Main points
- Existing literature links illicit finance vulnerabilities to state threats primarily through documented mechanisms of concealment, including the use of shell companies, nominee arrangements and layered ownership structures.
- Additionally, the exploitation of the pseudonymity and other vulnerabilities of virtual assets, such as cryptocurrencies, is an emerging area of concern.
- Although it is not always possible to clearly identify national security implications, case evidence shows that opaque corporate and financial structures are used for the purposes of access to strategic sectors, cyberthreats, corruption and forms of foreign political interference such as covert political finance.
- Financial secrecy vehicles are also exploited as part of sanctions evasion schemes, which aim to hinder countermeasures designed to address state threats, including proliferation.
- The literature emphasises that policy responses tend to focus on improving beneficial ownership transparency, verification and information sharing, while cautioning against over-securitisation and selective enforcement, which may negatively affect multilateral efforts to counter illicit finance.
- While there is strong documentation of how structures used to obscure company and asset ownership are used in state-linked activity, there is less evidence –particularly in the form of robust quantitative, longitudinal studies – that can test whether changes in the use of financial secrecy are associated with measurable security relevant outcomes.



