Академический Документы
Профессиональный Документы
Культура Документы
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 1 / Date:
20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
This important new Handbook series presents high quality, original reference works that
cover a range of subjects within the evolving field of financial law. National, regional and
global financial markets are at the epicenter of economic, political and social developments.
They are shaped by their own intrinsic dynamics, but are also at the receiving end of potent
external forces, including monetary developments, state regulation and policies towards
international and regional financial integration and free trade areas.
Under the general editorship of Rosa Lastra, these Handbooks are edited by leading
scholars in their respective fields, and comprise specially commissioned contributions from
distinguished academics, who critically, innovatively and substantially analyze a wide range
of current issues in financial law.
Each of the individual handbooks is a definitive reference work, essential for both scholars
of financial law as well as for practicing lawyers. The comprehensive coverage and thorough
examinations of the significant topics and ideas in financial law signify the Handbooks’
position as authoritative and scholarly information resources.
Titles in the series include:
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 2 / Date:
20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Edited by
Barry Rider
Professorial Fellow, Centre for Development Studies,
University of Cambridge, UK
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 1 / Date:
20/7
JOBNAME: Rider PAGE: 4 SESS: 10 OUTPUT: Wed Oct 21 15:42:12 2015
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system
or transmitted in any form or by any means, electronic, mechanical or photocopying, recording,
or otherwise without the prior permission of the publisher.
Published by
Edward Elgar Publishing Limited
The Lypiatts
15 Lansdown Road
Cheltenham
Glos GL50 2JA
UK
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 2 / Date:
21/10
JOBNAME: Rider PAGE: 5 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contents
List of contributors ix
Foreword: some reflections on the evolution of economic and financial crimes
by Michael Levi xxviii
Introduction by Barry Rider xxxvii
Table of cases xli
v
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 1 / Date:
9/10
JOBNAME: Rider PAGE: 6 SESS: 9 OUTPUT: Wed Oct 14 15:09:05 2015
PART V FRAUD
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 2 / Date:
14/10
JOBNAME: Rider PAGE: 7 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contents vii
PART VI CORRUPTION
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 3 / Date:
9/10
JOBNAME: Rider PAGE: 8 SESS: 8 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 4 / Date:
9/10
JOBNAME: Rider PAGE: 9 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors
Professor Irina Abramova, BA (Hons) (Moscow State University); MA, PhD (Insti-
tute for African Studies). Irina is Deputy Director of the Institute for African Studies
(IAS), Russian Academy of Sciences in Moscow. She is also Full Professor, Depart-
ment of Global Problems and International Relations, Russian Academy of Sciences in
Moscow and a Visiting Lecturer at the Universities of Tuebingen, Bochum, Heidelberg
(Germany) and University of St. Gallen (Switzerland). In 2004–2005 she participated
in a number of training activities and international conferences organised by the
Council of Europe in the capacity of an international expert on combating money
laundering and terrorist financing. Irina is the author of more than 110 research works
published in Russia and abroad, including eight major monographs.
Dr Shazeeda A. Ali, LLB (Hons) (UWI); LLM (Cantab); PhD (Lond); Attorney-at-
Law. Shazeeda was appointed a Senior Lecturer in the Faculty of Law at the University
of the West Indies, Mona Campus, in 2012. She is currently a Deputy Dean in that
faculty and is also a Course Director in legal professional ethics at the Norman Manley
Law School. Shazeeda previously served as a technical advisor in the Attorney
General’s Chambers of Jamaica where she was involved in the process leading up to
the enactment of the Proceeds of Crime Act (POCA). She has presented and published
a number of papers, both locally and internationally, on financial services regulation,
financial crime and legal ethics.
Professor Anona Armstrong, BA (Hons), PhD (Melb); FIPAA (Vic); FAPS, FAES,
FAICD, AM. Anona is Professor of Governance and Director of Research and Research
Training in the Faculty of Law and Justice, Victoria University, Melbourne. She was
elected a Life Fellow of Clare Hall, Cambridge University in 2005 and was invested
with the Member of the Order of Australia in 2008. In her current position she
supervises a number of PhD students and chairs a Victorian Government’s Health
Advisory Committee. Anona has written and published a number of books and articles
in the area of corporate misconduct and related issues of governance and ethics,
particularly in relation to the public sector.
ix
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 1 / Date:
9/10
JOBNAME: Rider PAGE: 10 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Dr Graeme Baber, MA (Oxon); LLB (Hons), LLM (Lond), BSc, MSc (Oxon); PhD
(Lond); MBA (Heriot-Watt); MSc (Herts); PGCPE (BPP); FHEA, MCT, ACSI, ALCM.
Graeme is an LLM Senior Lecturer at BPP University Law School, specialising in
international and financial law. He publishes regularly and extensively on the law of
financial services regulation. Graeme has written a number of books and articles on
financial law and is an accomplished pianist in respect of music of the baroque and
classical periods.
Mr Alan Bacarese, LLB (Hons) (Leeds); Barrister (England and Wales). Alan is a
Director of Stream House, an international anti-corruption consultancy, where he leads
on anti-corruption and asset recovery matters. He is a UK barrister and was a Senior
Crown Prosecutor with the UK’s Crown Prosecution Service until 2007 before helping
to establish the International Centre for Asset Recovery (ICAR) in Basel, Switzerland.
In 2014, Alan worked as an EU-funded legal advisor to the government of Montenegro
on EU accession and rule of law reform. Alan currently works in many jurisdictions on
both rule of law policy and legal case work.
Professor Fletcher N. Baldwin, JD, LLM (Yale); LLM (Illinois); JD Hon (Georgia).
Fletcher is the Chesterfield Smith Professor of Law Emeritus and Director, Centre for
International Financial Crimes Studies, University of Florida, Visiting Professor at
Montpellier University and Honorary Fellow, Institute of Advanced Legal Studies,
University of London. He taught at Makerere University, Uganda as a Fulbright Fellow
and at Baylor University, UNLV. He was Visiting Professor at both the University of
Natal Pieremaritzburg and Stellenbosch University, South Africa, CEELI Legal Advisor
to the Constitutional Court Ukraine and a consultant to the Attorney General,
Indonesia. He was Special Advisor for the Philippine Money Laundering Council and
Advisor-Lecturer for the Afghanistan Rule of Law Project in Kabul in 2008. He has
written books and articles, including the five volume treatise entitled Money Launder-
ing Asset Forfeiture and International Financial Crimes (1993–2008, Oxford Univer-
sity Press), and co-authored the three volume treatise entitled Cybercrime and Security.
Professor Stuart Bazley, LLB (Hons), LLM, PhD (Lond). Stuart is a Visiting
Professor in Financial Regulation and Compliance Law at BPP University Law School.
Stuart has over 30 years’ experience working in the financial services industry and is a
former employed Barrister having held senior roles as In-House Lawyer, General
Counsel and Head of Compliance. Stuart now works as an expert regulatory consultant,
with a wide range of medium-sized enterprises and large complex transnational
financial services firms in the securities, wealth management and banking sectors,
advising on and investigating market and sales practice compliance, regulatory mis-
conduct and enforcement matters. Stuart has published a number of books and many
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 2 / Date:
9/10
JOBNAME: Rider PAGE: 11 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xi
articles on regulatory and legal issues, particularly relating to market abuse and
compliance.
Professor Andrew Campbell, LLB, MPhil (Wales); Solicitor of the Supreme Court of
England and Wales; Chartered Banker. Andrew is Professor of International Banking
and Finance Law at the School of Law at the University of Leeds. He is particularly
interested in bank insolvency, protecting depositors and financial crime, in which areas
he has published a number of books and articles.
Miss Elise Campbell, LLB (BCU); MA (Leeds). Elise is undertaking research into
aspects of human rights law and financial crime, having recently completed an MA by
Research with Distinction at the University of Leeds School of Law.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 3 / Date:
9/10
JOBNAME: Rider PAGE: 12 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Dr Rita Cheung, LLB (Hons), PCLL (HKU); LLM, PhD (King’s College Lond);
Barrister-at-Law (High Court of Hong Kong). Rita is an Assistant Professor in the
Faculty of Law at the Chinese University of Hong Kong where she teaches in the areas
of company law and commercial law. Prior to pursuing her doctorate degree, she
practised in one of the UK’s magic circle law firms. She is now a Barrister-at-Law of
the High Court of Hong Kong. Rita has published books and has written in the field of
corporate law and corporate economic crime in leading internationally refereed
journals.
Professor Jonathan Clough, BSc, LLB (Hons) (Monash); LLM (Cantab); PhD
(Monash), Barrister and Solicitor (Victoria). Jonathan is a Professor and Director,
Higher Degrees by Research in the Faculty of Law at Monash University. He teaches
and researches in the areas of criminal law and evidence, with a particular focus on
cybercrime. In addition to teaching Cybercrime in the Monash LLM programme, he
has written numerous articles on the topic and is the author of of Principles of
Cybercrime, 2nd edn (Cambridge University Press, forthcoming). He has provided
advice to government on cybercrime related issues and was a member of the
Commonwealth Working Group of Experts on Cybercrime.
Mr Gilbert Crentsil, BA (Gh); GDL, PG Dip (Legal Practice) (Lond Met); LLM
(Northumbria); Solicitor of the Supreme Court of England and Wales. Gilbert is
pursuing doctoral studies at the Institute of Advanced Legal Studies (IALS) University
of London. Gilbert’s research interest is in the phenomenon of fraud approached from
a comparative perspective. He is currently looking at financial services, real estate and
consumer credit frauds through the lenses of English law, Islamic and Judeo-Christian
traditions. Gilbert also practises as a solicitor in England and Wales and is a consultant
solicitor at Scott-Moncrieff and Associates, Holborn, London.
Professor Louis de Koker, BIuris, LLB, LLM (UOFS); LLM (Cantab); LLD (UOFS);
Attorney of the High Court of South Africa. Louis holds a Chair of Law at the Deakin
Law School, Deakin University. He also holds a Visiting Professorship in commercial
law at the University of Johannesburg and an Extraordinary Professorship in mercantile
law at the University of the Free State (South Africa). Louis is the Foundational
Director of the University of Johannesburg’s Centre for the Study of Economic Crime.
He is currently the programme leader of the Law and Policy research programme of
the Australian government-funded Data to Decisions Cooperative Research Centre. His
research on anti-money laundering laws and their impact on financial inclusion in
developing countries has been cited in publications of various international bodies
including the International Monetary Fund, the World Bank, the Basel Committee on
Banking Supervision and the Financial Action Task Force.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 4 / Date:
9/10
JOBNAME: Rider PAGE: 13 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xiii
between 2012 and 2013. Before coming to the Bar, Kathryn worked at Peters & Peters
LLP and Kingsley Napley LLP.
Mr Jonathan Fisher QC, BA (Hons), LLB (Cantab); Barrister (England and Wales).
Jonathan is a practising barrister at Devereux Chambers in the Temple, London where
he specialises in cases involving corporate crime, financial services regulation, fraud,
proceeds of crime and tax evasion. He is highly recommended as a leading Queens
Counsel in the independent legal directories. In addition, Jonathan is a Chartered Tax
Adviser (Fellow), an accredited Trusts and Estates Practitioner, Visiting Professor in
Practice at the London School of Economics, General Editor of Lloyds Law Reports:
Financial Crime, and an Editorial Board Member of Simon’s Taxes. He was a
Commissioner on the Commission for a Bill of Rights in the United Kingdom.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 5 / Date:
9/10
JOBNAME: Rider PAGE: 14 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 6 / Date:
9/10
JOBNAME: Rider PAGE: 15 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xv
Mr Peter Gray, MA (Cantab); Solicitor of the Supreme Court of England and Wales.
Peter focuses on fraud, corruption and other white collar crime matters He has
represented governments, private claimants and defendants in such matters. Peter has
previously written and spoken on a number of aspects of multi-jurisdictional litigation,
fraud, white-collar crime and asset recovery. He is a regular speaker at the annual
Cambridge Symposium on Economic Crime.
Ms Asma Hakimah Ab Halim, LLB, LLB (Shariah), CiCA (IIUM); LLM (UKM);
Advocate & Solicitor of the High Court, Malaya. Asma is a Lecturer at the Faculty of
Law, Universiti Kebangsaan Malaysia (National University of Malaysia). She was
previously a Lecturer at the University of Multimedia (MMU), Malaysia and part-time
tutor at Kolej University Islam Malaysia, currently known as Universiti Sains Islam
Malaysia (USIM). Apart from academic work, Asma is also actively involved in
programmes organised by NGOs that include seminars, talks, intellectual discourses
and social activities on issues related to the promotion of integrity.
Ms Mignon Hauman, LLB, LLM (cum laude) (UFS); Candidate Attorney (South
Africa). Mignon is a candidate attorney in Bloemfontein, South Africa and a researcher
in mercantile law and academic tutor in the Faculty of Law, at the University of the
Free State, Bloemfontein, South Africa. Recently she was awarded the Dean’s Medal as
the best master’s degree student in the Faculty of Law of the UFS. Mignon has assisted
with research for and co-authored several publications in the field of mercantile law.
The Hon Mr Justice David Hayton, LLD (Cantab); LLD (Newcastle); TEP (Hon),
Master of the Bench of Lincoln’s Inn. David is a Justice of the Caribbean Court of
Justice. He was a Fellow of Jesus College, Cambridge before becoming Professor of
Law at King’s College, London while practising at the Bar and, from 1984, sitting as a
part-time judge in England and the Bahamas. Well known for Underhill & Hayton on
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 7 / Date:
9/10
JOBNAME: Rider PAGE: 16 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Trusts, as author or editor he has produced fourteen books in the areas of trusts,
property, succession and tax and published many articles.
Professor Johan Henning, BIur, LLB (UOVS); LLD (UFS); Attorney (South Africa).
Johan is a Distinguished Professor and Director of the Centre for Business Law in the
Faculty of Law and sometime Dean of Law at the University of the Free State,
Bloemfontein, South Africa. He is also a Professor Extraordinarius at the College of
Law of the University of South Africa and Visiting Professor in Corporate and
Commercial Law at the BPP University School of Law, London.
From 2000 until 2010 he was also the Director of the Centre for Comparative
Company Law of the Institute of Advanced Legal Studies at the University of London.
He was a Visiting Professor and a Guest Professor at several Universities in Germany,
the UK and the US. He was a member of the South African Standing Advisory
Committee on Company Law and Chair of its Standing Subcommittee on Close
Corporations, and later was a member of the national reference group for the drafting
of the Companies Act of 2008. He is a member of both the Academy of Science of
Southern Africa and the Akademie vir Wetenskap en Kuns and is also an Honorary
Member of the Order of the Coif (US). He has published more than 60 books and
monographs and more than 200 articles primarily in the areas of company law, close
corporations law, law of partnership and the combating of economic crime.
Ms Jessie Ingle, BInst, LLB (Hons) (UNSW); LLM (Cantab). Jessie is a solicitor at
Linklaters LLP, London. Before taking her position, she completed her Masters of Law
at the University of Cambridge, focusing primarily on philosophy and international
criminal law. Jessie has been an editor of the Cambridge Journal of International and
Comparative Law as well as the Australian Journal of Human Rights. She was also a
researcher at the University of New South Wales and at Wentworth Chambers, Sydney,
concentrating principally on international financial regulation.
Dr Siti Faridah Abdul Jabbar, LLB (UKM); LLM (Cantab); PhD (Lond); Advocate
& Solicitor of the High Court, Malaya. Faridah is Associate Professor in Law at the
Faculty of Economics and Management, Universiti Kebangsaan Malaysia (National
University of Malaysia). She also lectured at the BPP University in London from 2008
until 2010 on subjects relating to Islamic finance and financial regulation. Faridah has
presented at conferences and published in journals on issues relating to the legal and
regulatory aspects of Islamic finance. To date, Faridah has received three Outstanding
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 8 / Date:
9/10
JOBNAME: Rider PAGE: 17 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xvii
Paper Awards from the Emerald Literati Network of Excellence for her work on
financial regulation and Islamic finance.
Dr Dayanath Jayasuriya PC, LLB, PhD (Colombo); FICA, Hon FSALS, FIFAA,
Attorney at Law and President’s Counsel (Sri Lanka). After working for ten years in the
Attorney General’s Department of Sri Lanka, Dayanath served for more than 20 years
with the UN and its specialised agencies in Geneva, Vienna, Bangkok, New Delhi and
Islamabad. After returning to Sri Lanka he has held the positions of Director General
and later as Chairman of the Securities Exchange Commission and Insurance Board of
Sri Lanka. In 2005 he was elected as the Chairman of the IOSCO Presidents’
Committee. He served as the first Regional Director (Academic Affairs) of the
International Compliance Regional Office for Asia.
Dayanath has been a Visiting Professor of Mercantile Law at the University of the
Free State in South Africa; Visiting Scholar at Harvard University, Boston and has
delivered guest lectures at Oxford University, University of London, Cambridge
University, University of New South Wales, University of Tasmania, University of
Montreal, Delaware Law School, and so on. He is a Distinguished Visitor at the
Georgetown Law School, Washington DC.
Dayanath has written more than 20 books, 25 monographs and published over 200
articles. His books have been cited in judgments of the US Appeal Courts. He is on the
editorial board of several British journals such as The Company Lawyer; International
Journal of Islamic and Middle Eastern Finance and Management; Journal of Financial
Crime; Journal of Money Laundering Control; and Journal of Qualitative Research in
Financial Markets.
He is the Chairman of Orient Finance plc and Bartleet Finance plc; Managing
Partner of Corporate Governance Advisory Services Pte Ltd Singapore; and Chairman
of the Rating Committee of Lanka Rating Agency Pvt Ltd.
The Hon Mr John Jeremie SC, LLB (UWI); LLM (Lond); Senior Counsel (Trinidad
and Tobago). John is a Senior Lecturer in the Faculty of Law at the University of the
West Indies. He served as Attorney General of Trinidad and Tobago between 2004 and
2010. He has presented papers on co-operation in criminal matters at meetings of the
Commonwealth Law Ministers and has represented Trinidad and Tobago at meetings of
Law Ministers in the Caribbean, throughout the Commonwealth and in Latin America.
He has written extensively in the area of international crime and commercial law. John
practices at the Inner Bar in Trinidad and Tobago.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 9 / Date:
9/10
JOBNAME: Rider PAGE: 18 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Mr David Kirk, MA (Oxon); Solicitor of the Supreme Court of England and Wales.
David is a Partner at McGuireWoods London LLP specialising in economic crime in
both private and public sectors. He worked in the 1980s for the Director of Public
Prosecutions and the Attorney General. In 1988 he set up the City’s first specialist fraud
practice at Stephenson Harwood. Between 1994 and 2006 he was a Partner at Simons
Muirhead and Burton. In 2006 he was appointed Director of the Fraud Prosecution
Service at the Crown Prosecution Service, and in 2009 became the Financial Services
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 10 / Date:
9/10
JOBNAME: Rider PAGE: 19 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xix
Associate Professor Maria Krambia-Kapardis, BEc (La Trobe); MBus (RMIT); PhD
(Edith Cowan), FCA, ACFE. Maria is an Associate Professor in Accounting at Cyprus
University of Technology. She is Chair and a founding member of Transparency
International – Cyprus, has been representing Cyprus on corruption at the European
level and has chaired the Economic Crime and Forensic Accounting Committee of the
Institute of Certified Public Accountants of Cyprus for a number of years. She has
authored two books on the topic of economic crime, a number of chapters in peered
reviewed books in Greek, French and English and has edited three books. She has
received a number of awards for her publications. Her work is published in
international/local, professional and academic journals and she has presented her
research locally and internationally in peered review conferences. Her research interests
are fraud detection and investigation, anti-corruption, corporate social responsibility,
corporate governance and business ethics and has won a number of EU-funded
projects.
Professor Michael Levi, MA (Oxon); DipCrim (Cantab); PhD (Soton); DSc (Econ)
(Cardiff); Fellow of the Academy of Social Sciences; Fellow of the Learned Society of
Wales. Michael is Professor of Criminology at Cardiff University. He has been
conducting international research on the control of white-collar and organised crime,
corruption and money laundering/financing of terrorism since 1972, and has published
widely on these subjects as well as editing major journals. His current public roles
include President, US National White-Collar Crime Research Consortium; and he is a
Member of the European Commission Group of Experts on Corruption and of the
Committee on the Illicit Tobacco Market, US National Academy of Sciences; UK
Crime Statistics Advisory Committee; and adviser to the UK and EC on financial crime
issues. In 2013 he was given the Distinguished Scholar Award by the International
Association for the Study of Organised Crime, and in 2014, the Sellin-Glueck prize by
the American Society of Criminology for his contribution to international and compara-
tive criminology.
He is a Senior Fellow at Rand Europe and an Associate Fellow at the Royal United
Services Institute. He is also an adviser to Europol on the Serious and Organised Crime
Threat Assessments and on the Internet-enabled Organised Crime Threat Assessments.
He is currently engaged in work on the detection of insider frauds and other threats;
public–private sector collaboration against economic and organised crime; and the
criminalisation and investigation of organised crime in the EU.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 11 / Date:
9/10
JOBNAME: Rider PAGE: 20 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
key function of which is to protect the programmes against waste, fraud and abuse. He
has represented the US before the International Telecommunications Union and was a
member of a USAID team conducting regional training in Namibia. He has worked as
a consultant for the International Centre for Asset Recovery of the Basel Institute on
Governance, helping to design its mission and curriculum and launching an anti-
corruption project in India. Recently, as a member of the Stream House network of
experts, Kenneth has assisted in reviewing training materials designed for implementa-
tion of the whistleblowing mechanism for the International Conference on the Great
Lakes Region (ICGLR) in Eastern DR Congo.
Dr Xuebin Li, BSc (Criminology, Criminal Police University of China); PhD (Cardiff).
Xuebin is Lecturer of Chinese Criminal Law and Public Law at the BBP University,
London. He is a consultant on Chinese law and policy, in particular on Chinese
anti-money laundering regulation and anti-corruption practice. Xuebin also works for
the Ministry of Justice of the UK. He has written and published articles on money
laundering and related issues, and is a contributor to Journal of Money Laundering
Control. Before coming to the UK, Xuebin was a senior official in the Political Bureau
of Shengyang Police, China.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 12 / Date:
9/10
JOBNAME: Rider PAGE: 21 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xxi
at St Edmund’s College, where he directs research into the illicit traffic in organs for
transplantation. He is the author of Transnational Organised Crime (2009) and a
number of peer-reviewed journal articles and chapters in books. He was formerly Head,
Criminal Intelligence, Interpol HQ, France and then Director, Corporate Security at a
US Fortune-100 company.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 13 / Date:
9/10
JOBNAME: Rider PAGE: 22 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Professor Chizu Nakajima, LLB (Hons), LLM (International Law) (Keio); PhD
(Lond); FSALS. Chizu is Professor of Corporate Law and Governance and Director of
the International Centre for Integrity and Governance at the London Guildhall Faculty
of Business and Law and Chair of the British Japanese Law Association, London. She
has served for many years as Co-Director of the annual International Symposium on
Economic Crime at the University of Cambridge. Chizu is Chair of the British
Academy of Management’s Corporate Governance Special Interest Group, Visiting
Professor of Comparative Law of BPP University, Senior Associate Research Fellow of
the Institute of Advanced Legal Studies, University of London and Fellow of the
Society for Advanced Legal Studies. She specialises in corporate law and governance,
corporate social responsibility, financial services law, and the prevention and control of
financial crime and has published extensively in law and management journals. Chizu
has substantial experience in advising inter-governmental and governmental organ-
isations on various legal and management issues and serves on the governing body of
the City of London’s livery company.
Mrs Catherine Pédamon, LLB, LLM (Paris II, Pantheon-Assas); LLM (Harvard Law
School); Fulbright Scholar; Admitted to the Paris and New York Bars. Catherine is
Senior Lecturer in Law and Deputy Head of the LLM in International Commercial Law
at Westminster Law School. Before joining the University of Westminster, she taught at
BPP Law School and the University of Texas at Austin. She also practised international
corporate and financial law with Sullivan & Cromwell (New York), Gide Loyrette Noel
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 14 / Date:
9/10
JOBNAME: Rider PAGE: 23 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xxiii
(Paris) and Allen & Overy (London). She has published in the area of comparative
contract law, corporate social responsibility and arbitration, among others.
Mr John Reading SC, BBS, DipLaw (BAB); DipCrim (Sydney); BA (Hons) (Deakin);
LLM (HKU). John is currently head of Pacific Chambers in Hong Kong and an
Adjunct Professor of Law at the City University of Hong Kong. He was a public
prosecutor for over 30 years and for nine years was Deputy Director of Public
Prosecutions in Hong Kong.
He was appointed Senior Counsel in 1999, and in the 2008 Hong Kong Honours list
was awarded the Bronze Bauhinia Star. John has been a contributor to Halsbury’s Laws
of Hong Kong and has had a number of articles published in various periodicals.
Professor Barry Rider OBE, CP, LLB (Hons) (Lond); MA (Cantab); PhD (Lond);
PhD (Cantab); LLD (Hon) (UFS); LLD (Hon) (Penn State); FSALS, FRSA, FIPI,
Barrister. Barry has taught law in the University of Cambridge since 1976, when he
was elected a Fellow of Jesus College. He is currently a Fellow Commoner of Jesus
College and a Professorial Fellow in the Centre for Development Studies in the
University of Cambridge. Barry was Director of the Institute of Advanced Legal
Studies and a Professor of the University of London from 1993 to 2003 and is currently
an Honorary Senior Research Fellow. He is also a Professor of Law at BPP University;
Professor of Comparative Law at Renmin University, China and a Professor of
Mercantile Law at the University of the Free State. Barry has held and continues to
hold a number of visiting appointments including at the University of Palermo, Hong
Kong, Florida and Beijing Normal University. He is a Master of the Bench of the
Honourable Society of the Inner Temple and a Past-Master of both Witan Hall and the
Worshipful Company of Patternmakers in the City of London. Barry has also practised
law and has been counsel to a number of law firms and inter-governmental organ-
isations including the IMF, the Commonwealth and Islamic Financial Services Board.
He has also served as a specialist adviser to the Trade and Industry and Home Affairs
Select Committees of the House of Commons. Barry has also served as a public servant
and diplomatic officer to a number of inter-governmental organisations and governmen-
tal agencies and has for a number of years been head of an intelligence unit concerned
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 15 / Date:
9/10
JOBNAME: Rider PAGE: 24 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
with economic and organised crime. He holds a number of editorial positions including
being the General Editor of The Company Lawyer, Journal of Financial Crime, Journal
of Money Laundering Control and Amicus Curiae.
Ms Hillary Rosenberg, JD (Cornell). Hillary is Counsel at the law firm Lewis Baach
PLLC Kaufmann Middlemiss, the New York Office of Lewis Baach PLLC. Her
practice specialises in the area of financial crimes compliance. Hillary advises foreign
and domestic entities seeking to mitigate risk related to anti-money laundering,
anti-corruption and financial sanctions. Her practice includes developing best practices
compliance programmes for financial institutions and corporate entities. An experi-
enced trial attorney, she also represents clients in white-collar criminal, civil and
regulatory matters. Prior to joining the firm, Hillary was a Vice-President and
Compliance Director of the Global Anti-Corruption Program at JPMorgan Chase & Co.
In the public sector, Hillary served as a prosecutor in the Manhattan District Attorney’s
Office.
Ms Nadia Saleh, LLB (Hons) (Durham); Solicitor to the Supreme Court of England
and Wales. Nadia is a Senior Associate at the London office of K&L Gates LLP. She
concentrates her practice on insolvency and restructuring, working on both contentious
and non-contentious matters.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 16 / Date:
9/10
JOBNAME: Rider PAGE: 25 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xxv
Mr Mark R.C. Sutherland, LLB (Hons) (Exon); LLM (Hons) (Cantab); Barrister-at-
Law (Hong Kong). Mark is a Barrister-at-Law of the High Court of Hong Kong and is
called to the Bar at The Honourable Society of the Middle Temple. Mark’s practice
includes civil and criminal litigation. Mark served as a member of the Board of Review
constituted pursuant to the Inland Revenue Ordinance (Chapter 112 of the Laws of
Hong Kong) for nine years from 2006 to 2015. Mark is a Fellow of the Chartered
Institute of Arbitrators and a member of the Hong Kong Institute of Arbitrators and an
Accredited Mediator. Mark is a contributing editor of Hong Kong Civil Procedure or
the Hong Kong White Book. Mark is also a Fellow of the Hong Kong Institute of
Directors and a non-executive Director of Vision First, an independent non-
governmental organisation which seeks to improve the livelihood of refugees in Hong
Kong. Mark also holds a Diplôme d’Etudes en Droit Privé Français from the Université
d’Aix-Marseille in France. Mark was awarded the Henry de Bracton Law Prize for best
performance by the University of Exeter and the Thomas Warraker Scholarship by
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 17 / Date:
9/10
JOBNAME: Rider PAGE: 26 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Professor Hans Tjio, MA (Cantab); LLM (Harv); Barrister (England and Wales);
Advocate & Solicitor (Singapore). Hans is a Professor of Law at the National
University of Singapore and Co-Director for its Centre for Banking & Finance Law. He
has written and edited books on securities regulation and trust law, and is a contributor
to Palmer’s Company Law (Geoffrey Morse ed.). He was previously seconded to the
Monetary Authority of Singapore and the Ministry of Law. He is presently serving on
the Securities Industry Council, and is a consultant with Linklaters Singapore. He was
a Visiting Scholar at Stanford’s Program on International Legal Studies and Mel-
bourne’s Centre for Corporate Law and Securities Regulation.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 18 / Date:
9/10
JOBNAME: Rider PAGE: 27 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Contributors xxvii
Ms Li Hong Xing, BSc (PUMC, China); BA (Beijing University); CPSE (PRC); MBA
(ARU); FRSA. Ms Li Hong Xing is a Lecturer in Law and Programme Leader in
Chinese Business and Finance Law at BPP University. She is also a Guest Lecturer at
the University of Cambridge and a Freeman of the City of London.
She was a consultant to the law firm Beachcroft LLP in the City of London and has
also served as a consultant to the Supreme People’s Procuratorate in China. She is the
Overseas Director of the annual Cambridge Symposium on Economic Crime and
Deputy General Editor of the Journal of Financial Crime and the Journal of Money
Laundering Control. She is also a Research Director at the Centre for International
Documentation on Organised and Economic Crime (CIDOEC). She has published a
number of books, reports and articles on issues relating to financial crime and
corruption in particular.
Dr Zhen Ye, LLB (Jilin University); LLM (Lond), MPhil, PhD (Cantab). Zhen’s
academic research has focused on the law and its administration in China relating to
insider dealing and market abuse, financial and securities regulations and corruption.
She has worked for several law firms, including UK LAW, Rustem Guardian LLP,
Jungian & Gongcheng Law Firm, as well as international organisations such as the
International Association of Anti-Corruption Authorities. She has also lectured at the
University of Cambridge and at BPP University.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00a-RiderPrelims /Pg. Position: 19 / Date:
9/10
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Financial crime, which is a subset of financial abuse, can refer to any non-violent crime that
generally results in a financial loss, including financial fraud. It also includes a range of
illegal activities such as money laundering and tax evasion. Money laundering refers to
activities involving the processing of criminal proceeds to disguise their association with
criminal activities.
At the 11th UN Crime Congress, the UNODC (2005: 1) adopted a fairly protean view:
‘[E]conomic and financial crime’ refers broadly to any non-violent crime that results in a
financial loss. These crimes thus comprise a broad range of illegal activities, including fraud,
tax evasion and money-laundering. The category of ‘economic crime’ is hard to define and its
1
Michael Levi, PhD, DSc (Econ.), Professor of Criminology, Cardiff University.
Levi@Cardiff.ac.uk.
2
The major developing country with a reputation for fraud, Nigeria, calls its central agency,
established in 2004, the Economic and Financial Crimes Commission, though the difference
between ‘economic’ and ‘financial’ is not elaborated. To some extent this is semantic pedantry,
as issues of jurisdiction are often set out in legislation. It may be that ‘economic’ is seen as
wider than ‘financial’, since it might cover agricultural, industrial and service sector corruption,
scams and environmental crimes that go beyond the financial services frauds (contrary to s.419
of the Nigerian Criminal Code) for which Nigerians have long enjoyed an unenviable reputation
worldwide. The UK Treasury and Financial Services Authority had ‘financial crime’ sections,
reflecting their remit for financial services. (Though in mid-2015, the Treasury refined this into
Financial Sanctions and Anti-Money Laundering and Terrorism Finance, and the Financial
Conduct Authority has simply ‘Enforcement and market oversight’ and ‘Risk and compliance
oversight’ divisions, so ‘financial crime’ has vanished from history.) The City of London police
– the ‘lead force’ for fraud investigations in England and Wales – calls its unit the ‘Economic
Crime Department’ and the National Crime Agency – created in 2012 – places its fraud work
within the ‘Economic Crime Command’.
xxviii
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Foreword xxix
exact conceptualization remains a challenge. The task has been further complicated by rapid
advances in technology, which provide new opportunities for such crimes.
In addition to its central role in the UN Convention against Corruption and further
anti-corruption efforts, the main component in the UN’s construct of economic crime
appears to be fraud and identity-related crime (UNODC, 2011).
The growth of financial crime as a term reflects the extension of the crime control
functions of states internationally under the pressures of ‘mutual evaluation’, a key part
of which is the consequent superintending (or ‘responsibilisation’) of the private sector
against ‘crimes of globalisation’ (Favarel-Garrigues et al., 2011; Levi and Gilmore,
2002; Levi, 2010). Collectively, other terms used to package these diverse activities
include ‘threat finance’ (Levi, 2010) or ‘illicit finance’, chosen by HM Treasury in the
UK, and ‘Terrorism and Illicit Finance’, for the US Treasury.
Prior to the 21st century, to the extent that the term was used at all, ‘financial crime’
meant just fraud and, later (from the late 1980s), money laundering. Indeed, the
administrative agency created in 1990 as part of the US Treasury to process reports
from banks on large currency deposits, cross-border cash and wire transfers, and others
required under the Bank Secrecy Act 1970 and money laundering legislation, was
called the Financial Crimes Enforcement Network (FinCEN). However, its scope and
that of the criminal law and financial services/corporate regulation have been expand-
ing at frequent intervals since the 1990s. ‘Financial crime’ now includes:
1. frauds of different types with different victims (from wealthy corporates and High
Net Worth Individuals to the very poor and from very rich to very poor
governments);
2. ‘market abuse’ such as insider dealing/trading (which covers a range from corrupt
relationships between investors and insiders to giving talks about company
prospects to some important analysts before releasing results to the general
market);
3. money laundering (of all crimes, increasingly including tax fraud3);
4. financing of terrorism (mostly since 2001) and (since 2008) of Proliferation
Financing, including Weapons of Mass Destruction (WMD); and
5. transnational bribery (usually by corporates paying public officials in developing
countries, but also in their own – wealthy or poor – countries).
Some of these offences – like fraud – are longstanding, though even there, legislative
changes have been needed (as is the case with the Fraud Act 2006 in the UK, excepting
Scotland where common law currently is retained), for example to cope with
3
Though countries vary substantially in how they define ‘tax fraud’. Switzerland for
example restricts it to active deception (e.g. falsification of data in tax submissions made to it),
excluding omissions and non-reporting of tax obligations elsewhere. So if someone with a Swiss
account does not need to file tax documents in Switzerland, they cannot commit tax fraud there
and cannot normally be extradited for this. On the other hand, since 2008, there has been a great
deal of international action on mutual cooperation in tax matters and in withholding tax
arrangements, though these too are subject to sophisticated avoidance mechanisms. See de
Willebois et al. (2011), Sharman (2011) and Shaxson (2011) for good contemporary analyses.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
computer-enabled crimes. Others are new since the 1980s (such as insider dealing/
trading and money laundering); while others still typically are only a few years old or
are in a process of major adaptation (like financing of terrorism and nuclear
proliferation, and transnational bribery). In addition, offences involving Intellectual
Property can be treated as part of ‘financial crime’, if only via their role (with all other
offences) as part of the ever-extending list of ‘predicate crimes’ for money laundering
offences. Indeed, to the extent that most crimes for gain lead to concealment or
transformation of some proceeds, it is arguable that all such crimes ipso facto become
‘financial crimes’ and thereby those who facilitate them and the movement of moneys
from them are liable to increased risks of ‘criminalisation’, at least in principle. It may
be useful to regard ‘financial crime’ and its sub-sets – ‘money laundering’ and
‘corruption’ – as floating signifiers, a moral category of illicit capitalism which
contains whatever pressure group politics succeeds in placing therein. An almost
universal core component of this is the passage of criminal laws and regulatory
processes meeting evolving Financial Action Task Force (FATF) criteria. For example,
anti-money laundering legislation (AML) must now cover both tax evasion and the
financing of WMD proliferation (FATF, 2012).
Although the pressure to show evidence of harm reduction from control measures is
an especially British development, paralleled in Australia, the Netherlands, Sweden and
some other parts of the EU (and the European Commission itself), ‘crime control’ is
often a matter of expressing values rather than science (or pseudo-science) in many
parts of the globe. Even in those countries where evidence-based policing is not a
mantra, however, some performance data are called for, though countries struggle to
utilise sensibly their analytical value as proxies for effectiveness. The FATF and
FATF-style evaluations ask countries to show evidence of performance in AML by the
number of criminal laundering prosecutions. The easiest way to please the evaluators is
to prosecute more self-laundering cases and thus increase recorded ‘money laundering’
and ‘financial crimes’. Halliday et al. (2014) were rather critical of the Third Round
FATF evaluation process, likening it at times to the Tsarist Potemkin Villages in which
an appearance of compliance and formal structures were often sufficient to impress and
to get a good compliance score. It remains an open question to what extent this will
change in the more reality and outcome-focused Fourth Round using the significantly
revised FATF (2013) Methodology. What is clear is that the majority of countries have
begun already to experiment with National Risk Assessments based around this
evaluation process.
There have been few attempts to develop a coherent policy for all the disparate acts
that fall under the umbrella term ‘financial crime’, nor is there any obvious prioritisa-
tion outside acts regarded as important for ‘national security’ and the interests of
corporate capital, such as protection from (primarily Iranian) financing of nuclear
proliferation and from broader state-sponsored attacks on corporate/national infrastruc-
ture cybersecurity. The control of at least some of the offences in the five sub-
categories above has become the responsibility of national regulators of financial
services and (at least in Europe, where regulation is broader) of the professions, often
termed ‘gatekeepers’ (Gilmore, 2011). Curiously, this regulatory remit excludes most
frauds by volume, since in the UK, for example, only those committed against or by
regulated firms that achieve the undefined category of ‘significant’ are in scope, and
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Foreword xxxi
even there, nothing is known about the follow up to such reports. The criminalisation of
transnational (and sometimes national) bribery affects banks directly via risks (should
they fail to report any suspicions they may have) of money laundering charges (1)
against their own individual Money Laundering Reporting Officers (who are required
by regulators to be appointed and approved by them as part of the ‘responsibilisation
process’) and (2) perhaps against the banks themselves. It also affects banks indirectly
because of the risks (however remote in practice) that companies to whom they have
lent money might be damaged by severe penalties should they be convicted of
corruption. The implications of these developments are important. When senior staff on
the best-selling UK tabloid newspapers The Sun and the (now closed) News of the
World were arrested and accused of bribing the police and other public officials, this
created global risk for the Murdoch News International corporation in the US under the
extra-territorial provisions of the Foreign Corrupt Practices Act 1977 (FCPA) in ways
that were doubtless not envisaged by the media staff if and when they ‘bought’ the
information for the stories.
As used in different countries, ‘financial crime’ and ‘economic crime’ comprise
crimes with different categories and levels of harm, committed by and impacting upon
highly diverse sectors of the population. Their sub-components are investigated (and
investigatable) by very different policing and regulatory methodologies both before and
after ‘crime’ commission. Because of this, it is difficult to see what purposes the terms
serve except to differentiate them from street and household crime and, unintentionally
perhaps, to obfuscate which resources are being given to or withheld from investigating
particular sorts of activities. Close analysis by Gannon and Doig (2010) detailed the
unannounced drift of investigative attention in England and Wales from serious fraud to
the financial assets of general criminals within the overall rubric of ‘financial
investigation’ (though this was partly counter-balanced by the employment in the UK
of civilians, often ex-police, as financial investigators). This is paralleled with the drift
in resource in banks from fraud structures within compliance to financial crime
departments that also may deal with money laundering and sanctions. Money launder-
ing offences can arise in principle from drugs trafficking or from any crime for gain,
including all forms of fraud; terrorist financing and the financing of proliferation can
come from both licit and illicit sources, and primarily probably come from licit sources
(including, but by no means restricted to, countries like Iran that are defined as ‘rogue
states’). As a legal category, ‘laundering’ does not enable us to distinguish between
professional money launderers, people who launder money from their own crimes (like
burglars putting money into their own bank accounts in their own names), and banks
who intentionally or recklessly ignore their obligations to report suspected money
laundering or who turn a wilfully blind eye to ‘smurfing’ by customers to fall below the
$10,000 reporting threshold in the US and the €15,000 threshold in the EU, which will
fall to €10,000 under the Fourth Money Laundering Directive.4
4
To give some idea of the scale and potential consequences, in 2010, Wachovia Corp. –
which by then had merged with Wells Fargo Bank in the aftermath of the financial crisis –
agreed in a deferred prosecution agreement to pay $160 million in forfeitures and fines for
allowing the laundering of at least $110 million in drug proceeds. US federal prosecutors had
accused it of ‘willfully’ overlooking the suspicious character of more than $420 billion in
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
transactions between the bank and Mexican currency-exchange houses. Details of the agreement
are given at http://www.justice.gov/usao/fls/PressReleases/100317-02.html. The rhetoric of the
press release of this agreement is interesting. US Attorney Jeffrey H. Sloman stated, ‘On the
heels of the UBS international banking case, in which we held accountable the largest bank in
Switzerland, today we announce the deferred prosecution of Wachovia, one of the largest banks
in the United States. Wachovia’s blatant disregard for our banking laws gave international
cocaine cartels a virtual carte blanche to finance their operations by laundering at least $110
million in drug proceeds. Corporate citizens, no matter how big or powerful, must be held
accountable for their actions. Today’s historic agreement makes it clear that such conduct will
not be tolerated and imposes the largest penalty in any BSA case prosecuted to date.’ For media
reports see, inter alia, http://www.guardian.co.uk/world/2011/apr/03/us-bank-mexico-drug-
gangs?CMP=twt_fd and http://articles.latimes.com/2011/nov/27/world/la-fg-mexico-money-
laundering-banks-20111128. In December 2011, Wachovia settled a further deferred prosecution
agreement with the anti-trust division of the Department of Justice in relation to bid-rigging
scams. ‘Fortunately’, the 12 month probationary period of the failure to institute proper AML
procedures agreement had lapsed by then, or the (ex) bank would have had to be prosecuted,
with consequences that it might have to be closed, certainly after conviction. A set of other
banks – including, most famously, HSBC – were later the subject of monitorships, settlements
and Deferred Prosecution Agreements.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Foreword xxxiii
this offence against capitalist level playing field principles merited criminalisation, in
the Enterprise Act 2002, something that is still not an accepted approach in continental
Europe.5
Money laundering and insider trading were not criminal offences in Europe before
the late 20th century: again the US led the way, with the UK following, and other
countries came in their wake. The counterfeiting of Intellectual Property has become a
much more significant economic issue since the 1980s, with the rise of global brands
and the development of digital copying and mass production techniques, though some
countries have long prohibited false labelling in addition to currency counterfeiting.
However, the global criminalisation of such ‘piracy’ has been a more tentative and
controversial area, touching upon everyday activities such as file sharing that are not
seen as ‘truly criminal’, especially not by younger people.
In countries such as the UK (and indeed the EU as a whole), Regulatory Impact
Assessments have to be made when legislation is presented, and the public has to be
‘prepared’ by lobbying campaigns involving estimates of harm as well as appeals to
values. An important role is played in this struggle by data – however poorly evidence
based – about harmfulness of the activity, which gains media purchase and usually
gives an advantage to advocates of change. Thus, advocates of tough responses to
Intellectual Property violations seek to rebrand those activities as ‘copyright theft’ and
(like credit card issuers) to increase their perceived harm by associating them with
‘organised crime’ and ‘terrorist finance’. The music and film industries – as well as
heavy R & D sectors such as pharmaceuticals – have lobbied hard for the reprioritisa-
tion of such acts as ‘real crimes’, and both President Obama and UK ministers have
stressed the centrality of protecting Intellectual Property to the economic prosperity of
their countries.6 An industry and government-financed police unit has been set up
within the City of London police economic crime department. Similarly, with regard to
cybercrimes, a report by technology firm Detica, badged alongside the Office of Cyber
Security in the Cabinet Office, typically noted that its (in fact imaginatively high
guesstimated) data were at the low end of the probable range (Detica and Office of
Cyber Security and Information Assurance 2011):
In our most-likely scenario, we estimate the cost of cyber crime to the UK to be £27bn per
annum. … In all probability, and in line with our worst-case scenarios, the real impact of
cyber crime is likely to be much greater. Although our study shows that cyber crime has a
considerable impact on citizens and the Government, the main loser – at a total estimated cost
of £21bn – is UK business, which suffers from high levels of intellectual property theft and
espionage. Businesses bearing the brunt of cyber crime are providers of software and
computer services, financial services, the pharmaceutical and biotech industry, and electronic
and electrical equipment suppliers.
5
This criminalisation was encouraged by the US authorities, keen to find a route for
extradition to the US of UK residents involved in price-fixing and other business violations.
6
Though the Congressional debates in early 2012 over failed proposals in the Stop Online
Piracy Act and the PROTECT IP Act to penalise websites and Internet Service Providers that
allow Intellectual Property protected material to be downloaded revealed that the financial and
cultural power of the ‘new networked media’, combined with consumer hostility to high-priced
music and movies, could triumph over the traditional Hollywood and media pressure groups.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
The cybercrime cost data did not impress the specialist computer press, but became
‘facts-by-repetition’ via their reuse in political speeches. A later study co-authored by
this writer heavily critiqued this effort (Anderson et al., 2012), but subsequent
cyber-attacks and revelations about their sources in China and Russia (as well as in
Western countries) have illustrated that the scale of risk is very high, whatever the
disputed figures in any one year.
The heightened political profile of fraud, scandal and allegations of conflicts of
interest played a much more prominent role in influencing legislation since the 1980s
than earlier in the 20th century in the UK, though not necessarily in the US, given New
Deal responses to the Wall Street Crash of 1929 and the subsequent economic crisis.
CONCLUSIONS
In a profound early study, Aubert (1952: 263) argued that the ambiguity of white-collar
crime and its control was a stimulant to be analysed rather than to be definitionally
resolved by fiat. He added:
One main obstacle to the development of a fruitful theoretical orientation is to be found in the
tendency to treat criminal behavior, on the one hand, and the system of legal sanctions, on the
other, as two separate problems. In our opinion, crime and punishment are most fruitfully
handled as two aspects of a group process or two links in a specific type of social interaction.
Despite their growing use as terms, it is not sensible to take ‘financial crimes’ or
‘economic crimes’ as a singular category for analytical or policy purposes, and we
might be better served by breaking them up into clearer areas of criminal activity. So
what purposes does the phrase serve? ‘Financial crime’ is largely a term of political and
bureaucratic convenience. The analysis above illustrates that there are a multitude of
political and economic pressures that lead to the criminalisation of various forms of
what might be termed white-collar and organised crimes that fall under this single
label. These pressures are often reactions to national scandals or international events
(like the Global Financial Crisis), or to national/international mobilisations of non-
governmental organisations and intergovernmental bodies, including constitutionally
informal ones like the FATF. The economic imperatives of competition between nations
for business and professional elites to locate there may have to be balanced against
efforts by political elites to shore up their legitimacy, for example after corruption or
egregious tax scandals such as those involving Luxembourg in 2014. These pressures
mean that the responses to various ‘financial crimes’ differ between jurisdictions.
To conclude, both in the forms of financial crime often labelled separately as
‘organised crime’ and ‘white-collar crime’, there are many overlaps and convergences
which are reflected in their policing, sometimes by accident and sometimes by design.
But it is important to look analytically at what forms of serious crime for gain are being
targeted, by whom and using what methodologies. So far, the convergence in methods
of policing fraud and policing organised crime targets principally the drift by ‘the usual
suspects’ into fraud and Intellectual Property crimes and their tracking by police using
financial investigations, data from AML Suspicious Activity Reports and other recent
techniques of data warehousing and network analysis. These changes do not represent a
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Foreword xxxv
radical shift towards reprioritising elite frauds and Grand Corruption over ‘the usual
crimes’, but they do represent varying attempts by modern governments and policing/
regulatory institutions to manage emerging public threats to individuals, business and
government without imperilling conventional law and order issues.
Professor Barry Rider, personally, and the annual gatherings at the Economic Crime
Symposium, some fruits of which are represented in this handbook, have played an
important role in identifying and managing these profound social risks. It is a
depressing fact that the conclusions of my study of problems in fraud trials for the
Commonwealth Law Ministers Conference in 1982, arising from discussions with
Professor Rider at the earliest Economic Crime Symposia, might still be applied today,
though with additional complications from electronic and mobile phone evidence that
(like those products themselves) did not exist in 1982. One of the effects of the AML
and anti-corruption movement has been to generate far more similarity in national
legislation and mutual legal assistance than would have occurred otherwise, but the
impact of this on international asset freezing and recovery remains a work in (slow)
progress. Quo vadis? Predicting the past is far easier than predicting the future! But this
volume reflects the worthy efforts of some in the international community to grapple
with Global Bads, which it would be more realistic to see as aiming to reduce harm
than to eliminate it altogether. But first, we need to work harder on how we can judge
whether things are truly improving or getting worse, and that requires both collective
action and collective thought. This handbook represents a stage along that long road.
REFERENCES
Anderson, R., Barton, C., Bohme, R., Clayton, R., van Eeten, M. Levi, M., Moore, T. and Savage, S. (2012)
‘Measuring the cost of cybercrime’, http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf.
Aubert, V. (1952) ‘White-collar crime and social structure’, American Journal of Sociology, 58 (3):
263–271.
Detica and Office of Cyber Security and Information Assurance (2011) The Cost of Cyber Crime: A Detica
and Cabinet Office Report in Partnership with the Office of Cyber Security and Information Assurance in
the Cabinet Office, http://www.baesystemsDetica and Cabinet Office.com/uploads/resources/THE_
COST_OF_CYBER_CRIME_SUMMARY_FINAL_14_February_2011.pdf.
FATF (2012) International Standards on Combating Money Laundering and the Financing of Terrorism and
Proliferation: The FATF Recommendations, Paris: Financial Action Task Force.
FATF (2013) Methodology for Assessing Compliance with the FATF Recommendations and the Effect-
iveness of AML/CTF Systems, Paris: Financial Action Task Force.
Favarel-Garrigues, G., Godefroy, T. and Lascoumes, P. (2011) ‘Reluctant partners? Banks in the fight
against money laundering and terrorism financing in France’, Security Dialogue, 42 (2): 179–196.
Gannon, R. and Doig, A. (2010) ‘Ducking the answer? Fraud strategies and police resources’, Policing and
Society, 20 (1): 39–60.
Gilmore, B. (2011) Dirty Money, Strasbourg: Council of Europe Press.
Halliday, T., Levi, M. and Reuter, P. (2014) Global Surveillance of Dirty Money: Assessing Assessments of
Regimes to Control Money-Laundering and Combat the Financing of Terrorism, Chicago: American Bar
Foundation, http://www.lexglobal.org/files/Report_Global%20Surveillance%20of%20Dirty%20Money%
201.30.2014.pdf.
IMF (2001) Financial System Abuse, Financial Crime and Money Laundering – Background Paper,
Washington DC: International Monetary Fund.
Karstedt, S. (2012) ‘Globalization and crime’, in G. Ritzer (ed.), Wiley-Blackwell Encyclopedia of
Globalization, Oxford: Wiley-Blackwell.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00dlevrev00c-MichaelLeviPreface /Pg. Posi-
tion: 9 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Introduction
Barry Rider
The academy has been slow, if not reluctant, to recognise the importance of studies
related to the commission and consequences of economically motivated crime. Of
course, the significance of misconduct in regard to economic activity has long been
recognised by those concerned with promoting prosperity and stability. Some of the
earliest legal systems have rules that relate to conduct which today we might
characterise as economic crime. Bribery is often condemned in early legal systems, and
as soon as markets develop we find examples of laws designed to ensure the proper
flow of goods to market and that other manipulative practices are forbidden. However,
there has always been a potentially difficult relationship between the laudable wish to
see business and trade expand, driven by the desire for profit, and the distaste of
unmitigated greed. It has taken societies a very long time to resolve the boundaries of
what is acceptable and what might damage the longer term public interest. We also find
a tension in some cases between the proper role of law in curbing conduct which is
regarded as so damaging that the public interest justifies the use of the mechanisms of
the criminal justice system and other situations, where there is proper concern for the
expectations of those engaged in the relevant transaction. A good example of this is the
attitude of English law to what we would today have little difficulty in stigmatising as
the abuse of insider dealing.
The use for one’s own or another’s advancement of information obtained in
privileged circumstances is not always condemned. Indeed, there are arguments that
those who have a responsibility to protect the economic interests of another, such as a
trustee, should not allow their possession of such information to operate to the
detriment of those whose interests they are required to advance. None the less, for
reasons largely associated with the need, in the public interest, to promote and maintain
confidence in the integrity and, thus, the fairness of financial markets, insider dealing
has been a specific and serious criminal offence in the UK since 1980. However, in the
civil law the mere fact that one party to a transaction has superior knowledge, even if
this is improperly obtained, does not necessarily have implications for the transaction
in hand. Hence, the reluctance in most common law systems to accord the ‘victim’ of
insider dealing a remedy. Indeed, it may be argued that in the context of a market
transaction the ‘innocent’ party was a willing trader at the relevant market price and, if
we are looking for victims, it is really the market itself or the person – usually a
company – that ‘owned’ the relevant information or at least had the right to expect that
it would not be misused. Perhaps, given the complexities of law, it is understandable
that the main criminologists, economists and social and business scientists have tended
to steer clear from such issues.
The study of a body of law relating to economically motivated misconduct has still
to be recognised as a discrete subject area by the academy. The fact that it involves a
xxxvii
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00e-BarryRiderIntroduction /Pg. Position: 1
/ Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
mix of civil and criminal law, with an ever increasing contribution from regulatory law
and practice, has not helped within the context of traditional law schools. This is sadly
illustrated by the surprisingly small number of academicians that attend the annual
symposium on economic crime in Cambridge, which to some extent is the inspiration
for this book. The symposium, now in its thirty-third year, attracts well over 1,600
specialists from around the world. As we have already hinted, given the topic is seen as
a difficult one for traditional lawyers, with very few exceptions the criminologists have
fought shy of it. Indeed, a few years ago one of the world’s leading institutes in
Cambridge went on record as saying that it was not interested in economic crime as a
topic for research and development. Even more surprisingly, given the implications that
attempts to control financial misconduct have in terms of legal, regulatory and
reputation risk for those who run businesses, the business schools have also been most
diffident in regarding economic crime as a subject worthy of their attention. Given the
impact that, in particular, regulatory sanctions have had on financial institutions, this is
indefensible. None the less, those that do attempt to consider from an intellectual
standpoint the various issues relating to the incidence, prevention and control of
economically motivated crime, and especially financial crime, are few in number
seemingly in every jurisdiction.
This is not to say that those who practise law, accountancy and compliance, or who
are more directly involved in enforcement and/or supervision, cannot and do not make
a very real contribution to the discussion and study of these issues. Indeed, it is
arguable that their contribution is all the more significant because it is based on real
experience and incorporates practical relevance. Hence, it should not surprise those
who open the covers of this work to find that almost every contributor, no matter what
their academic credentials might indicate, are or have been privileged to work in the
real world. It is the hope of many of us that bringing together what some might
consider an eclectic collection of material will further stimulate thought and perhaps
aid those who wish to spend more time on the intellectual analysis and development of
this topic. Whether the academy will welcome this remains to be seen! What is
increasingly clear is that those who make, develop and implement policy relating to
these issues will welcome more thought and discussion, and perhaps even constructive
criticism.
This work is not about economic crime as such, but rather a sub-category, namely
financial crime. In practice, little hangs on definition, possibly apart from designing
university courses and the order of material in books such as the present. It is
reasonably accurate to say that all financial crimes are economic crimes in so far as
they will be motivated by the prospect of economic advantage, but not all economic
crimes could sensibly be described as financial crimes. It is always possible to find the
exception – the computer hacker who violates a computer simply as a game, or the
employee who destroys the value of proprietary information out of vengeance – but by
and large most financial crimes will be committed to gain or protect an economic
advantage. This is so even in the case of terrorist related finance. In the context of this
work on financial crime, in a rather inexact manner, we attempt to refer to those
economically motivated abuses and crimes which occur primarily in a financial setting.
Of course, in placing such activity in its usual context, and in particular when
considering its control and interdiction, then it is often that we return, inevitably, to a
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00e-BarryRiderIntroduction /Pg. Position: 2
/ Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Introduction xxxix
wider view. Therefore, we make no apology for the fact that a proportion of this work
would be equally at home in a collection of material devoted to the discussion of
economic crime.
We have attempted to be as catholic as possible in the range of offences and forms of
misconduct that we discuss and to do this as widely as possible in terms of different
legal systems and traditions. Economic crime does impact on the security and stability
of all states, but its implications can, in different ways, be more serious for developing,
transition and especially small states. Therefore, we have included material which
relates to developmental issues and, in particular, to vulnerable states. We have also
placed emphasis on financial crimes that are essentially facilitative of other criminal
conduct. Corruption is not an end in itself. Officials are bribed to advance an illicit or
improper interest. Those who engage in money laundering do so to hide the proceeds of
other crime or facilitate the continuation of a criminal enterprise. These facilitative
financial crimes are treated in some depth and breadth given their practical significance
in terms of risk and control.
Mention has already been made of the role played in fighting misconduct through
regulatory intervention by non-traditional law enforcement agencies and, in particular,
financial regulators. Possibly, this aspect to the control of financial crime has the
highest profile given the dramatic fines and penalties that are being imposed by
regulators, especially in the USA and UK, for misconduct in relation to the observance
of economic sanctions and failures in their compliance systems on banks and other
financial institutions. However, the use of essentially injunctive civil enforcement
actions against those engaged in other forms of financial crime and fraud has a long
history in the USA and has proved to be relatively effective. We consider the use of
civil enforcement, particularly in the context of issues such as market abuse, not only as
an alternative to traditional law enforcement action, but also in aid of it. For similar
reasons, we also include material relevant to the role of the civil law in cases of fraud
and other types of misconduct where a compensatory or restitution remedy is
appropriate. Too many discussions relating to the control of fraud and financial crime
fail to give proper attention to the significance of both civil enforcement and civil
liability. In terms of risk exposure, those running financial institutions are more likely
to be concerned about these issues than about the often-unlikely prospect of a criminal
prosecution. For similar reasons, we also include a significant amount of material on
governance, compliance and audit. Systems designed to prevent financial crime, or at
least minimise its consequences, are of perhaps even greater importance than attempt-
ing to shut the stable door after the horse has bolted.
In advising on the selection of material for this book, I would like to express
appreciation to Mr Saul Froomkin OBE, QC, Sir Kenneth Warren and Dr Ye Feng. Saul
is a former Director of Criminal Law of Canada and Attorney General of Bermuda and,
perhaps for our present purposes, more importantly, the chairman of the annual
Cambridge symposium on economic crime for 32 of the last 33 years. Sir Kenneth
Warren, as one of the most influential chairmen of the House of Common’s Select
Committee on Trade and Industry, focused on a number of issues relating to the dark
side of business and the City and in the deliberations of his committee raised, often for
the first time, many of the issues addressed in this work. Dr Ye Feng was until very
recently Director General of the Supreme Peoples Procuratorate of China and Secretary
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00e-BarryRiderIntroduction /Pg. Position: 3
/ Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00e-BarryRiderIntroduction /Pg. Position: 4
/ Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Table of cases
NATIONAL CASES
Australia
xli
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 1 / Date: 9/10
JOBNAME: Rider PAGE: 2 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Canada
Cayman Islands
China
Argor........................................................................................................................................ 676–7
France
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 2 / Date: 9/10
JOBNAME: Rider PAGE: 3 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Hong Kong
Ireland
Netherlands
New Zealand
Nigeria
Rwanda
Singapore
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 3 / Date: 9/10
JOBNAME: Rider PAGE: 4 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
South Africa
UK
A v C............................................................................................................................................ 707
Aberdeen Ry v Blaikie................................................................................................................. 187
Abou Rahmah v Abacha.............................................................................................................. 329
Aerostar Maintenance International Ltd v Wilson ............................................................. 328, 334
AG for Hong Kong v Reid .................................................................................................... 96, 736
Agip v Jackson .................................................................................................................... 318, 742
AIB Group (UK) v Mark Redler & Co ....................................................................................... 332
Re Amaron ................................................................................................................................... 725
American Cyanamid............................................................................................................ 705, 710
Angus v United Kingdom Border Agency................................................................................... 481
Anton Piller KG v Manufacturing Processes ............................................................................. 710
Antonio Gramsci and Alliance Bank JSC v Lembergs............................................................... 104
Armitage v Brewere and Knott.................................................................................................... 614
Armstrong DLW v Winnington Networks.................................................................................... 741
Armstrong v Strain ...................................................................................................................... 354
Arthur v Att-Gen Turks & Caicos ............................................................................................... 334
Attorney General for Hong Kong v Reid............................................................................ 736, 741
Re Austinsuite Furniture Ltd....................................................................................................... 720
Aveling Barford Ltd v Period Ltd ............................................................................................... 107
Aylesford (Earl of) v Morris ......................................................................................................... 23
Bairstow v Queen’s Moat House ................................................................................................ 331
Baker v The Queen...................................................................................................................... 335
Bank of Credit and Commerce International (Overseas) Ltd v Akindele.......................... 334, 335
Bank Mellat v HM Treasury........................................................................................................ 603
Bank of Scotland v A................................................................................................................... 741
Banque Financiere v Westgate Insurance ................................................................................... 317
Re Barings ................................................................................................................................... 720
Barlow Clowes International Ltd (In Liquidation) v Vaughan .................................................. 320
Barlowe Clowes International Ltd v Eurotrust International Ltd ............................. 328, 333, 334
Bartlett v Barclays Bank Trust Co (No 2) .................................................................................. 332
Re Bath Glass Ltd ....................................................................................................................... 721
Bayer AG v Winter ...................................................................................................................... 710
BCCI v Akindele............................................................................................................................ 91
Bishop of Winchester v Knight.................................................................................................... 181
Bisset v Wilkinson........................................................................................................................ 316
Re Blackspur Group .................................................................................................................... 723
BNY Corporate Trustee Services Ltd v Eurosail-UK ........................................................... 109–10
Boscawen v Baywa...................................................................................................................... 319
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 4 / Date: 9/10
JOBNAME: Rider PAGE: 5 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 5 / Date: 9/10
JOBNAME: Rider PAGE: 6 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Re Finelist Ltd, Secretary of State for Trade and Industry v Swan ........................................... 719
Finers v Miro............................................................................................................................... 742
Fiona Trust and Holding Corp v Privalov ................................................................................. 333
Fomento (Sterling Area) Ltd v Selsdon Fountain Pen Co. Ltd................................................... 614
Foskett v McKeown ..................................................................................................................... 336
Fourie v Le Roux ......................................................................................................................... 705
Franses v Somar Al Assad .......................................................................................................... 707
Re Funtime .................................................................................................................................. 721
Gale v SOCA....................................................................................................................... 465, 537
Re Gibson Davies........................................................................................................................ 725
Goldtrail Travel Ltd v Aydin ....................................................................................................... 333
Gomes v Republic of Trinidad and Tobago ................................................................................ 649
Gorunova v Berezovsky............................................................................................................... 706
Gray v Smith................................................................................................................................ 334
Re Grayan Building Services...................................................................................... 718, 719, 721
Haiti v Duvalier .......................................................................................................................... 713
Halifax v Chandler...................................................................................................................... 707
Re Halt Garages.......................................................................................................................... 107
Harkins and Edwards v UK ........................................................................................................ 652
Hedley Byrne & Co Ltd v Heller & Partners Ltd ...................................................................... 317
Re Hennelly’s Utilities ................................................................................................................ 725
Her Majesty’s Commissioners of Customs and Excise v Barclays Bank................................... 709
Her Majesty’s Treasury v Mohammed Jabar Ahmed ................................................................. 540
HH v The Deputy Prosecutor...................................................................................................... 653
HIH Casualty & General Insurance Ltd v Chase Manhattan Bank.......................................... 354
Hilali v Central Court of Criminal Proceedings Number 5....................................................... 649
Hill v Secretary of State for the Environment, Food and Rural Affairs..................................... 724
Hornal v Neuberger Products Ltd .............................................................................................. 316
Howard Marine and Dredging v A Ogden & Sons (Excavations)............................................. 317
Ibori ........................................................................................................ 449, 451–2, 454, 455, 460
Industrial Development Consultants v Cooley ........................................................................... 330
Iraqi Ministry of Defence v Arcepey Shipping ........................................................................... 330
IRC v Duke of Westminster ........................................................................................................... 97
JD Wetherspoon v Van de Berg & Co Ltd .................................................................................. 316
Jennings v Crown Prosecution Service ........................................................................ 118–19, 120
JJ Harrison (Properties) Ltd v Harrison.................................................................................... 318
JSC BTA Bank v Ablyazov .................................................................................................. 709, 710
Jubilee Cotton Mills Ltd v Lewis ................................................................................................ 329
K Ltd v National Westminster Bank.................................................................................... 492, 516
Kadi v Council ............................................................................................................................ 540
Kakis v Government of the Republic of Cyprus ......................................................................... 649
Kay Review of UK Equity Markets ............................................................................................. 111
Keech v Sandford .................................................................................................. 180–81, 182, 185
Kelly v Cooper............................................................................................................................. 329
Re Kingston Cotton Mill Co. (No.2)........................................................................................... 614
Knowles v Government of USA .......................................................................................... 647, 649
Leeds Estate Building and Investment Company v Shepherd .............................................. 613–14
Lennard’s Carrying Co Ltd v Asiatic Petroleum Co Ltd ................................................... 195, 202
Re Linvale Ltd ............................................................................................................................. 720
Lloyd and Cheyham v Littlejohn................................................................................................. 615
Re Lo-Line Electric Motors Ltd.................................................................................................. 718
Lock International plc v Beswick................................................................................................ 710
Re London and General Bank (No.2) ......................................................................................... 614
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 6 / Date: 9/10
JOBNAME: Rider PAGE: 7 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
London Oil Storage Co. Ltd v Sear Hasluck & Co.................................................................... 614
Lonrho v Al Fayed (No 2) ........................................................................................................... 317
MacDonald v Polaine & Hill Publishing ............................................................................. 316–17
McKinnon v Secretary of State for the Home Department ........................................................ 652
Mareva Compania Naviera v International Bulk Carriers........................................ 330, 705, 709
Re Melcast (Wolverhampton) Ltd ............................................................................................... 720
Memory Corporation v Sidhu ..................................................................................................... 707
Meridian Global Funds Management Asia v Securities Commission ....................................... 748
Re Migration Services Ltd .......................................................................................................... 720
Mobil v Petroleos de Venezuela .......................................................................................... 712, 713
Re Montagu’s Settlement Trusts.................................................................................................. 318
Re Morija .................................................................................................................................... 725
Motorola Credit Corporation v Uzan ......................................................................................... 713
Mutual Life v Rank...................................................................................................................... 187
National Crime Agency v Amir Azam (No. 2) ...................................................................... 459–61
National Enterprises Ltd v Racal Communications Ltd ............................................................ 335
Nationwide BS v Balmer Radmore (No 3).................................................................................. 332
Nestle v National Westminster Bank ........................................................................................... 332
New Bridge Holdings & Enjien Ltd v Barclays Bank................................................................ 492
Nocton v Lord Ashburton ............................................................................................................ 329
Norris v USA (No.2).................................................................................................................... 653
Norwich Pharmacal Co v Customs and Excise Commissioners................................................ 704
Novoship (UK) Ltd v Nikitin............................................................................................... 333, 334
Nugent v Nugent.......................................................................................................................... 329
O’Donnell v Shanahan................................................................................................................ 187
Oliver v Court ......................................................................................................................... 181–2
Osman v UK ................................................................................................................................ 652
Othman v UK .............................................................................................................................. 653
Otkritie International Investment Management Ltd v Urumov .......................................... 333, 334
Re Overnight Ltd......................................................................................................................... 207
Re Pantmaenog Timber Co Ltd........................................................................................... 717, 718
Paragon Finance plc v DB Thakerar & Co................................................................................ 318
Parsons v The Queen................................................................................................................... 373
Parvalorem v Oliveira ................................................................................................................. 708
Pasley v Freeman ...................................................................................................... 24, 25, 28, 316
Plazoo Pipe Systems ................................................................................................................... 721
Prest v Petrodel Resources Ltd ....................................................................................... 104–5, 112
Re Prestige Grindings Ltd, Sharma v Yardley ............................................................................ 724
Progress Property Company Limited v Moorgarth Group Limited ........................................... 107
R (Bagdanavicius) v Secretary of State for the Home Department ........................................... 652
R (Ramda) v Secretary of State for the Home Department ....................................................... 653
R (Ullah) v Special Adjudicator ................................................................................................. 652
R v Adams.................................................................................................................................... 581
R v Allen ...................................................................................................................................... 719
R v Allsop .................................................................................................................................... 324
R v Anderson (Malcolm John) .................................................................................................... 390
R v Angela Pennock, Richard John Pennock .............................................................................. 323
R v Anwoir................................................................................................................................... 480
R v Banks..................................................................................................................................... 466
R v Basra..................................................................................................................................... 124
R v Bennet Co (Pty) Ltd.............................................................................................................. 199
R v Briggs-Price.......................................................................................................................... 465
R v Brockley................................................................................................................................. 724
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 7 / Date: 9/10
JOBNAME: Rider PAGE: 8 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
R v Caywood ................................................................................................................................. 38
R v Clarke.................................................................................................................................... 719
R v Clowes................................................................................................................................... 328
R v Cohen .................................................................................................................................... 558
R v Corbett .................................................................................................................................. 327
R v Directorof the SFO ex parte Smith....................................................................................... 557
R v DPP ex parte Hallas ............................................................................................................ 322
R v Farooqi.................................................................................................................................. 573
R v Francis Hurell....................................................................................................................... 390
R v George, Crawley and Others (BA case)....................................................................... 576, 578
R v Ghosh ............................................................................................... 15, 27, 323, 324, 328, 556
R v Grantham .............................................................................................................................. 207
R v Harvey (Jack)........................................................................................................................ 451
R v HM Treasury and Other Actions .......................................................................................... 540
R v Horseferry Road Magistrates Court ex parte Bennett......................................................... 665
R v Innospec........................................................................................................................ 451, 750
R v Jatvinder Singh ..................................................................................................................... 467
R v Keane .................................................................................................................................... 557
R v Latif and Shahzad................................................................................................................. 578
R v Lees & Birch......................................................................................................................... 208
R v M ........................................................................................................................................... 656
R v Mackle (Patrick) ............................................................................................................. 119–20
R v McQuoid ......................................................................................................................... 29, 251
R v Martinez-Tobon..................................................................................................................... 122
R v May (Raymond George) ............................................................................................... 118, 120
R v Moses and Ansbro ................................................................................................................ 323
R v O’Brien ............................................................................................................................. 653–7
R v Olivier ................................................................................................................................... 578
R v Osei Gertrude ....................................................................................................................... 120
R v Pamela Jane Moss ................................................................................................................ 323
R v Patel (Munir Yakub).............................................................................................................. 389
R v Pear ......................................................................................................................................... 26
R v Preddy........................................................................................................................... 373, 680
R v Rice ....................................................................................................................................... 575
R v Rigby and Bailey................................................................................................................... 323
R v Rollins ................................................................................................................................... 251
R v Ruth Louise Turner ............................................................................................................... 323
R v Sale (Peter) ........................................................................................................................... 451
R v Seager ................................................................................................................................... 724
R v Seddon................................................................................................................................... 654
R v Shama ................................................................................................................................... 324
R v Smith (David Cadman)......................................................................................................... 481
R v Steed.................................................................................................................................. 466–7
R v Thompson.............................................................................................................................. 373
R v Vincent Clipston.................................................................................................................... 656
R v Waya (Terry) ......................................................................................................... 119, 455, 535
R v Xu (David Kai) ..................................................................................................................... 451
R v Zinga ..................................................................................................................................... 456
Rapisarda v Colladon ................................................................................................................. 347
Regal (Hastings) Ltd v Gulliver.......................................................................................... 329, 741
Relfo Ltd v Varsani.............................................................................................................. 335, 336
Rosen v Rosen ............................................................................................................................. 706
Roswell v Vaughan ........................................................................................................................ 24
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 8 / Date: 9/10
JOBNAME: Rider PAGE: 9 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 9 / Date: 9/10
JOBNAME: Rider PAGE: 10 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
US
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 10 / Date: 9/10
JOBNAME: Rider PAGE: 11 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
Table of cases li
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 11 / Date: 9/10
JOBNAME: Rider PAGE: 12 SESS: 2 OUTPUT: Wed Oct 14 15:09:05 2015
US v O’Hagan............................................................................................................................. 252
US v Olis ..................................................................................................................................... 258
US v One Assortment of 89 Firearms................................................................................. 499, 536
US v Rajaratnam ............................................................................................ 256–7, 258, 284, 560
US v Reicher................................................................................................................................ 132
US v Rivera ................................................................................................................................. 459
US v Rutkoske.............................................................................................................................. 258
US v Santos ................................................................................................................................. 538
US v Shafer ................................................................................................................................. 480
US v Smith Grading & Paving.................................................................................................... 138
US v Society of Independent Gasoline Marketers of America ................................................... 138
US v Souffrant ............................................................................................................................. 480
US v Taylor.................................................................................................................................. 480
US v Union Bank of Jordan ....................................................................... 543, 545, 546, 547, 548
US v Ursery......................................................................................................................... 497, 536
US v US Gypsum Co.......................................................................... 131, 132, 138, 139, 142, 143
US v Vampire Nation................................................................................................................... 498
Verizon Communications v Law Offices of Curtis Trinko LLP (“Trinko”) ............................... 140
Wal-Mart Stores v Dukes ............................................................................................................ 605
In re Walt Disney Co. Derivative Litigation ......................................................................... 189–90
Weinberger v UOP .............................................................................................................. 187, 188
Wendt v Fischer ........................................................................................................................... 183
Whitney Nat’l Bank v Karam ...................................................................................................... 509
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 00f-ToC /Pg. Position: 12 / Date: 9/10
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
PART I
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Economic crime is a relatively loose term, covering a wide variety of phenomena. All
property crime and acquisitive crime is economic crime in the sense that it is crime
aimed at making the perpetrator wealthier, but robbery and burglary are not normally
included in the concept. Barry Rider’s overview of 1988 reviews the problems in a way
that could be republished today with very little change.1 Looking at contemporary
practitioners, the Economic Crime Command of the National Crime Agency include
fraud, intellectual property crime, identity theft and counterfeit currency in their remit.2
But a list does not amount to a definition. The City of London Economic Crime
Directorate, policing lead for fraud investigation in the UK, has fraud teams that target
boiler room frauds, mortgage fraud, insider and illegal trading, ticketing fraud and
identity crimes.3 The Federal Bureau of Investigation (FBI) white collar crime website
pulls no punches in defining white collar crime as “Lying, cheating and stealing”.4 It
goes on to say, more calmly, that “the term is now applied to the full range of frauds
committed by business and government professionals”. The list of crimes that follow,
however, widens the focus beyond this group. The Swedish Economic Crime Authority
concentrates on accounting crime, tax crime, bankruptcy related crime, crime under the
Swedish Companies Act, market abuse crime and crime against the EU’s financial
interests.5 In Sweden, fraud is dealt with by the police and corruption by the National
Anti-Corruption Unit.6 So economic crime means different things to different investi-
gators. The remit of the Guardia di Finanza in Italy, for example, includes smuggling,
as did the remit of the UK Customs until recent reforms. These transferred some
powers and personnel to the Border Agency, which has now been abolished and
replaced by the Border Force, which presumably deals with smuggling, with the
1
Barry AK Rider “Policing the City – Combating Fraud and Other Abuses in the Corporate
Securities Industry” Current Legal Problems 1988 Vol 41 pp47–68 pp48–53 passim.
2
National Crime Agency website http://www.nationalcrimeagency.gov.uk/about-us/what-
we-do/economic-crime accessed 2nd December 2014.
3
City of London Police website https://www.cityoflondon.police.uk/advice-and-support/
fraud-and-economic-crime/fraudsquads/Pages/Fraud-teams.aspx accessed 2nd December 2014.
4
FBI website http://www.fbi.gov/about-us/investigate/white_collar/whitecollarcrime accessed
2nd December 2014.
5
Swedish Economic Crimes Authority website http://www.ekobrottsmyndigheten.se/en/our-
work/ accessed 2nd December 2014.
6
Ibid.
3
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
exception of people, and the Immigration Service. Other powers have been transferred
to the Serious and Organised Crime Agency, now the National Crime Agency.
“Financial crime”, “white collar crime”, “corporate crime”, “crimes of the powerful”,
“smuggling” and even “organised crime” are all concepts associated with economic
crime. Crime against the economy itself – crime against the market and against a level
playing field – is almost the ultimate crime in the neo-liberal playbook, but there is a
contradiction in this approach as equally it should be impossible for there to be crime
in a perfectly working market, so crime is a sign that states are impeding those perfect
workings rather than that the offender is doing anything wrong. Unless, of course, a
perfect market is an abstract concept, unobtainable in the real world.
The “USLegal” website defines economic crime as “illegal acts committed by an
individual or group of individuals to obtain a financial or professional advantage”.7
This definition includes robbery, making it so broad as to make the term useless. We
might as well fall back on the distinction between crimes against property and crimes
against the person. If the concept is to be operationalisable, it needs to be narrower.
Chizu Nakajima has reviewed international perspectives on financial crime and found
no clear agreed definition of the concept.8
Edwin Sutherland first used the term “white-collar crime” in a speech in 1939. He
returned to it in a monograph in 1949, defining it as “crime committed by a person of
high status and respectability in the course of his [sic] occupation”.9 The original text
was censored because corporations threatened to sue, and all reference to individual
corporations by name was removed by the publishers. The full text was only published
in 1983. The concept was expanded by other academics to imply a separate category of
crime to “blue-collar crime”, crime being traditionally seen as the preserve of the
“dangerous classes” and involving violence or the threat of violence. Sutherland
intended to point out that just as much crime was being committed by the well-to-do
and that even when caught they were unlikely to suffer imprisonment as the blue collar
criminal would. The definition has slipped over time to “financially motivated
non-violent crime committed by business and government professionals”. “Crimes of
the powerful” has become an alternative concept. David Nelkin provides the definitive
contemporary review of the concept in the Oxford Handbook and releases this author to
discuss individual issues in order to set the scene for the present volume.10
Hazel Croall has looked at white collar crime in a comparative context.11 She argues
that we can define by type of crime, by type of offender, by place of offences, or we
7
USLegal website http://definitions.uslegal.com/e/economic-crime%20/ accessed 2nd Decem-
ber 2014.
8
Chizu Nakajima “Editorial: Issues in Fighting Financial Crime” IEA Economic Affairs
March 2007 http://www.iea.org.uk/sites/default/files/publications/files/upldeconomicAffairs331
pdf.pdf accessed 2nd December 2014.
9
Edwin H Sutherland White Collar Crime Holt Reinhart & Winston, New York 1949.
10
David Nelken “White-Collar and Corporate Crime” Chapter 21 in Mike Maguire, Rod
Morgan and Robert Reiner The Oxford Handbook of Criminology 5th edition Oxford University
Press, Oxford 2012 pp623–659.
11
Hazel Croall “Transnational White Collar Crime” Chapter 10 in James Sheptycki and Ali
Wardak Transnational and Comparative Criminology Glasshouse Press, London 2005 pp227–
246.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
can characterise it by ambiguous criminal status, low rates of prosecution and lenient
punishment, but if we do, is it really crime? Croall also looks at white collar crime in
the global context. She argues that there is a great deal of “harm” done by businesses,
but that often this harm is neither technically nor legally a crime. It is easy for high
status individuals and organisations to avoid prosecution. “Too big to fail”, “in the
national interest” and “if the President does it, it can’t be wrong” are three phrases that
have been used by high status individuals in the past as a defence of their actions.
These issues will be further discussed in the sections that follow.
Following Croall, this chapter is structured by looking first at the types of crime
listed under the headings “white collar crime”, “economic crime” and/or “financial
crime”. It does this because there is no clear agreement on definitions of these
concepts, and there is even disagreement as to what concepts to include. It then adds a
category “types of victim” in order to introduce a discussion of the ambiguity of
criminal status and the consequences for deterrence and rational choice, partly because
of the way these have been raised in Sittlington’s PhD thesis, which discusses whether
anti-money laundering legislation works, but has implications for policies against
economic crime more generally.12 Finally, the chapter discusses types of offender.
Robbery and Burglary are definitely not white collar crimes, but possibly economic
crimes. These are classic blue collar crime activities, but more complex in motivation in
contemporary society. There are offenders who aim at short-term gain, stealing other
people’s property to fund a lifestyle of hedonism, particularly at the weekend. There are
more sophisticated “professional” criminals, who hold onto their “ill-gotten gains” to
avoid detection and who are now vulnerable to the more recent approach of investiga-
tors who search out their assets and demand that they prove their provenance.
Theft from domestic premises transferred to theft from vehicles as stereos, GPS
systems and other high-tech goods became part of motoring. Insurance companies
began to develop ways to make this more difficult along with making the theft of the
car itself harder. The response from offenders has been to develop a number of frauds:
making agreements with the car owner to steal the car for a fee, after which a new car
would be claimed on the insurance. More recently, claims for “whiplash” injuries have
been organised. The move is a classic transfer from blue collar to white collar crime,
but the perpetrators remain classically blue collar in background. There is also
organised trade in luxury vehicles, with the stolen car being taken out of the country
before it is even reported missing. As the divide between blue and white collar in the
classic sense is blurring, there remains a more relevant divide between opportunistic
and more organised crime.
12
Samuel Sittlington “What Are the Factors that Influence the Effectiveness of Anti-Money
Laundering Policy Implementation in the UK: Exploring Money Laundering Crime and Policy”
Unpublished PhD thesis, University of Northumbria 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Smuggling
This involves the transportation of commodities or people across borders illegally, the
people or commodities concerned either being excluded from entry, such as drugs or
immigrants without visas, or the commodity carrying an excise duty which the
smuggler intends to evade. As Kipling put it:
Duty evasion was historically the reason for smuggling, but drugs and people have
become more profitable in recent years.The previous section, though, suggests that
smuggling out of a country is becoming as important as smuggling in. Stealing
something and moving it abroad can make detection and prosecution more difficult.
Fraud
The UK Serious Fraud Office (SFO) defines fraud as “abuse of position or false
representation, or prejudicing someone’s rights for personal gain”.14 Fraudsters operate
through all the communications media: the telephone, snail mail, email, social
networking sites; anywhere they can communicate with people. They still use doorstep
tactics, as well as places where people meet, such as bars and clubs. Growth in recent
years has been in the area known as cybercrime. A high proportion of cybercrime is
traditional fraud taking advantage of the communication possibilities offered by the
internet.
The SFO website offers a “taxonomy of fraud”.15 This distinguishes seven types of
fraud, or, more correctly, seven arenas where fraud occurs: individuals, corporate,
charities and non-profit, market abuse, fiscal, public sector and supporting activities. It
subdivides individual fraud into advance fee payments, investment frauds, non-
investment and abuse of position of trust. It lists 14 different types of advance fee
fraud, including the infamous “419” scams originating in West Africa, illustrating the
cross-border nature of contemporary fraud.
This chapter is not the place to go through all the different types of fraud listed by
the SFO. A similar list can be found on the FBI site, although not so artistically
presented.16 Fraud as a category has expanded to be almost synonymous with economic
crime. Investigative units are simply listing their areas of responsibility and struggling
with how to subdivide them. There is a high degree of overlap between perpetrators and
a need for more appropriate definitions of separate phenomena, so that appropriate
legal and investigative frameworks can be put in place. Concepts are being stretched
13
Rudyard Kipling “A Smugglers Song” in Puck of Pook’s Hill http://www.kiplingsociety.
co.uk/poems_smuggler.htm accessed 3rd December 2014.
14
Serious Fraud Office website http://www.sfo.gov.uk/fraud/what-is-fraud.aspx accessed 3rd
December 2014.
15
http://www.sfo.gov.uk/taxonomy.swf accessed 2nd December 2014.
16
http://www.fbi.gov/scams-safety/fraud accessed 2nd December 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
beyond the point of utility. This is, unfortunately, not unusual in criminology, where the
media, self-proclaimed experts and law enforcement all seek to broaden definitions for
their own purposes.
