While transshipment is a standard and legitimate practice in international logistics, illicit transshipment schemes and other trade-based evasion tactics are a growing threat to export controls compliance and the enforcement of global trade regulations.
Unlike direct shipments, transshipment routes include intermediate stops where goods are unloaded and transferred between vessels, vehicles, or ports before reaching their final destination. This extra step creates opportunities for potential sanctions evasion or diversion. For restricted or export-controlled goods, movement through multiple jurisdictions can obscure the trail for both compliance teams and government investigators.
These schemes often involve diverting goods through intermediary countries or logistics providers to disguise their origin, destination, or ultimate end-user.
This challenge, however, isn’t limited to exports. The same tactics appear in the circumvention of trade enforcement measures concerning imports, such as routing Xinjiang-origin goods through a third country to try to bypass enforcement of the Uyghur Forced Labor Prevention Act (UFLPA).
For organizations, the objective is to illuminate the hidden risks in complex global trading networks and supply chains. Identifying these threats requires a proactive strategy that moves beyond basic list screening to deep network intelligence.
Understanding the Risks of Transshipment
Transshipment is not inherently unlawful. The compliance risk arises when intermediaries exploit the transshipment process to divert goods to restricted end-users — and when exporters lack the visibility to detect it.Each stop along a shipment’s route introduces another point where visibility can break down — and where diversion risk increases. The more intermediary steps, the more robust the due diligence needs to be.
Why Transshipment is a Target for Evaders
Complexity is a tool of choice for evaders, and transshipment makes it more difficult for exporters, insurers, and financial intermediaries to track the ultimate end-user and destination.The primary risk is circumvention of export controls and sanctions. This includes products that are diverted to comprehensively sanctioned jurisdictions, sanctioned parties, or prohibited end-users without the required licenses. By routing goods through third-country intermediaries, procurement networks can exploit gaps in data and enforcement to obtain restricted items without detection — circumventing regulations like the Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR), and OFAC sanctions.
Evaders exploit transshipment to:
- Disguise origin or destination: Diverting shipments through multiple jurisdictions to conceal the true source or final end-user of restricted goods.
- Avoid trade restrictions: Re-routing goods through countries with weaker controls or enforcement.
- Conceal illegal movement: Smuggling high-risk products, including those tied to military end-use, without export licenses.
- Exploit screening gaps: Operating through jurisdictions where compliance infrastructure, enforcement capacity, or information-sharing between authorities is limited.
Evasion Tactics and Red Flags
U.S. government agencies like OFAC, the Bureau of Industry and Security (BIS), and the Financial Crimes Enforcement Network (FinCEN) have identified common red flags for potential transshipment and diversion:
- Suspicious routing: Atypical or circuitous shipping routes for a product and destination (e.g., semiconductors shipped from the U.S. to a distributor in Turkey that are ultimately destined for Russia).
- High-risk intermediaries: Freight forwarders or logistics firms listed as final customers, particularly in known transshipment hubs
Lack of digital presence: Entities with little to no web presence or mismatched business addresses.
Sudden changes: Last-minute changes to routes or consignees without clear justification.
Connections to illicit actors: Shared ownership, management, or location with entities on the BIS Entity List or OFAC’s Specially Designated Nationals (SDN) List.
- Unusual business activity: Entities suddenly expanding into new product lines, geographies, or logistics capabilities without clear commercial rationale — such as newly formed companies placing large orders for controlled goods, or the purchase of vessels for no apparent commercial purpose.
- False end-user statements: Incomplete or misleading declarations intended to obscure a restricted destination.
- Other obfuscation techniques:Using false or frequently changing identifiers — such as renaming vessels, “flag hopping,” disabling AIS transponders, or operating under shell company names that rotate across transactions.
Global regulators have published guidance on controlling for transshipment and evasion risk. Here are other governmental sources and examples for additional reading:
- FinCEN, March 2022: Notice on Russian sanctions evasion attempts.
- BIS, August 2022: Commodity, end-user and transshipment country red flag FAQs.
Russian Elites, Proxies, and Oligarchs (REPO) Task Force, March 2023: Advisory on Russian sanctions evasion.
FinCEN and BIS, June 2022 and May 2023: Joint alerts urging vigilance for potential Russian export control evasion attempts.
Commerce, Treasury, and Justice, March 2024: Tri-Seal compliance note on complying with U.S. sanctions and export control laws.
- Commerce, Treasury, Justice, State, Homeland Security, March 2024: Quint-Seal compliance note on best practices to ensure safe and compliant cargo transport.
