This very interesting paper discusses the ways that cyber-criminals manage the proceeds of their crimes, from employing money mules to using services such as mixers to obfuscate the proceeds' origins. It offers recommendations for policymakers, law enforcement professionals and regulated entities to target and reduce these activities.