As an example, a quick examination of the taxonomy diagram will discover that
corruption is hidden under the category of “supporting activities”. This may reflect a
UK failure to engage with corruption on the basis that it isn’t a problem for the UK,
which may have a Bribery Act, but has not engaged legislatively with corruption in all
its forms.
The SFO taxonomy raises an interesting aside: more attention is given to the
professional criminal frauds than to the white collar frauds. If a financial value were to
be allocated to each category, the market frauds, market-fixing, insider trading, bribery
to obtain overseas contracts and probably even procurement fraud would almost
certainly be much more profitable than the 14 advance fee frauds and much more
damaging to the economy. Not much has changed since Sutherland’s day.
Corruption
The majority of this subsection originates from a piece on corruption by the present
author, starting from the idea that corruption can be summed up as the abuse of public
position for personal gain.17 As with white collar crime in general, the people involved
may be powerful, the offences they commit are poorly defined in law, they do not
consider what they are doing to be illegal and their “crimes” are often considered
“victimless”. When they are brought to court, prosecution frequently fails because of
the complexity of the cases and the judicial process. The offenders may have good
financial resources and so can retain effective defence lawyers.18
Corruption can also be considered an element of many crimes rather than as a
separate phenomenon in itself, which may account for the SFO approach above. It may
be subsumed under fraud, nepotism and bribery, or indeed white collar crime itself, or
organised and political crime. In the EU it is seen as lying at the far end of a continuum
running from mismanagement, via waste, to fraud. Corruption can thus be seen as a
precursor of other crimes, almost as a mirror image of money laundering, which can be
seen as requiring a precursor crime to make the activity itself criminal.
The concept of corruption is based on the idea of “some ‘naturally sound condition’
from which corrupt acts deviate”.19 Transnational companies and politically exposed
persons (PEPs) conspire to assert: “Your corruption is my normal business practice;
your bribe is my mark of respect.” It can be difficult to draw a clear line between
nepotism or insider dealing, on the one hand, and networking on the other. A contract
in Nigeria may involve the overseas contractor paying the same amount as the price bid
for the contract by an “agent”. Is it unfair to compare this to “full economic costing”,
17
Bill Tupman “Transnationalisation and Corruption: Some Theoretical and Practical
Implications” Chapter 11 in James Sheptycki and Ali Wardak Transnational and Comparative
Criminology Glasshouse Press, London 2005 pp247–268.
18
Ibid p247.
19
Mark Philip “Defining Political Corruption” Political Studies 1997 Vol 45 No 3
pp436–462.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
where a research funder can be charged over 100 per cent “overhead”? Career building
in both the West and the East has long been characterised by patron–client relations.
Equally, joining freemasons’ lodges, the Rotarians or golf clubs may take place in order
to make contacts rather than to engage in the primary activities of these organisations.
In China, without guanxi, nothing could be achieved.
Tupman has argued that it is useful to distinguish between “old” and “new”
corruption. Before the creation of world trade, business practices varied from country
to country. These were a response to the way in which internal trade developed and
reflect each society’s differing cultural mores. When private companies began trading
in countries other than those in which they originated, initially they had to adapt to the
existing business practices of the country in which they wished to operate. As other
external competitors came into the same market, the original traders used their
knowledge of these practices to maintain their market position. This could be
considered “old” corruption and reflects a world of barter in the absence of convertible
currencies. Britain even went to war with China over its insistence on paying for luxury
goods in opium rather than the silver demanded by the Chinese.
“New” corruption arises in the era of multi- and trans-national corporations when
“external” companies seek to corrupt government officials to obtain a monopoly
position, either as a supplier of goods and services or as a purchaser of a primary
product. A global economy means that cash can be paid into the overseas bank account
of a PEP to gain a contract at the expense of a competitor transnational corporation. So
corruption involves “corporate crime” in this new context and probably money
laundering too.
Money Laundering
“Follow the money” became the cry of governments seeking to pursue the “war on
drugs”, and money laundering took centre stage. Like many of the concepts making up
economic crime, this began with a narrow meaning: the process whereby criminals
sought to bring the profits of their criminal activities into the legitimate financial world.
Partly because of the inclusion of terrorist funding, partly because of empire building
by special investigative units, partly because the profits of drug trafficking made crime
groups so cash heavy that they invested in new criminal businesses rather than making
their money appear legitimate, “money laundering” has become a synonym for the
movement of funds and assets from one jurisdiction to another. It now effectively
overlaps with an earlier concept, “hot money”, the rapid movement of capital for
speculative reasons, which is often not illegal, except when it originates in a country
with legal restrictions on the removal of capital.
The Financial Action Task Force (FATF) has produced a framework of recommenda-
tions for the combatting of money laundering and terrorist financing.20 These effect-
ively define the phenomenon.
20
FATF website http://www.fatf-gafi.org/topics/fatfrecommendations/documents/fatf-
recommendations.html accessed 3rd December 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Cybercrime
As discussed above, a great deal of cybercrime involves the use of the internet as a
means of communication in order to perpetrate classical frauds. Increasingly, the
internet is becoming a medium for the purchase of goods, for banking, and is in the
process of becoming “the internet of things” where even household appliances can be
communicated with remotely. Other possibilities will emerge as this progresses.
There are other areas though where crime is growing: phishing, Trojan horses,
worms and compound programs like Stuxnet. The placing of malware on computers to
create botnets, which can be used to crash commercial and government websites in
“denial of service” attacks, is a development of something that is new in cybercrime.
Not all of these offences fall within the remit of economic crime. Many come closer to
sabotage and even terrorism.
The increasing use of algorithms by investment brokers and financial players has
already led to one “flash crash”. Increasingly, Flare and Stuxnet derivatives will be
used by organised crime groups to reconnoitre financial systems and make money out
of knowing that they are going to provoke changes in market prices. Bankers have
already interfered with market prices and fixed foreign exchange rates. Criminals will
have learnt that such things are possible and will be planning how to carry such
operations out themselves for their own enrichment.
As further discussed below, cybercrime is now operating within the knowledge
economy. Governments are stealing trade secrets from each other and placing surveil-
lance malware deep within the computer systems of competitor states and states with
which they are in conflict. The use of non-state actors in order to provide deniability
has meant the spread of skills into organised crime networks, with the result that police
organisations are concerned that they are falling behind the game. It has become a
truism that it can take five years to discover exactly what crimes are being committed
today. The Onion Router (TOR) or the “deep web” exists to protect anonymity, which
assists criminals as well as intelligence services and dissidents.21 It was originally
developed by the US Navy, but is now used by paedophile networks, drug traffickers
and who knows whom. Its partner currency, Bitcoin, opens up new areas of potential
financial crime, although it is a mistake to be alarmist about anything new. Most of
these creations are neutral. It is those who use them who can be forces for good or evil.
Counterfeit Products
An area that has expanded in recent years is the trade in copies of manufactured goods.
Fake Guccis, fake Rolexes, fake perfume, all do a roaring trade in tourist resorts around
the Mediterranean and further afield. Designer goods are easy to fake and profit from
because the price of manufacture is so much lower than the price at which they are
sold. The same goes for music CDs and computer software, and manufacturers have
had to work hard convincing police forces around the world to pursue traders and
manufacturers of fake goods. As the trade moved onto the internet, efforts have become
21
Guardian website http://www.theguardian.com/technology/2013/nov/05/tor-beginners-
guide-nsa-browser accessed 3rd December 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
more strenuous, with prosecutions of music download sites and threats to prosecute
individual downloaders.
There is a more dangerous side to counterfeiting though. The trade in counterfeit
drugs and medical equipment that do not work, counterfeit aeroplane parts, counterfeit
car parts, all threaten life.
CATEGORIES OF VICTIM
The idea of categorising by victim, as Croall does, is in order to examine whether it is
the nature of the perpetrator or of the victim that makes criminal prosecution and
punishment more or less likely. She distinguishes between occupational white collar
crime, where the perpetrator benefits at the expense of the employer, and corporate
crime, where the corporation benefits but to the detriment of safety, the quality of
goods or services, society and/or the environment. Perhaps a continuum could be
created, she suggests, between legitimate and illegitimate, licit and illicit businesses.
Where the offence, such as fraud, is committed against individual members of the
public, the individual amounts involved are likely to be too small to be worth
investigating. There is little kudos to be had, although it should be noted that certain
vulnerable individuals, such as elderly ladies, fall into a different category as a result of
media interest. The Swedish Economic Crimes Agency makes great play of the fact that
it investigates all economic crime and doesn’t “cherry-pick” unlike investigators
elsewhere, using the SFO as an example.22 This is slightly odd, since the same site says
that it leaves investigation of fraud to the police. There is a problem here: if national
units concentrate on major crimes because of the expense of prosecution, who will deal
with the smaller crimes, where the same problem of expense exists? Without prosecu-
tion, what happens to deterrence?
This may become different where the crime targets several to all members of the
public, but again, the true picture may not emerge because victims feel stupid, so often
do not report relatively small frauds. The police do run preventative campaigns, but
again, prosecutions are rare, and this is not always because of the status of the
perpetrator. Another factor is that a good fraudster builds up the trust of the victim, who
is often not aware of being tricked out of money or assets.
The Employer
Where the employer is the victim and the employee the perpetrator, the employer may
be wary of reporting an offence to the police because of the danger to consumer and/or
market confidence. The damage done by publicity may be greater than that done by the
original offence. Equally, the employer has all sorts of disciplinary sanctions available
if the employee’s skills are seen as worth keeping and the possibility is there of
22
Swedish Economic Crimes Authority website op cit.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
stopping losses from wages until the money taken has been paid back. There is a
suspicion that where a high profile case is prosecuted, the employee is being used as a
scapegoat for the failings of the employer. Indeed, this is often part of the defence case.
The State
Theft of state property has been a serious crime in Communist countries from the
outset. In capitalist countries, investigation is more likely where the state is the victim,
but not necessarily in the procurement process. Outsourcing of government and public
services has led to an ideological obsession with awarding contracts to private firms
and not being too rigorous about regulating either the process of the award or the
conduct of the contract. Private Eye now sells more copies on the strength of its
investigative journalism into such behaviour than it does on the strength of its jokes.
There does appear to be a line between what is considered to be an offence and what is
considered to be “teething problems”.
The thinking behind the identification of there being a threat to the market itself is well
exemplified by a memo from the European Commission to the European Council and
the European Parliament on the need for a policy on corruption. Five aspects of the
interests of the Union are defined as being affected by corruption, and are primarily
economic:
23
Com (97) 192 final Brussels 21 May 1997 – Communication from the Commission to the
Council and the European Parliament on a Union Policy against corruption.
24
Taken from Tupman op cit.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
ECONOMIC CRIMINALS
The essential question here is to what degree are those who commit economic crime
still persons of high status and respectability? Have organised crime networks recog-
nised the opportunities of fraud and moved in? There have always been confidence
tricksters in ports and market towns trying to separate sailors from their wages and
farmers from their cash. Have these people moved into the world of white collar crime
on the back of the internet.
If we take the West African 419ers, the emails originate from individual fraudsters
trying to obtain a fee for access to unlikely sums of money. If the victim persists, then
more organised gangs may become involved if they can be persuaded to visit the
country where the funds are supposed to be. This is a crime committed by educated
people, certainly, who are both literate and computer competent, but hardly high status.
They are unlikely to attract police attention unless they are very careless.
Similarly, there is an argument that professional or career criminals move up the food
chain as they achieve success. They may start off running a chain of prostitutes or street
dealing, or even engaging in armed robbery, but once they have capital, they will move
into drug trafficking and from there into white collar crime, because as the profits rise,
the risk of being caught diminishes. Increasingly, professional criminals who survive
and accumulate assets and wealth need accountants, lawyers and managers to run their
financial affairs and conceal their assets. Once they are involved with professionals
with a dubious sense of ethics, it becomes easy to set up shell companies and look to
commit frauds in the procurement process or to sell counterfeit products and even move
up to insider trading and market manipulation.
So the white collar/blue collar distinction has become blurred with the availability of
investment cash from the drugs trade, the development of the internet, the lowering of
ethical standards and a recent decline in economic rewards for some professions. It is
worth noting that the distinction will continue to exist for the vast majority, but that
there is a significant overlap, which was exacerbated by the “Big Bang” in the City.
Corporate
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 13 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
PEPs
A PEP is someone who is seen as representing a higher risk for bribery, terrorist
financing or money laundering by virtue of their position within a state. The term was
coined following the Abacha affair, and FATF makes recommendations for enhanced
monitoring of any accounts held by a financial institution on behalf of such a person.
There are two major areas of concern: politicians and their families who siphon off a
country’s aid budget into accounts held in overseas banks and individuals who expect a
premium to be paid to them for the award of a particular contract, such as weaponry by
a transnational company, thereby removing any sense of a level playing field in
government procurement. Of increasing interest is the payment of large sums to
terrorist organisations by wealthy individuals.
There have been a number of market traders recently who have allegedly gambled on
particular trades and lost. In some cases they have bankrupted the company or bank in
the process, in others the bank has been able to cope with the losses but has sacked the
individual and called in the police claiming fraud, in contradiction to the point made
above in the section on victims. Although each case has raised questions about internal
oversight of employees, several have gone to prison. So there are cases where criminal
sanctions have been used against white collar criminals, but only where the victim is
the employer, not where the victim is the taxpayer, the government, a foreign
government or the market itself. Nevertheless, these are not cases of exceptions proving
the rule, but examples of situations where employers agree that imprisonment is an
appropriate form of punishment and that deterrence is a good idea. The distinction
between blue and white collar crime is not totally clear-cut.
There are now a series of red flags suggested for identifying potential minor
fraudsters within companies, most of which seem to suggest that companies should
look at their own employees in the same way that countries need to look at PEPs.
Transparency of income and expenditure patterns are obvious mechanisms for the
prevention of fraud and financial crime, although this obviously raises privacy issues.
Increasingly, the literature refers to networks of criminals rather than organised crime
groups. The Camorra, ‘Ndragheta and the Sicilian mafia still exist, however, and have
profited from the recent economic crash by being the only institutions in Italian society
prepared to advance funds to struggling businesses. Research may one day show that
they have been operating in similar ways in other parts of Europe. These networks are
cash heavy, and putting companies in their debt with an eye to taking them over can
begin as a form of money laundering. Money loaned becomes money used for purchase
and eventually the previous owner becomes the manager. In the process the loan
sharkers have made their “dirty money” respectable.
Organised crime networks are also moving into cybercrime and are being joined by
governments in the form of their electronic intelligence departments. Governments
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 14 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
happily pass on the trade secrets of other governments to their multinational and
transnational corporations, maintaining electronic surveillance in the name of “counter-
terrorism” but actually quite happily undermining the free operation of the markets by
providing commercially sensitive information to select companies. Cybercrime ultim-
ately is about the acquisition of information in the “knowledge economy” that exists
in the 21st century. The relationship between governments, corporations and cyber-
criminals is murky as cybercriminals are employed in order to conceal the ultimate
origin of malware, denial of service attacks, “spoilers” that release films, music or even
political announcements prematurely. Internet fraud appears as the tip of the iceberg,
but yesterday’s criminals today own banks, oil refineries and goodness knows what else
since the 2008 crash. If anyone has scruples about acquiring information about
competitor planning for the future, it certainly isn’t them.
CONCLUSION
The listing of crimes, offences and perpetrators is hardly definitive. The overall
conclusion of this overview is that categories are becoming blurred as corporations
themselves become victims of insiders and organised crime networks. When corpor-
ations are demanding punishment for white collar criminals indulging in very similar
behaviour to themselves, such as market manipulation, corruption of insiders, insider
trading, interference with the existence of a level playing field, it becomes harder for
them to also demand the right to engage in the same form of behaviour without penalty.
The line between blue collar and white collar crime has become increasingly blurred.
As Sittlington has shown, regulators, law enforcement and prosecutors agree that
criminal sanctions are necessary to deter further wrongdoing.25 The only problem is to
discover what would deter the offender – Bosworth-Davies would argue for “porridge,
and lots of it”.26 Sittlington’s research shows, however, that it is the loss of assets that
has a chance of deterring the professional criminal.27 He also shows that a division still
exists between the criminal who steals to fund a lifestyle, consuming his or her
ill-gotten gains as fast as they are obtained, and the professional who wishes to
preserve his or her assets for an imagined future retirement. These comments on
deterrence and rational choice apart, returning to the opening of this chapter, Rider’s
warnings of the inadequacies of a hands-off regulatory approach back in 1988 are still
relevant a quarter of a century later.28
25
Sittlington op cit.
26
Rowan Bosworth-Davies “Rowan’s Blog” http://rowans-blog.blogspot.co.uk/ passim
accessed 3rd June 2015.
27
Sittlington op cit.
28
Rider op cit.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 01 /Pg. Position: 12 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
The quest to postulate a general definition of fraud may seem utopian. Therefore, when
McGrath states that fraud is ‘notoriously difficult to define’ he is expressing pervading
sentiment in the literature.1 One reason is that fraud has tentacles in both civil and
criminal jurisdictions under English law, thus making it difficult to couch an all-
embracive definition. The evolution of the concept has also been coarse. Although
essentially a criminal concept, the Court of Equity principally administered fraud.
Moreover, prior to the passing of the Fraud Act 2006 ‘fraud’ was not an offence
in England.2 Thus there was no categorical statutory or judicial definition of fraud in
either the criminal or the civil jurisdictions. The preponderance of synonyms in
describing fraud is another feature that makes it difficult to define it. Fraud has, among
others, been described as ‘white collar crime’,3 ‘financial crime’, ‘economic crime’,4
‘deceit’,5 ‘forgery’,6 ‘dishonesty’.7 Some in the judiciary recognised this difficulty and
suggested that courts were not to ‘cramp themselves … with a hard and fast
definition’.8 The connection between definition and practical application has been
encapsulated in the statement that fraud9 ‘… is the elephant easy to recognise, but
1
Paul McGrath, Commercial Fraud in Civil Practice (Oxford University Press 2014) 5.
2
Anthony Arlidge QC, Alexander Milne QC and Jacques Parry, Arlidge and Parry on
Fraud (4th edn, Sweet and Maxwell 2013).
3
Edwin H Sutherland, ‘White-Collar Criminality’, White-Collar Criminal: The Offender in
Business and the Professions (1st edn, Atherton Press 1968) 40. See John Braithwaite, ‘White
Collar Crime’ (1985) 11 Annual Review Sociology 1 for a review of relevant literature on white
collar crime.
4
Professor Barry Rider uses this term in The Cambridge International Symposium on
Economic Crime which takes place annually at Jesus College, Cambridge University.
5
Sir James Fitzjames Stephen, A History of the Criminal Law of England, vol II
(MacMillan and Co 1883) 121–122. See Peter MacDonald Eggers, Deceit: The Lie of the Law
(Informa Law from Routledge 2009).
6
Michael Gale, Sarah Gale and Gary Scanlan, Fraud and the Plc (LexisNexis UK 1999) 2.
7
R v Ghosh [1982] QB 1053. See also Gale, Gale and Scanlan (n 6) 1–5. See also ‘Fraud:
Report on a Reference under Section 3(1)(e) of the Law Commissions Act 1965’ (2002) LAW
COM No 276, Cm 5560 <http://lawcommission.justice.gov.uk/docs/lc276fraud.pdf> accessed 27
May 2015.
8
Stonemets v Head [1913] Mo Supreme Court Rep 243 Southwest Report 108 114. This
case is cited by Sheridan in LA Sheridan, Fraud in Equity: A Study in English and Irish Law (1st
edn, Sir Isaac Pitman and Sons Ltd 1957). Sheridan cited it from Green, Jude and Jury, 311–312.
9
In the sense of dishonesty.
15
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
difficult to define, and a jury is well able to recognise it, even though they could not
define it’.10
Fraud is a universal phenomenon: it is found across nations and cultures. This
chapter presents a brief comparative overview of the concept. The reader is thus
referred to relevant sources for detailed discussions. The relationship between fraud and
morality is examined and further explored with particular reference to Judeo-Christian
and Islamic religions. The chapter also gives brief historical accounts of the develop-
ment and administration of fraud under the civil and criminal jurisdictions in early
Roman and English jurisdictions. It concludes by examining the relation between
commercial and consumer fraud in England.
10
Gale, Gale and Scanlan (n 6) 5.
11
Sheridan (n 8) 184–205.
12
Barry Rider, ‘The Enemy Within’ [2010] Quantum Finance in Perspective 25, 28–29.
13
See Eggers (n 5) for a detailed discussion on fraud and morality and references to various
caselaw.
14
Gilbert Geis, White-Collar Criminal: The Offender in Business and the Professions
(Atherton Press 1968) 259.
15
Ibid 11–12.
16
Sidney C Suffrin, ‘How Moral Can a Business Be?’ <http://www.religion-online.org/
showarticle.asp?title=1688> accessed 25 February 2014.
17
Robert Jackall, ‘Moral Mazes: The World of Corporate Managers’ (1988) 1 Politics,
Culture and Society 598. See also Damian Grace, ‘A Summary of Robert Jackall’s Moral Mazes’
2005.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
not obligatory.18 While both admittedly regulate conduct, the strength of law consists,
among others, in sanction enforcement, cheaper expense in establishment, and flexibil-
ity both in terms of changing the rules and finding information for application.19
Morality on the other hand is less costly to impose and less expensive to enforce where
the person subscribes to the moral code.20
From a public policy point of view, what principles should guide the extent to which
morality or law or both are used to regulate human conduct? Shavell propounds the
idea of optimal domains of law and morality to represent these three possibilities and
argues that, in respect of fraud, the combination of the two is important because the law
is imperfect.21 This deficiency is however complemented by morality, which has vital
information that can help the law. Moreover, morality is inexpensive to enforce.22
It is argued that the criminal institution discriminates against the poor and favours the
rich and powerful in society.23 It is further suggested that, in stigmatising criminals,
there should be no bias between those convicted in the criminal courts and those
exposed by non-criminal courts.24 Green has suggested that where a conduct is
essentially immoral, it should be criminalised.25 In response, critics have posited that
crime can only be defined by the criminal law of a particular jurisdiction, and morality
and crime are not the same.26 However, morality and law share reciprocal influence.
The law can change people’s morality. Conversely, morality can influence change in the
law.27
In response to the degree to which the sphere of an immoral conduct coincides with
the sphere of conduct defined as criminal, Fuller suggests that it is dependent on the
‘relative homogeneity of moral values within the society represented in any political
jurisdiction’, indicating further that the more complex a society, the less there would be
of homogeneity and vice versa.28 The question may be asked at what point does
conduct considered immoral reach the fraud threshold. Fuller propounds the idea of
moral minimum, which is the elevation to the protection by the criminal law of values
18
John Gardner, ‘Law and Morality’ <http://papers.ssrn.com/sol3/papers.cfm?abstractid
=2344794> accessed 27 May 2015.
19
Steven Shavell, ‘Law versus Morality as Regulators of Conduct’ (2002) 4 American Law
and Economics Association 227.
20
Ibid.
21
Ibid.
22
Ibid.
23
Robert G Caldwell, ‘A Re-Examination of the Concept of White-Collar Crime’, White-
Collar Criminal: The Offender in Business and the Professions (1st edn, Therton Press
Incorporated 1968) 378.
24
Ibid.
25
Stuart P Green, ‘Lying, Misleading, and Falsely Denying: How Moral Concepts Inform
the Law of Perjury, Fraud, and False Statements’ (2001) 53 Hastings Law Journal 157. See also
Stuart P Green, ‘Moral Ambiguity in White Collar Criminal Law’ (2004) 18 Notre Dame Journal
of Law, Ethics and Public Policy 501. See also Mitchell N Berman, ‘On the Moral Structure of
White Collar Crime’ (2007) 5 Ohio State Journal of Criminal Law 301.
26
Berman (n 25). Caldwell (n 23) 378–379.
27
Shavell (n 19).
28
Richard C Fuller, ‘Morals and the Criminal Law’ (1941) 32 Journal of Criminal Law and
Criminology 624.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
considered sacred.29 He suggests that the regulation of frauds go beyond the moral
minimum in regulating various forms of conduct, for which reason more people have to
be won over in order to criminalise such conducts.30
29
Ibid.
30
Ibid.
31
Michael J Perry, ‘The Morality of Human Rights: A Nonreligious Ground?’ (2005) 27
Dublin University Law Journal 28.
32
John Inge, ‘Theological Reflections on the Place of the Sacred in Society’ (2004) 7
Ecclesiastical Law Journal 380. See also Hershey H Friedman and William D Adler, ‘Moral
Capitalism: A Biblical Perspective’ (2011) 70 American Journal of Economics and Sociology
1014, where the authors argue how four basic principles of the Hebrew Bible and Talmud could
be used to create a more moral economic system.
33
WS Holdsworth, A History of English Law, vol 3 (3rd edn, Methuen & Co Ltd 1922) 14.
34
Ibid 21–25.
35
Ibid 28–31.
36
Ben-Zion Rosenfield and Joseph Menirav, ‘Fraud: From the Biblical Basis to General
Commercial Law in Roman Palestine’ (2006) XXXVII Journal for the Study of Judaism 594.
Equally, see Arthur Gross Schaefer and Beverly Bickel, ‘Morality in the Marketplace: Consumer
Protection, Regulatory Policy and Jewish Law’ (1994) 17 Loyola of Los Angeles International
Internaional and Comparative Law Journal 85.
37
Rosenfield and Menirav (n 36).
38
Ibid.
39
The Amplified Bible (The Lockman Foundation 1954) <https://www.biblegateway.com/
passage/?search=exodus+22&version=AMP> accessed 27 May 2015.
40
Rosenfield and Menirav (n 36). See also Schaefer and Bickel (n 36).
41
Rosenfield and Menirav (n 36). See also Schaefer and Bickel (n 36).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the Mishna,42 which provides that ‘fraud [overreaching] is an overcharge of four pieces
of silver out of twenty-four pieces of silver to the sela …’.43 Thus the general law is
one-sixth of the purchase price. The provision of remedy under the sages’ law involved
correcting the price while the defrauded party is paid the difference.44 This was
applicable only to the situation where the fraud rate is one-sixth. The second option
involves the annulment of the transaction, and the goods returned to seller and money
to purchaser. The overwhelming preference is for the second remedy.
There are differences in the Biblical and sages’ approach to fraud.45 First, the sages
set a ‘defined rate of deviation from the just price’. Second, while the Biblical position
has no prescribed form of remedy, fraud assessed under the sages could be annulled.
Furthermore, Biblical fraud is applicable to real estate while the sages’ law referred to
products and movables.46
42
A codification of oral law compiled by Rabbi Judah the Patriarch. See Schaefer and
Bickel (n 36).
43
Rosenfield and Menirav (n 36).
44
Ibid.
45
Ibid.
46
Ibid.
47
Lu’Ayy Minwer Al-Rimawi, ‘Arab Regulations of Fraud, Insider Dealing, Market
Manipulation and Possible Contractual Remedies’ (1999) 303 Journal of Financial Crime
<Westlaw> accessed 18 December 2013. See also Abd El-Rehim Mohamed Al-Kashif,
‘Shari’ah’s Normative Framework as to Financial and Abuse’ (2009) 86 Journal of Financial
Crime <Westlaw> accessed 18 December 2013. See also KVS Nathan, ‘Who Is Afraid of
Sharia?: Islamic Law and International Commercial Arbitration’ (1993) 59 Arbitration 125.
48
Barry Rider, ‘The Virtue of Certainty’ (2009) 30 Company Lawyer 225.
49
M Chene, ‘Islamic Approaches to Corruption’ [2007] U4 Anti-Corruption Resources
Centre <http://www.u4.no/publications/islamic-approaches-to-corruption/> accessed 27 May
2015.
50
Al-Kashif (n 47) citing Sahieh Muslim ‘Sharh Al–Nawauwe’, part 1, p. 309, Hadith No.
101.
51
As cited by ibid.
52
As cited by ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
A key feature in the fight against fraud is the reporting obligations placed on
individuals and financial institutions. Islam admonishes Muslims to report offences.
The reporting obligation however appears unclear as the Prophet (PBUH) has stated
that ‘whoever sees wrong being committed let him rectify with his hand, if he is
unable, then with his tongue, and if he is unable to, then with his heart, and this is the
weakest of faith’.
Islam requires a high standard of proof akin to beyond all reasonable doubts in
English law.53 However, the exact punishment meted to a person guilty of dishonest
gain in Islam is unclear. Meanwhile, Rider, while acknowledging the stability and
resilience of Islamic financial products, has, among others, questioned whether one can
recognise fiduciary law in Shariah or indeed the extent to which the principle of
conflict of interest guides a Shariah adviser.54
Has the West sought to impose the Judeo-Christian position on fraud on South Asian
countries? Bosworth-Davies has suggested that the Western position on the fight
against financial fraud has been influenced by robust Judeo-Christian moral positivism
expressed most forcefully by the Bible Belt’s Republican Right in the United States and
the emergent non-conformist ‘New Puritanism’ of the British Labour Establishment.55
The argument is nevertheless weakened by the limited evidence put forward especially
in respect of the United Kingdom. It is submitted that the contention, if sustainable, is
only true at the political level at a particular point in history.
53
Al-Kashif (n 47).
54
Rider, ‘The Virtue of Certainty’ (n 48).
55
Rowan Bosworth-Davies, ‘The Influence of Christian Model Ideology in the Develop-
ment of Anti-Money Laundering Compliance in the West and Its Impact, Post 9-11, upon the
South Asian Market: An Independent Evaluation of a Modern Phenomenon’ (2008) 11 Journal of
Money Laundering Control 179.
56
Peter Johnstone, ‘Serious White Collar Fraud: Historical and Contemporary Perspectives’
(1999) 30 Crime, Law and Social Change 107, citing M Clarke, Business Crime. Its Nature and
Control (St Martin’s Press 1990).
57
Geis, White-Collar Criminal: The Offender in Business and the Professions (n 14) 11.
See also Johnstone (n 56).
58
Holdsworth, A History of English Law (n 33) 3–14.
59
Ibid 148.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Early Roman regulation of fraud-like cases concerned forgery or falsum.60 This did
not recognise any specific concept of fraud. The regulation of fraud in early law codes
and medieval legal practice was variegated according to the specific codes.61 It is
similarly apparent that local laws also differed.62 Dolus malus or fraus were regulated
as criminal offences but other cases of a similar nature were regulated under the civil
law.63 Criminal cases later dominated civil cases by regulating legal relations as theft.64
The above classifications were maintained in the Canon and ancient Italian doctrines.65
Falsum and stellionatus were confusingly interpreted.66 However, a distinction was
made when falsum was interpreted as deception, broadly, and other cases of guileful
misrepresentation. Punishments were determined by what the Lex Cornelia or any law
claimed criminal, by statute and by discretion, even though non-statutory punishment
was the usual.67
60
Stanley N Katz, The Oxford International Encyclopaedia of Legal History, vol III (VI,
Oxford University Press 2009) 102.
61
Ibid.
62
Rosenfield and Menirav (n 36).
63
Katz (n 60) 102.
64
Ibid.
65
Ibid.
66
Ibid.
67
Ibid.
68
Rosenfield and Menirav (n 36).
69
Ibid.
70
Ibid.
71
Ibid.
72
Ibid.
73
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
transaction.74 However, there was no limitation on profit as there was in Jewish law as
legislators were wealthy classes and ensured this was so. It appears that Jewish law
provided fewer opportunities for defrauding the consumer than Roman law.
Fraud at Equity
Controversy surrounds the exact date when regulation of fraud began in England and
whether it began first under equity or common law.76 It is stated that ‘through a strange
quirk in history, the evolution of the law of fraud began about five hundred years ago in
the English common law …’.77 On the contrary, it was the deficiencies associated with
the common law that gave birth to the equitable jurisdiction of fraud.78 The Courts of
Equity, Requests and the Star Chamber had jurisdiction over cases of fraud in
England.79 Coke, writing to the Chancery, stated: ‘For this Court of Equity the ancient
rule is good. Three things are to be judged in the Court of Conscience, Covin,
Accident, and breach of confidence. All covins, frauds, and deceits, for the which there
is no remedy by the ordinary course of law.’80 Indeed, it was not until the development
of the doctrine of deceit in the late eighteenth century that the common law began
regulating fraudulent conduct in England.81
74
Ibid.
75
Holdsworth, A History of English Law (n 33) 14–15.
76
See Andrew Burrows, ‘We Do This at Common Law but That in Equity’ (2002) 22
Oxford Journal of Legal Studies 1 for a general discussion on the difference between the two
jurisdictions.
77
Johnstone (n 56) citing J Bologna, Corporate Fraud: The Basics of Prevention and
Detection (Butterworths 1984).
78
‘Equity’, Halsbury’s Law of England (2nd edn, Butterworths Lexis Nexis).
79
Sheridan (n 8) 5.
80
Ibid. See also Sir WS Holdsworth, ‘The Relation of the Equity Administered by the
Common Law Judges to the Equity Administered by the Chancellor’ (1916) XXVI Yale Law
Journal <Heinonline> accessed 2 May 2014.
81
Holdsworth, A History of English Law (n 33) 292–293. See also Flora Page, ‘Defining
Fraud: An Argument in Favour of a General Offence of Fraud’ (1997) 4 Journal of Financial
Crime 287.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Regulation of fraud in equity may have begun during the reign of Edward II or
earlier.82 Evidence of equitable relief against fraud exists from about Henry V
onwards.83 This is where the earliest recorded case emerges.84 In the Earl of
Chesterfield v Janssen,85 the Chancellor Lord Hardwicke classified equitable fraud into
about five different categories and emphasised the fact that the Court of Conscience
had jurisdiction to deal with all cases of fraud where it is fraud on the public. Several
other cases followed the Earl of Chesterfield case including the Carpenter v Heriot 86
and Earl of Aylesford v Morris87 cases.
Subsequently, the width of the equitable fraud extended to intellectual property cases,
where it was held that where a manufacturer has protected his intellectual property,
being a trademark in a product, it was fraud if another adopted the same trademark and
markets it as if it was his own.88 In Scroggs v Scroggs,89 equity was applied to prevent
the fraudulent execution of a power.
Post eighteenth century equity predominantly concerned contractual disputes.90 The
examination of contracts is reflected in the way equity dealt with cases involving
the statute of frauds.91 This investigation went beyond the normal to exploring the
intentions behind contracts. This is reflected mainly in undue influence cases and
misrepresentation.92
In summary, the Court of Equity dealt with all cases of fraud before the common law
began to exercise jurisdiction on matters of fraud. Since 1875, however, the Court of
Equity and the common law have exercised concurrent jurisdiction.93 Frauds under
equity today include knowing receipt, unconscionable dealing as a vitiating factor,
equitable undue influence, conspiracy and dishonest assistance.94
82
‘Equity’ (n 78).
83
Sheridan (n 8) 5.
84
Ibid.
85
Chesterfield (Earl of) v Janssen [1751] 2 Ves Sen 125.
86
Carpenter v Heriot (1759) 1 Ed 338.
87
Aylesford (Earl of) v Morris (1873) LR 8 Ch App 484.
88
Singleton v Bolton [1783] 3 Douglas 293.
89
Scroggs v Scroggs [1755] Ambler 272 (Court of Chancery).
90
Michael Lobban, ‘Contractual Fraud in Law and Equity, c1750–c1850’ (1997) 17 Oxford
Journal of Legal Studies 441.
91
Ibid.
92
Ibid.
93
Stephen Waddams, ‘Protection of Weaker Parties in English Law’, Unconscionability in
European Private Financial Transactions: Protecting the Vulnerable (Cambridge University
Press 2010) <http://ebooks.cambridge.org/> accessed 25 January 2014.
94
Janet Ulph, Sir Michael Tugendhat and James Glister, Commercial Fraud: Civil Liability,
Human Rights and Money Laundering (Oxford University Press 2006). See also Nelson
Enonchong, Duress, Undue Influence and Unconscionable Dealing (Sweet and Maxwell 2006).
See also McGrath (n 1).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
The history of the regulation of fraud under the common law is linked to the history of
the action in deceit.95 Deceit had three causes of action, which became actionable when
they came to the notice of the court during litigation.96 Forgery was similarly at the
time punishable, as was reliance on a false document in a court of law.97 The
opportunity for committing fraud during litigation was great because there were
intricate procedures involved in litigation.98 The doctrine of deceit was extended to
substantive actions in the contracts of sale where there had been inducements by
deliberate misleading.99
Somerton’s case shows civil liability for fraud focused on the acts and damage
caused to the claimant but ignored the defendant’s intentions.100 In this regard it was
considered similar to breach of warranty. In Doige’s case,101 a buyer accepted the
purchase price but refused to convey the land. The writ stated that he was ‘craftily
scheming to defraud the plaintiff’ and thus ‘false and fraudulent’. Fermor’s case102
reflects the established doctrine that false representation was actionable when the
plaintiff could prove that the defendant had been intentionally deceitful. In Chandler v
Lopus,103 the Court of Exchequer held that ‘the bare affirmation that it was a bezoar
stone, without warranting it to be so, is no cause of action’. This reasoning was pursued
in Roswell v Vaughan.104 The first reported case under the common law where a
claimant who was induced to do anything other than contract with the defendant was
allowed to recover damages is the 1789 case of Pasley v Freeman.105 Finally, breach of
warranty was distinguished from an action for false representation. By 1889 Derry v
Peek106 had established that intention to defraud must form a component of the deceit.
The common law now developed its own modern rules on rescission of contracts on the
ground of fraud.
Fraud under the common law in the eighteenth century gave relatively little scope for
the exercise of discretion outside the strict terms of the agreement by juries.107 Juries
principally focused on terms of agreement made by the parties and it was crucial that
the evidence showed an agreement between the parties.108 In the nineteenth century, the
95
Holdsworth, A History of English Law (n 33) 366.
96
The late WW Buckland, Arnold D McNair and FH Lawson, Roman Law and Common
Law: A Comparison in Outline (2nd edn, Cambridge University Press 1965) 383. See also
Sheridan (n 8) 5–7.
97
Holdsworth, A History of English Law (n 33) 366.
98
Holdsworth, A History of English Law (n 33) 407.
99
Ibid 623–626.
100
Somerton’s case [1433] B 11 Hen 6 Hil Pl 1.
101
Doige’s Case B Hill 9 Hy VI.
102
Sir Edward Coke, Institutes of the Laws of England: The First Part, vol 2 (J & W T
Clarke; R Pheney; and S Brooke 1823).
103
Chandler v Lopus [1603] Cro Jac 4.
104
Roswell v Vaughan [1607] Cro Jac 196.
105
Pasley v Freeman 3 TR 51.
106
Derry and others v Peek (1886) 1 ER Rep 1 (House of Lords).
107
Lobban, ‘Contractual Fraud in Law and Equity, c1750–c1850’ (n 90).
108
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
trend moved away from liberalism towards a more complete examination of the
contract to ensure fairness.109 This was achieved, among other approaches, through
interpreting contracts to achieve fairness and public expectation.110 Judges also took
care of fraud by putting forward doctrines to prevent it.111 Cases in point are the
development of the doctrine of estoppel and extension of the doctrine of deceit in
Pasley v Freeman. Today, common law fraud conducts include misrepresentation,
mistake, undue influence, duress, deceit, unjust enrichment and conversion.112
English society had always considered theft inexorable and made it a capital crime.113
By Edward I’s time the distinction between grand and petty larceny (theft) had been
established, and it continued till 1827.114 However, breach of warranty of title was
norm in cases where individuals sought remedies for acts of fraud and different reasons
have been given to explain this situation.115 Meanwhile, early signals of regulating
criminal fraud began around the thirteenth century when laws were enacted to deal with
forestalling.116 It is understood that there are surviving records in Norwich in 1278 and
in Bury St Edmunds ‘reporting court leet fines against local citizens for … selling
defective merchandise and charging excessive prices’.117
In the 1474 Carriers case,118 both the Court of Star Chamber and the Exchequer
Chamber examined in the criminal context fraud effected by the abuse of trust and
ruled that ‘though a man cannot steal goods bailed to him … yet, if the bailee does an
act which determines the bailment, he may steal the goods’.119 In 1483 a statute making
bale breaking a felonious act was enacted followed in 1529 by one making it an offence
for servants to take their master’s property.120 Between 1542 to around 1543, reference
is made to ‘… divers and sundry persons, craftily obtaining into their hands great
109
Ibid.
110
Ibid.
111
Ibid.
112
McGrath (n 1). See also Ulph, Tugendhat and Glister (n 94).
113
Sir James Fitzjames Stephen, A History of the Criminal Law of England, vol III
(MacMillan and Co 1883) 129. See also John Hostettler, A History of Criminal Justice in
England and Wales (Waterside Press 2009).
114
Stephen, A History of the Criminal Law of England (n 113) 129. See also Gilbert Geis,
‘From Deuteronomy to Deniability: A Historical Perlustration on White-Collar Crime’ (1988) 5
Justice Quarterly 7.
115
Page (n 81).
116
Stephen, A History of the Criminal Law of England (n 113) 199–202. The laws on
forestalling were repealed in 1777. See Geis, ‘From Deuteronomy to Deniability: A Historical
Perlustration on White-Collar Crime’ (n 114).
117
Geis, ‘From Deuteronomy to Deniability: A Historical Perlustration on White-Collar
Crime’ (n 114).
118
The Carrier’s case [1474] 13 Edwa 4 P9 No 5. As reported in Stephen, A History of the
Criminal Law of England (n 113) 139.
119
Stephen, A History of the Criminal Law of England (n 113) 139.
120
Page (n 81).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
substance of other men’s goods’.121 It is also reported that where metal dealers used
uncorrected weighted balances they were excommunicated, while the sale of under-
weight foods resulted in a fine and banishment. Sir Coke stated in 1602 that ‘fraud and
deceit abound these days more than in former times’.122
Sector-specific criminal efforts at regulating fraud emerged in the financial sector
triggered essentially by the South Sea Bubble. The offence of scandal was created in
1720, and in 1734 St Barnard’s Act passed to prevent stockjobbing.123 In 1757 the
statute for the offense of obtaining by false pretences was enacted with the object of
dealing with intent to cheat or defraud. However, due to the development of the
doctrine of constructive taking in R v Pear, this legislation was used sparingly.124 In
applying the 1757 Act in Young,125 Asthurst J stated that ‘all men were not equally
prudent, and this statute was passed to the weaker part of mankind’.126
The legislature enacted a plethora of legislations127 in the Victorian era, determined
to deal with fraud from the criminal perspective.128 However, the inadequacy of these
provisions in confronting fraud led to the enactment of a consolidating Act in 1861
later described as ‘haphazard’.129 The Larceny Act 1916 was thus enacted as a
simplified code. From the perspective of fraud the Act was, among others, not
appropriate in dealing with cases of deception and dishonesty. Consequently, the Law
Commission proposed reforms.130
The Theft Act 1968 sought to address the issues identified with the 1916 Larceny
Act. Meanwhile, the offence of conspiracy to defraud, crucial in fighting multiparty
fraud, was given a statutory footing in the 1977 Criminal Law Act.131 Pursuant to the
1987 Criminal Justice Act, the Serious Fraud Office was established to combat fraud.
Even so, the Law Commission’s report on fraud132 raised, among others, the issue of
multiplicity of charges in serious fraud trials even though none of them adequately
encapsulated the meaning of fraud.133 Moreover, it opined that the law on fraud had not
caught up with the pace of technological advancements.134
Consequently, the Fraud Act 2006 was born. Fraud under the criminal law is defined
in section 1 (1) of the Act which provides that a person is guilty of fraud if he is in
121
Johnstone (n 56). Citing (34, 35 Henry VIII C. 4. Coke. Fourth Institute. 2777, 278
Vol I).
122
Johnstone (n 56).
123
7 George II C.8. and 1736 (10 Geo.2) Chapter 8. Stockjobbing. R. 23-4. V. C. 28.
124
The King v Pear [1779] 1 Leach 212 (Old Bailey). See also Page (n 81).
125
Young v Clerk [1720] 24 ER 241 (Court of Chancery).
126
Ibid.
127
Holdsworth, A History of English Law (n 33) 151–152.
128
Page (n 81).
129
Ibid.
130
Roy Stuart, ‘Law Reform and the Reform of the Law of Theft’ (1967) 30 The Modern
Law Review 609. See also Page (n 81).
131
S (1) Criminal Justice Act 1987. Meanwhile, s (5) abolished all conspiracy related
offences.
132
‘Fraud: Report on a Reference under Section 3(1)(e) of the Law Commissions Act 1965’
(n 7).
133
Ibid 2.
134
Ibid 57.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
breach of any sections listed in subsection (2). The sections listed in s 1 (2) are: frauds
by false representation, failing to disclose information and abuse of position. Although
clearly a huge leap forward the Act is not infallible.135 Frauds under the criminal law
also include theft, conspiracy to defraud,136 and fraudulent trading, among others.137
Dishonesty is one of the hinges upon which fraud revolves, particularly so in the
criminal context where it is the mens rea for the fraud offences.138 Following Ghosh,
most people appreciate the objective and subjective senses of dishonesty. However,
there are extended notions of dishonesty under English civil law, for instance dishonest
assistance in equity. The Fraud Act 2006 has stirred debate about the relationship
between the civil and criminal senses of dishonesty.139 Some of the issues140 are: what
is the relationship in law between concepts such as silence, concealment, breach of
trust and dishonesty? Can you conceal where there is no duty to disclose? Does
dishonesty plus concealment amount to fraud? Detailed examination of these is beyond
the scope of this chapter.
135
See Carol Withey, ‘The Fraud Act 2006: Some Early Observations and Comparisons with
the Former Law’ Journal of Criminal Law 220. See also Andrew Ashworth, Principles of
Criminal Law (6th edn, Oxford University Press 2009) 398–402. See also Barry Rider and
others, Market Abuse and Insider Dealing (2nd edn, Tottel Publishing 2009).
136
For the ongoing debate to abolish conspiracy to defraud see ‘Fraud: Report on a
Reference under Section 3(1)(e) of the Law Commissions Act 1965’ (n 7).
137
See Simon Farrell QC, Nicholas Yeo and Guy Ladenberg, Blackstone’s Guide to The
Fraud Act 2006 (Oxford University Press 2007) and Arlidge QC, Milne QC and Parry (n 2) for
detailed discussion on criminal frauds.
138
Fraud Act 2006.
139
Rider and others (n 135) 71–144.
140
Ibid 97–144.
141
Buckland, McNair and Lawson (n 96) 383–391.
142
Ibid 384.
143
Ibid.
144
Ibid 385.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 13 / Date: 16/7
JOBNAME: Rider PAGE: 14 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
‘definitely dishonest intent’ to cause harm to another. However, actio doli was wider
where it referred to simple dishonesty.145
145
Ibid.
146
James Edelman, ‘Nocton v. Lord Ashburton (1914)’, Landmark Cases in Equity (Hart
Publishing 2012) 473–498.
147
Ibid 478–479. This made misrepresentations about credit unactionable unless they were
in writing.
148
Michael Lobban, ‘Nineteenth Century Frauds in Company Formation: Derry v. Peek in
Context’ (1996) 112 Law Quarterly Review 287. See also Edelman (n 146) 473–498.
149
Stephen Waddams, ‘Equity in English Contract Law: The Impact of the Judicature Acts
(1873–75)’ (2012) 33 Journal of Legal History 185.
150
Francis John James Cadwallader, ‘In Pursuit of the Merchant Debtor and Bankrupt:
1066–1732’ (Thesis submitted for the Degree of Doctor of Philosophy in the Faculty of Law,
University of London 1965) 1.
151
Ulph, Tugendhat and Glister (n 94) 234–323. See also McGrath (n 1).
152
Ulph, Tugendhat and Glister (n 94) 124–234.
153
Ibid 36–121.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 14 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
protection legislation as well as Articles 6 and 8 of the human rights act.154 It is also
argued that placing dishonesty at the heart of the fraud offences breaches the principle
of certainty and human rights provisions.155 Meanwhile, the Court of Appeal has
indicated that market abuse and insider dealing are frauds.156
154
Grainne McKeever, ‘Balancing Rights and Responsibilities: The Case of Social Security
Fraud’ (2009) 16 Journal of Social Security Law 139.
155
Ashworth (n 135) 398–402.
156
R v McQuoid [2009] EWCA Crim 1301.
157
In Stephen, A History of the Criminal Law of England (n 5) 121–122. Sir Stephen said in
relation to fraud that ‘he shall not attempt to construct a definition which will meet every case in
which might be suggested …’. The present author’s conception of fraud is partly influenced by
this submission. See also McGrath (n 1) 5.
158
Consumers International (CI), ‘A Guide to Developing Consumer Protection Law’
<http://www.consumersinternational.org/media/715456/a-guide-to-developing-consumer-protection-
law.pdf> accessed 27 May 2015.
159
In practice, it appears that commercial fraud is less susceptible to confusion than
consumer fraud. Consumer fraud seems to have sharp opposing meanings in the literature both
in the sense where the consumer is the ‘culprit’ and ‘victim’. See Claudia Isabel Marues de
Abreu Lopes, ‘From Description to Explanation in Cross-National Research: The Case of
Economic Morality’ (PhD Dissertation, London School of Economics 2011). It is the present
author’s submission that where a business is the ‘victim’ it is better classified as commercial
fraud.
160
Donald P Rothschild and Bruce C Throne, ‘Criminal Consumer Fraud: A Victim-
Oriented Analysis’ (1976) 74 Michigan Law Review 661. The authors use chapters 1 and 2 of
the book of Micah as the Biblical origin of consumer fraud but this appears unclear.
161
See, for example, Consumer Protection from Unfair Trading Regulations 2008 and Unfair
Contract Terms Act 1977.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 15 / Date: 8/9
JOBNAME: Rider PAGE: 16 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
proceedings as the case may be. For instance, the conduct may be considered
unconscionable162 or dishonest or unlawful within the civil or the criminal senses
within a particular jurisdiction.
Consumer fraud is also distinguished from commercial fraud in the sense that the
ambit of protection offered to the consumer is often broader.163 Indeed, the law has
often taken account of this in considering the bargaining power of the parties.164
Further, administrative bodies are often established to protect the consumer whereas
this may not necessarily be the case for businesses.165 Moreover, while the basis of
liability in commercial fraud is principally contractual, and legal action is normally
between the parties in the transaction, protecting the vulnerable consumer against fraud
may sometimes involve the state bringing criminal proceedings against the defend-
ant.166 Cases in point are commercial torts, for example where a manufacturer produces
inherently dangerous products such as exploding ovens, defective automobiles and
harmful pharmaceutical products.167
162
Waddams, ‘Unconscionability in European Private Financial Transactions’ (n 93).
163
Consumers International (CI) (n 158).
164
See s (12) UCTA.
165
For example, The Office of Fair Trading (OFT).
166
Peter Cartwright, Consumer Protection and the Criminal Law: Law, Theory, and Policy
in the UK (Cambridge University Press 2001). See also Consumers International (CI) (n 158).
See also OFT, ‘Criminal Enforcement of the Consumer Protection from Unfair Trading
Regulations 2008 – OFT Policy OFT1273’ <http://webarchive.nationalarchives.gov.uk/
20140402142426/http://www.oft.gov.uk/shared_oft/policy/OFT1273.pdf> accessed 20 May
2015.
167
Consumers International (CI) (n 158).
168
This is commonly referred to as Business to Business (B2B) and Business to Consumer
(B2C) transactions.
169
Consumers International (CI) (n 158).
170
Peter Cartwright, ‘The Vulnerable Consumer of Financial Services: Law, Policy and
Regulation’ <http://www.nottingham.ac.uk/business/businesscentres/crbfs/documents/research
reports/paper78.pdf> accessed 20 May 2015.
171
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 16 / Date: 16/7
JOBNAME: Rider PAGE: 17 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
Fraud has been on an interesting journey, perhaps to an uncertain destination.172
Technology is influencing this uncertainty.173 Man’s quest to commit fraud is infinite
and to so suggest is no mark of metaphysical omniscience. Laws are thus necessary
tools to combat fraud. Nevertheless, in view of its acknowledged limitations, reliance
on law alone amounts to complacent optimism. Consequently, promoting moral values
must form part of the plethora of approaches in combating fraud.174 It is similarly
prudent to draw lessons from history and other jurisdictions. English equitable rules
evolved in the Chancery, which became crucial in regulating fraud partly emanated
from canon law.175 This confirms the merits of the comparative approach to regulating
fraud. In this regard, Rider is a signpost. This chapter draws on history, morality and
law and advances the merits of the comparative approach to regulating fraud.
172
See Barry Rider, ‘Dealing with the Dark Side of Business – the Way Ahead!’
<www.fiurmalta.org/library/PDF/Prof%20Barry%20Rider%20(1).pdf> accessed 20 June 2013.
173
See the high technology fraud in Michael Lewis, Flashboys: Cracking the Money Code
(Allen Lane 2014). The BBC has reported that Barclays Bank is being sued by US authorities
for this ‘dark pool’ fraud – see ‘Barclays Accused of “Dark Pool” Fraud’ (The British
Broadcasting Corporation (BBC) 2014) <www.bbc.co.uk/news/28030351> accessed 26 June
2014.
174
Schaefer and Bickel (n 36).
175
Holdsworth, ‘The Relation of the Equity Administered by the Common Law Judges to
the Equity Administered by the Chancellor’ (n 80).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 02 /Pg. Position: 17 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
In recent decades the financial sectors of Australia, the UK, the US and indeed most
countries have not enjoyed great popularity with the broader community as the
repercussions of the Global Financial Crisis (GFC) continue to unwind and scandals
roll across the front pages of newspapers and television screens with depressing
regularity.1 For example in the UK, the mis-selling of pensions scandal in the 1980s
and early 1990s, when UK regulatory authorities acknowledged that as many as
1,500,000 people may have been wrongly advised to withdraw from company pension
schemes by insurance companies and financial advisers.2 And guess what? In eerily
similar contexts, through 2012 and 2013 it became increasingly clear that systematic
payment protection insurance mis-selling had been undertaken by UK banks for many
years, showing how little they had learnt (cared?) about the lessons of the pensions
mis-selling scandal twenty years earlier. Since the latest mis-selling scandal was
exposed, UK banks have set aside more than £12 billion to cover compensation to their
customers for mis-selling them payment protection insurance; Lloyds Banking Group
alone has set aside £5.3 billion.3
For a London based financial sector scandal which has global implications it is hard
to escape the ongoing investigations and potential future prosecutions by regulatory
authorities surrounding systematic manipulation of the London Interbank Offered Rate
(Libor).4 The enormous scale of the Libor scandal was acknowledged by then Assistant
1
For example, a November 2012 poll of more than 1,000 adults by US pollster Gallup
found that stockbrokers ranked 18 across a range of 22 professions in terms of perceived honesty
and ethical conduct. This placed them above advertising practitioners, Members of Congress and
car salespeople, but below many others including insurance salespeople, lawyers and business
executives. Obviously, this is not conclusive in any way but it is an indicator of low public
esteem. See: Gallup Politics, ‘Congress Retains Low Honesty Rating’, 2 December 2012,
http://www.gallup.com/poll/159035/congress-retains-low-honesty-rating.aspx.
2
See: Financial Services Authority, ‘The FSA Launch Final Reminder to Consumers
Mis-sold a Pension’, 7 February 2000, http://www.fsa.gov.uk/library/communication/pr/2000/
022.shtml.
3
See: D. Schafer and J. Thompson, ‘Lloyds Fined £4.3m for PPI Delays’, Financial Times,
19 February 2013, http://www.ft.com/intl/cms/s/0/506ce648-7a88-11e2-9c88-00144feabdc0.
html#axzz2M9rextmf; and Financial Services Authority, Payment Protection Insurance, 2013,
http:// www.fsa.gov.uk/consumerinformation/ product_news/ insurance/payment_protection_
insurance_.
4
See for example: Department of Justice, ‘UBS Securities Japan Co. Ltd. to Plead Guilty to
Felony Wire Fraud for Long-running Manipulation of LIBOR Benchmark Interest Rates’ (Press
Release, Washington, DC, 19 December 2012), http://www.justice.gov/opa/pr/2012/December/
32
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Financial Crime: A Guide for Firms.10 The FCA’s predecessor, the Financial Services
Authority (FSA), previously stated that financial crime included any offence involving
money laundering, fraud or dishonesty, or market abuse.11 In the view of the
Government of Liechtenstein: ‘There is no generally valid definition of financial crime.
At a minimum, it includes money laundering, organized crime, and the financing of
terrorism.’12 So there seems to be underlying uncertainty globally regarding exactly
what financial crime is, a lack of specificity about financial crime offences per se, but
nevertheless nuanced understandings about what behaviours might be included under
the label. So, if we accept that a hermetic definition of financial crime may be a step
too far at the present time, how long has financial crime been around as a problem for
various societies?
10
Financial Conduct Authority, Financial Crime: A Guide for Firms, http://fshandbook.info/
FS/html/handbook/FC/link/PDF.
11
Financial Services Authority, Fighting Financial Crime, 2012, http://www.fsa.gov.uk/
about/what/financial_crime.
12
Portal of the Principality of Liechtenstein, What is Financial Crime, http://www.
liechtenstein.li/en/eliechtenstein_main_sites/portal_fuerstentum_liechtenstein/fl-wuf-wirtschaft_
finanzen/fl-wuf-finanzdienstleistungen/fl-wuf-finanzdienstleistungen-finanzkriminalitaet/fl-wuf-
finanzdienstleistungen-finanzkriminalitaet-was.htm.
13
H. Croall, White-Collar Crime, (Open University Press, 1992), 8.
14
B.M. Mitnick, The Political Economy of Regulation, (Columbia University Press, 1980),
243.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 3 / Date: 31/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
praxis and approaches to financial regulation and financial crime not only in the UK,
but also in Australia, the US and elsewhere.
In England, from 400 to 1200 there was a change from tribalism, via feudalism, to
nationalism. State justice replaced feudal justice and common law emerged as the law
of the Crown available to all men. The principles of common law grew from the forms
of justice administered by the King’s courts.15 The common law helped shape
contemporary social structures and it promoted the belief that commercial transactions
were essentially private in nature. This idea was rooted in the practice of the late
Middle Ages when the Crown deferred to the professional expertise of the merchant
guilds and permitted them to develop rules governing trade. During the fourteenth
century the main commercial towns were granted Courts of Staple in which merchants
judged their own customs, and this law merchant was absorbed into the common law.
This process was accelerated by the eighteenth-century judiciary led by Lord Mans-
field, who empanelled special jurors from the City to determine crucial cases on the
import of financial, insurance and trading customs, and these activities helped to shape
contemporary understandings of what might be considered financial crime.16 Even as
late as the nineteenth century, in England many economic and political functions, as
well as the administration of the civil and criminal law itself, continued to operate in
many ways at a local rather than a centralised level. This strong local emphasis and
lack of central state interference heavily influenced the development of English markets
and industries. All English markets, and not just London’s financial markets, have firm,
long-held traditions of self-regulation. They are legally grounded in the law merchant
and common law, and have at their heart the belief that commerce is a domain of
private transactions. As the Anglo and, later, Anglo-American model of financial
capitalism have come to be so influential in shaping global financial markets, so have
these traditions been influential in shaping understandings of, and responses to,
financial crime.
Thus the regulation of securities in Britain derives from the theories of markets, with
the concept of barter markets being the earliest authority. In England, from AD 1000 a
sophisticated form of market regulation begins to emerge. Its central purpose was to
introduce more certainty into economic exchange by impacting upon the processes of
supply and demand. The contemporary concern about threats posed by financial crime
can be seen in the establishment of the ancient common law offences of engrossing
(e.g. buying large quantities of a commodity such as corn to gain market dominance,
forcing up prices and then selling on at inflated prices), forestalling (raising the price of
certain goods by holding up supplies of commodities) and regrating (e.g. buying corn
or other grains in any market so as to raise the price, and then selling it again in the
same place). All were rendered statutory offences in the fourteenth century.17 These
brief examples demonstrate that market manipulations such as the rigging of the Libor
rates are not exclusively modern phenomena and neither are regulatory efforts to
counter their effects. As is true of many contemporary regulatory initiatives, these
15
J.H. Baker, An Introduction to English Legal History, (Butterworths, 1990), 63.
16
W.R. Cornish and G. de Clark, Law and Society in England 1750–1950, (Sweet &
Maxwell, 1989).
17
Statutes of the Realm (1363) 37 Edw. III c8.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
statutes were a legislative response to the social and political pressures exerted by the
moral economy of English society at that time. These pressures often stimulated crowd
protest, and for several hundred years mass protest was a common response to grain
shortages.18 Also it is important to note that these common law offences of engrossing,
forestalling and regrating are indicators of a long tradition of state-legitimated
interference in markets, a tradition that it is fundamental to consider when examining
how financial crime has come to be recognised and countered under more modern legal
processes.
The earliest statutory instances of City regulation relate to brokers, and the most
significant early Acts were: 13 Edward I stat.5 [1284]; I James I c.21 [1604]; 8 & 9
William III c.32 [1697]; 6 Anne c.16 [1707]; 10 Anne c.19 [1711]; 6 George I c.18
[1720]; 3 George II c.31 [1730]; 7 George c.8 [1734].19 The 1284 statute authorised
the Court of Aldermen to license brokers (or broggers as they were then called) in the
City and also to prosecute unlicensed brokers.20 From one perspective this licensing
initiative can be seen as a direct regulatory initiative to improve industry operating
standards and counter financial crime. Viewed slightly differently, this statute can be
seen as firmly establishing the traditions of self-regulation and restrictive trade
practices in the City as reward for its financial and political support of the Crown.
As we have seen in recent times as first the GFC and then scandals such as Libor
have unfolded, public concerns about inappropriate market behaviours and their
regulation can intensify during periods of market crisis. This is not a new development
and neither are contemporary concerns about financial crime in financial markets. For
example, during the boom of 1693–1695 and the crisis that followed, a parliamentary
inquiry was appointed in November 1696 ‘to look after the Trade of England’ as a
response to widespread public disquiet about the rapacious nature of England’s early
capital markets. There were significant levels of public anger about market manipu-
lation and widespread accusations that brokers were manipulating rumours about
foreign wars and share prices in order to increase their volumes of trade.21 The Royal
Commissioners were alarmed by the promotion of frauds and manipulation of the
market; they complained that:
The pernicious Art of Stock-jobbing hath, of late, … wholly perverted the End and Design of
Companies and Corporations, erected for the introducing, or carrying on of Manafactures, …
by selling their shares for much more than they are really worth … Thus, … the Management
of that Trade and Stock comes to fall into unskilful Hands, whereby the Manafactures …
dwindle away to nothing.22
18
See for example: G. Rude, The Crowd in History: A Study of Popular Disturbances in
France and England 1730–1848, (Wiley, 1964); and E.P. Thompson, ‘The Moral Economy of
the English Crowd in the Eighteenth Century’, (1971) 50 Past and Present, 76.
19
F. Baily, The Rights of the Stock-Broker defended against the Attacks of the City of
London, (W.J. and J. Richardson, 1806), v.
20
L. Loss, Fundamentals of Securities Regulation, (Little Brown and Company, 1983), 1.
21
T. Mortimer, Every Man His Own Broker, (S. Hooper, 1791), 40.
22
House of Commons Journals, (London, 1696), 25 November 1696.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
The Buyers for Ready Money are allowed to be the Gentry and Merchants, as well as the
Buyers for Trust, and the cunning Jewellers are the same in both Cases, viz, the late
Directors, their Agents, Confederates, Brokers and Stock Jobbers, who by a dismal reverse in
Affairs have, by Collusion and Fraud, raised Fortunes to themselves, too large for any
Subjects …
But as all honest Men will consider, that there are a great many of these Bargains, which
stand in the Names of these hidden and secret Villains.24
Much as there is widespread anxiety and frustration today about how few prosecutions
have emerged from the GFC, so three hundred years earlier there was fear and
resentment about perceived dishonesty and criminal behaviour in the markets of the
City. Entry to the great companies and guilds was through family links and apprentice-
ship. These arrangements created the conditions for the dictum meum pactum – ‘my
word is my bond’ – approach, which has influenced the development of commerce in
all countries, but has dominated the operational culture of the City. Transgressors of
this ‘club code’ rarely faced criminal proceedings. Instead they were merely shut out of
the City’s social and professional life by the actions of a remarkably effective peer
network. The threat of social ostracism generally ensured the security of transactions
on the London Stock Exchange. Over a prolonged period it was the most enduring and
powerful sanction in the regulation of the City. In effect it was this social dimension
that traditionally has been a significant defence against financial crime. That it could be
so was due to the sense of tightly knit community, which was one of the great strengths
of the City because it increased its capacity to provide high levels of certainty in the
social organisation of trust.
The structural properties of trust relationships have always underpinned the ideology
of commercial exchange, but their importance is accentuated in financial services.
Symbolic proxies such as share certificates, contracts, mortgages, letters of credit and
cheques are exchanged for other symbolic proxies that may or may not equate with
tangible goods. These structures of trust are vulnerable to violation or manipulation.
However, the tightly knit community of the City and its attendant organisational
structures allowed it for a long period of time to claim that it could offer a reasonable
degree of trustworthiness to contemporary investors. This was an important factor in
helping London secure its pre-eminent position as a financial centre and has helped to
entrench self-regulatory traditions in responding to perceived threats from financial
23
Gallup, above n1.
24
Anon, Some Considerations with respect to the Bill for preventing the infamous Practice
of Stock-Jobbing; being Remarks upon the Supplement to the Reasons for making void and
annulling those Fraudulent and Usurious Contracts, into which etc. and upon the Reply to a
modest Paper, etc. both delivered at the Door of the House of Commons on Friday last, (London,
1721).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
25
See for example: J. Carswell, The South Sea Bubble, (Cresset Press, 1960).
26
R v Caywood 1 [1723] Stra 472 and 2 Ld Ray 1362.
27
J. Welby, ‘Do Business Ethics Matter?’(1992) 3 International Company and Commercial
Law Review, 45.
28
G. Robb, White-Collar Crime in Modern England: Financial Fraud and Business
Morality, 1845–1929, (Cambridge University Press, 1992), 11.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
‘Sirs, we disregarded for years Sir John Barnard’s Act and we are now disregarding in
the same measure Mr. Leeman’s Act.’29
It is difficult to imagine any other business interest group openly defying a
parliamentary committee and statutory instruments in such a manner, but it indicates
the confidence of a disparate arrangement of groups and individuals in the City with
shared economic interests in being able to tailor the discourse that constructs the
regulation of their activities. A key explanatory factor for this is that the City has been
tremendously successful in having its own interests widely identified as converging
with the public interest on matters of financial regulation. This ability to shape
perceptions of what entails the public interest has interacted with broader legal
developments to influence significantly the City’s financial markets and their regu-
lation, and these traditions have been exported to a significant degree to other finance
centres such as New York. Like other powerful actors, the City has been able to set
goals for the general interests of society. The utility that its regulatory authority has
held for the diverse interests that constitute the City is the fact that its cultural norms
and values were for many years adopted as conventional working practice in the UK
financial sector. Constellations of interests in the City have been successful in
projecting their preferred model of financial regulation and routinised social and
business practices as the natural social and economic order, thereby ensuring its
hegemony.30
Similar processes are at work today in London and in other finance centres around
the world, in the management of conflicts and with regard to many other issues that
may provide the space within which financial crime can occur. We should not be too
surprised by this because regulation can be viewed as a commodity, a raw material
which is subject to market forces and may be facilitative, inherently contradictory,
manipulative and complex. The twin pressures of special interest groups and market
forces remain extremely influential in shaping contemporary regulatory praxis in
financial services in the UK and elsewhere, just as they have done for centuries. In a
market society much power lies with capital resources, and those involved with the
raising, organisation and marketing of capital have great influence. Also, the complex-
ity of the financial services industry excludes most people from being able to evaluate
specifically its processes, and it is within this paradigm that the evolution of financial
crime and recent scandals such as Libor should be understood.
29
House of Commons Journals, (London, 1875).
30
See: G. Gilligan, Regulating the Financial Services Sector, (Kluwer Law International,
1999).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
which highlights the operational culture of the firm and the industry at the time and
contains some graphic examples of the callous indifference of some traders to the
well-being of their clients. For example, in April 1994, the reaction of Morgan
Stanley’s leader John Mack to the increasing derivatives losses of some of Morgan
Stanley’s clients was allegedly: ‘There’s blood in the water. Let’s go kill someone.’31
Partnoy writes how a fellow salesman described his sale of a Principal Exchange Rate
Linked Security (PERLS) derivatives trade to a treasury officer of an insurance
company who did not understand the trade as ‘… ripping his face off’.32 The latitude
that derivatives traders received from their controllers was largely explained by the
enormous profits that they generated for their firm: ‘From 1993 to 1995 … the seventy
or so people … in the derivatives group at Morgan Stanley in New York, London, and
Tokyo generated total fees of about $1 billion – an average of almost $15 million …
arguably the most profitable group of people in the world.’33
This observation goes to one of the core issues that drives the culture of financial
firms and can stimulate some of the worst excesses of financial crime – the incentive
regimes for individuals within financial firms that are designed to generate fees and
profits for the firm. The short-termism orientation of incentive systems is a major
determinant of the culture within a particular firm and within the finance industry more
generally. Skewed short-term incentives structures can motivate individuals and organ-
isational units to commit financial crime even if simultaneously they may seek to
neutralise and thus internally legitimate such behaviour. Over the years it has been a
crucial factor stimulating tolerance of business misconduct as many financial profes-
sionals such as Partnoy and his colleagues at Morgan Stanley normalise these activities
as being relatively unexceptional. This is achieved through the same techniques of
neutralisation utilised by the juvenile delinquents studied by Sykes and Matza in the
1960s: i) denial of responsibility; ii) denial of injury; iii) denial of the victim; iv)
condemnation of the condemners; v) appeal to higher loyalties.34 These neutralisation
processes were apparent in the behaviours of many of those involved in the manipu-
lation of Libor and other financial scandals over the years. If the prevailing rapacious
culture of the finance industry is to improve for the better, then these neutralisation
tendencies and short-termism incentive structures need to be rolled back.
As we have seen, the regulatory traditions of a financial centre will also shape the
prevailing operational cultures of financial actors and financial markets, whether
centuries ago in the City or in contemporary interconnected but disintermediated
financial trading zones. This will directly impact upon levels, reach and intensity of
financial crime. Generally, firms and individuals are evaluated in terms of economic
performance, and in some situations regulatory compliance may inhibit their economic
success. Consequently, as was made clear as the GFC unwound, there can be
organisational tendencies towards regulatory deviance and behaviours that might come
31
F. Partnoy, F.I.A.S.C.O. – Blood in the Water on Wall Street, (W.W. Norton & Co., 1997),
15.
32
Ibid, 61.
33
Ibid, 13.
34
G.M. Sykes and D. Matza, ‘Techniques of Delinquency’, in M. Wolfgang, L. Savitz and
M. Johnston, (eds), The Sociology of Crime and Delinquency, (John Wiley, 1970), 295.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
under the banner of financial crime even if not prosecuted as criminal offences.
However, it is extremely difficult to evaluate exactly how much financial crime is
systemic, calculated or due to individual self-interest. Intensive analysis of the
sociology of compliance can help build a picture of the relative influence of these
factors, thereby assisting regulators in their work and financial organisations in
strengthening their operational cultures to reduce financial crime.
The most significant element in regulatory compliance and avoiding financial crime
is the choice by people to comply. This occurs as part of their reflexive theoretical
understanding of their own personal standing within an organisation or industry and/or
in response to their own sets of normative values. This is perhaps the area of greatest
potential for crime prevention programmes in all business, not just finance – impacting
upon individuals within organisations and activating their own value systems to work
towards crime prevention, reducing and/or eliminating bad behaviour in organisations,
re-aligning incentive structures, improving organisational cultures and prioritisation of
the public interest.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 03 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
ORGANIZED CRIME
Professor Barry Rider has described the characteristics of organized criminal activity,
regardless of the illegal commodity involved. They include:2
1
The views expressed are those of the writer and do not necessarily reflect those of the
Government of Canada.
2
B.A.K. Rider, “Organized Economic Crime”, paper presented to the Richards Butler
Seminar on Economic Crime, 9 February 1990; quoted in B.V. Kumar, “Economic Crime and Its
Impact on Democracy”, Taxindiaonline.com, 2009, online at http://www.taxindiaonline.com/, at
p. 2.
42
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Triads to the Yakuza of Japan, motorcycle gangs in Australia and Canada, the Mafia in
Italy and the United States, Russian organized crime in many parts of the world and
Central American drug cartels, to name but a very few.
They also differ depending on their commodity/commodities of choice. Whether they
operate drug trafficking rings, fraud syndicates, protection rackets, illegal prostitution
or gaming ventures, counterfeit rings – the common factors are that their activities are
illegal and for profit. Increasingly they are crossing borders and diversifying their
commodities of choice.
An interesting characteristic of sophisticated criminal organizations is their bi-
furcated nature. The targeting side of the operation is matched by a parallel money
laundering structure which spins and ultimately obfuscates the money trail, examples
being a South American drug cartel, the Hells Angels in Canada, the Italian Mafia,
Russian organized crime, and Mexican drug lords.
A good example of this characteristic is telemarketing fraud, which targets senior
citizens, either through phone calls or e-mail messages. Mini boiler rooms, easily
transportable, work out of Toronto, Montreal, and other cities, using “sucker” lists to
call persons in Canada, the United States, the United Kingdom, and other English-
speaking countries. This form of 419 or West African fraud is widespread. The truly
gullible are duped into meeting their callers in a relatively safe third country, such as
the Netherlands, whose citizens have not traditionally been targets of the scammers.
Millions of dollars are lost annually in this fashion. The money obtained by the
scammers follows an entirely different route to its eventual destination, either through
bulk smuggling or electronic transfer. Experts within the organized crime ring disguise
the money trail, ensuring that an invisible wall exists between the perpetrators of the
initial fraud and the money movers.
The upscale version of telemarketing fraud is phishing and all of its variants, in
which criminals mimic or clone financial websites, in the hope of duping persons
reading their e-mail into providing passwords and other personal information, which
can then be used, traded, or sold for identity theft purposes. These are really
rudimentary schemes, but are by their very nature international in scope and dealing
with them requires co-operation between authorities from multiple countries, often-
times involving different legal systems. Telemarketing fraud is perfectly quaint,
however, by comparison to what is on the horizon, and that horizon is bearing down on
us at a frightening speed.
Of greatest concern is the merger of organized crime and terrorist groups in many
parts of the world, particularly in drug producing and exporting countries and where
nations are in conflict. Examples include Mexico and various Central American and
Middle Eastern countries. Criminals with a religious or political agenda utilize the
profits of their criminality to fund terrorist activities. The result is that organized crime
has become an amorphous beast.
TECHNOLOGY
Developments in transportation and communications have revolutionized the way
humans travel and interrelate. Air travel has become the rail and boat travel of a
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
hundred years ago. The internet is today’s post office. Cellular phones, electronic
messaging, encryption, and satellites permit instant and relatively secure communica-
tions to those who succumb to the temptation and embrace what is available.
McLuhan’s global village is a reality.3 The world is no longer beyond one’s reach –
unless you are very poor.
For all the advantages that technology, transportation, and communications provide,
there are disadvantages. Criminal organizations have also embraced these mediums in
order to streamline, expand, and profit on a global basis. In the words of Canada’s
Minister of Justice, spoken over thirty years ago:4
Increasingly we are seeing the effects of criminal organizations operating both from within
and without this country that are totally dedicated to the commission of crime for profit.
These organizations take advantage of modern communications, transportation and corporate
structure to frustrate the reach of national legal systems to amass illicit and illegal wealth.
The sheer magnitude of the internet is hard to fathom. In 2012, James Josh wrote that
during every minute of the day, 205 million e-mail messages are sent, two million
Google queries are made, 685,000 information items are shared on Facebook, 571 new
websites are created, and 100,000 tweets occur.5 The understanding of our youth with
respect to technology is outstripping our ability to deliver in some learning environ-
ments, while the pace of technological advances is outstripping our ability to react to
emerging events.
A key example of this is the development of virtual currencies. Arising out of the
shadowy side of internet gaming, virtual currencies captured the media spotlight and
went mainstream in 2013, driven in large part by the success (and controversy)
surrounding Bitcoin, a digital currency without a physical presence, which is
exchanged through computer transactions. Users install a wallet on their computer or
mobile phone, which permits the sending and receiving of Bitcoin payments. From
there, the party’s Bitcoin address and Internet Protocol or IP address are transmitted to
a clearing site for verification. A number of other virtual currencies have followed suit.
In order to obtain Bitcoin, one must transfer national currency into Bitcoin. The
opening of the first automated teller machines for Bitcoin purchases fuelled media
interest. Stories were featured of individuals and small businesses which began
accepting Bitcoin as currency in trade for purchases and sales. In the murky
underworld, virtual currency is traded, gambled, and used to pay off debts.
Although there have been incidents of Bitcoin theft as a result of compromised
wallets or information, the controversy surrounding it is largely fuelled by the secretive
3
See Marshall McLuhan, The Gutenberg Galaxy: The Making of Typographic Man
(Toronto: University Press, 1962).
4
House of Commons Debates, 14 September 1987 at p. 8888. For a discussion of the
emergence of transnational crime and its impact on the criminal law, see United States of
America v. Cotroni [1989] 1 S.C.R. 1469.
5
James Josh, http://www.domo.com/blog/2012/06/how-much-data-is-created-every-minute/,
as referenced by John Sliter, “‘Techno-Risk – The Perils of Learning and Sharing Everything’
From a Criminal Information Sharing Perspective”, unpub. paper, Cambridge Symposium on
Economic Crime, 3 September 2012.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
nature of its development, ownership, and distribution. Its “pseudo-anonymity” and the
lack of regulation surrounding virtual currency prompted Canada’s Department of
Finance to warn that it can prove to be “an attractive payment method for criminals”.
The combination of anonymity, the ability to purchase Bitcoin with currency, the ease
of movement across borders, and the lack of restrictions concerning deposits and
withdrawals all contributed to this concern.6
The brave new world of cyber-technology is evident for all to see, even if very few
understand its machinations. One need only read the local paper. In 2013, Target
Corporation, a huge North American retailer, was struck by hackers who made off with
40 million payment card numbers. They entered the Target computer system through a
weak external link, thanks to a ventilation contractor’s stolen password. In 2014, a
Canadian was arrested in Florida by U.S. federal agents carrying US$300,000 in online
currency in his laptop and electronic wallet. The currency was allegedly proceeds from
the Target credit card compromise.7
Also in 2014, JP Morgan’s network appears to have been breached through an
employee’s personal computer, tethered to its network by an external link. The attack,
using malicious computer code, may have affected other banks. Supervalu Inc., which
manages the technology for some 1,000 grocery stores, was also successfully hacked.
Cyber-attacks are classic examples of crimes which, for the purpose of investigation,
require the sharing of information and intelligence, on a priority basis, between public
and private entities.
In 2007, an international group of senior police chiefs, including from the UK, the
United States, the Netherlands, Australia, Hong Kong, and Singapore among others,
created scenarios in order to predict what the future held for policing.8 The chiefs
recognized that technology would radically change the way we communicate and that
society would soon exchange ideas via computers and handhelds. They recognized that
organized crime and terrorist groups would be able to communicate securely and could
mobilize adherents to a cause through the use of social networking. A video was
produced which quite dramatically portrayed the nightmarish scenario of an individual,
“a lone wolf”, who was able to incite riots in countries around the world simply by
harnessing what we now refer to as social media.
The chiefs of police predicted that this form of chaos would be possible by 2020.
Little did they realize that the world would witness an explosion of social media –
e-mail, Facebook, Twitter, wireless internet, cheap computers and cell phones, which
collectively helped to ignite the Arab Spring. The decade which they predicted turned
out to be less than four years.
During the uprisings in North Africa in 2011, the toppled dictatorships and
kleptocracies could not prevent the masses from communicating, and communicating
effectively, with a united purpose. When governments shut down their phone systems,
citizens turned to the internet. When governments shut down the internet service
providers, people moved to social networking.
6
The Canadian Press, “Bitcoin Crime Potential Flagged”, Victoria Times-Colonist, 29 July
2014, p. B4.
7
“Suspicious Finds”, CPA Magazine, August 2014, p. 35 at p. 37.
8
The “Pearls of Policing” initiative of the Dutch Federal Police.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
There are numerous other examples of crowds mobilizing in a very short period of
time as a result of instant messaging – the G20 protests in Toronto in 2010 and the
Ferguson riots in Missouri in 2014 are but two of these.
The rise of the Islamic State movement, or ISIS, and its strange, radicalized form of
Muslim fundamentalism, like Al Qaida before it, has both frightened and outraged the
world. Its summary executions are reminiscent of similar efforts at ethnic cleansing,
practised by the Nazis in Germany, the Khmer Rouge in Cambodia, and by warring
factions in the former Yugoslavia and elsewhere. What is particularly troubling to the
Western world is the appeal of ISIS to native sons and daughters in Britain, Canada, the
United States, and elsewhere. How does an apparently ordinary youth from one of
those countries become an executioner wearing a mask in a foreign land?
ISIS is a master at harnessing social media. It urges youth to join the cause, making
the pitch that they have an obligation to join. Its media teams have not only created
videos of mass executions, designed to scare opponents into submission; but also
videos of an idyllic land, the Caliphate of Iraq and Syria, where devout Muslims can
live in harmony with fellow believers.
The ISIS media barrage surprised investigators, forcing the removal in early 2014, by
U.K. authorities, of over 1,100 pieces of content from the web for allegedly breaching
British terrorism laws. ISIS quickly redirected its barrage elsewhere. Social media
savvy wings of ISIS have posted material on Twitter, Facebook, You Tube and other
sites, published articles, translated jihadi material, and produced professional videos.
Mujatweets lob soft recruiting material at foreign youth, including postings from
foreign nationals who have embraced “the vision”. Battlefield updates, the glorification
of violence, and the subjugation of women are recurring themes. The use of hashtags in
front of the acronyms for Western mainstream media and events is intended to target
unsuspecting individuals with the ISIS rhetoric.
This is but a teaser of what is to come. Nanotechnology, CCTV, facial recognition
software, driverless automobiles, GPS tracking, and intelligent mapping are but a few
of the amazing new applications which already exist and are being moved into the
public domain. The flip side of the equation involves false social media accounts,
affinity fraud, profile cloning, information mining, spear phishing, and spam – lots
of it.
MONEY LAUNDERING
The phenomenon of money laundering captured headlines throughout Europe and
North America during the 1980s. Although integral to many forms of criminal activity,
drug trafficking unquestionably raised its international profile. Illegal drug use peaked
in the United States during the late 1970s and early 1980s, and was variously described
as both an epidemic and an emergency. The rise of transnational organized crime
groups exacerbated the concerns over drug use.
Similar in many ways to legitimate enterprises, criminal organizations are self-
sustaining, unaffected by the arrival or departure of individual members. Money has
often been described as the “golden thread” which ties syndicates together. With the
development of large drug cartels and the trans-border shipment of illegal drugs by all
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
manner of conveyance, the financial proceeds of the drug trade increased exponentially.
These proceeds crossed borders with relative impunity, in tangible or electronic form,
and often changed appearance many times before reaching a final destination.
Just as money is the golden thread, it has also been described as the “Achilles heel”
of organized crime. As a result, the United States, the United Kingdom, Canada, and
many other countries have joined in what can best be described as a two prong attack
on drugs and the profits from their sale.
Despite its recent notoriety, profit-oriented crime and the laundering of those profits
is by no means new. Many have attempted to trace the origins of money laundering,
without success. Barry Rider notes that the “objectives and essential modus operandi”
of modern money launderers are no different than those of “the gem carriers of India or
the Knights Templar”.9
The modern era of money laundering is often associated with the development of the
Cosa Nostra during America’s Prohibition in the 1920s and 1930s. Meyer Lansky was
the mob’s banker. In addition to being credited with developing Las Vegas into an
international gambling mecca, Lansky pioneered the use of private banking for criminal
purposes, and laundering assets through onshore and offshore havens, including Swiss
and Bahamian banks.10
Money laundering occurs in many forms and in most sectors of the economy. It
involves deposit-taking institutions, currency exchange houses, the securities industry,11
real estate, commercial trading, corporations, gold and precious gem merchants, cash
purchases of expensive items, gambling, the insurance industry, lawyer’s trust accounts,
and accounting firms.
Of all these conduits, deposit-taking institutions, which encompass chartered banks,
credit unions, building societies, caisses populaires, and trust companies, are of
greatest importance, as they “represent a perfect vehicle to provide the legitimization of
illicit money while maintaining anonymity for the criminal enterprise”.12
Through the process of placement, layering, and integration,13 the money launderer
will effectively accomplish three objectives: conversion of bulk proceeds of crime into
9
Barry A.K. Rider, “Law: The War on Terror and Crime and the Offshore Centres: The
‘New’ Perspective?” in Donato Masciandaro, ed. Global Financial Crime (Aldershot, Eng.:
Ashgate, 2004) at p. 63.