- OFAC, October 2024: Sanctions guidance for the maritime shipping industry.. They may also provide vague or false declarations regarding the end-use and end-user, often claiming "civilian" use for items destined for military research or production.
High-Risk Transshipment Hubs
BIS has identified a number of jurisdictions frequently used as transshipment points to mask the diversion of restricted goods to Russia and Belarus, including Armenia, Brazil, China, Georgia, India, Israel, Kazakhstan, Kyrgyzstan, Mexico, Nicaragua, Serbia, Singapore, South Africa, Taiwan, Tajikistan, Turkey, the UAE, and Uzbekistan.While shipments through these locations are not prohibited, they require enhanced export compliance screening when involving sensitive goods.
Compliance and Enforcement
Transshipment schemes are a proven method for violating EAR, ITAR, and OFAC restrictions.
Public U.S. enforcement actions, such as a February 2025 sentencing of an Israeli freight forwarder and a November 2025 indictment against a group of U.S. and Chinese nationals, highlight the tangible risks.
- In the first case, the Israeli owner of an international freight forwarding company was sentenced to two years in prison and ordered to forfeit over $2 million for using transshipment routes through the Maldives and UAE to send aircraft parts and avionics from U.S. manufacturers and suppliers to Russia in violation of export restrictions.
- In the second case, four individuals were charged with illegally transshipping controlled Graphics Processing Units (GPUs) with AI applications through Malaysia and Thailand to China. The Justice Department press release noted that the individuals lied about the intended destination of the GPUs to evade U.S. export controls and used U.S. companies to acquire and export the controlled items.
The cost of non-compliance goes beyond financial penalties, to include license revocations, criminal prosecution, and reputational damage. Violations uncovered by regulators, rather than through a company’s own voluntary self-disclosure (VSD), often lead to harsher consequences.
Exporters, insurers, and trade financiers often have a limited, “point-in-time” view of the entire global logistics process; they may only see a few documents at a single point in time rather than the entire shipping journey. Illicit actors exploit this by using shell or front companies to create layers of opacity in the trade networks.
Proactive Risk Management with Kharon
The challenge for industry is separating ordinary trade from high-risk diversion. Kharon’s intelligence platform helps you move beyond basic screening to a proactive compliance strategy by illuminating hidden risks across your trade counterparties and supply chain.By implementing Kharon’s data, organizations can gain deep insight into:
- Counterparty risk mapping: Trace connections between your trade counterparties, intermediaries, sanctioned entities, and military end-users — aligned with BIS and OFAC guidance.
- Anomalies of concern: Risk indicators such as suspicious trade routes and shared physical locations (co-location).
- Maritime activity tied to sanctions evasion: Vessels, owners and operators, logistics companies, and other intermediaries with material ties to sanctioned or trade-restricted parties.
- Ownership mapping: End-users with ownership structures tied to sanctioned or trade-restricted actors, even if the end-user is not explicitly listed.
By using Kharon’s data, you can gain a complete picture of potential transshipment risk tied to your trade counterparties. Kharon integrates with leading trade compliance platforms and screening tools and adds a layer of contextual intelligence that other trade analytics and risk detection platforms can’t provide.
Users of Kharon ClearView can visualize ownership structures, trade flows, and risky intermediaries – such as shell companies, freight forwarders, carriers, or brokers – linked to illicit activity.
Kharon enables a shift to intelligence-driven risk management by helping organizations:
- Uncover Indirect Exposure Through Network-Based Insights: Move beyond static screening to identify the web of relationships—including subsidiaries, vendors, and common leadership—that may link seemingly innocuous transshippers to sanctioned actors or restricted military end-users.
- Detect Illicit Transshipment and Diversion Risk: Identify red flag entities in complex logistical chains, such as front companies or third-party resellers located in high-risk hubs known for diverting advanced technologies to restricted parties or jurisdictions.
- Strengthen Defensible Due Diligence and Decision-Making: Build a more robust and auditable compliance posture by leveraging enriched trade data that surfaces high-risk parties not found on government watchlists, allowing your business to act with confidence.
- Evaluate Third-Party Intermediary Risk in Real Time: Assess the integrity of entities facilitating global trade — from brokers to carriers — by visualizing historical links to illicit procurement networks and shadow banking systems.
- Mitigate Multi-Jurisdictional Regulatory Risk: Proactively manage exposure to evolving sanctions and export controls by identifying affiliates and intermediaries that may introduce risk through their ongoing commercial transactions.
Explore Kharon’s Sanctions and Military End-Use solutions to build a stronger export controls compliance framework.


