Typologies · Red Flags · §104(d)
The GENIUS Act §104(d)(3) mandate is clear: PPSIs must detect behavioral patterns that signal potential money laundering. Structuring, layering, round-tripping, and chain-hopping are the typologies every KYT system must monitor. This guide maps each pattern to detection methods and infrastructure.
Pattern Detection Framework
The compliance reality: Recognizing transaction patterns is central to §104(d)(3) behavioral pattern detection. These are the typologies that KYT systems must detect.
Transaction Typologies
Breaking large transactions into amounts just below $3K reporting threshold. Multiple txns from same source within 24h.
Moving funds through multiple intermediary wallets to obscure origin. Each hop adds distance from source.
Funds move A→B→C→A in a cycle. Creates appearance of legitimate commerce or arbitrage.
Large amounts moving through 3+ hops in less than 1 hour. Speed suggests automated laundering.
Moving funds across blockchains via bridges to evade single-chain monitoring. Requires cross-chain visibility.
Funds passing through known mixing services (Tornado Cash, etc.). Direct obfuscation intent.
Long-dormant wallet suddenly active with large transfers. Trigger for KYC re-verification under §104(d)(2).
Transactions concentrated during off-business hours or specific timezone patterns. May indicate automated or geographically displaced activity.
Vendor Capabilities
Each vendor covers different pattern types with varying confidence levels. On-chain detection is limited to simple heuristics.
| Pattern | Chainalysis | Elliptic | TRM | On-Chain |
|---|---|---|---|---|
| Structuring (Smurfing) | ✓ | ✓ | ◐ | ✗ |
| Layering | ✓ | ✓ | ✓ | ◐ |
| Round-Tripping | ✓ | ◐ | ✓ | ◐ |
| Rapid Movement | ✓ | ✓ | ✓ | ◐ |
| Chain Hopping | ◐ | ✓ | ✓ | ✗ |
| Mixer/Tumbler Usage | ✓ | ✓ | ✓ | ✓ |
| Dormant Account Activation | ◐ | ◐ | ◐ | ✓ |
| Unusual Time Patterns | ◐ | ◐ | ◐ | ✓ |
Regulatory Alignment
The obligation: PPSI monitoring systems must have the capability to detect AND report these patterns. Detection without reporting capability fails the compliance requirement.
§104(d)(1) — Real-Time Monitoring
Every customer transfer must be screened in real-time. This includes structuring, rapid movement, and mixer usage patterns.
§104(d)(2) — Risk-Based Re-Verification
When a transaction triggers a risk threshold (including dormant account activation), the PPSI must re-verify the customer's identity. This is the KYT→KYC feedback loop.
§104(d)(3) — Behavioral Pattern Detection
PPSIs must identify and flag structuring, layering, round-tripping, and other multi-transaction patterns. This is the core pattern detection mandate.
§104(d)(4) — Cross-Chain Tracking
Transfers across bridge protocols and chain hops must be tracked and monitored. Chain hopping patterns must be detectable.
Related Content
Live pattern analyzer POC and the full KYT monitoring stack overview.
Complete analysis of monitoring and SAR filing requirements with infrastructure mapping.
Detailed capability matrix of Chainalysis, Elliptic, and TRM Labs.