10
The term “offshore” havens or financial centres is commonly used in two ways; first, to
loosely describe any country outside the borders of one’s own country and, second, to describe
typically small, island jurisdictions which have acquired a reputation as tax havens. Stung by the
impact of international sanctions, many island nations have argued that they were unfairly
targeted while “onshore” financial centres, which provide similar services, were not. The
International Monetary Fund (IMF) recently ended its use of the word, “offshore” (Vanessa
Houlder, “IMF to Erase ‘Offshore’ Centre Stigma”, Financial Times, ed1, London, 15 July
2008).
11
Stock markets are an excellent vehicle for laundering large sums of money in electronic
form, through match trading and through the use of convertible debentures.
12
Margaret E. Beare and Stephen Schneider, Tracing of Illicit Funds: Money Laundering in
Canada No.1990-05 (Ottawa: Solicitor General Canada, 1990). An update can be found in
Beare, Criminal Conspiracies: Organized Crime in Canada (Toronto: Nelson, 1996) at p. 101.
13
For definitional purposes, the money laundering process is almost always divided into
three stages: placement of the dirty money in a financial vehicle, layering the money by moving
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
another form, concealment of its origin and ownership, and creation of an “alibi” for
the funds.14 It is in the layering stage where technology plays the greatest role.
Technology permits the instantaneous movement of money over many thousands of
miles. A classic money laundering typology is the “black market peso exchange”,
common among Colombian drug dealers over the past decades, as they trafficked their
product to the United States and Western Europe, while facing restrictive currency
controls and tax regimes at home. Ray Kelly, former Commissioner of the U.S.
Customs Service, described the scheme as “perhaps the largest, most insidious money
laundering system in the Western Hemisphere”. It allows the world of commerce to
mask money laundering, while also removing the risk to traffickers of dealing with
proceeds of crime.15
In the black market peso exchange, a drug trafficker sells his product and receives
U.S. dollars or Euros in exchange. These proceeds are then sold to a currency trader in
the United States or Europe, who exchanges pesos, which he controls in Colombia, for
the dollars or euros in the hands of the traffickers. At this point, the drug traffickers
obtain the pesos in Colombia and have accomplished their purpose. The broker then
launders the U.S. dollars or euros by selling them to a Colombian importer, or by
purchasing goods from manufacturers, on behalf of Colombia importers. These goods
enter Colombia illegally, avoiding the payment of tariffs and charges. The broker
replenishes his peso account in Colombia once the goods are delivered. He will
typically be paid a commission from both sides and will also benefit from fluctuating
exchange rates.
Governments, corporations, and individuals can disguise their financial books by
laundering the losses from risky or illegal ventures through offshore centres.16 Jeffrey
Robinson refers to this as the “Lansky Syllogism” – if money cannot be followed, it
cannot be found; and if it can’t be found, it can’t be taxed.17 Offshore centres vary from
those which studiously avoid receiving non-tax, criminal proceeds, to others which are
virtual funnels for flight capital. The impact of offshore centres on developed
economies is believed to have had a catalytic effect on financial crises in Asia during
the 1990s and on North American corporate scandals in the past decade.
it through other vehicles, and integration into the legitimate economy. Each stage can manifest
itself in many different ways. For example, the relative importance of cash and the decreased
availability of electronic banking in the developing world makes money laundering in those
countries appear quite different from that in developed nations. See, generally, B.V. Kumar,
“India: The Misuse and Abuse of Legal Provisions in Money Laundering”, (1997) Journal of
Financial Crime V4:3, p. 257.
14
Stephen Schneider, “The Incorporation and Operation of Criminally Controlled Com-
panies”, (2003) Journal of Money Laundering Control V7:2, p. 126. Schneider provides
numerous examples of money laundering vehicles and schemes.
15
Oriana Zill and Lowell Bergman, “The Black Peso Money Laundering System”, PBS
Frontline Drug Wars, p. 3, online at http://www.pbs.org/wgbh/pages/frontline/shows/drugs/
special/blackpeso.html.
16
Jeffrey Robinson, The Sink: Crime, Terror and Dirty Money in the Offshore World
(Toronto: McCelland & Stewart, 2003) at p. 8. For example, Canadian banks have the largest
presence of any nation in the Caribbean, offering various degrees of banking secrecy.
17
Ibid. at p. 15.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Money can be wired offshore in nanoseconds, frustrating audit trails, and allowing
hoarding in foreign countries. Trade barriers have been relaxed and borders seldom
present the difficulties which they did in past years. Nations become attractive to
money launderers for many reasons, some of which are similar or identical to the
reasons why offshore tax havens are attractive to persons wishing to avoid the payment
of taxes.
Bank secrecy legislation, nominee corporate ownership, the ability to issue bearer
securities, a stable currency and established banking system, branches of international
banks, efficient communication, transportation, and money transfer systems, all contrib-
ute to the right mix. Combining this cocktail with foreign legal systems and different
languages and cultures makes the job of law enforcement extremely difficult.18
Corruption, terrorism, and other criminal offences share responsibility with the drug
trade for this evolution. Terrorism is probably the most challenging. What changed
almost immediately after 9/11 was a recognition that the financing of terrorism was a
challenge which national governments had to meet. They are attempting to do so
through the existing mechanism of the Financial Action Task Force (FATF) and its
recommendations on money laundering, which were extended to include terrorist
financing. Domestic legislation was amended in countries around the world to
incorporate the FATF’s Special Recommendations. This was followed by various forms
of sanctions legislation, which have typically been employed in response to crisis in
different parts of the world, the Arab Spring being one example and, more recently,
Ukraine.
SUMMARY
In Canada, strong partnerships have developed between the police and the financial
services industry, in particular the Canadian Bankers Association. What used to be a
relationship aimed primarily at preventing armed bank robberies has developed into a
much broader partnership dealing with credit card fraud in its various, often high-tech
forms. Canada is not unique, as similar relationships are seen in the United States and
the United Kingdom.
In order to make the public–private sharing of information successful, however, it is
important to have an aggregator. That is the true role of national financial intelligence
units (FIUs). Their governing legislation imposes reporting requirements on the
financial industry in such a way that privacy interests are respected. It is crucial that
FIUs obtain timely information and that they aggregate and analyse the information in
an equally efficient manner, dispersing it to law enforcement and security agencies,
writ large.
Many national FIUs have come of age in recent years, shedding their earlier,
pubescent concerns over privacy and enforcement, leading to a maturing which now
18
John L. Evans, “International Money Laundering: Enforcement Challenges and Opportun-
ities” (Vancouver: International Centre for the Reform of Criminal Law at University of British
Columbia, 1995), p. 1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
sees timely information being disbursed to police and security agencies, combined with
enforcement action against those who fail to comply with legislation.
“Information out” is only as good as “information in”, however. It is incumbent on
the financial industry to recognize the public goal of the legislation governing financial
reporting, and not view it as simply a loss leader within the corporate structure.
Without a robust compliance programme, any corporation faces potential destruction
just around the corner, be it through regulatory action or when faced with an organized
crime or terrorist event that it unwittingly helped to perpetrate.
In summary, organized crime groups have embraced technology and are increasingly
morphing from traditional illegal commodities, such as drugs and human trafficking, to
new frontiers of crime. The ability to purchase identities on the dark side of the internet
makes it easy to become involved in such activity. The inability of law enforcement to
investigate more than a very small percentage of cybercrime cases makes the chances
of avoiding detection far greater than is the case with property and violent crime.
It is incumbent on law enforcement, the police, and prosecution services, to embrace
changes in technology and apply them in their fight against organized crime. This also
requires that they co-operate on an international level with corresponding agencies in
other countries. The sharing of information and intelligence becomes crucial to
successfully combatting organized criminals.
In many ways it is like the spread of virus. If action is not taken to contain a
dangerous virus in the country where it first takes root, one can almost guarantee that
the free flow of people across borders, combined with accessible and affordable air
transportation, will spread the virus far and wide. So it is with organized crime and
terrorism. Unless contained, these modern curses will inevitably spread. The financial
industry and government must play their respective parts to ensure that our borders are
not porous and that information and intelligence flow in a robust fashion.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 04 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
The economic and socio-political developments of this century’s first decade have
turned the crimes of the powerful (CoP) into a major focus of criminological research,
legal practice and societal debate. By definition, the actual offences, summarily called
the “crimes of the powerful”,1 encompass a range of criminal or harmful activities
(primarily, but not exclusively, in the economic sphere) perpetrated by the individuals,
businesses and other organizations that exercise significant influence, power or
authority in a given society/state.
The basic idea behind the isolation of the CoP as a separate category within the
general body of economic crime is based on the assumption by some strands of
criminological science2 that the CoP reflect the unequal stance of different groups in
the society vis-à-vis the law and justice. Since in the real world laws and regulations
are structured and then implemented under the influence and, as a rule, in the interests
of powerful social groups, the privileged elements of the society are believed to be
better positioned to fulfil the dispositions of those norms. In cases where they
nevertheless violate the latter, thanks to their professional qualities or social position
they are less prone to being discovered and are relatively better protected in litigation.
Quite often, they may even escape justice. Those assumptions, though sounding
arguable, on the whole are confirmed by comparative statistics on investigations and
convictions respectively for the “white-” and “blue-collar” crimes practically in any
country.
1
Some authors prefer the term “crimes of privilege” (as in: Crimes of Privilege: Readings
in White-Collar Crime, 2000, edited by Neal Shover and John Paul Wright, OUP: New York or
in Criminology: A Contemporary Handbook, 2000, edited by Joseph F. Sheley, 3rd edition,
Belmont, CA: Wadsworth).
2
Namely, by the followers of critical, Marxist and post-modernist schools in criminology,
as well as of mixed and eclectic combinations thereof.
3
Frank Pearce (1976) Crimes of the Powerful: Marxism, Crime, and Deviance. London:
Pluto Press.
51
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
legal scientists of the Russian liberal mainstream shun it for being “Marxist” and
“communist”. For practical purposes of criminological research or practice, such
labelling is hardly helpful, since it deflects the attention of the society and, con-
sequently, of the law enforcement from the real causes and the role of powerful
perpetrators of economic and financial crimes in the country.
The opponents of the CoP concept in the West argue that many of the researchers of
the CoP are committed to an instrumentalist conception of the state that flaws the
analysis. Those critics find the concept internally inconsistent. This inconsistency, in
their view, stems from the contradictory relationship between political economy and
criminology present in the theory. Their particular displeasure is connected with the
fact that throughout CoP
there exists the presence of “big business”, a presence that somehow functions as the
ultimate, if not the proximate, explanation of events. For instance, big business was in
“control” of the major political parties, the federal legislature, the federal agencies, etc.
Implicit in this is the idea that the state apparatus was in some way controlled by big
business.4
4
Kelvin Jones (1979) “Crimes of the Powerful and Beyond: An Essay Review”, Con-
temporary Crises, vol. 3, p. 318.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
family violence, especially when the last is related to traditional forms of the
organization of society, are regarded by critical criminology as part of CoP.
It is important to stress also that the global financial and, to a large extent, economic
architecture, including the internationally recognized and strictly observed regulation in
the spheres of finance and corporate law, fighting fraud and money laundering, rests
upon the capability of the powerful to legitimize the abidance by the rules on the part
of the less potent players on the international scale.5
The interests of the powerful are legitimized by justifying, either explicitly or
implicitly, actions and policies that enhance such interests through the established rules
of the game. Legitimization does not imply that it serves as a cynical cover for the
naked pursuit of self-interest. Rather, it carries power precisely because it allows the
belief that the powerful are acting properly while at the same time serving their own
interests. Legitimization, then, is directed more at the producer of the rules of the game
than at the consumer. Put another way, effective rules of the game enable action
because they help to avoid the cognitive dissonance that arises when the powerful
advocate something they know to be unjust or destructive simply to further their own
interests.6 This formula works both at the international level when applied to global
powerful players and locally in relation to the CoP at the domestic (national) or
regional level.
The theoretical wholeness of the CoP concept does not exclude the multiplicity of its
national manifestations. The singularity of each of the latter is determined by the social
and political conditions of a country’s development, by its historic heritage, its cultural
and civilizational traditions, and by the nation’s place in the hierarchies of the existing
world order.
That is why the generalized theoretical analysis of CoP presented above, in our view,
should be supplemented with an overview of a real-life national experience, which we
shall naturally provide from the perspective of the authors’ own jurisdiction, that is, the
Russian Federation. In accordance with the aims of this volume, in this chapter we
shall deal exclusively with economy- and finance-related crimes.
5
L. Fituni and I. Abramova (2012) “Zakonomernosti formirovania i smeny modeley
mirovogo economicheskogo razvitia” [Laws of formation and succession of global economic
development models] in Mirovaya ekonomika i mezhdunarodnye otnoshenia [World Economy
and International Relations], Moscow, no. 7, p. 3.
6
Jonathan Zasloff (2003) “Law and the Shaping of American Foreign Policy: From the
Gilded Age to the New Era”, New York University Law Review, vol. 48 (April), p. 248.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
early capitalism in any other country in world history. The concrete forms of initial
accumulation and formation of the powerful, like Britain’s privateering and slave trade,
or America’s robber-barons, may be different, but the rogue core of the process remains
invariable.
What makes the present Russian case unique is that, in contrast to the early modern
societies, the nation’s level of economic development and the social aspirations of the
majority of its population are that of an advanced contemporary civilization. The newly
created institutions of liberal democracy and of regulated market economy co-exist
with the violence and legal unscrupulousness typical of the nascent capitalism. The
obvious contradiction finds its reflection in the criminal landscape. Cognitive and
behavioural factors also leave their imprint. The population on the whole is well
educated and highly trained professionally. Still, through the years of market reforms
its real standard of living has dwindled, and the hopes for professional and social
growth have shrunk. The dissonance is heightened by the system’s legitimization of
enormous fortunes swiftly created under obscure circumstances by a few individuals,
who have assumed the status of the new powerful in the country.
The illegitimate and damaging character of the privatization of the 1990s has been
acknowledged. It has been confirmed by a number of investigations, including those by
the Accounting Chamber of the Russian Parliament (Duma), the highest financial
control body in the country.7 However, the authorities decided that a reversal of the
earlier decisions in the property sphere might be detrimental to Russian capitalism and
to the fate of the powerful themselves. No action was taken. But the rampant and
unlawful privatization of Yeltsin’s time, together with the mass pauperization of the
population, became the main cause of the unprecedented deterioration of the situation
with the rule of law in general and with sky-rocketing crime in particular.
In the view of the highest judicial official in Russia – Chairman of the Constitutional
Court, Valery Zorkin – the country lives through a continued crisis of the legal sphere.
This in its turn is the “consequence of the global crisis of social regulativity”, which he
understands as “the erosion and the attenuation of the legal regulators of individual,
social and international behaviour”.8 The crisis is also reflected in everyday behaviour,
the functioning of institutions, self-identification, culture, economy, politics and the
society in general.
New regulatory institutions are young and feeble. From the very beginning their
viability and the health of the legal system have been under question because of their
alien economic normativity. The new legal system exists under constant pressure for
further reformation and “improvement”, which comes both from within Russia (gov-
ernment, business circles, political opposition) and from abroad (world governance
institutions like the International Monetary Fund (IMF), World Bank, Council of
Europe, on the one hand, and Western democracies as a joint critical force, on the
other). The legal environment is constantly changing for the sake of “deeper reforms”.
7
Accounting Chamber of the Russian Federation (2004) Analiz processov privatizatsii
gosudarstevennoy sobstvennosti v Rossiyskoi Federatsii za period 1993–2003, Moscow: Olita (in
Russian).
8
Valery Zorkin (2014) “Ekonomika I Pravo: Novy Kontekst”, Rossiyskaya Gazeta, 21 May
2014 (in Russian).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Suffice it to say that during only one year (2013) 516 new federal laws have been
adopted by the legislators, plus at least three times as many other normative regulations
have been introduced by other branches of power constitutionally authorized to do so.
Both the perpetual attempts of liberal reformers to improve the “economic climate” by
changing laws or by their opponents to do otherwise undermine the stability and
integrity of the system. The institutions become less reliable and legitimate in the eyes
of businesses and of ordinary citizens.9 What is more dangerous, the legal instability
(albeit it was created out of good intention) forms a public attitude to law as something
ephemeral.
The Russian experience shows that the hasty reformation of the institutional and
regulatory base of economic activity without due attention to enforcement issues and
with excessive willingness to relax the existing norms has been conducive to an
unprecedented surge in economic crime. The existence of abundant literature on this
issue allows us to limit the illustration to a very brief statistical description of the
current structure of economic crime in the country.
Corruption and fraud are the two main types of economic crime in present-day
Russia, both from the point of view of incidence and the economic damage incurred. In
2013, corruption-related offences accounted for 29.4 per cent of all registered cases of
economic crime, having thus for the first time exceeded the incidence of fraud cases.
The latter accounted for 24.6 per cent of the total. However, the drop in registered fraud
was not the result of an unexpected surge of honesty among the white-collar workers,
but the effect of a change in the methodology of statistical registration. Counterfeiting
was the third most important type of economic crime that year (11.9 per cent).
Embezzlement was the fourth with 10 per cent of cases. As to the afflicted spheres or
economic activity, 29.8 per cent of cases took place in the financial and banking sector;
16.9 per cent in the consumer goods and services markets, 6.2 per cent in real estate
and 0.9 per cent in the sphere of external economic activity.10
While offering these figures to the reader’s judgement, we feel obliged to make one
important reservation. One of the by-products of dismantling communism in Russia
was the disorganization of the system of registration, accounting and statistical control
of criminal offences. The old rigidly controlled vertical system had been destroyed but
a newly introduced “democratic” one was not able to fully balance its disappearance.
Even today, the new “capitalist” types of crime (in particular numerous types of
economic offences, corporate and financial crime) do not even figure in statistical
annuals on crime. Fully fledged, comprehensive registration, statistical control and
monitoring are hardly possible in conditions where this category of offences does not
even have a uniform naming. The Main Information and Analytical Centre of the
Russian Ministry for Internal Affairs group them under the heading of “economy-
oriented offences” (prestuplenia ekonomicheskoy napravlennosti), while the judicial
system in its registration and accounting system categorizes the same as “crime in the
area of economic activity”. However, the composition of the groups is not identical.
Some offences figure in one of them, but are absent from the other. In both cases, the
9
http://www.garant.ru/article/483075/ and http://www.garant.ru/infografika/516874/.
10
Calculations by the authors on the basis of Ministry of Internal Affairs statistics, available
at http://mvd.ru/Deljatelnost/statistics/reports/item/1609734/.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Sources: Ministry of Internal Affairs (MVD) and Judicial Department at the Supreme Court of the
Russian Federation databases (2008–2014).
The figures above (Table 5.1) show a situation somewhat different from the customary
perceptions about economic crime in Russia. Surprisingly, economic offences occupy a
very modest share (4.6–9.8 per cent) within the overall structure of registered criminal
cases. Over the latest five years, for which the statistics are available, this indicator
invariably demonstrates a strong downward trend. The number of persons charged with
11
V.V. Luneev (2012) O kriminalizatsii ekonomicheskikh prestupleniy predprinimateley,
Moscow: IGPAN, p. 3 (in Russian).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
economic crimes has dramatically declined (nearly 3 times). The same is true about
their share within the overall numbers of indicted. Actual conviction rates amount to,
roughly, just a bit more than one in ten of the indicted – between 16.1 per cent and 12.2
per cent. The share of economic offenders within the total number of convicted has
been always negligible. In 2013, according to the official statistics it was just 0.5 per
cent! The latter figure reflects the efforts of the liberal wing within the Russian
government to minimize the potential burden of punishment for committed CoP.
In 2010, Dmitry Medvedev, then president of the Russian Federation, ordered his
administration to re-examine how strict laws against economic crime, and particularly
the laws on money laundering, were used against the representatives of the business
community. His idea was to improve the business climate by reducing the penalties for
economic crimes because of complaints from the powerful business community. During
his presidency, Medvedev introduced regulatory changes to allow more suspects in
economic crimes to be released on bail or their own recognizance. The Kremlin then
backed amendments that prohibited the combination of money-laundering charges with
illegal entrepreneurship, a charge that was filed in roughly a third of investigations
against the country’s entrepreneurs. Business leaders received Medvedev’s support in
fighting against the provisions in the Criminal Code intended to fight organized crime,
which were used against executives. Usually, investigators also name accountants or
chief financial officers as participants in an economic crime, meaning that the
company’s leadership acted as part of an organized group. He later submitted to
lawmakers a bill on corporate raiding that aimed at preventing competitors, and
sometimes law enforcement officials, from bankrupting and then taking over a business
of a jailed owner.12
However, though the statistics on economic crime significantly improved, the
practical benefits of those easings and relaxations were not obvious. The white-collar
crime and other CoP, particularly corruption-related offences and embezzlements,
overshadow Russia’s criminal landscape.
12
Maria Antonova (2010) “Medvedev Pushes to Limit Jail for Execs”, The Moscow Times,
27 Feb. 2010.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
conduct transactions, the existing law in the Russian Federation does not allow
incurring criminal liability in the own name and on the own account of legal persons.
There are indications that the situation may change within the time horizon of five to
ten years, but at present, only natural persons fall under criminal liability. In Russia,
legal persons, while being liable to civil and administrative responsibility and sanctions,
are free from the criminal liability. That means that, irrespective of whether fraud or
any other economic crime was the result of corporate policy or just a one-off operation
conceived by a crooked employee, only the concrete person(s) who effectuated it will
be held responsible. That said, one has to acknowledge that law enforcement tends to
qualify the economic offences perpetrated by a number of persons as “collective” ones
and/or ones committed by an organized group (charges filed against “Yukos”). In order
to step up charges against executives, investigators are reporting the accountants or
chief financial officers as participants in an economic crime, meaning that the
company’s head acted as part of an organized group13 – a practice, which Medvedev
tried if not to reverse, then at least to limit.
In accordance with the current law, corporate or business fraud includes the offences
of fraud as a general crime, infliction of pecuniary damage (losses) by means of deceit
and abuse of trust, and embezzlement. Article 159 of the Russian Criminal Code
defines fraud as “misappropriation of, or acquisition of, rights to another’s property by
way of deceit or abuse of trust”.14 Sanctions for participating in corporate fraud include
administrative and criminal penalties. Criminal sanctions can only be applied against
natural persons. Corporate bodies are not liable to criminal sanctions or prosecution.
Sanctions for criminal liability (generally, without aggravating features) include fines
and imprisonment. A Russian court has extra-territorial jurisdiction (a) against a
Russian citizen who commits bribery or corruption outside the territory of the Russian
Federation provided that such crimes are directed against the interests protected under
the RCC and there is no final foreign court decision on the case and (b) against
non-residents of the Russian Federation who commit bribery or corruption outside the
territory of the Russian Federation provided that such crimes are directed against the
interests of the Russian Federation or against a citizen of the Russian Federation or a
stateless person permanently residing in the Russian Federation and there is no final
foreign court decision on the case.15
According to research ordered by the powerful Russian Union of Industrialists and
Entrepreneurs, corporate fraud constitutes a grave threat to Russian companies. Sixty
per cent of participants of the survey acknowledged that they had encountered
signs/cases of corporate crimes during the three-year period surveyed (2011–2013).
They also noted the steady character of their growth, though by and large the pace
had been slow. According to the survey, those cases of corporate fraud resulted in a
broad range of adverse consequences, sometimes even crucial. Those included (a)
13
Ibid.
14
Criminal Code of the Russian Federation No. 63-FZ, of 13 June 1996 (RCC); Criminal
Procedural Code No. 174-FZ, of 18 December 2001 (RCPC); Code on Administrative Offences
No. 195-FZ, dated 30 December 2001 (Administrative Code (AC)) – all three as amended.
15
Norton Rose (2013) “Corporate Crime, Fraud and Investigations, Russian Guide 2012:
Russian Federation”, Norton Rose: Moscow, pp. 5–6.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
considerable financial losses (16 per cent of respondents pointed out that the damages
had exceeded 1 million US dollars, while the maximum amount of the damages named
by the participants of the survey allegedly equalled 1 billion US dollars), (b) damage to
corporate integrity, its good name and brand, (c) slowdown of corporate growth and
development, (d) loss of business contacts with partners and (e) sacking of employees
and collapse in confidence among the workforce.16
Embezzlement. Among the CoP embezzlement arguably represents the most wide-
spread and possibly most damaging offence. In principle, the crime of embezzlement
may involve any kind of assets irrespective of the ownership type – private or public.
Though in Russia most of the investigated embezzlements are perceived to involve
public funds and the sphere of procurements, in reality the private sector may be even
more prone to them. However, the private owners are usually reluctant to bring the
topic to public. The more so since the lion’s share of embezzlements in corporations
are insiders’ jobs, perpetrated quite often by middle- and senior-level executives or, at
times, by the owners themselves. Such high-level embezzlements often happen in times
of crisis. The most frequent types of embezzlement in Russia include:
16
VEGAS LEX (2014) Fighting Corporate Fraud. Nationwide Russian Survey. 2012–2013
Report. Moscow. pp. 6–9 available at http://www.vegaslex.ru/data/2014/04/16/1234640503/
VEGAS%20LEX_Antifraud%20survey%20report_03.2014.pdf.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
are deposited in the bank at an interest rate which is much lower than the market rate.
For the underrated deposit of funds with the bank the chief executive of the public
company receives a kickback in cash.
The criminal proceeds are then laundered through so-called one-day companies,
having performed several necessary transactions, and are closed for good within a time
shorter than the tax reporting period.
Corruption. In today’s Russia, embezzlement and fraud go hand in hand with
corruption. According to a PWC report, although the situation is gradually improving,
bribery and corruption are still issues for Russian businesses. For instance, in 2014, 41
per cent of respondents to a PWC questionnaire admitted that their organization had
been asked to pay a bribe in the last 24 months. This was dramatically higher than both
the global results (18 per cent) and results for Eastern Europe (23 per cent).
Approximately the same number of respondents declared that they had lost an
opportunity to a competitor, whom they believe had paid a bribe. Nonetheless, as
already mentioned, the highest levels of the Russian government are tackling the
problem of bribery and corruption.17 Russia is party to the following international
conventions against corruption:
In recent years the authorities have stepped up anti-corruption efforts, but there has not
been a systemic breakthrough in the situation. Officials acknowledge that corruption
has become the most pertinent economic crime problem, asserting the need to “create a
public climate that rejects corruption”. There are several other prominent ongoing
corruption scandals. Large sums were embezzled, for instance, from the budget of the
preparations for the Asia-Pacific Economic Cooperation (APEC) summit held in the
Far East in 2012. But corruption goes much deeper and can be said to strike at the very
core of the Russian leadership’s own strategic agenda.
Corruption and embezzlement even threaten the government’s plans to modernize the
Russian army. According to Chief Military Prosecutor, Sergei Fridinsky, in 2013 the
established damage from corruption-related offences within the armed forces increased
by 5.5 times and exceeded 4.4 billion roubles (roughly 130 million US dollars).18
Earlier, in an interview with the official government publication, he disclosed the
mechanisms of the financial and economic crime in the armed forces:
17
PWC (2014) 2014 Economic Crime Survey in Russia, Moscow: PWC, p. 17.
18
http://vpk-news.ru/news/16702.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Every year huge sums are allocated for defense but the achievements are limited. Meanwhile,
the schemes of embezzling [funds] from the state are being refined. Forgeries of documen-
tation, falsified reporting about allegedly completed works and services, kick-backs for state
orders, all this makes part of the fraudsters’ arsenal. As a result, enormous funds are
embezzled – practically every fifth rouble, and the supplies of low-quality equipment to army
continues.19
19
Rossiyskaya Gazeta, 24 May 2011 interview with S. Fridinsky.
20
Andrew Monaghan (2014) “Sochi Is a Sad Reminder of Corruption’s Grasp”, The Moscow
Times, 14 Feb. 2014 available at http://www.themoscowtimes.com/opinion/article/sochi-is-a-sad-
reminder-of-corruptions-grasp/494538.html.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 11 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
raiding schemes in which raiders falsify real property documents to illegally take
control of physical assets.21
Other important CoP types include cybercrime, food adulteration, production and
marketing of counterfeit goods, theft of intellectual property and so on.
CONCLUSIONS
This brief overview of the situation with economic crime in Russia shows, besides the
obvious disappointments in relation to the actual state of efficiency of countering its
concrete forms and manifestation, a number of causes for concern at a more systemic
level. The discrepancies between statistical reporting and the real-life situation means
that we do not have a complete and objective picture about economic crime in this
country. We do not know the exact costs of the CoP to society. We are poorly informed
of the real mechanisms and links of corporate crime. Nor are we able to predict the
behaviour of major corporate criminals. Without changing the fundamental approaches
to the CoP problem, we cannot offer adequate and concrete measures to counter
economic, financial or corporate crime in Russia.
Concluding this chapter, we would like to emphasize again that the majority of CoP
in Russia reflect the specifics of the current transitory stage of the country’s
development. The increased incidence of economic crime stems from the insufficient
legitimacy of the post-Soviet change perceived by the society as a whole and by the
new class of property owners in particular. Valery Zorkin, chairman of the Supreme
Court of the Russian Federation, observed that “private property (and especially the
large-scale highly profitable property) has failed to acquire full-blooded legitimacy”.22
Moreover, Russian business recognizes that it is the doubtful legitimacy of Russian
property that lies at the root of many criminal aspects of economic life in the country,
including the elevated level of the shadow economy, corruption and raiding, as well as
the low levels of non-speculative investment. Without legitimization of the property and
the social coming-out of semi-legal capital, Russian society is doomed to remain in a
state of permanent instability and criminal self-destruction.
Legitimization will make the powerful more potent without inflicting losses on the
rest of the society. It will open to them new gateways to increased prosperity without
the need to indulge in criminal activity. Increased legitimacy will result in greater
stability and social order.
21
Thomas Firestone (2008) “Criminal Corporate Raiding in Russia”, International Lawyer,
vol. 42, no. 4 (Winter), pp. 1207–1229.
22
Valery Zorkin (2014) “Ekonomika I Pravo: Novy Kontekst”, Rossiyskaya Gazeta, 21 May
2014 (in Russian).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 05 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
PART II
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Organized crime is one of the greatest threats to human, national and international
security throughout the world. It is not only a threat, but a daily reality that causes
immense harm to individuals, families and communities,1 capable of undermining
governance, fuelling corruption and hindering economic development.2 Evidence drawn
from law enforcement activity suggests that organized crime is not only large in scale
and impact,3 but that some elements have diversified and globalized, reaching macro-
economic proportions.4
Organized Crime Groups (OCGs) are most commonly associated with drugs traffick-
ing. However, they are increasingly known to be have diversified, becoming involved in
many different types of criminal activity to include fraud, identity theft, burglary, child
sexual exploitation, counterfeit currency, intellectual property crimes, environmental
and wildlife crimes, human smuggling and trafficking, firearms and cybercrime.5
Furthermore, their reach has expanded as a result of globalization, especially with the
aid of internet-based technologies, which have enabled the indiscriminate targeting of
potential victims irrespective of their age, sex, race, location or religion.
Moreover, organized crime is on the increase. In 2009, global organized crime was
estimated to generate $870 billion per annum in illegal profits, representing 1.5 per cent
of global GDP.6 In 2014, this figure rose to approximately $1 trillion.7 Furthermore,
this trend in growth is expected to continue. In the United Kingdom (UK), the number
of active OCGs known to law enforcement is approximately 5,300.8 The human and
1
National Crime Agency, National Strategic Assessment of Serious and Organised Crime
2014, 1 May 2014, p. 1.
2
World Economic Forum, ‘Global Agenda Council on Organized Crime 2012–2013’
<http://www.weforum.org/content/global-agenda-council-organized-crime-2012-2013> accessed
2 June 2014.
3
SOCTA 2013: EU Serious and Organised Crime Threat Assessment, European Police
Office, 2013, p. 9.
4
United Nations Office on Drugs and Crime, The Globalization of Crime: A Transnational
Organized Crime Threat Assessment, 2010.
5
Interpol, ‘Organised Crime’ <http://www.interpol.int/Crime-areas/Organized-crime/
Organized-crime> accessed 2 July 2014.
6
UNODC, ‘Transnational Organized Crime:The Globalized Illegal Economy’ <http://www.
unodc.org/toc/en/crimes/organized-crime.html> accessed 26 June 2014.
7
FBI, ‘Organised Crime, Overview’ <http://www.fbi.gov/about-us/investigate/organized
crime/overview> accessed 8 July 2014.
8
National Crime Agency, National Strategic Assessment of Serious and Organised Crime
2014, 1 May 2014, p. 7.
65
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
economic costs of such groups are considerable.9 In purely economic terms, the cost of
organized fraud alone is reported to be £30 billion per annum in the UK.10
However, what distinguishes organized economic crime from economic crime is that it
is likely to incorporate characteristics of organized crime, namely violence or the threat
of violence as well as bribery and corruption.13
In practice, economic crime, organized or otherwise, is synonymous with white
collar crime.14 The UK’s National Crime Agency (NCA)15 has identified the key threats
relating to economic crime as fraud, bribery, corruption and sanctions evasion, market
abuse and insider dealing, money laundering and criminal finance, counterfeit currency
9
Hannah Mills, Sara Skodbo and Peter Blyth, Understanding Organised Crime: Estimating
the Scale and the Social and Economic Costs, Research Report 73, Home Office <https://
www.gov.uk/government/uploads/system/uploads/attachment_data/file/246390/horr73.pdf> ac-
cessed 1 June 2014.
10
National Crime Agency, National Strategic Assessment of Serious and Organised Crime
2014, 1 May 2014, p. 21.
11
National Crime Agency, ‘Organised Crime Groups’ <http://www.nationalcrimeagency.
gov.uk/crime-threats/organised-crime-groups> accessed 3 July 2014.
12
US Legal Definitions, ‘Economic Crime’ <http://definitions.uslegal.com/e/economic-
crime/> accessed 16 July 2014.
13
HM Government, Serious and Organised Crime Strategy, October 2013, p. 14.
14
‘White collar crime’ is a term coined by sociologist Professor Edwin Sutherland as ‘crime
committed by a person of respectability and high social status in the course of his occupation’ to
describe non-violent crime committed for monetary gain.
15
National Crime Agency, ‘Economic Crime Command’ <http://www.nationalcrimeagency.
gov.uk/about-us/what-we-do/economic-crime> accessed 26 June 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
and cyber-enabled identity crime.16 The result is that the financial aspects of criminal
investigations tend to be diverted towards specialized ‘economic’ crime departments, as
opposed to using these aspects to combat organized crime as a whole.
16
National Crime Agency, Strategic Assessment of Serious and Organised Crime 2014,
1 May 2014, p. 21.
17
Home Secretary’s speech on organized crime at RUSI, ‘Understanding and Confronting
Organised Crime’, delivered at the Royal United Services Institute, Whitehall, London on
Wednesday 10 June 2014 <https://www.gov.uk/government/speeches/home-secretarys-speech-
on-organised-crime-at-rusi> accessed 13 July 2014.
18
Michelle Gallant, ‘Promise and Perils: The Making of Global Money Laundering,
Terrorist Finance Norms’ (2010) 13(2) Journal of Money Laundering Control 175.
19
The FATF is an inter-governmental body established in 1989 by the Ministers of its
Member jurisdictions. Its objectives are to set standards and promote effective implementation of
legal, regulatory and operational measures for combating money laundering, terrorist financing
and other related threats to the integrity of the international financial system.
20
Shima D. Keene, Threat Finance: Disconnecting the Lifeline of Organised Crime and
Terrorism (Gower 2012).
21
Examples of obstacles include legislation especially in relation to human rights, as well as
cultural prejudices, mistrust and information and communications technology (ICT) challenges.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
do not exist between the countries concerned. The challenge can begin with even the
basic definition of the crimes concerned, or their key elements, which may vary from
country to country.22 Furthermore, there may be inconsistencies in substantive laws that
may be further complicated by differences in investigative techniques, which are
governed by national or local law.
Further complications may arise if the location of the alleged perpetrator is in a
different country to that of the victim, as there may be difficulty in attempting to
establish the identity of the wrongdoer and of obtaining enough evidence to support a
conviction. This is particularly true in cases relating to cybercrime. However, even
where the investigation is contained within national borders, the reactive nature of law
enforcement inevitably results in a game of ‘catch up’ as in-house technological
expertise and resources take time to come up to speed.23 In addition, legislative bodies
also require time to create new laws or to adapt the existing law to clear a path for the
prosecution of the new e-criminal activities.24
A more general issue relates to the silo-centric approach which leads to each
department viewing its specific role in the fight against organized crime with a
restricted perspective. Having a defined role in itself is not the issue. What is of
concern is the overall culture of risk transfer, where individuals and departments are
often unwilling to take responsibility for what may later be seen as their failure.
Furthermore, activities which are perceived not to be a core responsibility will often be
neglected.
This is particularly relevant in the current threat environment where effects of even
distant events can be highly significant elsewhere, and even the most local develop-
ments may come to have enormous global consequences.25 As such, a change in
mindset is needed to recognize that the boundaries between domestic matters and
global affairs have become increasingly blurred and that what may seem like someone
else’s problem now may well become your own problem soon.26
A more fundamental issue is that many people, including not only members of the
public but also front-line police officers, do not fully understand what organized crime
is. This is partly because organized crime is a dynamic concept which is forever
evolving, and is, as such, a difficult phenomenon to define. The catch-all phrase of
‘organized crime’ is undoubtedly conceptually inadequate. However, attempting to
22
Tyler Moore, Richard Clayton and Ross Anderson, ‘The Economics of Online Crime’
(2009) 23(3) Journal of Economic Perspectives 3.
23
A recent study, commissioned by the all-party e-commerce lobby group EURIM, reported
that there is a huge backlog of e-crimes and a serious shortage of skills to deal with them. See
‘Police Need More e-Crime Skills’ BBC online <http:/news.bbc.co.uk/go/pr/fr/-/1/hi/technology/
3725305.stm> accessed 2 February 2014.
24
Paul Hunton, ‘The Stages of Cybercrime Investigations: Bridging the Gap between
Technology Examination and Law Enforcement Investigation’ (2011) 27(1) Computer Law and
Security Review 61.
25
Chris Donnelly and David McOwat, ‘Adapting Forces to Deal with New Challenges to
National and International Security’ (2012) Global Perspective Statecraft Paper.
26
Shima D. Keene, Threat Finance: Disconnecting the Lifeline of Organised Crime and
Terrorism (Gower 2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
define organized crime is far from being a purely academic exercise, as failure to do so
leads to operational consequences which impact resourcing and investigative powers.
27
Home Secretary’s speech on organized crime at RUSI, ‘Understanding and Confronting
Organised Crime’, delivered at the Royal United Services Institute, Whitehall London on
Wednesday 10 June 2014 <https://www.gov.uk/government/speeches/home-secretarys-speech-
on-organised-crime-at-rusi> accessed 13 July 2014.
28
The author’s own experience lecturing to Master’s students in forensic science as well
working with non-specialist front-line police officers from various regional law enforcement
agencies.
29
Home Secretary’s speech on organized crime at RUSI, ‘Understanding and Confronting
Organised Crime’, delivered at the Royal United Services Institute, Whitehall London on
Wednesday 10 June 2014 <https://www.gov.uk/government/speeches/home-secretarys-speech-
on-organised-crime-at-rusi> accessed 13 July 2014.
30
‘Their motivation is often, but not always, financial gain.’ <http://www.nationalcrime
agency.gov.uk/crime-threats/organised-crime-groups> accessed 26 June 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
FINANCIAL EXPERTISE
The necessary financial expertise is currently not readily available within most law
enforcement agencies, and what resources are available usually reside within specialist
economic crime departments, such as insider trading or complex fraud. This is because
the understanding as to what financial intelligence/evidence can bring to an investiga-
tion is often lacking at all levels, leading to a lack of appetite for financial expertise.32
It is unsurprising therefore that many regional law enforcement agencies do not have
adequate in-house resources capable of interpreting even the most basic of financial
statements.
Consequently, the task is outsourced to external forensic accountants who are
brought in from time to time working to a very narrow remit to investigate specific
cases typically involving complex fraud. This is all well and good. However, there is
also an immediate need for individuals with an investigative mindset coupled with basic
accounting skills that gives him or her the ability to instigate and pursue lines of
investigations currently not pursued. Lack of financial expertise can result in the
absence of any meaningful financial intelligence being produced.
This situation is exacerbated by the segregation between financial and criminal
intelligence as a result of the narrow definition of economic crime, which encourages
inadequate use of financial intelligence to tackle organized crime outside the immediate
31
Home Secretary’s speech on organized crime at RUSI, ‘Understanding and Confronting
Organised Crime’, delivered at the Royal United Services Institute, Whitehall London on
Wednesday 10 June 2014 <https://www.gov.uk/government/speeches/home-secretarys-speech-
on-organised-crime-at-rusi> accessed 13 July 2014.
32
For the purpose of this chapter, financial expertise/experts refers to investigators who are
comfortable in analysing and detecting anomalies in a range of financial data ranging from basic
bank statements to company accounts.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
CRIMINAL INTELLIGENCE
The First National Strategic Assessment published on 23 May 2014 highlighted the
limitations of the current intelligence picture, particularly with respect to the regional
dimension.33 The limited intelligence coverage identified has been described as ‘the
Achilles heel of the government’s response to organised crime’,34 with serious
implications for the NCA as well as the Regional Organised Crime Units (ROCU) and
Serious Organised Crime Units (SOCU).
The notion of intelligence-led policing is not a new concept. However, despite
successive reports by the Association of Chief Police Officers (ACPO)35 recommending
that the use of criminal intelligence should play a more central role in policing,
intelligence-led policing continues to be a far cry from reality. Although the use of
‘intelligence’ has long been practised by specialist police units such as Major Crime,
the ‘intelligence’ obtained can only be described as being reactive and sketchy at best.
The attempt to incorporate intelligence into ‘mainstream’ policing has not been
effective, due to the fact that the main business of policing continues to be reactive. The
introduction of the National Intelligence Model (NIM) in 2000 attempted to address
many of the key issues highlighted and to introduce a unified national approach to
intelligence-led policing. However, despite the strong promotion of the NIM by the
Home Office, ACPO and Her Majesty’s Inspectorate of Constabulary (HMIC), police
forces nationally face a number of challenges in attempting to implement the model
fully.36
33
Sasha Jesperson, Assessing the Threat of Organised Crime: The First National Strategic
Assessment, 23 May 2014, RUSI <https://www.rusi.org/analysis/commentary/ref:C537F3E5
10C6E5/#.U6qzJbGmXzo> accessed 25 July 2014.
34
Charlie Edwards, Director, National Security and Resilience Studies, RUSI. ‘The National
Crime Agency: Britain’s New Response to Organised Crime’ RUSI News brief, 13 November
2013 <https://www.rusi.org/publications/newsbrief/ref:A5283702508EFE/#.U8keGbGmXzo>
accessed 18 July 2014.
35
ACPO (1975). Report of the Subcommittee on Criminal Intelligence (the Baumber
Report). London: Association of Chief Police Officers; ACPO (1978). Third Report of the
Working Party on a Structure of Criminal Intelligence above Force Level (the Pearce Report).
London: Association of Chief Police Officers; ACPO (1986). Report on the Working Party on
Operational Intelligence (the Ratcliffe Report). London: Association of Chief Police Officers;
ACPO (1996). Report on International, National and Inter-force Crime. London: Association of
Chief Police Officers.
36
NIM is an information-based deployment system. The purpose of NIM is to create a basis
for the identification of crime patterns, which in turn enables a more fundamental approach to
problem solving in which resources can be tasked efficiently against an accurate understanding
of crime and incident problems. It also intends to drive effective strategy for all law enforcement
needs, provide operational focus and professionalize the intelligence discipline within law
enforcement.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Recent research has shown that many front-line police officers37 have little awareness
as to the purpose of intelligence, as well as how intelligence should be developed and
applied in a policing context.38 Intelligence is generally understood by shift officers and
neighbourhood officers as ‘information that is not good enough to be used as evidence’
and, as such, a cumbersome administrative task which gets in the way of their ‘proper’
job. This results in the variable quality of information submitted as well as the lack of
urgency in terms of submission. This is then processed to become criminal intelligence.
Furthermore, for the initial raw information to be turned into useable intelligence
requires analysis leading to meaningful conclusions and recommendations. Computers
may assist with analysis by compiling large amounts of data into an easily accessible
format, but this is still only collated data; and it falls far short of being intelligence.39
The key therefore is to have individuals who are capable of interpreting the data in a
way that has operational relevance. Currently, most intelligence officers merely collate
information which is archived in various police information databases, often disjointed
in nature. Despite the existence of the Police National Computer (PNC) since 1974,
much of the relevant ‘intelligence’ is retained within local databases. Here, a significant
opportunity awaits, provided that the cultural and technical challenges can be over-
come.
MEASURING SUCCESS
The ability to measure success is important in that perceived success is likely to affect
future budgets, which in turn will affect operational capability.40 On the other hand, the
inability to demonstrate success may endanger the organization’s future existence.
However, in the context of tackling organized crime, this can be challenging as a major
part of the remit is to not only prosecute, but to disrupt and thus ‘prevent’ a criminal
activity from occurring. Success in commercial business, for example, can be measured
through the simple calculation of profit. However, this cannot, and should not, be
applied to law enforcement and other public agencies.41 This is equally true of
departments such as compliance and financial crime within financial institutions, which
are viewed as cost centres and tolerated due to regulatory requirements. So the question
then becomes that of how success can be measured for departments and organizations
involved in prevention.
Another factor to consider is that the current focus for law enforcement agencies,
among public sector organizations in general, has been efficiency, which in turn is often
37
Who collect the information, which is then processed to become criminal intelligence.
38
Shima D. Keene, Bullfinch Review: The Use of Financial and Criminal Intelligence in the
Context of Tackling Child Sexual Exploitation, Thames Valley Police, Unpublished Report,
March 2014.
39
Shima D. Keene, Operationalizing Threat Finance Strategies, CSRC/Army War College
Publication, March 2013.
40
An increase in budget will translate into more resources, both in terms of human resources
and technical resources.
41
Shima D. Keene, Threat Finance: Disconnecting the Lifeline of Organised Crime and
Terrorism (Gower 2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSIONS
Organized crime, including organized economic crime, is a complex multi-faceted
problem. The traditional approach to attempting to tackle such problems has been to
compartmentalize aspects of the known issues and attempt to tackle each component
independently. However, this silo approach is ineffective as the complex interdepend-
encies mean that action taken to address one aspect of the problem may reveal or
aggravate problems identified elsewhere.43 The situation is exacerbated as a result of
the incomplete, contradictory and constantly evolving nature of the phenomenon.
As such, it is essential that a ‘problem’ is tackled in the context of the existing
interdependencies in order to be better able to appreciate the possible knock-on effects
of actions which may be taken to disrupt the threat. Furthermore, these challenges can
no longer be tackled by any single organization or country. The hybrid nature of
problems and conflict itself, coupled with resource limitations, will require partners to
work more closely together than ever before. This multi-stakeholder environment in
itself can be challenging due to the existence of differing cultures, both organizational
and geographical, as well as differing perspectives and motives, despite the united goal
of the partnership as a whole.
42
In terms of achieving positive Performance Development Review (PDR) outcomes for the
purpose of personal career progression.
43
The silo approach exists even within SOCUs and counter terrorism units, especially in
relation to finance.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 06 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
7. Trafficking crimes
Frank G. Madsen
INTRODUCTION
Trafficking crimes are typically a subset of organized crime, at least as the latter is
defined in the United Nations Palermo 2000 convention. It is therefore of import to
analyse the concept of organized crime, which, unfortunately, will not be possible in
this short chapter.1 There are several ‘species’ of organized crime and organized
criminals; trafficking crimes are typical of all from so-called professional criminals,
that is groups of criminals that form and re-form as required, via the criminal societies
to terrorists utilizing organized crime methodology to fund themselves.2 The generic
term organized crime is generally used for crimes that are organized, that is profes-
sional crime and criminal societies.
A crucial aspect of all criminal networks is that they are self-organized critical
systems. They are critical systems because of the tension between the elements in the
system itself, between the system and similar systems, and between the system and its
legal and socio-political environment. This intrinsic state of affairs is exacerbated by
the lack of an external conflict resolution mechanism. Nevertheless, the magnitude of
the disturbance will be absorbed by the self-repairing property, which characterizes
such systems, as one participant is replaced by another and as a new balance is struck
between networks.
Whereas one can distinguish four species of organized crime, by characteristics, the
criminal activities of organized crime can be subdivided into three kinds, by function,
namely coercive, predatory and market crime.
In coercive crimes the criminal revenue is generated by violence or the threat of the
use of violence. Typical examples are the pizzo (Italian for ‘protection money’),
extortion in general, and interference in labour disputes and stockholder meetings.
Predatory crimes are a type of crime where the criminals piggyback on ordinary
societal activities, but without the supply of any goods or services. Examples are
legion, but credit document frauds and white collar crimes in general come to mind.
These activities constitute one of the major revenue streams of organized crime.
1
Frank G. Madsen, Transnational Organized Crime (New York and London: Routledge,
2009); and for a more in-depth historical treatment: Frank G. Madsen, ‘The Historical Evolution
of the International Co-operation against Transnational Organized Crime: an Overview’, in
Pierre Hauck and Sven Peterke (eds) International Law and Transnational Organized Crime
(Oxford: Oxford University Press (forthcoming)).
2
Jean Népote, ‘Interpol et le Crime Organisé’, Revue Internationale de Police Criminelle,
no. 282 (November 1974), 230–236. The article consists of Népote’s address to a conference on
organized crime held at the seat of the Bundeskriminalamt, Wiesbaden, Federal Republic of
Germany, 22 October 1974.
75
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Finally, trafficking or market crimes are those crimes where organized crime does
deliver goods and services that are not otherwise readily available, while not neces-
sarily being illegal, for example brand tobacco products.
After this introduction, the chapter consists of two parts of which the first considers
market crime and the second some individual types of crime.
MARKET CRIME
Following the taxonomical and functional distinctions made above, trafficking or
market crimes are of a kind, where the criminals actually deliver goods or services that
willing customers cannot otherwise readily obtain or cannot obtain at an affordable
price. Such crimes are the subject of the study of organized crime in general, but are
perhaps more specifically typical for the professional crime species, that is executed by
protean or starfish organizations that form and re-form themselves in accordance with
the principle of critical self-organization.3
It is of crucial import, however, to stress that the very basis for organized crime’s
involvement in market crimes is that of denied demand, which, if the demand is
important enough, will create the necessary supply to clear the market.
Denied Demand
The major, transactional part of organized crime is about satisfying demand, namely
denied demand, since such organizations provide us with the things we really should
not want in the first place, for example drugs, illegal gambling and prostitution.4 Their
activities are not necessarily concentrated on these illicit goods, however, and they will
deliver whatever goods will provide considerable profits. They will also, and indeed do,
closely follow societal developments in order to maximize profits by responding to
such developments. For example, advances in surgical organ transplantation techniques
and the concomitant surge in a number of – mostly lifestyle induced – pathologies
leading to a sharp increase in demand have opened a new window of opportunity for
illicit gains: the supply of organs for transplantation.5 Likewise, in our developed
world, one of the more important societal parameters is the increased import of the
health sector. This sector has two major characteristics: first, in the richer, developed
countries populations are growing older and have increased health care requirements,
and, second, funds are being invested heavily in the sector by private individuals, but in
particular by governments. Thus the average OECD country private and public
3
Ori Brafman and Rod A. Beckstrom, The Starfish and the Spider: The Unstoppable Power
of Leaderless Organizations (New York: Portfolio (Pelican), 2006).
4
The non-transactional part of organized crime activities includes – as noted above –
coercive and predatory crimes such as the traditional organized crime income generators, fraud
and extortion; corruption, although a core organized crime activity, is best considered a means.
5
See Frank G. Madsen, ‘Organ Transplantation and Transnational Organized Crime’, RUSI
Journal, vol. 158, issue 5 (2013), 6–17.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Trafficking crimes 77
expenditure on health in 2010 was 9.5 per cent of GDP.6 This in and by itself will
attract the attention of organized criminals, but not only. This particular sector presents
the further attraction that it is characterized by the existence of denied demand, for
example access to cutting-edge pharmaceutical products, to organs for transplantation,
and to care and cure homes for the elderly and long-term ill. Amusingly, an Italian quip
states that sanità rima con criminalità or ‘health is a rime on crime’.
Denied demand is the resultant of a series of political choices, which have led to the
creation of an international prohibition regime. Whereas it would not be helpful to
criticize such choices, it is, however, of core import to stress that a so-called grey
market has never been defeated from the supply side. Therefore, it is safe to posit that
if denied demand becomes important enough, an illicit supply will meet the demand in
a marketplace and clear the market. Law enforcement can neither prevent the creation
of the market nor cause its closure. Any consideration of countermeasures would, in
consequence, have to include two fundamental questions: first, if a given prohibition
regime is really necessary and, second, how one can address the problem from the
demand rather than from the supply side.7
Denied demand is met by illicit supply, which consists in the arbitrage of borders;
the latter are often external, as is mostly the case in the illicit trade in narcotic drugs
and arms, but also internal, namely when a given good or service is made illegal, for
example gambling, or unattainable because of prohibitively high taxation, for example
brand tobacco product. In the former case organized crime provides access to an illegal
service, namely an ‘underground’ casino, in the latter to an otherwise legal product,
rendered illegal only by the non-payment of duties, that is by smuggling or diversion.
For obvious reasons, it is impossible – with any degree of certainty – to estimate the
value of trafficking crimes, since the active business units do not produce quarterly
reports, quite the opposite. But, as Peter Andreas rightly notes, it must be better to
persevere in the study of such crimes using the best possible estimates rather than
desisting.8
The estimate by the World Economic Forum (WEF) in 2011 might constitute an
acceptable approach, see Table 7.1. According to the WEF, the rough estimate of the
market of illicit goods would be roughly one trillion US dollars.9
6
OECD, ‘Health Expenditure’, in OECD Factbook 2013: Economic, Environmental and
Social Statistics (Paris, France: OECD Publishing, 2013), 249. For narcotic drugs, see Frank G.
Madsen, ‘International Narcotics Law Enforcement: A Study in Irrationality’, Journal of
International Affairs vol. 66, issue 1 (Fall/Winter 2012) p. 123.
7
Whereas empirical evidence seems to prove conclusively that a grey market cannot be
defeated from the supply side, one may reasonably raise the question if any evidence would
allow one to be more optimistic as regards intervention on the demand side. In fact, the sharp
decline in the number of male smokers in the western world over the last couple of decades
would encourage demand-side intervention.
8
Peter Andreas, Smuggler Nation (Oxford and New York: Oxford University Press, 2013),
xii.
9
One trillion = one million millions or x10E12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Table 7.1 Rough estimated market size of illicit goods based on public sources
(billion US$)
Source: Global Risks 2011. Cologny/Geneva, Switzerland: World Economic Forum, p. 23, table 3.
This estimate does not include vast segments of the market for counterfeit goods, such
as counterfeit luxury goods, counterfeit automobile and aircraft spare parts, counterfeit
consumer goods and counterfeit fertilizers. An UNICRI/Bascap report estimates
that the total global value of counterfeit and pirated products in 2014 will reach
US$1.7 trillion.
Estimating the value of the trade in counterfeit goods is particularly difficult because
of the heterogeneous nature of the product mix. The value of a counterfeit, generic
anti-malarial product, for example, is equal to the market price because that is what the
patient will have paid. But what is the value of counterfeit luxury goods, for example a
counterfeit 25 dollar brand-imitation watch? Is it $25 or the corresponding market price
of the genuine brand watch, which may be a hundred times more?
The nefarious nature of counterfeit goods consists in a series of negative business,
regulatory and health and safety issues.10 Such trade crowds out the legitimate product
and the copyright or patent holder will lose the market, in parte or in toto, to the
counterfeiter or copier. This may obviously put a damper on innovation, which, from an
economic point of view, is the hallmark of modern, western society. The trade in
counterfeits and pirated product also facilitates the creation and operation of the
10
UNICRI/ICC-Bascap, Confiscation of the Proceeds of IP Crime: A Modern Tool for
Deterring Counterfeiting and Piracy (2013). Available at www.iccwbo.org. UNICRI: United
Nations Interregional Crime and Justice Research Institute. ICC: International Chamber of
Commerce. Bascap: Business Action to Stop Counterfeiting and Piracy, an organism created
under the auspices of the ICC.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Trafficking crimes 79
Art Crime
Crimes against works of art, theft and destruction, for example, are on the rise. This
subsection considers art theft as such in the first part and then the worrying emergence
or re-emergence of theft or destruction of works of art as a kind of cultural genocide in
the second.
While the theft of works of art may, in the public perception, have been the remit of
the gentleman thief, and although the world of crime may have changed also in this
area from the 1990s, art and stolen art remain the subject matter of the shadowy world
of art dealers. Art is stolen by both opportunistic thieves and more organized criminals
– in this case perhaps to order? – but the fact that so much art disappears and never
11
In shorthand: counterfeit product is copyright violation, i.e. the product is presented as
having been manufactured by the copyright holder, although it is not, and it bears the copyright
holder’s name. Pirated goods are violations of the patent; they do not carry the patent holder’s
name, but they are manufactured using the patent holder’s patented idea, be it process or
substance. The deplorable international inactivity – with the laudable exception of Interpol –
against often dangerous counterfeit or pirated pharmaceutical product is caused by political
squabbles over such definitional issues. See Amir Attaran et al. ‘How to Achieve International
Action on Falsified and Substandard Medicines’, British Medical Journal. 2012;345:e7381.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
resurfaces or resurfaces after decades has led some scholars to pose the question of the
whereabouts of such stolen art. In a New York Times tally, reported by Naím, the world
is missing 551 Picassos, 43 Van Goghs, 174 Rembrandts and 209 Renoirs.12 Some
undoubtedly are held by secretive collectors, who can only admire their collections
alone, as these works of art would be easily recognizable. Others – and this may
explain the increase in the traffic – may be held as investment or as a sort of reserve
currency paid for by illicit funds. The point here is that in the post-gold standard era,
currency is only as robust as the trust that subtends it. If one were to imagine a
situation where, as a result of, say, war or a major epidemic, the subtending trust were
to disappear, one would be wise to possess investments resistant to such disorder.
Whereas stolen art eventually, one would hope, will resurface somewhere, and
although looting of archaeological sites and religious sites often involves some
destruction of art and context, known as acquisitive vandalism, a particularly worrying
aspect of art crime is art vandalism. Fine and Shatin define art vandalism as the
intentionally destructive and illegal damage to a work of art.13 Conklin departs from
this definition by including negligence, which is less than helpful.14 One should retain
Fine and Shatin, insisting on the intention to destroy, while fine-tuning various
motivations. In this section, an often overlooked but crucially important subsection of
vandalism, namely that part motivated by damnatio memoriae, will be emphasized.
Somewhat hesitantly, one might agree with Bevan and argue that this form of
vandalism is cultural genocide, namely the deliberate attempt to eradicate the cultural
presence and, indeed, the former and present existence of a people or community
definable by ethnicity or religion, an idea, or, more rarely, of a person.15 The ultimate
goal of the destruction is the erasure or transformation of identity.
Examples are, respectively, the so-called Kristallnacht in Germany, 9–10 November
1938, which witnessed the destruction of hundreds of synagogues; the somewhat naive
removal of the name of Mussolini from a long inscription in front of Augustus’
mausoleum in Rome presumably in a futile attempt to pretend that Italian fascism had
not existed or more easily to forget that it did; and finally the erasure of the name of
Geta from the nearby triumphal arch of Septimius Severus, albeit somewhat earlier,
whereby Geta’s murderer, Caracalla, relegated his brother to eternal oblivion, or at least
attempted to.
The worrying and apparently unstoppable trade in art and antiquities, including
artefacts from irregular excavation and art purloined from churches, synagogues,
temples, public buildings and museums, often presents an example of double motiv-
ation: profit and cultural extinction. An example here might be the trade in works of art
12
Edward Dolnick, ‘Stealing Beauty’, New York Times (24 August 2004), A17. Moisés
Naím, Illicit (New York: Doubleday, 2005), 171.
13
Gary Alan Fine and Deborah Shatin, ‘Crimes against Art: Social Meanings and Symbolic
Attacks’, Empirical Studies of the Arts, vol. 3 (1985), 135–152.
14
John E. Conklin, Art Crime (Westport, Conn.: Praeger, 1994), 227.
15
Robert Bevan, ‘Razing the Past: Soldiers and Civilians Are Not the Only Casualties of
War. Aggressors Also Target the Physical Monuments to an Enemy’s Existence and So Attack
Their Libraries, Churches and Schools. Robert Bevan Reports on the Destruction of Memory’,
The New Statesman, vol. 134, issue 4770 (12 December 2005). ‘Hesitantly’ because one cannot
compare the physical destruction of an ethnic or religious group with that of destruction of art.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Trafficking crimes 81
and antiquities from Turkish-occupied northern Cyprus.16 In this case, one observes
both intentional cultural dispersal and, since this is more often than not linked with
acquisitive vandalism, damage done in the course of an effort to acquire money or
property by inexpert removal of murals, folding of oil paintings, and so on.17
The importance of art as a constituent element of cultural identity may be observed
in the joy with which the three pre-Angkorian sandstone statues that had been looted
from Prasat Chen at the Koh Ker Temple Complex almost forty years earlier were
received back in Cambodia in June 2014.18
16
Charalampos G. Chotzakoglu, Religious Monuments in Turkish-Occupied Cyprus: Evi-
dence and Acts of Continuous Destruction (Nicosia, Cyprus: Museum of the Holy Monastery of
Kykkos, 2008).
17
Stanley Cohen, ‘Property Destruction: Motives and Meanings’ in Colin Ward (ed.)
Vandalism (New York: Van Nostrand Reinhold, 1973), 215–257.
18
I thank His Highness Sisowath Ravivaddhana Monipong of Cambodia for having shared
with me this information as well as having provided me with a filmed testimony of the reception
ceremony for the statues held in Phnom Penh on 3 June 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
as on the legitimate market, since the price differential is created only by the
non-taxation.
Fifth, the creation of an important income stream for organized crime and, sixth, of
a similar, important income stream for terrorist groups.19 Some examples: from 1999 to
2004, the Irish Republican Army (IRA) is estimated to have earned US$100 million
from smuggling cigarettes to Northern Ireland.20 Likewise, one Muḫtār Bitmuḫtār,
a.k.a. Mukhtar Belmukhtar, alias ‘Mister Marlboro’ alias ‘The One-Eyed’, financed his
and his group’s terrorist activities through the trade in illicit tobacco product in
southern Africa; a traffic of a total value of approximately one billion US dollars.21
Source: Elaborated by author based on Cuscito, Giorgio. 2013. ‘Dove c’è fumo c’è Cina’ (Where there is
smoke there is China), Limes, vol. 10; eBook Version, 196–201, map 1 (p. 198).
The illicit cigarette consumption in the European Union in 2012 was 65.5 billion, or
11.1 per cent of the total, with a tax loss of €12.9 billion (US$16.9 billion).22 The
differences in levels of illicit tobacco consumption are outlined in Table 7.2.23
Counterfeit Pesticides
This type of illicit trade has often been neglected in the study of trafficking crimes, but
wrongly so.24 In fact, such pesticides are introduced into Europe in large quantities.
More often than not, they contain illegal active ingredients that could potentially be
dangerous to health.
19
William Billingslea, ‘Illicit Cigarette Trafficking and the Funding of Terrorism’, The
Police Chief, vol. 71, issue 2 (2004) pp. 49–54.
20
Ibid.
21
Jamie Doward, ‘How Cigarette Smuggling Fuels Africa’s Islamist Violence’, The Guard-
ian (27 January 2013). Part of the al-Qaeda franchise. Contrary to the premature announcement
of his death, he seems to be alive, operating in and from Chad.
22
Philip Morris International, ‘New Study Finds EU Black Market for Cigarettes Reaches
Record High; Member States Tax Loss an Estimated €12.5 Billion’ (17 April 2013).
23
Giorgio Cucito, ‘Dove c’è fumo c’è Cina’, Limes, vol. 10 (November 2013), 167–172.
24
I thank my friend, Mr D’Arcy Quinn, for having introduced me to the disquieting world of
counterfeit pesticides. For a general overview, see CropLife International, Counterfeit and Illegal
Pesticides Smuggling Caused by Unregulated International Trade. Brussels, Belgium: CropLife.
Europol, Growth in the Trade in Counterfeit and Other Illegal Pesticides across Europe.
OC-Scan Policy Brief for Threat Notice No. 011-2011. The Hague, the Netherlands: Europol,
2011.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Trafficking crimes 83
The recent seizure in the European Union, 19 May 2014, of 21 tonnes, including
10.5 tonnes of pesticides not authorized on the EU market and 10.5 tonnes of
insecticides carrying the false label of a well-known manufacturer, illustrates the point.
The illegal pesticide had been manufactured in China, brought via ship to Odessa,
Ukraine, and then overland to Poland, where – acting on information from OLAF (the
European Anti-Fraud Office) – it was seized.25
Ten per cent of all pesticides in the world are illegal, 7 per cent in the European
Union. The largest seizure, so far, in Europe was of 28 tonnes on 4 January 2010 in
Hamburg, Germany.26
Illicit traffic in pesticides clearly illustrates the dangers inherent in such trade. First,
the product almost always contains chemical compounds that are illegal for use as
pesticides in the western world because they are potentially dangerous to human health.
Second, the shipments follow routes used for licit traffic. Third, it took – and generally
takes – international cooperation to arrive at a seizure, in this case the good offices of
OLAF. Fourth, the possibility that anybody, manufacturer, shipper, shipping agent,
vessel owner or recipient, will be held criminally responsible is remote.
Counterfeit Pharmaceuticals
+ 30 per cent of drugs purchased at random in Southeast Asia failed testing of their
pharmaceutical ingredient.
+ 35 per cent of drugs purchased in Sub-Saharan Africa failed the same testing.
+ Based on World Health Organization (WHO) research, 655,000 individuals are
killed by malaria every year, of which 200,000 are ascribable to substandard and
counterfeit production of anti-malarial medication.
Only Interpol seems to take any meaningful action against counterfeit pharmaceuticals.
Their action, however, has so far been limited to postal interception, which may present
a somewhat skewered image of the market of counterfeit pharmaceutical product.
Between 13 and 20 May 2014, Interpol directed a worldwide enforcement action in 110
countries, codename Pangea VII, whereby some thirty million dollars’ worth of
counterfeit pharmaceuticals were seized, 239 individuals were arrested and 10,000
25
Smuggled Counterfeit Pesticides. Press Release No. 13/2014 of 31 July 2014. Brussels,
Belgium: OLAF, EU.
26
Barbara Conforti, Santé, sécurité, contrefaçon, attention danger. CAPA TV Production,
2011.
27
Gaurvika M. L. Nayar, Joel G. Breman, Paul N. Newton and James Herrington,
‘Poor-Quality Antimalarial Drugs in Southeast Asia and Sub-Saharan Africa’, The Lancet
Infectious Diseases Journal, vol. 12, issue 6 (June 2012), 488–496.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
illicit websites were closed. The seized product belonged to a number of therapeutic
areas, namely analgesics, thyroid hormones, anxiolytics, and insulin.28 A 2012 report
from the EU Commission indicates that counterfeit pharmaceuticals constitute the class
of product most often seized on the borders of the European Union.
Counterfeit anti-cancer product is becoming more and more prevalent among seized
counterfeit pharmaceuticals in general, that is, not only postal interception. This is
caused by the high price of such product, which attract poorer patients to what they
believe to be a cheaper source. One might speculate that the present novelty expressed
by experts is caused by the collection methodology, since all seizures are postal
seizures from Internet orders. Counterfeit anti-cancer drugs have always been a
favourite with counterfeiters, because an adverse or lacking patient reaction was
ascribable to the illness not the pharmaceutical product. Apart from Interpol’s highly
successful Pangea VII operation, some major recent seizures are included in Table
7.3.29
28
The presence of insulin is rather surprising. Hitherto, counterfeiters have avoided insulin,
because the lack – or erroneous dosing – of active ingredient would be detectable immediately
by the patient’s reaction.
29
Chloé Hecketsweiler, ‘Offensive d’Interpol contre les pharmacies illégales’, Le Monde –
Economie et Entreprise (23 May 2014), 3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Trafficking crimes 85
The counterfeiting of pharmaceutical product is more lucrative than the illicit traffic in
narcotic drugs and – in practical terms – risk-free (for the criminal, not the patient).
Aline Plançon opines that one thousand euros invested in the counterfeiting of
pharmaceuticals will yield between 200,000 and 450,000 euros in profit, depending on
the end-market.30
CONCLUSION
This chapter has emphasized the causal relationship between the concept of denied
demand and trafficking crimes. It has illustrated this relationship with an analysis of a
few such crimes, some of which can be considered emerging crimes, while all have
severe negative, societal consequences.
In fact, the full negative impact of trafficking crimes that constitute abuse of the
environment remains to be fully evaluated. These include, but are by no means limited
to, the trade in hardwood timber, and deforestation in general, the trade in toxic waste
for illicit disposal and the traffic in counterfeit pesticides, which all involve serious
harm to the environment and potential risk to human health, as does the counterfeiting
of pharmaceuticals. Art crime, and in particular the looting of archaeological and
religious sites, leads to the dilution or extinction of cultural identity. Finally, purely
financial trafficking crimes, as illustrated by the illicit trade in tobacco product, entail
an important diminution of government revenue, invalidate government’s ability to use
pricing as a tool, for example, for health education, provide organized criminals and
terrorists with important revenue streams, and erode the citizens’ respect for the rule of
law.
From 1912, the first – misguided – international opium treaty, an increasingly
inclusive international prohibition regime has been created, which to a large degree is
both unenforced and unenforceable. One might be forgiven for thinking that it would
make more sense to concentrate effort on a few issues that entail clear societal harm.
30
Chloé Hecketsweiler, ‘“1000 euros investis dans les faux médicaments peuvent rapporter
entre 200000 et 450000 euros.” Questions à Aline Plançon, chargée de la criminalité pharma-
ceutique à Interpol’, Le Monde – Economie et Entreprise (23 May 2014), 3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 07 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
“No wealth can ever make a bad man at peace with himself” opines Plato, but the
abundance of criminals and criminally derived wealth seems to challenge this phil-
osophy. Economic crime, financial crime, white collar crime are all different terms used
to describe offences where both the means of commission and the objectives involve
money. Whatever the name, these are menacing crimes with potentially devastating
consequences.
The range of economic crimes is extensive, but the focus of this chapter will be
confined to money laundering, corruption, tax evasion and terrorist financing as, in
many instances, they share a common methodology.
A. MONEY LAUNDERING
Successful money laundering severs the links between the criminal, the crime and the
proceeds of crime. If the money cannot be linked to the crime or its perpetrator, the
criminal can enjoy the success of his criminality and continue to build his illicit
enterprise without fear of apprehension and prosecution.
Money laundering has therefore been described as “the criminal’s way of trying to
ensure that, in the end, crime pays”.1 However, apart from insulating the criminal and
his ill-gotten gains, the wider implication of money laundering is that it can negatively
impact every aspect of society by causing severe economic, political and social
damage.
In this context, the drug trade has been viewed as “the greatest single threat to the
social, economic fabric of the (Caribbean) … Unchecked it will destroy us, absolutely
destroy us … the money available is just too great.”2 Caribbean Community Secretariat
(“CARICOM”) leaders have long concluded that “narcotics trafficking and its associ-
ated evils of money laundering, gun smuggling, corruption of public officials, crimin-
ality … constitute the major security threat to the Caribbean today”.3 Of course, it is
1
U.S. Department of State, “The Consequences of Money Laundering and Financial
Crime” (May 2001) Vol. 6 (2) Economic Perspectives 6.
2
Former Bahamian Prime Minister, Lynden Pindling quoted in Maingot, A., “Laundering
the Gains of the Drug Trade: Miami and the Caribbean Tax Havens” (1988) 30 Journal of
Inter-American Studies and World Affairs 167.
3
Heads of Government meeting held in Barbados in December 1996.
86
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
not just drug proceeds that pose such a threat as “there is no moral difference between
drug trafficking and other serious offences as the risks from both are great”.4
It may be said that money laundering represents the greatest non-military security
threat to Jamaica. Indeed, the rise of organised crime gangs is partly attributable to
successful money laundering, and much of the anti-social behaviour is connected to
these notoriously brutal gangs. There is evidence of drug gangs engaging in robberies
to diversify their income and also fencing stolen high-value property in order to convert
their illicit cash into commodities, as part of the laundering process.
Jamaica’s crime statistics are alarming and rank among one of the highest in the
world. National polls indicate that crime is the public’s number one concern and,
indeed, fear and anxiety affect all sections of Jamaican society to significant and, in
some cases, debilitating degrees.5 The result “is an erosion of public confidence in the
state’s ability to reduce the incidence of crime”.6
The massive earnings generated by crime radically change the system of values in
the society, as crime kingpins become role models for disillusioned inner-city youth.
Ultimately, the influence of criminal organisations can weaken the social fabric,
collective ethical standards and the democratic institutions of society.7
4
Quoted in Burrell, P., “Preventing Tax Evasion through Money-Laundering Legislation”
(2000) Vol. 3 (4) Journal of Money Laundering Control 304.
5
National Crime Prevention and Community Safety Strategy (“NCPCSS”).
6
Jones, M., “Crime-Related Events: A Path to Policy Change in Jamaica?” (April 2014)
Vol. 1 (1) Caribbean Journal of Criminology 76.
7
OECD Policy Brief (1997–98).
8
Ali, S., Money Laundering Control in the Caribbean (2003) Kluwer, London.
9
U.S. Department of State, “The Consequences of Money Laundering and Financial
Crime” op. cit.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
and luxury automobiles.10 This is done to preserve their value or make them more
easily transferable. For developing countries, the diversion of such scarce resources
presents a serious impediment to economic growth.
Criminals seek to dominate the market by both fair and foul means and engage in
unfair business practices such as predatory pricing, extortion and corruption.11 Criminal
participation in a commercial activity could distort that market. For example, inflated
prices paid for real estate causes the price of similar houses to escalate to a level not
commensurate with the true value of that property. This produces a disruption of the
natural growth of the property industry. Where the market appears lucrative, legitimate
investors may be attracted to it, but loans for these purchases are secured using the
inflated value of the property. This causes a speculative bubble to arise, but when the
bubble bursts it would lead to a crash in that market.12
Money launderers are primarily motivated by minimising their risk of detection
rather than the rate of return so when particular investment vehicles no longer suit their
needs they abandon them, to the detriment of that sector. Developing countries can
become favoured by large-scale money launderers for short periods, the sheer volume
causing a sharp surge in financial activity and creating a façade of financial growth.13
However, this is usually followed by an equally sharp decline, resulting in severe
macroeconomic instability.
The large inflows and outflows of money associated with money laundering can
confuse policymakers and significantly influence economic indicators affecting infla-
tion, including monetary levels, exchange rates and interest rates as well as the price of
assets in which the illicit money is invested.14 Consequently, changes needed to attract
legitimate income are not made.
Money laundering creates risks for the safety and soundness of financial institutions.
If criminals infiltrate the financial sector, the investing public may conclude that it is
neither stable nor trustworthy and they will transfer their capital to countries perceived
as safer. The costs of such capital flight include “a loss of productive capacity, tax base,
and control over monetary aggregates – imposing a substantial burden on the public at
large and rendering policymaking more difficult”.15
Where a jurisdiction acquires such notoriety, foreign financial institutions may
decide to limit their transactions with institutions from that jurisdiction, subject their
10
Asian Development Bank, Manual on Countering Money Laundering and the Financing
of Terrorism (March 2003).
11
Sherman, T., “International Efforts to Combat Money Laundering: the Role of the FATF”
in H. MacQueen (ed.) Money Laundering (Edinburgh: University Press 1993).
12
Comstock, M., “GATT and GATS: A Public Morals Attack on Money Laundering” (1994)
15 Northwestern Journal of International Law and Business 139.
13
Asian Development Bank, Manual on Countering Money Laundering and the Financing
of Terrorism, op. cit.
14
Tanzi, V., “Money Laundering in the International Financial System” IMF Working Paper
(1996).
15
Loungani, P. and P. Mauro, Capital Flight from Russia, IMF Policy Discussion Paper
(June 2000).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
AML Framework
In Jamaica there exists a strong legislative framework to fight the scourge of money
laundering. This comprises the following key pieces of legislation:
Indeed, it may be said that POCA represents “a raft of legislation of which Dracon, the
Athenian legislator, would have been proud”.20 POCA creates the offence of money
laundering which occurs where a person engages in a prohibited act where he knows or
has reasonable grounds to believe that the relevant property constitutes or represents a
person’s benefit from criminal conduct.21 For this purpose, “benefit” is defined as
including any “property, service or advantage” and it is immaterial who carried out or
benefited from the conduct. The definition covers all conduct which would constitute
an offence in Jamaica and includes conduct which occurs abroad but which would
constitute an offence if it occurred in Jamaica.
POCA provides a post-conviction asset recovery machinery which includes:
In addition, POCA provides for civil recovery which takes the form of civil proceed-
ings against any person who the Asset Recovery Agency (“ARA”) believes holds
16
Schott, P.A., Reference Guide to Anti-Money Laundering and Combating the Financing of
Terrorism (2nd ed.) (Washington D.C., The International Bank for Reconstruction and
Development/The World Bank, The International Monetary Fund 2006).
17
Ibid.
18
Ibid.
19
For a discussion on POCA, see Ali, S., Proceeds of Crime Act: Taking the Profit Out of
Crime (MIND, Kingston, 2014).
20
UMBS Online Ltd. v. SOCA [2007] EWCA Civ 406.
21
Sections 92 and 93 POCA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 4 / Date: 14/10
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
property obtained from unlawful conduct.22 The court may follow and recover property
from any person who obtained it from the original perpetrator. The order is discretion-
ary and the court would only make it if it is just and equitable to do so. Where a civil
recovery order is made, the recoverable property is vested in the ARA.
Civil recovery is a particularly useful device where the offender is unavailable for
prosecution or where it is difficult to obtain sufficient evidence to obtain a conviction
against him and, as such, it is an important tool for dealing with crime bosses who are
usually insulated from apprehension and prosecution.23
POCA also provides for the civil recovery of cash, in excess of JA$100 000, which
was either intended for use in crime or obtained from unlawful conduct. For these
purposes, cash includes postal orders, cheques, bank drafts, bearer bonds and bearer
shares.24 If the allegations are proved the cash may be forfeited.
Whilst the majority of the provisions apply to the general public, there are certain
obligations that apply exclusively to the regulated sector, which comprises financial
institutions and designated non-financial institutions (“DNFIs”). For now, DNFIs
include attorneys-at-law, accountants and real estate dealers as well as casino and
gaming operators.
Persons in the regulated sector have obligations relating to customer identification,
record-keeping and disclosure of knowledge or belief that another person is engaged in
a transaction that could constitute money laundering.25 This disclosure is known as a
Suspicious Transaction Report (“STR”) and is made to the designated authority.26
Under the Proceeds of Crime (Money Laundering Prevention) Regulations, financial
institutions also have a duty to report cash transactions that attain the prescribed
amount.27
In order to prevent an investigation from being jeopardised, the offence of tipping-off
may occur where there is an unauthorised disclosure of an STR or other information
that may prejudice a pending or ongoing money laundering investigation.28 There is
also a related offence of prejudicing an investigation where there is either disclosure of
information prejudicial to a POCA investigation or destruction, concealment or
falsification of documents relevant to an investigation.29 In order to follow the money,
POCA prescribes certain investigative orders including customer information orders,
disclosure orders, search and seizure warrants and monitoring orders.30
The general public has a duty to report the transportation, either into or out of
Jamaica, of cash (including bearer-negotiable instruments) in excess of US$10 000 or
22
Section 57 POCA.
23
Ali, S., “The Civil Law: a Potent Crime-fighting Device” (2014) Vol. 17 (1) Journal of
Money Laundering Control 4.
24
Section 55 POCA.
25
Section 94 POCA.
26
This is the Chief Technical Director of the Financial Investigations Division.
27
Money transfer and remittance agents US$5 000; Cambios and bureaux de change
US$8 000; Banks and other financial institutions US$15 000.
28
Section 97 POCA.
29
Section 104 POCA.
30
Sections 105 to 128 POCA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
its equivalent.31 This is intended to detect persons who attempt to smuggle illicit cash
since non-compliance may be a sign that the person failing to make the report has
something to hide.
In a bid to move to a “cashless” society and thus reduce the amount of illicit cash in
circulation, POCA prohibits a person from engaging in a financial transaction involving
cash exceeding the prescribed amount,32 unless he is an exempted or permitted person
or the transaction has been exempted.33 A person is also prohibited from structuring a
cash transaction so that it falls below the prescribed amount where the aggregate would
exceed that amount.
An important AML strategy is to establish a risk profile for each customer. Under
POCA, where a client is deemed to be high-risk, enhanced due diligence procedures
must be followed including:
Civil Liability
Apart from criminal liability under POCA, developments in the law of restitution and
the law relating to constructive trusts are relevant for imposing civil liability for money
laundering. In particular, the equitable concept of “intermeddler liability” could affect a
financial intermediary or professional gatekeeper who is involved in hiding the
proceeds of crime.
This principle forms the basis for two types of liability. The first is recipient liability
and occurs if the defendant receives misappropriated trust property.34 In that case he
would be liable to return it to the victim of fraud and would evade liability only if he
was a bona fide purchaser for value without notice.
The second basis of intermeddler liability is accessory liability and may occur even
where the defendant never received the misappropriated property. Liability accrues
where the defendant dishonestly assists in a scheme involving property derived from a
breach of trust or fiduciary duty.35 Here, he would be liable to a personal order to
account to the victim an amount equal to that which he was defrauded.
AML Benefits
31
Section 101 POCA.
32
JA$1 million.
33
Section 101A POCA.
34
BCCI v. Akindele [2000] 3 W.L.R. 1423.
35
Royal Brunei Airlines v. Tan [1995] 2 A.C. 378 (PC).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
sector.36 They provide a disincentive for criminal involvement in the economy and
permit investments to be put into productive purposes that respond to consumer needs
and help the productivity of the economy.37
These benefits include enhanced risk management techniques, leading to greater
stability and economic development because of increased integrity of financial insti-
tutions and markets. This would also result in lower crime and corruption levels as well
as a positive reputation in the international community.
B. CORRUPTION
The opportunity for abusing one’s office for personal gain has existed from time
immemorial and is said to reside in any position that yields discretionary power. In
many aspects of Caribbean life, one sees the “greasing-of-the-palm” when those who
are being paid to provide a service insist on an additional “under-the-table” payment
for that service, without which, the citizen is simply frustrated.38
Whilst most persons record and condemn acts of corruption, when it comes to
articulating such conduct through the law and institutions of the traditional justice
system, “real problems of definition, scope and proportionality arise”.39 Nonetheless, a
somewhat generic definition of corruption is the misuse or abuse of entrusted power for
private gain.
Corruption may fall into one of the following categories.
There are several forms of corruption including bribery, cronyism, nepotism and
embezzlement, but bribery is perhaps the most common form of corruption in
Caribbean society. Bribery requires two participants: one who gives the bribe and one
who takes it. Bribes may be demanded in order for an official to do something he is
already paid to do, such as facilitation payments to receive preferential treatment.
Alternatively, bribes may be demanded in order to circumvent rules in order to provide
services that the recipient is prohibited from providing.
36
Asian Development Bank, Manual on Countering Money Laundering and the Financing
of Terrorism, op. cit.
37
Schott, P.A., Reference Guide to Anti-Money Laundering and Combating the Financing of
Terrorism, op. cit.
38
Smith, L.B., “Jamaica-still a problem” Jamaica Observer (January 7, 2014).
39
Rider, B., “Recovering the Proceeds of Corruption” (2007) Vol. 10 (1) Journal of Money
Laundering Control 5.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
It is said that people are as corrupt as the system allows them to be and it is “where
temptation coexists with permissiveness”40 that corruption takes root on a wide scale.
Transparency International (“TI”) has identified the following conditions as producing
an environment conducive to corruption:41
Effects of Corruption
The cost of corruption may be viewed in terms of political, economic and social
consequences and, as such, corruption poses a serious development challenge. Accord-
ing to TI, corruption constitutes a major obstacle to democracy, good governance and
the rule of law as offices and institutions lose their legitimacy when they are misused
for personal advantage. In some countries, the culture of corruption extends to every
aspect of public life, the end-point of which is a kleptocracy, literally “rule by
thieves”.42
Where grand corruption results in the depletion of national wealth, poverty results
for the masses. This could lead to social unrest, with political oppression being invoked
to retain power and democracy being replaced with rule by force.
Economically, corruption hinders the development of fair market structures, distorts
competition and thereby deters investment.43 It is therefore a key element in economic
under-performance and a major obstacle to poverty alleviation and development.44 For
instance, where bribes are made to officials for the waiver of customs duties or taxes,
this would result in reduced revenue for the government. A 2010 Don Anderson Poll
found that, for the first time, Jamaicans perceived corruption as “that thing that was
most wrong with Jamaica”.
