnel needs, technology needs, and infrastructure needs of Federal law enforcement agencies.
(c) Remittances strategy and implementation plan.—
(1) IN GENERAL.—Not later than 180 days after the date on which the Secretary of the Treasury submits the threat analysis under subsection (b), and every 5 years thereafter for 10 years, the Secretary of the Treasury, in consultation with the Attorney General, the Secretary of Homeland Security, and the head of any other appropriate Federal law enforcement agency, shall submit to the appropriate congressional committees a remittances strategy and implementation plan.
(2) CONTENTS.—In preparing the remittances strategy and implementation plan under paragraph (1), the Secretary of the Treasury shall consider the following:
(A) The remittances threat and operational analysis required under subsection (b), with an emphasis on efforts to mitigate threats and challenges identified in the analysis.
(B) Efforts to reduce the use of remittances and money transmitting services by drug kingpins, crime syndicates, and other persons to finance terrorism, narcotics trafficking, human trafficking, money laundering, and other forms of illicit financing, domestically or internationally.
(C) Efforts to prevent human trafficking and the unlawful movement of illicit drugs and other contraband through the use of remittances and money transmitting services, and standards against which the effectiveness of those efforts may be determined.
(D) Efforts to focus collection and information analysis to disrupt transnational criminal organizations attempting to exploit security vulnerabilities, and standards against which the effectiveness of those efforts may be determined.
(E) Personnel, technology, and infrastructure needs of Federal law enforcement agencies.
(F) Efforts to prevent, detect, investigate, and mitigate money laundering activities through remittances and money transmitting services, and standards against which the effectiveness of those efforts may be determined.
(G) The lawful use of remittances, the role that remittances play in countries’ economies, and how any recommended measures would impose additional burdens on remittances in light of their lawful uses.
Nothing in this Act, or any amendment made by this Act, shall be construed to apply to the authorized law enforcement, protective, or intelligence activities of the United States or of an intelligence agency of the United States.
Author Biographies
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Table of Contents
- The United States Just Changed How Financial Crime Is Defined
- To Make This Law A Reality Requires Your Action!
- The United States Just Changed How Financial Crime Is Defined
- The Game Is About To Change
- New U.S. Senate Bill S.3643 – 118th Congress
- That Gray Zone has Now Narrowed Dramatically
- Why the U.S. Secret Service Now Sits at the Center of Financial-Crime Enforcement
- How the Expanded Secret Service Role Shifts the FBI’s Focus in Financial-Crime and Scam Enforcement
- What This Means for Individual Scam Victims
- SCARS Institute Analysis
- 1. Core Structural Changes in Law Enforcement Tools
- 2. New Criminal Offenses and Categories
- 3. Remittances and Supply Chain Analysis as a National Security Priority
- 4. International Reach, Foreign Banks, and Jurisdictional Authority
- 5. Broader Criminal Justice and Enforcement Implications
- 6. Impact on Transnational Organized Crime and Global Scam Networks
- 7. Operational Challenges & Implementation Considerations
- Summary
- Glossary
- TEXT OF NEW LAW
- 118th CONGRESS
2d Session - S. 3643
LEAVE A COMMENT?
Recent Comments
On Other Articles
- Arwyn Lautenschlager on Love Bombing And How Romance Scam Victims Are Forced To Feel: “I was love bombed to the point that I would do just about anything for the scammer(s). I was told…” Feb 11, 14:24
- on Dani Daniels (Kira Lee Orsag): Another Scammer’s Favorite: “You provide a valuable service! I wish more people knew about it!” Feb 10, 15:05
- on Danielle Delaunay/Danielle Genevieve – Stolen Identity/Stolen Photos – Impersonation Victim UPDATED 2024: “We highly recommend that you simply turn away form the scam and scammers, and focus on the development of a…” Feb 4, 19:47
- on The Art Of Deception: The Fundamental Principals Of Successful Deceptions – 2024: “I experienced many of the deceptive tactics that romance scammers use. I was told various stories of hardship and why…” Feb 4, 15:27
- on Danielle Delaunay/Danielle Genevieve – Stolen Identity/Stolen Photos – Impersonation Victim UPDATED 2024: “Yes, I’m in that exact situation also. “Danielle” has seriously scammed me for 3 years now. “She” (he) doesn’t know…” Feb 4, 14:58
- on An Essay on Justice and Money Recovery – 2026: “you are so right I accidentally clicked on online justice I signed an agreement for 12k upfront but cd only…” Feb 3, 08:16
- on The SCARS Institute Top 50 Celebrity Impersonation Scams – 2025: “Quora has had visits from scammers pretending to be Keanu Reeves and Paul McCartney in 2025 and 2026.” Jan 27, 17:45
- on Scam Victims Should Limit Their Exposure To Scam News & Scammer Photos: “I used to look at scammers photos all the time; however, I don’t feel the need to do it anymore.…” Jan 26, 23:19
- on After A Scam, No One Can Tell You How You Will React: “This article was very informative, my scams happened 5 years ago; however, l do remember several of those emotions and/or…” Jan 23, 17:17
- on Situational Awareness and How Trauma Makes Scam Victims Less Safe – 2024: “I need to be more observant and I am practicing situational awareness. I’m saving this article to remind me of…” Jan 21, 22:55
ARTICLE META
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
SCARS Institute articles examine different aspects of the scam victim experience, as well as those who may have been secondary victims. This work focuses on understanding victimization through the science of victimology, including common psychological and behavioral responses. The purpose is to help victims and survivors understand why these crimes occurred, reduce shame and self-blame, strengthen recovery programs and victim opportunities, and lower the risk of future victimization.
At times, these discussions may sound uncomfortable, overwhelming, or may be mistaken for blame. They are not. Scam victims are never blamed. Our goal is to explain the mechanisms of deception and the human responses that scammers exploit, and the processes that occur after the scam ends, so victims can better understand what happened to them and why it felt convincing at the time, and what the path looks like going forward.
Articles that address the psychology, neurology, physiology, and other characteristics of scams and the victim experience recognize that all people share cognitive and emotional traits that can be manipulated under the right conditions. These characteristics are not flaws. They are normal human functions that criminals deliberately exploit. Victims typically have little awareness of these mechanisms while a scam is unfolding and a very limited ability to control them. Awareness often comes only after the harm has occurred.
By explaining these processes, these articles help victims make sense of their experiences, understand common post-scam reactions, and identify ways to protect themselves moving forward. This knowledge supports recovery by replacing confusion and self-blame with clarity, context, and self-compassion.
Additional educational material on these topics is available at ScamPsychology.org – ScamsNOW.com and other SCARS Institute websites.
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.







Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.