Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
Institutional Settlement Brief

$55.5 Billion Lost to Settlement Fraud

Business Email Compromise, invoice manipulation, beneficiary spoofing, and wire redirect attacks are the largest financial crime category on earth. Every bank knows the problem. No settlement system prevents it at the infrastructure level. Until now.

$55.5B Cumulative BEC Losses (FBI IC3)
305K Reported Incidents Since 2013
Gate 1 Beneficiary Binding Verification
<2s Deterministic Finality
The Problem

Every bank in the world has the same fraud problem. None of them have solved it at the settlement layer.

$2.77B
BEC Losses in 2024 Alone
FBI IC3 2024 Annual Report
$129K
Average Loss Per BEC Incident
FBI IC3 2024 (21,442 complaints)
63%
of Organizations Hit by BEC
AFP 2025 Payments Fraud Survey
22%
Recovery Rate (75%+ of Funds)
AFP 2025 (down from 41% in 2023)

The FBI's Internet Crime Complaint Center has tracked Business Email Compromise since 2013. In that time, 305,033 incidents across 186 countries have been reported with $55.5 billion in exposed losses (IC3 PSA240911, September 2024). BEC is not a niche cybersecurity issue. It is the single largest category of financial crime in the world, exceeding ransomware, investment fraud, and identity theft combined.

The problem is structural. Settlement systems trust the sender's instructions. When an attacker compromises an email account and modifies the beneficiary details on a wire transfer, the settlement system has no mechanism to verify that the beneficiary is legitimate. The funds move. The fraud is discovered days or weeks later. Recovery is rare - only 22% of organizations recover 75% or more of lost funds.

Why This Keeps Happening

Settlement systems execute instructions. They do not verify beneficiaries.

SWIFT, DTCC, ACH, Fedwire - every major settlement rail processes instructions as received. If the instruction says "send $4.7M to Account X at Bank Y," the system executes it. There is no cryptographic verification that Account X actually belongs to the intended recipient. There is no identity binding. There is no beneficiary attestation. The system trusts the instruction. Attackers exploit that trust.

Attack Vectors

Four fraud types. One root cause: unverified beneficiaries.

Every attack below succeeds because settlement infrastructure blindly trusts payment instructions without cryptographically verifying the intended recipient.

Business Email Compromise (BEC)

Attacker compromises or spoofs executive email to redirect wire transfers. The settlement instruction looks legitimate because it came from a trusted sender. The beneficiary account is the attacker's.

$2.77B in 2024 - FBI IC3 Annual Report
📨

Invoice Fraud / Vendor Impersonation

Attacker sends fraudulent invoices with modified bank details, impersonating a legitimate vendor. Accounts payable teams process the payment to the attacker's account. 60% of all BEC attacks use vendor impersonation.

60% of BEC scams - AFP 2025 Survey
🎭

Beneficiary Spoofing

Attacker intercepts legitimate settlement instructions in transit and modifies the beneficiary account details. The originator believes they are paying the correct counterparty. The funds go to an account the attacker controls.

186 countries affected - IC3 PSA240911
💸

Wire Redirect / Man-in-the-Middle

Attacker compromises communication between counterparties and substitutes wire instructions during a real estate closing, M&A transaction, or cross-border payment. Funds are irrecoverable within hours.

Wire transfers: #1 targeted payment type - AFP 2025
What JIL Does

Beneficiary verification at the settlement layer. Before funds move - not after.

JIL does not detect fraud after it happens. JIL prevents it from executing by requiring cryptographic beneficiary binding on every single settlement instruction.

Gate 1 - Beneficiary Binding

Cryptographic Identity Verification

Every settlement instruction must include a beneficiary identity binding - a cryptographic attestation that the recipient account belongs to the intended beneficiary. If the binding does not match, the settlement is rejected before any funds move. No exceptions. No overrides.