The effect of corruption on the social fabric is perhaps the most damaging. It
undermines people’s trust in the political system, in its institutions and in its leadership.
Frustration and general apathy among a disillusioned public may result in a weak civil
40
Transparency International http://archive.transparency.org/news_room/faq/corruption_faq.
41
Ibid.
42
http://en.wikipedia.org/wiki/Political_corruption.
43
http://archive.transparency.org/news_room/faq/corruption_faq.
44
National Integrity Action https://niajamaica.org/.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
society.45 Ultimately, “bad governance, disaffected citizens and poverty are corruption’s
inevitable outcomes”.46
There exists a close nexus between corruption and money laundering, both intertwined
and complementary to each other. Criminals will try to gain the complicity of officials
to facilitate the laundering of their wealth so that their criminal enterprise can thrive
without disruption. In this regard, bribery may occur in critical gateways, such as
financial institutions, lawyers, accountants, law enforcement agencies and court offi-
cials.47 Bribery may be committed to facilitate the smuggling of cash, foil investiga-
tions, destroy evidence and circumvent AML reporting procedures.
Furthermore, corruption is not only a product of money laundering but also a source
since the bribes received also need to be laundered. In many cases, the money is
laundered in foreign jurisdictions, adding to capital flight. Since bribes need to be kept
secret, sometimes the methods employed to pay bribes imitate those used to launder the
proceeds of crime.
Overall, collusion between criminals and persons in the public and private sectors
produces a crime, violence and corruption matrix as those that cannot be bought will be
made to cooperate through force, with money laundering being a facilitator and product
of all three.48
Perception of Corruption
TI’s Corruption Perceptions Index (“CPI”) is based on the perception of the degree of
corruption as seen by business people and risk analysts in the particular country. A
rating of 100 means that the jurisdiction is considered to be very clean whilst a rating
of 0 means it is perceived to be highly corrupt. Jamaica maintains a poor score on the
CPI; for instance, in 2012, 2013 and 2014 Jamaica received a score of 38.49
The significance of these ratings is the potential impact they may have on
investment. Perception plays a large part in influencing potential investors and, just as
with money laundering and other economic crimes, if a country is perceived to have a
corruption problem it may deter legitimate investors who do not wish to become
embroiled in such activity.
Challenges
Corruption is, in common with other economic crimes, notoriously hard to prosecute,
because of the difficulties in obtaining sufficient evidence. Large-scale corruption
45
http://archive.transparency.org/news_room/faq/corruption_faq.
46
Transparency International, Global Corruption Report (2001).
47
Schott, P.A., Reference Guide to Anti-Money Laundering and Combating the Financing of
Terrorism, op. cit.
48
Ali, S., “A Tale of Two Regions: the Latin American and Caribbean Money Laundering
Connection” (1998) 2 Journal of Money Laundering Control 21.
49
Transparency International, Corruption Perception Index (2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
usually involves sophisticated and complex devices to conceal this activity, making
detection difficult. Since there is rarely a victim who comes forward to report loss, the
exposure of corruption depends on the receipt of verifiable information from those who
encounter such activity, including public administration and the financial services
industry.50
In high-level corruption cases, law enforcement is dealing with “crimes of the
powerful”, and the investigation may face interference from government agencies.
High-profile cases also generate wide media attention, which puts pressure on law
enforcement, and this could undermine impartiality in a trial.
Reducing Corruption
Greater transparency and public participation may help to reduce corruption. Access to
information legislation in Jamaica allows a person, subject to some exceptions, to
request to review information that is held by a government agency.51 This allows the
media, non-governmental organisations (“NGOs”) and civil society to assist in expos-
ing possible acts of corruption.
The reporting of corrupt activity is also a key device in detecting and preventing
corruption. For instance, certain public servants, including the Auditor General52 and
Contractor General,53 have an obligation to report irregularities and breaches falling
within their jurisdiction. Also, the Commission for the Prevention of Corruption
(“CPC”) has a duty to report any act of corruption by public servants.
Under the Corruption (Prevention) Act (“CPA”), public servants who earn the
prescribed amount are required to file an annual declaration of their assets, liabilities
and income to the CPC. This declaration would also cover the assets, liabilities and
income of the public servant’s spouse and children and is useful to detect possible acts
of corruption, including illicit enrichment.
In addition to the anti-corruption legislation, the money laundering laws may be
invoked to reduce corruption through the reporting of suspected laundering of the
proceeds of corruption. Also, under POCA, one may be prosecuted for laundering the
spoils of corruption, and the recovery of such ill-gotten gains may be pursued.
Corruption Offences
1. a public servant solicits or accepts a benefit for doing, or omitting to do, any act
in the performance of his public functions;
2. a person offers to a public servant any benefit for doing or omitting to do any
such act;
50
http://www.oecd.org/site/adboecdanti-corruptioninitiative/regionalseminars/35143975.pdf.
51
The Access to Information Act.
52
Pursuant to the Financial Administration and Audit Act.
53
Pursuant to the Contractor-General’s Act.
54
Sections 14 and 15 CPA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
3. a person offers a public servant in a foreign state any benefit for any act to be
performed by him in connection with a commercial transaction;
4. a public servant misuses for his benefit confidential information belonging to the
government;
5. a public servant diverts government property for his own benefit;
6. a public servant fails to file or knowingly makes false statements in a statutory
declaration of assets, liabilities and income;
7. an agent obtains any benefit as an inducement or reward for doing or omitting to
do any act in relation to his principal’s business. Since the definition of agent
includes any person employed by another, liability would also attach to persons
working in the private sector.
The offence of illicit enrichment may occur where a public servant who owns assets
disproportionate to his lawful earnings is unable to provide a satisfactory explanation as
to how he came by such assets. It is a defence for him to show the court that he came
by the assets by lawful means.55
Civil Liability
Apart from criminal liability, a recipient of a bribe may be subject to civil liability. In
AG for Hong Kong v. Reid 56 the defendant accepted bribes which he invested in New
Zealand. On his conviction, a confiscation order was imposed requiring him to pay the
value of the bribes received. However, when it remained unpaid, the Hong Kong
government sought to assert an interest in the property held by the defendant.
The Privy Council agreed that it would be unconscionable for the defendant, as a
fiduciary, to retain a benefit in breach of that duty. They held that he was under a
personal duty to account to his principal for the bribes as soon as he received them.
Since equity sees as done that which ought to have been done, although initially the
government only had a personal right to an account for the bribes, equity would treat
the account as having been made from the time the bribes were received and confer on
the state a proprietary interest in the monies on account. Thus, the court held that the
Crown had a proprietary right in the bribes from the moment of their receipt. As such,
the properties acquired with the bribe money were to be held on constructive trust for
the Crown.
This approach was applied in the Cayman Islands in Corporacion Nacional del
Cobre de Chile v. Interglobal 57 where the defendant received secret payments from a
third party as an inducement to procure the principal company to enter into certain
contracts. It was held that where a fiduciary accepts bribes as an incentive for his
breach of duty, he not only becomes a debtor for the amount of the bribes to the person
to whom the duty was owed but he also holds the bribes and any property acquired on
constructive trust for that person.
55
Section 14(5A).
56
[1994] 1 A.C. 324.
57
[2002] C.I.L.R. 298.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 11 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Since the agent would be deemed to be a constructive trustee of the bribe monies
from the time of receipt of that money, where he purports to launder that money, he
would be in breach of trust since he would not have the principal’s consent. In effect,
he would be misappropriating trust funds. This means that third parties who engage in
a transaction involving the bribe monies could be subject to intermeddler liability.
C. TAX EVASION
A deep-rooted principle of the common law is that everyone “is entitled to arrange his
affairs so that the tax attaching under the appropriate Acts is less than it would
otherwise be”.58 Indeed, a taxpayer may “decrease the amount of what otherwise would
be his taxes, or altogether avoid them, by means which the law permits”,59 but it is
unlawful for a taxpayer to minimise his tax liability through deception.
Tax avoidance and tax evasion are separated by a thin grey line, but where persons
deliberately provide false information to the Revenue, by under-reporting, failing to
declare their income or overstating their deductions, there is unlawful tax evasion.60
Tax evasion is of critical concern since it deprives the state of essential revenue. In
Jamaica tax revenue accounts for about 25 per cent of the country’s GDP and any
reduction in tax collection severely impacts the economy. Tax evasion creates a “tax
gap”, the difference between what the government expects to collect and what it
actually receives. Where the tax gap is wide, the government may impose new taxes,
but this creates a vicious circle as this may encourage more persons to evade the tax
laws, resulting in a net decline in revenue. Where the proceeds of tax evasion are
laundered outside of Jamaica, this contributes to capital flight.
The undeclared income forming the subject-matter of the evaded tax has to be hidden
from the Revenue in order to prevent its detection and the manner in which this wealth
is concealed often mimics that used to launder criminal wealth. Apart from various
penalties for tax evasion under the tax legislation, AML legislation may be invoked to
tackle tax evasion. Similarly, efforts against tax evasion can be useful in dealing with
money laundering since most criminals do not pay taxes on their illicit income.
D. FUNDING FEAR
Terrorism involves acquiring power through force and money provides the means to
achieve this objective. Terrorists need funds to buy weapons and communication
systems, as well as conduct training and campaigns. They also need access to
international payment systems in order to move money to terrorist cells scattered
around the world.
Consequently, the same vehicles used for evading taxes, paying bribes or laundering
money can be used for the secret financing of terrorist activity. Unlike money
58
Per Lord Tomlin in IRC v. Duke of Westminster [1936] A.C. 1.
59
Per Sutherland J. in Gregory v. Helvering 293 U.S. 465 (1935).
60
Ali, S., Money Laundering Control in the Caribbean, op. cit.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
laundering, in many cases the source of terrorist funding is legitimate, such as charities.
A key difference between money laundering and terrorist financing is that with money
laundering it is the origin of the funds that is sinister, whilst with terrorist financing it
is its destination.
The international community has developed several instruments to deal with terrorist
activities. For instance, the United Nations International Convention for the Suppres-
sion of the Financing of Terrorism 1999 and Security Council Resolution 1373 both
impose obligations on UN member states to criminalise the funding of terrorism and
freeze the assets of terrorists and those acting for them.
The Terrorism Prevention Act (“TPA”) of Jamaica seeks to give effect to these
international obligations and capture the varied ways in which terrorist activity may be
financed. For example, a person commits an offence if he wilfully, and without lawful
justification or excuse, collects, provides or makes available, property or financial
related services intending or knowing that they will be used for the purpose of carrying
out any terrorist activity or for the benefit of any terrorist group.61 Furthermore,
liability may be imposed on a person who deals in property that is owned or controlled
by or on behalf of a terrorist group or facilitates any transaction in respect of such
property.62 Essentially, where persons provide any financial related service for the
benefit of a terrorist group they would be liable.63 Apart from creating offences relating
to terrorist financing, the TPA also imposes reporting obligations on financial insti-
tutions and contains provisions dealing with asset forfeiture.
Costs of Crime
Serious crime places severe pressure on the economy through financial loss to victims
and the Revenue. Money used to purchase contraband is drained from the lawful
economy and not used for legitimate purposes, further reducing the economy’s output
and rate of growth. Security and anti-crime measures result in increased production
costs. This drives up the price of goods and makes them less competitive globally.
Scarce resources have to be re-allocated from essential services, such as health and
education, to fight crime, including the implementation of sophisticated AML measures
by law enforcement and the private sector. Overall, regulation imposes real world costs;
the more regulation we have the more expensive it is to obey such regulations.64
Additionally, there exists a direct correlation between crime and tourism and if crime
appears to go unchecked, the income derived from tourism will decline as tourists will
opt to holiday in safer neighbours in the region. Similarly, if crime continues unabated,
many Jamaicans may migrate, contributing to the brain drain through the loss of skilled
workers and professionals.
61
Section 4 TPA.
62
Section 5 TPA.
63
Section 6 TPA.
64
Worstall, T., “HSBC’s $1.9 Billion Money Laundering Fine and the Somalian Cost of
Bank Regulation” http://www.forbes.com/sites/timworstall/2013/08/08/hsbcs-1-9-billion-money-
laundering-fine-and-the-somalian-cost-of-bank-regulation/.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 13 / Date: 8/9
JOBNAME: Rider PAGE: 14 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
The implementation of effective measures to combat serious criminality must, there-
fore, remain at the top of the government’s agenda. Limited resources and evolving
methodologies will, however, continue to present a challenge for those seeking to battle
the scourge of criminality. Nonetheless, a collaborative approach may provide a key to
success. This requires collaboration among local law enforcement agencies as well as
with their overseas counterparts. It also requires an alliance between law enforcement
and the private sector. Otherwise, those charged with protecting the state’s national
interests and security will find themselves tangled ever after in a web of economic
crime and terror.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 14 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 08 /Pg. Position: 15 / Date: 8/9
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
PART III
BUSINESS CRIME
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Although the corporation is sometimes seen as an unruly horse, it has created enormous
wealth and, for various reasons, other types of business vehicles have not been utilised
as much. Perhaps one reason is political rent-seeking, favouring the use of the
corporate form,1 but there must be some intrinsic advantages to the corporate structure
that other vehicles find difficult to mimic. We see, for example, that UK real estate
investment trusts (REITs) have been required to adopt the corporate form and how
REIT deeds in Singapore typically attempt to replicate the dual property structure of a
company in order to provide artificial entity status to the REIT, in the process creating
a form of non-charitable purpose trust, with the following clause:
The Trust Deed sets out the rights of the Unitholder. Each Unit represents an undivided
interest in the (REIT). A Unitholder has no equitable or proprietary interest in the underlying
assets of the (REIT) and is not entitled to the transfer to it of any asset or of any estate or
interest in any asset of the (REIT). A Unitholder’s right is limited to the right to require due
administration of the (REIT) in accordance with the provisions of the Trust Deed, including
by suit against the Trustee or the Manager.2
Consequently, it is the separate legal status of the corporation, and the ring-fenced fund
that it owns, that is crucial and which Commonwealth trusts do not generally have. Any
study of abuse must necessarily relate to this aspect of separate personality, which
protects the entity in that its assets are insulated from the insolvency of its contribu-
tories. Affirmative asset partitioning (as opposed to defensive asset partitioning, ie,
limited liability) is thus really to facilitate entity lending, as creditors can look to the
segregated fund for priority repayment. The concern is much less with limited liability
for its shareholders, even if that was traditionally seen as a benefit of incorporation but
which was said by Hansmann and Kraakman3 at the start of the millennium to be
something which can be contracted for and came about independently of incorporation.
The latter, as of right and without a Royal Charter or Private Act, was facilitated by the
Joint Stock Companies Act 1844, with the Limited Liability Act 1855 enacted later.
1
Larry Ribstein, “Why Corporations?” [2004] 1 Berkeley Business Law Journal 183.
2
This is a typical clause found in the trust deeds of Singapore REITs. See further, Hans
Tjio and Lee Suet Fern, “Developments in Securities Law and Practice” in Teo Keang Sood (ed)
SAL Conference 2006: Developments in Singapore Law between 2001 and 2005 (Academy
Publishing, 2006). It may be that the beneficiary principle conflicts with any entity status of the
trust.
3
Henry Hansmann and Reinier Kraakman, “The Essential Role of Organizational Law”
(2000) 110 Yale LJ 387.
103
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Today we also see a proliferation of business vehicles offering limited liability as well,
but perhaps not a fully ring-fenced fund.4
The view taken here is that there has been little abuse of the corporate form as a
proprietary institution given that the corporate form is largely reified in a similar way
worldwide. What abuse that there is usually relates to the corporation being used as an
unlawful wealth protection device (which should be the preserve of trusts and their
perpetuity/accumulation restrictions) as opposed to one carrying on a business pro-
ducing goods and services; or perhaps a specific stage in a company’s existence where
the separate fund is violated and/or the corporate nomenclature misused in a way which
benefits one corporate constituent over another. The former is met by the doctrine of
veil piercing and the latter by various rules that reflect the duty to act for proper
purposes, which counters an appeal to the company’s best interests when this is
inappropriate.
4
Francis Rose, “Raising the Corporate Sail” [2013] LMCLQ 566 at 568 sees the limited
liability partnership as an “intermediate” or “hybrid” form of association that may not fully be a
separate legal entity. But Henry Hansmann, Reinier Kraakman and Richard Squire, “Law and the
Rise of the Firm” (2006) 119 Harvard LR 1333 at 1381 describe English general partnerships as
already having had “weak entity shielding” ever since Craven v Knight (1683) 21 ER 664 (Ch),
and this partly explains the continued relevance of the general partnership form.
5
[2013] EWCA Civ 730; [2013] 2 Lloyd’s Rep 295, [65] (Beatson LJ).
6
Prest v Petrodel Resources Ltd [2013] UKSC 34; [2013] 3 WLR 1, [35] (Lord Sumption),
noted Hans Tjio [2014] LMCLQ 19; cf S Ottolenghi, “From Peeping behind the Corporate Veil
to Ignoring It Completely” (1990) 53 MLR 338.
7
Prest, ibid, [64] (Lord Neuberger).
8
1973 c 18.
9
Prest, supra n 6, [49] (Lord Sumption).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
both piercing the veil and the statutory claim. The properties had been transferred to the
companies long before the matrimonial dispute and so the husband was not evading any
liability when he sought to protect his assets. In dicta, Lord Sumption thought that the
real purpose for piercing the corporate veil was “depriving the company or its
controller of the advantage that they would otherwise have obtained by the company’s
separate legal personality”.10 There was nothing to pierce if the entity was used simply
to conceal the controller’s identity as this could be revealed in other ways.11 In this
regard, it is perhaps relevant that the UK government has proposed a public register
reflecting the beneficial ownership (25 per cent and above) of the shares in its unlisted
companies and limited liability partnerships.12
Lord Sumption in Prest pointed out that “(i)t is not an abuse to cause a legal liability
to be incurred by the company in the first place. It is not an abuse to rely upon the fact
(if it is a fact) that a liability is not the controller’s because it is the company’s”.13 He
was also quite clear that the “objection would have been just as strong if the liability in
question had not been consensual”,14 even if the ability to bargain for limited liability,
or otherwise, is arguably more constrained in this context.15 Accordingly, true veil
piercing is only applicable “when a person is under an existing legal obligation or
liability or subject to an existing legal restriction which he deliberately evades or whose
enforcement he deliberately frustrates by interposing a company under his control”.16
While the doctrine as suggested by Lords Sumption and Neuberger is narrow (and
the other Justices did not commit themselves without further argument), it does suggest
that the company as an asset protection device remains more vulnerable than one used
to shield a controller from liabilities arising from a business that is owned by the
company. The first could involve persons trying to protect assets from their own
creditors or to escape some immediate liability pressing on them by using the separate
entity of a company to shield assets that would otherwise have been available to those
creditors or obligors. Separately, Hansmann, Kraakman and Squire believe that the next
stage in the evolution of organisational law is to deal with this problem,17 both within
and outside of bankruptcy. Factors to look out for are the time when the relevant
transfer occurred (as in Prest), whether the entity is generating any operating income
for which it pays corporate taxes, and if and how the corporate fund has been violated.
10
Prest, supra n 6, [35] (Lord Sumption).
11
Prest, supra n 6, [28], where Lord Sumption drew the distinction between concealment
and evasion, and thought that it was only in the latter instance that a corporate veil needed to be
pierced.
12
Department of Business, Innovation and Skills, Transparency and Trust: Enhancing the
Transparency of UK Company Ownership and Increasing Trust in UK Business – Government
Response (April 2014), and now Register of People with Significant Control Regulations 2015
Consultation (June 2015).
13
Prest, supra n 6, [34] (Lord Sumption).
14
Prest, supra n 6, [34] (Lord Sumption).
15
See Rose, supra n 4 at 590, pointing out that while contractual liability is determined by
“contractual construction”, “the circumstances in which tortious liability may arise are less
restricted”.
16
Prest, supra n 6, [35] (Lord Sumption).
17
Hansmann, Kraakman and Squire, supra n 4 at 1401.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The starting point, though, is that the corporate form should be recognised, particularly
when it has a real business, and was not set up simply to hold assets passively or,
worse, trade them actively. If, as is likely, the rate of return on capital is greater than
income growth,18 then what should be encouraged is capital that is directly locked into
industrial and service sectors that create the most employment.
18
Thomas Piketty, Capital in the Twenty-First Century (Harvard, 2014).
19
RC Nolan, “The Proper Purpose Doctrine and Company Directors” in BAK Rider (ed)
The Realm of Company Law (Kluwer Law International, 1998) at 1.
20
[2013] EWHC 2631.
21
See further Mok Cui Ling, “Re-thinking Director’s Duties: An Analysis of the Proper
Purpose Doctrine” (2002) 14 SAcLJ 387; Ross Grantham, “The Powers of Company Directors
and the Proper Purpose Doctrine” (1994–1995) 5 Kings College LJ 16; cf Saul Fridman, “An
Analysis of the Proper Purpose Rule” (1998) 10 Bond LR 164 who does not think that the
proper purpose rule adds much to the duty that directors have to act in the best interest of the
company.
22
As this had not been pleaded, however, the board’s exercise of power was set aside.
23
JKX Plc Oil and Gas Ltd v Eclairs Group Ltd [2014] EWCA Civ 640. The appeal was
heard by the Supreme Court (which reserved judgment) on 18-19 May 2015. Details of the
hearing can be found at <https://www.supremecourt.uk/cases/uksc-2014-0179.html>.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
that the particular power considered here to compel disclosure and/or to disenfranchise
the shareholder was not susceptible to a proper purpose review. This though shows how
difficult the doctrine is as there may be situations where the power is exercised in a
discriminatory way. Indeed, Briggs LJ, who dissented, expressly rejected the argument
that the proper purpose duty is only applicable where this is commercially necessary
(an implied terms argument), and thought that all fiduciary powers have to be exercised
properly. He said (at [122]):
I consider it important that the court should uphold the proper purpose principle in relation to
the exercise of fiduciary powers by directors, all the more so where the power is capable of
affecting, or interfering with, the constitutional balance between shareholders and directors,
and between particular groups of shareholders.
The proper purpose rule usually comes up with decisions that affect the internal
structure of the company, where it is difficult to articulate the duty of directors in terms
of the company’s interest. Here, the exercise of power has to take into account
conflicting interests within the constituencies interested in the outcome of a decision,
usually the shareholders who are affected by a shift in the balance of control, but this
could include creditors and employees of the company as well, as what ostensibly is for
the benefit of the company unjustifiably affects some of them adversely. But as Eclairs
demonstrates, the rule is sometimes hard to pinpoint.
24
(1989) 5 BCC 677.
25
[1982] 3 All ER 1016.
26
Eva Micheler, “Disguised Returns of Capital – An Arm’s Length Approach” (2010) 69
CLJ 151. See now UK Companies Act 2006 s 830.
27
John Armour, “Avoidance of Transactions as a ‘Fraud on Creditors’ at Common Law” in
John Armour and Howard Bennett (eds) Vulnerable Transactions in Corporate Insolvency (Hart
Publishing: Oxford, 2003).
28
Progress Property Company Limited v Moorgarth Group Limited [2010] UKSC 55.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
recently been suggested that they are examples of the duties on directors to exercise
their powers for proper purposes.29
Ford’s Principles of Corporations Law30 has also observed that the financial
assistance prohibition is a manifestation of the general rule that a company’s resources
should be used for proper corporate purposes, and for the company’s benefit, and not to
assist in the purchase of its shares. These rules, such as those found in the UK
Companies Act 2006 section 678,31 much maligned in modern corporate practice for
hindering corporate reorganisation, could have prevented one problem that arose in the
Enron scandal in the US. This involved the sale of Enron shares to closely related
special purpose vehicles (SPVs) in return for debt in the SPVs (Enron assisted by
providing credit), thus boosting the balance sheets of both parties.32 In this regard,
Singapore has seen a revival of the financial assistance rule in Wu Yang Construction
Group Ltd v Mao Yong Hui33 which was similar in effect to that of Arden LJ’s
judgment in the English Court of Appeal in Chaston v SWP Group Plc,34 in that it
reversed what appeared to be a trend towards reducing the relevant test to whether the
transaction was in the commercial interest of the company. Both decisions signalled the
need for legislative change, if that was what the regulators desired, in order to further
relax the financial assistance rules, but the Ministry of Finance in Singapore recently
decided to preserve the rule for public companies (following the UK), when it had
initially considered removing it altogether.35
29
Joyce Lee, “Making a Case for the Duty to Act for Proper Purposes” [2014] Sing JLS 79.
30
RP Austin and IM Ramsay, Ford’s Principles of Corporations Law (14th ed, Australia:
LexisNexis Butterworths, 2010) at 24.670.
31
Singapore Companies Act (Cap 50, 2006 Rev. Ed. Sing), s 76(1)(a).
32
William W Bratton, “Enron and the Dark Side of Shareholder Value” (2002) 76 Tul L Rev
1275 at 1314–1315.
33
[2008] 2 SLR(R) 350 (CA, Singapore), disapproving its earlier decision in Intraco Ltd v
Multi-Pak Singapore Pte Ltd [1994] 3 SLR(R) 1064 (CA, Singapore).
34
[2003] 1 BCLC 675 where, according to Arden LJ at para 38, “it is clear … that the test
is one of commercial substance and reality”. The Australian position was more objective:
Darvall v North Sydney Brick & Tile Co Ltd (1987) 12 ACLR 537 (NSWSC), aff’d Darvall v
North Sydney Brick & Tile Co Ltd (No 2) (1989) 15 ACLR 230 (NSWCA).
35
Singapore’s Ministry of Finance in October 2012 accepted the Final Report of the
Steering Committee for Review of the Companies Act (June 2011) Recommendation 3.27. The
UK Companies Act 2006, c 46, s 678 still covers the situation in Chaston, ibid, where a private
subsidiary financed the acquisition of shares in its public parent. Where public companies are
concerned, the recommendation in Singapore is to adopt the position in Australia under
Corporations Act 2001 (Cth), s 260A (which applies to all companies incorporated there) to
allow a public company or its subsidiary to provide financial assistance for the acquisition of
shares in the company or holding company, respectively, if the assistance does not materially
prejudice the interest of the company or its shareholders or the company’s ability to pay its
creditors. This confirms that the financial assistance rule, and perhaps even capital maintenance
generally, though largely for creditor protection, also takes into account the interests of
shareholders.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INSOLVENCY
But what about possible abuses in companies carrying on a business when insolvent,
given that any further losses are borne by creditors only? Possibly because of their
experience with the earlier Asian Financial Crisis, directors have been less worried
when trying to trade a company out of insolvency in Singapore. There is no duty
imposed on directors to prevent insolvent trading and wrongful trading such as exists
under Australia’s Corporations Act 2001 (Cth), section 588G and the UK Insolvency
Act 1986, c. 45, section 214 respectively.36 What is found instead is a relatively weaker
provision which permits a civil claim to be made against the directors under section
340(2) only if there has been a criminal prosecution under section 339(3), and the test
is whether there was a “reasonable or probable ground of expectation … at the time of
the company being able to pay the debt”.
But the general concept of insolvency may have to be revisited in any case given
developments in England seeing insolvency more as a liquidity or cash flow problem.
Partly due to the difficulties of taking contingent and prospective liabilities into
account, it was held, in a case where a trustee of longer dated notes was asked to
declare a contractual event of default mirrored on the tests of insolvency in the UK
Insolvency Act 1986 section 123, by the English Court of Appeal in BNY Corporate
Trustee Services Ltd v Eurosail-UK 2007-3BL plc,37 that a company could not be said
to be insolvent simply because its liabilities appeared to exceed its assets. The
insolvency provisions were meant to identify companies that could not pay their debts,
and this would be so only if there was an incurable deficiency in its assets, where a
“point of no return” had been reached.38 The Supreme Court rejected the need for the
last requirement, but thought that the cash flow test worked for the reasonably near
future only. A balance sheet test was more sensible when looking forward but the Court
thought that this was imprecise and depended on the party asserting it to prove. On the
facts, given that the final redemption of the notes was only in 2045, the Court felt it had
to proceed with caution. Eurosail could pay its debts presently and the Court could not
be sure that it would eventually be unable to do so until a time closer to 2045.
36
Both the Singapore Company Legislation and Regulatory Framework Committee (October
2002) and Steering Committee for Review of the Companies Act (June 2011) made no
recommendation to amend the Singapore Companies Act, ss 339/340. See also Andrew Keay,
“The Duty of Directors to Take Account of Creditors’ Interests: Has It Any Role to Play?”
[2002] JBL 379.
37
[2011] 1 WLR 2524. In contrast, Grimberg JC in Re Great Eastern Hotel (Pte) Ltd [1988]
SLR(R) 276 (HC) held that the Singapore test for insolvency is, first, whether there is a proper
and unsatisfied demand for a debt already due which the company is unable to pay out of its
present liquid resources and, second, whether there is a deficit in terms of the company’s assets
and liabilities. The inter-relationships between the various tests were recently discussed by the
Singapore Court of Appeal in BNP Paribas v Jurong Shipyard Pte Ltd [2009] 2 SLR(R) 949. Cf
Peter Walton, “‘Inability to pay debts’ – beyond the point of no return?” [2013] JBL 212,
pointing out that the meaning in s 123 went beyond winding up and affected other ancillary
areas.
38
BNY Corporate Trustee, ibid at [52], Neuberger MR, and [114], Toulson LJ.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
However, what was said by Neuberger LJ (as he then was) in BNY Corporate
Trustee39 is quite consistent with the position in Singapore with respect to trading in the
vicinity of insolvency. In particular, he cited with approval the part of the Cork
Committee Report which had in turn reflected the views of Professor Goode:40
A balance has to be drawn between the right of an honest and prudent businessman, who is
prepared to work hard, to continue to trade out of his difficulties if he can genuinely see a
light at the end of the tunnel, and the corresponding obligation to “put up the shutters”, when,
by continuing to trade, he would be doing so at the expense of his creditors and in disregard
of those business considerations which a reasonable businessman is expected to observe.
TAKEOVERS
This balancing exercise is also required of directors of target companies in a takeover.
Shareholder interests appear to become paramount in these situations.44 Under UK-type
Takeover Codes, the philosophy is to leave the decision whether to accept or reject the
offer to the shareholders themselves through the provision of adequate information and
advice, and directors must not deny shareholders the opportunity to decide on the
39
Ibid at [54].
40
Report of the Review Committee – Insolvency Law and Practice (1982) (Cmnd 8558) at
216; and now Roy Goode, Principles of Corporate Insolvency Law (4th ed, Sweet & Maxwell,
2011) at [4-06].
41
See Michael C Jensen and William H Meckling, “Theory of the Firm: Managerial
Behavior, Agency Costs and Ownership Structure” (1976) 3 Journal of Financial Economics
305; SC Myers, “Determinants of Corporate Borrowing” (1977) 5 Journal of Financial
Economics 147.
42
This is one of the three agency problems identified by Kraakman, Davies, Hansmann,
Hertig, Hopt, Kanda and Rock, The Anatomy of Corporate Law (Oxford: OUP, 2004).
43
There may also be conflicts between the creditors themselves, and a director cannot prefer
one creditor over another, which is something separate from the unfair preference rules provided
by formal insolvency law: Moulin Global Eyecare Trading Ltd v Olivia Lee Sin Mei (2014) 17
HKCFAR 466, noted Tom KC Ng, “Director’s Duty Not to Prefer One Creditor to Another”
(2015) 74 CLJ 20.
44
See Wan Wai Yee, “The Validity of Deal Protection Devices in Negotiated Acquisition or
Merger Transactions under Anglo-American Law” (2010) 10 JCLS 179 at 189 and 207.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
merits of the bid.45 In the US, however, the position seemed to be the other way round
with the entity’s interest coming to the forefront only when there is a possible change
of control. Director primacy was seen to be a good thing in this situation,46 although it
has been questioned whether this is good for constituencies within the company other
than the directors themselves, particularly in the context of poison pills.47 But the UK
is now considering whether to strengthen the entity focus even more in the takeover
context after the takeover of Cadbury plc by Kraft Foods Inc.48 It was also anticipated
that there would be changes to the English takeover rules following the acceptance of
the 2012 Final Report of the Kay Review of UK Equity Markets and Long-Term
Decision Making in which the overall philosophy appeared directed at disenfranchising
short-term shareholders. Developments in Europe at the same time seemed to focus on
giving long-term shareholders more rights. But it is unlikely that this will allow
corporate interests to be used as an excuse by a target board to prevent a takeover
altogether. Indeed, the UK Government’s response to the Kay Review was that it would
not be practical to disenfranchise some shareholders even if it agreed that the influence
of short-term investors in a takeover bid should be reduced.49
In these situations what is required is a balancing of interests of existing share-
holders, those with short-term interests who are keen to sell, and those with longer-term
interests in the company’s viability, which cannot therefore be seen as a monolithic
whole. At an extreme, we may even require shareholders themselves to act properly in
some situations, even if there are usually no duties imposed on them. This was seen
most controversially in the Australian High Court decision in Gambotto v WCP Ltd,50
which attempted to lay out a proper purpose rule even on the part of shareholders when
it came to voting on an expropriation or even variation of their rights, which was seen
as a high point of court activism. While that decision made no inroads in England, or
indeed even in Australia after that,51 it reflects the difficulty with decisions that are
ostensibly taken for the benefit of the company but which hide the wealth transfers that
may be going on between its contributories.
45
The City Code on Takeovers and Mergers, General Principles 1–3.
46
Lynn A Stout, “Takeovers in the Ivory Tower: How Academics Are Learning Martin
Lipton May Be Right” (2005) 60 Business Lawyer 1435.
47
“The Case of the Poison Pill: Will Leo Strine Re-engineer Takeover Law in America?”
The Economist (11 December 2004). Wan Wai Yee, supra n 43 at 207 believes that there will
continue to be US target board autonomy, although independent directors will increasingly serve
as the will of the company in such situations.
48
The UK regulators are looking to make it harder for bidders to succeed there and allowing
directors to take into account interests other than those of shareholders (or at least short-term
shareholders). They were also considering raising the minimum acceptance condition to 60 per
cent.
49
Business, Innovation and Skills Committee – Second Special Report, The Kay Review of
UK Equity Markets and Long-term Decision Making (October 2013), Annex B, Summary of
analysis of the policy proposal to disenfranchise short-term shareholders during a takeover bid.
50
(1995) 182 CLR 432.
51
Ian Ramsay and Benjamin Saunders, “What Do You Do With a High Court Decision You
Don’t Like? Legislative, Judicial and Academic Responses to Gambotto v WCP Ltd ” (2011) 25
Austl J Corp L 112.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
There is little risk of the corporate structure generally being misused. Any possible
abuse as a going concern is met by the doctrine of veil piercing, but that is increasingly
limited to asset transfers to evade existing liabilities of the controller. Prest can perhaps
be seen as an incipient attempt in law to distinguish industrial/service companies from
asset holding entities, whether those are of a long- or short-term nature (which
distinction was itself the focus of the Kay Review). The strength of the corporation is
capital lock-in leading to corporate growth.52 Underpinning all that is a business that
employs people, even if some companies later incur liabilities which cannot be met
from its assets (where insolvency rules intervene). That there is no need to pierce the
veil even in this latter situation is also due to old capital maintenance rules preventing
the violation of the corporate fund which is founded on the duty on directors to
exercise their powers for proper purposes. This doctrine also helps mediate situations in
which it is necessary to see through the corporate entity to the various constituents
behind it where there may be conflict between them, and where recourse to the
company’s best interest can be a refuge for those seeking to take unfair advantage of its
entity status.
52
Margaret M Blair, “Locking In Capital: What Corporate Law Achieved for Business
Organizers in the Nineteenth Century” (2003) 51 UCLA L Rev 387; Lynn A Stout, “On the
Nature of Corporations” (2005) Illinois L Rev 253.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 09 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
This chapter focuses on the anti-money laundering regime in Hong Kong with
particular reference to the legislative framework as interpreted by recent case law of the
Courts of Hong Kong. Reference will be made to certain English cases which remain of
persuasive authority in Hong Kong.
Consideration is given to the approach of the Courts to those charged with money
laundering and who elect to remain silent at Trial as well as current sentencing
guidelines.
The prohibition of the offence is in order to strike at those who give assistance to criminals to
dispose of or retain their ill-gotten gains as if they were derived from legitimate activities.
Without the assistance of money launderers, it would be more difficult for criminals to clothe
their illegal proceeds with the same respect as lawful gains and the chances of law
enforcement detection of illegal activities that produce monetary benefits would be enhanced.
Money laundering is therefore treated as a serious offence. If money-laundering activities
were allowed to be carried out in Hong Kong with impunity or treated lightly with minor
penalties, it would mar Hong Kong’s reputation as a world-class financial and banking centre.
SCOPE
Money laundering in general terms involves the conversion of the proceeds of criminal
activity into a form of legitimate currency or other assets. It may also take the form of
terrorist financing whether from the proceeds of crime or otherwise.
The scale of money laundering activities has increased significantly. In 2011, it was
estimated that the proceeds from criminal money laundering activities amounted to no
1
(2004) 4 HKC 16 at 23, paragraph 18.
113
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
less than 3.6 per cent of the world’s global Gross Domestic Product with 2.7 per cent
(or US$1.6 trillion) being laundered.2
Money laundering involves three distinctive stages as follows: (a) placement,
(b) layering and (c) integration.
The “placement” stage involves the introduction of funds from illegal activities (or
funds which are intended to support such illegal activities) into the financial system.
The “layering” stage involves the use of a series of parties and/or transactions which
are designed to conceal the source of the illicit funds themselves.
The “integration” stage results in the illicit funds being laundered into the financial
system so that the criminal may extract, and then expend, what on the face of it is
“clean” money.
Money laundering and terrorist financing pose serious threats to life and society as
well as undermining the rule of law.
At the same time, one cannot disregard the gravity of the underlying criminal offence
upon which the money laundering is predicated. This is often described as the
“predicate offence” and may range from gambling or loan sharking to vice.
LEGISLATION
This chapter focuses on the anti-money laundering legislation contained in the
Organized and Serious Crimes Ordinance (Cap. 455 of the Laws of Hong Kong)
(“OSCO”).3
Section 25 (1) of OSCO provides as follows: “Subject to section 25A, a person
commits an offence if, knowing or having reasonable grounds to believe that any
property, in whole or in part, directly or indirectly represents any person’s proceeds of
an indictable offence, he deals with that property.”
The section 25 (1) offence is committed when there has been an act of dealing with
certain property which has certain specified characteristics. “Dealing” includes “receiv-
ing or acquiring” such property and/or “disposing” of the same.4
The property must be property which a person knows or has reasonable grounds to
believe “in whole or in part directly or indirectly represents any person’s proceeds of an
indictable offence”.
The Hong Kong legislation therefore focuses on the broader concept of “dealing” as
opposed to any scrutiny of the underlying offence.
2
A United National Office on Drugs and Crime Report http://www.unodc.org/unodc/en/
press/releases/2011/October.
3
Other principal legislation includes the Drug Trafficking (Recovery of Proceeds) Ordi-
nance (Cap. 405 of the Laws of Hong Kong) and the United Nations (Anti-Terrorism Measures)
Ordinance (Cap. 575 of the Laws of Hong Kong).
4
Section 2 of OSCO.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
DEFINITION OF “PROCEEDS”
Section 2(6)(a)(i) of OSCO provides that a person’s proceeds of an offence are “any
payments or other rewards received by him at any time … in connection with the
commission of that offence”.
Therefore, if property is received as a payment or other reward in connection with
the commission of the predicate offence, such property constitutes in law the recipient’s
proceeds of that offence. The recipient may but is not obliged to be the predicate
offender.
Accordingly, if the property meets these criteria, the dealer who subsequently deals
with the property with the requisite mens rea is deemed to be dealing with property
which he knows or has reasonable grounds to believe represents the proceeds of the
indictable offence. This establishes the element of “proceeds”.
5
(2007) 10 HKCFAR 98, paragraphs 96 to 100 applying the case of HKSAR v Wong Ping
Shui & Another (2001) 4 HKCFAR 29.
6
Paragraph 106.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 3 / Date: 14/10
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
7
(2014) 17 HKCFAR 319.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 4 / Date: 14/10
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
LONG TITLE
Due regard should also be had to the central purpose of OSCO which is to target the
proceeds of crime. Accordingly, useful reference may be made to the Long Title.
OSCO is:
An Ordinance to create new powers of investigation into organized crimes and certain other
offences and into the proceeds of crime of certain offenders; provide for the confiscation of
proceeds of crime; make provision in respect of sentencing of certain offenders; create
offences relating to the proceeds of crime or property representing the proceeds of crime; and
for ancillary and connected matters.
LEGISLATION – BENEFIT
Section 8(4) of OSCO imposes a requirement on the Courts to first of all determine that
a person has “benefitted from the specified offence” and that “his proceeds of that
specified offence or offences are in total at least [HK]$100000”.
Once “benefit” has been established, the Court then looks to ordering the defendant
to pay8 an appropriate amount by reference to his realisable means.
The significance of “benefit” to a defendant is demonstrated by case law. The Court
of Final Appeal in Li Kwok Cheung considered a number of English authorities in this
regard.
8
Section 8(6) OSCO.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
This is a leading House of Lords decision involving what is known as a VAT “carousel”
or “missing trader” fraud.
Lord Bingham of Cornhill gave the opinion of the Appellate Committee and
explained that the regime
requires the court, before making a confiscation order, to address and answer three questions:
… The first question is: has the defendant (D) benefited from the relevant criminal conduct?
If the answer to that question is negative, the inquiry ends. If the answer is positive, the
second question is: what is the value of the benefit D has so obtained? The third question is:
what sum is recoverable from D?
In an “Endnote”, Lord Bingham set out a summary of the broad principles which are
applicable in confiscation cases as follows:
The legislation is intended to deprive defendants of the benefit they have gained from relevant
criminal conduct, whether or not they have retained such benefit, within the limits of their
available means. It does not provide for confiscation in the sense understood by school
children and others, but nor does it operate by way of fine. The benefit gained is the total
value of the property or advantage obtained, not the defendant’s net profit after deduction of
expenses or any amounts payable to co-conspirators.
the exercise of this jurisdiction involves no departure from familiar rules governing
entitlement and ownership … D ordinarily obtains property if in law he owns it, whether
alone or jointly, which will ordinarily connote a power of disposition or control, as where a
person directs a payment or conveyance of property to someone else. He ordinarily obtains a
pecuniary advantage if (among other things) he evades a liability to which he is personally
subject. Mere couriers or custodians or other very minor contributors to an offence, rewarded
by a specific fee and having no interest in the property or the proceeds of sale, are unlikely
to be found to have obtained that property. It may be otherwise with money launderers.
The question of benefit was also considered in the case of Jennings v Crown
Prosecution Service. In this case, the fraud involved the extraction of “advance fees”
from victims of £584,000 compared to the £50,000 the defendant had obtained by way
of salary and a few minor payments.
9
[2008] 1 AC 1028.
10
[2008] 1 AC 1046.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Lord Bingham, again giving the opinion of the Appellate Committee, held that the
object of the legislation is to deprive the defendant of the product of his crime or its
equivalent, not to operate by way of fine. The rationale of the confiscation regime is the
defendant is deprived of what he has gained or its equivalent. He cannot, and should not, be
deprived of what he has never obtained or its equivalent, because that is a fine. This must
ordinarily mean that he has obtained property so as to own it, whether alone or jointly, which
will ordinarily connote a power of disposition or control, as where a person directs a payment
or conveyance of property to someone else.
Accordingly, the obtaining had to involve the gaining of a benefit and not just a
participation in the fraud.
The more recent case of R v Waya, which was a decision of a panel of nine judges of
the UK Supreme Court, again focuses on the legislative purpose of imposing a severe
regime to remove from them the proceeds of their crime.
By majority judgment, Lord Walker of Gestingthorpe JSC and Hughes LJ stated as
follows:
The purpose of the legislation is plainly, and has repeatedly been held to be, to impose upon
convicted defendants a severe regime for removing from them their proceeds of crime. It is
not to be doubted that this severe regime goes further than the schoolboy concept of
confiscation, as Lord Bingham explained in R v May. Nor is it to be doubted that the severity
of the regime will have a deterrent effect on at least some would-be criminals. It does not,
however, follow that its deterrent qualities represent the essence (or the “grain”) of the
legislation. They are, no doubt, an incident of it, but they are not its essence. Its essence, and
its frequently declared purpose, is to remove from criminals the pecuniary proceeds of their
crime.
… the scheme of the Act, and of previous confiscation legislation, is to focus on the value
of the defendant’s obtained proceeds of crime, whether retained or not. It is an important part
of the scheme that even if the proceeds have been spent, a confiscation order up to the value
of the proceeds will follow against legitimately acquired assets to the extent that they are
available for realization.
11
[2013] 1 AC 294 at paragraph 27.
12
[2014] AC 678 at paragraph 64.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Accordingly, the defendants had not evaded liability and the pecuniary benefit they
allegedly obtained did not exist.
Lord Kerr of Tonaghmore JSC gave the opinion of the Court and referred to the
principles set out in R v May and stated:
The focus must be, as Lord Bingham has said, on what benefit the defendant has actually
gained. Simply because someone has embarked on a joint criminal enterprise, it does not
follow that they have obtained an actual benefit. Being engaged in a conspiracy does not, of
itself, establish that each conspirator has obtained the property which is the product of the
conspiracy.
13
(1988) 10 Cr App R (S) 289.
14
Schedule 1, Part 1, Section 1.
15
See footnote 3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
concluded that such policy would be likely to have highly detrimental consequences.
Furthermore, money laundering would become an offence of great and uncertain width.
Payments would constitute the offence without having to be payments which the
defendants knows or has reasonable grounds to believe are in the nature of a reward
received in connection with the commission of an offence.
Given such a low threshold, the prosecution would merely have to prove the receipt
of a payment and show reasonable grounds to believe that such payment has an
undefined and uncertain connection with an indictable offence. Such a wide interpret-
ation would place lenders at risk and impose onerous burdens on them.
The Court of Final Appeal stated the following:
It is one thing to criminalise dealing with funds where the dealer knows or has reasonable
grounds to believe that they are the proceeds of crime, it is quite a different matter to
stigmatise as a money launderer, a lender dealing with its own “clean” funds because of what
the borrower does or intends to do with them.16
The Court of Final Appeal also concluded that such a wide interpretation would be
likely to distort the practice of prosecutors. They would understandably find it hard to
resist the temptation of bringing money laundering charges made easy to prove
whenever it is possible to prove a payment and some broad connection with some
indictable offence, whatever might be the underlying criminality involved.
The Court of Final Appeal concluded that the Courts below were wrong to construe
the expression “proceeds of an indictable offence” in section 25 (1) of OSCO as
extending to cover money used as an instrument furthering the conspiracy charge when
there is no evidence that the appellants knew or had reasonable grounds to believe that
such money represented the proceeds an indictable offence.
RIGHT OF SILENCE
Article 1117 of the Bill of Rights preserves the right of silence for an accused charged
and tried with a criminal offence. The Bill of Rights is enshrined in the Hong Kong Bill
of Rights Ordinance (Cap. 383 of the Laws of Hong Kong).
Money laundering offences in Hong Kong raise significant issues as regards a
suspect and/or a defendant facing criminal charges, in particular, as regards his
constitutionally preserved right of silence. What therefore is the status of a defendant
who has pleaded not guilty and elects not to give evidence in the face of a money
laundering Trial?
This matter was considered by the Court of Final Appeal in Li Defan & Another v
HKSAR18 where it was held that, as a general rule, in cases where the accused elected
not to give evidence, a failure to do so should not be treated as an admission of guilt.
Lord Hoffmann NPJ held that in appropriate cases:
16
Paragraph 84.
17
Paragraph 2(g).
18
(2002) 5 HKCFAR 320.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
There is unquestionably power to comment that the jury may – but need not – consider that
the prosecution case on a particular issue relevant to guilt is strengthened by the absence of
the accused from the witness box. But the cases in which such comment is permissible and,
even if permissible, necessary, will be exceptional.19
(3) Provided those essentials are complied with, the judge may think it appropriate to make
a stronger comment where the defence case involves alleged facts which (a) are at
variance with the prosecution evidence or additional to it and exculpatory, and (b) must,
if true, be within the knowledge of the defendant.
(4) The nature and strength of such comment must be a matter for the discretion of the judge
and will depend upon the circumstances of the individual case. However, it must not be
such as to contradict or nullify the essentials of the conventional direction.
The Court of Final Appeal referred to a similar practice in Hong Kong. A case in which
a stronger comment by a judge was found to be permissible was that of HKSAR v Ewan
Quayle Launder 21 in which Lugar-Mawson J gave the jury the following direction:
You may agree with me – you are not obliged to – but you may agree with me that on a
matter perhaps as fundamental as this it is surprising that Mr Launder did not want to give
you his explanation. These are matters that are particularly within his knowledge. If there are
any accounts or records, he is the one who kept them or had his secretary keep them, and he
is the one who must know where they are.Without his explanation, you may find – you are
certainly not obliged to – but you may find that you are the more ready to draw the inferences
that the prosecution … ask you to draw from the evidence.
Although the conviction in that case was quashed by the Court of Appeal for other
reasons, the Court of Appeal held the judge was entitled to make the comments because
of the particular facts of the case: “the applicant’s failure to give evidence was … a
circumstance which had a bearing on the probative value of the evidence”.22
The Court of Final Appeal in Li Defan concluded that the judge, having rejected the
explanation by the accused as a pack of lies, was perfectly entitled to regard the failure
of the accused to offer any explanation on oath as strengthening the inference to be
drawn from the prosecution case.
In the case of HKSAR v Pang Hung Fai,23 the defendant was found guilty of money
laundering contrary to section 25(1) and (3) of OSCO. Mr. Justice Spigelman NPJ,
giving the judgment of the Court of Final Appeal, held that, in addition to the objective
facts relating to the Appellant’s dealing, the judge and jury are entitled to take into
account the Appellant’s perception and evaluation of those facts as constituting
19
Paragraph 29.
20
[2004] 1 WLR 388.
21
Unrep., CACC No. 147/2000, [2001] HKEC 521.
22
Page 41 of the Court of Appeal judgment.
23
FACC No. 8 of 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
reasonable grounds for believing that the property does not represent such proceeds.
That does not however mean that any such “perception” or evaluation is entitled to
weight, let alone determinative weight.
Mr. Justice Spigelman NPJ relied on the Court of Final Appeal decision of Seng Yuet
Fong v HKSAR24 in which Litton PJ said as follows:
To convict, the jury had to find that the accused had reasonable grounds for believing; and
there was the additional requirement that the grounds must be reasonable: That is, anyone
looking at those grounds objectively would so believe. [Emphasis added]
By the imposition of the same penalty, the mental element of the “reasonable grounds
alternative” is regarded as being at the same level of moral obloquy as actual knowledge. A
test that propounds a relationship between the existence of “grounds” and a state of “belief”
in terms of possibility does not do that. Only a test which states that those “grounds” would
lead to the “belief” does so.
In the Court of Final Appeal decision of HKSAR v Yan Suiling,25 Chan PJ, allowing the
appeal, held as follows:26
We take view that the Judge’s reasons for rejecting the appellant’s evidence cannot be
supported … If the appellant’s evidence and documents were properly and fairly considered,
it would have provided compelling grounds for concluding that her explanation as to how she
came to receive the cheque in question at least might be true and that would have created a
reasonable doubt in the prosecution case. The Judge should not have proceeded on the basis
that the receipt of the cheque was unexplained. It follows that he could not have concluded
that there was an irresistible inference that she had reasonable ground to believe the cheque
was the proceeds of an indictable offence.
But even if the Judge was right to reject the Appellant’s evidence, that is, even if the receipt
of the cheque was unexplained, we are not satisfied that in the circumstances of this case, the
only reasonable inference is that the appellant must have reasonable grounds to believe that
the cheque in question represented the proceeds of an indictable offence.27
The situation was certainly unusual, but there could be a number of explanations and possible
consequences of her inaction. The money might have come to her by mistake and she might
be held answerable in a civil action for its return … However, we do not think that without
more, an unexplained receipt points irresistibly to money laundering.28
24
[1999] 2 HKC 833 at 836 E–F.
25
(2012) 15 HKCFAR 146.
26
Paragraph 44.
27
Paragraph 46.
28
Paragraph 48.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
SENTENCING
The sentencing regime is a reflection of the underlying objectives of the legislative
framework and it is realistically applied by the Courts.
A leading authority on sentencing considerations for the Court in money laundering
cases is HKSAR v Boma.29
Stock VP (as Stock NPJ then was), giving the judgment of the Court of Appeal, held
that “it is neither realistically possible nor desirable to attempt guidelines”. Neverthe-
less, the following may be considered: the nature of the predicate offence, the state of
knowledge of the offender, existence of an international dimension, sophistication of
the offence, syndicate and role of the offender and the acts performed by him. For
example, the director of a laundering operation would attract a greater sentence than a
person engaged by him. In relation to a person down the chain, the Court will have
regard to the benefit received and its size and nature.30
Any sentencing exercise must recognise the maximum sentence is 14 years’
imprisonment.
Furthermore, the sentencing Court must have regard to deterrence which is para-
mount. The English authority of R v Basra31 was applied by the Hong Kong Courts
where it was held: “It is to be remembered that the criminality in laundering arises
from the encouragement and nourishment it gives to crime in general. Without it many
crimes would be rendered much less fruitful and perhaps more difficult to perpetrate.”32
CONCLUSION
The Courts maintain a pragmatic approach to combating money laundering offences in
Hong Kong in line with the legislative intent. It will be interesting to see how this area
of the law develops as money-laundering techniques grow in sophistication.
Mark Twain was right.
29
[2012] 2 HKLRD 33.
30
Paragraph 40.
31
[2002] 2 Cr App R (S) 469 at 472.
32
Paragraph 36.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 10 /Pg. Position: 12 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
On 3 April 2009, Belinda Barnett, senior counsel to the Deputy Assistant Attorney
General for Criminal Enforcement, Antitrust Division, United States (“US”) Depart-
ment of Justice (“the DOJ”) said:1
It is well known that the Antitrust Division has long ranked anti-cartel enforcement as its top
priority. It is also well known that the Division has long advocated that the most effective
deterrent for hard core cartel activity, such as price fixing, bid rigging, and allocation
agreements, is stiff prison sentences.
Price-fixing, bid-rigging, and other forms of collusion are illegal and are subject to
criminal prosecution by the DOJ.2 The US Sherman Antitrust Act (“the Sherman Act”)
prohibits any agreement among competitors to fix prices, rig bids or engage in other
anticompetitive activity.3
In 2003, the Dawson Committee recommended the introduction of criminal sanctions
for hard-core cartel conduct.4 Cartel conduct became a criminal offence under Part IV
of the Australian Competition and Consumer Act 2010 (Cth) (“the Competition Act”)
on 24 July 2009. In New Zealand, the Commerce (Cartels and Other Matters)
Amendment Bill (“the Cartel Bill”) was introduced in October 2011.5 The Cartel Bill
passed its second reading on 24 June 2014, and the amendments to the New Zealand
Commerce Act (“the Commerce Act”) are expected to become law sometime in 2015.
1
Joint Federal Court of Australia/Law Council of Australia (Business Law Section)
Workshop, Adelaide, 3 April 2009: see http://www.justice.gov/atr/public/speeches/247824.htm
accessed 1 August 2014.
2
Antitrust Division, US Department of Justice, “Price Fixing, Bid Rigging, and Market
Allocation Schemes: What They Are and What to Look For” at http://www.justice.gov/atr/public/
guidelines/211578.htm accessed 3 August 2014.
3
Violation of the Sherman Act is a felony punishable by a fine of up to $10 million for
corporations, and a fine of up to $350,000 or 3 years’ imprisonment (or both) for individuals, if
the offence was committed before 2004. If the offence was committed after 2004, the maximum
fine is $100 million for corporations and $1 million for individuals, and the maximum jail
sentence is 10 years.
4
Trade Practices Review Committee, Review of the Competition Provisions of the Trade
Practices Act, 2003 (“the Dawson Committee”). From 1 January 2011, the Trade Practices Act
1974 (Cth) was renamed as the Competition and Consumer Act 2010 (Cth). There were no
substantive changes to the competition law provisions set out in Part IV.
5
New Zealand, Commerce (Cartels and Other Matters) Amendment Bill (“the Cartel
Bill”), see http://www.legislation.govt.nz/bill/government/2011/0341/15.0/DLM4090009.html
accessed 4 August 2014.
125
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Like Australia, it introduces criminalisation of hard-core cartel activity. The Cartel Bill
defines a “cartel provision” as a contract, arrangement or understanding that has the
purpose, effect or likely effect of price-fixing, restricting output or market allocating.
Each of these three types of collusive conduct is separately defined:
There are specific exemptions for collaborative activity, vertical supply arrangements,
joint buying and promotion agreements. There is also a clearance mechanism to reduce
the risk of prosecution and parallel civil and criminal sanctions with “intention” as the
trigger to criminal liability.
Like the Australian provisions, the Cartel Bill creates a parallel regime in which
there is a single set of provisions which can attract either criminal or civil liability
depending upon:
+ the level of seriousness of the offending (whether it constitutes “hard core” cartel
conduct); and
+ the intention of the offender.
Under the Cartel Bill, there are both civil and criminal consequences for individuals
and companies alike. Companies can face civil penalties of the greater of $10 million
per contravention, three times the commercial gain from the cartel activity or 10 per
cent of the company’s turnover in the accounting period in which the contravention
occurred. Individuals can face civil penalties of up to $500,000 and, if found criminally
liable, they can also be imprisoned for a term not exceeding 7 years.6 Only intentional
cartel conduct has criminal consequences.7 Criminal sanctions should be reserved for
conduct that is truly culpable.8 A person should have intended to engage in the conduct
in question or at the very least have been reckless as to its consequences, to attract such
sanctions. There is an honest belief defence that would apply to a defendant involved in
a collaborative activity if the cartel provision of the contract was reasonably necessary
6
There will be a two year transition period before the criminal sanctions come into effect.
7
To establish a conviction, the Commerce Commission, the competition watchdog in New
Zealand, will need to prove beyond reasonable doubt that the breach was intentional.
8
Under the Cartel Bill, cartel conduct will be treated as a category four offence, the most
serious possible and the same category as murder, treason and terrorism.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
for the purpose of the collaborative activity.9 A person can still be civilly liable even if
they did not intend to participate in cartel conduct.
In Australia, there has not been a cartel case which has been prosecuted criminally
by the Australian Competition and Consumer Commission (“the ACCC”), the com-
petition watchdog. Perhaps the ACCC has been reticent in initiating criminal proceed-
ings because of the uncertainties which appear to be inherent in the criminal provisions.
Judicial interpretation should gradually reduce these uncertainties. The recent US
antitrust price-fixing case, US v Apple Inc may provide some practical guidance in this
regard.10 The US antitrust experience shows that reliance is necessarily placed upon the
courts to refine the terms in which the legislation is cast in order to achieve its object.
This chapter discusses the different types of cartel conduct including the difficulty in
determining where to draw the dividing line between a criminal offence and a civil
contravention. In Australia, the Dawson Committee identified this as a critical issue that
would need to be resolved before criminal sanctions could be implemented.11 Various
commentators have argued that the current criminal provision for cartel conduct in
Australia is flawed for this reason.12 The difficulty lies, in part, on the role of intent or
mens rea in establishing criminal liability for cartel conduct. This criticism can also be
applied to the New Zealand Cartel Bill which is based on the Australian provisions. In
Australia, various alternatives were canvassed including introducing an element of
“intention to dishonestly obtain a benefit” in the cartel offences to discriminate between
those offences and the civil prohibitions.13 Ultimately it was decided that there would
be a requirement for certain fault elements for criminal liability with reliance otherwise
on prosecutorial discretion to determine which matters should be dealt with as potential
criminal offences.14
The fault elements required for the cartel offences do differentiate between criminal
and civil liability for cartel conduct under the Competition Act but, in practice, the
elements of intention and knowledge or belief required for criminal liability typically
9
A “collaborative activity” is defined as an activity in trade carried on in co-operation
between two or more competitors that does not have the dominant purpose of lessening
competition between them. The arrangement must be reasonably necessary for the purpose of
the “collaborative activity” e.g. a joint venture to manufacture a new product where the
competitors then set the price of the new product.
10
United States v Apple Inc (“US v Apple”), 952 F.Supp.2d 638, SDNY, 2013.
11
Dawson Committee, see above n 4.
12
See e.g. Beaton-Wells & Fisse, Australian Cartel Regulation: Law, Policy and Practice in
an International Context (2012), 19.
13
The requirement of an intention dishonestly to obtain a benefit in the Trade Practices
Amendment (Cartel Conduct and Other Measures) Bill 2008 (Cth) was removed in response to
overwhelming criticism. The dishonesty element for the equivalent cartel offence in the UK has
also been deleted. See United Kingdom (“UK”) Department for Business Innovation & Skills,
Enterprise and Regulatory Reform Act 2013 policy paper, June 2013 at https://www.gov.
uk/government/uploads/system/uploads/attachment_data/file/209896/bis-13-905-enterprise-and-
regulatory-reform-act-2013-policy.pdf accessed 4 August 2014. The UK government noted that
the inclusion of a requirement to prove an individual’s dishonesty made the offence particularly
difficult to prosecute. There has yet to be a successful criminal prosecution for cartel conduct in
the UK. The new criminal cartel offence came into effect on 1 April 2014.
14
Beaton-Wells & Fisse, see above n 12, p 19.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
will also be present in civil cases.15 The introduction of criminal sanctions for cartel
conduct does not mean that the current jurisprudence surrounding cartel conduct is lost.
The criminalisation of cartel conduct was considered to be in the interests of
competition or consumers, but it will take some time before a new jurisprudence is
developed. In the interim, price-fixing cases such as the Apple case offer a real prospect
of developing a better understanding of the true scope of the antitrust provisions. This
chapter proposes to discuss the Apple case in the light of the criminal sanctions for
price-fixing in Australia and New Zealand.
+ price-fixing; or
+ restricting outputs in the production and supply chain; or
+ allocating customers, suppliers or territories; or
+ bid rigging;
by parties that are, or would otherwise be, in competition with each other.17
These are indictable offences – if convicted, natural persons are punishable by a term
of imprisonment of up to 10 years.18 The physical elements of the cartel offences are
the same as those of the civil per se prohibitions against price-fixing, reduction of
output, market allocation and bid-rigging.19 The main difference between the cartel
15
Ibid, p 28.
16
Sections 44ZZRF(1) & 44ZZRG(1) of the Competition Act.
17
The definition of a “cartel provision” is set out in s 44ZZRD which is discussed in more
detail later.
18
Section 6(5B) provides that if a person other than a body corporate is convicted of an
offence against ss 44ZZRF & 44ZZRG, the offence is taken to be punishable on conviction by a
term of imprisonment not exceeding 10 years or a fine not exceeding $340,000 or both.
19
In New Zealand, it was decided to delete the provision in relation to bid-rigging on the
basis that such conduct would also be included in the definition of a cartel provision and that
prohibiting other categories of cartel conduct (price-fixing, restricting output and market
allocating) would adequately prevent anticompetitive bidding practices – see Commerce (Cartels
and Other Matters) Amendment Bill, as reported from the Commerce Committee, 20 May 2013,
at http://www.legislation.govt.nz/bill/government/2011/0341/latest/DLM4090009.html accessed
on 4 August 2014. Bid-rigging is an arrangement between one or more competitors whereby, in
relation to a request for bids or tenders to supply goods or services, they agree in advance that
one party bids but the other parties will refrain from bidding so that the designated winning
competitor’s bid will be accepted. Essentially, competitors agree in advance who will submit the
winning bid on a contract being tendered through the competitive bidding process. As with
price-fixing, it is not necessary that all bidders participate in the conspiracy. Almost all forms of
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
offences and the civil per se prohibitions is that the former has additional fault
elements. These additional fault elements are:
bid-rigging schemes have one thing in common: an agreement among some or all of the bidders
which predetermines the winning bidder and limits or eliminates competition among the
conspiring parties.
20
Section 44ZZRF(2) Competition Act. Intention is required in relation to making a
contract, arrangement or understanding. No fault element is specified; however, intention is
required by operation of the default fault provisions of the Criminal Code. The fault element is
knowledge or belief that the contract, arrangement or understanding contains a cartel provision.
21
Section 44ZZRG(2) Competition Act. Intention is required in relation to giving effect to
the cartel provision. No fault element is specified; however, intention is required by operation of
the default fault provisions of the Criminal Code. As in s 44ZZRF(2), the fault element is
knowledge or belief that the contract, arrangement or understanding contains a cartel provision.
22
Criminal Code Act 1995 (Cth) (the “Criminal Code”). Chapter 2 of the Criminal Code
sets out the general principles of criminal responsibility – the Criminal Code applies to all
offences against the Competition Act: s 6AA(1).
23
Section 44ZZRK is the civil equivalent to s 44ZZRG; s 44ZZRJ is the civil equivalent to
s 44ZZRF.
24
Beaton-Wells & Fisse, see above n 12, p 136.
25
Ibid.
26
Section 5.2(1) Criminal Code.
27
Beaton-Wells & Fisse, see above n 12, p 140.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
credible alternative explanation for the defendant’s conduct, there will be reasonable
doubt.28 Where there is some form of valid collaborative activity between competitors,
the method of inferring intention, knowledge or belief is unlikely to be clear-cut.29
Under the Cartel Bill, if a defendant involved in a collaborative activity honestly
believed that the cartel provision was reasonably necessary for the purpose of the
collaborative activity, they would not be criminally liable.
The definition of a “cartel provision” is set out in section 44ZZRD of the
Competition Act as follows:
The “purpose/effect condition” is satisfied if the provision has the purpose, or has or is
likely to have the effect, of fixing, controlling or maintaining the price of goods or
services that are supplied by any or all of the parties to the contract, arrangement or
understanding (price-fixing).30
The “purpose condition” is satisfied if the provision has the purpose of:
The “competition condition” is satisfied if at least two of the parties to the contract,
arrangement or understanding are or are likely to be in competition with each other in
relation to the supply of those goods or services.32
The above definition of a cartel provision applies to both the civil per se prohibitions
and the criminal provisions. One of the aims of this chapter is to examine the role of
28
Ibid.
29
Ibid.
30
s 44ZZRD(2).
31
s 44ZZRD(3).
32
s 44ZZRD(3).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
33
Under the “purpose/effect condition” requirement for price-fixing or the “purpose
condition” requirement in the case of restricting output, market allocating or bid-rigging.
34
Beaton-Wells & Fisse, see above n 12, p 143.
35
Boral Besser Masonry Ltd v ACCC (“Boral”) (2003) 215 CLR 374. This was a predatory
pricing case.
36
US v US Gypsum Co (“Gypsum”), 438 US 422, 437 (1978).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
a defendant’s state of mind or intent is an element of a criminal antitrust offense which must
be established by evidence and inferences drawn therefrom and cannot be taken from the trier
of fact through reliance on a legal presumption of wrongful intent from proof of an effect on
prices.37
However, action undertaken with knowledge of its probable consequences and having
the requisite anticompetitive effects can be a sufficient ground for a finding of criminal
liability under the antitrust laws.38
In terms of the cartel provisions, to establish a conspiracy in violation of the US
Sherman Act’s prohibition of unreasonable restraints of trade or commerce, the plaintiff
must show a combination or some form of concerted action between at least two
legally distinct economic entities that constituted an unreasonable restraint of trade
either per se or under the rule of reason.39 Even for per se illegal offences such as
price-fixing, restricting output, market allocating or bid-rigging under the Sherman Act,
purpose is a necessary element of the offence, as interpreted by the courts.40
Under section 1 of the Sherman Act, a combination formed for the purpose and with
the effect of raising, depressing, fixing, pegging or stabilising the price of a commodity
in interstate or foreign commerce is illegal per se. This provision is substantially
equivalent to the price-fixing provisions in the Competition Act and the Commerce
Act.41 To support a claim for an agreement in violation of the Sherman Act’s
prohibition of unreasonable restraints of trade or commerce, circumstances must reveal
a unity of purpose or a common design and understanding, or a meeting of minds in an
unlawful arrangement. This reveals the importance of the role of purpose or intent in
establishing a conspiracy in terms of price-fixing, that is, a common understanding or
arrangement to fix prices. To prove a conspiracy in contravention of the Sherman Act’s
prohibition of unreasonable restraints of trade or commerce, the plaintiff must present
direct or circumstantial evidence that reasonably tends to prove that the defendant and
others had a conscious commitment to a common scheme designed to achieve an
unlawful objective and that the defendant had the intent to adhere to such an
agreement.
37
Ibid, 423.
38
Ibid.
39
Sherman Act, § 1, 15 USCA § 1.
40
Per se illegal agreements are certain agreements or practices which because of their
pernicious effect on competition and lack of any redeeming virtue are conclusively presumed to
be unreasonable and therefore illegal without elaborate inquiry as to the precise harm they have
caused or the business excuse for their use: see United States v Reicher, 983 F.2d 168, 170 (10th
Cir. 1992); United States v Mobile Materials, Inc, 881 F.2d 866, 869 (10th Cir. 1989), cert.
denied, 493 US 1043 (1990); United States v Metro. Enters., Inc, 728 F.2d 444, 449–50 (10th
Cir. 1984).
41
Sections 44ZZRG & 44ZZRF.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
42
United States v Apple Inc (“US v Apple”), 952 F.Supp.2d 638 (2013).
43
As part of their settlements, the Publishers were ordered to terminate agreements that
prevented e-book retailers from lowering the prices at which they sell e-books to consumers and
to allow for retail price competition in renegotiated e-book distribution agreements.
44
US v Apple, 952 F.Supp.2d 638, 694 (2013).
45
Ibid.
46
US v Apple, 952 F.Supp.2d 638, 700 (2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Apple and the Publishers shared one overarching interest – that there be no price
competition at the retail level. Apple did not want to compete with Amazon (or any
other e-book retailer) on price; and the Publishers wanted to end Amazon’s $9.99
pricing and increase significantly the prevailing price point for e-books. With a full
appreciation of each other’s interests, Apple and the Publishers agreed to join forces to
eliminate retail price competition in the e-book market and raise the price of e-books
above $9.99.47
Working together and equipped with Apple’s agency agreements, Apple and the
Publishers moved the largest publishers of trade e-books and their distributors from a
wholesale to agency model, eliminated retail price competition, and raised e-book
prices.48
To prove an antitrust conspiracy, “the antitrust plaintiff should present direct or
circumstantial evidence that reasonably tends to prove that the [defendant] and others
had a conscious commitment to a common scheme designed to achieve an unlawful
objective”.49 The evidence must also “prove defendants had the intent to adhere to an
agreement that was designed to achieve an unlawful objective; specific intent to restrain
trade is not required”.50
Proof that a combination was formed for the purpose of fixing prices and that it
caused them to be fixed or contributed to that result is proof of the completion of a
price-fixing conspiracy under section 1 of the Sherman Act.
One of Apple’s arguments was that it never intended to conspire with the Publishers
to raise e-book prices. Apple also argued that it had legitimate, independent business
reasons for executing the agency agreements with the Publishers, and that these
independent business reasons necessarily rendered any evidence of its participation in a
conspiracy ambiguous.51 Because the Plaintiffs have been unable to show that Apple
did not have legitimate reasons for acting as it did, Apple asserted that the Plaintiffs
failed to exclude the possibility that Apple acted lawfully.52
Based on the evidence, the court held that Apple clearly intended that its relationship
with the Publishers have the elements required for a contract, arrangement or
understanding, including the requirements of consensus and commitment.53
Apple argued that it was the Publishers who raised the prices and Apple should not
be found liable just because those Publishers used Apple’s agreements as a tool to force
an industry change to the agency model and then used their newly acquired price-
setting authority to raise the retail prices of e-books.54 Apple claimed that it was only
47
US v Apple, 952 F.Supp.2d 638, 647 (2013).
48
US v Apple, 952 F.Supp.2d 638, 693 (2013).
49
Monsanto Co v Spray–Rite Service Corp (“Monsanto”), 465 US 752, 764 (1984).
50
Geneva Pharms. Tech. Corp v Barr Labs. Inc (“Geneva Pharms”), 386 F3d 485, 507
(2004).
51
US v Apple, 952 F.Supp.2d 638, 696 (2013).
52
Ibid.
53
Ibid.
54
US v Apple, 952 F.Supp.2d 638, 699 (2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
focused on accomplishing its core business objectives and on providing the best
possible e-reading experience for consumers.55 Apple identified those business object-
ives as the development of an iBookstore with comprehensive content and competitive
pricing.56 At trial, its witnesses stressed the advantages that accrued to readers from its
iPad (colour functionality, backlit screen and video capability) and from the iBookstore
e-reader software (landscape view option, an attractive page-curl function and an
end-to-end platform to browse, buy and read an e-book in one seamless interface).57
However, the court found that Apple’s legitimate motives did not preclude a finding
that Apple also intentionally engaged with the Publishers in a scheme to raise e-book
prices.58
Understanding that no one publisher could risk acting alone in an attempt to take
pricing power away from Amazon, Apple created a mechanism and environment that
enabled them to act together in a matter of weeks to eliminate all retail price
competition for their e-books. The evidence was incontrovertible that Apple knew of
the unlawful aims of the scheme and joined that conspiracy with the specific intent to
help it succeed.59 Apple’s desire to create a profitable iBookstore on a superior e-reader
did not negate the substantial evidence that Apple made a commitment to act as the
Publishers’ partner in raising e-book prices materially above $9.99.60
Apple argued in conclusion that if the agency agreements had both illegal and legal
purposes, then the existence of a lawful purpose would prevent a finding of liability.61
In Australia, Professor Corones has similarly noted the importance of providing a
legitimate business justification for conduct that appeared to be prima facie exclusion-
ary.62 For example, Queensland Wire Industries Pty Ltd v BHP Pty Ltd (“QWI”)
illustrates that the failure to adduce evidence showing a good business justification for
the impugned conduct will entitle a court to draw an adverse inference with regard to
purpose.63 Australian authorities indicate the importance of the legitimate business
justification defence in relation to both refusal to deal and exclusive dealing cases.64
Similarly, the US courts have treated valid business justifications as a defence to
55
Ibid.
56
Ibid.
57
US v Apple, 952 F.Supp.2d 638, 700 (2013).
58
Ibid.
59
Ibid.
60
Ibid.
61
US v Apple, 952 F.Supp.2d 638, 701 (2013).
62
Stephen Corones, “The Characterisation of Conduct under Section 46 of the Trade
Practices Act” (2002) 30 Australian Business Law Review 410, 417.
63
Queensland Wire Industries Pty Ltd v Broken Hill Pty Co Ltd (“QWI”) (1989) 167 CLR
177 – this was a misuse of market power case.
64
See e.g. Top Performance Motors Pty Ltd v Ira Berk (Queensland) Pty Ltd (1975) 5 ALR
465, 468; Mark Lyons Pty Ltd v Bursill Sportsgear Pty Ltd (1987) ATPR ¶40–809, ¶48,800;
APRA v Ceridale Pty Ltd (1990) 97 ALR 497, 510–11; Petty v Penfold Wines Pty Ltd (1994) 49
FCR 282, 291; Stirling Harbour Services Pty Ltd v Bunbury Port Authority (2000) ATPR
¶41–752, ¶40,734; Melway (2001) 205 CLR 1; ACCC v Boral (1999) 166 ALR 410.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
antitrust liability.65 It has also been used to refute evidence of a proscribed anti-
competitive purpose. Of course a valid business justification does not necessarily mean
that the conduct is not anticompetitive. This is where the defendant’s business
justification for its conduct is helpful in determining its intent or purpose. Apple
provided some business justification for its conduct but it was still found to have
contravened section 1 of the Sherman Act. It is submitted that the existence of a
pro-competitive business purpose for the impugned conduct may act as a defence or a
probative tool in establishing whether a firm had an improper or colourable purpose.
Apple argued that it had made several innocent vertical distribution agreements whose
only purpose was to facilitate Apple’s pro-competitive entry into the e-book market.
The district court said that that characterisation of the relevant events could not be
reconciled with the evidence, which demonstrated that Apple had conspired with the
Publishers to achieve their shared goal of eliminating e-book retail price competition
and raising e-book prices.66 The district court properly found that Apple had partici-
pated in a horizontal price-fixing conspiracy that had the purpose and effect of raising
e-book prices. The purpose and effect of the charged conspiracy were to prevent that
expansion of the market from resulting in price competition among e-book retailers.
Acts that exhibit a consciousness of guilt, such as false exculpatory statements, may
also tend to prove knowledge and intent of a conspiracy’s purpose.67 The purpose of the
conspiracy was not to expand retail price competition, but to eliminate it.
Confronted with the substantial evidence of its participation in a conspiracy with the
Publishers, Apple offered a counter-narrative of the relevant events that transpired in
late 2009 and early 2010.68 Apple contended that the trial record showed that Apple
acted independently and as a lawful participant in a series of negotiations that would be
unexceptional for any new market entrant.69
However, there was incriminating “smoking gun” evidence of Apple’s participation
in the conspiracy, namely, the words uttered by Steve Jobs, Apple’s founder and CEO.70
For example, Jobs told one of the Publishers that Amazon’s $9.99 sales were “eroding
the value perception” of its products, and that Apple would be trying higher price
65
See e.g. Aspen Skiing Co v Aspen Highland Skiing Corp (“Aspen”) 472 US 585, 602
(1985); Christy Sports LLC v Deer Valley Resort Co 555 F.3d 1188, 1197 (10th Cir, 2009);
LePage’s Inc v 3M 324 F.3d 141, 163 (3rd Cir, 2003); Morris Communication Corp v PGA Tour
Inc 235 F.Supp.2d 1269, 1288 (MD Fla, 2002); General Industrial Corp v Hartz Mountain Corp
810 F.2d 795, 804 (8th Cir, 1987); Continental TV Inc v GTE Sylvania Inc 433 US 36, 55
(1977); Consultants & Designers v Butler Service Group 720 F.2d 1553, 1559 (11th Cir, 1983);
United States Football League v National Football League 842 F.2d 1335, 1360 (2nd Cir, 1988).
These were mainly monopolisation cases.
66
US v Apple, 952 F.Supp.2d 638, 702 (2013).
67
US v Apple, 952 F.Supp.2d 638, 694 (2013).
68
US v Apple, 952 F.Supp.2d 638, 702 (2013).
69
Ibid.
70
US v Apple, 952 F.Supp.2d 638, 705 (2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 12 / Date: 16/7
JOBNAME: Rider PAGE: 13 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
points.71 This was confirmed at the media launch of its iBookstore. Jobs’ purchase of
an e-book for $14.99 at the launch, and his explanation to a reporter that day that
Amazon’s $9.99 price for the same book would be irrelevant because soon all prices
will “be the same” was further evidence that Apple understood and intended that
Amazon’s ability to set retail prices would soon be removed.72 Jobs’ statements, Cote J
said, “remain powerful evidence of conspiratorial knowledge and intent”.73
To conclude, the district court for the southern district of New York found that Apple
violated section 1 of the Sherman Act by conspiring to raise e-book prices and end
e-book retailers’ freedom to compete on price. After carefully weighing the evidence,
the court agreed with the Justice Department and 33 state attorneys general that
executives at the highest levels of Apple perpetrated a conspiracy with five major
publishers – Hachette, HarperCollins, Macmillan, Penguin and Simon & Schuster – to
raise e-book prices.
It has been reported that Apple will pay $450 million as part of an out-of-court
settlement with class action lawyers and state district attorneys over e-book price-
fixing.74 The settlement is subject to court approval and contingent on a pending
appeals case Apple filed in February 2014. Should Apple’s appeal be successful, the
company will pay out $50 million to settle consumer damages claims. If the appeals
court reverses the initial decision entirely, Apple will pay no damages.
ANALYSIS
The enforcement guidelines issued by the US DOJ confirm that although violations of
the Sherman Act may be prosecuted as civil or criminal offences, conduct that the DOJ
prosecutes criminally is limited to traditional per se offences of the law, which typically
involve price-fixing, customer allocation, bid-rigging or other cartel activities that
would also be violations of the law in many countries.75 In other words, the DOJ
focuses on collateral conduct that involves “naked” agreements in restraint of trade
under section 1 of the Sherman Act. Somewhat surprisingly, Apple was prosecuted as a
civil case despite satisfying the DOJ’s own enforcement guidelines which indicate that
such price-fixing conspiracies constitute felony violations of antitrust federal law.76
71
US v Apple, 952 F.Supp.2d 638, 704 (2013).
72
Ibid.
73
US v Apple, 952 F.Supp.2d 638, 705 (2013).
74
http://www.macrumors.com/2014/07/16/apple-ebook-price-fixing/ accessed on 29 July
2014.
75
See US DOJ, Antitrust Division, “An Antitrust Primer for Federal Law Enforcement
Personnel”, August 2003, revised April 2005 at http://www.justice.gov/atr/public/guidelines/
209114.htm accessed on 4 August 2014.
76
It is unclear why the DOJ decided to initiate civil proceedings against Apple instead of a
criminal prosecution which is at odds with the DOJ’s own enforcement policy. It has been
suggested that the decision may be a one-off exception – see Evan D Brewer, “The E-Books
Price Fixing Litigation: Curious Outlier or Harbinger of Change in Antitrust Enforcement
Policy” (2014) 6(1) Hastings Science and Technology Law Journal 43.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 13 / Date: 16/7
JOBNAME: Rider PAGE: 14 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Whilst the US Supreme Court in Gypsum clearly established that intent is an element
of a Sherman Act offence,77 it is well recognised that in a criminal prosecution of a
Sherman Act conspiracy such as price-fixing, the DOJ need not prove that the
defendants intended to restrain trade or violate the law. In cases involving per se
violations of the Sherman Act, proof of the defendants’ knowing participation in an
agreement to fix prices satisfies the intent requirement. Although price-fixing and other
cartel offences under the Sherman Act are not strict liability crimes, the intent required
to prove a criminal violation of the Sherman Act is simply the general intent to agree to
fix prices, not a specific intent to restrain trade or violate the law. In US v Smith
Grading & Paving,78 a bid-rigging criminal case, the court stated that the US
government must prove the defendants’ intentional participation in the conspiracy to rig
bids. The US government did not have to prove the defendants’ specific intent to
unreasonably restrain trade. In US v Society of Independent Gasoline Marketers of
America, a price-fixing criminal case, the court noted that since in a price-fixing
conspiracy the conduct is illegal per se, further inquiry on the issues of intent or the
anticompetitive effect is not required.79 The mere existence of a price-fixing agreement
establishes the defendants’ illegal purpose.80 The defendants may not defend or excuse
their knowing participation in the charged conspiracy by arguing or offering evidence
that they did not intend to violate the law or restrain competition. This proof would be
nothing more than an excuse or justification for participating in the per se unlawful
conduct and “would reopen the very questions of reasonableness which the per se rule
is designed to avoid”.81
Accordingly, when a defendant knowingly engages in per se unlawful conduct, intent
to restrain trade is presumed.82 Therefore, because proof of specific intent to restrain
trade is not relevant to a determination of the defendants’ guilt or innocence, evidence
or arguments regarding the absence of specific intent is excluded as a matter of law.
To prove a price-fixing conspiracy under section 1 of the Sherman Act, the plaintiff
must present evidence that the defendant and others had a conscious commitment to a
common scheme designed to achieve an unlawful objective, that is, to fix prices, and
that the defendants had the intent to adhere to an agreement that was designed to
achieve this objective – specific intent to restrain trade is not required.83
In the Apple case, the court said that even if analysed under the rule of reason84 the
evidence showed that Apple had conspired via horizontal price-fixing agreements with
77
United States v United States Gypsum Co, 438 US 422, 435 (1978).
78
760 F.2d 527, 533 (4th Cir. 1985).
79
624 F.2d 461, 465 (4th Cir. 1979).
80
Ibid.
81
United States v Koppers Co Inc (“Koppers”), 652 F.2d 290, 296 (1981).
82
See United States v Coop. Theatres of Ohio Inc (“Coop”), 845 F.2d 1367, 1373 (1988);
United States v Gillen (“Gillen”), 599 F.2d 541, 545 (1979).
83
United States v Smith Grading & Paving Inc (“Smith Grading & Paving”), 760 F.2d 527,
533 (4th Cir. 1985).
84
Under the rule of reason, the plaintiffs in a Sherman Act suit for conspiracy to engage in
unreasonable restraints of trade or commerce bear an initial burden to demonstrate the
defendants’ challenged behaviour had an actual adverse effect on competition as a whole in the
relevant market.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 14 / Date: 16/7
JOBNAME: Rider PAGE: 15 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
the Publishers to raise e-book prices. Apple failed to show any pro-competitive effects
of its agreements with the Publishers, and the evidence proved that the agreements
were intended to remove Apple’s competitors’ ability to set e-book prices and relieve
the company of the need to compete on price and allowed the Publishers to raise
e-book prices which resulted in fewer sales.
In Gypsum, whilst the US Supreme Court’s analysis focused on the elements of a
criminal offence under the antitrust laws, the court acknowledged that even in civil
cases, consideration of intent may play an important role in divining the actual nature
and effect of the alleged anticompetitive conduct.85
In a conspiracy, two different types of intent are generally required – the basic intent
to agree, which is necessary to establish the existence of the conspiracy, and the more
traditional intent to effectuate the object of the conspiracy.86 The discussion in Gypsum
focused only on the second type of intent.87 The US Supreme Court also stated that if
the defendants’ carefully planned and calculated conduct was undertaken with know-
ledge of its probable consequences and having the requisite anticompetitive effects, this
can be a sufficient basis for a finding of criminal liability under the antitrust laws.88
The element of intent in the criminal law has traditionally been viewed as a
bifurcated concept embracing either the specific requirement of purpose or the more
general one of knowledge or awareness.89 It is now generally accepted that a person
who acts (or omits to act) intends a result of his or her act (or omission) under two
quite different circumstances: (1) when he or she consciously desires that result,
whatever the likelihood of that result happening from his or her conduct; and (2) when
he or she knows that the result is practically certain to follow from his or her conduct,
whatever his or her desire may be as to that result.90 Generally this limited distinction
between knowledge and purpose has not been considered important since “there is
good reason for imposing liability whether the defendant desired or merely knew of the
practical certainty of the results”.91 In either circumstance, the defendants are con-
sciously behaving in a way the law prohibits, and such conduct is a fitting object of
criminal punishment.92
Applying the Gypsum test for a finding of criminal liability under the antitrust laws,
it is submitted that there was sufficient evidence that Apple’s actions also constituted a
criminal violation of the Sherman Act. However, it is unclear whether Apple’s
impugned conduct would satisfy the default fault element of intention required under
the Australian provisions for criminal liability, that is, intention to make or give effect
to an arrangement containing a cartel provision.93
85
Gypsum, 438 US 422, 436 (1978); Chicago Board of Trade v US, 246 US 231, 238
(1918).
86
Gypsum, 438 US 422, 444 (1978).
87
Ibid.
88
Gypsum, 438 US 422, 446 (1978).
89
Ibid, 445.
90
Ibid.
91
Ibid.
92
Ibid.
93
Section 44ZZRF(1) & RG(1) of the Competition Act.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 15 / Date: 16/7
JOBNAME: Rider PAGE: 16 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
94
The role of the intent requirement became diminished when the Chicago School of
antitrust analysis emerged in the late 1970s and early 1980s. See e.g. Marina Lao, “Reclaiming
a Role for Intent Evidence in Monopolisation Analysis” (2004) 54 American University Law
Review 151, 165.
95
Kathryn McMahon, “Competition Law, Adjudication and the High Court” (2006) 30
Melbourne University Law Review 782, 820.
96
Phillip Areeda & Herbert Hovenkamp, Antitrust Law (2nd ed, 2002) vol 5 [601], [749b]
323 (Supp. 2006).
97
See e.g. Dustin Sharpes, “Reintroducing Intent into Predatory Pricing Law” (2012) 61
Emory Law Journal 903.
98
See earlier discussion under the heading, “Criminalisation of Cartel Conduct in Aus-
tralia”. There is a requirement to satisfy the “purpose/effect condition” in price-fixing cases:
s 44ZZRD(2).
99
Ibid. There is a requirement to satisfy the “purpose condition” in restricting output,
market division and bid-rigging cases: s 44ZZRD(3).
100
Verizon Communications Inc v Law Offices of Curtis Trinko LLP (“Trinko”), 540 US 398,
414 (2004).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 16 / Date: 16/7
JOBNAME: Rider PAGE: 17 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
prosecuting cartels criminally and the only jurisdiction in which jail sentences for
individuals convicted of cartel offences are common. Criminal penalties are now
perceived as necessary to provide effective general deterrence of cartel activity.
Australia introduced jail terms for cartel conduct in 2009 with a maximum of 10 years
imprisonment for individuals involved in the contravention. There is a clear trend
towards criminalisation in many jurisdictions, although there is evidence that there
needs to be a change in the public perception to the moral reprehensibility of cartel
conduct.101 For example, one commentator stated that criminalisation makes the
morality of serious cartel activity a relevant consideration in the design and application
of the Australian law.102 Recognition of the moral dimension will enhance the prospects
of the criminal regime securing the support necessary for its effective enforcement.103 It
should also boost the regime’s deterrence value by facilitating internalisation of
relevant moral norms in the business community.104 Offences lacking in mens rea are
said not to be truly criminal because they do not involve the culpability or “subjective
blameworthiness” traditionally associated with the criminal system of justice.105 In this
regard, it is noted that the civil per se price-fixing prohibition applies to provisions that
have the purpose or likely effect of substantially lessening competition (the “purpose/
effect condition”) and the civil per se prohibitions applying to other types of cartel
conduct such as market division, restricting output or bid-rigging apply to provisions
that have the purpose of substantially lessening competition (the “purpose condition”).
To this extent, it is submitted that the civil prohibitions may be likened to a culpability
requirement.
CONCLUSION
According to the US Antitrust Division, price-fixing, bid-rigging and market allocation
are “economic crimes” with potentially devastating effects on the US economy.106
The law has long considered a person’s intent for specific actions. As stated by
Jackson J in Morissette v United States (“Morissette”):107
The contention that an injury can amount to a crime only when inflicted by intention is no
provincial or transient notion. It is as universal and persistent in mature systems of law as
101
See Christine Parker, “The Compliance Trap: The Moral Message in Responsive
Regulatory Enforcement” (2006) 40 Law and Society Review 591; Caron Beaton-Wells,
“Capturing the Criminality of Hard Core Cartels: The Australian Proposal” (2007) 31(3)
Melbourne University Law Review 675.
102
Caron Beaton-Wells, see above n 101.
103
Ibid.
104
Ibid.
105
Ibid, 684.
106
US Department of Justice, Antitrust Division, “An Antitrust Primer for Federal Law
Enforcement Personnel”, August 2003, revised April 2005, at http://www.justice.gov/atr/public/
guidelines/209114.htm accessed 4 August 2014.
107
Morissette v US (“Morissette”), 342 US 246, 250–51 (1952).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 17 / Date: 8/9
JOBNAME: Rider PAGE: 18 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
belief in freedom of the human will and a consequent ability and duty of the normal
individual to choose between good and evil.
In Gypsum, the court stated that “we start with the familiar proposition that ‘the
existence of a mens rea is the rule of, rather than the exception to, the principles of
Anglo-American criminal jurisprudence’”.108
This chapter argues that, besides criminal liability, intent or purpose is also relevant
in antitrust civil actions, as demonstrated in the Apple case. In the US, specific intent is
required to establish antitrust liability for an attempt to monopolise under section 2 of
the Sherman Act. But the role of intent in other antitrust cases has been unsettled and
controversial.109 However, courts, commentators and practitioners have recognised that
intent evidence is relevant in predicting consequences and interpreting facts.110 The US
Supreme Court has also recognised the relevance of the antitrust defendant’s intent,
which can be inferred from its anticompetitive conduct or lack of a valid non-pretextual
justification.
Despite the Chicago School assumption that intent evidence is irrelevant, the US
federal antitrust agencies generally believe that intent evidence is relevant, especially in
relation to mergers.111 Likewise, in evaluating collaboration among competitors, US
federal antitrust agencies consider intent evidence may aid in evaluating market power,
the likelihood of anticompetitive harm and claimed pro-competitive justifications where
an agreement’s effects are otherwise ambiguous.112
There is also support for the role of intent evidence in relation to its probative value,
that is, anticompetitive intent or purpose is strong corroborative evidence that the
impugned conduct is anticompetitive.113 Further, as in the Apple case, anticompetitive
intent is relevant to the question of whether the challenged conduct is fairly character-
ised as exclusionary (unlawful) or pro-competitive (lawful).
This is not to say that the mens rea required to establish a criminal cartel offence is
the same as the concept of purpose under the civil per se prohibitions. A higher
standard of proof, beyond reasonable doubt, will apply. Criminal intent will therefore
be more difficult to prove than anticompetitive purpose. For example, the presumption
that a person intended the natural and probable consequences of his or her act would
not be allowed.114 In this regard, it appears that the criminal test for antitrust liability in
the US is less onerous.115 Further, in inferring intention from the relevant conduct and
surrounding circumstances, the jury must be satisfied that the evidence bears out no
108
United States v United States Gypsum Co, 438 US 422, 436 (1978).
109
Maurice Stucke, “Is Intent Relevant?” (2012) 8 Journal of Law, Economics and Policy
801. See also Lao, above n 94.
110
Ibid.
111
Stucke, see above n 110.
112
Ibid.
113
Ibid.
114
Beaton-Wells, see above n 101, 686.
115
See Gypsum, 438 US 422, 444 (1978), where the US Supreme Court indicated that action
undertaken with knowledge of its probable consequences and having the requisite anti-
competitive effects can be a sufficient ground for a finding of criminal liability under the
antitrust laws.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 18 / Date: 16/7
JOBNAME: Rider PAGE: 19 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
other reasonable explanation. This construction is at odds with the Gypsum formulation
for criminal antitrust liability. Perhaps the formulation of the Australian criminal
provisions for cartel conduct reflects Parliament’s attempt to ensure that only conduct
that is sufficiently culpable, harmful and wrongful is caught. The prohibitions against
price-fixing have been the subject of numerous proceedings by the ACCC, and since
July 2009, may attract criminal sanctions. A number of these proceedings have resulted
in multi-million dollar penalties, which have been extensively and widely publicised.116
However, until there is a criminal prosecution for cartel conduct in Australia, there
remains considerable uncertainty as to how the fault elements of intention, knowledge
or belief will be judicially interpreted and applied.
116
See ACCC v Visy Industries Holdings Pty Ltd & Ors (No 3) (2007) 244 ALR 673. A
record penalty of AUD$36 million was ordered against Visy and its owner, Richard Pratt,
following findings by the Australian Federal Court that the company had engaged in illegal
price-fixing and market-sharing agreements with its rival, Amcor Ltd. In New Zealand, the
Commerce Commission took similar proceedings against Visy in relation to the trans-Tasman
market. On 8 April 2014, it was reported that Visy had been ordered by the High Court to pay a
penalty of NZ$3.6 million for breaching the cartel provisions: http://www.comcom.govt.nz/the-
commission/media-centre/media-releases/2014/commission-completes-long-running-trans-tasman-
cartel-case/ accessed 8 August 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 11 /Pg. Position: 19 / Date: 31/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Following the financial turmoil which swept through markets worldwide in 2007 and
2008 the role of hedge funds in contributing to this crisis has been widely debated. This
is due in part to the collapse in June 2007, of two hedge funds managed by Bear
Stearns.1 These funds, which were heavily invested in securities backed by sub-prime
mortgages, were forced to mark down the value of these mortgages due to increasing
defaults sparked by the decline in the housing market in the US and elsewhere. While
these hedge funds were liquidated without causing serious market disruptions, they
served to alert investors to the immense financial clout which they possessed and
played a part in the collapse of Bear Stearns in March 2008. Since that time, many
financial analysts have noted that hedge funds have played a major role in the
increasing volatility in the financial market which occurred throughout 2008 and may
have contributed to the “flash crash” of 6 May 2010 in which shares on US exchanges
dropped dramatically in a matter of minutes with some blue chip shares briefly trading
for mere pennies per share.2 Although the crash was ultimately determined to have
been caused mainly by rapid high frequency computerized trading, some commentators
initially blamed it on liquidation of the large holdings by hedge funds.3 Since hedge
funds historically have been shrouded in secrecy, due to the fact that they have not been
subject to the disclosure requirements of most regulated investment companies and
mutual funds, they have been made a convenient scapegoat for both the flash crash and
the earlier 2008–2009 bear market. Although hedge funds generally survived the
financial turmoil unscathed, their lack of transparency has led to increased calls for
additional regulation. This chapter will briefly trace the origin of hedge funds and their
role in the modern financial system. It will conclude with a discussion of recent
legislation increasing the accountability and transparency of hedge funds in the US and
the EU.
1
See generally “The Collapse of Bear Stearns: Five Years On,” Financial News 19 March
2013.
2
See “What Caused the Flash Crash? One Big Bad Trade,” The Economist Online
1 October 2010, http://www.economist.com/blogs/newsbook/2010/10/what_caused_fhash_crash.
3
Id.
144
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
4
See Stuart A. McCrary, “Introduction to Hedge Funds,” in How to Create and Manage a
Hedge Fund: A Professional’s Guide (Hoboken, NJ: John Wiley & Sons 2002), pp. 1–18.
5
Sam Kirschner, Eldon C. Mayer and Lee Kessler, An Investor’s Guide to Hedge Funds
(Hoboken, NJ: John Wiley & Sons 2006).
6
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
between market price and the anticipated merger or take-over price of the
company’s securities.
5. “Distressed securities strategies” in which managers purchase equity or debt
securities of companies subject to threatened bankruptcy or other difficulties
where the manager believes that the markets have over-reacted to the announced
problems so the securities are undervalued.
6. “Market neutral strategies” in which an equal dollar value of securities is
purchased and also sold short.
7. “Convertible arbitrage strategies” in which the manager attempts to capture a
perceived value discrepancy between convertible bonds and the underlying
common shares by purchasing the shares and selling the bonds short, or vice
versa.
8. “Fixed income arbitrage strategies” in which the manager attempts to capitalize
on small discrepancies in value between different fixed income securities by
selling one short and purchasing the other.
9. “Funds of hedge funds” involving managers who attempt to capitalize on the
expertise of the managers of various hedge funds while diversifying the risk by
investing in several different hedge funds employing different strategies.
7
See Alexander Ineichen, Absolute Returns: The Risks and Opportunities of Hedge Fund
Investing (Hoboken, NJ: John Wiley & Sons, 2002), pp. 441–4.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Liew of AQR Capital Management, indicates that, contrary to their name, hedge funds
frequently are not successful in hedging against market volatility.8
Second, as the Bernard Madoff case illustrates, because hedge funds in most
countries are generally free from regulation, they may be particularly tempting targets
for fraudulent schemes.9
Third, since investment advisors may serve both regulated investment companies as
well as hedge funds, there is the potential for conflicts of interest to arise. The large
performance based fees typically paid to hedge fund managers coupled with the fact
that the manager may have a large equity stake in the fund provides an incentive for the
manager to favor the hedge fund over the regulated investment company. For example,
the manager may engage in short sales of a security for the hedge fund while
maintaining a long position in the same security for the registered investment company.
Fourth, the lack of transparency in valuation of hedge fund holdings poses risks to
investors. Registered investment companies are required to price securities at market
value, assuming a liquid market exists, or at fair value, if there is not. Hedge fund
managers are not subject to these restrictions and may take advantage of this to utilize
more speculative forward-looking measures of value. This is a particular problem for
hedge funds which invest in complex derivative instruments where there is no liquid
market and for which there are no generally accepted guidelines for valuation.
Fifth, the recent development of “funds of hedge funds” which invest in a variety of
different types of hedge funds have increased the availability of hedge funds to small
investors. While these funds of funds provide the benefit of diversification to low net
worth investors, they also have the potential detriment of attracting investments by less
experienced investors who may not adequately appreciate the risks involved in such
investments.
Sixth, although hedge funds are widely touted as being “market neutral” and able to
achieve above average returns over the entire market cycle, empirical evidence does not
support such claims. A recent study by Presidio Wealth Management of San Francisco
compared the performance of a diversified portfolio to the Hedge Fund Research Fund
of Funds Composite Index, which is the industry benchmark for hedge fund of funds.
For a six year period from 2000 to 2006 the diversified portfolio generated an average
annualized return of 6.2 percent while the hedge fund index gained only 5.2 percent.10
Furthermore, over an even longer period from 1990 when the Hedge Fund Index was
started, the diversified portfolio’s average annual return was 10.6 percent annually as
opposed to 10.1 percent annually for the hedge fund index.11 Even over shorter periods
of time, comparisons do not strongly favor hedge funds. An index of hedge funds
compiled by Hedge Fund Research gained 8.91 percent after fees in 2004 and 9.35
percent in 2005. In comparison, the Standard & Poors 500 Index was up 8.99 percent
8
Mark Hulbert, “No Place to Hide” (4 December 2008) at www.marketwatch.com/news/
story.lessons-learned-harvard-3.
9
Nick Kochan, “Hedge Fund Fraud: Hedge of Darkness” (1 July 2009) at http://
www.risk.net/operationalrisk-and-regulation/feature/1516866/-fund-fraud-hedge-darkness.
10
Chuck Jaffe, “Luxury Vehicle Average Ride, Despite All the Hype Hedge Funds Likely to
Disappoint” (11 June 2006) at www.Marketwach.com/news/story/June 11, 2006.
11
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
in 2004 and 10 percent in 2005.12 Thus the potential downside risk posed by highly
leveraged hedge funds may not be justified by the insignificant rewards which, as a
group, they have achieved.
Seventh, because they are not subject to the disclosure requirements or registered
investment companies, hedge funds may be an attractive vehicle for use by organized
criminals or terrorists engaged in money laundering or insider trading. The US Treasury
has proposed regulations which would require hedge funds to establish anti-money
laundering programs.13 Also, in 2002 the Securities and Exchange Commission (SEC)
issued a report to Congress dealing with the use of hedge funds in money laundering.14
12
Barron’s National Business and Financial Weekly, 31 January 2005 at F3.
13
67 F.R. 60617 (26 September 2002).
14
“A Report to Congress in Accordance with Section 356c of the USA Patriot Act” (31
December 2002) available at www.sec.gov.
15
See About.com US Economy, “What Was the Long Term Capital Hedge Fund and LTCM
Crisis?” at http://useconomy.about/com/od/themarkets/f/LTCM.htm.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
theorists are not able accurately to predict the extent of the risks which a particular
strategy poses to a fund when its underlying assumptions do not come to pass. Thus,
the LTCM debacle may have had the salutary effect of causing major lenders to hedge
funds to act more conservatively in subsequent transactions.
Another incident raising the possibility of systemic risk occurred from May through
August 1998. It involved a concerted attack on the Hong Kong Dollar market by
several hedge funds which caused interest rates to rise and eventually contributed to a
38 percent decline in share prices on the Hong Kong stock market during this time. To
end the crisis and stabilize the stock market, the Hong Kong government was forced to
purchase about $15 million in shares.16
In 2006, KBC Alternative Investment Management employed a complex convertible
bond arbitrage strategy which went awry. This resulted in a decline in the fund’s assets
from approximately $5 billion to less than $1 billion in less than a year. While its
investors suffered substantial losses, there were no adverse effects on the markets
overall.17
Another collapse occurred in September 2006, when a large US based hedge fund,
Amaranth Advisors LLC, incurred substantial losses because it failed to adequately
hedge against rapid declines in natural gas prices the previous month. An examination
of the Amaranth collapse provides cause for both optimism and concern. Amaranth
described its strategies as “Convertible arbitrage (buying a convertible bond and selling
short a percentage of the stock into which the bond is convertible); statistical arbitrage
(exploiting ‘anomalies’ in markets compared with historical trends); energy trading;
merger arbitrage, and stock trading.”18 Commodities trading is riskier than stock
trading because the margin requirements are lower than for exchange traded stocks.
The chief trader for Amaranth responsible for the large losses reportedly had over
100,000 positions in a single commodities contract. While US exchanges have limits on
the size of an individual trader’s position, they apply only during the last three days
prior to a contract’s expiration on the New York Mercantile Exchange.19 Amaranth’s
returns fluctuated widely during the first nine months of 2006. In late April Amaranth
reported returns for the year to date of 12 percent, primarily from energy trades, but it
lost 10 percent, also primarily on energy trades, during the sell-off in the markets
which occurred in May 2006.20 The chief trader for Amaranth engaged primarily in
buying and selling spread contracts on natural gas futures as well as purchasing
options, both of which, theoretically, should have been considerably less risky than
taking outright long or short positions. Unfortunately, the relationship between natural
gas contracts in various months did not follow the historical patterns on which
Amaranth based its strategy. When Amaranth’s trades began to lose money, instead of
liquidating the positions to limit losses, the firm “doubled down” on its positions
hoping for a return to historical patterns. Unfortunately, that did not occur in time to
rescue Amaranth. The large size of its positions coupled with rapid price changes
16
Wall St. J. 22 June 2006 at C5.
17
Id. at C1.
18
Wall St. J. 20 September 2006 at C1.
19
Id. at C2.
20
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
caused Amaranth to lose close to $5 billion in the space of a single week, reducing its
net assets from over $9 billion to less than $4.5 billion.21
In retrospect it appears that Amaranth’s risk management strategy proved deficient as
it failed to correctly measure the potential downside risk of its strategies and also to
adequately set stops to prevent large losses from becoming catastrophic in size. At that
point, the solvency of Amaranth was questionable and the firm enlisted the assistance
of other institutions to assist it in conducting an orderly liquidation of its positions in
the markets. Profiting from lessons learned from the LTCM liquidation in 1998,
Amaranth’s creditor banks were prepared to extend credit and make arrangements for
the orderly liquidation of Amaranth’s losing positions thus preventing significant
market disruptions. J.P. Morgan Chase & Co. and the hedge fund Citidel Investment
Group, LLC were able to assume Amaranth’s investment portfolio in the space of a
mere 48 hours.22
The fact that private institutions were able to step in and promote an orderly
liquidation of the bulk of Amaranth’s portfolio provides encouraging evidence support-
ing those who argue against extensive government regulation of hedge funds. On the
other hand, the Amaranth case does provide disturbing evidence of how quickly large
losses can mount when a highly leveraged fund misjudges the market. Finally, the case
illustrates how extreme leverage can quickly magnify the impact of trading losses and
threaten a firm’s very solvency.
A study by Mercer Oliver Wyman postulates several reasons why recent hedge fund
liquidations have been more orderly than those in the past.23 First, most hedge funds
have made it more difficult or impossible for investors to withdraw money from the
funds on short notice. Thus, forced liquidations are less likely to occur. These
limitations were imposed by many hedge funds during the severe market decline in the
fall of 2008 and may have served to limit the volatility of markets to some extent. Also,
many hedge funds have arranged for back-up emergency lines of credit with brokerages
or other lenders, which have provisions that make it difficult for such lenders to back
out of these agreements. Nonetheless, because many funds appear to have made bets
similar to one another, there is concern that if there is a quick rush to the exits by all
funds the market could easily collapse due to an absence of buyers. Most risk
management models in the past have underestimated this type of risk. The failure of
“portfolio insurance” to protect investors from large losses in the Wall Street 1987
crash is evidence of this difficulty. Another concern lies with the use of so-called
structured products, a form of corporate debt security often purchased by hedge funds.
These products raise questions of valuation and liquidity which could cause liquidity
and solvency concerns in a rapid market decline such as occurred in late 2008.24
The lack of regulatory data regarding hedge funds makes it difficult to draw
conclusions concerning the effect of hedge funds on the financial markets. However,
commentators have speculated that the extreme volatility which financial markets
worldwide have experienced during the fall of 2008 was due, at least in part, to massive
21
Id.
22
Wall St. J. 5 October 2006 at C3.
23
Id. at C3.
24
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
liquidations of securities by hedge funds. The high degree of leverage utilized by many
hedge funds magnifies their effects on the markets far beyond what one might expect
based on their equity capital. Also the rapid spread of computerized high frequency
trading may raise the dangers of a financial meltdown occurring seemingly out of thin
air. Fortunately, to date no major hedge funds have been forced into bankruptcy, but
given continuing market instability, one cannot predict with confidence that hedge fund
bankruptcies will not arise in the future.
25
Dodd-Frank Wall Street Reform and Consumer Protection Act, P.L. No. 111-203, 124
Stat. 1376 (2010) (hereinafter “Dodd-Frank”).
26
P.L. No. 112-106, 126 Stat. 306 (2012).
27
Dodd-Frank, Title I-Financial Stability, Sub. A, sec. 113.
28
Mary Jo White, “Hedge Funds – A New Era of Transparency and Openness” (18 October
2013) at http://www.sec.gov/News/Speech/Detail/Speech/1370539892574.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
required to file with the SEC a new Form PF disclosing on a confidential basis the
holdings of each fund.
The adoption of these disclosure requirements was controversial. Hedge fund
managers argued that the registration and disclosure requirements would be overly
costly and burdensome. Also, the disclosure of sensitive proprietary information would
be unfair. However, to date the fears of the opponents of the Dodd-Frank disclosure
requirements seem to be unjustified. A recent academic study has found statistical
evidence that the registration requirements of Dodd-Frank have actually had a positive
effect on hedge fund performance, although this effect is most pronounced in the
months immediately following registration and tapers off after a few months.29
29
Wulf A. Kaal, Barbara Luppi and Sandra Paterlini, “Did the Dodd-Frank Act Impact
Hedge Fund Performance?” (2014) papers.ssrn.com/sol3/papers.cfm?abstract_id=2389416.
30
Directive 2011/61/EU of 8 June 2011 (hereinafter the “AIFM Directive”).
31
AIFM Directive, Article 9(7).
32
Id. Articles 38–45.
33
Id. Articles 46–49.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
34
Id. Article 9(7).
35
Id. Articles 6–11.
36
Id. Article 4(1)(v), 15(4).
37
Id. Article 24(4).
38
Id. Article 25(3).
39
Id. Article 21.
40
Id. Articles 22–24; 103–111.
41
Id. Articles 34–37, 40, 42.
42
“FSA Implementation of Alternative Investment Fund Managers Directive: Part 1”
(November 2012), Consultation Paper CP12/32 at http://www.fsa.gov.uk/static/pubs/cp/cp12-
32.pdf.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
which gives covered firms until 22 July 2014 to get authorized and registered with the
Financial Conduct Authority (FCA) and to comply with relevant provisions of the
Directive. More specifically the regulations grandfather non-EU AIFMs which were
marked in the UK prior to 22 July 2013, allowing them to continue marketing under the
old rules until 22 July 2014 without making specific application to do so. Thus, UK
authorities appear to be supporting full implementation of the Directive, but the
flexibility shown by adopting a one year transitional period shows a willingness to
avoid disrupting existing businesses.
Aside from implementing the Directive, the FCA has increased scrutiny of the hedge
fund industry generally and of the activities of US based hedge funds in particular.43
The FCA is said to be particularly concerned that US based hedge fund executives
understand that they have a primary responsibility to the FCA and not their superiors in
the US.
CONCLUSION
To summarize, the 2008–2009 financial crisis led to increased political pressure for
increased regulation of hedge funds worldwide. These pressures reflected concerns that
increased regulation was needed, not only to protect individual investors but to ensure
the integrity of the financial system itself. Despite the lack of convincing evidence that
hedge funds themselves bore significant responsibility for the 2008–2009 financial
crisis, commentators have expressed concern that, in the future, failure of a large player
in the hedge fund industry could result in a financial crisis. These concerns have caused
both the EU and many of its individual members along with the US to act. In the US
this legislation consists primarily of the Dodd-Frank Act and in the EU in the Directive
of 8 June 2011.
Supporters of additional regulation of hedge funds argue that the case for regulation
of hedge funds is similar to that for government regulation of commercial and
investment banking. Just as banks which fail can damage the financial system and the
economy as a whole, hedge funds have the potential to have the same negative
externalities on the financial system and deserve to be regulated for that reason alone,
if for none other. The mere fact that the failure of funds such as Amaranth Investors,
LLC in 2006 or LTCM in 1998 did not cause major disruptions to the financial markets
should not be cause for complacency. Because many hedge funds are simultaneously
engaged in similar transactions, the potential exists for unanticipated market volatility
to cause multiple failures of many hedge funds. The use of a high degree of leverage by
many funds increases the magnitude of market disruptions when speculative plans are
upset by unanticipated market developments. While the costs imposed on the industry
are undeniably large, it is entirely possible that these regulations which take hedge
funds out of the shadows will generate increasing public confidence in this industry
which, in the long run, will benefit its growth and prosperity.
43
See Sam Jones, “UK Authority Extends Scrutiny of Hedge Funds” (19 June 2013) at
http://www.ft.com/intl/cms/s/0/485adba0-d8fl-11e2-84fa-00144feab7de.html.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 12 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
The financial turmoil that began in 2007 and the ensuing financial crisis prompted calls
for remedial measures which, in turn, led to a spate of regulatory reforms on both sides
of the Atlantic. The world of corporate governance has not escaped political and media
scrutiny, and resulting consultation documents and interim and final reports with
various recommendations for change have been countless.
Nevertheless, one fundamental issue that has not been addressed in much depth in
the ongoing debate is shareholder primacy, which appears to have dominated the
thinking of both business leaders and academics for the last few decades.1 It has been
pointed out that ‘Throughout the 1980s and 1990s in the U.S. and U.K., the logic of
shareholder value maximization became the guiding principle, informing the top
management strategic decision making in listed firms as well as (and because of) the
way institutional shareholders evaluated their performance.’ Indeed, shareholder pri-
macy, shareholder value maximization and profit maximization have been used
synonymously and interchangeably in many discussions. And those pushing this cause
often refer to the article by Professor Milton Friedman, a Nobel laureate economist,
published in 1970, in which he famously states, ‘there is one and only one social
responsibility of business – to use its resources and engage in activities designed to
increase its profits’. However, what is often omitted is what follows in the same
sentence, which states: ‘so long as it stays within the rules of the game, which is to say,
engages in open and free competition without deception or fraud’.2 In other words,
Professor Friedman was not advocating the type of behaviour manifested in many
corporate collapses, such as Enron and Worldcom earlier this century, and bank failures
and ongoing revelations of unacceptable practice in the financial services sector.
Nevertheless, as has been observed by scholars, ‘the concept of shareholder primacy
and the concomitant insistence that the only real purpose of the corporation is to deliver
shareholder value has become an almost universal principle of corporate governance
and often goes unchallenged’,3 thus becoming a ‘rational myth’.4 A number of law
1
J. Lok, ‘Institutional Logics and Identity Projects’ (2010) 53 Academy of Management
Journal 1305–1335, at 1305.
2
M. Friedman, ‘The Social Responsibility of Business Is to Increase Its Profits’, The New
York Times Magazine, 13 September 1970.
3
T. Clarke, International Corporate Governance: A Comparative Approach (2007) Rout-
ledge, London, at 69.
4
On rational myth, see, for example, L.B. Edelman, C. Uggen and H.S. Erlanger, ‘The
Endogeneity of Legal Regulation: Grievance Procedures as Rational Myth’ (1999) 105 American
Journal of Sociology 406.
155
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
scholars have questioned this trend, pointing out that the company law of these
countries, where shareholder primacy is perceived to be dominant, does not require
directors to maximize shareholder value.5
Nevertheless, as has been observed,6 those who have entered the corporate govern-
ance debate in the last few decades, given the predominant message found in
mainstream academic commentary and discussions in the business media, would easily
have been led to believe that shareholders are the raison d’être of the company, and that
the board’s sole duty is to serve the interests of the company’s shareholders and the
best way to fulfil this is to maximize the value of the company’s shares. Some leading
corporate lawyers in the US have even gone as far as to claim that it is ‘the end of
history for corporate law’ by stating that a global consensus is converging on this
approach;7 that is, to make ‘corporate managers strongly accountable to shareholder
interests and, at least in direct terms, only to those interests’,8 in order to maximize
social welfare on the part of business enterprises.
5
See, for example, M. Blair and L. Stout, ‘Director Accountability and the Mediating Role
of the Corporate Board’ (2001) 79 Washington University Law Quarterly 403, in regard to the
US. In regard to the UK, see, for example, D. Collison, S. Cross, J. Ferguson, D. Power and L.
Stevenson, Shareholder Primacy in UK Corporate Law: The Exploration of the Rationale and
Evidence (2011) Council of the Association of Chartered Certified Accountants, London, and A.
Keay, ‘Moving towards Stakeholderism? Constituency Statutes, Enlightened Shareholder Value
and All That: Much Ado About Little?’, available at http://ssrn.com/abstract=1530990 (accessed
6 May 2012). In regard to Australia, for example, see M.A. Anderson, M. Jones, S. Marshall, R.
Mitchell and I. Ramsay, ‘Shareholder Primacy and Directors’ Duties: An Australian Perspective’
(2008) 8 Journal of Corporate Law Studies 161.
6
M. Blair and L. Stout, ibid., at 405.
7
Although the application of the institutional theory to corporate governance research has
moved some scholars away from pursuing a universal corporate governance model by enabling
them to identify various institutions that result in different corporate governance practices and
their outcomes, shareholder primacy remains central to their discussion. For discussion of
institutional approaches to corporate governance research, see, for example, I. Filatotchev and C.
Nakajima, ‘Internal and External Corporate Governance: An Interface between an Organization
and Its Environment’ (2010) 21 British Journal of Management 591 and I. Filatotchev, G.
Jackson and C. Nakajima, ‘Corporate Governance and National Institutions: A Review and
Emerging Research Agenda’ (2012) 30 Asia Pacific Journal of Management 965.
8
H. Hansmann and R. Kraakman, ‘The End of History for Corporate Law’ in J.N. Gordon
and M.J. Roe (eds). Convergence and Persistence in Corporate Governance (2004) Cambridge
University Press, Cambridge, at 42–43.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
9
F.B. Cross and R.A. Prentice, Law and Corporate Finance (2007) Edward Elgar,
Cheltenham, UK and Northampton, MA, at 7.
10
See, for example, R.A. Posner, ‘Are American CEOs Overpaid, and, If So, What If
Anything Should Be Done About It?’ (2009) 58 Duke Law Journal 1013, at 1026–1027, pointing
out that share options have the effect of making executives focus on the short term.
11
See, for example, N. Bishara and C. Schipani, ‘Strengthening the Ties that Bind:
Preventing Corruption in the Executive Suite’ (2009) 88 Journal of Business Ethics 765.
12
See, for example, remarks by Sheila C. Bair, Chairman of the US Federal Deposit
Insurance Corporation to the National Press Club, Washington, DC, 24 June 2011, http://
www.fdic.gov/news/news/speeches/chairman/spjun2411.html (accessed 5 May 2012).
13
See D. Krehmeyer, M. Orsagh and K.N. Schacht, Breaking the Short-Term Cycle:
Discussion and Recommendations on How Corporate Leaders, Asset Managers, Investors, and
Analysts Can Refocus on Long-Term Value (2006), CFA Institute, quoting a survey, published in
J.R. Graham, C.R. Harvey and S. Rajgopal, ‘The Economic Implications of Corporate Financial
Reporting’ (2005) 40 Journal of Accounting and Economics 3, of more than 400 financial
executives, in which 80 per cent of the respondents indicated that they would decrease
discretionary spending on such areas as research and development, advertising, maintenance and
hiring in order to meet short-term earnings targets and more than 50 per cent stated they would
delay new projects, even if it meant sacrifices in value creation.
14
F.B. Cross and R.A. Prentice, supra n 9, at 5.
15
The Kay Review of the UK Equity Markets and Long Term Decision Making: Interim Report
(February 2012) BIS, UK: available at www.bis.gov.uk/kayreview (accessed 6 May 2012).
16
See C. Nakajima as quoted in M. Cauchi, ‘EU Banks, Insurers Brace for Contentious
Annual Meetings’ Wall Street Journal, 6 May 2012, available at http://www.wsj.com/articles/
SB10001424052702304451104577387891779994890 (accessed 14 June 2015).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
The counterbalancing voices against the singular focus on shareholder primacy have
often been dismissed as lacking in substance to be viable alternatives to the shareholder
primacy model.17 They may be further muted as a result of the continuing economic
woes in Japan and the deepening Eurozone crisis impacting negatively on the
economies of those countries that represent the Rhenish model of corporate govern-
ance, such as Germany, France, Italy and Spain, where more attention is given to the
interests of a wider group of stakeholders and more focus is on sales, market share,
headcount and long-term ownership.18
It has been argued that there is politically and economically motivated opposition to
moving away from shareholder centric corporate governance in the countries where
shareholder primacy prevails, due to the focus on the company as an economic entity,
the function of law as enhancer of trade freedom, the political policy to promote
competition and the market for corporate control facilitated by hostile takeovers.19 As
has been mentioned earlier, the support for shareholder primacy has been further
reinforced by law and economics literature, following the logic that good corporate
governance enhancing shareholder value will lead to thriving financial markets which
in turn will ensure economic growth,20 a view which has been very much endorsed, at
least in the past, by inter-governmental organizations, such as the World Bank.21
ONGOING REVIEWS
Post-financial crisis, there have been signs of ‘AGM revolt’ where shareholders voted
against executive remuneration that attracted much media attention. And the UK
government in the Queen’s Speech in May 2012 included a proposal for legislation to
make shareholders’ votes in regard to remuneration binding.22 Shareholders remain a
focus of attention in the current debate on corporate governance reform, and given not
only the media and political attention but the persistence of academic research focused
on shareholder wealth maximization, this trend is set to continue. In the current
economic climate, there appears to be no sign that the debate will shift its attention to
more fundamental questions, such as in whose interests should a company be run23 and
17
See, for example, H. Hansmann and R. Kraakman, supra n 8, at 36–42.
18
M. Blowfield and A. Murray, Corporate Responsibility: A Critical Introduction (2008)
Oxford University Press: Oxford, at 19.
19
A. Keay, supra n 5, at 52.
20
See, for example, F.B. Cross and R.A. Prentice, supra n 9, at 7.
21
See, for example, A. Demirguc-Kunt and V. Maksimovic, ‘Law, Finance and Firm
Growth’ (1998) 53 Journal of Finance 2107.
22
Department for Business and Innovation, Queen’s Speech 2012 (9 May 2012) available at
http://www.bis.gov.uk/news/topstories/2012/May/queens-speech-2012 (accessed 10 May 2012).
23
See, for example, C. Nakajima and W. Harry, ‘Is the Desire to Embed Corporate Social
Responsibility within Organizations at a Crossroads?’(2012) 42(3) International Studies of
Management and Organization 3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
what is a company for?24 And notwithstanding the criticism of ‘audit capture’ or the
‘financialization’ of corporate governance, the dearth of literature addressing these
fundamental issues post-financial crisis, and the lack of proper soul searching in regard
to, for example, UK company law and governance, continue. Rare exceptions can be
found in a report, published by the Council of the Association of Chartered Certified
Accountants (ACCA) in 2011,25 in which it recommends ‘a re-examination of central
aspects of company law in the UK’, on the basis that the findings from the extensive
literature review and empirical work suggest that the question ‘in whose interests
should companies be run?’ was not seriously examined as part of the Company Law
Review (CLR).26 It argues that Maximising Shareholder Value (MSV)
The report raised a further four issues as meriting re-examination in the future review
of UK company law. First, the need for greater corporate accountability and for
reconsidering the introduction of the Operating and Financial Review. Second, a
recommendation made by the CLR, but not adopted by the government, for a standing
body keeping company law under review. The third and fourth issues were ‘linked to
potentially perverse consequences of maximising shareholder value’, namely the
regulations governing the market for corporate control in the UK, and the level of
directors’ remuneration.28
Another initiative in soul searching has been lead by the Institute of Chartered
Accountants for England and Wales (ICAEW), in the form of Dialogue in Corporate
Governance: New Challenges, which launched in April 2013 and comprises five
fundamental questions in regard to corporate governance in the UK,29 the first question
being, ‘What should companies be responsible for?’ The primary concern of the first
question, as the ICAEW states,
is the responsibilities of companies rather than the mutual responsibilities between com-
panies, boards and shareholders that are defined for example in the UK Companies Act 2006
and the UK Corporate Governance and Stewardship Codes. The range of companies
24
C. Handy, ‘What is a Company For?’ Michael Shanks Memorial Lecture (5 December
1990), available at http://www.growthinternational.com/resources/Charles+Handy+1990.pdf
(accessed 10 May 2012).
25
D. Collison, S. Cross, J. Ferguson, D. Power and L. Stevenson, supra n 5.
26
Ibid., at 6.
27
Ibid.
28
Ibid.
29
ICAEW, Dialogue in Corporate Governance: New Challenges, available at http://www.
icaew.com/~/media/Files/Technical/Corporate-governance/dialogue-in-corporate-governance/
icaew-tl-q1-web.pdf (accessed 31 May 2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
considered here is broader than is usual in corporate governance discussions which focus on
publicly listed companies.30
My long-term worry is that property prevails over community. As the world shrinks and
companies aim for global reach, property will inexorably annex communities … the
Anglo-American system which, I have argued, works less well for everyone than the German
or Japanese models, may prevail, driving the whole world into a fever of short-term
speculation, forcing companies to become asset traders rather than wealth producers …
The ICAEW initiative may also immediately provoke the recital of Professor Milton
Friedman’s oft-quoted statement, which has been mentioned earlier.
The ICAEW paper identifies four fundamental responsibilities owed by companies,
namely achieving a business purpose; behaving in a socially acceptable way; meeting
legal and regulatory requirements; and stating how responsibilities are met. The
ICAEW, while accepting that compared to ‘a responsibility to serve shareholders
alone’, addressing multiple responsibilities ‘makes life too complicated’, the primary
reason for which the CLR decided against the pluralist approach and in favour of
shareholder primacy (albeit with the additional introduction of ‘enlightened shareholder
value’), asserts that ‘Life, whether for individuals or organisations, is complicated
because it involves accepting the need to balance different responsibilities.’
Indeed, the present author concurs with the ICAEW’s view and would ask why
simplicity should be a matter of priority. We live in a complex world of globalization
and interdependence. While there is outrage against spiralling executive pay, those who
think they deserve astronomical sums surely should, at least, be expected to justify their
enormous pay packages on the basis that they are an extremely rare breed of
extraordinarily gifted individuals, who can deal with complex issues and prioritize and
balance different interests that are both internal and external to the organizations which
they are charged to lead.
Furthermore, it is respectfully submitted that the current tendency to keep ‘corporate
governance’ and ‘corporate (social) responsibility’ as distinctly separate subjects to be
studied independently requires careful review.32 This may well suit advocates of agency
theory who wish to focus solely on the relationship between management and
shareholders, dismissing relationships with and interests of other stakeholders as
outside the remit of corporate governance and an unnecessary distraction to managerial
focus and therefore to their own research agenda. On the other hand, advocates of
Corporate Social Responsibility (CSR) or Corporate Responsibility (CR), particularly
those who see this area as purely voluntary, find it of crucial importance to keep
30
Ibid., at 3.
31
C. Handy, supra n 24.
32
For further discussion, see C. Nakajima and W. Harry, supra n 23.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
corporate governance debate outside their remit of discussion and consideration. While
a certain degree of categorization may be useful when it comes to academic course
delivery and therefore the sale of appropriately titled textbooks, it may serve as
unnecessary hindrance to ascertaining what companies (and their management) need to
be taking into consideration in running their businesses.
Looking at issues that company management now faces from the perspective of those
who are concerned with legal risks and their implications confronting contemporary
business, the debate in regard to whether shareholder primacy or stakeholder theory
should prevail in corporate governance, or whether C(S)R should remain in the realm
of voluntary action, seems a matter of relative insignificance nowadays. Indeed, even if
we confined our argument to the initial definition that ‘corporate governance is about
the system by which companies are directed and controlled’,33 which formed the basis
of the current UK Corporate Governance Code, it would be tolerably clear that such a
system could not be concerned solely with shareholder interests, let alone shareholder
value maximization. Furthermore, one only needs to look at the areas listed as those
covered by CSR standards, such as natural environment, labour, money laundering,
bribery and corruption, and human rights,34 to realize that these areas are highly
regulated and therefore no longer ‘voluntary’, particularly if the management does not
wish the company to engage in illegal activities, to be subject to regulatory sanctions.
PARADIGM SHIFT
Those who wish to continue to pursue CSR purely as voluntary often refer to the
pronouncement made by the European Commission in 2001 that CSR is ‘a concept
whereby companies integrate social and environmental concerns in their business
operations and in their interaction with their stakeholders on a voluntary basis’.35 This
is now superseded by the Commission’s new definition, which states it as ‘the
responsibility of enterprises for their impacts on society’.36 The Commission goes on to
emphasize,
Respect for applicable legislation, and for collective agreements between social partners, is a
prerequisite for meeting that responsibility. To fully meet their corporate social responsibility,
enterprises should have in place a process to integrate social, environmental, ethical, human
rights and consumer concerns into their business operations and core strategy in close
collaboration with their stakeholders …37
33
Committee on the Financial Aspects of Corporate Governance (Cadbury Committee),
Report of the Committee on the Financial Aspects of Corporate Governance (1992) London, at
15.
34
See generally, for example, M. Blowfield and A. Murray, Corporate Responsibility (2011,
2nd edn) Oxford University Press, Oxford.
35
European Commission, Green Paper COM (2001) 366, at 6.
36
European Commission, A renewed EU strategy 2011–14 for Corporate Social Respons-
ibility COM (2011) 681 final, at 6.
37
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
This resonates with the observation made by a leading scholar in corporate governance,
stating that ‘Bridging the great divide between corporate governance and corporate
social and environmental responsibility is the next great challenge for business.’38 And
‘that only a fundamental redesign of corporate forms, objectives and value measures
can fully meet the realities of responsibility’.39
This brings us back to the aforementioned Professor Handy’s lecture in 1990, in
which he challenged the existing corporate forms, objective and performance metrics
and advocated an overhaul that allows companies to be run in a sustainable manner so
as not to ‘endanger our children’s future’.40
And, as for the ICAEW initiative, it also casts the net wider and distinguishes it from
‘conventional corporate governance thinking which tends to view companies in terms
of their responsibilities to shareholders and investors’.41 It supports its approach of
setting a broad range of corporate responsibilities on the basis that this would better
address various challenges to corporate behaviour and culture in recent years, such as
in regard to executive remuneration, short-termism, distrust of the listed company
model, aggressive tax avoidance, lack of diversity and legislative delays.42 The ICAEW
also anticipates challenges to their proposal on the basis that it will make life too
complicated (as mentioned above), companies will not be able to fill expectation gaps
created by irreconcilable responsibilities owed to different parties forcing them to make
difficult decisions, it deviates from the enlightened shareholder value enshrined under
the Companies Act 2006, and intermediaries focused on short-term financial gains will
value companies pursuing responsibilities at the expense of financial gains.43
Those concerns notwithstanding, the ICAEW asserts that taking on a broad range of
responsibilities will enable a company to remain ‘agile in adapting to the environments
where it does business and should be better at anticipating and even eliminating
potential expectation gaps’ and to benefit from ‘a solid foundation for building and
maintaining trust’.44 The present author fully supports this approach which challenges a
number of rational myths, discussed earlier, such as shareholder primacy.45
Another post-financial crisis initiative that is worthy of note is a report presenting a
case for the establishment of a Standing Commission on Responsible Capitalism,
addressing the crisis in trust between society, business and government. It has been led
by a group of individuals drawn from different professions, political and non-political,
industry groups and academy, concerned for the future of the current economic and
social systems. It is, therefore, not representing solely the interests of the investor
community and the professions which serve it. In so many debates of this nature, it has
been asserted that everyone relies on the good performance of capital markets for
financial stability, particularly given that almost everyone depends on their pensions
38
T. Clarke, supra n 3, at 267.
39
Ibid.
40
C. Handy, supra n 24, at 7.
41
ICAEW, supra n 29, at 5.
42
Ibid., at 4–5.
43
Ibid., at 5–6.
44
Ibid., at 6.
45
See also C. Nakajima, ‘Shareholder Primacy Revisited’ (2012) 33 The Company Lawyer
193.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
46
F.B. Cross and R.A. Prentice, supra n 9, at 7.
47
See J. Elkington, Cannibals with Forks: The Triple Bottom Line of the 21st Century
Business (1998) New Society, Stony Creek, CT.
48
T. Dyllick and K. Hockerts, ‘Beyond the Business Case for Corporate Sustainability’
(2002) 11(2) Business Strategy and the Environment 130–141 and R. Steurer, M.E. Langer A.
Konrad and A. Martinuzzi, ‘Corporations, Stakeholders and Sustainable Development: A
Theoretical Exploration of Business–Society Relations’ (2005) 61(3) Journal of Business Ethics
263–281.
49
K. Buhmann ‘Corporate Social Responsibility: What Role for Law? Some Aspects of Law
and CSR’ (2004) 6(2) Corporate Governance 188–202.
50
C. Parker, J. Braithwaite, C. Scott and N. Lacey, Regulating Law (2004) Oxford
University Press, Oxford.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
corporations ‘want to do what they should do’.51 These relatively recent developments
call for further theory building within the field of CSR by integrating previous strategy-
and governance-focused research with elements of institutional theory that are related
to policy, law and regulation. The legal foundations of CSR may create institutional
constraints on managerial discretion in this field and shift emphasis from strategic
choices to compliance elements. However, by legally internalizing CSR, management
may convert these institutional constraints to facilitators of corporate goals that are
aligned with the interests of a wider community of stakeholders and consideration for
environmental and longer term corporate interests. The pursuit of goals may previously
have been constrained by a narrower perspective on shareholder primacy.
Currently, differences between private commerce and government interests are
non-existent in certain countries. Therefore, ‘pretending that corporate governance will
somehow be good enough to protect the interest of developed world investors is, in
some cases, laughable’.52
What is important for twenty-first-century business is to respond to the global move
toward the control of misbehaving organizations by implementing ‘legally embedded’
CSR policy and practice.
In the past few decades, research on corporate governance has been dominated by
agency theory,53 the central premise of which has been that managers as agents of
shareholders as their principals can engage in self-serving behaviour that may be
detrimental to shareholders’ wealth maximization because of the difference in access to
firm specific information. It is, therefore, primarily concerned with efficiency outcomes
of various corporate governance mechanisms from the perspective of shareholders, who
invest resources and seek maximum return on their investment. Institutional theory has
contextualized the universalistic agency perspective by studying corporate governance
as a system of interdependent elements supported or undermined by various other
institutions,54 and some argue for a more holistic, institutionally embedded governance
framework to analyse organizational outcomes of various governance practices.55
Although the development of institutional perspective in corporate governance
research has complemented the more universalistic agency perspective by recognizing
the differences in national institutions from country to country that may affect
corporate governance outcomes, we should not be too quick to condemn countries that
lack national institutions that are complementary to efficient corporate governance
outcomes. Countries with national institutions that are complementary to efficient
51
P. Selznick, The Communitarian Persuasion (2002) Woodrow Wilson Center Press,
Washington, DC, at 102.
52
K.D. King, Losing Control (2011) Yale University Press, London, at 89.
53
See E.F. Fama, ‘Agency Problems and the Theory of the Firm’, (1980) 88(2) Journal of
Political Economy 288–307; E.F. Fama and M.C. Jensen, ‘Separation of Ownership and Control’
(1983) 26(2) Journal of Law and Economics 301–325; and M.C. Jensen and W.H. Meckling,
‘Theory of the Firm: Managerial Behavior, Agency Costs, and Ownership Structure’ (1976) 3(4)
Journal of Financial Economics 305–360.
54
R.A. Aguilera, I. Filatotchev, H. Gospel and G. Jackson, ‘An Organizational Approach to
Comparative Corporate Governance: Costs, Contingencies, and Complementarities’ (2008) 19(3)
Organization Science 475–492.
55
I. Filatotchev and C. Nakajima, supra n 7.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 10 / Date: 16/7
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
corporate governance outcomes may not be so forthcoming in joining forces with the
rest of the world. For example, in global environmental protection, for domestic
economic or political reasons, countries may well turn a blind eye to other countries
and corporations that are ‘misbehaving’, as it is not in their national interests to
criticize these ‘rogue’ countries and organizations. The institutional analysis of cor-
porate governance framework shows that legal institutions, at least in Europe and North
America, uphold shareholder primacy. At the same time, the international and regional
moves to push sustainability and CSR agendas to the fore have resulted in a plethora of
national laws and judicial decisions that encourage, and in many cases require,
corporations to act in the interests of a wider community of stakeholders and to
consider their longer term interests and the environmental and social impact of their
actions.56
Given the ongoing crisis in the Eurozone and political instability in many regions in
the world, dominance of shareholder value maximization in the mainstream corporate
governance debate is likely to remain ‘unquestioned’ for a while to come, but we have
to recognize that if it is unquestioned, it may be to the detriment of wider stakeholder
interests and at the peril of future corporate malfeasance, failures and crises.57 In the
meantime, some scholars are pushing for a more joined-up approach to corporate
governance and responsibility.58
56
See, for example, s 172, Companies Act 2006 of the UK.
57
For further discussion on corporate accountability and responsibility post-financial crisis,
see C. Nakajima and W. Harry, supra n 23.
58
See, for example, I. Filatotchev and C. Nakajima, ‘Corporate Governance, Responsible
Managerial Behavior, Corporate Social Responsibility: Organizational Efficiency versus Organ-
izational Legitimacy’ (2014) 28(3) Academy of Management Perspectives 289.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 13 /Pg. Position: 11 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION1
The significant growth of Indonesian financial institutions, both in banking and
non-banking establishments, requires effective supervision and monitoring from the
Indonesian government, as an external controlling body, in order to prevent financial
crime. However, given the amount of corporate crime in Indonesia, it appears this body
has shortfalls. Indonesia is one of the Asian Pacific’s most vibrant democracies, which
has maintained political stability and emerged as a confident middle-income country. It
had a population of 249.9 million people, GDP US$ 868.3 billion and GDP growth of
5.8 per cent in 2013. Based on the Indonesia Financial Services Authority report of
May 2014, 120 commercial banks and 1,635 rural banks in Indonesia handled total
assets of IDR 5,008,095 billion and IDR 79,159 billion respectively.2 With such a
wealth of public funds involved, it is clear why supervision and monitoring plays an
important part in creating good financial institutions.
As a result of illegal activities and financial crimes within corporations, internal
controls should be encouraged through Good Corporate Governance. Good Corporate
Governance and Corporate Social Responsibility should be developed to build business
ethics inside corporations. The Coordinating Minister for Economic Affairs of the
Republic of Indonesia in 2006 stated that Good Corporate Governance is an important
pillar of a market economy as it relates to the investors’ confidence both in the
companies and in the overall business environment. Implementation of Good Corporate
Governance encourages fair competition and a good business climate, leading to
sustainable economic growth and stability.3
The 1997–1998 Asian Financial Crisis was a turning point in realizing the necessity
for, and creating, corporate governance reforms in many parts of Asia, including
Indonesia. Countries affected by the financial crisis introduced multi-pronged initiatives
to strengthen their corporate governance regulatory and institutional frameworks. While
this was key in ensuring the success of these early efforts, which were mainly focused
on strengthening the existing regulatory infrastructure, institutions and enforcement, it
1
This chapter is based on a presentation that was delivered at the 32nd International
Symposium on Economic Crime, Jesus College, University of Cambridge, UK.
2
http://www.ojk.go.id/en/indonesia-banking-statistics-may-2014 (accessed 15 August 2014).
3
National Committee on Governance (2006), Indonesia’s Code of Good Corporate
Governance, www.ecgi.org/codes/documents/indonesia_cg_2006_en.pdf, pp. i (accessed 13
August 2014).
166
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
resulted in the continued expectation that the government and its institutions should be
primarily responsible for ensuring Good Corporate Governance. Indonesia has focused
on nurturing a culture of corporate governance through, among others things, promot-
ing shareholder activism, strengthening boards, emphasizing the role of gatekeepers
and agents of good repute, encouraging institutional shareholders to take a leadership
role and promoting independent and active financial journalism. The financial crisis
triggered an awareness for the need to practise Good Corporate Governance. Since
then, Good Corporate Governance has been continuously conducted by the regulator,
companies and the public. In the past ten years, the reforms have also emphasized that
financial establishments, such as banking and non-banking institutions, state-owned
enterprises and public companies, have a key role in economic development.
The Indonesian government has become more aware of the necessity for Good
Corporate Governance to be successfully implemented and the requirement for public
support and the existence of good public governance. Consequently, in November
2004, the government established the National Committee on Governance (NCG) by
Decree of the Coordinating Minister for Economic Affairs Number: KEP/49/M.EKON/
11/2004, consisting of a Public Sub-Committee and Corporate Sub-Committee. The
Decree on the establishment of the NCG replaces the Decree of the Coordinating
Minister for Economy, Finance and Industry Number: 10/M.EKUIN/08/1999 and the
Decree of the Coordinating Minister for Economy, Finance and Industry Number:
KEP/31/M.EKUIN/08/2000 regarding the establishment of the National Code for
Corporate Governance.
The principles of Good Corporate Governance conducted by corporations in Indone-
sia emerged alongside Corporate Social Responsibility. But there were several issues
with Good Corporate Governance. For example, it only applied to occasional activities
instead of long-term sustainable action. Corporate Social Responsibility in several
corporations in Indonesia was still based on charity and philanthropy. In fact the reality
was that corporations failed to understand what Corporate Social Responsibility was
attempting to achieve, instead viewing it only as a legal obligation.
Despite adopting the correct philosophy in Corporate Social Responsibility, com-
panies generally view Corporate Social Responsibility not as mandatory, but only as a
legal obligation as stipulated in Indonesian Law No.40/2007 concerning Limited
Liability Companies. Moreover, the purpose is to encourage companies to perform
corporate social and environmental responsibilities; company law mandates companies
whose businesses are related to natural resources to initiate programmes related to
Corporate Social Responsibility and report the programmes in the annual report. Efforts
to improve Corporate Social Responsibility practice also involve the public, including
Non-Governmental Organizations (NGOs) and the media. The difficulty is that
Corporate Social Responsibility is regarded as a waste of money and as shifting the
government’s obligation on to others. This chapter explores and analyses the regu-
lations on Good Corporate Governance and Corporate Social Responsibility in Indone-
sia and the important role both have in preventing financial crime.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
4
Nordberg, Donald (2011), Corporate Governance-Principles and Issues, SAGE Publica-
tions, London, p. 25.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
5
National Committee on Governance, op.cit., p. 9.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
1. The regulatory, supervisory and enforcement authorities develop laws and regu-
lations that will promote the creation of a healthy, efficient and transparent
business climate, implement and maintain it, and support it with a consistent law
enforcement.
2. The business sectors as market participants implement Good Corporate Govern-
ance as the foundation in conducting business.
3. The public as users of the products and services of the business sectors and as the
party impacted by the existence of a company demonstrates its concern and
exercises an objective and responsible social control.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
corporate governance developments in Asia global relevance.6 This will give strong
encouragement to implement Good Corporate Governance and Corporate Social
Responsibility in banking institutions.
6
OECD (2011), Reform Priorities in Asia Taking Corporate Governance to a Higher Level,
http://www.oecd.org/daf/ca/49801431.pdf, p. 9 (accessed 4 May 2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
transactions and client relationships they manage. Furthermore, the fact that these
crimes were carried out by international perpetrators emphasized the importance of
international co-operation in combating crime. Good Corporate Governance and
Corporate Social Responsibility could be a pathway to preventing, or at least reducing,
financial crime.
The primary aim of corporations has been to make profits, and perhaps for this
reason corporations have not carefully examined their values. This mindset must be
changed through business ethics and Good Corporate Governance to improve the
integrity of corporations and encourage strong commitment, in the best economic
interests of the nation. Furthermore, in banking institutions, it could be used as a
non-penal policy and crime prevention strategy,7 especially taking into consideration
that commercial banks are the largest, the most diverse, and the most important
financial intermediary in the economy.8 Good Corporate Governance and Corporate
Social Responsibility is also very important in the globalization era. Louise Shelley, as
quoted by Dawn L. Rothe and David O. Friedrichs, asserts that globalization has
increased the opportunities for criminals, and criminals have been among the major
beneficiaries of globalization.9 Therefore Good Corporate Governance and Corporate
Social Responsibility have an important role within corporate activities to prevent
financial crime. Moreover, Good Corporate Governance and Corporate Social Respons-
ibility within corporate activities have a great impact in the prevention of financial
crime, such as corruption and state capture. In this form of corruption, the private
sector ‘captures’ the state legislative, executive and judicial apparatus for its own
purposes.10
Benn and Dunphy, and others, as quoted by Donald Nordberg, mention that there is
another range of issues that has increasingly come to be seen as forming a new agenda
in corporate governance: how corporations relate to their broader society. Whether we
call it Corporate Social Responsibility, sustainability, ethics or just corporate respons-
ibility without the ‘social’, this stream of thinking involves a consideration of how
boards and the top management teams they employ relate to their employees, suppliers,
customers, and even their competitors and those who might seek to compete against
them.11 It seeks also to take into account how the corporation relates to the community
in which it operates, the people who live near the factories and office buildings the
corporation operates, local goverments, and even national governments and supra-
national organizations. In addition, it seeks to examine how and even whether
corporations have a responsibility to NGOs, even those that are not particularly part of
a local community in which the global corporation happens to work. It seeks to identify
the role of the corporation and its board in preserving the environment in which we all
7
Arief, Barda Nawawi (2010), Bunga Rampai Kebijakan Hukum Pidana – Perkembangan
Penyusunan Konsep KUHP Baru, Kencana, Jakarta, p. 21.
8
Kidwell, David S. and Richard L. Peterson (1990), Financial Institutions, Markets, and
Money, fourth edition, The Dryden Press, p. 42.
9
Rothe, Dawn L. and David O. Friedrichs (2015), Crimes of Globalization, New Directions
in Critical Criminology, Routledge, London, pp. 28–29.
10
Brooks, Graham et. al. (2013), Preventing Corruption Investigation, Enforcement and
Governance, Palgrave Macmillan, Basingstoke, UK, p. 123.
11
Nordberg, Donald, op. cit., p. 6.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
live, a larger and more prominent part of the agenda as the consensus of scientific
opinion has built around the impact of global warming and the role corporations play in
it.12
Those are the functions of Corporate Social Responsibility. But the strengths of
Corporate Social Responsibility will not work properly because there remain some
weaknesses in its implementation: (1) the lack of organizational culture to support
Corporate Social Responsibility; (2) Corporate Social Responsibility only being seen as
a company’s charity; (3) Corporate Social Responsibility used only to conceal the
illegal behaviour of financial institutions; (4) Corporate Social Responsibility not
purely conducted by corporate conscience or an ethics-based approach but rather as just
a legal obligation; (5) corporations applying Corporate Social Responsibility only for
the short term and not in a long-term and sustainability programme. These weaknesses
could reduce the public and investor trust in business activities, particularly in banking
institutions as an agent of trust. Indonesian and international investors are eager to
invest in Indonesia, and approvals in investments show a significant growth in number.
Government institutions which have an interest in handling investment activities
probably would like to reform and improve public services.
Currently,the point of focus of efforts in the enforcement of good governance is on
the corporate sector. Viewing this holistically, the corporate sector does not stand alone
because it is certainly linked to the public sector, starting with the government as
regulator and as shareholder in state enterprises, as well as other elements such as
legislators, prosecutors and investigators along with court proceedings and so forth. It is
futile attempting to enforce Good Corporate Governance solely in the corporate sector
without applying the same rules to the public sector, including taxes, regional
government, customs and excise, permit regulators and so forth.
The key to implementation of Good Corporate Governance and Corporate Social
Responsibility in banking institutions is based on:
1. the strong commitment and support from all the parties such as the regulator/
supervisory bodies, the corporation and society in encouraging Good Corporate
Governance and Corporate Social Responsibility in all business activities;
2. the strong commitment of the company’s organs such as the Board of Directors,
Board of Commissioners, General Meeting of Shareholders and all the employees
in conducting Good Corporate Governance in a consistent, systematic manner in
sustainability programmes;
3. the compliance of corporations with all the existing government regulations as
well as fostering business ethics among others;
4. the implementation of Good Corporate Governance as a basic philosophy of
corporate culture;
5. a good reward system for corporations implementing Good Corporate Govern-
ance and Corporate Social Responsibility. In contrast, an effective punishment
system should be applied for those who act inappropriately.
12
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The government plays an important supporting role by issuing and enforcing adequate
regulation on, for instance, company registration, disclosure of financial company data
and rules on the responsibilities of commissioners and directors. The company,
however, has the prime responsibility for implementing a system of Good Corporate
Governance. The company should recognize the importance that Good Corporate
Governance is in the interests of its shareholders, its financiers and its employees and,
therefore, the company itself. Companies should anticipate stronger enforcement of
existing laws and regulations, the introduction of new regulations and increasingly
strong public scrutiny over their actions.
The Indonesian government has demonstrated efforts to improve Good Corporate
Governance as well as Corporate Social Responsibility in every aspect of the business
sector, particularly within banking institutions. The NCG is recommending, initiating
and monitoring improvements in corporate governance in Indonesia. It has indicated
ten key areas in which reforms are necessary, and it has drawn up a Model Code of
Corporate Governance that companies can use in implementing this. In addition, an
initiative from private sectors through several business and professional associations
has formed the Forum for Corporate Governance in Indonesia.
By implementing Good Corporate Governance and Corporate Social Responsibility
principles, as stipulated in several Indonesian regulations, the NCG seeks to protect the
integrity and stability of financial and business institutions. The reality, however, is that
the participation of financial institutions in Indonesia is limited and requires fostering,
commensurate with the important role of banking institutions. Banking could have been
chosen as a sector of equal or greater importance, which has played a leading part in
recent developments, and even the inclusion of both would leave out a number of other
interesting and important areas.13 Felix Lessambo states that a bank cannot properly
monitor its operational, counterparty, liquidity and credit risks without an adequate and
efficient corporate governance mechanism.14 Moreover, Lessambo clearly stated that
corporate governance for banking organizations is of great importance to the inter-
national financial system.15
Lack of Good Corporate Governance and Corporate Social Responsibility will drive
corporations into performing illegal acts such as corruption. Geoff Dean explained that
corruption is a strategy that ‘buys’ people like government officials and is more useful
than capital in some circumstances because it provides influence and leverage that
money may not be able to buy.16
The principles of Good Corporate Governance and Corporate Social Responsibility
should be implemented in every aspect of the organization, from the directors and
commissioners to the employees of financial institutions. Initiatives to promote a
culture of Good Corporate Governance, where boards and shareholders expand their
13
Clarke, Michael (1990), Business Crime, Its Nature and Control, St. Martin’s Press, New
York, p. 149.
14
Lessambo, Felix (2013), The International Banking System, Capital Adequacy, Core
Businesses and Risk Management, Palgrave Macmillan, Basingstoke, UK, p. 222
15
Ibid., p. 224
16
Dean, Geoff et. al.(2010), Organized Crime: Policing Illegal Business Entrepreneurialism,
Oxford University Press, New York, p. 9.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 11 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
focus beyond business outcomes and ensure that businesses are conducted in a manner
which promotes sustainability, are important elements in preventing financial crime in
banking institutions. Corporate governance involves decision making, accountability
and monitoring.17 Building Good Corporate Governance and Corporate Social
Responsibility is also the key to avoiding any criminal activities which could cause
corporate criminal responsibility and criminalization. Furthermore, it should also be
considered that Good Corporate Governance and Corporate Social Responsibility is a
pathway to preventing financial crime. Encouraging Good Corporate Governance and
Corporate Social Responsibility in every aspect of the business sector, particularly in
banking institutions, is also a way to achieve the strengthening of economic competi-
tiveness.
CONCLUSION
Good Corporate Governance and Corporate Social Responsibility should be developed
to build business ethics inside corporations. Good Corporate Governance is an
important pillar of market economy as it relates to the investors’ confidence both in the
companies and in the overall business environment. Implementation of Good Corporate
Governance encourages fair competition and a good business climate leading to
sustainable economic growth and stability.
According to Indonesian regulations, companies must have a purpose and objective;
business activities should not conflict with the provisions of legislative regulations,
public order and/or morality. In this context, business activities conducted by any legal
entity should consider the regulations, public order and morality. The purpose of doing
business should not be for profit alone, but should also have ethics in mind.
Principles of Good Corporate Governance should be adhered to when the company’s
activities are involved. These include transparency, accountability, responsibility, inde-
pendence and fairness. Concerning the principles of Good Corporate Governance as
mentioned before, Corporate Social Responsibility should be reflected in corporate
activities as should implementing the five principles. So Corporate Social Responsibil-
ity should be conducted in every financial institution.
These principles are necessary to maintain a company’s sustainability and will, in
turn, increase public trust. Every financial institution, both banking and non-banking,
must ensure that the principles of Good Corporate Governance are applied to all
business activities. Considering that Good Corporate Governance and Corporate Social
Responsibility principles seek to protect the integrity and stability of financial and
business institutions, as well as prevent financial crime, the involvement of financial
institutions in Indonesia (which is quite low) should be fostered. Encouraging Good
Corporate Governance and Corporate Social Responsibility in every aspect of
the business sector, particularly in banking institutions, will strengthen economic
competitiveness.
17
Pallissery, Fincy (2012), ‘True and Fair Financial Reporting: A Tool for Better Corporate
Governance’, Journal of Financial Crime, Volume 19 Number 4, p. 336.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 14 /Pg. Position: 12 / Date: 16/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
In the United States (U.S.), directors of public corporations, pursuant to state law,
possess wide latitude when making business decisions.1 The business judgment rule, a
state common law doctrine, protects directors from liability for poor business decisions
provided the directors acted in good faith in an attempt to act in the best interest of the
corporation, without conflicts of interest.2 A claim, however, involving a conflict of
interest or other breach of the duty of loyalty, is afforded no such protection.3 The duty
of loyalty requires that “the best interest of the corporation and its shareholders takes
precedence over any interest possessed by a director … and not shared by the
stockholders generally.”4 Similarly, courts in the United Kingdom (U.K.) describe the
duty of loyalty as a “duty to act in what [the director] in good faith considers to be
the best interests of his company.”5 The U.K. recently codified much of its common
law rules on the duty of loyalty in its 2006 Companies Act.6
This chapter traces the duty of loyalty in the U.S. and in the U.K. from Roman times
to today. As demonstrated below, although the duty has evolved, the obligations derived
from the law of trusts are still important today.
* The author wishes to gratefully acknowledge the research assistance of Jeff Koelzer, J.D.
and Abby Barkwell, J.D., University of Michigan Law School.
1
FLETCHER CYCLOPEDIA OF THE LAW OF CORPORATIONS § 1036 (2014).
2
Aronson v. Lewis, 473 A.2d 805, 812 (Del. 1984).
3
Directors’ broad decision-making power comes from the business judgment rule. The
business judgment rule presumes that directors act on an informed basis and in the best interests
of the company, therefore courts should second-guess directors’ decisions in only the most
extreme circumstances. Aronson v. Lewis, 473 A.2d 805, 812 (Del. 1984). “The directors’ room
rather than the courtroom is the appropriate forum for thrashing out purely business questions
which will have an impact on profits, market prices, competitive situations, or tax advantages.”
Kamin v. American Express Co., 383 N.Y.S.2d 807, 810–811 (N.Y. 1976). Courts will rebut the
presumption of the business judgment rule, and review the actions of directors, if directors
violate one of the triad of fiduciary duties: good faith, loyalty, or due care. See Cede & Co. v.
Technicolor, Inc., 634 A.2d 345, 361 (Del. 1993).
4
Cede & Co. v. Technicolor, Inc., 634 A.2d 345, 361 (Del. 1993).
5
Item Software Ltd. v. Fassihi, 2 B.C.L.C. 91 (2005).
6
See Companies Act, 2006, c. 2, §§ 175–177 (U.K.).
178
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 1 / Date: 16/7
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Roman inheritance law gives our first example of an institution resembling a trust: the
fideicommissio. In Ancient Rome, certain classes of people were not legally permitted
to inherit land, such as unmarried adults, foreigners, and criminals.7 In order to pass a
legacy on to an incapacitated beneficiary, a testator would give the estate to a legal
beneficiary who then had a moral obligation to pass the estate on to the desired
incapacitated beneficiary.8 Because the legal beneficiary’s obligation to deliver the
estate to the desired beneficiary was not a legal one but a moral one, there was
necessarily a strong trust relation between the testator and his chosen legal beneficiary.
Later, the Roman fideicommissio was adopted by the Church as a means of
accommodating certain Christians, who, for one reason or another at various times,
were prohibited from owning property.9 By using the fideicommissio, which later
became the utilitas ecclesia, and then the use, those whose dedication to God precluded
property ownership were able to use property, nonetheless.10 Moreover, the Roman idea
of trust fit well with the Christian concept of Christ being the owner and beneficiary of
all property.11 Ecclesiastical courts and later courts of equity began to enforce the use
during the Middle Ages.12
In the 16th century, the use became a popular means of avoiding taxes. At the time,
the vast majority of property tax was collected upon inheritance. In order to avoid these
inheritance incidents, landowners would grant legal title to their land to several straw
people, who would simultaneously grant the original owner a use in the land. This way,
when one straw person died, there were no inheritance incidents; the original owner
7
Mary Szto, Limited Liability Company Morality: Fiduciary Duties in Historical Context,
23 Q.L.R. 61, 89 (2004) (Citing BARRY NICHOLAS, AN INTRODUCTION TO ROMAN LAW 267–268
(Oxford, Clarendon Press, 1962); DAVID JOHNSTON, ROMAN LAW IN CONTEXT 48 (Cambridge,
Cambridge University Press, 1999); A. BRIDE, FIDEICOMMISSIO, CATHOLICISME, IV: 1259)
(“Examples of persons who, as a matter of law, lacked capacity to receive legacies or
inheritances were unmarried adults, foreigners, criminals, and others barred by statute”).
8
Id. (“The fideicommissio, or trust, allowed Roman testators to devise their legacies to a
beneficiary who was incapacitated to receive a testament. … This beneficiary then had a moral
obligation to pass the legacy onto the incapacitated beneficiary”).
9
Id. at 90 (“From time to time Christian persons or entities were not allowed to own
property. The church used fidei commissa and the use to accommodate these situations”).
10
Id. at 92–93 (“During the Middle Ages, the Church developed the doctrine of utilitas
ecclesiae, a forebear of the use, which granted clerics stewardship, but not ownership of church
assets. … Thus utilitas ecclesiae, a canonical device, laid the groundwork for the use, the
immediate forebear of the trust, and ancestor of agency, partnership, and corporate law”).
11
Id. at 91 (“Roman legal forms were readily adapted by clerics to address several
theological concepts. These included the ownership of Christ of all property; the beneficiaries of
property as Christ, and his past, present, and future followers; and the relationship of transient
earthly goods to the eternal realm”).
12
Id. at 95 (citing R. M. HELMHOLZ, CANON LAW AND THE LAW OF ENGLAND 342 (1987))
(“There is evidence that ecclesiastical courts enforced uses before the Courts of Chancery did”).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 2 / Date: 16/7
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
could simply continue adding straw people to replace those who died, the taxes never
became due, and he could keep extending the use to himself and his heirs.13
Henry VIII wanted to put an end to uses because they were costing him significant
tax revenue, so he convinced Parliament to pass the Statute of Uses in 1536.14 Under
the act, full title to land held in use was automatically given to the person who was
benefiting from the use, the “cestui que use.”15 In response, landowners started using
trusts instead of uses to achieve the same tax-evading ends. This led to further
development of the trust as an institution.16
B. Evolution of Trusts
Trusts originally developed in England during the crusades. A crusader would leave his
land to a trustee while he was away, and when the crusader returned, the trustee would
return the land. Originally, just like the incapacitated beneficiaries of Ancient Rome,
the crusader had no legal right to the return of the land. The trustee had only a moral
obligation to deliver the property, and thus by necessity the crusader had to be able to
trust his trustee. As with the use, courts eventually began to consistently enforce the
crusader’s right to have his land returned.17
After the passage of the Statute of Uses, the trust became more widely used because
it became the best way to avoid inheritance taxes. In order for a property ownership
arrangement to be classified as a trust instead of a use for purposes of skirting the
Statute of Uses, the party entrusted with the land was required to have some active
duties in connection with the management of the property. Thus, those who held
property for the benefit of others were now required by law to fulfill duties in favor of
the settlor.18
In the English case of Keech v. Sandford,19 the court laid down a strict duty of
loyalty owed by the trustee to his settlor. An infant had inherited a lease on some
property, which was then held for the infant in trust. The lessor would not allow the
infant to renew the lease, so the trustee did not renew the lease for the infant and
instead took a lease on the property for himself. The infant’s representatives then
13
See 9 WEST’S ENCYCLOPEDIA OF AMERICAN LAW, 333–335 (Shirelle Phelps & Jeffrey
Lehman, eds, 2nd ed., Detroit, Michigan, Thomas/Gale, 2005) (describing how the use was used
for tax evasion in 16th century England).
14
See W. S. Holdsworth, Political Causes which Shaped the Statute of Uses, 26 HARV. L.
REV. 108, 108 (1912–1913) (discussing the origins of the Statute of Uses).
15
See WEST’S ENCYCLOPEDIA OF AMERICAN LAW, supra note 13, at 334 (describing the
operation of the Statute of Uses).
16
See E. N. Durfee, The Statute of Uses and Active Trusts, 17 MICH. L. REV. 87, 89 (1918)
(tracing the development of the trust as a result of the Statute of Uses).
17
See Karen Platten, Trusts are Creatures of Equity (June 14, 2012), http://findarticles.com/
p/articles/mi_m0OJX/is_5_32/ai_n31063044/ (“with the evolution of the law, courts began to
allow the beneficiaries a right of action against the property of assets of the trusts themselves
even going so far as to allow a beneficiary the right to trace the assets into the hands of third
parties who did not purchase the assets for their true value”).
18
See WEST’S ENCYCLOPEDIA OF AMERICAN LAW, supra note 13, at 333–335 (discussing
how trusts surpassed uses as the favored method of tax evasion).
19
(1726) 25 Eng. Rep. 223.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 3 / Date: 16/7
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
claimed that the infant should be entitled to the profits the trustee made through the
lease. The court said that even though the infant himself would not have been able to
renew the lease, the trustee acted improperly by subsequently taking the lease for
himself. Although this rule is very harsh, the court said it was necessary as a
prophylactic means of preventing dishonesty by trustees.20
Another 18th century English case, The Charitable Corporation v. Sutton,21 likened the
directors22 of a charitable corporation to the agents of a trust, and said that the directors
therefore had obligations to fulfill. The plaintiff alleged that the defendant directors
breached trust, committed fraud, and mismanaged the funds of the charitable corpor-
ation by being grossly negligent and giving loans to patrons who pledged inadequate
collateral. The court held the directors liable. The court said of the directors: “By
accepting of a trust of this sort, a person is obliged to execute it with fidelity and
reasonable diligence; … and therefore they are within the case of common trustees.”23
This case shows the inclination of the English courts to apply the fiduciary duties of
trustees to other relationships.
Other English cases demonstrate the impact of trust law on fiduciary duties in agency
law. In Bishop of Winchester v. Knight,24 the court held that a tenant is a fiduciary of his
landlord. In that case, a tenant was digging up copper on land belonging to his
landlord, and the landlord later sued for an account of all the copper that had been
mined. The tenant died before the trial, so a suit for trespass was precluded, but the
court found that an action for a wrongful taking against the tenant’s estate should
succeed. Moreover, the court emphasized that because the tenant is a fiduciary of the
landlord, the case is even stronger.25 Similarly, in Woodhouse v. Meredith,26 a case
involving an agent who was employed to sell an estate and then secretly bought it
himself in the name of a trustee and tricked his employer into thinking the trustee was
the real purchaser, the court equated agents with trustees and “any other person
possessing a fiduciary character.”27
Furthermore, in Oliver v. Court,28 an auctioneer who was hired as an agent purchased
property for himself after receiving no bids for the property at the auction. Twelve
years later, the court set aside the purchase due to the agent’s violation of his position
of confidence.29 Again, the court ascribed to the agent the duties of a trustee and
discussed the two relationships as more or less equivalent. Specifically, we see the
20
Id. at 223.
21
(1742) 26 Eng. Rep. 642.
22
At the time, corporate directors were referred to as “committee-men.”
23
Id. at 645.
24
(1717) 24 Eng. Rep. 447.
25
Id. at 448.
26
(1820) 37 Eng. Rep. 353.
27
Id. at 356.
28
(1820) 146 Eng. Rep. 1152.
29
See Szto, supra note 7, at 99 (citing Oliver v. Court, (1820) 146 Eng. Rep. 1152, 1665,
1166, 8 Price 127).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 4 / Date: 16/7
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
court extending the duty of loyalty from trustees to agents with its proscription against
agents placing themselves in a position incompatible with honestly discharging their
duty.
In the U.S., the New York court in Cumberland Coal and Iron Co. v. Sherman30 held
that an agent who is employed to value property cannot purchase the property himself,
because this violates the moral obligations of trust and loyalty. The defendants,
directors of the plaintiff corporation, were in charge of a committee to value and then
sell a parcel of land belonging to the corporation. The defendants later purchased the
land from the company, without ratification or approval by the corporation, for a price
later determined to be grossly inadequate. The court invalidated the sale emphasizing
that the corporate directors are agents and trustees of the stockholders, and as such they
have fiduciary duties of loyalty that prevent them from entering into unfair, unap-
proved, self-dealing contracts with the corporation.
In Bray v. Ford,31 an English case, the court held that a person in a fiduciary position
is, by default, not allowed to make a profit. Ford was a vice-chairman and fiduciary32
of Yorkshire College. He had been working as legal counsel to the college for free, but
then formed a partnership with another solicitor and decided to bill the college for his
services. The college paid him for his services for a few years. Bray, a governor of the
college, wrote a letter a few years later to more than 300 other governors saying that
Ford was illegally and improperly making money while he was a fiduciary of the
college. The jury originally found this to be libel after the trial judge instructed them
that it was clear from the college’s memorandum of association that Ford was entitled
to receive remuneration for his services. But the reviewing court said the memorandum
does not support this reading and therefore the judge’s instruction was erroneous. The
reviewing court went on to state that “a person in a fiduciary position, such as the
respondent’s, is not, unless otherwise expressly provided, entitled to make a profit; he
is not allowed to put himself in a position where his interest and duty conflict.”33
Again, we see the fiduciary duty of loyalty extended to an agent, and the court
describing his fiduciary duties as analogous to those of a trustee. Additionally, the court
in Bray, like the courts in Cumberland, Oliver, and Keech, emphasized that a strict duty
of loyalty is necessary to mitigate the trustee’s temptation to act dishonestly and breach
the trust between settlor and trustee.
The fiduciary duties of trustees have also extended to partnership relationships.34 The
English commentator Gow discussed the duty of loyalty partners owe to one another,
saying:
30
1859 WL 8052 (N.Y. Sup. 1859).
31
[1896] AC 44.
32
Chairmen of colleges are similar to directors of corporations in that they are “entrusted
with the government and management of the institution.” [1896] AC 44.
33
Id. at 51–52.
34
See Szto, supra note 7, at 102–103 (citing JOHN COLLYER, A PRACTICAL TREATISE ON THE
LAW OF PARTNERSHIP § 182 (J. C. Perkins, ed., 1st American ed., Boston, Little, Brown and
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 5 / Date: 16/7
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Indeed, the principles of a court of equity will not permit that parties bound to each other, by
express or implied agreement, to promote an undertaking for their common benefit, should
any of them engage in another concern, which necessarily gives them an interest directly
adverse to their original undertaking.35
Courts have strictly enforced the duty of loyalty in the partnership context. In the
famous New York case of Meinhard v. Salmon,36 Meinhard and Salmon were joint
venturers who were leasing a building. Salmon was the managing partner and Meinhard
contributed financing. When the lease expired, the venture had been very successful
and Salmon had the opportunity to lease an adjacent property, and he did so for himself
without telling Meinhard. Meinhard claimed this was a breach of loyalty; Salmon
argued the joint venture was over at this time, and therefore no loyalty was owed. The
court held that Salmon, as the managing co-adventurer, did have a fiduciary duty to
Meinhard because the new lease was closely related to the same subject matter of the
old lease. The opportunity for the new lease was one of the spoils of the original
venture, and as such it needed to be shared with the other co-adventurer.
In explaining the duty of loyalty that co-adventurers like Meinhard and Salmon owe
to one another, Judge Cardozo said:
Joint adventurers, like copartners, owe to one another, while the enterprise continues, the duty
of the finest loyalty. Many forms of conduct permissible in a workaday world for those acting
at arm’s length, are forbidden to those bound by fiduciary ties. A trustee is held to something
stricter than the morals of the market place. Not honesty alone, but the punctilio of an honor
the most sensitive, is then the standard of behavior.37
In essence, trustees, joint adventurers, and copartners all owe a strict duty of loyalty to
one another which is above and beyond the duties owed by ordinary people in the
course of business. Once again, we see the court extending the duty of loyalty to a
different fiduciary relationship by analogy to the functions of a trustee. Additionally,
Cardozo emphasized the necessity of a strict duty of loyalty so as to guard against the
“disintegrating erosion” of granting exceptions to the rule, similar to the prophylactic
concerns of the courts in Keech, Bray, Cumberland, and Oliver discussed above.
Company, 1834) (“the functions, rights, and duties, of partners, in a great measure, comprehend
those both of trustees and agents”) and FRANCIS J. TROUBAT, THE LAW OF COMMANDATARY AND
LIMITED PARTNERSHIP IN THE UNITED STATES 280 [§ 265] (Philadelphia, James Kay, Jun. &
Brother, 1853)).
35
NEIL GOW, A PRACTICAL TREATISE ON THE LAW OF PARTNERSHIP § 7 (Edward D.
Ingraham, ed., 3rd ed., Philadelphia, Robert H. Small, Law Bookseller, 1845) (citing Morris v.
Colman, 18 Ves. 438 (1812)) (cited in Mary Szto, supra note 7, at 103–104) (presented in a
discussion of early English and American commentary on fiduciary duty in partnerships).