Gate 2 - Compliance Corridor

Automated Regulatory Enforcement

Sanctions screening, AML checks, jurisdiction validation, and travel rule evaluation happen automatically at the infrastructure level. SEC, MiCA, MAS, FINMA, FCA, BaFin, JFSA, FSRA, CVM, and FATF rules are enforced on every settlement - not by manual review, but by policy engine.

Gate 3 - Finality Receipt

Immutable Cryptographic Proof

Every completed settlement produces an immutable finality receipt containing: beneficiary binding proof, BEC check result, compliance evaluation, sanctions screening outcome, and settlement hash. This receipt is exportable, verifiable, and serves as an authoritative audit artifact.

The critical difference:

Traditional settlement systems process instructions and hope the beneficiary is correct. JIL verifies the beneficiary is correct and only then processes the settlement. Every finality receipt includes a bec_check_result field, a beneficiary_binding_proof, and a compliance_evaluation. If any gate fails, funds do not move. This is not a feature. It is the architecture.

Why the Market Needs This

The problem is getting worse, not better.

BEC losses have grown 1,025% since the FBI began tracking them in 2015. In 2016, reported losses were $360 million. By 2024, they reached $2.77 billion - and that is only what gets reported. FinCEN estimates that financial institutions file over 1,100 BEC-related Suspicious Activity Reports per month, representing $301 million per month in attempted thefts (FIN-2019-A005). The true exposure is significantly higher than what IC3 complaints reflect.

Wire transfers have reclaimed the top spot as the most vulnerable payment type targeted by BEC, with 63% of respondents identifying wire fraud as their primary BEC attack surface - up from 39% the previous year (AFP 2025 Payments Fraud and Control Survey). Meanwhile, fund recovery rates are collapsing: only 22% of organizations now recover 75% or more of lost funds, down from 41% in 2023.

The fraud recovery window is shrinking to hours. The FBI Recovery Asset Team froze $561.6 million across 3,020 incidents in 2024 - a 66% success rate. But that means 34% of intercepted fraud still resulted in permanent loss. For the vast majority of BEC incidents that are not reported to the FBI within 48 hours, recovery is essentially zero.

Year BEC Losses (IC3) Complaints Avg. Loss / Incident YoY Growth
2016$360M12,005$30K-
2017$675M15,690$43K+88%
2018$1.2B20,373$59K+78%
2019$1.7B23,775$75K+42%
2020$1.8B19,369$93K+6%
2021$2.4B19,954$120K+33%
2022$2.7B21,832$124K+13%
2023$2.9B21,489$135K+7%
2024$2.77B21,442$129K-4%

Source: FBI Internet Crime Complaint Center Annual Reports 2016-2024. Cumulative global figure ($55.5B) from IC3 PSA240911.

Settlement Corridors

Three corridors. One fraud prevention layer. Every transaction verified.

JIL operates as the neutral settlement backbone across all three institutional corridors - fiat-to-fiat, fiat-to-crypto, and crypto-to-crypto. Beneficiary binding is enforced on every corridor.

Fiat-to-Fiat

Institution to Institution - 3-4 bps

LEI-identified institutions on both sides. This is where the majority of BEC fraud occurs - cross-border wire transfers between banks, real estate closings, M&A transactions, and trade finance.

  • Beneficiary binding verification
  • BEC prevention gate
  • Sanctions + AML screening
  • Multi-jurisdiction compliance
  • Travel rule enforcement
  • Immutable finality receipt

Fiat-to-Crypto

Institution to Digital Asset - 4-5 bps

Institution on one side, crypto-native account on the other. On-ramp and off-ramp settlement where traditional fraud prevention ends and address screening begins.

  • Beneficiary binding verification
  • BEC prevention gate
  • Full institutional compliance
  • Address risk scoring
  • Wallet screening
  • Immutable finality receipt

Crypto-to-Crypto

Digital Asset to Digital Asset - Subscription

On-chain accounts on both sides. DeFi settlements, token transfers, and cross-chain swaps where address verification and identity binding prevent destination spoofing.