36
164 N.E. 545 (N.Y. 1928).
37
Id. at 546 (citing Wendt v. Fischer, 154 N.E. 303 (N.Y. 1926)).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 6 / Date: 16/7
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Directors are not only agents but trustees … the duty of directors to shareholders is so to
conduct the business of the company, as to obtain for the benefit of the shareholders the
greatest advantages that can be obtained consistently with the trust reposed in them by the
shareholders and with honesty to other people.
Every director is a trustee for that company, and bound when his personal interest conflicts
with his public duty, to perform his duty at the sacrifice of his interest, and a court of equity
will not allow a transaction to stand in which a director on behalf of the company, has in fact,
been dealing with himself as an individual.38
Today, there are essentially two important aspects to the fiduciary duty of loyalty as
applied to corporate executives. The first concerns conflicts of interest and the second
involves actions lacking good faith. These aspects of the duty of loyalty are discussed
next.
A. Conflicts of Interest
The Delaware Chancery Court in Guth v. Loft, Inc.39 discussed how the duty of loyalty
applies to corporate executives. Guth was the president of Loft, Inc. Loft had been
buying cola syrup from Coca Cola to make a beverage, but Guth began considering a
change in the supplier due to the failure of Coca Cola to provide a discount. Pepsi, at
the time, was in bankruptcy proceedings. Guth then bought Pepsi stock with money he
borrowed from Loft and used Loft resources to further his investment in Pepsi. Loft
alleged that Guth breached the duty of loyalty by failing to offer Loft the opportunity to
buy the Pepsi shares. The court agreed, saying that Guth wrongfully appropriated the
opportunity to buy Pepsi. The court was “convinced that the opportunity to acquire the
Pepsi-Cola trademark and formula, goodwill and business belonged to the complainant,
and that Guth, as its President, had no right to appropriate the opportunity to himself.”40
In reaching this decision, the court explained the duty of loyalty in the corporate
context. Officers and directors are not trustees, but they are fiduciaries, and they are not
allowed to use their positions as fiduciaries to further their private interests. Further,
officers and directors, just like trustees, have to affirmatively protect the rights of the
corporation.41 The court also discussed the corporate opportunity doctrine, one facet of
the corporate duty of loyalty. An officer or director can take a corporate opportunity
without breaching the duty of loyalty if the opportunity is presented to him in his
38
NATHANIEL LINDLEY, A TREATISE ON THE LAW OF PARTNERSHIP, Vol. I, § 494, § 496
(Philadelphia, T & J. W. Johnson & Co., 1860) (cited in Szto, supra note 7, at 111) (presented
in a discussion of parallels between corporate and partnership and trust law).
39
5 A.2d 503 (Del. Ch. 1939).
40
Id. at 515 (Del. Ch. 1939).
41
Id. at 510.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 7 / Date: 16/7
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
individual capacity, the opportunity is not essential to the business, the corporation has
no interest or expectancy in the opportunity, and the director or officer has not used the
company’s resources to obtain the opportunity.42 But if these criteria are not met, or if
taking the opportunity would create a conflict of interest for the officer or director with
respect to the corporation’s interests, then taking the opportunity would constitute a
breach of loyalty. According to the court:
On the other hand, it is equally true that, if there is presented to a corporate officer or director
a business opportunity which the corporation is financially able to undertake, which is, from
its nature, in the line of the corporation’s business and is of practical advantage to it, is one
in which the corporation has an interest or a reasonable expectancy, and, by embracing the
opportunity, the self-interest of the officer or director will be brought into conflict with that of
his corporation, the law will not permit him to seize the opportunity for himself.43
But in somewhat of a deviation from the strict holdings in Keech and Meinhard, the
court in Guth determined that “The occasions for the determination of honesty, good
faith and loyal conduct are many and varied, and no hard and fast rule can be
formulated. The standard of loyalty is measured by no fixed scale.”44
Today, in both the U.S. and the U.K., when a business decision is made by a board
with an interested director, and the interested director is affected by his or her interest,
the transaction breaches the duty of loyalty unless it is saved by a valid approval.45 An
interested director is one who appears on both sides of a board’s decision or
transaction. A director appears on both sides of a transaction when she has a financial,
business, or familial relationship with a party to the transaction; she personally appears
as a party; or one of her associates is a party.46 For example, the director in Bayer v.
Beren suggested that the board contract with his wife to sing for the company’s radio
commercials. This director is an interested director.47 Legislative guidelines in the U.K.
set out additional circumstances when a director may be considered interested, for
instance, if she: is a customer of the company, is a supplier to the company, has a
relationship with the board’s advisors or consultants, or is offered a role with a
potential bidding company.48 In both the U.S. and the U.K., an interested director’s
appearance on both sides of the transaction is insufficient to constitute a duty of loyalty
violation on its own.
42
Id. at 510–511.
43
Id. at 511.
44
Id.
45
A duty of loyalty claim may be brought against one or more directors, officers, or
controlling shareholders.
46
BRENT OLSON, PUBLICLY TRADED CORPORATIONS: GOVERNANCE AND REGULATION § 3.18
(New York, Clark Boardman Callaghan, 2014).
47
9 N.Y.S.2d 2, 6 (1944).
48
GC100, COMPANIES Act 2006 – DIRECTORS’ CONFLICTS OF INTEREST (U.K., Thomas
Reuters, 2008).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 8 / Date: 16/7
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
To breach the duty of loyalty, a director must have a “material interest” in the
outcome of the transaction.49 Although a director may stand on both sides of the
transaction, because of her business or other relationships, the director may still be able
to make an unbiased decision. State courts in the U.S. use a subjective standard to
determine whether the director in fact was or would likely be affected by the
self-interest in question.50 Factors to consider in analyzing whether an interest is
material include the strength of a business relationship,51 the length of a business
relationship, the significance of a friendship,52 the magnitude of the financial interest,
and more. In the case Chen v. Howard-Anderson, the Delaware Court of Chancery
found that a director was materially interested in a merger transaction when he
personally received more than $840,500 in benefits from a merger.53 A director is
generally materially interested in the transaction if he stands to benefit more than the
corporation and shareholders generally benefit.54 A director may also have a material
interest if she faces a severe personal detriment depending on the outcome of the
transaction.55 Once a court confirms that a director is materially interested in a
transaction, the court will find a duty of loyalty violation unless there are reasons to
approve the transaction. The potential reasons are discussed below.
49
See Cede & Co. v. Technicolor, Inc., 634 A.2d 345, 362 (Del. 1993); Transkaryotic
Therapies, Inc., 954 A.2d 346, 362 (Del. Ch. 2008); Orman v. Cullman, 794 A.2d 5, 22 (Del. Ch.
2002).
50
See Cede & Co. v. Technicolor, Inc., 634 A.2d 345, 362 (Del. 1993).
51
The court believed that the director had a material business relationship because the
director was seeking a “$40 million investment by [the contracting company] in his own
company” at the same time as the board’s transaction was completed. Loral Space & Communs.
Consol. Litig., 2008 W.L. 4293781, at *17 (Del. Ch. 2008).
52
“Allegations of friendliness, for example, that [the interested director] has been to [the
contracting party’s] house” are insufficient for a material interest. MFW S’holders Litig., 67 A.3d
496, 509 (Del. Ch. 2013). However, “if the friendship was one where the parties had served as
each other’s maids of honor, had been each other’s college roommates, shared a beach house
with their families each summer for a decade, and are as thick as blood relations,” it could
constitute a material interest. Id. at 509.
53
87 A.3d 648, 670 (Del. Ch. 2014).
54
See id. at 670.
55
A detriment to a director could create a truly affected director as well – such as a board
considering a lawsuit against two board members. In Rales v. Blasband, a vote to pursue a
lawsuit would have resulted in a significant financial loss for two board members. The court held
that the directors’ interest truly affected their vote in the lawsuit decision. 634 A.2d 927 (Del.
1933).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 9 / Date: 16/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
a. Fair transaction The English courts traditionally did not permit any self-dealing
transaction, even if considered fair to the corporation, believing that the duty of loyalty
is to be “so strictly … adhered to [so] that no question is allowed to be raised as to the
fairness or unfairness of the contract entered into.”56 Even some recent English cases
refer to the traditional rule that courts cannot inquire into the fairness of a self-dealing
transaction.57
But a recent U.K. case, however, illustrates that the U.K. may be moving toward a
fairness test when executives seek to engage in self-interested transactions. In Mutual
Life v. Rank, the directors of Rank issued new shares in what amounted to a “flash
sale” with too many interested buyers. The directors used their power to choose some
buyers over others. The plaintiffs argued that the directors were self-dealing and biased
in their choice of buyers. The court held that the directors’ preferential sale was still a
fair sale and “in good faith in the interests of the company.”58 The court found that
although the directors’ preference appeared to be self-dealing, it was also “most
advantageous for the purposes of maintaining [Rank’s] investment programme.”59 A
fair board decision that benefits the corporation, the court held, is beneficial for all
shareholders.
In addition, legal experts in the U.K. argue that the U.K. is moving away from the
U.K.’s traditional duty of loyalty rule and courts may permit interested transactions as
long as the terms of the transaction are fair.60 Nevertheless, it is unclear whether the
reasoning of the Mutual Life court will replace the traditional rule finding self-
interested transactions to violate the duty of loyalty.
State courts in the U.S., on the other hand, have a more explicit rule regarding
so-called fair self-dealing transactions. In the U.S., courts may ratify a self-dealing
transaction if it passes the entire fairness test.61 The entire fairness test creates a high
burden of proof for defendants and “not even an honest belief that the transaction was
entirely fair will be sufficient to establish entire fairness. The transaction itself must be
objectively fair.”62 Directors must show both fair price and fair dealing in order to
satisfy the U.S. entire fairness test.63
The fair dealing portion of the entire fairness analysis takes into account the timing,
initiation, structure, disclosures, and approvals surrounding a self-dealing transaction.64
In Americas Mining Corp. v. Theriault, the court found that the structure of negoti-
ations and the research related to a self-dealing merger were insufficient and thus the
56
Aberdeen Ry v. Blaikie, 1 Macq. H.L. 461 (U.K. 1854).
57
O’Donnell v. Shanahan, [2009] E.W.C.A. (Civ) 751 (Eng.).
58
Mutual Life Ins. v. Rank, [1985] B.C.L.C. 11 (Eng.).
59
Id.
60
Luca Enrique, The Law on Company Directors’ Self-Dealing: A Comparative Analysis, 2
J. INT’L & COMP. L. 1, 8 (2000).
61
See Del. Code Ann. tit. 8, § 144.3 (2010).
62
Gesoff v. IIC Indus., 902 A.2d 1130, 1145 (Del. Ch. 2006).
63
FRANKLIN R. BALOTTI & JESSE FINKELSTEIN, DELAWARE LAW OF CORPORATIONS AND
BUSINESS ORGANIZATIONS § 4.16 (New York, Wolters Kluwer Law & Business, 2014).
64
Weinberger v. UOP, 457 A.2d 701, 711 (Del. 1983).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
transaction could not be saved by the entire fairness rule.65 In Reis v. Hazelett
Strip-Casting Corp., corporate directors, attempting to buy out minority shareholders,
pulled a price “out of the air” and threatened shareholders that if they did not accept
this deal they would never offer a higher price and they would never distribute a
dividend.66 The Delaware court found that threats of this nature were evidence of unfair
dealing.67
The fair price analysis takes into account all economic and financial impacts of a
decision including earnings and future prospects.68 In Bayer v. Beran, discussed earlier,
the board had engaged in a self-dealing transaction by contracting with a director’s wife
for radio commercials. But the court held that the board’s decision could stand because
the wife’s contract price was fair.69
In addition, determination of whether the price is fair also depends on the board’s
process for calculating the price. For instance, during a stock sale transaction a share
price based on a “thinly traded, illiquid, market is evidence of a price’s unfairness.”70 If
a court finds that a transaction lacks either fair dealing or a fair price, the court will not
save the transaction from a duty of loyalty violation.
b. Board vote In the U.S., an interested transaction will not violate the duty of
loyalty if it is ratified by uninterested board members.71 Board ratification involves two
elements. First, the board of directors or the committee of the board must know, or the
interested director must disclose, the “material facts as to the director’s interest and as
to the contract or transaction.”72 Second, the uninterested board members or committee
must in good faith authorize “the contract or transaction by the affirmative votes of a
majority of the disinterested directors.”73 Before the vote is taken, the number of
disinterested directors may be less than a quorum.
65
The court reasoned that the fair dealing requirement of the entire fairness test could not be
met because “throughout the negotiation process, the Special Committee’s and Goldman
[Sachs’] focus was on finding a way to get the terms of the Merger structure … to make sense,
rather than aggressively testing the assumption that the Merger was a good idea in the first
place.” 51 A.3d 1213, 1245 (Del. 2012).
66
28 A.3d 442, 452 (Del. Ch. 2011).
67
Id. at 464 (citing Kahn v. Lynch Commc’n Sys., 638 A.2d 1110, 1120–1121 (Del. 1994)).
68
Weinberger v. UOP, 457 A.2d 701, 711 (Del. 1983).
69
The court reasoned that it would not overturn the board’s decision because “the
expenditure [to pay the director’s wife] was not reckless or unconscionable. Indeed, it bore a fair
relationship to the total amount of net sales and to the earnings of the company.” 9 N.Y.S.2d 2
(1944).
70
Gesoff v. IIC Indus., 902 A.2d 1130, 1154 (Del. Ch. 2006).
71
Even a director who is not directly interested in the transaction, meaning she does not
satisfy the above elements of an interested director, may nonetheless be excluded as an interested
director because of her relationship with the interested director. In some cases the interested
director controls some or all members of the board because of board position, intimidation
tactics, or custom. Board members who always vote with the controlling interested party may
therefore not qualify as disinterested. FRANKLIN R. BALOTTI & JESSE FINKELSTEIN, supra note
63.
72
Del. Code Ann. tit. 8, § 144.1 (2010).
73
Del. Code Ann. tit. 8, § 144.1 (2010).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Although U.S. board members have held the power to approve a self-dealing
transaction via a board vote for some time, it is only with the advent of the 2006
Companies Act that U.K. board members could ratify a self-dealing transaction as
well.74 In the U.K., boards must meet quorum requirements before the vote, without
counting the interested director(s).75 The law in the U.K. then allows corporations to set
their own procedures for board ratification as long as the public corporation’s
“constitution includes a provision enabling the directors to authorize the matter.”76
Private companies do not need express constitutional authorization to ratify as long as
nothing in the company’s constitution invalidates such authorization.77
c. Shareholder vote The laws in both the U.K. and the U.S. have traditionally
recognized shareholders’ power to ratify interested transactions. Like board ratification,
shareholder ratification does not require an inquiry into the fairness of the transaction.
In the U.S., shareholder ratification of a self-dealing transaction operates with the same
requirements as board ratification – shareholders must know the material facts of the
transaction and approve the transaction in good faith.78 Shareholders may approve the
interested transaction during a regular shareholder meeting. In the U.K., shareholders
may ratify a transaction via an ordinary shareholder resolution.79
The various ratification schemes in the U.S. and the U.K. illustrate that courts
recognize conflicts of interest often exist in modern business practices. In both
countries directors may serve on multiple boards, own several business ventures, and
have close relationships with others in the same business community. Neither country
ignores the existence of these relationships. Furthermore, both countries attempt to
strike a balance between a strict interpretation of the duty of loyalty which would
forbid all interested transactions, and a desire to allow transactions that further
corporate interests to proceed despite the conflict of interest.
Although the corporate duty of loyalty remains relatively unchanged from its origins in
the trust relationships of basic human interactions, it nevertheless continues to evolve in
the courts. One of the more recent developments has been conceptualizing lack of good
faith on the part of directors and officers as a breach of the duty of loyalty. In In re Walt
Disney Co. Derivative Litigation,80 for example, the Delaware Supreme Court dis-
cussed the three most prevalent examples evidencing lack of good faith:
74
Previously U.K. statutory law only provided this power to shareholders. GC100, COM-
PANIES ACT 2006 – DIRECTORS’ CONFLICTS OF INTEREST (U.K. 2008).
75
Companies Act, 2006, c. 2, § 175.6 (U.K.).
76
Companies Act, 2006, c. 2, § 175.5 (U.K.).
77
Companies Act, 2006, c. 2, § 175.5 (U.K.).
78
Del. Code Ann. tit. 8, § 144.2 (2010).
79
Del. Code Ann. tit. 8, § 239 (2010).
80
906 A.2d 27 (Del. 2006) (shareholders alleged breach of fiduciary duty in connection with
the hiring and subsequent non-fault termination of the company president).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
A failure to act in good faith may be shown, for instance, where the fiduciary intentionally
acts with a purpose other than that of advancing the best interests of the corporation, where
the fiduciary acts with the intent to violate applicable positive law, or where the fiduciary
intentionally fails to act in the face of a known duty to act, demonstrating a conscious
disregard for his duties. There may be other examples of bad faith yet to be proven or alleged,
but these three are the most salient.81
[T]he fiduciary duty of loyalty is not limited to cases involving a financial or other cognizable
fiduciary conflict of interest. It also encompasses cases where the fiduciary fails to act in
good faith. As the Court of Chancery aptly put it in Guttman, “[a] director cannot act loyally
towards the corporation unless she acts in the good faith belief that her actions are in the
corporation’s best interest.”83
The inclusion of good faith within the duty of loyalty in one sense represents an
expansion of the duty of loyalty from a simple prohibition of self-interested action. In
another sense, however, it represents a return to the trust relationships among Roman
beneficiaries in fideicommissio, who had a moral obligation to act in good faith and
deliver the legacy to the intended heir. Perhaps if modern corporate executives would
“do as the Romans did” and honor the trust that has been placed in them, there would
be fewer breaches of the duty of loyalty, as well as fewer corporate scandals occupying
the headlines.
81
Id. at 67.
82
911 A.2d 362 (Del. 2006) (shareholders alleged that directors had breached fiduciary
duties by failing to ensure that a reasonable federal Bank Secret Act compliance and reporting
system was in place).
83
Id. at 369–370 (emphasis added) (citing Guttman v. Huang, 823 A.2d 492, 506 n. 34
(Del.Ch.2003)).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 15 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
The origin of the corporation can be traced back to Roman law,1 and over the years
various theoretical approaches have evolved to give the corporation context within the
law for the purpose of regulation. The full extent of the implications of the separation
of the corporate personality – be it fictitious2 or realistic3 – from that of its individual
members’ personalities was demonstrated in the case of Salomon v A Salomon & Co
Ltd,4 where it was concluded that a company is, for all intents and purposes, altogether
a different person from its shareholders. Essentially, a corporation is an artificial person
in that it is invisible, intangible, existing only in contemplation of law and at common
law possessing only those properties which the charter of its creation confers upon it,
either expressly or incidental to its existence.5 In practice the corporation thus primarily
operates as a legal device that serves to simplify and stabilize the complicated web of
contractual relationships that an association of shareholders has to have with a
1
The universitas personarum is defined as “an aggregation of individuals forming a
persona or entity, having the capacity of acquiring rights and incurring obligations to a great
extent as a human being,” to be “distinguished from a mere association of individuals by the fact
that it is an entity distinct from the individuals forming it, its capacity to acquire rights or incur
obligations is distinct from that of its members, which are acquired or incurred for the body as
whole, and not for the individual members”. See Webb & Co Ltd v Northern Rifles, Hobson &
Sons v Northern Rifles 1908 TS 462 at 464–465.
2
There are those who treat the corporate body as a mere legal fiction devoid of the ability
to function independently and requiring permanent representation by human beings – the
fictitious theory. See E Lederman (1985: 295). Also see J Dejnozka (2007: 6). According to the
fictitious theory, the lawgiver alone can create legal fictions, and corporations are therefore
the creations of the state (concession theory). As a result, such a fictitious person has no will or
mind and cannot conclude any actions by its own accord: it must be represented by human
beings empowered to act on its behalf. See WA Joubert (2013: 72).
3
There are those that treat corporations as real entities, claiming that the law merely
recognizes the existence of corporate bodies rather than creating the corporate entities – the
realist approach. E Lederman (1985: 295). Also see A Machen (1911: 260). The reality theory
subsists in the contention that it is the natural tendency of human beings to organize themselves
into productive groups, leading scholars to perceive the corporation as something more than
either a creation of the state or just an aggregate of the shareholders – rather, it was “an organic
social reality with an existence independent of, and constituting something more than, its
changing shareholders”. MM Blair (2013: 806). As a result, a corporation is not only capable of
acting by itself, but is also capable of committing crimes and delicts for which it can be held
accountable. WA Joubert (2013: 73).
4
Salomon v A Saloman & Co Ltd 1987 AC 22.
5
MM Blair (2013: 799).
191
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
multitude of outside parties in order to participate in society.6 Yet, given the artificiality
of its nature, a corporation needs organization in order to make use of its own assets in
society: a corporation is a legal construct incapable of performing any acts except
through the acts of flesh and blood human beings.7
The increasingly active role that corporations assume in all aspects of modern life is
accompanied by their correspondingly increased participation in criminal activities.8
Criminal activity carried out within the corporate framework presents unique chal-
lenges to criminal law because corporate bodies are powerful tools, and their
manipulation for criminal purposes can cause great harm to the public.9 In most
systems, criminal offences have a physical element and a mental (fault) element.10 The
physical element of offences can be imputed to a corporation relatively easily, but the
imputation of the mental element to a corporation contradicts fundamental principles of
criminal law.11 Whilst most of the delinquent activity involving corporations is
generally confined to “white collar” crimes,12 the issue of corporate criminal liability
has proliferated as a topic of debate following the incident where, amongst others,13 an
automobile corporation (Ford) was tried and acquitted of culpable homicide after
negligently failing to repair known lethal defects in the manufacture of its cars which
resulted in the death of three people.14
6
K Iwai (1997: 10).
7
A corporation is only able to establish its existence in society through the actions of
directors who hold the proper authority to exercise all the powers of the corporation, or through
the acts of corporate officers to whom the directors have delegated their powers. See K Iwai
(1997: 40–46).
8
E Lederman (1985: 286).
9
E Lederman (1985: 339).
10
All crimes, with the exception of crimes to which strict liability attaches, require both an
act or omission (actus reus) and a culpable mental state (mens rea). In order for a perpetrator to
be liable for wrongful conduct, one must be able to reconcile “action” with “intention” – having
regard for the applicable forms of intention, i.e. dolus directus, dolus indirectus and dolus
eventualis – because intention must present both cognitive and conative manifestations. See CR
Snyman (2008: 182).
11
Arthur Allens Robinson (2008).
12
The major areas of corporate offence are: restraint of trade; infringement of patents,
trademarks, or copyrights; advertising misrepresentation; unfair labour practices; and financial
manipulations. These typical corporate offences cover the victimization of other firms, of
creative individuals or competitors, of the general public, a company’s own employees and
stockholders. See L Davids (1968: 527).
13
See AI Pop (2006).
14
S v Ford Motor Co., No 80-5324 (Ind. Super. Ct. Mar. 13, 1980). In casu, it was alleged
that Ford (the company) was guilty of culpable homicide as a result of the fact that it had
knowledge of defects of the engine design of its Pinto line, but instead of recalling the model
and rectifying the defect it engaged in “plain, conscious and unjustifiable disregard of harm that
might result (from its actions) and the disregard involves a substantial deviation from acceptable
standards of conduct”. The design of the rear-end of the Pinto could not meet the intention of
Standard 301 of the Federal Motor Vehicle Safety Standards that cars should be able to
withstand a fixed barrier impact of 20mph without losing fuel, but Ford was legally able to
produce the defective Pintos for eight years as a result of creative and intensive lobbying against
Standard 301. It was more cost-beneficial for Ford to wait eight years and resort to paying tens
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
of millions of “pain and injury” claims and out-of court settlements than to recall and repair the
defective models. See WM Hoffman (1982: 222–226). Also see DS Anderson (1981).
15
The corpus of criminal law has been developed to be applicable to natural persons and to
reflect the psychology of human beings. Therefore, criminal law serves to punish and deter the
wrongdoing of the individual moral persons whereas a company is said to be a “fictitious” or
“abstract” entity, incapable of physical action, knowledge or intention. M Wilkinson (2003: 1).
16
Arthur Allens Robinson (2008).
17
KF Brickey (1982: 416).
18
Arthur Allens Robinson (2008).
19
SJ Naude (1970: 38).
20
K Iwai (1997: 40). The interests of the company are those interests of its members that
are, after incorporation, protected and realized not by its members’ individual rights and powers,
but by the rights and powers of the corporation. WA Joubert (2013: 75).
21
WA Joubert (2013: 77).
22
SJ Naude (1970: 36). See also E Lederman (1985: 292).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the corporation as directly liable for offences which require criminal liability.23 This
has become necessary since the modern day corporation plays an increasingly
significant part in our lives, and therefore they cannot simply be exempt from being
subject to criminal law.24 Yet, only in certain circumstances are acts and states of
mind25 attributed to the corporation: (1) in the case of acts and states of mind of certain
persons; and (2) where these acts or states of mind by the relevant persons are in
furtherance of the company’s affairs and interests.26 These two prescriptions are very
broad and the mechanisms to determine the liability of a corporation in the case of
wrongful acts committed are not clear-cut: it seems that the approach for attaching
criminal liability to a corporation diverts from the general rule.27 It is, however,
submitted that in the absence of acknowledging that judicial persons (a company) can
be held delictually and/or criminally liable in their own right, the direct association of
the company with its individual counterparts is unavoidable.28
The common law doctrine of vicarious liability imputes to the employer the liability
of the unlawful conduct of his/her employee in the first instance, and in the second
instance imputes liability of the representative of the company to the company if the
execution of his or her duties was done in an unlawful manner that resulted in harm to
a third party.29 In South African law the doctrine of vicarious liability is well
established despite the fact that the doctrine is an exception to the “basic premise of the
law of delict that fault is a prerequisite for liability”.30 In terms of this theory, the
23
E Lederman (1985: 292).
24
M Wilkinson (2003: 23).
25
Acts and states of mind are not the only human attributes that courts have ascribed to
corporations for the purpose of determining liability. Concepts such as “nationality”, “domicile”
and “residence” have been applied to corporations by way of analogy without distortion of the
original and intended meanings for these conceptions. See De Beers Consolidated Mines Ltd v
Howe 1906 AC 445 (PC) at 459, where Lord Loreburn LC states: “In applying the conception of
residence to a company, we ought, … to proceed as nearly as we can to the analogy of an
individual … . We ought, therefore, to see where it really keeps house and does business.” It is,
however, impossible to make use of these conceptions where the relevant legal system fails to
draw a distinction between natural and artificial persons. In the case of Estate Kootcher v
Commissioner of Inland Revenue 1941 AD 256 at 260, Watermeyer JA stated that “… when the
words ‘reside’ or ‘resident’ are used in connection with a corporation to indicate its presence in
a place for some period of its corporate existence, the words are used in the figurative sense and
can only be given meaning analogous to the meaning of the works when used with regard to a
human being”. See WA Joubert (2013: 77).
26
WA Joubert (2013: 77).
27
SJ Naude (1970: 30). The theory that a corporation can be criminally liable has grown in
stages, and there are many parallels in the consolidation of this doctrine in English and
American law. See E Lederman 1985: 288).
28
SJ Naude (1970: 30). Machen makes a valid point: that it is all but impossible for those
unlearned in the law to think of a corporation as anything else other than an entity. A Machen
(1911: 260). Both lawyers and laypersons tend to speak instinctively of the corporation as an “it”
– that is, as a thing that has an identity and existence of its own. J Dejnozka (2007: 54).
29
SJ Naude (1970: 35).
30
MM Botha and D Millard (2012: 227). Various South African legislations provide for the
imputation of liability to a corporation for wrongful conduct committed by employees, namely
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
corporation is liable for the wrongful acts, civil or criminal, of its agent if the agent,
who is himself culpable, acted “within the scope of his employment and with the intent
to benefit the corporation.”31 A corporation is vicariously liable for the acts of its agents
only in situations in which individuals would be held similarly liable to the extent that
those actions are performed within the scope of employment.32
It is this very association that is the mechanism whereby the conduct and the liability
of the functionaries are dispatched to the company.33 Directors are regarded as the
agents of the corporation as a result of the fact that the corporation is an “abstraction”34
which cannot by itself think, resolve or act but for the directors.35 Thereby, a
relationship of principal and agent is endorsed which means that a corporation itself
cannot commit crimes or delicts, but it can be held vicariously liable for the delicts or
crimes committed by its representatives (directors).36 Given that the actual business of
the company is conducted by the agents of the company, that is the directors, the
directors and officers of the company are held to owe duties to the company akin to
duties owed by an agent to his principal.37
The boundaries of vicarious liability in South Africa were, to a large extent, settled
when it was held that
[i]f it is once granted that corporations are for civil purposes to be regarded as persons, i.e. as
principals acting by agents or servants, it is difficult to see why the ordinary doctrines of
agency and of master and servant are not to be applied to corporations as well as to ordinary
individuals.38
In the case of Feldman (Pty) Ltd v Mall 39 it was held that a master who uses servants
creates risk of harm to others if the servant proves to be “negligent, inefficient or
untrustworthy” and “[i]t follows that if the servant’s acts in doing his master’s work
or his activities incidental to or connected with it are carried out in a negligent or
improper manner so as to cause harm to a third party the master is responsible for the
harm”. It follows that once the doctrine of vicarious liability has been extended to
the Labour Relations Act 66 of 1995, the Employment Equity Act 55 of 1998 and Promotion of
Equality and Prevention of Unfair Discrimination Act 4 of 2000.
31
E Lederman (1985: 289).
32
E Lederman (1985: 291).
33
SJ Naude (1970: 31).
34
Reference to a corporation as an “abstraction” originated in the case of Lennard’s
Carrying Co Ltd v Asiatic Petroleum Co Ltd [1915] AC 705 and has since been used by various
legal scholars to reiterated cognizance that a corporation’s place in legal theory remains unclear
and dependent on the circumstances surrounding its consideration.
35
Trevor Ivory Ltd v Anderson [1992] 2 NZLR 517 at 526–527.
36
WA Joubert (2013: 72). “Agency” is “a fiduciary relation which results from the
manifestation of consent by one person [the principal] to another [the agent] that the other shall
act on his behalf and subject to his control, and consent by the other so to act”. The actual
control need not be complete or continuous, but there must be some sense that the principal is
“in charge”. K Iwai (1997: 47).
37
WA Joubert (2013: 76).
38
Citizens Life Assurance Co. v Brown 1904 AC 423 (CA) at 426.
39
Feldman (Pty) Ltd v Mall 1945 AD 733.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
cover liability for wrongs, entailing a wrongful or corrupt state of mind, the decision of
policy has been made and therefore such liability ought to be imposed on a company.40
For the application of vicarious liability the position of the employee is of no
consequence, and there is no pretence that the act or omission is actually that of the
company itself.41 Every person involved in the activities of the corporation is
accordingly associated with the corporation for the purpose of determining criminal
liability.42 Quite simply, the corporation is liable for the fault of those who are in its
employment and who commit wrongful acts during the course of their employment. In
the case of a director, his scope of representation refers to any and all conduct that is
intended to promote the business the corporation is authorized to undertake.
The doctrine of vicarious liability is not without certain inherent limitations. The
general rule in South African law is that vicarious liability is limited to those wrongful
actions where “fault” is included explicitly or by implication for the deed, and that the
relationship between the corporation and the accused is that of master and slave.43 The
application of vicarious liability is limited because it can only find application if an
employment or agency relationship is found to exist at the time when the employee
committed the wrongful act, and the employee must have acted within the scope of his
employment.44 In the recent matter of Minister of Defence v Leon Marius von
Benecke45 the Supreme Court of Appeal addressed an appeal against a finding by the
Pretoria High Court that the appellant (the Minister) was vicariously liable for the
damages the plaintiff incurred as a result of an employee, one Motaung, unlawfully and
negligently stealing and selling infantry weapons, ammunition and magazines to one
Mahlangu – the robber who used a R4 assault rifle he purchased from Motaung to
shoot and seriously injure the plaintiff during a robbery. The Supreme Court of Appeal
was asked to determine whether a “sufficient connection between the conduct of
40
WA Joubert (2013: 76).
41
M Wilkinson (2003: 5).
42
SJ Naude (1970: 41).
43
SJ Naude (1970: 40).
44
Generally there are only two instances in which the doctrine of vicarious liability will not
find application for the contemplation of a company’s delictual and/or criminal liability:
(1) where vicarious liability in the particular instance is expressly excluded by the legislature in
the sense that the conduct and imputable liability is required by the defendant him/herself; and
(2) where the person whose conduct gives rise to liability is not a person whose conduct
vis-à-vis the company qualifies for vicarious liability. See SJ Naude (1970: 32). Determining the
parameters for the scope of “employment” for the purpose of establishing vicarious liability has
proven problematic, and the development of case law led to the conclusion that the application
of vicarious liability will predominantly depend on the facts of each case. In an attempt to
address the uncertainty surrounding the application of vicarious liability, the courts have
developed various sub-rules, including deviation cases, intentional misconduct where the
employee did not act in furtherance of his employer’s business, and the unauthorized transport of
passengers in the vehicles of the employer. See MM Botha and D Millard (2012: 229–230).
45
Minister of Defence v Von Benecke (155/12) [2012] ZASCA 158; (2013) 34 ILJ 275
(SCA); 2013 (2) SA 361 (SCA) (15 November 2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Motaung and the purposes and business of the defendant” was present to render the
Minister liable.46
In its evaluation of the standard for application of vicarious liability the court
recognized that the duties of Motaung in the course of his employment involved
safeguarding the weapons under his care, but he instead stole those weapons and sold
them to criminals who used the weapons to shoot and injure the plaintiff. The court,
however, did not agree with the trial court that vicarious liability was the appropriate
remedial mechanism in this instance. From a subjective perspective, the court was of
the opinion that Motaung willfully turned his back on his employment and the duties
entrusted to him: he chose to pursue his own interests and profit from acting in a
manner contrary to the intended employment relationship.47 From an objective evalu-
ation of Motaung’s conduct the court determined that theft and removal of weapons and
parts thereof did not form part of his duties and there was no link between his own
interests and the business of his employer.48 By all accounts, Motaung’s conduct fell
outside the course and scope of his employment. Moreover, the court pointed out that
there is a clear distinction between negligent performance of a task entrusted to an
employee for which the employer must usually bear responsibility, and conduct which
is in itself a negation of or dissociation from an employer/employee relationship.49
However, the court took cognizance of O’Regan J’s statement50 that where a court
finds that the standard test is not met, it is nonetheless required to ask whether the rule
does not require development and extension to accommodate the particular set of facts
before it.51 Regarding the matter at hand the court established that the defence force is
a special kind of employer with a relationship with both its employees and the general
public, which requires an approach to liability for the wrongful acts of those employees
which is very different from that of an ordinary civilian employer.52 Its proper
functioning requires that it not permit or allow for situations that permit the escape of
weaponry charged in its possession to the public, and it has a duty to ensure that its
employees are educated and disciplined so as to minimize this risk. The court therefore
concluded that there was an intimate connection between Motaung’s conduct and his
employment, firstly because he was charged with a positive duty to care for the items in
question, and secondly because without the scope of his employment he would have
46
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 3.
47
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 13.
48
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 13.
49
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 13.
50
K v Minister of Safety and Security 2005 (6) SA 419 (CC) at para 16, 23.
51
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 14.
52
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 24. The court examined the constitutional foundations of the defence
force and its statutory embodiment and came to the conclusion that it had been charged with the
duty to act, teach and require of its members to act in accordance with the constitution and the
law.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
had neither access nor knowledge of the means to avoid security measures in place to
prevent the delivery of the weapons to the public.53
The court was thus of the opinion that the risk of weapons being stolen and used
during the course of criminal activities in which innocent civilians are injured should
fall to the Minister when the public is exposed to weaknesses in its systems or frailties
in its personnel. However, the court did imply that if it had been satisfied that the
defence force had taken all reasonable steps to prevent the theft of weapons by its
responsible employees in accordance with its constitutional mandate, the court would
have been less inclined to agree with the trial court and impute vicarious liability to the
Minister for the injury caused as a result of the criminal conduct of one of its
employees.54 The doctrine of vicarious liability has therefore been developed to the
extent that it has been held to be applicable to the state whose employees (organs)
cause harm to citizens.55 As far as civil action is concerned the doctrine of vicarious
liability has been extended and adapted to find application in instances where strict
adherence to its limitation will preclude the realization of its purpose – making of
amends to an injured third party who might not otherwise be compensated.
In criminal law, however, no general principle of vicarious liability is recognized
because it is a manifestation of strict liability in that it is not necessary to establish and
prove the defendant’s “intention” for the imputation of liability for the wrongful act by
an employee or agent.56 Thus, certainty on whether “states of mind” can be attributed
to those responsible for directing the mind of the corporation (directors) for the purpose
of imposing criminal liability upon a corporation eludes us, because vicarious liability
is not possible in those instances where “personal fault” is required.57 Yet, the statutory
model for corporate criminal liability in South Africa is based on vicarious liability, and
its application seems to be much wider than originally intended in the law of delicts.58
Section 332(1) of the Criminal Procedure Act 51 of 1977 provides that:
For the purpose of imposing upon a corporate body criminal liability for any offence, whether
under any law or at common law –
(a) any act performed, with or without a particular intent, by or on instructions or with
permission, express or implied, given by a director or servant of that corporate body; and
(b) the omission, with or without a particular intent, of any act which ought to have been but
was not performed by or on instructions given by a director or servant of that corporate
body;
53
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 25.
54
(155/12) [2012] ZASCA 158; (2013) 34 ILJ 275 (SCA); 2013 (2) SA 361 (SCA) (15
November 2012) at para 26.
55
See F v Minister of Safety and Security 2010 (1) SA 606 (WCC).
56
JM Burchall, ed. (1997: 298).
57
G Ferguson (1998: 4). Also see WA Joubert (2013: 76). The doctrine of vicarious liability
attaches strict liability to one person for the wrongful act of another. Yet, recognized instances of
strict liability are rare and stem mainly from modern legislation such as the Consumer Protection
Act 68 of 2008 or common law actions of Roman origin. See MM Botha and D Millard (2012:
227).
58
SJ Naude (1970: 41). See also MM Botha and D Millard (2012: 226).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
in the exercise of his powers or in the performance of his duties as such director or servant or
in furthering or endeavouring to further the interests of that corporate body, shall be deemed
to have been performed (and with the same intent, if any) by the corporate body or, as the
case may be, to have been an omission (and with the same intent, if any) on the part of that
corporate body.
Section 332(1) effectively removes the obstacle holding an artificial person liable for
criminal conduct by attributing “fault” for the crime to the director or servant for the
purpose. Section 332(1) is broad enough to apply to all crimes, both statutory and
common law, irrespective of whether mens rea is an element of the crime or not.59 It
has thus been suggested that Section 332 is unconstitutional: “Legal commentators …
unanimously repudiate the doctrine of vicarious responsibility as representing a
departure from the ‘fault’ requisite for criminal liability, and it will in all likelihood be
declared unconstitutional by the constitutional court for the same reason, if and when
the matter comes up for the decision.”60 Nevertheless, the current legal position in
South African law maintains that it is unnecessary to determine whether the “brain” of
the corporation is guilty of having committed the wrongful acts as Section 332(1)
explicitly states that “with or without particular intent” the commission or omission by
a servant or director will impute liability to the corporation provided that either an
employment or agency relationship is present.61
It is important to note that imputation of liability via the director or servant merely
serves as a mechanism to impute liability to the corporation and does not serve to hold
the director or servant liable for the conduct in their personal capacity for the purpose
of Section 332(1).62 Section 332(2)63 provides for the purpose of prosecuting a
corporation a director or servant of that corporation shall be cited as a representative
offender and will be dealt with as if he or she were the person accused of the crime.
Section 332(2)(c) goes on to ensure that should the representative offender of the
corporation be convicted of the crime, the court may not impose any punishment other
than a fine which will be payable by the corporation and that may recouped by
attachment of sale of property of the corporation.64
The effect of Section 332(2)(c) thus serves only to direct punishment for the
wrongful act by a director or servant at the corporation, whilst the issue of personal
liability for the wrongful conduct remains to be addressed. It can readily be deduced
59
Bowman Gilfillan (2008: 3).
60
Arthur Allens Robinson (2008).
61
SJ Naude (1970: 41).
62
In the case of R v Bennet Co (Pty) Ltd 1941 TPD 194 the negligence of an employee was
imputed to the corporation which resulted in the latter being convicted of culpable homicide.
63
Act 51 of 1977. “In any prosecution against a corporate body, a director or servant of that
corporate body shall be cited, as a representative of that corporate body, as the offender, and
thereupon the person so cited may, as such representative, be dealt with as if he were the person
accused of having committed the offence in question …”
64
“if said person, as representing the corporate body, is convicted, the court convicting him
shall not impose upon him in his representative capacity any punishment, whether direct or
alternative, other than a fine, event if the relevant law makes no provision for the imposition of
a fine in respect of the offence in question, and such fine shall be payable by the corporate body
and may be recovered by attachment of sale of property of the corporate body …”
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
that should a wrongful act not fall within the scope of employment or within the ambit
of furthering the interests of the corporation, then liability will not be imputed to the
corporation and personal action must be taken against the relevant director or servant. A
director of a corporation will accordingly only be held directly criminally liable in his
personal capacity if he committed the crime whilst acting outside the scope of his
representation of the company. Admittedly, given the extricable nature of the role the
director plays in giving effect to the personhood of the corporation, the wrongful
conduct committed by a director will, by way of vicarious liability, be imputed to the
corporation if the conduct is remotely linked to the director’s duties as a representative
of the corporation.
Section 332(2)(d) attempts to make some provision for holding the said director or
servant personally liable for his or her actions apart from the vicarious liability
attributed to the corporation by stating that “the citation of a director or servant of a
corporate body as aforesaid, to represent that corporate body in any prosecution
instituted against it, shall not exempt that director or servant from prosecution for that
offence in terms of Section 332(5)”. However, in the case of S v Coetzee 65 the
Constitutional Court held that Section 332(5) is unconstitutional. Section 332(5) states
that:
When an offence has been committed, whether by the performance of any act or by the
failure to perform any act, for which any corporate body is or was liable to prosecution, any
person who was, at the time of the commission of the offence, a director or servant of the
corporate body shall be deemed to be guilty of the said offence, unless it is proved that he did
not take part in the commission of the offence and that he could not have prevented it, and
shall be liable to prosecution therefor[e], either jointly with the corporate body or apart
therefrom, and shall on conviction be personally liable to punishment therefor[e].
Section 332(5) effectively serves to hold a director or servant personally liable for the
wrongful act committed on the premise that the corporation is or could be held
vicariously liable therefore. Section 332(5) achieves this by creating a presumption of
guilt of the director or servant on the basis that his or her actions were within the scope
of employment or representation which attributed liability to the corporation, and
places the onus on said director or servant to prove that he or she did not take part in
the commission of the offence and that it could not have been prevented by any efforts
by him or her. The actual or possible vicarious liability of the corporation thus becomes
a mechanism whereby the responsible director or servant can be held jointly or
separately liable from the corporation and any conviction will be carried out against
said director or servant personally. Section 332(5) thus holds the director or servant
strictly liable for his or her conduct that directly contributed to or can contribute to the
imputation of vicarious liability to the corporation.
65
S v Coetzee and Others (CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA
527 (6 March 1997).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The Constitutional Court in the matter of S v Coetzee66 was concerned with the fact
that Section 332(5) violated the presumption of innocence67 and the right to freedom
and security of a person68 enshrined in Section 25(3)(c) of the Interim Constitution69 of
the Republic of South Africa. The Constitutional Court examined a number of cases
that addressed the constitutionality of reverse onus and found that provisions requiring
an accused to disprove an element of the offence violated the right to be presumed
innocent because it exposed the accused to the risk of being convicted of the offence
despite the existence of reasonable doubt.70 The contention made by the state was that
no breach of presumption of innocence occurs where the onus relates to proving a
defence and not to disproving an element of the offence.71 However, the court
concluded that the fact that the accused will be convicted in the absence of discharging
the onus is a factor that directly affects the verdict that will be rendered by a court and
therefore has the “effect” of reverse onus.72
The court did reiterate that it recognizes that directors occupy a special position both
in relation to the corporate body and the interest of the general public, and therefore it
is not unreasonable to enact special measures to assist the prosecution to overcome
difficulties with collecting evidence that are present as a result of the complex
structuring of corporate hierarchies. Employing such measures, however, cannot be
done in a manner inconsistent with the Constitution or in a manner that encroaches
upon the presumption of innocence it endorses. Accordingly, the court held that Section
332(5) was unconstitutional and that its unconstitutionality was not justifiable in terms
of Section 332(1) of the Interim Constitution that provides that the rights in question
can be limited if it is justifiable, reasonable and necessary to do so.
In its order the court proposed that the words “it is proved that” be removed from
Section 332(5) so as to enable the provision to remain effective in achieving the
objective of the statute.73 The proposed removal of the words “it is proved that” places
the burden on the prosecution to prove that the director or servant either participated in
the commission of the crime or at least failed to prevent it. Section 332(6)74 ensures
that where criminal proceedings are brought against the director or servant of a
corporation, any evidence that would be or was admissible for the purpose of imputing
vicarious liability to the corporation will be admissible for the purpose of prosecuting
the accused in his or her personal capacity. This provides some relief for the
66
(CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997) at
para 30.
67
Section 25(3)(c) of the Constitution of the Republic of South Africa Act 200 of 1993.
68
Section 11(1) of the Constitution of the Republic of South Africa Act 200 of 1993.
69
The Constitution of the Republic of South Africa Act 200 of 1993.
70
(CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997) at
para 31.
71
(CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997) at
para 34.
72
(CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997) at
para 38.
73
(CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997) at
para 51.
74
Act 51 of 1977.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
prosecution who seeks to establish the criminal liability of a director or servant in his
or her personal capacity, but the presence of vicarious liability is no longer sufficient to
presume the guilt of a director or servant whose conduct attributed to the imputation
thereof.
It is worth noting that at the time of the decision the infringement could not be
justified in terms of the limitation clause because the “necessity” of employing reverse
onus had not yet been established.75 It has accordingly been submitted that had the
court evaluated the constitutionality of Section 332(5) against the current limitation
clause,76 which does not require consideration of the “necessity” of the provision but
only whether it is reasonable and justifiable, the court may have come to a different
conclusion.77 However, by way of precedent established in S v Coetzee,78 in South
Africa law directors will be able to escape personal criminal liability for actions taken
and decisions made during the course of performing his or her duties, representing the
corporation or furthering the corporation’s interests if they prove that they took
reasonable steps to prevent the commission of the crime provided they were aware that
the conduct was taking place.79
The absence of the association between the director or servant and the corporation
will undoubtedly make it much harder to determine the criminal liability of a director
or servant for criminal conduct undertaken during the course of employment or
furtherance of the corporation’s interests. Naude is thus of the opinion that the general
reliance on the doctrine of vicarious liability in South African law does not exclude
resort to an action for direct liability as is predominantly resorted to in English law80
where it is necessary to hold a director personally liable for wrongful conduct
committed during the course of his representation of the company.81 There is, however,
currently no indication that South African courts have made use of the English law
75
H Anderson (2008: 254).
76
Section 36 of the Constitution of the Republic of South Africa Act 108 of 1996 which
states: “The rights in the Bill of Rights may be limited only in terms of law of general
application to the extent that the limitation is reasonable and justifiable in an open and
democratic society based on human dignity, equality and freedom, taking into account all
relevant factors, including – (a) the nature of the right; (b) the importance of the purpose of the
limitation; (c) the nature and extent of the limitation; (d) the relation between the limitation and
its purpose; and (e) less restrictive means to achieve the purpose.”
77
H Anderson (2008).
78
CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997).
79
H Anderson (2008: 259).
80
English law developed what has become known as the “identification” (alter ego) theory
from tort law which originated with the finding by the court in the case of Lennard’s Carrying
Co Ltd v Asiatic Petroleum Co Ltd [1915] AC 705. The identification (alter ego/organism)
doctrine is thus premised on the supposition that some officers of the company are more than its
agents: they are the company itself and can therefore be held personally liable for corporate
criminal actions. See Director of Public Prosecutions v Kent and Sussex Contractors, Ltd and
Another [1944] KB 146. See also E Lederman (1985: 292).
81
MM Botha and D Millard (2012: 252). In the case of Barkett v S.A. Mutual Trust &
Assurance Co. Ltd 1951 (2) SA 353 (A) the South African Appeal Court held that a company’s
delictual liability is not necessarily vicarious by nature.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
approach, and it is not entirely clear how the approach will be implemented alongside
the long-standing implementation of the doctrine of vicarious liability in South African
law.
Section 332(1) of the Criminal Procedure Act82 serves to codify the common law
doctrine of vicarious liability to enable the imputation of corporate criminal liability to
a corporation for the criminal conduct of a director or servant within the scope of his or
her employment or during the course of conducting the business of the corporation.
Section 332(5) of the Act83 takes the vicarious liability of the corporation a step further
by attempting to ensure that a director or servant can, apart from any vicarious liability
attributed to the corporation, be held personally liable for the criminal conduct
undertaken by that specific director or servant during the course of his or her
employment with the corporation. Subsequent to the finding in S v Coetzee,84 the
prosecution of a director or servant for a crime for which the corporation can be held
vicariously liable will require of the state to prove that the relevant director was aware
of the crime being conducted, or at the very least that he or she did everything
reasonably possible to prevent the commission of the crime – a feat that may prove
impossible as corporate hierarchies often veil the identity of the individual to whom
“intention” can be assigned for the purpose of attributing “fault” for the wrongful
corporate conduct.
Modern South African legislation does make provision for the imputation of personal
criminal liability to directors apart from any vicarious liability that may arise from the
conduct of the director in connection with his or her employment or representation of
the corporation in specific situations. For example, Section 424 of the Companies Act
61 of 1973, which remains in force despite the implementation to of the Companies Act
70 of 2008, provides for the attribution of liability to a director in his or her personal
capacity for the wrongful contribution to the loss of a creditor that arises as a result of
the reckless or intentional commission of fraud. In the recent case of Fourie v First
Rand Bank Ltd 85 the Supreme Court of Appeal resorted to Section 424 of the Act86 to
hold the director personally liable for the wrongful conduct that contributed to the loss
of the creditor, and found the director’s employer vicariously liable for the conduct of
the director.87
It appears courts have also begun to take action aimed more directly at directors for
corporate criminal conduct. In the recent landmark case of S v Blue Platinum Ventures
(Pty) Ltd and Matome Samuel Maponya,88 the court held that the director (Maponya) of
the company was criminally liable in his personal capacity for the contravention of
82
Act 51 of 1977.
83
Act 51 of 1977.
84
(CCT50/95) [1997] ZACC 2; 1997 (4) BCLR 437; 1997 (3) SA 527 (6 March 1997).
85
Fourie v First Rand Bank Ltd [2012] ZASCA 119 (578/2012).
86
Act 61 of 1973.
87
C Theodosiou (2012). In its application of Section 424 of the Companies Act 61 of 1973
the court held that the application of Section 424 does not require a causal link between the
reckless or fraudulent conduct of the director and the loss suffered by the creditor.
88
S v Blue Platinum Ventures (Pty) Ltd and Matome Samuel Maponya, case no. RN126/13,
in the Magistrate’s Court for the Regional Division of Limpopo held at Lenyenye.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Section 24F of the National Environmental Management Act by the corporation.89 The
crux of this case pertains to criminal liability of a director with respect to conduct
statutorily provided for in the arena of environmental law, but it is worth noting that the
court, upon conviction of the crime, sentenced Maponya to a term of imprisonment
without an option of payment of a fine.90 The sentence was suspended for five years
provided that the damaged land be rehabilitated by the corporation within the given
time period.91 This is the first case in South Africa where a director of the offending
company is found criminally liable in his personal capacity and sentenced to imprison-
ment without the option of a fine.92 It will be interesting to see how this finding may
influence future findings by courts concerning the criminal liability of a director in his
or her personal capacity for corporate malfeasance.
REFERENCES
Allens Arthur Robinson. 2008. “Corporate Culture” as the Basis for Criminal Liability of Corporations.
<http://198.170.85.29/Allens-Arthur-Robinson-Corporate-Culture-paper-for-Ruggie-Feb-2008.pdf>.
Retrieved 10 June 2014.
Anderson DS. 1981. Corporate Homicide: The Stark Realities of Artificial Beings and Legal Fictions.
Pepperdine Law Review. Vol. 8, No. 8: 367–417.
Anderson H. 2008. Directors’ Personal Liability for Corporate Fault: A Comparative Analysis, Kluwer Law
International BV: The Netherlands <http://books.google.co.za/books?id=S-2TZfRm8K4C&pg=PA253
&lpg=PA253&dq=since+S+v+coetzee&source=bl&ots=qLoCAdce94&sig=kAWX7NiPLudxqKYhFrum
3rcrrfY&hl=af&sa=X&ei=3HTXU86 YLIne7AbwlYCwAQ&ved=0CFAQ6AEwBQ#v=onepage&q=since
%20S%20v%20coetzee&f=false>. Retrieved 29 July 2014.
Blair MM 2013. Corporate Personhood and the Corporate Persona. University of Illinois Law Review. Vol.
2013 No. 3: 785–820.
Botha MM and Millard D. 2012. The Past, Present and Future of Vicarious Liability in South Africa. De
Jure. Vol. 2, No. 45: 225–253.
Bowman Gilfillan. 2008. Criminal Liability of Companies Survey. <https://www.lexmundi.com/images/
lexmundi/PDF/Business_Crimes/Crim_Liability_South%20Africa.pdf>. Retrieved 16 July 2014.
Brickey KF. 1982. Corporate Criminal Accountability: A Brief History and an Observation. Washington
University Law Review. Vol. 60, No. 2: 393–423.
Burchall JM. 1997. South African Criminal Law and Procedure: General principles of criminal
law (Volume 1). Juta. <http://books.google.co.za/books?id=bblC71r7vvAC&dq=vicarious+liability+
implementation+in+south+afri ca&hl=af&source=gbs_navlinks_s>. Retrieved 24 July 2014.
Davids L. 1968. Penology and Corporate Crime. Journal of Criminal Law and Criminology. Vol. 58, No. 4:
524–531.
Dejnozka J. 2007. Corporate Entity. <http://www.members.tripod.com/~Jan_Dejnozka/corporate_entity_
book.pdf>. Retrieved 10 June 2014
Ferguson G. 1998. Corruption and Corporate Criminal Liability. <http://icclr.law.ubc.ca/sites/icclr.law.
ubc.ca/files/publications/pdfs/FergusonG.PDF>. Retrieved 23 July 2014.
Hoffman WM. 1982. Corporate Obligations and Responsibilities: Everything Old is New Again (Case
Study – The Ford Pinto). <http://businessethics.qwriting.qc.c uny.edu/files/2012/01/HoffmanPinto.pdf>.
Retrieved 16 July 2014.
Iwai, K. 1997. Persons, Things and Corporations: The Corporate Personality Controversy and Comparative
Corporate Governance. <http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1861919>; also appeared in
American Journal of Comparative Law. 1999. Vol. 47, No. 4: 583–632.
89
Act 107 of1998.
90
Werksmans Attornyes (2014: 2).
91
Ibid.
92
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 14 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 16 /Pg. Position: 15 / Date: 8/9
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
When a company or an individual is subject to a formal insolvency procedure, the
affairs of the company, or the individual, will often be investigated. Depending on the
outcome of those investigations, claims or enforcement action relating to misconduct
may be brought against directors of a company or those in some way involved with the
company or, in the case of personal insolvency, the bankrupt individual. Most actions
arising out of insolvencies are civil in nature and any recoveries made will generally
benefit the creditors of the company or the bankrupt individual. However, there are also
a number of offences which carry criminal liability.
In this chapter, with help from K&L Gates LLP colleagues worldwide, we provide a
high-level overview of insolvency-related criminal offences in a sample of jurisdictions
across the globe, primarily in the corporate sphere.
1
Section 206 of IA86.
2
Section 207 of IA86.
3
Section 208 of IA86.
4
Section 209 of IA86.
5
Section 210 of IA86.
6
Section 211 of IA86.
7
Section 213 of IA86.
8
Section 216 of IA86.
206
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
for a director to make a statutory declaration of the solvency of the company without
reasonable grounds for doing so.
Depending on the offence, defendants to a prosecution under the IA86 may be the
company, its directors, and contributories to the company’s debts or an office holder
appointed in respect of the company. Offences are capable of being committed even by
individuals with a limited connection to the company (promoters and managers);
however, the main category of defendants is formed from past or present company
officers.
The meaning of “officer” was inserted into section 251 of IA86 by the Companies
Act 2006 (“CA06”). Officers are defined as directors, secretaries and managers of the
company, including those occupying the position of director, regardless of their job
title. “Shadow directors”, who are defined as “a person in accordance with whose
directions or instructions the directors of the company are accustomed to act (but so
that a person is not deemed a shadow director by reason only that the directors act on
advice given by him in a professional capacity)”,9 may also incur liability under IA86.
Liquidators, receivers and administrators are not treated as officers of a company unless
expressly included as such in a particular section. The term “manager” has been
defined by case law as meaning someone in the “sphere of management” being a
“person who in the affairs of the company exercises a supervisory control which
reflects the general policy of the company for the time being or which is related to the
general administration of the company”.10
The criminal offences under IA86 can be tried either in the Magistrate’s Court or in
the Crown Court. For offences tried in the Magistrate’s Court, the maximum penalty is
six months’ imprisonment or a fine of £5,000 or both; the penalties in the Crown Court
are higher. There is little guidance and few reported cases on sentencing.
Fraudulent Trading
9
Section 251 of IA86.
10
In Re a Company (No.00996 of 1979) [1980] Ch. 138 at 144, per Shaw LJ.
11
Section 213 of IA86.
12
Re Overnight Ltd [2010] EWHC 613.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Following an application to the court by a liquidator the court can order that any
person who was, in the course of a winding up of a company, knowingly a party to
carrying on the business of the company with intent to defraud creditors of the
company or of any other person, or for any fraudulent purpose, is liable to make such
contributions to the company’s assets as the court sees fit.
Fraudulent trading as a criminal offence carries the risk of imprisonment, a fine or
both. There are criminal sanctions for every person who was knowingly a party to the
carrying on of the business in a fraudulent manner.13 The Fraud Act 2006, which came
into force on 15 January 2007, increased the maximum penalty for contravention of
CA06 from 7 to 10 years.
Another current issue in English insolvency law is “Phoenix Companies”. The re-use of
a name previously used by a company that has gone into liquidation is restricted.14 The
phrase “Phoenix Companies” refers to a new company started by directors and/or
individuals involved in a previous company which has gone into liquidation. Typically,
the assets of the old business are purchased by a party connected to the previous
company; the newly formed company will then continue to trade in a similar manner to
the old company. English legislation does not prevent the formation of a newly formed
company in such circumstances in principle, provided that the relevant provisions in the
IA86 and Insolvency Rules 1986 (“IR86”) relating to the use of the old company’s
name are complied with.
It is an offence15 for a person who has been a director or a shadow director of a
company in insolvent liquidation, within the period of 12 months ending on the day
before it went into liquidation, to be, for a period of five years, a director or involved in
any way in the management of any other company or business carried on under or
known by a “prohibited name” without leave of the court or unless one of the
exceptions in rules 4.226 to 4.230 of the IR86 applies. A prohibited name is any name
by which the liquidated company was known at any time in the 12 months prior to the
liquidation, or any name so similar to suggest an association with that company.
If found to be in breach of section 216 IA86, a director, former director or shadow
director of the liquidating company is liable to imprisonment (two years) or a fine (of
up to £15,000) or both. Liability is strict, and, therefore, mens rea need not be shown.16
Further,17 a former director or shadow director or persons who act on the instructions of
such ex-directors who are in breach of section 216 IA86 may be personally liable for
the debts of the new company for the period in which that company used the prohibited
name.
13
Section 993 CA06 (formerly section 458 CA 1985).
14
Section 216 of IA86.
15
Section 216 of IA86.
16
R v Lees & Birch [1998] B.C.C. 87.
17
Section 217 of IA86.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
18
We are grateful to our colleague Eunice Rim Hudson for her contribution to the US
section of this chapter.
19
18 U.S.C. § 152(1).
20
18 U.S.C. §157.
21
18 U.S.C. §§ 153–157.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
GERMANY23
Under German law, insolvency-related crimes are found in the Insolvency Code
(“Insolvenzordnung”) and the Criminal Code (“Strafgesetzbuch”). There are also
connected relevant offences in the Commercial Code (“Handelsgesetzbuch”), the
Limited Liability Companies Act (“GmbH-Gesetz”) and the Stock Corporation Act
(“AktG”).
The most commonly prosecuted offences24 relate to the undue delay of filing for
insolvency, which is punishable by a fine or by imprisonment of up to three years;25
false accounting, which is punishable by a fine or by imprisonment of up to two
years;26 and bankruptcy involving, inter alia, the misappropriation of company assets
22
United States v Gellene, Case No. 97-00221 (E.D. Wis.) was a notorious case involving
criminal prosecution of a debtor’s counsel for bankruptcy fraud and perjury because counsel
knowingly failed to make disclosure of his and his firm’s connections to parties in interest in the
bankruptcy case. The attorney was sentenced to 15 months in prison, fined US$15,300 and given
two years of probation.
23
We are grateful to our colleague Katja Findeisen for her contribution to this chapter.
24
Police Crime Statistics 2012 (http://www.bka.de/nn_194552/EN/Publications/PoliceCrime
Statistics/policeCrimeStatistics__node.html?__nnn=true).
25
Section 15a of the Insolvency Code.
26
Section 283b of the Criminal Code.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
that would, in the event of the opening of insolvency proceedings, have belonged to the
insolvency estate, or where the misappropriation of such assets has led to the
insolvency of the company. This last offence is punishable by a fine or by imprison-
ment for up to five years.27
German law recognizes both corporate and individual insolvency. However,
insolvency-related criminal offences can only be committed by individuals. “Corporate
bodies” can only commit administrative offences under German law. Therefore, where
there are criminal offences in relation to corporate insolvency the defendants will be
individuals such as managing directors of limited liability companies (“GmbH”), the
members of the management board of a stock corporation (“Aktiengesellschaft”) or the
liquidator of a company during winding-up proceedings.
A practice commonly referred to as “company burials” (“Firmenbestattungen”) is a
particular problem for German law enforcement authorities. This phrase describes the
circumstances where the shareholders of an insolvent company sell their shares to an
impecunious buyer through an agency. However, instead of the buyer paying the
purchase price, the seller makes a so-called takeover payment to either the buyer or the
agency. The managing directors are replaced and the business seat of the company is
re-located, often several times, during which the company files are “lost”. The
company’s business activities then cease and its assets are sold. The new managing
directors then file for insolvency with the knowledge that the insolvency court is likely
to reject the opening of insolvency proceedings due to lack of assets, thus depriving the
company’s creditors. The potential offences committed during this practice include
fraudulent failure to file for insolvency or bankruptcy, false accounting, breach of trust
and for participating in a criminal conspiracy under German law.
ITALY28
Italian insolvency-related crimes are found in articles 216 et seq. of the Royal Decree
16 March 1942, no. 267 (the “Bankruptcy Law”).
Under Italian law, most significant insolvency-related offences arise when a company
has been declared bankrupt. One such offence, which also carries the most severe
penalty of all such offences, is that of fraudulent bankruptcy (“bancarotta fraudolenta”)
set out in articles 216 and 223 of the Bankruptcy Law. This offence is punishable by up
to 10 years of imprisonment and covers situations such as when a company’s assets
have been misappropriated or concealed or where there has been false accounting for
the purpose of obtaining an undue profit. Anyone convicted of this offence is banned
from being a company director for 10 years.
Other offences include reckless bankruptcy (“bancarotta semplice”),29 which occurs
when the financial situation of a company has worsened due to a reckless failure by a
director to file for insolvency (punishable by up to two years of imprisonment), and
27
Section 283 of the Criminal Code.
28
We are grateful to our colleague Andrea Campana for his contribution to this chapter.
29
Police Crime Statistics 2012 (http://www.bka.de/nn_194552/EN/Publications/PoliceCrime
Statistics/policeCrimeStatistics_node.html?_nnn=true).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
FRANCE 31
The main legal provisions regulating insolvency in France are contained in Sixth Book
of the Commercial Code (the “Code”). The provisions governing insolvency-related
crimes are contained in Title V of Sixth Book of the Code (Liabilities and Sanctions)
and in articles 314-7 et seq. of the French penal code (the “Penal Code”).
These offences mainly concern the fraudulent failure to enter into an insolvency
procedure, breaches of the regulations applicable to the insolvency procedures or, more
generally, the taking of action detrimental to the interest of the creditors of the
insolvent entity or individual. Some of the most common specific offences concern
situations where there has been a concealment or embezzlement of all or part of the
debtor’s assets, a fraudulent increase of the debtor’s liabilities created in order to
defraud creditors, fictitious accounting, concealment of accounting records, or an
absence of any accounting records.
Generally, the sanctions applicable to insolvency-related offences in France can be
imposed on individuals subject to insolvency procedures as well as on legal entities and
all persons that have acted as an entity’s representative, whether or not officially
appointed to do so. Relatives of the involved individuals that have wilfully participated
in an offence may also face criminal liability.
Criminal liability for insolvency-related offences may include fines that can reach
€750,000 and imprisonment of up to seven years. The persons held liable may further
be prohibited from holding any management positions in a legal entity or operating any
business for a period of up to 15 years. In addition, representatives of an insolvent legal
entity who are guilty of an offence may be ordered personally to pay all or part of the
entity’s outstanding debts following liquidation.
30
Section 283 of the Criminal Code.
31
We are grateful to our Paris office for their contribution to this chapter.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
RUSSIA32
The main legal provisions regulating insolvency in Russia are contained in the Federal
law N. FZ-127 on “Insolvency (Bankruptcy)”, dated 26 October 2002 (the “Law”).33
The Law currently regulates insolvency of Russian legal entities and individual
entrepreneurs only. However, in December 2014, the Law was amended significantly to
introduce the concept of individual insolvency into the Russian legal system.34
Provisions relating to insolvency of individuals will come into force on 1 July 2015.
The Code of Administrative Offences and the Criminal Code of the Russian
Federation provide for administrative and criminal liability for the following: unlawful
actions during a bankruptcy procedure, including concealing property, proprietary
rights and liabilities; withholding of information with regard to property; transferring,
alienating or destroying property; concealing, destroying or falsification of accounting
records; unlawful satisfaction of proprietary claims of creditors; and actions impeding
activity of liquidators; fraudulent bankruptcy, that is, making a fraudulent public
announcement about the bankruptcy of a company; and deliberate bankruptcy, that is,
deliberate actions or failures to act that result in the insolvency of a company or its
inability to satisfy claims of creditors.
These types of conduct may result in only administrative liability if the damage
caused is insignificant;35 otherwise, such actions constitute crimes under the Criminal
Code and, therefore, lead to criminal liability. Depending on the facts of the case,
administrative or criminal liability for the conduct may be imposed on an entity’s CEO,
founders and other “persons in control” of companies, including liquidators or interim
administrators.
Administrative liability for insolvency-related offences ranges from fines between
5,000 and 50,000 rubles (approximately US$140 and US$1,400) to disqualification
(i.e., prohibition to hold management positions in a legal entity) for a period from six
months to three years. Individuals who commit insolvency-related crimes may be
subject to a fine of up to 500,000 rubles (approximately US$14,000) or to imprison-
ment for a term of up to six years.
In addition to administrative and criminal liability, CEOs, founders and other
“persons in control” of companies or parent companies may, in accordance with the
Russian Civil Code, be subject to subsidiary liability for a company’s obligations,
where their actions result in its insolvency.
32
We are grateful to our colleague Sergei Korovkin for his contribution to this chapter.
33
Insolvency of credit organizations is regulated by the Federal Law N. FZ-40 “On
Insolvency of Credit Organization”, dated 26 October 2002.
34
The amendments were introduced by the Federal Law N. FZ-476 “On Amendments to the
Federal Law on Insolvency and Certain Legislative Acts Related to Rehabilitation Procedures
Applying to an Individual-Debtor”, dated 29 December 2014.
35
Significant damage is that which exceeds 1,500,000 rubles (approximately US$42,000).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CHINA36
The law regulating insolvency in China is the PRC Enterprise Insolvency Law
(“Insolvency Law”). The Insolvency Law regulates the insolvency of enterprises and
companies only; there is no individual insolvency in China. The provisions governing
insolvency-related crimes are more specifically contained in section 5 of Chapter 3
under Part II of the PRC Criminal Law (“Criminal Law”).
There are a few possible offences in relation to insolvency, mainly consisting of
fraudulently launching an insolvency procedure, concealing or forging financial
accounting books in insolvency procedures or misconduct detrimental to the interest of
the insolvent enterprise. The most common offences and crimes are the following:
falsification or destruction of financial accounting reports in liquidation;37 false
declarations of a company’s solvency;38 and misconduct of a person who is directly in
charge of a state-owned company or enterprise.39
The sanctions applicable to the above offences (and generally, to the majority of the
other insolvency-related crimes) are mostly imposed on persons that have acted as
representatives thereof and persons that are directly liable for the insolvency.
Criminal liability for insolvency-related crimes may include imprisonment for up to
7 years. Criminal fines between RMB 20,000 and RMB 200,000 can also be imposed.
Where a director, supervisor or senior manager acts in breach of his obligations, and
his failure leads to the insolvency of the enterprise where he works, he can be made
civilly liable for the losses caused if he has contributed to the lack of assets through
acts of concealing or wrongful distribution of the assets of the insolvent enterprises,
and may be ordered to personally pay all or part of the sums due to creditors that
cannot be paid out of the available assets of the insolvent enterprise. He will also be
prohibited from serving as a director, supervisor or senior manager of any enterprise
within three years of the bankruptcy procedure.
TAIWAN40
The main legal provisions in Taiwan are contained in the Insolvency Act (the “Act”).41
Taiwanese law recognizes both individual and corporate insolvency and the Act
regulates insolvency of Taiwanese legal entities and individuals and provides proced-
ures for insolvency and for settlement between creditors and debtors before insolvency
is declared by the court.
In addition to the civil settlement and insolvency procedures there is a body of
insolvency-related criminal offences. Some of the main insolvency-related offences
committed by insolvent individuals or entities include refusal to submit financial
36
We are grateful to our colleague Cecilia Dai for her contribution to this chapter.
37
Article 162 of the Criminal Law.
38
Article 162 of the Criminal Law.
39
Article 168 of the Criminal Law.
40
We are grateful to our colleague Edith Teng for her contribution to this chapter.
41
The Insolvency Act was first passed in 1935 and was last amended in 1993.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
statements and books, refusal to hand over relevant assets to the administrator and
making false statements in the course of the insolvency procedure.42 Where an
individual or entity commits certain actions described as “insolvency deceptions”,
which are intended to damage creditors’ rights, or these deceptions take place in the
year prior to the declaration of insolvency, this will constitute an offence.43 Falling
short of insolvency deceptions, an individual or entity can also commit certain actions
classified as “insolvency neglect” within one year prior to the insolvency declaration.44
Penalties for insolvency-related offences range from one to five years of imprison-
ment and fines of up to around US$300.
On 11 July 2007, the Taiwanese government announced the “Debt Clearance for
Consumers Act” (the “DCCA”), applicable only to individual consumers, which
provides procedures including rehabilitation, liquidation, negotiation and criminal
penalties. The DCCA is a procedure preceding insolvency, which means that a creditor
cannot apply to the court for an insolvency declaration on a debtor if the debtor has
applied for rehabilitation or liquidation under the DCCA.45
SINGAPORE 46
Singapore has distinct regimes for individual bankruptcy (Bankruptcy Act (Cap 20,
2009 Rev. Ed.)) and corporate insolvency (Companies Act (Cap 50, 2006 Rev. Ed.) and
the Companies (Application of Bankruptcy Act Provisions) Regulations).
The most commonly prosecuted offences in relation to corporate insolvency include
false declarations of solvency in the context of a voluntary winding up;47 not
complying with the requirements for the lodgement of a statement of affairs;48
fraudulent trading;49 and failure to keep proper accounts.50 Commonly prosecuted
offences relating to individual bankruptcy include concealment of property, non-
disclosure of property and making false statements.51
The penalties for the offences are specified in the relevant sections of the Companies
Act and the Bankruptcy Act. Of the corporate insolvency-related offences, fraudulent
trading carries the most severe penalties with a fine of up to S$15,000 and imprison-
ment for up to seven years. Conviction for an individual bankruptcy-related offence can
result in a fine of S$10,000 or imprisonment for up to three years. Insolvency-related
offences can be committed by individuals, corporates and those brought in to deal with
insolvency, such as a liquidator or a judicial manager.
42
Please refer to articles 152 and 153 of the Insolvency Act.
43
Please refer to article 154 of the Insolvency Act.
44
Please refer to article 156 of the Insolvency Act.
45
Please refer to article 13 of the Debt Clearance for Consumers Act.
46
We are grateful to our colleague Paras Lalwani for his contribution to this chapter.
47
Section 293(4) of the Companies Act.
48
Section 270(5) of the Companies Act.
49
Section 340 of the Companies Act.
50
Section 339(1) of the Companies Act.
51
Part X of the Bankruptcy Act.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
As is apparent from the above review, the approach to dealing with insolvency-related
criminal offences can vary in a number of respects. There are, however, several
common themes in the jurisdictions detailed above:
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 17 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
PART IV
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
One of the most striking features of the economic landscape over the past twenty years or so
has been a substantial decline in macroeconomic volatility (Ben Bernanke, 20 February
2004)1
It was possibly the apparent unexpectedness of the 2008 crisis, and the resultant market
panic during which trust all but evaporated, that paved the way for the emergence of an
almost perfect storm of scandal and subsequent accusation that has seen changes in
both the structure of regulation and the emergence of a heightened public and media
interest in ‘bank bashing’. Indeed, having been adopted by the press, this pejorative
term has entered the lexicon as a recognised phrase:
Overreaction, but more bank-bashing ahead. (Ian King, The Times 17 April 2010)
Time for some bank bashing. (Emma McKinney, Birmingham Evening Mail 1 April 2013)
There’s a danger that all this bank bashing will just help our competitors. (Business Section,
The Daily Telegraph 18 June 2013)
Greater press attention on financial markets post-crisis has inevitably raised public
awareness and their opprobrium. Witness the various scandals that have emerged from
1
Remarks by Federal Reserve Board Chairman Governor Ben S. Bernanke at the meetings
of the Eastern Economic Association, Washington, DC, 20 February 2004 available at http://
www.federalreserve.gov/Boarddocs/Speeches/2004/20040220/ (accessed 14 September 2013).
219
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the financial sector and found their way into the public arena: most recently, the
failings in respect of LIBOR setting, colloquially referred to as ‘Libor fixing’, that in
2012 saw UBS2 fined £160 million in connection with the event. In addition to UBS,
other banks publically reprimanded and subject to FSA sanction included both
Barclays3 and RBS,4 who were respectively fined £59.5 million and £87.5 million for
the same market misconduct. Most recently the press has reported on what has been
referred to as the ‘foreign exchange rate fixing scandal’,5 with reports drawing attention
to the fact that the regulators have been investigating allegations of long term collusion
between banks in relation to apparent fixing of foreign exchange rates. In light of this,
it hardly comes as a surprise that ‘highly respected individuals and institutions
(bankers, regulators) suddenly became widely detested’.6
Set against this background, this chapter considers the general principles and
objectives of financial market regulation. It goes on to discuss the changes in the
financial markets in light of some high profile losses but notes that the nature of
capitalist markets is inherently unstable. The chapter concludes with the argument that
the answer to maintaining confidence does not lie in a constant tightening of rules but
rather in the maintenance of a constant and open dialogue between the regulators and
the institutions, and it is this that creates trust.
2
‘UBS Fined £160 Million for Significant Failings in Relation to LIBOR and EURIBOR’,
FSA/PN/116/2012, 19 December 2012 http://www.fsa.gov.uk/library/communication/pr/2012/
116.shtml (accessed 20 July 2014).
3
‘Barclays Fined £59.5 Million for Significant Failings in Relation to LIBOR and
EURIBOR’, FSA/PN/070/2012, 27 June 2012 http://www.fsa.gov.uk/library/communication/pr/
2012/070.shtml (accessed 20 July 2014).
4
‘RBS Fined £87.5 Million for Significant Failings in Relation to LIBOR’, FSA/PN/011/
2013, 6 February 2013 http://www.fsa.gov.uk/library/communication/pr/2013/011.shtml
(accessed 20 July 2014).
5
‘Forex Scandal: What Is That All About?’ BBC Business News, 12 June 2014 available at:
http://www.bbc.co.uk/news/business-26526905 (accessed 20 July 2014).
6
Whittle, A., and Mueller, F., ‘Bankers in the Dock: Moral Storytelling in Action’ (2012)
Human Relations, 65:1, 111 at 112.
7
Mayer, C., ‘Trust in Financial Markets’ (2008) European Financial Management, 14:4,
617 at 620.
8
Htay, S., ‘Corporate Governance and Strategic Information Disclosure in Malaysian Listed
Banks: Panel Data Analysis’, (2012) International Review of Business Research Papers, 8:1,
196.
9
Picciotto, S., and Haines, J., ‘Regulating Global Financial Markets’ (1999) Journal of Law
and Society, 26:3, 351 at 352.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
takes place to correct a perceived failure in what are otherwise regarded as competitive
markets. One of the main market failures that regulation is called upon to counter is
that of informational asymmetry,10 seen to exist between the professional practitioners
within financial markets and the individual users (customers and investors) of the
financial services that they provide.
Thus regulators are very much viewed as ‘technicians acting in the public interest’11
and that ‘the development of codification as institutionalisation’12 is embedded within
the framework such that regulation becomes subject to judgement as to its fairness,
proportionality, targeting and consistency.13 To be effective, regulation also requires
that regulators themselves are open to independent scrutiny, as, if the dominant
paradigm is public interest, it is then imperative that regulators do not fall prey to
actual, or indeed perceived, regulatory capture. Any suggestion of the latter would
undermine the function that regulation plays in reinforcing confidence in financial
markets. Capture occurs where the regulator and those subject to regulation identify
with each other to such an extent that the former cannot envisage rule transgression by
the latter and under which public denouncement and regulatory sanction becomes
unthinkable.
In simple terms prudential regulation establishes the framework that ensures financial
institutions are properly managed, adequately capitalised and have in place appropriate
systems with which to control and monitor risk arising from the portfolio of their
activities. These rules are intended to ensure stability and achieve the underlying
objective of promoting confidence in the financial system. Enforcement of these rules
falls to the national financial market regulator. The 1980s witnessed, through the 1986
Financial Services Act,14 the first comprehensive attempt at wholesale taming of the
financial markets. This Act established multiple self-regulatory bodies which collec-
tively ‘demonstrated … that the City of London was a well regulated market and
therefore an arena of probity and confidence’.15
This was a central tenet of the government at the time and its policy was to open up
access to financial markets to the wider population, whereby the man in the street was
10
Diamond, D., ‘Financial Intermediation and Delegated Monitoring’ (1984) Review of
Economic Studies, 51:3, 393.
11
Ricketts, M., ‘Economic Regulation: Principles, History and Methods’, Chapter 2, 34–62
in Crew, M. and Parker, D. (eds), International handbook on economic regulation (2006)
Cheltenham, UK and Northampton, MA: Edward Elgar at 37.
12
Vass. P., ‘Regulatory Governance and the Lessons from UK Practice’, Chapter 9, 188–205
in Crew, M. and Parker, D., International handbook on economic regulation (2006) Cheltenham,
UK and Northampton, MA: Edward Elgar at 191.
13
Baldwin, R. and Cave, M., ‘Understanding Regulation: Theory, Strategy and Practice’
(1999) Oxford University Press at 77; Kirkpatrick, C. ‘Regulatory Impact Assessment’, Chapter
11, 232–251 in Crew, M. and Parker D., International handbook on economic regulation (2006)
Cheltenham, UK and Northampton, MA: Edward Elgar at 236.
14
Financial Service Act 1986 C60 (Repealed) available at: http://www.legislation.gov.uk/
ukpga/1986/60/pdfs/ukpga_19860060_en.pdf (accessed 31 July 2014).
15
Stanley, C., ‘Mavericks at the Casino: Legal and Ethical Indeterminacy in the Financial
Markets’ (1994) Journal of Asset Protection and Financial Crime, 2:2, 137 at 143.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
16
Gamble, A., ‘Privatization, Thatcherism, and the British State. The Crisis of Social
Democracy’ (1988) Journal of Law and Society, 16:1, 1–20.
17
Johnson, S. and Schleifer, A., ‘Privatization and Corporate Governance’, Governance,
Regulation and Privatization in the Asia-Pacific Region, NBER East Asia Seminar on Eco-
nomics, (2004) 12:13, at 16 and Crew, M. and Kleindorfer, P., ‘Regulatory Economics: Twenty
Years of Progress’ (2002) Journal of Regulatory Economics, 21:1, 5.
18
Pettit, P., ‘The Cunning of Trust’ (1995) Philosophy and Public Affairs, 24:3, 202.
19
Op. cit.footnote 12 at 191.
20
Mascini, P., ‘Why Was the Enforcement Pyramid So Influential? And What Price Was
Paid?’ (2013) Regulation and Governance, 7, 48.
21
Robinson, C., and Marshall, E., ‘The Regulation of Energy: Issues and Pitfalls’, Chapter
15, 325–349 in Crew, M. and Parker, D., International handbook on economic regulation (2006)
Cheltenham, UK and Northampton, MA: Edward Elgar.
22
Harvey, J., and Bosworth-Davies, R. ‘Drawing the Line in the Sand: Trust, Integrity and
Regulatory Misdemeanour’ Security Journal (forthcoming).
23
Bonvin, J. and Dembinski, P., ‘Ethical Issues in Financial Activities’ (2002) Journal of
Business Ethics, 37:2, 187 at 190.
24
The single Financial Services Authority was created by the Financial Services and
Markets Act, 2000 (Financial Services and Markets Act 2000, C 8, available at: http://
www.legislation.gov.uk/ukpga/2000/8/pdfs/ukpga_20000008_en.pdf, accessed 14 September
2013) to replace the multiple self-regulatory bodies.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
25
Op. cit. footnote 13 at 99.
26
For a thorough overview of the UK regulatory landscape refer to Nicholas Ryder ‘United
Kingdom – Policy, Legislative, Regulatory and Enforcement Response’, Chapter 5, 179–235 in
The financial crisis and white collar crime (2014) Cheltenham, UK and Northampton, MA:
Edward Elgar.
27
Briefly: Peter Clowes perpetrated a £17 million investment fraud during the mid-1980s
(refer to: http://www.sfo.gov.uk/our-work/our-cases/historic-cases/barlow-clowes.aspx, accessed
14 September 2013); Johnson Matthey Bank, one of the central London bullion market makers,
collapsed in 1984 and was purchased by the Bank of England for £1 in 1991; Robert Maxwell
had misappropriated £450 million from the pension fund of his company, the Mirror Group
newspapers; the Guinness takeover of The Distillers Company plc in 1986 involved illegal share
support (refer to: http://www.sfo.gov.uk/our-work/our-cases/historic-cases/the-guinness-case.
aspx, accessed 14 September 2013); the 1992 takeover by Blue Arrow of the Manpower
employment agency involved price rigging of the Blue Arrow Shares; BCCI was involved in an
£800 million bank fraud in 1991 (refer to: http://www.sfo.gov.uk/our-work/our-cases/historic-
cases/bank-of-credit-and-commerce-international-(bcci).aspx, accessed 14 September 2013);
Polly Peck collapsed in 1990 and was sued for £378 million by its administrators – Asil Nadir,
who has recently returned to the UK, faced charges for theft and false accounting (refer to:
http://www.guardian.co.uk/business/2010/aug/26/polly-peck-business-asil-nadir, accessed 14
September 2013).
28
Jewkes, Y., Media and crime (2004) London: Sage Publications.
29
Framing refers to the cognitive heuristic in which people tend to reach conclusions based
on the ‘framework’ within which a situation is presented, with evidence that decisions will be
systematically different if information is framed in a positive or negative way.
30
Combs, P., and Slovac, B., ‘Newspaper Coverage of Causes of Death’ (1979) Journalism
Quarterly, 56, 837.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
availability31 bias and media coverage. The manner of how such issues are presented to
society has been noted as an important factor in how perceptions are influenced.
Stallings32 notes that written media play a crucial role in this process.
It is as a result of these various scandals and events that twice the government has
resorted to a very public ‘rearrangement of the deck chairs’ and realignment of the
regulatory structures. As noted, the first of these occurred in 1986 through the Financial
Services Act, responsible for the creation of the various self-regulatory bodies for each
discrete area of the financial sector and their subsequent re-combination to mould the
all-powerful single regulatory authority that was the FSA. This emerged as a result of
31
The availability heuristic explains ease of availability of information recall in the brain –
negative events that are easy to remember are accorded a greater perceived frequency and thus
risk. This ease of recall can be influenced by heavy media coverage where such items are
overstated as risk.
32
Stallings, R. ‘Media Discourse and the Social Construction of Risk’ (1990) Social
Problems, 37:1, 80.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the Financial Services and Markets Act 2000. Sharpened media attention undoubtedly
prompted the FSA to increase the visibility of its regulatory sanction activity via
implementation of a policy of ‘visible deterrence’ over the latter part of the 2000s, and
this did give rise to a gradual increase in the overall size of regulatory fines levied on
rule transgressors. For example, in 2002 the FSA imposed nine fines totalling
£9.4 million, with an average value of £827k and a range of £4k to £4 million. In 2012,
it imposed 53 fines, with a total value of £311.6 million, an average value of £5.9
million and a range from £10k to £160 million.33 Despite these higher sanctions the
UK approach remained in sharp contrast to ‘the American system of enforcement [that]
tends to be more adversarial, litigious and deterrence-based than the more compliance-
oriented British approach’.34
It was, thus, far from unexpected that the latest assault on public confidence
emerging with the 2008 financial crisis, had led to calls for what Moshella and
Tsingou35 referred to as ‘re-regulation’ of these markets and ‘to a more assertive and
interventionist role for the public sector’. In consequence, resulting in the third major
reconfiguration of the regulatory framework that accompanied the Financial Services
and Market Act 2012.36 For the FSA, it was unfortunate that its visible deterrence
efforts proved insufficient to save it from being reorganised and replaced in response to
public criticism that its span of oversight had grown too large for it to be effective. This
Act paved the way for the creation of the Financial Conduct Authority (FCA) and the
Prudential Regulation Authority (PRA) but also broadened and strengthened the law in
relation to market manipulation (arising from the LIBOR setting ‘scandal’) and in
relation to misleading statements and practices and creation of misleading impressions,
which were seen as providing a means of strengthening accountability.
The FSA has lasted barely a decade and was the second failed attempt to balance
self-regulation with formal legislation to guard against City misdemeanours and miscreants.
(‘And so, farewell to the FSA’ Sebastian Walsh, Financial News 9 January 2012)
INHERENT INSTABILITY
Changing the structure of regulation is somewhat predicated on the assumption that it is
possible to intervene and substantially alter past behaviours learned and business
models developed over many years of a free functioning capitalist system.
Unfortunately, what is frequently overlooked is the very real fact that the capitalist
system itself is, by its very nature, unstable, as it centres upon successful profit
generation. This requires companies to pursue and exploit potential market advantage,
33
Op. cit. footnote 22 using data extracted from http://www.fsa.gov.uk/about/press/facts/
fines (accessed 15 July, 2013).
34
Baldwin and Cave, op. cit. footnote 13 at 97.
35
Moshella, M., and Tsingou, E., ‘Regulating Finance after the Crisis: Unveiling the
Different Dynamics of the Regulatory Process’ (2013) Regulation and Governance, 7:4, 407 at
409.
36
Financial Services and Market Act 2012, C21 available at: http://www.legislation.gov.uk/
ukpga/2012/21/pdfs/ukpga_20120021_en.pdf (accessed 31 July 2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
seeking to benefit from the very market anomalies that regulation aims to remove.
Ingrained within this approach is the fact that ‘people in markets act in their own
self-interest’.37 Indeed Minsky38 argued that the existence of regular endogenously
generated financial crises were part and parcel of capitalist economies, setting out his
first and second theorems that identified the predisposition of financial markets to lurch
from one crisis to the next:
The first theorem of the financial instability hypothesis is that the economy has financing
regimes under which it is stable, and financing regimes in which it is unstable
And
The second theorem of the financial instability hypothesis is that over periods of prolonged
prosperity, the economy transits from financial relations that make for a stable system to
financial relations that make for an unstable system. In particular, over a protracted period of
good times, capitalist economies tend to move to a financial structure in which there is a large
weight to units engaged in speculative and Ponzi finance.
Thinking back over the past thirty years, there have been various structural changes to
financial markets and in the wider economy that have created the conditions for
opportunistic profit-driven exploitation as illustrated by the transgressions identified in
Table 18.1 and indeed led to the financial crisis. In 1986, ‘Big Bang’39 opened up the
London financial markets to international competition. One of the consequences of this
was a shift from traditional forms of relationship-based financial intermediation to
transaction-based or marketplace finance. Competition resulted in a driving down of
profit margins, and in light of the need to maintain profit flows attention turned to
developing innovative new products. Significantly, one of the changes was the overt
incentivisation (rather than management) of risk-taking by both individuals (bonus
reward culture) and the firms that employed them (gaining market advantage). The
result was that ‘the efficiency of the financial system grew, but so did its vulnerabil-
ity’.40 Significant, however, was that the City culture was one that ‘placed individual
success and self-reliance as the primary indicators of excellence’.41 To this heady mix
was added the continued economic liberalisation of cross border flows and opening up
of sovereign markets to international capital that enabled institutional investors to chase
short term gains (against a back drop of historically low interest rates) by moving
37
Van de Ven, B., ‘Banking after the Crisis: Towards an Understanding of Banking as a
Professional Practice’ (2011) Ethical Perspectives, 18:4, 541 at 542.
38
Minsky, H., ‘The Financial Instability Hypothesis’, in Stilwell F. and Argyrous G. (eds),
Economics as a social science: readings in political economy (2003) North Melbourne: Pluto
Press, 201 at 203.
39
Big Bang describes the event on 27 October 1986 when the London Stock Exchange
became an international exchange and transferred trading in equities and government bonds from
a physical to an electronic display system (SEAQ).
40
Genschel, P., and Plumper, T., ‘Regulatory Competition and International Co-operation’
(2011) Journal of European Public Policy, 4:4, 626 at 628.
41
Stanley, op. cit. footnote 15 at 139.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
speculative capital around the globe. Similarly, O’Brien42 summed up the origins of the
2008 crisis as arising from:
With the benefit of such hindsight, the financial crisis and indeed the continued
regulatory ‘transgressions’ were and are somewhat predictable. In these circumstances
the challenge facing governments is not to respond to the growing public clamour for
more and tighter regulation but to recognise that we inhabit an unstable system
predisposed to rule-bending and, inevitably, periodic crises. Otherwise we will find that
we enter into a constant upward spiral of regulatory tightening as ‘when beliefs and
presences are produced by a set of probability judgements, made inaccurate by the
availability heuristic, legislation will predictably become anecdote driven’.43
DISCUSSION
The argument being presented here is that there have always been and will always be
financial crises and that changing (synonymous with tightening) regulatory structures
will not prevent their continued occurrence. What is important is rather how the
subsequent reaction of both markets and regulators is managed.
At present, the risk is that the UK shifts from the voluntary and essentially
trust-based model to a US style coercive model without properly understanding that in
so doing they could stifle the very innovation that drives the economy or worse push
such innovative minds to find ways to further circumvent the rules. Indeed, the
introduction of Deferred Prosecution Agreements44 could well be the start of this.
Further, a focus on national systems of supervision based on home country responsibil-
ity for supervision of internationally agreed standards fails to properly recognise the
complexity of operation of financial institutions. It is better to clearly recognise that
‘Arrangements for international regulatory coordination and cooperation still seem to
lag well behind the dynamic of the transformations of finance’45 and this will continue
42
O’Brien, J., ‘The Future of Financial Regulation: Retrieving the Meaning of Accountabil-
ity in Capital Markets’, Institute of International and European Affairs, presentation (2009)
5 November available at: http://www.iiea.com/event/archive_view?urlKey=the-future-of-
financial-regulation-retrieving-the-meaning-of-accountability-in-capital-markets (accessed 7
December 2013).
43
Jolls, C., Sunstein, C., and Thaler, R., ‘Behavioral Approach to Law and Economics’
(1998) Stanford Law Review, July, at 1518. Available at SSRN: http://ssrn.com/abstract=74927
(accessed 27 January 2012).
44
Deferred Prosecution Agreements: new guidance for prosecutors 14 February 2014
available at: http://www.sfo.gov.uk/press-room/latest-press-releases/press-releases-2013/deferred-
prosecution-agreements-new-guidance-for-prosecutors.aspx (accessed 31 July 2014).
45
Picciotto and Haines, op. cit. footnote 9 at 354.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
to be the case. Trust of itself is not something that can be inculcated via legislation. As
pointed out by Harvey and Bosworth Davies,46 trust within financial markets is
underpinned by collective recognition of accepted and exhibited moral standards that
are presumed to embrace both the individual and their employing institution. As long as
we embrace a capitalist system, crises will happen; it is better that regulators have an
open dialogue with the market so that they are informed of an impending problem
sooner and are thus better able to manage the surprises:
I found a flaw. That is precisely the reason I was shocked because I’d been going for 40 years
or more with very considerable evidence that it was working exceptionally well. (Alan
Greenspan, 23 October 2008)47
46
Op. cit. footnote 22.
47
Testimony by former Federal Reserve Chairman Alan Greenspan in front of the US House
Oversight Committee.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 18 /Pg. Position: 10 / Date: 14/10
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
This chapter speaks to two interrelated and important themes of growing significance
on the very edges of what might properly be described to be the boundaries of
contemporary international economic law and the law of economic crime.
The two themes are “economic crime” and “development.” It is argued that the goal
expressed in the latter must involve an appreciation of the root causes and implications
of the former in the context of the modern world economy.
Speaking in Washington in October, the Governor of the Bank of England, himself a
lawyer, spoke of the bankers who caused the financial crisis and who he said despite
facing “limited social embarrassment” were still “on the best golf courses.” The
Governor said that “the individuals who ran the institutions got away with it. They got
away with their compensation packages and without sanction.” He said that “maybe
they are no longer at the most esteemed table in society, but they are still on the best
golf courses and that has got to change.”1
The Governor’s words require no paraphrasing. He was speaking to the fact that none
of the so-called masters of the Universe, whose financial institutions had brought the
world to the brink of apocalyptic ruin in 2008, had been prosecuted in a criminal court.
In fact many had not simply escaped personal criminal responsibility but had also
exited with generous compensation packages.
It is submitted that without both an effective means of linking compensation to a
deferred system of rewards and the enactment of precise criminal rules to punish
inappropriate risk-taking we are perhaps destined to repeat the harsh lessons of the
crash of 2008.
Economic crime in its modern iteration inevitably affects development. And devel-
opment of course is a function of economic growth. It is argued that neither is possible
without effective measures that are designed to protect our economies. The protection
of our economies and the delivery of justice are but the necessary end states of a
recognition of what is myth from reality as contributing factors to the crash,2 and, as a
1
Mark Carney in Daily Mail, “Bankers Caused Crash and Got Away With It, Says Carney:
Bank of England Chief Says Bosses Should Have Paid a Higher Price,” 13 October 2014,
www.dailymail.co.uk/news/article-2790469/bankers-caused-crash.
2
The crash in this context refers to the near collapse of the financial markets in many
countries of the western hemisphere. These countries included the United States, the United
Kingdom, and most of the territories comprising what is today described as the Eurozone. The
Eurozone currently consists of Austria, Belgium, Cyprus, Estonia, Finland, France, Germany,
229
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
consequence, of the steps urgently required to protect world markets from what are
now properly recognized to be existential threats in the aftermath of the crash.
The collapse of money-center financial institutions that was crystallized for many in
the West on the day that Lehman Brothers3 crashed was not in fact the result of the
actions of a vengeful God. Yet for a number of weeks in the fall of 2008 it seemed as
if the very pillars of the world financial markets were indeed about to crash
spectacularly in apocalyptic fashion.
In point of fact the crisis of 2008 was not caused by any one or any combination of
the well-accepted forms of economic crime, such as money laundering, the financing of
terrorism, the facilitation by banks and financial actors of tax evasion, or the
well-recognized forms of corporate misconduct involving insider trading and self-
dealing. Some of these may have been present in isolated instances, but none was the
cause of the crisis of 2008. Instead, and this is well documented in the literature, other
forms of emergent threats were entirely to blame. As such neither domestic legal
systems nor international economic law had any predictable and well thought out
answer ready to address the causes of the crisis of 2008 either at the domestic level or
the international level.
It is submitted that one must explore fully the true causes of the crash if one is to
answer in adequate fashion the specific question, how does one ensure smooth
economic development to protect our economies in the future? The latter involves a
futuristic, more optimistic perspective on how emergent threats of the type that were
disclosed by the crash can be prevented from recurring. The former involves a
necessary but perhaps less hopeful analysis of opportunities missed and warning signs
ignored with respect to the true causes of, not the mythical reasons advanced for, the
crash.
Greece, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Portugal, Slova-
kia, Slovenia, and Spain, but the effects of the financial crisis were most acutely felt in Germany,
France, Ireland, Italy, Portugal, Spain, and Greece.
3
The iconic Wall Street firm that was Lehman Brothers collapsed when frenzied attempts
to save it failed in the early morning of Monday September 15 2008; its demise is meticulously
described in the book Too Big to Fail authored by Andrew Ross Sorkin, Viking, 2009.
4
Rider, B. (1980) “The promotion and development of international co-operation to combat
commercial and economic crime.” Paper presented at 1980 Meeting of Commonwealth Law
Ministers, Commonwealth Secretariat, Barbados.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
5
Sen, A. (2009), “Capitalism Beyond the Crisis,” New York Review of Books, 56(5), 26
March.
6
Stiglitz, J.E., “The Dismal Economist’s Joyless Triumph.” 1 December 2008, http://
www.project-syndicate.org/commentary/the-dismal-economist-s-joyless-triumph.
7
An unlikely source who was arguably the most influential of the financial regulators in the
period before the crash.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Yet if there was in fact a failure of regulation this begs the question: what was
required to be regulated? Banks and corporate financial actors are not automatons.
They behave at the command of real individuals. It is submitted that the risky trades
that caused the global crisis were engineered by real persons so that personal
responsibility for those trades ought to be attributed to those who facilitated the trades,
the bankers identified by the Governor of the Bank of England.8
8
Supra, at Note 1.
9
Supra, at Note 6.
10
Royal Brunei Airlines v Tan [1995] A.C. 378.
11
Penn, G.A. , A.M. Shea, and A. Arora, The Law and Practice of International Banking,
London: Sweet and Maxwell, 1987.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
appreciate the nature of the apocalyptic crisis that struck throughout the financial world
less than a quarter century later.
On the definition of “risk,” the modern texts on finance law are obviously
transformed. Hudson12 describes the concept of “financial risk management” before
turning attention to an impressive catalogue of the “species of risk.” The author does
not stop there. The first risk identified is that of “systemic risk,” which the author
defines to be the risk that
if one sufficiently large market participant, or a few market participants, were to go into
insolvency then that would have the effect of putting sufficient pressure on other market
participants to whom the insolvent party owed money so that those other market participants
would similarly go into insolvency, with a further effect on yet more market participants with
whom that second tier of insolvent entities had dealings.
The authors conclude their discussion of “systemic risk” by averring that “systemic risk
is the greatest risk which financial markets face. It is the risk that the entire financial
system might cease to function.”
THE CRASH
When the meltdown occurred in the money-center banks in 2008 and 2009 it was
precisely this event or risk that occurred. The risk that the entire financial system would
cease to function caused real failures and perhaps more significantly the fear of
imagined failures.
The trigger of the systemic crisis was perhaps the near collapse of Bear Stearns. The
bankruptcy of Bear Stearns was averted only by the intervention of the United States
government, which engineered a takeover by JP Morgan Chase of the company at a
fraction of what the market price had been for its shares mere days before. The United
States government facilitated the transaction by taking thirty billion dollars’ worth of
losses from the worst assets held by Bear Stearns. Lehman Brothers, the iconic
behemoth, was then allowed to fail on the morning of 15 September 2008 when the
firm filed for bankruptcy protection at one forty five in the morning in the Southern
District of New York. The second and even third tier counterparties most affected by a
Lehman Brothers collapse were Merrill Lynch and, incredibly, American Insurance
Group, which held of course, through its monopoly on airline lease financing, a
position of complete dominance in the airline industry. As the events unfolded there
were buy-outs of Washington Mutual, Wachovia Bank, and of course Merrill Lynch
itself, all under the watchful and attentive care of the United States government. The
failure of Lehman was restricted only by aggressive government action led in the main
by the then Secretary of the Treasury Hank Paulson, which ensured that Lehman’s
counterparties would set off outstanding transactions owed between themselves and
Lehman, particularly in their exposure to derivatives, and that a certain part of Lehman
would then be auctioned off. In the end it took unprecedented government intervention
12
Hudson, A., The Law of Finance, 1st Ed., London: Sweet and Maxwell, 2009.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
in the United States to prevent systemic risk from translating itself into financial
apocalypse.13
The wonder was that all of this obvious apocalyptic activity took place completely
outside the parameters of traditional economic criminal activity. In this regard it is
noteworthy that, outside of the money-center banks, financial institutions in other parts
of the world with rather more basic and traditional practices in the business of banking
were relatively unscathed – Australia, South Africa, Brazil, and China for example.
The cause of the crash then was in part a system-wide failure to properly regulate
money-center financial actors. Banks in money centers, or rather the executives who
ran these banks, involved themselves in activities not traditionally known to constitute
the business of banking – “trades” that had nothing to do with deposit taking and
mortgage and consumer lending on margins became the “new business of the banks.”
In addition to the system-wide failure at the macro level, one must acknowledge as a
proximate cause of the crash the actual involvement of the bank executives who crafted
and engineered the risky trades that precipitated the bank failures.
With the benefit of hindsight it is now clear that Greenspan’s laissez-faire approach
and the practice of “light touch” regulation in the City of London both contributed to
the absence of a proper regulatory framework. This in turn facilitated the behavior of
the executives, which together caused the crash.
This is not to say that the risk of systemic failure was entirely unrecognized before
the crash either at the domestic level or at the international level. The contrary is true.
As far back as January 1987 a consultative paper entitled “Convergence of Capital
Adequacy Assessment in the United Kingdom and the United States” was published by
an impressive cross-border group of institutions including the Board of Governors of
the Federal Reserve System, the Federal Deposit Insurance Corporation and the Office
of Comptroller of Currency in the United States working together with the Bank of
England.14 The paper failed to deal with systemic risk but demonstrated an awareness
of the inadequacies of the existing capital adequacy structures to deal with certain
forms of off balance sheet items such as revolving underwriting facilities, standby
letters of credit, acceptances, and, interestingly, “interest rate and foreign exchange rate
related transactions,” as the early market in swaps and derivatives was confined to. The
involvement of cross-border regulators was also an early recognition that coordinated
action across borders was required to curtail emergent risks in a world even then
defined by cross-border financial trading.
In another paper, “Large Exposures Undertaken by Institutions Authorised under the
Banking Act 1979,” issued by the Bank of England in the spring of 1987, a distinction
was drawn between banks and non-banks. Yet another consultative paper, published
later in the spring of 1987 by the Bank of England on “Credit Equivalent Amounts for
Interest Rate and Foreign Exchange Rate Related Instruments,” was intended to be a
part of the joint paper published by the United States entities and the Bank of England
in 1987 to which reference has already been made.15 The consultative paper distin-
guished between the instruments which were common at the time: cross-currency
13
These events are detailed in Too Big to Fail, supra, at Note 3.
14
See generally Penn, Shea and Arora, supra, at Note 11.
15
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
swaps, forward foreign exchange contracts, foreign currency options, forward rate
agreements and single currency rate swaps. In assessing a risk value of the various
types of transactions, the paper proposed that two factors should be taken into account,
“current exposure” and “potential exposure,” the former denoting the replacement cost
to the bank of the expected payment stream to be derived from the transaction, the
latter the contingent exposure in respect of the duration of the agreement.
The systemic risks to global finance were monitored by the BIS which had, in developing the
Basel Accord commonly described as Basel II, promulgated capital adequacy standards in an
attempt to ensure that the banking giants which were increasingly fuelling international trade
and wealth in a borderless world were themselves relatively protected from credit risk. In
these pages the author expressed the view cited before, that what was then the new trade in
derivatives posed a new, quite different type of risk to worldwide financial systems. This risk
was identified at the time by others. The view which the author expressed in these pages was
that the risk to worldwide financial systems and economic stability posed by these new
instruments required a materially different and more coordinated approach to financial
regulation if systemic risk was to be avoided in the future. The author argued in these pages
17 years ago that risk was not static so that capital adequacy standards which were weighted
and required to be applied to financial institutions to address traditional banking transactions
were inappropriate to deal with the innovations posed by the development of the trade in
swaps and derivatives.
Ultimately, of course, the financial actors did in fact fail and were then rescued by
taxpayer funds generally but not exclusively in the United Kingdom and in the United
States. Hudson17 estimates that roughly one sixth of Global Gross Domestic Product
went into the rescue of the money-center banks. The United Kingdom government put
some fifty billion pounds towards the recapitalization of British banks and the United
States government finally managed to have Congress appropriate close to a trillion
dollars to buy up the “toxic assets” which had provided the breeding ground for the
metastatic delivery of derivatives that eventually brought the banks to their collective
knees.
16
Jeremie, J.S. (2012), “Known Risk in a World of Unknown Threats: The Character and
Implications of Risk in the Context of Economically Motivated Crime,” Vol. 33 No. 8. Co. Law.
231.
17
Hudson, supra, at Note 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
International trade of goods and services between states and multinational corporations
expands every year. For this vast nexus of complicated business transactions to occur with
regularity, uniform rules of international economic law must be in place and must be
observed by the participant actors. These rules have evolved in large part since 1970,
although the continued development of new technologies makes necessary the constant
production of new legal rules. The protracted nature of this process is well illustrated in the
need for international economic law for regulating the myriad international financial
transactions that occur through the Internet every day.
There were at least two core reasons for the spectacular failures that took place in the
money-center banks that adversely affected development throughout the world in 2008
and 2009. The first was the existence of toxic mortgages and the unregulated trade in
derivatives that ensured that the risk in these securitized mortgages would be widely
held by the money-center banks. But securitization and the derivatives market would
not themselves have existed without the innovations in technology fed by the computer
and internet age and, critically, the incentives for bankers to leverage these instruments
and the markets in which trades were conducted by super charging executive pay and
remuneration. The second reason for the crash and the reversals in development was
therefore greed and excessive compensation packages paid to the executives in these
financial institutions.
18
Joyner, C. (2005), International Law in the 21st Century: Rules for Global Governance,
Lanham, MD: Rowman & Littlefield Publishers, at p. 283.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
There is now some international consensus around BASEL III and raising capital
adequacy requirements and liquidity ratios. There is also, on the international level, the
Financial Stability Board of the G20 that is encouraging both the design and auditing
of a new financial architecture that it is hoped will prevent a repeat of the crash. These
measures, if developed in a timely fashion, will help to ensure that banks and financial
actors have enough cash on their books to avoid the type of systemic and cascading
failures that took place in 2008 which so remarkably affected development and growth
worldwide.
On the national level Dodd-Frank has now been enacted in the United States (and
market actors have accepted mandates of the so-called Volcker Rule). Similarly, in the
United Kingdom the “Ring Fencing” of proprietary bank funds seems now to be
holding sway as a guiding principle. Together with the activity described before on the
international level, these measures can only serve to ensure a more prudential approach
to regulatory activity.
There remain, however, the failures that are still likely in respect of the absence of
hard criminal sanctions catalogued by the Governor of the Bank of England.19 Since
2007 the world has had to learn again the hard lesson that timeless underlying evils
such as “greed” and “excess,” which have invariably characterized criminal activity, are
now generally accepted to have also characterized the behavior of some of the
executives of the large failed financial actors in the development of complicated and
sometimes unworkable financial instruments.
This behavior, perhaps, as the behavior of some of the stewards of financial firms,
might be as much deserving of the label “economically motivated crime” as “corrup-
tion,” “money laundering,” “insider trading,” and “drug trafficking,” the usual and
known subjects of attention in international economic crime, might be.
Two rather large questions remain unresolved. The first is, exactly who will enforce
the new “rules of the road?” Will it be state regulators or one regulator? The present
thinking inclines to the former, but there are obvious benefits to be gained from the
latter in a world which is increasingly defined by borderless financial activity.
The second is, will these new rules in fact deliver justice and protect economic
development in the future? That is a question which none of us can realistically answer
today. A proper appreciation of the causes of the crash must mean that regulators will
now address in a meaningful and comprehensive way the trade in derivatives, capital
adequacy, and curbs on pay structures that encourage irresponsible market activity.
More is obviously required. Sanctions in the form of criminal punishment to deal with
reckless actions by corporate executives are obviously also now required.
19
Supra, at Note 1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 19 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Much of the agenda for financial regulation is driven by the international organisations,
which produce ‘soft law’ instruments that are converted into legislative form in the
various jurisdictions.1 One example of this is the Basel documents that the Basel
Committee on Banking Supervision has published, which do not have direct effect. The
Basel II Framework has been transposed into the laws of many countries,2 and the
Basel III Framework is undergoing the same process.3
The international organisations are constantly active in producing guidelines for
areas of financial regulation that have gone awry. For instance, both the Financial
Stability Board (FSB) and the International Organization of Securities Commissions
(IOSCO) have produced instruments concerning credit rating agencies and, more
recently, financial benchmarks.4 These organisations tend to work together, and in
1
For a synopsis, see Graeme Baber ‘International Financial Regulation: Order or Chaos?’
[2012] 33(1) Comp Law 17.
2
The final rules for the transposition of the Basel II Framework are in force in Argentina,
Australia, Brazil, Canada, China, Hong Kong, India, Indonesia, Japan, Korea, Mexico, Saudi
Arabia, Singapore, South Africa, Switzerland, Turkey, the United States of America and the
European Union – including Belgium, France, Germany, Italy, Luxembourg, the Netherlands,
Spain, Sweden and the United Kingdom (Basel Committee on Banking Supervision, Progress
Report on Implementation of the Basel Regulatory Framework, April 2014, 4–21, <http://
www.bis.org/publ/bcbs281.htm> accessed 14 August 2014).
3
No country has implemented all of the Basel III Framework yet, although the following
countries have made substantial progress: Argentina, Australia, Canada, China, India, Russia
(even though the Basel II Framework is not fully in force in the national legislation), Saudi
Arabia, Singapore, South Africa, Switzerland, Turkey, the United States of America and the
European Union – including France, Germany and Italy (see supra at n. 2).
4
In 2014, the IOSCO published an assessment methodology, in order to assist the
assessment of the extent of implementation of the IOSCO’s Principles for Financial Benchmarks
(IOSCO, Assessment Methodology: IOSCO Principles for Financial Benchmarks, January 2014,
4, <http://www.iosco.org/library/pubdocs/pdf/IOSCOPD415.pdf> accessed 12 August 2014).
The FSB published the Final Report of the Market Participants Group on Reforming Interest
Rate Benchmarks, a report entitled ‘Reforming Major Interest Rate Benchmarks’, pursuant to the
findings of the Market Participants Group (which is available at <http://www.financial
stabilityboard.org/publications/r_140722.pdf> accessed 12 August 2014), and a consultative
document entitled ‘Foreign Exchange Benchmarks’ – which contains the findings of a FSB
Foreign Exchange Benchmark Group comprising public financial organisations of Australia,
Canada, Germany, France, India, Japan, Mexico, Singapore, Switzerland, the United Kingdom,
the United States of America, together with the European Central Bank, the IOSCO and the
Secretariat of the FSB (<http://www.financialstabilityboard.org/publications/r_140715.pdf>
accessed 12 August 2014).
239
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
co-ordination with the governments of the largest countries, in order to lay down a
framework for financial regulation on a global basis.5
The financial crisis of 2007–2009 revealed a number of difficulties in the sector,
which have been addressed – not least in the establishment of the FSB as the
‘enhanced’ successor of the Financial Stability Form.6 The FSB’s objectives are ‘to
coordinate at the international level the work of national financial authorities and
international standard setting bodies (SSBs) in order to develop and promote the
implementation of effective regulatory, supervisory and other financial sector policies’
and ‘to address vulnerabilities affecting financial systems in the interests of global
financial stability’.7
Whilst the origin of this crisis was in the structured finance market in the United
States of America,8 there were other contributory factors – including inadequate
corporate governance and poor financial risk management.9 The FSB has published
recommendations over these areas. These will be considered below, together with some
of the legislation that has been enacted in my jurisdiction – the European Union (EU)
and, in particular, the United Kingdom (UK).
In October 2009, the FSB reported that firms were introducing changes to increase
the engagement of senior managers and board directors with issues of risk manage-
ment, and to strengthen the standing of this discipline.10 However, it was not clear as to
whether those adjustments were contributing to better corporate governance.11 Only a
few organisations demonstrated improvements in the financial expertise of their board
directors.12 Nonetheless, boards of directors and senior managers have provided their
risk management departments with more resources, independence, influence and
authority than previously.13
In respect of systemically important financial institutions (SIFIs), supervisors expect
an effective board of directors that sets a tone which transmits the financial institution’s
risk culture, ensures that an executive team of high-quality is in place, monitors this
5
For example, the G20 asked the FSB to oversee the implementation of principles
concerning the trading of over-the-counter financial derivative contracts, which it has duly done
(Graeme Baber ‘The EMIR of Strasbourg: A Three Year Journey from Pittsburgh’ [2013] 34(4)
Comp Law 117). Furthermore, the G20 requested the FSB to undertake its review on interest
rate benchmarks, and IOSCO has worked together with the FSB’s Official Sector Steering Group
on this project (Reforming Interest Rate Benchmarks, 1, supra at n. 4).
6
FSB, Charter of the Financial Stability Board, June 2012, 1, <http://www.financial
stabilityboard.org/publications/r_120809.pdf> accessed 16 August 2014.
7
FSB, Charter of the Financial Stability Board, June 2012, 2, Art 1.
8
Graeme Baber ‘UK Banking and the Financial Crisis’ [2013] BPP Law School Opinion
Piece – The Banking Crisis – April 2013, 3.
9
RM Lastra and G Wood ‘The Crisis of 2007–09: Nature, Causes and Reactions’ [2010]
13(3) JIEL 531, 541–543; RM Lastra and G Wood ‘Responses to the Financial Crisis’ [2011]
26(7) JIBLR 307, 308.
10
FSB, Senior Supervisors Group: Risk Management Lessons from the Global Banking
Crisis of 2008, 21 October 2009 (Risk Management Lessons), 22, <http://www.financial
stabilityboard.org/publications/r_0910a.pdf> accessed 18 August 2014.
11
Risk Management Lessons, 22.
12
Risk Management Lessons, 23.
13
Risk Management Lessons, 23.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
team’s ability to carry out the agreed strategy, comprehends the business model,
challenges management on adherence to the to the agreed framework on the firm’s risk
appetite,14 encourages dialogue and debate – supported by reliable, comprehensive and
understandable information on the issues that are relevant to the organisation and its
business operations, and have a diversified membership – in order to broaden the
discussion on its business strategy and to promote dialogue on the relevant matters.15
Supervisors are increasingly communicating with the board of directors, in order to
ensure that it is focused on issues of strategy and of risk.16
Supervisors must regularly engage with directors and senior managers, in order to
monitor their performance.17 Supervisors should satisfy themselves that financial
institutions have the necessary processes in place to assess applicants for a position on
the board of directors or a senior management role at a SIFI, and to ensure that
applicants are qualified and competent for their prospective role.18
It is important for SIFIs to have strong, competent and independent risk management
and internal audit functions.19 Furthermore, each financial institution should enable its
Chief Risk Officer (CRO) and Chief Audit Executive to be able to challenge its
managers on the business strategy in the light of the organisation’s risk appetite
framework.20 The CRO should be able to thematically present risks to the board of
directors, and to identify similar risks and control requirements across the firm.21
Given the crucial significance of qualified and experienced leaders to the safety and
soundness of a financial institution, it is essential that there are effective, actionable
succession plans in place for senior managers – especially those in the control
functions.22 These organisations, and SIFIs in particular, should operate personnel
management processes that provide for the proactive identification of gaps in staffing
and orderly succession in key roles.23 The firm should develop a pool of talent of
persons who have adequate experience and sufficient exposure to the top management
throughout their career.24 Knowledge of the identified successors gives an opportunity
to supervisors to engage with these people in their current roles, and helps to shape
14
A financial institution’s risk appetite comprises the established risk limits for its business
activities or units, or its legal entities (FSB, Increasing the Intensity and Effectiveness of SIFI
Supervision: Progress Report to the G20 Ministers and Governors, 1 November 2012 (Increas-
ing SIFI supervision), 12, <http://www.financialstabilityboard.org/publications/r_0910a.pdf>
accessed 18 August 2014).
15
Increasing SIFI supervision, 9.
16
Increasing SIFI supervision, 9.
17
Increasing SIFI supervision, 10.
18
Increasing SIFI supervision, 10.
19
Increasing SIFI supervision, 10.
20
Increasing SIFI supervision, 11.
21
Increasing SIFI supervision, 11.
22
Increasing SIFI supervision, 11. The control functions are the compliance, internal audit
and risk management departments.
23
Increasing SIFI supervision, 11.
24
Increasing SIFI supervision, 11.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
their views about the quality of these individuals – especially in respect of management
of risks at globally systemically important financial institutions (G-SIFIs).25
It is difficult for a financial institution to implement a risk appetite framework that is
measurable and actionable, due to the large number of ways to measure risk (risk
metrics) and the difficulty of introducing sufficiently sophisticated information tech-
nology systems to identify and aggregate the potential for losses (risk exposures).26
Consequently, its senior officers may not be able to instil a strong risk culture across
the organisation – as its risk appetite and risk culture reinforce each other.27
More evidence is required of risk appetite being converted into the firm’s culture
shown in operational practices.28 Even though culture is hard to measure, financial
institutions and supervisors should give more attention to this matter.29 Indicators of a
sound risk culture and control environment are that difficulties are recognised and
escalated as appropriate, the institution’s risk tolerance is clearly communicated, and
there exist controls and incentives for the organisation’s risk profile to remain within
the boundaries set.30 A careful combination of metrics, such as the number of risk
limits breached and the cause of these contraventions, the way in which problems that
internal audit reports have identified are addressed, and awareness of the troubles
before their crystallisation, can help to evaluate a financial institution’s risk culture.31
Supervisors should assess whether boards of directors have devoted enough discussion
and time to ensure that their firm’s specified risk appetite aligns with its risk culture,
and have established a process for communicating and assessing this culture – such as
employee surveys, on-line tutorials, presentations and workshops.32
Supervisors should contemplate whether a financial institution’s risk culture is
suitable for the nature, scale and complexity of the firm’s business, and based on good,
25
Increasing SIFI supervision, 12. The FSB regularly publishes lists of globally systemically
important banks (G-SIBs) and globally systemically important insurers (G-SIIs). The G-SIBs are
currently Hong Kong and Shanghai Banking Corporation (HSBC), JP Morgan Chase, Barclays,
BNP Paribas, Citigroup, Deutsche Bank, Bank of America, Credit Suisse, Goldman Sachs,
Group Crédit Agricole, Mitsubishi UFJ FG, Morgan Stanley, Royal Bank of Scotland, Union
Bank of Switzerland (UBS), Bank of China, Bank of New York Mellon, Banco Bilbao Vizcaya
Argentaria (BBVA), Groupe Bank Populaire and Caisse d’Épargne (Groupe BPCE), Industrial
and Commercial Bank of China Limited, Internationale Nederlanden Groep (ING) Bank,
Mizuho FG, Nordea, Santander, Société Générale, Standard Chartered, State Street, Sumitomo
Mitsui FG, Unicredit Group and Wells Fargo (FSB, 2013 update of global systemically
important banks (G-SIBs), 11 November 2013, 3, Annex I <http://www.financialstability
board.org/publications/r_131111.pdf> accessed 18 August 2014). The G-SIIs are Allianz SE,
American International Group Inc., Assicurazioni Generali SpA, Aviva plc, Axa SA, MetLife
Inc., Ping An Insurance (Group) Company of China, Ltd., Prudential Financial Inc. and
Prudential plc (FSB, Globally Systemically Important Insurers (G-SIIs) and the Policy Measures
that will Apply to Them, 18 July 2013, 4, Annex I <http://www.financialstabilityboard.org/
publications/r_130718.pdf> accessed 18 August 2014).
26
Increasing SIFI supervision, 12.
27
Increasing SIFI supervision, 12.
28
Increasing SIFI supervision, 12. See supra at n. 14, for a description of ‘risk appetite’.
29
Increasing SIFI supervision, 12.
30
Increasing SIFI supervision, 12.
31
Increasing SIFI supervision, 12.
32
Increasing SIFI supervision, 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
clear values that the organisation’s leadership manages painstakingly.33 They should set
expectations for the board of directors to oversee the role of managers in promoting
and maintaining a stable risk culture, convey these aims to the board and to senior
management, and ensure that there is continuous follow-up on whether these objectives
are satisfied.34
Supervisors are presented with the challenge, for each firm that they oversee, of
finding the correct balance between taking an intensive, proactive approach and not
inordinately influencing strategic decisions of its management.35 In the corporate
model, the entity’s board of directors are accountable to its shareholders for the
decisions that it takes. Overregulation minimises the rights of shareholders, which they
purchase from the company in accordance with the settled law.
In February 2009, the EU recognised that determinants of the financial crisis
included ‘fundamental failures in the assessment of risk, both by financial firms and
those who regulated and supervised them’.36 It stated that shortcomings in risk
management and risk assessment were compounded by failure in ‘the checks and
balances of corporate governance’.37 The boards of directors and senior managers of
financial institutions neither comprehended the characteristics of the new, complex
financial products in which they were trading, nor were aware of the size of the risk
exposures of their firms.38 Furthermore, neither the shareholders nor the directors of
these companies provided the necessary oversight or control of their managers.39
Moreover, remuneration and incentive schemes within financial firms contributed to
excessive risk-taking by rewarding the short-run expansion of the volume of risky
trades, rather than the long-run profitability of corporate investments.40 In addition,
shareholders put pressure on management to provide higher share prices and dividends,
which encouraged the board of directors to set a quarterly (i.e. short-term) benchmark
for its company’s performance.41
The EU’s de Larosière Report substantially criticised the role of the regulators of
financial institutions.42 In particular, they focused on the micro-prudential supervision
of individual financial firms, and insufficiently ‘on the macro-systemic risks of a
contagion of horizontal shocks’.43 Further, they were reluctant to take unilateral action,
33
FSB, Guidance on Supervisory Interaction with Financial Institutions on Risk Culture: A
Framework for Assessing Risk Culture, 7 April 2014 (Supervisory interaction on risk culture), 2,
<http://www.financialstabilityboard.org/publications/r_0910a.pdf> accessed 27 August 2014.
34
Supervisory interaction on risk culture, 2.
35
Supervisory interaction on risk culture, 4.
36
European Commission, The High-Level Group on Financial Supervision in the EU
(Chaired by Jacques de Larosière): Report, 25 February 2009 (de Larosière Report), 8, para 13,
<http://ec.europa.eu/internal_market/finances/docs/de_larosiere_report_en.pdf> accessed 27
August 2014.
37
de Larosière Report, 10, para 23.
38
de Larosière Report, 10, para 23.
39
de Larosière Report, 10, para 23.
40
de Larosière Report, 10, para 24.
41
de Larosière Report, 10, para 24.
42
de Larosière Report, 10-11, paras 25–31.
43
de Larosière Report, 11, para 29.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
44
de Larosière Report, 11, para 29.
45
de Larosière Report, 11, para 30.
46
CRD IV is Directive 2013/36/EU on access to the activity of credit institutions and the
prudential supervision of credit institutions and investment firms [2013] OJ L176/338 (Directive
2013/36/EU).
47
Directive 2013/36/EU, art 74(1).
48
Directive 2013/36/EU, art 76(3). The financial supervisory authority of each Member
State may permit a credit institution or investment firm that is not classed as significant to
combine the risk committee and the audit committee (Directive 2013/36/EU, art 76(3)).
49
Directive 2013/36/EU, art 76(3).
50
Directive 2013/36/EU, art 76(5).
51
Directive 2013/36/EU, art 76(5).
52
Directive 2013/36/EU, art 88(1).
53
Directive 2013/36/EU, art 88(1).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The firm’s board of directors shall possess sufficient collective knowledge, skills and
experience to be able to comprehend its activities, including the main risks.54 Each
director shall act with honesty, independence and integrity to effectively examine and
challenge the decisions of the senior management as far as is necessary, and to
effectively supervise and monitor the decision-making of managers.55
This is a high standard for the board of directors of financial institutions to reach.
Furthermore, the idea that a firm’s risk management division can identify, measure and
report all material risks requires a substantial level of competence in its employees. So,
how does the UK’s approach dovetail with the new EU legislation?
The regulation of corporate governance in the UK, outside the framework of the
Companies Acts, which are much older, dates from 1992 with the Cadbury Report.56
The Committee on the Financial Aspects of Corporate Governance, chaired by Sir
Adrian Cadbury, was set up to consider the following matters in relation to financial
reporting and accountability and to make recommendations for good practice:
(a) directors’ responsibilities for reviewing and reporting on performance to share-
holders and others, (b) the case for audit committees of the board of directors,
(c) auditors’ main responsibilities and the extent and worth of the audit, (d) the
connections between shareholders, boards and auditors, and (e) any other issues of
relevance.57
The Cadbury Report’s main recommendations are a familiar part of British corporate
structure today. For instance, recommendation 1.1 states: ‘The board [of directors]
should meet regularly, retain full and executive control over the company and monitor
the executive management.’
After the publication and incorporation of the Greenbury58 and Hampel59 Reports,
the updated recommendations became the Combined Code on Corporate Governance.60
After revisions in 2003, 2006 and 2008, the next revision of this Code in 2010 was
renamed ‘The UK Corporate Governance Code’ (the Code), now in its second edition.61
54
Directive 2013/36/EU, art 91(7).
55
Directive 2013/36/EU, art 91(8). The chief executive officer is responsible for running the
company. The chairman is responsible for running its board of directors.
56
Committee on Financial Aspects of Corporate Governance, Report of the Commission on
the Financial Aspects of Corporate Governance, 1 December 1992 (Cadbury Report), <http://
www.icaew.com/en/library/subject-gateways/corporate-governance/codes-and-reports/cadbury-
report> accessed 27 August 2014.
57
Cadbury Report, 61, Appendix 1.
58
Study Group on Directors’ Remuneration, Directors’ Remuneration: Report of a Study
Group chaired by Sir Richard Greenbury, 1 July1995, <http://www.ecgi.org/codes/documents/
greenbury.pdf> accessed 28 August 2014.
59
The Committee on Corporate Governance, Committee on Corporate Governance: Final
Report, January 1998, <http://www.ecgi.org/codes/documents/hampel.pdf> accessed 28 August
2014.
60
The Committee on Corporate Governance, The Combined Code: Principles of Good
Governance and Code of Best Practice, June 1998, <http://www.ecgi.org/codes/documents/
combined_code.pdf> accessed 28 August 2014.
61
Financial Reporting Council, The UK Corporate Governance Code, September 2012
(Corporate Governance Code), <https://www.frc.org.uk/Our-Work/Publications/Corporate-
Governance/UK-Corporate-Governance-Code-September-2012.pdf> accessed 28 August 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
The Code is applied to companies whose shares are listed on the London Stock
Exchange on a ‘comply or explain’ basis,62 other than some provisions that do not
apply to companies below the FTSE 350.63 ‘Comply or explain’ means that a listed
company must either follow each specific provision of the Code, or explain to its
shareholders the reasons for it not doing so.64 This explanation should include an
account of how the company’s practices relate to the main principle in the Code to
which the specific provision relates, contribute to good governance and further the
achievement of its business objectives.65
Thus, in the UK, the ‘comply or explain’ system of corporate governance applies to
listed companies outside the financial sector, whilst listed and non-listed banks and
investment firms are required to respect the banking governance provisions of CRD IV.
Before CRD IV was enacted, Dr. Max Barrett gave the following opinion.
Whilst it is not yet the case that ‘comply or explain’ is overruled by legislative
requirements for, say, manufacturing companies, there is acceptance within the UK that
the traditional approach of company law, which holds that there is a (unitary) board of
directors accountable to shareholders, is not sufficiently robust to regulate financial
institutions in the current economic climate. Nevertheless, the necessary strengthening
of corporate governance in these firms may not best be achieved by new legislation.
The Walker Review expresses this view succinctly.
The behavioural changes that may be needed are unlikely to be fostered by regulatory fiat,
which in any event risks provoking unintended consequences. Behavioural improvement is
more likely to be achieved through clearer identification of best practice and more effective
62
Corporate Governance Code, 4, para 1.
63
Corporate Governance Code, 4, para 5. ‘FTSE 350’ means ‘Financial Times Stock
Exchange 350 stock index’, which is a weighted index of the shares of the 350 largest
companies that are traded on the London Stock Exchange.
64
Corporate Governance Code, para 3.
65
Corporate Governance Code, para 3.
66
Max Barrett, ‘The End of “Comply or Explain”? Corporate Governance in the United
Kingdom and Ireland and the Impact of CRD IV’ [2012] 27(1) JIBLR 4, 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
but, in most areas, non-statutory routes to implementation so that boards and their major
owners feel ‘ownership’ of good corporate governance.67
CRD IV partly acknowledges this view, by providing for the disapplication of some of
its provisions in favour of national law under circumstances specified therein – a rare
approach for EU legislation over areas of joint competence. For example, after
specifying the requirement for, and responsibilities of, a nomination committee for
significant financial institutions, the Directive then disapplies these provisions ‘where,
under national law, the management body [i.e. the board of directors] does not have any
competence in the process of selection and appointment of any of its members’.68
Furthermore, CRD IV specifies requirements that each member of the board of
directors must fulfil, and then states that the Article containing these ‘shall be without
prejudice to provisions on the representation of employees in the management body as
provided by national law’.69
The new financial regulators within the UK, the Prudential Regulation Authority
(PRA) and the Financial Conduct Authority (FCA), are gradually finding a way to
supervise the risk management and cultural aspects of firms which fits in with this
environment. The PRA has a general objective: to further the safety and soundness of
the firms that it regulates;70 an insurance objective: to contribute to these securing a
suitable degree of protection for persons who are (or may become) policyholders;71 and
a secondary competition objective: to act in a manner that promotes effective
competition in the markets for services that are provided by the firms that it regulates.72
Within the statutory framework, which includes these objectives, directly applicable EU
regulations, and detailed rules in the PRA rulebook, the PRA’s approach to supervision
is ‘to judge whether [the organisations that it regulates] are safe and sound, and
whether they meet, and are likely to continue to meet, the Threshold Conditions’.73
67
HM Treasury, A Review of Corporate Governance in UK Banks and Other Financial
Industry Entities, 26 November 2009, 9–10, <http://webarchive.nationalarchives.gov.uk/+/http:/
www.hm-treasury.gov.uk/d/walker_review_261109.pdf> accessed 28 August 2014.
68
Directive 2013/36/EU, art 88(2).
69
Directive 2013/36/EU, art 91(13).
70
Financial Services and Markets Act 2000 (FSMA), s 2B(2).
71
FSMA, s 2C(2).
72
FSMA, s 2H(1).
73
Bank of England (2014), The Prudential Regulation Authority’s Approach to Banking
Supervision, June 2014, 5, <http://www.bankofengland.co.uk/pra/Pages/publications/banking
appr1406.aspx> accessed 28 August 2014. The corresponding statement for insurance companies
is similar to that for banks: ‘The PRA supervises insurers to judge whether they are safe and
sound, whether they protect policyholders appropriately, and thus whether they meet, and are
likely to continue to meet, the Threshold Conditions.’ (Bank of England (2014)), The Prudential
Regulation Authority’s Approach to Insurance Supervision, June 2014, 6, <http://www.bank
ofengland.co.uk/pra/Pages/publications/insuranceappr1406.aspx> accessed 28 August 2014.) The
PRA’s threshold conditions are those that insurers must satisfy under Part 1D of Schedule 6 of
the FSMA, and those that banks (and investment firms that provide PRA-authorised activities)
must satisfy under Part 1E of Schedule 6 of the FSMA, in order to provide, and to continue to
provide, financial services in the UK.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The FCA has a strategic objective: to ensure that the financial markets and those for
financial services function effectively.74 It also has three operational objectives, which
concern consumer protection,75 integrity76 and competition.77 The consumer protection
objective is to secure ‘an appropriate degree of protection’ for the customers of
financial products and services.78 The integrity objective is to protect and enhance ‘the
integrity of the UK financial system’.79 This integrity includes the system’s resilience,
soundness and stability,80 its freedom from financial crime81 and its resistance to
market abuse,82 as well as the proper functioning of financial markets83 and the
transparency of the pricing process for products in these markets.84 The FCA’s
competition objective is to further effective competition in consumers’ interests, in the
markets for financial services that are regulated by the Financial Services and Markets
Act (FSMA), and for services that a recognised investment exchange provides in
conducting activities that are regulated by this Act.85 This regulator’s approach to
supervision is based on three pillars of activity – proactive group/firm supervision
(Pillar 1), event-driven reactive supervision (Pillar 2), and issues and products super-
vision (Pillar 3).86
In its report of June 2013, the Parliamentary Commission on Banking Standards
outlined a tool, which it called ‘special measures’, in order to ‘identify and tackle
serious failing in standards and culture within the banks they supervise’.87 The
regulators should commission an independent report in order to assess the extent to
74
FSMA, ss 1B(2) and 1F.
75
FSMA, s 1B(3)(a).
76
FSMA, s 1B(3)(b).
77
FSMA, s 1B(3)(c).
78
FSMA, s 1C(1).
79
FSMA, s 1D(1).
80
FSMA, s 1D(2)(a).
81
FSMA, s 1D(2)(b).
82
FSMA, s 1D(2)(c).
83
FSMA, s 1D(2)(d).
84
FSMA, s 1D(2)(e).
85
FSMA, s 1E(1).
86
Financial Conduct Authority (2014), The FCA’s Approach to Supervision for C1 groups,
March 2014, 14, <http://www.fca.org.uk/your-fca/documents/corporate/the-fca-approach-to-
supervision-for-c1-groups> accessed 28 August 2014; Financial Conduct Authority (2014), The
FCA’s Approach to Supervision for C2 firms and groups, March 2014, 14, <http://www.fca.
org.uk/your-fca/documents/corporate/the-fca-approach-to-supervision-for-c2-groups> accessed
28 August 2014; Financial Conduct Authority (2014), The FCA’s Approach to Supervision for
C3 firms, March 2014, 14, <http://www.fca.org.uk/your-fca/documents/corporate/the-fca-
approach-to-supervision-for-c3-groups> accessed 28 August 2014; Financial Conduct Authority
(2014), The FCA’s Approach to Supervision for C4 firms, March 2014, 14, <http://www.fca.
org.uk/your-fca/documents/corporate/the-fca-approach-to-supervision-for-c4-groups> accessed
28 August 2014.
87
House of Lords/House of Commons, Changing Banking for Good: Report of the
Parliamentary Commission on Banking Standards, June 2013 (Changing banking for good), 56
and 437, paras 190–191 and 970–971, <http://www.parliament.uk/business/committees/
committees-a-z/joint-select/professional-standards-in-the-banking-industry/news/changing-banking-
for-good-report/> accessed 28 August 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
which their initial source of anxiety may be a sign of broader shortcomings in conduct
or standards.88 If this report shows that there are problems which require rectification
or there remains reason for regulatory concern, then the regulators should enter into a
formal commitment letter with the relevant bank in order to secure rectification
measures and to form a basis for monitoring progress in addressing the difficulties.89
The regulators must monitor a bank in special measures.90 A person within the bank
should be made responsible for ensuring that the organisation implements the remedial
measures to the satisfaction of the regulators.91
Both the PRA and the FCA have recently reported that they are able to implement
these special measures – which the regulators call ‘enhanced supervision’ – within the
existing powers that the FSMA confers on them.92 These tools include reports by
skilled persons under section 166 of the FSMA,93 powers of requirement under sections
55L and 55M of the FSMA,94 own initiative variation of permission powers under
section 55J of the FSMA,95 and asset requirement powers under section 55P of the
FSMA.96 The FCA primarily fits enhanced supervision within Pillar 1 of its super-
visory model.97
Thus, the PRA and the FCA are developing the capacity to manage serious
difficulties in the risk management and the governance of the firms that they regulate.
Nonetheless, as the financial crisis took place just six years ago, and in the presence of
substantial new international guidelines and considerable recent legislation at EU and
national level, it is too early to say how successful the regulatory response to these
events is likely to be.
88
Changing banking for good, 56 and 437, paras 191 and 971.
89
Changing banking for good, 56 and 437, paras 192 and 973.
90
Changing banking for good, 56 and 437–438, paras 192 and 973.
91
Changing banking for good, 56 and 438, paras 192 and 973.
92
Bank of England (2014), Statement of Policy: The Use of PRA Powers to Address Serious
Failings in the Culture of Firms, June 2014 (Use of PRA powers), 4, para 14, <http://
www.bankofengland.co.uk/pra/Pages/publications/powersculture.aspx> accessed 28 August
2014; Financial Conduct Authority (2014), Tackling Serious Failings in Firms: A Response to
the Special Measures Proposal of the Parliamentary Commission on Banking Standards, June
2014 (Tackling serious failings), 3, <http://www.fca.org.uk/your-fca/documents/tackling-serious-
failings-in-firms> accessed 28 August 2014.
93
Use of PRA powers, 4–5, para 17; Tackling serious failings, 12, Annex 1.
94
Use of PRA powers, 5, paras 22–23; Tackling serious failings, 12, Annex 1.
95
Use of PRA powers, 6, para 27; Tackling serious failings, 12, Annex 1.
96
Use of PRA powers, 5, para 25; Tackling serious failings, 12, Annex 1.
97
Tackling serious failings, 12, Annex 1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 20 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
A. INTRODUCTION
Insider trading1 has been a criminal offence in the US2 and England.3 The offence in
both countries is based on unlawful trading in securities by an insider on the basis of
confidential inside information. Insider trading occurs when an insider trades on the
basis of confidential price sensitive information for a financial gain. The gain could
take the form of ‘profit made’ or ‘loss avoided’. While the policy justifications for
regulating insider trading have been much disputed,4 insider trading is regarded
essentially as a sophisticated fraud. It is a form of market abuse that erodes public
confidence in the integrity, fairness and efficiency of the financial markets and damages
the interests of market participants.
In recent years, both countries have taken steps to reform their sentencing guidelines
for insider trading. In the US this has taken the form of amending the insider trading
guideline as contained in section 2B1.4 of the Federal Sentencing Guidelines in
response to the recommendations made by the Dodd-Frank Wall Street Reform and
Consumer Protection Act 2010;5 while in England this has taken the form of the
introduction of the Court of Appeal guideline judgments and new sentencing guidelines
under the Coroners and Justice Act 2009. A significant feature of the reforms in the two
countries is that both called for the development of an effective sentencing framework
that would promote greater consistency and proportionality in sentencing.6 The
countries, however, adopt different approaches to sentencing insider crimes.
US law uses ‘gain’ as a core measure of culpability and harm. The meaning of ‘gain
resulting from the offence’7 is, however, vaguely defined. The ambiguity of the
guideline language has long given rise to conflicting judicial interpretation. On the one
1
In this chapter, the two expressions ‘insider trading’ and ‘insider dealing’ are used
interchangeably.
2
Securities Exchange Act 1934 s 10 and SEC Rule 10b-5.
3
Criminal Justice Act 1993, Pt V, s 52.
4
The desirability of regulating insider trading has been subject to considerable debate.
Opponents of regulation argue that insider trading is desirable because it is economically
efficient to compensate entrepreneurs and to motivate managers to competently allocate
information. See generally H Manne, Insider Trading and the Stock Market (New York, Free
Press 1966).
5
Dodd-Frank Wall Street Reform and Consumer Protection Act 2010 (‘Dodd-Frank Act’)
(Pub L 111–203, HR 4173).
6
US Sentencing Guidelines Manual (‘USSG’) (US), Ch 1, Pt A(1)(3); Criminal Justice Act
2003 (UK), s 170(5)(a).
7
USSG, § 2B1.4 (b) (2014).
250
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
8
US v Nacchio, 573 F3d 1062 (10th Circuit, 2009).
9
See the Court of Appeal guideline judgments on insider dealing R v McQuoid [2009]
EWCA Crim 1301, where the Court of Appeal enunciated eight factors that might be relevant in
assessing sentences including the role of the offender, the level of planning and sophistication of
the offence, the amount of gain (or loss avoided) and the impact of the offence on any individual
victim, on overall public confidence in the integrity of the market. See also R v Rollins [2011]
EWCA Crim 1825, where the Court of Appeal assigned a clear role to personal mitigation.
10
Replacing the Sentencing Advisory Panel and the Sentencing Guideline Council.
11
For a detailed discussion of the new guidelines format, see J Roberts and A Rafferty,
‘Sentencing Guidelines in England and Wales: Exploring the New Format’ [2011] Criminal Law
Review 681.
12
Sentencing Council, Fraud, Bribery and Money Laundering Offences. Definitive Guideline
(May 2014), effective from 1 October 2014. The inclusion of this Guideline followed a request
from the Lord Chancellor under section 124 of the Coroners and Justice Act 2009, in support the
Government’s introduction of deferred prosecution agreements for corporate offenders by the
Crime and Courts Act 2013. The Guideline, which will replace the definitive fraud guideline
published in 2009 by the former statutory guidelines authority, is divided into seven guidelines
for the offences of (i) fraud (‘the fraud model’) – which is the focus of this chapter, (ii)
possessing, making or supplying articles for use in frauds, (iii) revenue fraud, (iv) benefit fraud,
(v) money laundering, (vi) bribery and (vii) corporate offenders.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
13
The fiduciary theory is based on the notion that a corporate ‘insider’ owes a fiduciary
duty, or a duty of trust and confidence, to the company shareholders, and thus does not extend to
those who owe no duty to shareholders, Chiarella v US, 445 US 222 (1980), rejecting the parity
of information rule in SEC v Texas Gulf Sulphur Co, 401 F2d 833 (2nd Circuit, 1968) that
anyone who has inside information must either disclose or abstain from trading.
14
The misappropriation rationale extends liability for insider trading not merely to fiduciar-
ies, but to any person who misappropriates inside information for a securities trading purpose, in
breach of a duty owed to the source of the information: US v O’Hagan, 521 US 642 (1997).
15
USSG, Ch 1, Pt A(3).
16
18 USC § 3553(a).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
17
US v Booker, 543 US 200 (2005), where the Supreme Court found the Federal Sentencing
Guidelines unconstitutional under the Sixth Amendment right to a jury trial, but upheld them as
a system of ‘effective advisory’ sentencing rules.
18
Cf in England, the maximum sentence for insider dealing is seven years’ imprisonment:
Criminal Justice Act 1993, s 61.
19
Dodd-Frank Act 2010, s 1079A(a)(1)(A),(B).
20
The offence level consists of three components: a base offence level; a set of specific
offence characteristics; and additional adjustments under Chapter 3 of the Federal Sentencing
Guidelines.
21
USSG, § 2B1.4 (a).
22
USSG, § 2B1.4 (b). See e.g., a gain of US$5,000 would produce no increase in the base
offence level of 8 and carries a sentencing range of 0 to 6 months’ imprisonment; while a gain
of US$400,000,000 would produce a 30-level enhancement and results in a sentencing range of
97 to 121 months’ imprisonment.
23
In 2001, the US Sentencing Commission approved amendments to guidelines governing
the sentence of economic crime, known as the ‘economic crime package’. The reform
consolidated the guidelines governing theft and fraud into a single guideline; redefined loss;
modified the loss table; and approved changes to the money laundering guidelines. For a
historical account of the reform, see Frank O Bowman III, ‘The 2001 Federal Economic Crime
Sentencing Reforms: An Analysis and Legislative History’ (2001) 35 Indiana Law Review 5.
24
USSG, § 2B1.4, cmt(n2); § 2B1.1, cmt(n3B). Both gain and loss use the same loss table in
§ 2B1.1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
measure of harm.25 The lack of proper guidance on the criteria for mitigation and
aggravation which are generally used to justify the imposition of non-guidance
sentence results in substantial sentencing disparities.26
The need for reform is widely acknowledged. An attempt was made by the
Sentencing Commission to amend the uniquely defective insider trading guideline in
response to the recommendations made by the Dodd-Frank Act in two respects.27 First,
it creates a new minimum offence level of 14 and, likely, longer prison terms, for any
‘organized scheme to engage in insider trading’.28 It also sets out a list of non-
exhaustive factors which the court should consider in determining whether the insider
trading scheme is ‘organized’, involving ‘considered, calculated, systematic, repeated
effort to obtain or trade on inside information’.29 The change introduced is that a
defendant who engages in an organized insider trading scheme, as opposed to
fortuitous or opportunistic instances of insider trading, will now warrant at minimum a
definite period of incarceration. An obvious flaw of this provision is that it would
impose disproportionate punishment on low-gain offenders given that the imposition of
the minimum sentence is now based on the operation of a scheme, rather than the
relative culpability of the participants. The problem is compounded by the omission to
elucidate the applicability of the ‘relevant conduct’30 rules. It is beyond the scope of
this chapter to have a detailed exploration of the relevant conduct rules, under which
judges are allowed to consider real offence conduct as broad as a defendant’s
uncharged, dismissed and acquitted conduct as well as conduct of co-conspirators in
crime, beyond the crime of conviction. Relevant conduct, as defined, includes all
‘reasonably foreseeable’ conduct of a defendant’s co-conspirators in furtherance of a
‘jointly undertaken criminal activity’,31 and conduct that is ‘part of the same course of
conduct or common scheme’.32 But the logical corollary of applying this concept to
white collar crimes involving an astronomical amount of monetary gain would expose
all participants to draconian criminal sentences.33 The reform leaves unanswered the
more fundamental questions: should a defendant’s sentence be measured by his own
25
For a frontal assault on the § 2B1.4 insider trading guideline, see DD Chattin, ‘The More
You Gain, The More You Lose: Sentencing Insider Trading under the US Sentencing Guidelines’
(2010) 79 Fordham Law Review 165, 185–214. The Sentencing Commission has identified the
deficiencies of § 2B1.4, considering the inclusion of one or more specific offence characteristics
that use aggravating factors other than gain to account for crime seriousness: Sentencing
Commission, Proposed Amendments to the Sentencing Guidelines (19 January 2012).
26
See US Sentencing Commission, Report on the Continuing Impact of United States v
Booker on Federal Sentencing (2012) 113.
27
See Amendments to USSG, Supp to App C, effective on 1 November 2012.
28
USSG, § 2B1.4 (b)(2).
29
USSG, § 2B1.4 (b)(2)(A)–(H).
30
The relevant conduct rules are fairly complex, and there has been general support for
reform. For a summary of the issues and extensive criticism of the rules, see US Sentencing
Commission, Simplification Draft Paper: Relevant Conduct and Real Offense Sentencing (2010).
31
USSG, § 1B1.3 (a)(1).
32
USSG, § 1B1.3 (a)(2).
33
See e.g., US v Bauer, 11 Cr 858 (DNJ 2012); US v Gupta, 11 Cr 907 (SDNY 2012)
applying the relevant conduct rules.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
gain? Or should he be liable for the total gain of his co-conspirators in a scheme – an
approach that appears to be more in line with the relevant conduct concept?
Second, the reformed guideline broadens the applicability of the ‘abuse of position of
trust’ adjustment under section 3B1.3, which warrants a two-level enhancement in
insider trading cases. This broader standard is intended to apply to hedge fund
professionals with regular participation in securities transactions, as well as lawyers
who regularly provide professional assistance in securities transactions. But the old rule
remains the same, for the commentary merely provides examples of positions that will
trigger an enhancement. One of the main criticisms of the guideline, namely, that it
places disproportionate weight on gain, has not been properly addressed. This repre-
sents a major lacuna which runs counter to the goals of sentencing reform and the
declared objectives of the Dodd-Frank Act.
34
USSG, § 2B1.1 (b).
35
USSG, § 2B1.1 (b) and cmt.
36
US v Mooney, 425 F3d 1093 (8th Circuit, 2005).
37
Mooney 425 F3d 1093, 1101 (8th Circuit, 2005).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
voiced by Bright J, who criticized the court for failing to recognize that market factors
unrelated to the fraud should be excluded from the sentencing calculus.38 Net gain
would punish a defendant for exogenous market events, divorce the sentencing
assessment of gain from the defendant’s culpability of the offence and lead to unequal
sentences for equal crimes.
The alternative market absorption approach, with its origin in the civil disgorgement
remedy,39 calculates gain that would reflect the point when the inside information is
disclosed and absorbed by the market, excluding the unfair influence of external market
factors40 unrelated to the fraud. This approach was forcefully advocated in US v
Nacchio.41 The case involved Joseph Nacchio, a former Qwest CEO, who was
convicted of trading in Qwest shares on the basis of negative inside information
regarding Qwest’s financial accounting. Drawing on Bright J’s dissent in Mooney, the
Tenth Circuit broke new ground in applying civil disgorgement principles in criminal
sentencing. The Court gave an intellectually respectful explanation as follows: the
essence of the offence of insider trading is not the mere act of trading – standing alone,
a lawful act – but trading on the basis of inside information.42 The plain language of
the guideline specifically limits the gain to that ‘resulting from the offence’ (i.e. trading
on the basis of inside information), and not the gain resulting from the trade (i.e. share
sales). Accordingly, Nacchio’s gain was narrowly calculated as the portion of his
proceeds from the sale of Qwest shares during the insider trading period at ‘a
reasonable time after public dissemination of the inside information’.43 This approach,
while involving extensive fact-finding in determining the market absorption point, bears
the virtues of achieving uniformity and proportionality which go to the heart of
American sentencing reform. The considerations of consistency and fairness which led
the Nacchio court to adopt the market absorption approach are intuitively persuasive.
While Nacchio may be read as an implicit repudiation of the net gain approach, the
subsequent decision in US v Rajaratnam44 clouds the issues and suggests that Nacchio
is probably erroneous.
The difficulties in measuring insider trading gain are amply illustrated by Rajarat-
nam. The decision is likely to be the subject of lively debate for a long time as the
largest hedge fund insider trading scandal in American history. Over the course of
seven years, Rajaratnam orchestrated an insider trading scheme that involved extensive
and repeated trading at Galleon, a multi-billion dollar New York hedge fund complex
founded by Rajaratnam, based on inside information he received from certain indi-
viduals. The sources of inside information were provided by his expert network, a
38
Mooney 425 F3d 1093, 1106 (8th Circuit, 2005).
39
SEC v MacDonald, 699 F2d 47 (1st Circuit, 1983); SEC v Happ, 392 F3d 12 (1st Circuit,
2004); SEC v Maxxon, 465 F3d 1174, 1179 (10th Circuit, 2006).
40
There is a tangle of factors affecting share prices, eg the overall growth or decline in the
share price or changes caused by external market forces such as changed economic circum-
stances, changed investor expectations, and new industry-specific or firm-specific events.
41
Nacchio 573 F3d 1062 (10th Circuit, 2009).
42
Nacchio 573 F.3d 1062, 1072 (10th Circuit, 2009).
43
Nacchio 573 F3d 1062, 1082 (10th Circuit, 2009).
44
US v Rajaratnam, 09 Cr 1184 (SDNY 2011). The gain calculation methodology was not
challenged on appeal: 719 F3d 139 (2nd Circuit, 2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
45
Dura Pharmaceutical v Broudo, 544 US 336 (2005).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
other fraudulent conduct) as opposed to other independent market factors.46 Nor does it
take account of earlier civil insider trading cases such as SEC v MacDonald,47 where
the court refused to strip the defendant of his total profits realized from insider trading,
holding that his gain should be limited to ‘those accretions occurring up to a reasonable
time’48 after the disclosure of the inside information. McDonald has rightly recognized
that measuring gain without considering when the inside information became public
would appraise an insider’s gain by totally fortuitous circumstances. The Rajaratnam
court had also discarded a considerable number of established authorities on criminal
securities fraud cases49 which accept the notions that exogenous market factors should
be excluded from the sentencing calculus, and that it would be appropriate to adopt
civil disgorgement for criminal sentencing purposes because it is attuned to the stock
market complexities. These decisions are important for their reaffirmation of the basic
but important principle that a defendant should not be punished for unrelated market
factors.
But at the end of the day, the option between net gain and market absorption
approaches was all rather technical. The Court adopted a generous downward departure
from the advisory guidelines and sentenced Rajaratnam to 11 years’ imprisonment in
the light of his extensive history of charitable work. Rajaratnam illustrates the dangers
posed by unstructured judicial discretion in the application of sentencing factors in the
post-Booker advisory guidelines system which, if unchecked, has the potential to create
sentencing disparities. The lack of clarity in the criteria for mitigation and aggravation,
and, in particular, the increased judicial discretion after Booker to consider personal
mitigation, has led to increasing sentencing disparities. The courts had from time to
time interpreted gain out of the guideline or whittled its meaning. The recent
Dodd-Frank amendment to the insider trading guideline expanded the recommended
sentences for organized insider trading scheme, doubtless prompted in part by
Rajaratnam. Yet the reform is wholly inadequate. So long as section 2B1.4 survives in
its present form, it will continue to generate lengthy and costly litigation.
1. Gain Paradox
The conflicting judicial interpretation on gain demonstrates the need for reform. In
contrast to the conservative approach to reforming the section 2B1.4 insider trading
guideline, an important innovation introduced by the Dodd-Frank amendment to the
fraud guideline was the creation of a loss calculation formula based on a ‘modified
rescissory’ approach that calculates loss by reference to an average post-fraud price
over a relatively lengthy 90-day period. The new formula is designed to reduce the
impact on the loss calculation of factors unrelated to the fraud. Given the moderation
which the civil disgorgement method has incorporated in the loss calculation, and the
advantages afforded by such approach that have been evident in the case law, it is
46
Dura 544 US 336, 346 (2005).
47
SEC v MacDonald, 699 F2d 47 (1st Circuit, 1983).
48
MacDonald 699 F2d 47, 53 (1st Circuit, 1983).
49
US v Olis, 429 F3d 540 (5th Circuit, 2005); US v Rutkoske, 506 F3d 170 (2nd Circuit,
2007). Cf US v Berger, 587 F3d 1038 (9th Circuit, 2009).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
2. Sentencing Factors
50
Fraud Guideline, 5–12. This section considers fraudulent acts that have been charged
under Fraud Act s 1, Theft Act s 17, conspiracy to defraud or statutory conspiracy to commit
such an offence. The revised fraud guideline is grouped in broadly the same way as the previous
definitive fraud guideline with the exception of the merger of confidence fraud and banking
fraud into a single guideline.
51
There are three levels of culpability: high, medium and lesser. Examples of high
culpability factors include a leading role of the offender, an abuse of position of trust, a large
number of victims and deliberate targeting of vulnerable victims. Low culpability factors include
a minor role of the offender and an opportunistic one-off offence with little planning.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
a combination of sentencing factors, and the need for flexibility, by allowing judges to
depart from the starting point sentencing range after taking into account the aggravation
or mitigation elements in step two. Having selected the appropriate sentence, judges are
required to proceed through other steps, including the application of guilty plea
discount52 and the totality principle – that the total sentence must be just and
proportionate reflecting the overall criminality of the offences.53
This comprehensive, well-reasoned and balanced approach to sentencing is com-
mendable. While the US model places disproportionate weight on the financial amount
as a virtual determinant of crime seriousness and offers limited guidance regarding the
application of sentencing factors, the English guideline provides an appropriate account
for culpability and harm, assigns a clear role to mitigation/aggravation and gives full
credit for totality. As compared with the American grid system, the more detailed but
less prescriptive approach in England would achieve greater consistency and propor-
tionality in sentencing, while allowing judges to impose a sentence that is commen-
surate with the assessment of crime seriousness and appropriately accounts for the
characteristics of an individual case.
It is suggested that a modern insider trading guideline should provide a two-step
framework for the determination of crime seriousness for which the Anglo-American
experience has provided cogent lessons. The first step is to identify the main sentencing
factors which reflect gradation in culpability and harm. Culpability should be assessed
in terms of the role of the offender and the level of planning and sophistication
involved in the offence, with the emphasis that abuse of position of trust and organized
insider trading schemes should warrant higher culpability. Harm should be identified in
broad terms to take account of both the monetary gain (or loss avoided) and the impact
of the offence (whether on any individual victim or in a wider context, on public
confidence in the integrity of the markets). The second step is to direct the court to
consider relevant aggravating and mitigating factors for which the English fraud model
has provided a useful framework of reference. It must be recognized that a well-
designed guideline should give an explicit recognition to the totality principle, and
should include a consistent and workable method based on the market absorption
approach to calculating gain that resulted from the offence, excluding the impact on the
gain calculation of factors unrelated to the fraud. This would eliminate the complexity,
uncertainty and expense incurred in attempting to determine the gain calculation
methodology on a case-by-case basis.
At bottom, it bears reiterating that an ideal insider trading guideline should strike a
delicate balance between the desirability of consistency and fairness in sentencing and
the need to retain sufficient judicial flexibility. The English Sentencing Council is
vigorously embarking upon that task. It is to be hoped that the current sentencing
52
Sentencing Guidelines Council, Definitive Guilty Plea Guideline (2007) para 4.3. As a
general principle (rather than as a matter of law), the English courts may adopt a one-third
discount for a guilty plea: see Criminal Justice Act 2003, s 144. In the US, defendants who plead
guilty may qualify for and can bargain for a 2-level reduction for ‘acceptance of responsibility’:
USSG § 3E1.1(a)(b).
53
Sentencing Council, Definitive Totality Guideline (2012) 5–6.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
guidance on insider dealing will be fully reviewed by the guidelines authority as part of
its reform agenda, and that if a definitive insider dealing guideline were implemented in
England it would adopt the same bold and fresh approach.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 21 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
The development of China’s economy has been well acknowledged. Playing a crucial
role in this continuing process, the securities markets in China not only act as allocators
of capital resources, but also guide China in a direction to a new economy that
recognises and respects market forces. According to the regulator of China’s securities
markets, the China Securities Regulatory Commission (the CSRC), there were 2,494
companies listed on China’s two stock exchanges in 2012, and the total market
capitalisation was RMB 23.04 trillion (GBP 2.304 trillion), equivalent to 44.36 per cent
of China’s GDP. It made China the second largest stock market in the world after the
US by the end of 2012.1 The unfortunate corollary of the above achievements, however,
has been a steep rise in abuses of the markets.
As have many of its fellow countries, China has given increasing attention to the role
of the law in shaping the character of the markets and their participants. This is because
it is generally agreed that it is pivotal to foster the integrity of the market given its
significance in maintaining a degree of investor confidence for sound, stable and
efficient markets. The issues in controlling such abuses are many and varied. Insider
dealing regulation has been selected on the basis that it has long been identified as one
of the most serious problems of China’s securities markets.
This chapter intends to contribute to the research of international insider dealing
regulation by providing a close examination of both the substantive rules and
enforcement of insider dealing regulations in China. The first part of this chapter
provides a historical overview of insider dealing regulation in China. In the next part an
analysis of the present statutory insider dealing regime in China is provided. This is
followed by an examination of enforcement issues with a few key case studies.
1. HISTORY OVERVIEW
1.1 Insider Dealing Regulations of the Republic of China before 1949
The history of China’s securities regulation starts as early as 1914 with the enactment
of the Stock Exchange Law 1914 by the Beiyang Government of the Republic of
1
CSRC, China Securities Regulatory Commission Annual Report 2012 (2012) 20.
262
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
China. Before it, the subject was embedded in a very limited number of commercial
and corporate regulations. It must be pointed out that there existed at the time no
modern stock exchange in China in the sense that it was run by the Chinese when the
law was promulgated.2 Thus the purpose of the law was not to regulate stock exchanges
but to regulate the issuance of bonds, thereby serving as a tool of the government to
extort money from the public. Nevertheless, article 33 of the Stock Exchange Law 1914
deserves special mention here. The provision prohibited any person from using undue
means to disturb the market prices of stocks and bonds. Considering that insider
dealing can affect the market price of the subject securities, it could fall into the scope
of ‘undue means’ under the provision. Therefore, this article may be regarded as the
earliest attempt to regulate insider conduct.
Tackling insider dealing and market manipulation became a clear legislative intent
when the Ministry of Industry and Commerce of the successive Nanking National
Government enacted the Revised Stock Exchange Law 1935 (RSEL 1935) on 27 April
1934. On the one hand, an increase of the prevalence of such practices on the bond
markets had jeopardised the fiscal revenue of the state, which mainly relied on the
issuance of government bonds. Therefore, it was in the government’s interest to
regulate insider dealing and market manipulation in order to ensure the smooth
issuance of government bonds and maintain tight control of their transactions. On the
other hand, the public was charged with anger by the large number of government
officials involved in such practices. The government, hence, had to take relevant
measures in order to ease the tension.
Under article 41 of the RSEL 1935, any public functionary was prohibited from
speculating on the stock market through an intermediary. Any violation was subject to
a fine of no less than twice but not more than ten times the purchase or selling price, or
criminal punishment according to article 49 of the law.3 Evidence of suspected
contravention of the law, meriting possible investigation by the Ministry of Industry
and Commerce, could be provided by the stock exchanges’ inspectors upon the
appointment of the ministry through on-site or off-site inspection of stock exchanges
and their member firms. The following investigation, if any, would be carried out by the
stock exchanges.
In addition to the RSEL 1935, article 10 of the Revised Directive for Rules of
Service of Government Officials 1933 prohibited all government officials from
speculating, directly or indirectly, on the bonds markets. All central administrative
2
Technically, there was a stock exchange, the Shanghai Shares Public Service, at that time,
but historians normally recognise the Beijing Stock Exchange, founded in 1918, rather than the
Shanghai Shares Public Service, as the first stock exchange given that the latter was founded by
the Chinese. Firstly, the former was founded under the Hong Kong Joint-Stock Company Rule in
1891 and reregistered in Hong Kong when it changed its name to the Shanghai Stock Exchange
in 1905. In other words, it was not under China’s jurisdiction. Secondly, its founders were
mainly British merchants, with no Chinese citizens involved. Thirdly, only foreign stocks and
other securities were traded in it. Nevertheless, the Shanghai Shares Public Service was
considered the starting point of China’s stock markets: Shiyun Song, ‘China’s Securities Markets
at the End of Qin Dynasty’ (1997) Journal of Shandong Teachers University (Social Science
Edition) 37.
3
Revised Law of Stock Exchange 1935 (1935), art 49.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
organs of the Republic of China and major offices in provinces and cities were obliged
to investigate and charge anyone who was suspected of jeopardising the Republic of
China by underselling government bonds. A person could also be convicted alongside
his subordinate if he failed to detect and report the latter’s irregular practices. It was
also decreed that ‘any civilian who undersold government bonds should be charged
with disturbing the smooth functioning of the financial system’.4
Meanwhile, the Nanking National Government also enacted two Criminal Acts in
1928 and 1935 respectively, which contained a number of provisions concerning insider
dealing.5 Article 335 of the Criminal Law 1928 could be read as imposing insider
dealing liability on tippees (any unauthorised person who disclosed ‘the industrial and
commercial secret’ obtained by virtue of his employment), punishable by up to one
year imprisonment, criminal detention or a fine up to RMB 1,000. Article 317 of the
Criminal Law 1935 further prohibited any person who was obliged to keep industrial
and commercial secrets he knew or obtained in accordance with the law or contract
from leaking such information without legitimate reason; any contravention was
punishable by up to one year imprisonment, criminal detention or a fine of not more
than RMB 1,000. Article 318 doubled the maximum prison term and amount of fine if
the offender was a public servant or ex-public servant in possession of information
gained by virtue of his current or previous office.
The insider dealing regime of the Republic of China was doomed to failure for one
simple reason: government officials, especially ministers who had privileged access to
inside information, were hand in glove with traditional insiders, such as company
directors, engaging in market speculation. In other words, there was nobody to guard
the guardians. For example, Kong Xiaoxi, the Minister of the Finance, was known as
one of the notorious insiders in the early 20th century in China. Abusing his position as
a high-ranking government official, he disclosed confidential and material information
to Seven Start Company – jointly set up by his wife, brother-in-law, vice minister of the
Ministry of Finance and vice president of the Central Bank – to enable it to speculate
in securities markets.6 Kong, at the same time, acted as the head of the regulator of the
securities industry.7
After almost half a century, the securities markets in China were gradually reduced and
eventually disappeared as a result of the establishment of a highly centralised economic
4
The Historical Data and Files of the Finance and Taxation of the Nanking National
Government (1927–1937) (China Financial & Economic Publishing House 1997) 726–727.
5
A Complete Collection of Laws, Rules and Regulations (Commercial Press 1937)
137–173.
6
R. Zhao, ‘Commentary on K’ung Hsiang-his’ (1992) Associated Universities in Shaanxi
Province Press 52.
7
Xinquan Zhu, Bibliography of Famous People in the Republic of China (China Youth
Publishing Group 1997) http://news.ifeng.com/history/special/jiangyusong/200911/1130_8825_
1457031_5.shtml accessed 25 November 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
structure that had heavily relied on administrative management since 1949.8 It was not
until the early 1980s that they re-emerged thanks to a great many structural reforms,
economic as well as political, that had been taking place since 1978.9 While the term
‘insider dealing’ had not yet achieved popular currency, the existence of the practice
within the securities markets was still widely suspected by both academics and
legislators. The Central Government began to recognise it as a problem in the country
that had affected public confidence in the integrity of the securities markets since the
end of the 1980s. It made its first major attempt to tackle the problem by enacting the
Interim Measures for Regulating Securities Companies 1990, to prohibit securities
companies from indulging in insider dealing, market manipulation, fraud or any other
irregularity under article 17. While using the term ‘insider dealing’, the regulation
appeared to lack sufficient depth to implement; commentators considered it a mere
political announcement with very little legal value.
Nevertheless, prior to the introduction of the present system, which came into effect
in 1997, insider dealing was initially mainly regulated at a Provincial/Municipal level.
In fact, the principal sources of insider dealing regulation were municipal securities
regulations of Shanghai and Shenzhen, given that the two governments were the hosts
of Shanghai and Shenzhen Stock Exchanges (the SSE and SZSE) respectively.
For example, article 39(2) of the Regulatory Methods of Shanghai Securities Trade
1990 prohibited any department or individual from using inside information to deal
with securities. Any violation would be subject to a fine of not less than RMB 50,000
(around GBP 5,000) and not more than RMB 100,000 (around GBP 10,000) under
article 75. If the circumstances were considered particularly serious, the fine could be
increased to not less than RMB 100,000 but not more than RMB 200,000. Similar
prohibitions were found in article 43(4) of the Interim Measures for Regulating Stock
Issuance and Trading and article 93 of the Interim Measures for Supervising Listed
Companies of Shenzhen 1992 (IMSLCSZ 1992) enacted by the Shenzhen Municipal
Government.10
8
The securities markets in China went through a restrained–reformed–disappeared–
reintroduced process. For a general overview, see The CSRC, China Capital Markets Develop-
ment Report, ch 1.
9
For a brief account, see Zhenghua Li, The Third Plenum of the 11th Central Committee of
the Communist Party of China and the Great Process of the Reformation and Opening Up
(2008) The Research of China’s Contemporary History.
10
Some argue that article 29 of the Interim Measures for Regulating Stock Issuance and
Trading 1991 prohibited ‘functionaries of Party and government offices, personnel on active
service, professional securities practitioners, the functionary of relevant securities regulatory
organs’ from purchasing or selling any securities regardless of whether or not they do so on the
basis of inside information. As a result, it could conclude that the scope of insider in the
IMSLCSZ 1992 was limited to directors, supervisors, managers and other senior employees of
listed companies, persons possessing inside information relating to securities trading and persons
obtaining such information illegally.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Proceeding from efforts made by local governments, the State Council and the
Securities Committee of the State Council (SCSC), at Central Government level,
brought in the Interim Provisions for the Management of the Issuing and Trading of
Stocks 1993 (IPMITS 1993) and the Interim Measures on Prohibition of Securities
Fraudulent Conducts 1993 (IMPSFC 1993), which both contained anti-insider trading
provisions. Although neither of these provided an explicit legal definition of insider
trading, article 3 of the IMPSFC 1993 did go some way to reveal the essence of the
irregularity by prohibiting any department or individual, for the purpose of increasing
profits or reducing losses, from using inside information to issue or trade in securities.
Adopting a ‘person connection’ test, the IPMITS 1993 defined ‘insiders’ according to
their direct or indirect connection or relationship to the source of inside information,
while the IMPSFC 1993 specified five types of person who could be deemed insiders in
article 6. Also, the two regulations differed in their definitions of ‘inside information’.
Firstly, while both regulations recognised the information to have significant impact on
the affected securities, article 81(15) of the IPMITS required that it must only be
known to a limited number of persons who were primary and secondary insiders,
whereas article 5 of the IMPSFC 1993 only required it to be undisclosed but known to
insiders. Secondly, article 5 of the IMPSFC 1993 particularised 25 forms of inside
information, chiefly corporate inside information, quite apart from published infor-
mation and materials, rationale for forecasting and analysis of securities markets, of
which it made no mention.
As to the activities to which insider dealing prohibitions applied, both regulations
prohibited any person who either legally or illegally possessed inside information from
trading in the subject securities, disclosing such information without authorisation and
encouraging others to trade in such securities. The IMPSFC 1993, however, required an
additional subjective element: the purpose of the insider’s activities must be to gain
profit or avoid loss.