  • Beneficiary binding verification
  • BEC prevention gate
  • Sanctions screening
  • Address risk scoring
  • Proof-of-Humanity verification
  • Immutable finality receipt
Competitive Position

No existing settlement platform prevents BEC at the infrastructure level.

Every platform below processes settlement instructions as received. None verify beneficiary identity before moving funds.

Platform BEC Prevention Beneficiary Binding T+0 Finality Multi-Jurisdiction Cryptographic Audit
SWIFT gpi No - messaging only No Hours Messaging only No
Fedwire / ACH No No Same-day ACH US only No
DTCC / Euroclear No KYC-based T+1 Single region No
Ethereum / Solana No No Seconds No On-chain
JPM Onyx / Canton No Internal only Near-instant Limited Internal
JIL Sovereign Gate 1 Prevention Cryptographic <2s Final 13 jurisdictions Finality receipts
Why We Built This

Settlement infrastructure should verify, not just execute.

The financial industry spends billions on fraud detection. Email filters. AI-powered anomaly detection. Employee training programs. Callback verification procedures. All of these are attempts to catch fraud before it reaches the settlement system. But the settlement system itself - the place where money actually moves - does nothing to prevent it.

JIL was built on a simple premise: the settlement layer is the last line of defense, and it should act like one. If beneficiary identity can be cryptographically verified at the point of settlement, then every fraud type that depends on modified beneficiary details - BEC, invoice fraud, wire redirects, vendor impersonation - becomes structurally impossible. Not harder to execute. Impossible to execute.

This is not an add-on feature. It is the reason JIL exists. We built 190+ production services, deployed 20 validators across 13 jurisdictions, and engineered a complete settlement operating system - all so that one thing could be true: no settlement completes without verified beneficiary identity.

What JIL Does

Verify beneficiary identity. Enforce settlement policy. Produce finality receipts with BEC check results. Automate multi-jurisdiction compliance. Export audit evidence. Settle in under 2 seconds with deterministic finality.

What JIL Does Not Do

Custody funds. Replace regulators. Compete with banks or custodians. Displace existing compliance frameworks. Take positions or trade. JIL is infrastructure - the neutral rail that sits beneath institutions using it.

Integration Path

From evaluation to production in 30 days.

Structured onboarding with dedicated engineering support. BEC prevention testing included.

Week 1-2: POC

Sandbox access, API credentials, beneficiary binding configuration, and compliance corridor setup. Test BEC prevention with simulated attack scenarios.

Week 3: Integration

Connect your systems to the settlement API. Configure beneficiary binding rules, escrow gates, and approval workflows. Integration review with JIL engineering.

Week 4: Production

End-to-end testing including BEC, invoice fraud, and wire redirect attack simulations. Production readiness review and report. MainNet credential provisioning.

Sources & Citations

  1. FBI IC3 2024 Internet Crime Report (April 2025) - 21,442 BEC complaints, $2.77B losses
  2. FBI IC3 PSA240911 "Business Email Compromise: The $55 Billion Scam" (September 2024) - 305,033 incidents, $55.5B exposed losses (Oct 2013 - Dec 2023), 186 countries
  3. FBI IC3 Annual Reports 2016-2023 - year-over-year BEC loss data
  4. Association for Financial Professionals (AFP) 2025 Payments Fraud and Control Survey - 63% BEC rate, 63% wire transfer targeting, 22% recovery rate
  5. FinCEN Advisory FIN-2019-A005 (July 2019) - 1,100+ BEC SARs/month, $301M/month attempted theft
  6. FBI Recovery Asset Team (RAT) 2024 - 3,020 incidents, $561.6M frozen, 66% success rate
For Banks, Custodians & Payment Processors

Stop detecting fraud after it happens. Prevent it before funds move.

JIL Sovereign is operational with 190+ production services, 20 validators across 13 jurisdictions, and the only settlement layer with cryptographic beneficiary binding on every transaction.