Both regulations established only administrative liability, with confiscation of
illegally obtained profits (especially shares), a fine of up to RMB 0.5 million, a
warning or both.11 Criminal and civil liabilities were touched upon lightly in articles
77–78 of the IPMITS 1993 and article 13 of the IMPSFC 1993, though not in sufficient
detail to allow implementation. Nevertheless, the idea of there being three types of
liability played a role in the development of insider dealing regulation.12
The IPMITS 1993 and the IMPSFC 1993 are often seen as landmarks in the history
of China’s securities legislation, as together they form the basic framework for insider
dealing regulation. Problems, however, remain. On the one hand, as purely administra-
tive regulations, they lacked the force of law. Nor did they fully address the problem of
insider dealing by themselves. At the same time, certain crucial provisions, such as
those regarding liability, were little more than formalities. Their enforcement often
11
Ibid, art 72.
12
It should be noted that any proceeding brought by the CSRC against alleged insiders is
categorised as administrative liability because of its administrative characteristic; civil liability
carries only private remedies.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
proved difficult. Nevertheless, academics generally agree that the promulgation of the
two regulations did have certain, albeit limited, positive effects on curbing abusive
practices in the securities markets.13
13
Sunyan Zheng, A Legal Analysis of Misconduct in the Securities Markets (China
University of Political Science and Law Press 2000) 76. Given limited data, it is, however,
difficult to attribute the small number of cases from 1993 to 1995 to the promulgations of the
two pieces of regulations, and the following increase in the number of cases might not indicate
an increase in abusive activities, because it might be a result of poor enforcement of the
regulations.
14
The Law of the People’s Republic of China on Securities 2005 (2005), arts 73 and 76.
15
Article 7 of the SL 1998 gave powers and objectives to the securities regulatory authority
under the State Council, and the explicit provision remains unchanged for the SL 2005: CSRC,
‘The China Securities Regulatory Commission Dedicated to Protecting Investors’ Rights and
Interests’ <http://www.csrc.gov.cn/pub.scrc_en/about/> accessed 10 December 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
2.1 Insiders
Under article 73 of the SL 2005, insider dealing prohibition is violated when a person,
legally or illegally, in possession of inside information trades in the subject securities
on the basis of inside information or engages in other practices in relation to the
information. It can be said that the SL 2005 applies an ‘information-connection’ test
which identifies an insider merely according to his connection with inside information.
This is different from the ‘person-connection’ approach adopted by the IMPSFC 1993,
which required certain types of connection between the party and the company whose
securities were traded. It should be noted that the term ‘insider’ is neither used nor
defined in the SL 2005. Instead, articles 73 and 76 of the SL 2005 and article 180 of
the CL 1997 make a distinction between persons in possession of inside information
(legally) and those who obtain the information through illegal means. They are both
regarded as insiders.
A person in possession of inside information is himself an inside source of
non-public and price-sensitive information. Article 74(1)–(3) identifies six types of
corporate insiders who have access to inside information by virtue of their ordinary
course of duties to the company whose securities are traded as follows:
The term ‘person in possession of inside information’ has also been extended to include
low-level employees of the company and those who have access to inside information
by virtue of their contractual (such as lawyers, accountants and investment advisers) or
professional relationship (such as journalists, editors and typists) within the company
according to article 74(4). In addition, the liability of insider dealing can also be
applied to trading, tipping and encouraging others to so do committed by a public
servant who holds his office in any securities or futures regulatory authority or
performs a statutory administrative duty in respect of the issuance and trading of the
securities under article 74(5). However, the provision fails to cover those officials
whose jurisdictions are outside the securities and futures industries but have access to
crucial information that can affect the market prices of the securities. For example,
relevant economic regulatory departments, including industrial and commercial admin-
istrations and tax authorities, could also be in a position to obtain inside information.
16
While the SL 2005 is silent, the term ‘actual controller’ is generally defined in article
217(3) of the Companies Law of the People’s Republic of China 2005 (the CPL 2005) to include
anyone who is not a shareholder of the company but able to control the actions of the company
by means of investor relations, agreements or any other arrangements. Actual controllers can be
natural or legal persons: regulatory departments of state-owned assets or other institutions, or
natural persons accorded control as the result of some agreement among shareholders, including
those with actual control status resulting from a relationship of trust.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Having understood that the status of ‘insider’ in China’s insider dealing regulation is
established on the basis of the possession of inside information, it is pivotal to identify
the information that falls into the category of inside information. Article 75 of the SL
2005 defines inside information as ‘… the information that concerns the business or
finance of a company or may have a major effect on the market price of the securities
thereof and that hasn’t been publicized in securities trading’. This definition introduces
three new notions into the matrix: non-disclosure, relevancy and materiality. Before
moving on to the three elements of inside information, careful reading of the provision
suggests that the definition of inside information is confusing, with the usage of the
word ‘or’ between the relevancy and materiality. It seems to indicate that to constitute
inside information, unpublished information in question must have either of the
additional characteristics. In other words, the SL 2005 only requires two elements of
inside information, the second being an alternative choice.
The requirement that inside information must be unpublished has been a straight-
forward element. Instead of identifying the status of being ‘published’ or ‘deemed to
have been published’, the SL 2005 develops a ‘publishable information’ test.17 The test
is built on a mandatory disclosure system in which the general requirements are
summarised and illustrated in Figure 22.1.
Meanwhile, the law also specifies the methods of disclosure, including publishing on
any of the CSRC’s approved media, and placing in both the company’s head office and
17
Companies and Securities Advisory Committee, Insider Trading Discussion Paper (2001)
35. Here we only borrow the terms.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Informaon
Disclosure
18
CSRC, ‘Frequently Asked Questions Regarding Letters and Visiting’ <http://www.csrc.
gov.cn/pub/ningbo/hdjl/tsyjb/201204/t20120427_209341.htm> accessed 10 December 2013.
19
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
1. whether it has impact on the company’s operation and performance in the context
of the company’s overall business;
2. whether it has a close connection with the decisive factor of the subject securities’
trading price according to the company’s business features and trading records of
the subject securities;
3. historically, whether it has any similarity with the information which affected the
subject securities’ market prices;
4. whether the company has protected the information specifically; and
5. whether the information was evaluated as being price-sensitive in any pre-existing
report or analysis conducted by the company.21
Nevertheless, none of the above considerations can detract from the core fact that
neither the SL 2005 nor the CL 1997 provides any guidelines to apply this concept of
materiality, which is a big loophole.
In addition to non-disclosure and material effect, the SL 2005 also requires that, to
qualify as inside information, the information in question must only relate to the
business or financial activities of a specific issuer of securities. The types of business or
financial activities covered by the SL 2005 are listed in the second part of article 75. It
is clear that inside information is restricted to that arising from a source within a
company, including:
20
Zixue Zhang, Analysis of the Forming Time of Inside Information (2011) 4 Zheng Quan
Fa Yuan 22.
21
Ibid 22.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
The SL 2005 also states that any major events specified in the second paragraph of
article 67 that requires compulsory disclosure, may also be considered inside infor-
mation. All of these 11 types of information can be generated only from a source
within a company whose securities are traded. In other words, under the terms of article
75 of the SL 2005, information may be inside information only if it arises from a
source inside a specific company and specifically concerns the company or its
securities. This leaves a considerable loophole insofar as information arising from
sources outside a company is completely ignored, even though such information,
especially where it has relevance to the industry in which a company operates, may
have considerable impact on the value of that company’s shares. Such information may
concern policy changes, for instance, or administrative decisions by securities regula-
tory departments on prohibiting the controlling shareholder of an issuer from transfer-
ring the shares in his possession, and it is undeniable that such information would have
significant impact on the securities markets as a whole.
The third issue of insider dealing liability is which types of conduct come within the
insider dealing regulations. The SL 2005 and CL 1997 place an absolute embargo on
dealing in the subject securities on the basis of inside information. Similarly, divulging
that information or suggesting others to trade in those securities is prohibited.
This seems straightforward enough, but there is one problem. Any person in
possession of inside information is prohibited, both under the SL 2005 and CL 1997,
from dealing, tipping and making trading suggestions to others before the information
is made publically available for the purpose of levelling the playing field of investors;
certain types of persons are prohibited from doing so within six months from the
information being disclosed. Such a period of time is prescribed under the IID 2012 as
the ‘sensitive period of inside information’, referring to the period between the
formation and publication of the inside information. The occurrence time of ‘major
events’ is prescribed in paragraph 2 of article 67 of the SL 2005, and the formation
time of ‘plans’ and ‘schemes’ is mentioned in article 75 of the SL 2005 and the
formation time of ‘policies’ and ‘decisions’ is mentioned in article 82(11) of the
Administration of Futures Trading 2007 (the AFTR 2007). While also adopting
the term ‘sensitive period of inside information’, article 10 of the Insider Dealing
Directive 2007 defines it as the period between the moment when inside information
was generated and time when it was disclosed to the public/the moment when the
information had no significant impact on the market price of the subject securities. The
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
SL 2005, on the other hand, does not stipulate such a period but simply makes it
unlawful for a person in possession of inside information as an insider to engage in any
prohibited activities specified in article 76 of the SL 2005 before the information in
question becomes publicly available.
Both the SL 2005 and the CL 1997 provide that a person who possesses inside
information as an insider commits insider dealing if he deals in the very securities to
which the information in question is related.22 The circumstances referred to in both
provisions are the purchase or disposal in question. While the terms ‘dealing’ or ‘buy’
and ‘sell’ are defined in the SL 2005 and the CL 1997, it is generally believed that the
terms should be interpreted more broadly than just direct purchase or disposal, to avoid
loopholes which allow perpetrators to exploit their informational advantages.23 Article
13 of the Insider Dealing Directive 2007 serves as a useful reference as it provides two
specified circumstances in which dealing is prohibited: (1) in the name of an insider,
buying or selling the subject securities directly or relying on others; and (2) in the name
of a person other than the insider, buying or selling the subject securities. The Directive
goes further to provide that a person deals in the subject securities in another’s name if
(1) he provides, directly or indirectly, securities or funds for another person’s purchase
of the subject securities and collects all or part of the profit gained accordingly; or
(2) he has rights to manage, use and dispose of the subject securities in another
person’s possession.
The second prohibition relates to disclosing inside information. Article 76 of the SL
2005 and article 180 of the CL 1997 provide that a person in possession of inside
information as an insider is liable for insider dealing if he discloses the information.
Although it is not specified by the law, it is generally understood that, in the context of
insider dealing, disclosure itself is unlawful unless it was conducted in order to fulfil
one’s legitimate duty by virtue of one’s employment, profession or office. In other
words, an insider may still be liable for insider dealing if the disclosure of inside
information was not intentional but merely in error.
Unauthorised disclosure of inside information may lead to two likely consequences:
the informed third party (the tippee) may use the information to trade in the relevant
company’s securities, or pass on the inside information to others. It would appear that
the purpose of the provision governing the above practices is to set an objective
standard, meaning that there is no need to prove actual use by the third party of the
inside information in question.24 One point of argument is whether this provision also
prohibits the third party from further divulging the information to others. Some take the
view that, as far as disclosure of information is concerned, there should be no
difference between disclosure by insiders themselves and disclosure by third parties.
The third prohibition provided by the SL 2005 and the CL 1997 is that of suggesting
to another person to deal in the subject securities. Under the SL 2005, a person in
possession of inside information as an insider is liable for insider dealing if he suggests
to another person to purchase the subject securities. There has been no further
22
The SL 2005, art 76 and the CL 1997, art 180, para 1.
23
Brenda Hannigan, Insider Dealing (2nd edn, Longman Law, Tax and Finance 1994) 92.
24
Ying Liu, ‘A Discussion of Identify Insider Trading in the Securities Markets’ (2005) 18
Economy Forum 106.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
3. SANCTIONS
Insider dealing under China’s insider dealing regulation may be punished as either an
administrative or criminal offence. Administrative sanctions are imposed by the CSRC
under article 179(7) and are set under article 202 of the SL 2005. For an insider, either
an individual or company, whose illegal gain is over RMB 30,000, the CSRC may
order it to dispose of the securities held illegally, confiscate any illegal gain and impose
a fine of up to five times the illegal gain. If the amount of illegal gain is under RMB
30,000, the insider will be subject to a fine of up to RMB 600,000. An additional fine
of up RMB 30,000 and a warning will be imposed on a company’s chief representative
if the company is the insider. In addition to the above pecuniary penalties, the CSRC
may disqualify or ban individuals, for a limited period or even permanently, from
participating in the securities and futures markets.26 The imposition of a ‘ban of market
entry’ does not preclude other forms of punishment.
Criminal sanctions for both individuals and companies are imposed under article 231
of the SL 2005 and set under article 180 of the CL 1997 and the IID 2012 issued
thereunder. For an individual, the penalty is up to ten years’ imprisonment and/or a fine
of up to five times the profit he gained or loss avoided. For a company, the penalty is
a fine of up to five times the profit it gained or loss avoided; its chief representative or
those who are directly in charge of the business are liable to imprisonment of up to five
years. In a case where insider dealing is committed by multiple defendants, each
defendant shall be convicted and punished according to the accumulative value of the
securities traded, security deposit occupied, and profit gained or the loss avoided, while
the fine imposed should not exceed five times the illegal profits. In cases where insiders
have not actually made any profits from unauthorised disclosure of inside information
to a third party or encouraging that party to trade in the affected securities, article 10,
paragraph 2 of the IID 2012 states that the amount of the fine imposed shall be
determined according to the value of profit gained or loss avoided by the beneficial
25
It is a common view that the above forms of conduct constitute transactions covered by
insider trading rules or that fall into the category of insider trading.
26
The Law of the People’s Republic of China on Securities 2005, art 233.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
party of the inside information who engaged in insider dealing activities based on the
information.27
The current approach to the punishment of insider dealing violations relies on public
enforcement, administrative sanctions and criminal prosecutions. Although a general
private right of action against insiders has been created by article 76, paragraph 3 of the
SL 2005, and the Supreme Court has repeatedly confirmed its position on encouraging
private litigation against insiders, the record of private enforcement shows it is not just
that there have been only three unsuccessful cases, but that the provision is too vague to
apply to insider dealing. Nor is there any judicial interpretation of the issue. Therefore,
it is difficult to see a realistic prospect of China, in the foreseeable future, finding any
viable cause of action for counterparty in other than face-to-face transactions despite a
private cause of action provided by the SL 2005.
27
The standards for determining whether suspected insider dealing activity is ‘serious’ are
set out in the IID 2012 and are similar to those used in Provisions of Supreme People’s
Procuratorate and Ministry of Public Security regarding Criteria for Accepting Cases for
Prosecution in Respect of Criminal Cases under the Jurisdiction of Public Security Organ (Part
2), while the IID 2012 specifies the term ‘repeatedly’ to include committing the said acts more
than three times. Article 7 clarifies the issue of what constitutes ‘extremely serious circum-
stances’.
28
Nianyue Jiang, ‘Xiao Gang: Heavily Punishing Manipulation, Insider Dealing and Other
Forms of Illegal Conducts’ Finance China (6 September 2013) <http://finance.china.com.cn/
money/futures/special/gzqhcxss/20130906/1792977.shtml> accessed 10 December 2013.
29
Qingqing Du, ‘The First Fire of Xiao Gang’s New Administration: the Number of Cases
Investigated in the First Ten Months Was Equal to That of Last Year’ Chinese Business News (25
December 2013) <http://stock.hexun.com/2013-11-25/159980321.html> accessed 10 December
2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 14 / Date: 20/7
JOBNAME: Rider PAGE: 15 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
30
Zheng 20.
31
Weihan Yang and Qingxin Cui, ‘The Responsible Justice of the Supreme People’s Court
on the First Judicial Interpretation of Securities and Futures Crimes Answering Media’s
Questions’ News China (22 May 2012) <http://news.xinhuanet.com/legal/2012-05/22/c_
112013889.htm> accessed 10 December 2013.
32
Interview with Zixue Zhang, Commissioner of the Administrative Sanction Committee of
the CSRC (Beijing, 10 March 2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 15 / Date: 20/7
JOBNAME: Rider PAGE: 16 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
dealing activities do occur with great frequency throughout the financial industry and
business world. It is hard to find someone who is willing to give credit to the
enforcement from individual investors, both public and private, of insider dealing
regulations.33 Many hold a much more negative approach, considering the insider
dealing regulations are only a ‘face job’ without any substantial deterrence or
enforceability.34
The general disappointment over the enforcement of insider dealing law reflects
poorly on regulation and may be interpreted as a worrying public distrust of the
government. It is clear that the regulators of the securities markets and the judiciary
face real problems in the enforcement of insider dealing regulations, especially in terms
of finding and retaining experienced staffing and adequate funding. It is also clear that
sufficient political will, in ensuring the independence and transparency of the CSRC
and the courts, has been missing.
A recent incident greatly embarrassed the CSRC. On 16 August 2013, the Shanghai
Composite Index rose by 6 per cent within minutes as a result of abnormal trading
volumes of the shares of Everbright Securities by the company itself. The company
claimed that its erroneous buying orders were due to a system glitch and it only took
short positions later in index futures and exchange-traded funds to fix the error. The
CSRC tried to act timely in order to stabilise the markets after the massive coverage of
the incident in the media: it not only confiscated the company’s illegal gains, but also
imposed a record fine of RMB 523 million against the company for insider dealing and
banned the company indefinitely from trading on its own account; it also fined four of
the company’s executives RMB 0.6 million in total and banned them permanently from
securities markets. Despite the record sanctions, the CSRC has had to deal with a wide
range of criticism. One is that it has failed to actually protect the interest of investors,
especially those who suffered in the incident, by compelling Everbright Securities to
produce an enforceable proposal of civil compensation, even though the CSRC insisted
that it had not only urged the company to set up a foundation for civil compensation
but also offered help. The CSRC has also been criticised for not referring the case to a
PSO for criminal investigation, despite the fact that it has clearly satisfied the criteria
set out in Provisions of Supreme People’s Procuratorate and Ministry of Public Security
Regarding Criteria for Accepting Cases for Prosecution in Respect of Criminal Cases
under the Jurisdiction of the Public Security Organ as we discussed above.35
33
Feng Guo, Financial Regulation and Securities Laws in the Era of Globalisation
(Intellectual Property Publishing House 2010) 442.
34
Interview with Yixin Song, Senior Partner of Shanghai Xinwang Wenda Law Firm
(Telephone interview, 15 March 2012).
35
Zheng Xing, ‘Legal Embarrassment behind Everbright Securities’s Case’ Beijing News
(1 September 2013) <http://news.xinhuanet.com/comments/2013-09/01/c_117175417.htm>
accessed 10 December 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 16 / Date: 20/7
JOBNAME: Rider PAGE: 17 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
5. CONCLUDING REMARKS
The revival of the securities markets in the early 1980s was greeted with mixed
reaction. While there were those who welcomed and celebrated the revival, there were
others who viewed them with suspicion. The last 30 years has seen the Chinese
financial markets taking off from a modest beginning to a remarkable industry that
plays an increasingly important role in the national economy. While this is a success to
be appreciated, half of the battle is yet to be won. Since the very beginning, a serious
problem in China’s securities markets has been the dominant position of insiders in
accessing non-public material information and using it for their own ends. From the
perspective of maintaining and promoting the integrity of financial markets as well as
investors’ confidence in such markets, insider dealing regulations are pivotal in view of
their function of reducing information asymmetry. In addition, the growth of a global
market compels China to formulate its own regulations on insider dealing in order to
provide support for continued economic development, reduce the risks for investors and
attract more capital.36
The main changes of law, regulation and policy concerning insider dealing in China’s
securities markets have been discussed. It is fair to say that insider dealing regulation in
China has undergone a positive and constructive development. It is on the right course
in criminalising insider dealing and introducing a private right of action against insiders
on the basis of administrative sanctions imposed by the CSRC. There are, however,
several problems surrounding particular provisions of insider dealing regulations. Issues
such as that the term ‘insider’ is not defined and it is unclear whether inside
information is required to be securities-related and material at the same time have
certainly caused problems in practice. In the meantime, the enforcement record of the
regulations remains far from satisfactory. It is safe to conclude here that the rapid and
continuous development of China’s financial industry will inevitably lead to limitations
on the considerations set out in the law to be directed against insider abuse. Therefore,
continuous evaluation of the regulatory system of the markets is of great importance.
36
Hui Huang, International Securities Markets: Insider Trading Law in China (Kluwer Law
International 2006) 55.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 22 /Pg. Position: 17 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
BACKGROUND
With recent financial crises the compliance function has gained more currency as an
issue of concern. What was taken for granted for many decades as a routine activity has
now acquired a new dimension; there has indeed been a paradigm shift in terms of
expectations, influence and interventions. With almost every postmortem in the
aftermath of a crisis, there has been a finding that if the compliance officers were more
proactive and alert some of the underlying factors leading to the crisis could possibly
have been mitigated with the intervention of the regulator and the board and senior
management of financial services firms. Compliance officers are expected to be the first
to see the ‘red flag indicators’ and to be proactive in dealing with them.
This chapter outlines some of the issues relevant to compliance officers or prospect-
ive compliance officers. The aim is to give a broad perspective of how expectations are
changing the world over and to underline what compliance officers should address their
minds to in order to be able to better cope with the changing realities and expanding
responsibilities and expectations. Given the wide scope of the topic, the chapter
naturally has its focus on certain selected aspects of immediate relevance to a global
audience of compliance officers.
The traditional role of compliance and that of compliance officers was based
essentially on a 2005 paper produced by the Basel Committee on Banking Supervision.
It pointed out, inter alia, that
Compliance starts at the top. It will be most effective in a corporate culture that emphasises
standards of honesty and integrity and in which the board of directors and senior management
lead by example. It concerns everyone within the bank and should be viewed as an integral
part of the bank’s business activities. A bank should hold itself to high standards when
carrying on business, and at all times strive to observe the spirit as well as the letter of the
law. Failure to consider the impact of its actions on its shareholders, customers, employees
and the markets may result in significant adverse publicity and reputational damage, even if
no law has been broken. (Bank for International Settlement 2005)
The above pronouncement remains true even today, but with regard to the specific
functions and issues that compliance officers need to be aware of, much water has
flowed under the bridge since then. The Securities Industry Financial Markets
Association’s White Paper on ‘The Evolving Role of Compliance’ issued in March
2013, in particular, has stimulated fresh thinking on the expected role of compliance
officers (Securities Industry Financial Markets Association 2013). One of the key
points considered is whether compliance officers run the risk of being classified as
performing ‘supervisory activities’, thus making themselves open to liability. The
279
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 1 / Date: 14/10
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
REGULATORY LANDSCAPE
A well-known text on compliance has described ‘regulation’ as ‘undoubtedly the
founding spark and ultimate justification of all Compliance activity in the financial
services industry’ (Mills 2008, p. 3). Financial services regulation does not operate in
total isolation but in a broad context. In particular, after the collapse of ENRON, there
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
has been a spate of new laws and regulations that have come into place not just in the
US, where the problem first surfaced, but also elsewhere. The Dodd-Frank Wall Street
Reform and Consumer Protection Act contains a large number of sections, and even for
US compliance lawyers it is not the easiest of legislation for one to navigate and to be
able to distil the essence. In 2012 it was estimated by the US House of Representatives
Financial Services Commission that ‘it will take 24 million man hours every year in
order for the private sector to comply with the Dodd-Frank rules’ (Gallagher 2013). The
US Securities and Exchange Commission (SEC) has produced a document running into
more than 600 pages on new rules governing just one area of reform, namely
securitisation. The Sarbanes-Oxley Act of 2002 – which preceded the Dodd-Frank Act
and is a relatively simpler piece of legislation in terms of sections but nevertheless has
more than 1000 provisions – has had a stronger influential effect on other jurisdictions,
in particular with regard to the requirement for dual certification of accounts. As is the
case with most compliance-related laws, one needs to view the statutory provisions
within a broad legislative context. According to Barry Rider, ‘It is often the case that
compliance systems focus almost exclusively on the criminal and regulatory laws and
ignore the legal environment within which the relevant transactions or conduct occurs.
The problems are all the greater when several different jurisdictions are involved’
(Rider 2014, p. 36). The US Foreign Account Tax Compliance Act (FATCA) is a classic
example where financial institutions outside the US had to develop systems and train
staff to comply with the requirements. Similarly, the new UK Bribery Act has
extra-territorial effect (Parlour 2013).
Regulatory structures which were at one time thought to be the ideal model are
undergoing radical reforms. These are taking place just not only in Europe but even in
faraway places. With the replacement of the UK Financial Services Authority (FSA)
and the Securities Commission of New Zealand, for instance, compliance officers and
indeed associations of compliance officers now need to closely follow the law- and
rule-making processes in different jurisdictions and accordingly modify internal com-
pliance manuals and compliance monitoring plans. Staff training assumes a high degree
of importance in this context.
Not all compliance officers have a legal background, and it is essential that those
who do have a legal background, or firms that have a legal department, work in tandem
with compliance officers without a legal background to help demystify the laws and
regulations and provide clarity with regard to compliance requirements. Updating of
compliance manuals and compliance monitoring plans must receive constant attention.
RISK MANAGEMENT
Despite the presence of risk managers, compliance officers cannot remain oblivious to
the risk factors that certain products, services, activities, market conduct, and advertis-
ing and promotion might give rise to. In consultation with business heads and risk
managers, compliance officers are duty bound to exercise greater vigilance to reduce
regulatory and reputational risks that might arise due to the failure to properly
appreciate and estimate risk factors.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
In the development of risk mitigation factors, compliance officers have a special role
to play. Case studies from various jurisdictions serve as good examples of what may
possibly go wrong even with the best of plans. From Nick Leeson of Barings Bank to
Kweku Adoboli of UBS, the world is full of stories of how inadequate internal control
and risk management systems have facilitated financial frauds. Nick Leeson, in his
book titled Rogue Trader, thought it fit to reproduce (Leeson 1996) some of the
conclusions of the Bank of England report on the inquiry into the collapse of Barings
Bank, namely:
Each scandal has lessons to offer, but these are often highlighted, only to be ignored
within a short span of time. The financial services sector remains far too vulnerable
unless diligent and robust measures are in place; compliance officers must take the
initiative to scale up risk mitigation systems.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
operational issues, and compliance officers need to understand the dynamics underlying
these new types of products and services. The Shariah compliance risk, in particular,
needs to be understood by compliance officers (Chia der Jiun and Wang Yining 2008,
p. 1). Indeed, credit rating agencies, stock exchanges and stock market regulators need
to develop a better understanding of the implications of some of these instruments.
Business units do not work in isolation. The operations are becoming more and more
complex and involve other jurisdictions with which cross-border trading is taking place.
Coordination with business units has become more important today than ever before.
Some of the compliance risks have arisen due to poor understanding of the nature of
the products, particularly those of a hybrid nature. If the nature of products cannot be
easily understood, the applicable legal, regulatory and compliance rules cannot be
properly appreciated and applied.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
SPECIALISED TRAINING
The International Compliance Association was established in 2001. It is the leading
global provider of professional certificated qualifications and training in anti money
laundering, compliance and fraud/financial crime prevention. Its Diploma level and
other certificates are provided in association with the Manchester Business School of
the University of Manchester.
The annual international symposia on economic crime organised at Jesus College,
Cambridge, have been largely instrumental in exposing compliance officers to a range
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Bernard Madoff under the title ‘Don’t Ask, Don’t Tell’. No proper follow-up action was
then taken by the US financial regulators to what later turned out to be a major 65
billion dollar scandal. In her book Madoff: The Man Who Stole $65 Billion she rightly
asks the question, how did he fool so many investors for so long (Arvedlund 2009)?
Compliance officers who work in firms within a strong compliance and corporate
governance culture will get more comfort that the norms of ethical conduct will
permeate all levels of activities and personnel. The setting up of Integrated Risk
Management Committees with the participation of compliance officers affords an
opportunity for them to set right many things. However, there are many issues yet to be
sorted out. The European Union rule on a cap on bonuses, for instance, has resulted in
an increase in salaries and thus in bonus payments. Bill Dudley, the head of the New
York Branch of the Federal Reserve, has mooted the idea of ‘performance bonds’ which
will be kept in vaults for ten years – this idea is gaining support as a means ‘to nudge
financiers away from dodgy dealings’ (The Economist 2014b) and to ensure that fines
are not passed onto shareholders. In Sri Lanka, in the wake of the collapse of several
finance companies, a new Finance Business Act was enacted. In terms of it, any fine
imposed on a director will have to be paid out of the personal funds of the director, and
if company funds are used the director will be liable to serve a period of imprisonment.
Another provision – perhaps of an unusual nature – states that upon three consecutive
defaults of the same requirement, the Chief Executive Officer will automatically cease
to hold office, even though he was not personally responsible for the lapses.
CONCLUSIONS
The changing regulatory landscape and the results of fact-finding missions have meant
that the compliance function has to undergo a major transformation. Compliance
officers now have to cope with new responsibilities and challenges which were
inconceivable ten or fifteen years ago. This will be possible only if they can work
within an enabling environment that is supportive of their changing role. Boards, senior
management, internal auditors and indeed all employees and stakeholders have to
recognise that compliance has ‘come of age’. The corporate culture must be supportive
of the compliance function, which must permeate all levels within the organisation. The
compliance function must receive the recognition it deserves. Those financial insti-
tutions that continue to lag behind in elevating the compliance function to its rightful
place and thus encounter problems might find that they have missed a valuable
opportunity to reduce their vulnerability and effectively manage compliance risks.
REFERENCES
Arvedlund, E. (2009) Madoff: The Man who Stole $65 billion, Penguin Books, UK.
Bank for International Settlement (2005) Basel Committee on Banking Supervision – Compliance and the
Compliance Function in Banks, Basel, para. 2.
Brown, G. (2010) Beyond the Crash, Simon & Schuster, London.
Chia der Jun and Wang Yining (2008) Risks and Regulation of Islamic Banks: A Perspective from a
Non-Islamic Jurisdiction, Monetary Authority of Singapore Staff Paper, No. 49.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 23 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
This chapter is concerned with law and regulation in the United Kingdom that is
directed at financial services businesses for the purpose of countering financial crime.
(For convenience in this chapter a financial services business will be referred to as a
‘firm’). In many respects such law and regulation creates obligations not to engage in
predicate offences and is supported by the prospect of either prosecution or adminis-
trative regulatory action for those firms that do. It can be identified, however, that
certain offences operate within a framework of law and regulation which additionally
imposes upon a firm an obligation to establish and operate systems of control, for the
purpose of limiting the extent to which it might engage in or be used for the offence in
question. Moreover, such regulation is often supported by an enforcement outcome
where a firm fails to meet the internal control requirements. This chapter will thus
examine both criminal law and administrative law compliance enforcement.
Financial Services regulation can be described as giving rise to a regime for
‘compliance’, where non-compliance may be seen as a risk to a firm’s lawful
obligations. This chapter will however illustrate that compliance risk is more dynamic
and complex than a simple binary question of compliance versus non-compliance. A
diverse range of issues touching upon matters such as the nature of a firm’s business
and the profile of its clients, the adequacy of process design, corporate governance,
staff competence, culture and ethics all interplay to shape whether a firm is capable of
meeting its compliance obligations and thus suggest the types of risks that can lead to
a compliance failure.
There may be a temptation to identify an appropriate definition for the meaning of
the word ‘compliance’. In its literal form the word can be defined as the act of
‘yielding, agreement, complaisance, assent, submission …’.1 The International Compli-
ance Association defines compliance as ‘… the ability to act according to an order, set
of rules or request’,2 but the Association adds texture to the definition by considering
that the definition in relation to financial services compliance operates at both the levels
of compliance with ‘external’ obligations and ‘internal’ controls ‘imposed to achieve
compliance with the externally imposed rules’.3
1
The Chambers Dictionary, Chambers Harrup Publishers, 1998.
2
The International Compliance Association website <http://www.int-comp.org/faqs-
compliance-regulatory-environment> accessed 26 January 2015.
3
n2.
288
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Risk may be defined as a ‘hazard, danger, chance of loss or injury’,4 and thus risk in
the context of financial crime compliance may be construed as being concerned with
threats to a firm’s ability to comply with the law or meet its regulatory obligations.
Although no definition for the word ‘risk’ is provided in the various prudential rules
applicable to different classes of investment firms, the discrete definitions for different
categories of risk provide insight into the circumstances that can give rise to the risk or
threat. For example, in the UK Financial Conduct Authority’s (FCA) Prudential
Sourcebook for Investment Firms (IFPRU)5 operational risk is defined as ‘the risk of
loss resulting from inadequate or failed internal processes, people and systems or from
external events, including legal risk’. The process of risk identification and risk
management is, however, not a one dimensional activity and risk management
techniques as well as risk-focused financial services regulation require that risk is
considered in terms of both the probability or likelihood of a risk event occurring and
the impact that such an event would have if it were to occur. Indeed, likelihood and
probability assessment is deployed by the FCA in its approach to risk-based super-
vision of authorised firms.6 Moreover, risk identification is strengthened when combin-
ing identification of the probability and impact of materialised as well as emerging risk.
Risk management, however, is not necessarily concerned with the elimination of a
risk event, and indeed in the context of compliance risk and financial crime, the
Financial Services Authority (FSA) confirmed in a letter in 2004 to the Joint Money
Laundering Steering Group (JMLSG) its view that, ‘We also recognise that any regime
that is risk-based cannot be a zero failure regime. We appreciate the importance of a
non-zero failure regime; not least because a 100% standard will not be cost effective
and will damage innovation, competition and legitimate commercial success.’7
The various prudential rules address risk in terms of the amount of and availability
(liquidity) of capital in order to ensure that an authorised person can meet its liabilities.
For example, IFPRU 2.2.1R provides that ‘A firm must, at all times, maintain overall
financial resources and internal capital, including own funds and liquidity resources
which are adequate both as to amount and quality to ensure there is no significant risk
that its liabilities cannot be met as they fall due.’ However, the use of capital to manage
risk may not provide the complete solution or be the most appropriate response. There
are certainly occasions where organisations should focus on risk controls, including
internal policies and procedures, as an additional method of managing risk. The use of
controls is certainly a regulatory expectation. For example, the FCA Senior Manage-
ment Systems and Controls Sourcebook (SYSC)8 at SYSC 7.1.2R along with Art 7
4
n1.
5
Financial Conduct Authority Prudential Sourcebook for Investment Firms as at 7 February
2015 <http://fshandbook.info/FS/html/handbook/IFPRU>.
6
See Financial Conduct Authority, How We Supervise Firms, Risk Management, Financial
Conduct Authority website <http://www.fca.org.uk/about/what/regulating/how-we-supervise-
firms/risk-management> accessed 7 February 2015.
7
The Financial Services Authority Letter from Philip Robinson, Financial Crime Sector
Leader, to Ian Mullen, Chairman of the JMLSG, 25 October 2004 <http://www.fsa.gov.uk/pubs/
other/money_laundering/jmslg.pdf> accessed 7 February 2015.
8
Financial Conduct Authority Senior Management Systems and Controls Sourcebook
<http://fshandbook.info/FS/html/handbook/SYSC> accessed 7 February 2015.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
(a) believed, on reasonable grounds, that his behaviour … [did not amount to market abuse],
or (b) he took all reasonable precautions and exercised all due diligence to avoid behaving in
a way which [amounted to market abuse] …
In the context of and to provide clarity for the s123 defence, the FCA is required to
publish both a market abuse code under s119 FSMA, that includes descriptions of
9
The EU Markets in Financial Instruments Directive 2006/73/EC Implementing Directive
2004/39/EC as regards organisational requirements and operating conditions for investment
firms.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
behaviours that are and are not accepted market practices and, pursuant to s124 FSMA,
a statement of enforcement penalties that is to include, pursuant to s124(3), ‘an
indication of the circumstances in which the … [FCA] is to be expected to regard a
person as a) having reasonable belief that his behaviour did not amount to market
abuse; or b) having taken reasonable precautions and exercised due diligence to avoid
engaging in market abuse’. To some extent the FCA’s current market abuse statement of
penalty (which is set out in Chapter 6 of its Decision Procedure and Penalties manual
(DEPP)) links the reasonable grounds defence to compliance with its code of market
conduct (see DEPP 6.3.2(1)G). The availability of the defence does, however, extend to
additional factors that allow persons to rely on obtained advice and guidance,
compliance with market rules and the takeover code and potentially compliance with
internal procedures. Thus, for example, the FCA provides at DEPP 6.3.2(6)G that it
will take into account ‘whether, and if so to what extent, the person followed internal
consultation and escalation procedures in relation to the behaviour (for example, did
the person discuss the behaviour with internal line management and/or internal legal or
compliance departments)’.
On further analysis one may identify what may be described a procedural compli-
ance defence arrived at through a combination of compliance with the reasonable
grounds described in the market abuse penalties code together with control obligations
such as SYSC 6.1.1R which requires firms to have in place ‘adequate policies and
procedures sufficient to ensure compliance of the firm including its managers,
employees … with its obligations under the regulatory system and for countering the
risk that the firm might be used to further financial crime’.
Certain provisions in the Money Laundering Regulations 2007 illustrate the signifi-
cance of organisational systems of control in the prevention of financial crime, whereby
pursuant to regulation 45 it is an offence for a person not to comply with what may be
described as positive control obligations including: customer due diligence (reg 7);
carry-out ongoing monitoring (reg 8); conduct enhanced due diligence and ongoing
monitoring (reg 14); maintain records (reg 19); policies and procedures (reg 20); and
provide staff training (reg 21). By way of example, firms are required, pursuant
regulation 20(1), to
establish and maintain appropriate and risk-sensitive policies and procedures relating to –
(a) customer due diligence measures and ongoing monitoring;
(b) reporting;
(c) record-keeping;
(d) internal control;
(e) risk assessment and management;
(f) the monitoring and management of compliance with, and the internal communication of,
such policies and procedures,
in order to prevent activities related to money laundering and terrorist financing.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
noting that individual responsibility can arise under regulation 45 where there has been
a corporate process and control failure, and where it can be shown
(a) to have been committed with the consent or the connivance of an officer of the body
corporate; or
(b) to be attributable to any neglect on his part,
the officer as well as the body corporate is guilty of an offence and liable to be proceeded
against and punished accordingly.
The JMLSG guidance notes for the financial sector have thus become significant in the
sector’s efforts to comply with its obligations under the Proceeds of Crime Act, the
Money Laundering Regulations 2007 and the Terrorism Act 2000. Although a detailed
examination of JMLSG guidance is beyond the scope of this chapter, it is important to
note that in addition to providing guidance on areas such as customer identification,
due diligence and suspicious activities, guidance is provided in relation to both the
nature of appropriate controls to prevent financial crime and the risk-based approach to
anti-money laundering (AML) compliance, that is, the notion of risk aware systems of
control. Thus at s4.12 JMLSG sets out a series of steps to assess firms’ risk exposure,
process and control design and operation, stating:
The s7 Bribery Act 2010 offence arising where a commercial organisation fails to
prevent bribery offers under s7(2) a not dissimilar internal process compliance defence.
The s7(2) defence is available where the commercial organisation can show that
notwithstanding a person associated with it bribing another, it had in place appropriate
bribery prevention procedures. The difficulty with an offence such as bribery, which
applies to a broad spectrum of commercial organisations, is what might constitute
‘appropriate’ procedures. Although the determination of what might be appropriate
requires objective considerations, commercial organisations will undoubtedly have
some concern about whether the procedures they adopt and operate will be sufficient.
Section 9 of the Act attempts to address concerns about the sufficiency of internal
processes and requires the Secretary of State to publish guidance on bribery prevention
procedures. However, one may argue that such guidance serves to increase a business’s
concerns, in that there is now an obligation to consider how to interpret the guidance
and create and implement arrangements that meet/comply with it. The focus of the
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
10
HM Ministry of Justice, The Bribery Act 2010 – Guidance. March 2011
<www.justice.gov.uk/guidance/bribery.htm> accessed on 7 February 2015.
11
n10 para 1.2 p21.
12
The Financial Services and Markets Act 2000 (Threshold Conditions) Order 2013 SI
2013/555.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
proper by reference to their suitability, which will include, at 2E(f),‘whether A’s [the
person’s] business is being, or is to be, managed in such a way as to ensure that its
affairs will be conducted in a sound and prudent manner’ and, at 2E(g), ‘the need to
minimise the extent to which it is possible for a business carried on by A, or to be
carried on by A, to be used for a purpose connected with financial crime’. In its
Threshold Condition Sourcebook (COND), at 2.5.6(17)G the FCA provides that it
includes in its assessment whether ‘the firm has in place appropriate systems and
controls against financial crime, including, for example, money laundering’.
It is submitted that the suitability condition described above necessarily overlaps
with conditions relating to non-financial resources (such as human resources and
organisational systems). For example, Threshold Condition 2D(4)(b) sets out that the
adequacy of non-financial resources includes consideration of ‘whether A’s non-
financial resources are sufficient to enable A to comply with (i) requirements imposed
or likely to be imposed on A by the FCA in the exercise of its functions’ and at COND
2.4.2(2)G the FCA includes with its consideration of ‘resource’, matters relevant to
‘human resource’ and ‘effective means by which to manage risk’. Moreover, at COND
2.4.4(2)(d)G the FCA identifies the overlap between non-financial resources and
appropriate risk-orientated systems of control, stating that consideration is given to
‘whether the firm has taken reasonable steps to identify and measure any risks of
regulatory concern that it may encounter in conducting its business and has installed
appropriate systems and controls and appointed appropriate human resource to measure
them prudently at all times’.
The addition, however, of a business model Threshold Condition at 2F, following
amendments in the Threshold Conditions Order, now allows the FCA to consider how
an authorised person’s ‘strategy for doing business’ may affect their ability to comply
with regulatory obligations, as well as the impact the strategy may have on the financial
market. Business model issues that the FCA may consider include, at Condition 2F(2):
(a) whether the business model is compatible with A’s affairs being conducted, and
continuing to be conducted, in a sound and prudent manner;
(b) the interests of consumers;
(c) the integrity of the UK financial system.
This wider business model assessment draws in issues such as the risk presented by the
authorised person’s business strategy (COND 2.7.8(7)G), the person’s controls and
governance arrangements (COND 2.7.8(6)G) and, significantly, at COND 2.7.10G,
whether firms test the ‘sustainability’ of their businesses following negative scenarios
and their business’s vulnerability to specific events and risks. It is submitted that such
testing may for certain firms include assessment of the threat of financial crimes.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
… have robust governance arrangements, which include a clear organisational structure with
well defined, transparent and consistent lines of responsibility, effective processes to identify,
manage, monitor and report the risks it is or might be exposed to, and internal control
mechanisms, including sound administrative and accounting procedures and effective control
and safeguard arrangements for information processing systems.
13
Financial Services handbook High Level Principles for Business. <http://fshandbook.info/
FS/html/FCA/PRIN/2/1> accessed 9 February 2015.
14
Directive 2013/36/EU on access to the activity of credit institutions and the prudential
supervision of credit and investment firms, amending Directive 2002/87/EC and repealing
Directives 2006/48/EC and 2006/49/EC. Also Regulation (EU) No 575/2013 of 26 June 2013 on
Prudential Requirements for credit institutions and investment firms and amending Regulation
(EU) No 648/2012.
15
EU Directive 2004/39/EC on Markets in Financial Instruments.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
with the firm’s own business and its particular risks in mind. In effect, the application
of the compliance requirement can flex to meet the threats presented by individual
financial services activities.
The importance of the strength of corporate governance, along with the role played
by and responsibility to be taken by a firm’s senior management, is stressed by the
FCA in its Financial Crime Guide,16 which suggests that firms test the strength of their
arrangements through a series of self-assessment questions such as ‘when did senior
management, including the board or appropriate sub-committees, last consider financial
crime issues? What action followed discussions?’ and using good practice examples
including that of ‘a firm has a strategy for self-improvement on financial crime’ and
perhaps more telling, examples of poor practice such as ‘there is little evidence of
senior staff involvement and challenge in practice’.
Furthermore, it must be recognised that the cultural foundations within a business
often have a significant influence on the manner in which a firm and its staff approach
the conduct of the firm’s business and arguably its ability to meet its legal and
regulatory obligations, that is, its ability and willingness to comply. Whilst it is difficult
to pinpoint provisions of regulation that might be considered to regulate corporate
culture, there is nonetheless clear direction on the significance played by culture and
ethics in good business practice.17 In its Financial Crime Guide,18 when addressing the
importance of good governance, the FCA points to ‘the right tone’ being set by senior
management.
The FCA’s Financial Crime Guide also addresses ‘the importance of organisational
structure’, and whilst recognising that there is no one organisational model that can be
applied to all firms, ‘coordination’ and ‘information sharing’ are at the core of an
effective structure.19 Using a series of self-assessment questions, along with examples
of good and bad practice, the FCA guidance illustrates the importance of factors such
as management responsibility, accountability, seniority and the overall adequacy of a
firm’s financial crime resource in demonstrating that it has an effective organisational
structure.
The FCA’s Financial Crime Guide addresses general issues relating to policies and
procedures and provides useful texture to the general requirement in SYSC 5.1.12R, ‘A
common platform firm and a management company must ensure that its relevant
persons are aware of the procedures which must be followed for the proper discharge of
their responsibilities.’ In general terms, the guidance suggests firms should be satisfied
that their internal procedures are appropriate and up to date and ‘readily accessible,
effective and understood by all relevant staff’. Furthermore, aspects of the FCA’s
self-assessment questions confirm the importance of the interplay between a firm’s risk
assessment and construction of process and procedure by encouraging firms to consider
‘What steps does the firm take to ensure that relevant policies and procedures reflect
new risks or external events?’ and ‘How quickly are any necessary changes made?’
16
FCA Financial Crime: A Guide for Firms. April 2014. <http://media.fshandbook.info/
Handbook/FC1_FCA_20140401.pdf> accessed 7 February 2015.
17
For example, see Lambert R. The Banking Standards Review. 19 May 2014.
18
n16 s2 Financial crime systems and controls, p11.
19
n16 box 2.2 p12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
20
n16.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
21
FSA Final Notice to Coutts & Company. 23 March 2012 <http://www.fca.org.uk/static/
pubs/final/coutts-mar12.pdf> accessed 6 February 2015.
22
n21 para 69 [14].
23
The Financial Conduct Authority. Decision Notice to Standard Bank plc 22 January 2014
<https://www.fca.org.uk/static/documents/decision-notices/standard-bank-plc.pdf> accessed 7
February 2015.
24
The Financial Conduct Authority. Final Notice Besso Limited 17 March 2014. <https://
www.fca.org.uk/static/documents/final-notices/besso-limited.pdf> accessed 7 February 2015.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 11 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUDING REMARKS
Financial crime poses a significant threat to financial markets, and the financial crime
compliance obligations examined in this chapter illustrate that the interplay between
risk management, effective procedures and overall organisation control provides a
mechanism for reducing the extent to which individual institutions may be exposed to
heighted risk. Given the potential significance that weak systems of control can have in
the fight against financial crime, it is perhaps unsurprising that reference to effective
and adequate systems of control appears within the very framework for regulation of
the financial services sector.
25
n13.
26
n24 para 2.2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 24 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
This chapter is an introduction to the key practicalities of financial crime deterrence. It
is based on 25 years’ experience in financial markets, including what has been
described as the leading example of compliance turnaround, and the leading transform-
ation of a country’s financial markets. The chapter covers what has been shown to work
in the ten key deterrence elements:
1. Threat analysis – the first step in deterrence is to carry out an assessment of how
an organisation may be affected by underlying criminal activity including drug
trafficking, money laundering, bribery and corruption, fraud, cybercrime, terror-
ism, nuclear weapon proliferation, organised crime and sanctions.
2. Vulnerability analysis – the second step is to carry out an assessment of how an
organisation may be vulnerable to underlying criminal activity by looking at the
products and services offered by an organisation, its staff, recruitment policies, IT
systems, partners, agents, introducers and referrers, and assessing where the
vulnerabilities are in the organisation.
3. Risk management is fundamental to an organisation in structuring its deterrence
architecture. This element is far easier to accomplish once the first two steps have
been carried out. Risk management consists of an assessment of the likelihood of
certain risk events occurring, and the size and type of impact should that risk
event occur. It is then a question of prioritising the risks concerned, assessing
relevant mitigators and putting all of this assessment into a coherent risk plan.
4. Deterrence model – once the threats and vulnerabilities are known, and risk
management carried out, the deterrence model can be assembled. To be effective,
the model must contain a number of key elements. It also needs to be operated in
a proactive fashion. The worst thing to do is to let the criminal seize or maintain
the initiative.
5. Due diligence – this is fundamental to successful financial crime deterrence. It is
rarely carried out in sufficient depth, however, largely due to organisations
carrying out an inappropriate cost benefit analysis of the amount of due diligence
required. Those who do this element well often discover large commercial
benefits which erstwhile competitors miss. Difficulties here relate to what is
required to be known, what investigation techniques may be allowed in certain
jurisdictions and what resources may need to be committed to the exercise.
6. Reporting – once an organisation has data on financial crime, or suspected
financial crime, then that needs to be analysed. If thought suspicious, it may need
to be reported. There are certain parameters around reporting which need to be
300
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. THREAT ANALYSIS
The first step in financial crime deterrence is to carry out an assessment of how an
organisation may be affected by underlying criminal activity including drug trafficking,
money laundering, bribery and corruption, fraud, cybercrime, terrorism, nuclear
weapon proliferation, organised crime and sanctions. Without such a step, any
deterrence system is likely to be skewed, or at worse irrelevant.
The general policy direction at international level is towards a risk based system of
deterrence, in an attempt to make best use of limited resources. This is being
introduced at the level of market participants, but has yet to permeate through at
jurisdiction level, however. For example, some countries do not face any terrorist threat,
or the threat they face may be greatest from drug trafficking or organised crime. Yet
they are still being subjected to the standard requirements of international organisations
such as the Financial Action Task Force, which names states it feels are not up to the
mark. This often leads to misinterpretation at the level of market participants. For
example, many financial institutions have seen that jurisdictions such as Turkey have
been classified as jurisdictions with money laundering deterrence deficiencies. This
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
classification has led them to regard such jurisdictions as jurisdictions of high risk and
even to abandon transactions involving such jurisdictions. At the same time, the UK
government is pressing for increased links with Turkey, and indeed has set the doubling
of trade as a target. Communication about what such classifications are meant to
represent will help to avoid such distortion in threat analysis and deterrence systems.
Different types of organisations also face different types of threat. For example, retail
organisations will usually find that the threats they face are more related to shoplifting,
criminal damage, arson and fraud, rather than crimes such as terrorist financing or
money laundering. Financial institutions other than banks are unlikely to face risks of
being used for terrorist financing, though they are at a far greater risk of being used to
funnel the proceeds of drug trafficking and organised crime, bribery and corruption and
even nuclear weapons proliferation financing.
Threat analysis needs to be carried out on a regular basis to ensure that the threats
have not changed and that the analysis fits not only the current external situation, but
also the internal structure of the business. For example, in terms of trafficking of
heroin, the main route from Afghanistan, the major source of heroin for the UK market,
has traditionally been overland, passing through central Asia and then the Balkans.
Recent changes have seen shipments pass around the horn of Africa. Similarly, major
cocaine routes from Latin America to Europe, which traditionally used to pass through
the Caribbean and then across the Atlantic, have started to switch to a passage across
the southern Atlantic to Western Africa, before making their way northwards towards
the Iberian peninsular.
Similarly, market participants need to keep an eye on development of their products,
services and markets, and changes to their business model. They need to be alive to the
potentially different threats which dealing in new products, services and markets may
bring.
It must be borne in mind that threat analysis is an art rather than a science. Much
depends upon awareness of the threats and their changing nature and extent, which in
turn relies on the quality of the feedback provided by the authorities. Attempts at
providing generic threat analysis have been made by the US State Department in
relation to what are thought to be major money laundering countries and countries
involved in significant drug production and trafficking, but this is compiled from a US
perspective and the reality for other countries may be rather different. Transparency
International attempts the same in relation to perceived levels of corruption. For market
participants, however, the basis of perception appears to have been overlooked, with
perception being treated as reality, which again can skew the analysis. Other organ-
isations attempt to provide global data coverage on other crimes. However, all have a
number of flaws, and this will remain the case until there is some attempt to harmonise
definitions, to collect data on a more uniform basis and to disseminate data in a
common fashion.
2. VULNERABILITY ANALYSIS
The second step is to carry out an assessment of how an organisation may be
vulnerable to underlying criminal activity by looking at the products and services
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
3. RISK MANAGEMENT
Risk management is fundamental to an organisation in structuring its deterrence
architecture. This element is far easier to do once the first two steps have been carried
out. Risk management consists of an assessment of the likelihood of certain risk events
occurring, and the size and type of impact should that risk event occur. It is then a
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
question of prioritising the risks concerned, assessing the mitigators and putting all of
this assessment into a coherent risk plan.
It is important to use a developed and detailed risk cycle:
a. Establish the context – the context of use of the risk cycle needs to be established
from the start. For example, is the risk assessment meant to cover the whole of an
organisation or only a certain part of it? Is it intended to be a detailed in depth
review or just an initial first pass? Is it intended to cover certain subject areas
rather than others?
b. Identify – risks need to be identified. A simple way of doing this is to ask “So
what?” at each stage of the risk identification. For example, an opening category
may be the risk of trading in certain offshore jurisdictions. To the issue of
jurisdiction, ask the question “so what?” which will lead to a need to list the
jurisdictions in which an organisation operates. A further “so what?” may identify
a need to split jurisdictions into those in which the organisation has a physical
presence and those in which it does not. A further “so what?” may identify a need
to list the key threats at large in the jurisdictions concerned. There may be
multiple answers, and each answer will need to be analysed. Keep going until
there are no answers to the “so what?” question and this will identify the risks.
c. Analyse the risks identified to see what the risk really is. Use a variety of analysis
techniques, whether these techniques consist of logic, reasoning, brainstorming,
competing hypotheses, the six thinking hats, or other techniques.
d. Assess the risks in terms of two critical elements. The first of these is the
likelihood of the risk event occurring (which can be categorised for example as a
high, medium or low likelihood). The second element is the likely impact of the
event (which can also be categorised for example as a high, medium or low
impact).
e. Prioritise the risks identified. Most organisations will prioritise those identified as
having a high likelihood of occurrence and a high impact. There is likely to be
some discussion as to which to prioritise as between medium impact but high
probability and high impact but medium probability.
f. Plan how the identified risks will be dealt with and by whom, as well as how
mitigating action will be measured.
g. Implement the risk plan, setting deadlines for when mitigating action must be
taken.
h. Report the impact of the mitigation.
i. Mitigate the risks still further.
j. Monitor how that mitigation affects the business and its impact on performance.
k. Review the risk plan and identify areas for potential improvement.
l. Reformulate the risk plan.
m. Document all of the above.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
4. DETERRENCE MODEL
Once the threats and vulnerabilities are known, and risk management carried out, the
deterrence model can be assembled. To be effective, the model must contain a number
of key elements. Some organisations operate a three tier level of defence, for example
the compliance team, then a broader management team and finally senior management.
This may prove to be rather static and reactive, however. For a deterrence model to
work, defences need to be structured on an integrated layered basis, and for a model to
achieve maximum effect it needs to be operated in a proactive fashion. The worst thing
to do is to let the criminal, or other stakeholders, seize or maintain the initiative.
The key elements to include in a deterrence model are:
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
5. DUE DILIGENCE
Due diligence is fundamental to successful financial crime deterrence. It is rarely
carried out in sufficient depth, however, largely due to organisations carrying out an
inappropriate cost benefit analysis of the amount of due diligence required. Those who
do this element well often discover large commercial benefits which erstwhile
competitors miss. Difficulties here relate to what is required to be known, what
investigation techniques may be allowed in certain jurisdictions and what resources
may need to be committed to the exercise.
In this electronic age, computers are reducing the degrees of separation between
people, yet they are also reducing human interaction and the clues which face to face
contact gives. Criminals and others exploit this, so the risks are increased. At the same
time, new laws require more to evidence relationships, and regulators and an ever more
global media are ready to pounce on transgressions. Enhanced due diligence really does
help establish the true picture, reduce risk and ringfence reputation.
Due diligence in many organisations is often merely reduced to collecting copies of
passports and invoices. In some organisations, not even that is done, management
preferring to rely on a client identification remediation exercise every few years or so.
These approaches do not give adequate protection and also result in commercial
opportunities being missed. How can anyone seriously know about anyone else on the
basis of a copy of their passport and a utility bill? Due diligence consists of detailed,
painstaking planning, collection, collation, checking, rechecking, deconfliction, ana-
lysis and scenario testing, turning over every stone, if it is intended to get near the real
answer to the question “Who am I really dealing with?”
Due diligence comprises rigorous procedures, checking legal requirements for
identification and verification and obtaining missing elements from third party sources
without disturbing the client or potential client, as well as detailed examination of
Politically Exposed Persons (PEPs) and Ultimate Beneficial Owners (UBOs), all
designed to obtain the true picture.
Ninety per cent of an iceberg lies below water. In due diligence terms, the “identity
iceberg”, most look at basic surface identity and obtain passport and utility bills, and
may check sanctions and PEPs. Penetrating below the surface of the identity iceberg
shows where the real risks lie, however. It is not only where the real risks lie, but also
the real opportunities and rewards. See the Figure 25.1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Name
Address
Passports, Utility Records, Sanctions
Politically Exposed Persons, Ultimate Beneficial Owners
Nicknames, Aliases, Family Structure, Social Networks, Lifestyle, Holidays, Schools, Education, Career,
Offices, Languages, Travel, Cars, Driver Records, Interests, Health, Physical Traits, Leisure, Teams, Property,
Surroundings, Media Footprint, Court Records, Grapevine, Reputation, Imagery, Trading Names, Business
Networks, Electronic Footprint, Financials, Credit History, Personalities, Psychographics, Demographics,
Skills, Beliefs, Values, Ethics, Religion, Traditions, Doctrine, Cultures, Ideology, Politics, Role Models,
Influencers, Followers, Popular Support, Referees, Detractors, Enemies, Charities, Attitude towards Law and
Regulation, Organisation, Resources, Equipment, Teachers, Mentors, Coaches, Courses, Experience,
Capabilities, Morale, Will, Commitment, Resilience, Susceptibility to Stress and Deception, Strengths,
Weaknesses, Critical Vulnerabilities, Personal History, including Dramas, Habits, Foibles, Vices,
Communications, Structures, Reporting Lines, Positions in Organisations, Committees, Honours, Awards,
Qualifications, Standard of Training, Control Behaviour, Modus Operandi, Intentions, Decision-Making
Process, Predictability, Spontaneity, Handicaps
6. REPORTING
Once an organisation has data on financial crime, or suspected financial crime, then
that needs to be analysed. If thought suspicious, it may need to be reported. There are
certain parameters around reporting which need to be complied with and obligations of
client confidentiality, disclosure and whistleblowing which merit consideration.
Reporting is the crux of financial crime deterrence. Although 90 per cent of the
investigative capability of the UK lies in the private sector, suspected crimes will
usually need to be reported to law enforcement for an investigation to be conducted to
criminal law standards.
However, not all crimes need to be reported to law enforcement. There is much law
around the reporting of suspicions of money laundering to law enforcement, but this
requirement to report does not relate to the underlying offences. There are some crimes
where reporting may be advisable, such as reporting suspicions of bribery and
corruption to the Serious Fraud Office, but in the main, the reporting of suspicions of
criminal activity is currently restricted to suspicions of money laundering (whether
these suspicions arise on a subjective or objective basis). This remains the only area of
English criminal law which is based upon suspicion. It seems peculiar in light of the
fact that the vast majority of suspicions of money laundering are not even read, let
alone actioned. It seems all the more curious in light of the fact that if the suspicion
arises before the transaction, then consent of law enforcement must be obtained, law
enforcement being given a clear seven days in which to consider their view, a time limit
which is unhelpful in fast markets. It also places unfair pressure on law enforcers, the
vast majority of whom hold no financial markets qualification and are therefore unable
to opine effectively on the more complex financial transactions. Be that as it may,
reporting is vital, and it is important to pass on sufficient intelligence so that action can
be taken. It is also important to practise reporting to overcome concerns about the
process and ensure staff appreciate the standard of objectivity required.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Reporting has to be bona fide; in other words, it must be justifiable. Such reports
should be kept confidential by law enforcement, but in certain cases have been ordered
to be disclosed by the courts and in other cases have been compromised. This is a grave
concern where such reports are sensitive in nature as the reporter may be named or
discovered. A further concern arises in that the reporting requirement is naturally in
conflict with duties of client confidentiality, though this duty is overridden by the duty
to report. It is therefore best to establish a clear reporting system, through certain
established channels, in order to avoid the legal and regulatory pitfalls.
It may also be useful to establish a whistleblowing system in order to enable internal
reporting to take place without retaliation on sources. Whistleblowers have rarely been
given full protection; in fact the reverse has been true, particularly in cases involving
the authorities. The most effective protection of both the organisation and the
whistleblower is to arrange for external reporting to an independent body and the
creation of an alternative credible source of the information reported.
7. RECORD KEEPING
Record keeping – this is a fundamental part of deterrence since records may represent
the evidence required in the event of further action being taken. In the event of a
criminal prosecution, every element of a transaction chain must be proved beyond all
reasonable doubt. Law enforcement is likely to be somewhat underwhelmed if the
transaction trail has been broken due to a failure in record keeping or destruction of
records earlier than allowed under time requirements.
There are further considerations relating to record keeping requirements:
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Any record retention policy should therefore include time limits, disclosure, authority,
destruction, medium of retention, location and language.
8. TRAINING
Training is vital to the deterrence of financial crime. It is rarely carried out well,
however, and much of it has become rote. Training is often carried out merely as a
regulatory necessity, but in reality training is related to the performance of an
organisation. Training needs to be matched to learning styles. There needs to be a
training plan to assess how the success of the training will be measured, in advance of
the training being undertaken. Training needs to be aligned to the performance
improvement plan of the organisation.
Training needs to be relevant, interactive and credible. Yet training often does not
achieve much in the way of performance improvement for the simple fact that it is not
assembled and transmitted in the manner in which recipients prefer to learn. There are
four key representational preferences:
a. Kinaesthetic – these are people who learn by doing, who need exercises to make
training come to life and who hate presenters who merely read script or lists of
bullet points from a screen.
b. Auditory digital – these are people who need to have lots of information, who
prefer graphs, tables, but who do not on the whole like exercises.
c. Auditory – these are people who are often musical, who like to hear what is being
presented in an effective way, often accompanied by music. Music needs to be of
the right type, however. For example, the brain works in the same metre as
baroque music.
d. Visual – these people are often artists or photographers. They need good visuals
to take messages on board and may prefer presentation in mind maps.
Training needs to be well planned. The best way of doing this is to carry out a training
needs analysis. Assess what skills and experience the organisation needs, work out
where the gaps are and introduce training courses to improve performance in the
designated areas. Work out how measurement of training performance will be carried
out in advance of compiling the training. There are four areas to consider:
a. Reaction – how did recipients feel about the training – test through a feedback
survey.
b. Learning – what did recipients learn – organise a test on the content of the
training.
c. Behaviour – what behavioural change are recipients required to make – this
usually takes a minimum of nine months.
d. Results – what performance improvements are required – this requires setting
performance indicators.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
a. Introduction of what is required to be learnt, so all recipients start from the same
baseline, no matter what their previous training may have been.
b. Assimilation of what is required to be learnt, so recipients can practise their new
knowledge or skills.
c. Testing of what is required to be learnt, so the organisation can be sure that the
key learning points have been understood, accepted and practised.
There are a variety of techniques to ensure that learning sticks in the memory. Most
recipients remember far more of what they have heard, seen and practised, as opposed
to merely having heard or read.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 11 / Date: 14/10
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
been developed to reduce this drop out rate. Often, staff pass on log-in details so others
can complete a test for them, so results may not be what they seem to be.
Cybercrime is the world’s fastest growing crime, already on a par with global drug
trafficking. Its popularity is taking off as criminals realise that it does not hold the same
kinds of risks as “normal” crime, and is far easier to commit, especially across borders.
This means that financial crime analysts need to be aware of the latest schemes and
collaborate closely with IT departments to reduce risk.
Cybersecurity is a growing related concern. Some government agencies have been
advocating stronger passwords, but bearing in mind that even strong passwords take
less than five minutes to crack with the right equipment, this is a forlorn hope and
effort may be better spent on determining what data needs to be on an IT system which
is linked to the internet, or whether it should be on a standalone IT system without
access. Accessing data through wifi systems in hotels and airports is becoming
increasingly popular, but again represents an area of potential IT leakage. More
traditional methods of communication may offer greater security. Governments are
beginning to insist on certain standards of IT compliance if companies are to be eligible
for government contracts.
a. Staff
b. Clients
c. Counterparties
d. Insurers
e. Bankers
f. Regulators (financial, health and safety, data protection, etc.)
g. Law enforcement
h. Politicians
i. Whistleblowers
j. Professional advisors (lawyers, accountants, tax advisors)
k. IT and communications specialists
l. Shareholders
m. Media (TV, radio, social media, general media and trade press)
n. Exchanges
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 12 / Date: 14/10
JOBNAME: Rider PAGE: 13 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
o. Clearing houses
p. Landlord
q. Property advisors
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 25 /Pg. Position: 13 / Date: 14/10
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
PART V
FRAUD
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. INTRODUCTION
This chapter presents an overview of the legal response to fraudulent behaviour,
covering both civil law and criminal law aspects. Civil law is engaged on occasions
where victims of fraud seek to recover the losses which they have sustained as a result
of a fraudster’s activities. Invariably, monies will have passed through the fraudster’s
hands and he will have no assets against which the victim can recover. Proverbially, he
is known as a “man of straw”. In this situation, victims will look towards other
potential defendants such as bankers, solicitors and accountants who have assisted the
fraudster in his nefarious endeavours, as a potential source for the recovery of their
funds. Criminal law, however, is engaged for an entirely different reason. Primarily, the
objective of the criminal law is to punish a wrongdoer for the harm he has caused to
society, and in serious fraud cases the punishment will usually consist of a lengthy term
of imprisonment. Invariably, a fraudster commits a number of different criminal
offences when perpetrating a fraud, ranging from an offence under the Fraud Act 2006
to offences involving false accounting and making misrepresentations to the financial
markets. The criminal law does facilitate victim compensation, and there are provisions
to this effect, but if asset recovery is the focus of the victim’s response the civil law is
a better forum for his endeavours.
Unfortunately, fraud has become an endemic part of modern life. In 2013–14, it was
estimated that 73 per cent of European companies and 66 per cent of US companies
were hit by at least one fraud.1 The Association of Certified Fraud Examiners has
estimated that the typical organisation loses 5 per cent of its revenue to fraud each year;
applying that figure to the 2011 gross world product, it gives an estimated loss of more
than $3.5 trillion.2 According to the UK’s National Fraud Authority,3 the loss to the UK
economy from fraud currently stands at £52 billion per annum; with private sector
losses estimated to be £15.9 billion, public sector losses at £20.6 billion, charity sector
losses across Great Britain at £147.3 million and fraud against individuals at
£9.1 billion.
1
Kroll, 2013/2014 Global Fraud Report.
2
Association of Certified Fraud Examiners, Report to the Nations on Occupational Fraud
and Abuse, 2012 Global Fraud Study.
3
National Fraud Authority, National Fraud Indicator, June 2013.
315
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
2. CIVIL FRAUD
The civil law provides victims of fraud with a means by which they can seek to recover
the losses they have suffered. Where there has been a clear case of fraud, such as fraud
by misrepresentation or deceit, the victim has a number of remedies in civil law.
2.1 Deceit
The common law has long allowed a cause of action to be brought on the basis of
deceit. The cause of action can be traced to the decision in the case of Pasley v
Freeman4 in 1789. Three elements of the action must be shown in order for a claim of
deceit to succeed: (1) that a false representation was made, (2) that the representation
was intended to influence the claimant and (3) the representation did in fact influence
the claimant.5 The standard of proof required in order to show common law deceit is
the ordinary civil standard, on the balance of probabilities.6
In relation to the first element of the action, a defendant must be shown to have made
a representation, either of past or existing fact or law. Such a representation may be
express or implied. “Mere silence, however morally wrong, will not support an action
of deceit.”7 However, misrepresentation can be deemed to have occurred through
conduct alone.8 According to the House of Lords in the case of Derry v Peek:9
[I]n order to sustain an action of deceit, there must be proof of fraud and nothing short of that
will suffice. Secondly, fraud is proved when it is shown that a false representation has been
made (i) knowingly, (ii) without belief in its truth, or (iii) recklessly, careless whether it be
true or false.
Non-disclosure, where there is a pre-existing duty to disclose, may also ground a claim
for deceit at common law.10 However, opinions, promises or statements of intention
will not render a defendant liable for deceit.11 A claimant must also show damage as a
result of the representation, as without proof of damage, a claim of deceit will fail.12
The decision in MacDonald v Polaine & Hill Publishing13 is a good illustration of
how the tort of deceit is applicable to investors who wish to recover their losses. In that
case, the defendants made representations to the plaintiff that there were no other
buyers interested in purchasing the defendant’s shareholding in a company. The
claimants suffered damage when they were induced to sell the shares on the back of
4
[1789] 3 TR 51.
5
Holmes v Jones [1907] 4 CLR 1692.
6
Hornal v Neuberger Products Ltd [1957] 1 QB 247.
7
Bradford Third Equitable Benefit Building Society v Boarders [1941] 1 All ER 205 at 211.
8
Spice Girls Ltd v Aprilia World Service BV [2002] EWCA Civ 15.
9
[1889] 14 App Cas 337.
10
JD Wetherspoon plc v Van de Berg & Co Ltd [2007] EWCH 1044 (Ch).
11
British Airways Board v Taylor [1976] 1 WLR 13; Bisset v Wilkinson [1927] AC 177.
12
Smith v Chadwick [1884] 1 App Cas 187.
13
(unreported) 11 February 2002.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
this representation. The respondents were held liable for deceit and liable to compen-
sate the claimants for their actual loss.
2.2 Misrepresentation
Where one party to a contract is induced to enter into the contract as a result of a
misrepresentation made by the other party to the contract, or their agent, the contract is
deemed to be voidable. The misrepresentation may be made by words or by conduct,
and may be negligent14 or fraudulent.15 The representation must be false at the time of
the contract and “it must be of such a nature as to be capable of inducing the party into
entering into the contract in question”. In addition, the maker of a fraudulent
representation may also be liable for damages. However, the maker will not be deemed
a constructive trustee of the property transferred pursuant to the contract.16
Where a person has entered into a contract after a misrepresentation has been made to him by
another party thereto and as a result thereof he has suffered loss, then, if the person making
the misrepresentation would be liable to damages in respect thereof had the misrepresentation
been made fraudulently, that person shall be so liable notwithstanding that the misrepresen-
tation was not made fraudulently, unless he proves that he had reasonable ground to believe
and did believe up to the time the contract was made the facts represented were true.
In order for liability under the Misrepresentation Act to attach, it is necessary for the
defendant to have made a positive assertion. A failure to disclose relevant information
will not be sufficient to ground liability under the Act.18 Section 2(1) also covers
situations of innocent or negligent misrepresentation. For example, in Royscot Trust Ltd
v Rogerson19 the respondent car dealer was found liable for damages to a hire purchase
company where he had misstated the selling and deposit price of a car sold on hire
purchase to a buyer, who later sold the car without completing the schedule of
payments to the hire purchase company.
14
See Hedley Byrne & Co Ltd v Heller & Partners Ltd [1964] AC 465.
15
See Derry v Peek [1889] 6 Bing 396.
16
Lonrho v Al Fayed (No 2) per Millet J [1992] 1 WLR 1.
17
Howard Marine and Dredging v A Ogden & Sons (Excavations) [1978] QB 574.
18
Banque Financiere v Westgate Insurance [1989] 2 All ER 952.
19
[1991] 2 QB 297.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Knowing receipt A third party to a trust will be held liable for knowing receipt where
he receives trust property in breach of trust. In order to establish liability for knowing
receipt, it is necessary to show that the third party actually obtained either control or
possession of the property.23 Whether or not a constructive trust will be imposed
depends on the knowledge of the recipient, the basic question being “whether the
conscience of the recipient is sufficiently affected to justify the imposition of such a
trust”. Knowledge in this context is not confined to actual knowledge, but also includes
actual knowledge that would have been acquired but for shutting one’s eyes to the
obvious, or wilfully and recklessly failing to make such inquiries as a reasonable and
honest man would make.24
El-Ajou v Dollar Land Holdings25 is a good example of a knowing receipt claim
involving international commercial fraud. The plaintiff in El-Ajou was a victim of a
fraud carried out in Amsterdam by three Canadians. He claimed he was able to trace
20
Paragon Finance plc v DB Thakerar & Co [1999] 1 All ER 400, per Millet LJ.
21
[2002] 1 BCLC 162.
22
Para 6.
23
Agip v Jackson [1990] Ch 265 at 286 per Millet J.
24
In Re Montagu’s Settlement Trusts [1987] Ch 264.
25
[1994] 2 All ER 685.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
some of the proceeds of the fraud to a joint venture in London, Dollar Land Holdings
plc (DLH). The plaintiff sought to recover from DLH on the basis of knowing receipt,
alleging that DLH’s chairman possessed the necessary knowledge that the funds
represented the proceeds of fraud and that his knowledge was imputable to DLH. The
Court of Appeal found that the chairman had arranged for the investment while acting
as the directing mind and will of the company and held that the chairman had
knowledge of the underlying fraud. As a result, his knowledge was attributable to the
company and DLH was found liable for knowing receipt of the funds.
Dishonest assistance A third party may also be held liable to account to the trust for
any loss suffered where he assists in the commission of a breach of trust. However,
mere knowledge of a breach of trust is not sufficient to establish liability; it must be
shown that the third party actively assisted in the breach. Unlike knowing receipt, the
third party need not possess or control trust assets at any time in order to be found
liable.26 The third party will be held liable to account to the trust as a constructive
trustee for the loss which stems from their assistance.27
In order to establish liability, it must be shown that the third party acted dishonestly.
Dishonesty will be considered by an objective standard.28 However, for liability as an
accessory to arise the defendant must himself appreciate that what he was doing was
dishonest by the standards of honest and reasonable men.29 In the context of investor
loss, dishonest assistance can occur in a number of ways. For example, Royal Brunei
Airlines v Tan involved a claim for loss caused to a customer as a result of a reckless
investment strategy by an investment adviser.30 The Court held that such behaviour
could found a claim for dishonest assistance.
2.3.3 Tracing
Tracing is a process by which a claimant seeks to identify property in the hands of the
defendant, over which the claimant is asserting a prior right. This process is often used
where property is held by a third party on constructive trust for a victim of fraud. As
Millet J explained in Boscawen v Baywa:
Tracing … is the process by which the plaintiff traces what has happened to his property,
identifies the persons who have handled it or received it, and justifies his claim that the
money which they handled or received (and if necessary still retain) can properly be regarded
as representing his property. He needs to do this because his claim is based on the retention
by him of a beneficial interest in the property which the defendant handled or received.31
26
Twinscetra v Yardley [2002] 2 AC 164 at 194.
27
Derkson v Pillar [2002] All ER (D) 261 at 31.
28
Royal Brunei Airlines v Tan [1995] 3 All ER 97; the test of dishonesty as an objective
standard was also confirmed in Barlow Clowes v Eurotrust [2006] 1 All ER 333.
29
Twinscetra v Yardley [2002] 2 AC 164 at 387 per Lord Hutton.
30
Royal Brunei Airlines v Tan [1995] 2 AC 378.
31
Boscawen v Baywa [1995] 4 All ER 769 at 776g.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The case of Barlow Clowes International Ltd (In Liquidation) v Vaughan32 illustrates
the difficulties that can be involved in a tracing claim. Over a period of time, a number
of investors had been fraudulently induced into paying large amounts of money to
Barlow Clowes International Limited (BCI) or associated entities for investment.
However, when receivers were appointed and BCI went into liquidation the amount of
assets available fell far short of what would be needed to satisfy all the investors’
claims. The appeal was brought by the liquidators and receivers of BCI in order to
obtain the directions of the Court as to the basis on which assets and moneys in the
hands of the receivers should be distributed. The Court of Appeal decided to distribute
the traced funds pari passu rateably in proportion to the amounts due to them.
The Proceeds of Crime Act 2002 (POCA) was the first piece of UK legislation to
introduce the concept of civil recovery for assets derived from criminal conduct.
Recourse to civil law remedies is essential in fraud cases, as it is not always possible to
launch criminal proceedings. For example, if the fraudster in question has absconded or
is dead, criminal action may no longer be possible, but assets may still be recoverable.
Today, the civil law remedies in POCA exist alongside the common law remedies but
critically the remedy cannot be pursued by a private litigant such as an aggrieved
investor. Civil recovery proceedings can be initiated only by the government enforce-
ment agencies, such as the National Crime Agency, the Serious Fraud Office and the
Crown Prosecution Service (CPS).
The purpose of the civil recovery provisions is to enable recovery of property which
is (or represents) property obtained through unlawful conduct, and cash which is (or
represents) obtained through unlawful conduct, or which is intended to be used in
unlawful conduct, to be forfeited.33 Under POCA “unlawful conduct” is conduct
deemed unlawful under the criminal law34 and “property obtained through unlawful
conduct” is defined as property obtained through unlawful conduct, if obtained by or in
return for that conduct.35
Part 5 of POCA allows for the UK enforcement authority to apply to the Court for
the grant of a recovery order and/or an interim receiving order.36 Proceedings for a
recovery order are brought before the High Court.37 The property which is to be the
subject of the recovery order is to be specified in the application, and if not, it must be
described in general terms and the form must state whether it is alleged to be
recoverable property or “associated property”.38 POCA describes “associated property”
as property which is not the recoverable property, but constitutes any interest in the
32
[1992] 4 All ER 22.
33
Section 240 POCA.
34
Section 241(1) POCA.
35
Section 242(1) POCA.
36
Section 243 POCA.
37
Section 243(1) POCA.
38
Section 243(3) POCA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
recoverable property and any other interest in the property in which the recoverable
property subsists.
The High Court has the power under section 37(1) of the Supreme Court Act 1981 to
grant freezing orders over a person’s assets. Freezing orders prevent the subject from
dealing with or disposing of assets. Freezing injunctions are granted for an important
but limited purpose: to prevent a defendant dissipating his assets with the intention or
effect of frustrating enforcement of a prospective judgment. These orders can be an
important tool in fraud cases since it is often a problem that the fraudster’s assets have
dissipated before the case can be brought to court. The granting of such orders can help
to secure any available assets which can then be made the subject of a confiscation
order. An aggrieved investor can apply for a freezing order in any case where he has a
cause of action to recover his monies which stands a reasonable prospect of success
and there is risk that the defendant will dissipate the monies before the case comes to
trial.
In cases involving cross-border transactions, section 25 of the Civil Jurisdiction and
Judgments Act 1982 provides UK courts with the power to grant interim relief in
respect of proceedings which have been, or are about to be, commenced in foreign
jurisdictions. This includes the granting of freezing orders. The Evidence (Proceedings
in Other Jurisdictions) Act 1975 and Rules of the Supreme Court Ord. 70 also allow
requests to be made by the relevant authorities in foreign jurisdictions to the UK High
Court for assistance in obtaining evidence in the UK. In addition, the UK is bound by
the civil enforcement regime of the Lugano Convention39 and the Brussels Regu-
lation.40
3. CRIMINAL FRAUD
Prosecutors have a number of offences open to them to charge in any fraud case. Where
the defendant in question is a company, the default offence for a prosecutor to charge
the company with is fraudulent trading. However, notwithstanding the introduction of
the Fraud Act 2006, prosecutors have tended to continue to charge defendants with the
common law offence of conspiracy to defraud, and it remains the prosecutor’s weapon
of choice. This is because conspiracy to defraud is simple to indict and, when pursuing
a case of conspiracy, the prosecution can put all of the evidence into one charge.
It is open to victims of fraud to indict the fraudster as a private prosecutor.41 Where
a private prosecution is launched, it is treated in the same way by the courts as if it had
39
Convention on jurisdiction and the recognition and enforcement of judgments in civil and
commercial matters 2007/712/EC.
40
Council Regulation (EC) No 44/2001 of 22 December 2000 on jurisdiction and the
recognition and enforcement of judgments in civil and commercial matters.
41
The right to bring a private prosecution is enshrined in section 6 of the Prosecution of
Offences Act 1985.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
been brought by the CPS. A private prosecutor, however, does not have the right to
demand access to evidence held by the CPS such as witness statements or other reports
or documents.42
The Fraud Act 2006 was introduced to clarify and modernise the law, and to make
fraud law more straightforward for juries and practitioners.
42
R v DPP ex parte Hallas [1988] 87 Cr App R. 340.
43
Fraud Act section 2.
44
Fraud Act section 2(1).
45
Fraud Act section 2(3) and 2(4).
46
Fraud Act section 2(2).
47
Fraud Act section 3.
48
The Law Commission (LAW COM No 276) Report on a reference under section 3(1)(e)
of the Law Commissions Act 1965, Cm 5560, July 2002, at para 7.28.
49
Fraud Act section 4.
50
Abuse of position can occur through both acts and omissions (section 4(2)).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
legislation. The Court of Appeal has recently stated that “a good working meaning
might be ‘uses incorrectly’ or ‘puts to improper use’ the position held in a manner that
is contrary to the expectation that arises because of that position”.51 A recent example
of where the courts have found abuse of position to exist is where the medical practice
manager at a doctors’ surgery forged doctors’ signatures on a number of cheques for
her own benefit to the sum of £17,000.52 In another recent case, a solicitor was found
to have abused her position by transferring large amounts of money from the solicitor’s
accounts to her own personal account.53
The offence of conspiracy to defraud has a much wider application than the provisions
of the Fraud Act 2006. For example, it covers instances of fraud where there is no
economic loss or gain involved56 or where no such loss or gain can be proved.57 As
Viscount Dilhorne explained in Scott v Metropolitan Police Commissioner,58
it is clearly the law that an agreement by two or more by dishonesty to deprive a person of
something which is his or to which he is or would be or might be entitled and an agreement
by two or more by dishonesty to injure some proprietary right of his suffices to constitute the
offence of conspiracy to defraud.59
51
R v Angela Pennock, Richard John Pennock [2014] EWCA Crim 598.
52
The conviction was upheld on appeal, see R v Pamela Jane Moss [2013] EWCA Crim
1554.
53
See R v Ruth Louise Turner [2013] EWCA Crim 1206.
54
Section 15.
55
Fraud Act section 1(3).
56
R v Moses and Ansbro [1991] Crim LR 617.
57
R v Rigby and Bailey, The Times, August 23, 2006, CA.
58
[1975] AC 819, [1974] 3 All ER.
59
At para 1039.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Therefore, there must be proof of an agreement, intent and dishonesty in order to found
a conviction. Deceit is not an essential ingredient of the offence of conspiracy to
defraud.60
According to the House of Lords, a person acts “fraudulently” when he acts in a way
which prejudices (or risks prejudicing) another’s right, knowing that he has no right to
do so.61 However, it is not necessary for the defendant to intend that any actual loss
would occur.62 As the offence is complete once the agreement is made, it is irrelevant
what happens after that point in time and whether the participants followed through
with their agreement.
A person guilty of conspiracy to defraud is liable on conviction on indictment to
imprisonment for a term not exceeding ten years, or a fine, or both.63
3.2.1 Jurisdiction
An agreement made in England and Wales to carry out a fraud abroad is not indictable
at common law as a conspiracy to defraud.64
False accounting is a form of fraud and occurs where a person fraudulently misstates
the company’s assets and/or liabilities in the company accounts. It can involve
falsifying (through act or omission), destroying or hiding documents.65 For example,
false accounting criminalises a deliberate failure to present a true view of a company’s
financial position. In order to be found guilty of false accounting, it must be shown that
the defendant acted dishonestly.66 The offence is to be found in section 17 of the Theft
Act 1968.
Fraudulent trading occurs where a company, or its directors, carries on business with
the intention of defrauding creditors or for other fraudulent purposes. Fraudulent
trading is established as a criminal offence under section 993 of the Companies Act
2006, and this provides that if any company business is carried on with intent to
defraud creditors of the company (or creditors of any other person), or for any
fraudulent purpose, every person who is knowingly a party to the carrying on of the
business in that manner commits an offence.67 The offence applies whether the
company has been, or is in the course of being, wound up.68 If found guilty, a person is
liable on conviction of indictment, to imprisonment for a term not exceeding ten years
60
Scott v Commissioner of Police of the Metropolis [1975] AC 819.
61
Welham v DPP [1961] AC 103.
62
R v Allsop (1977) Cr App R 29.
63
Section 12 (3) CJA 1987.
64
Attorney General’s Reference (No.1 of 1982) [1983] QB 751.
65
R v Shama (1990) 91 Cr App R 138.
66
R v Ghosh [1982] QB 1053.
67
Section 933(1) Companies Act 2006.
68
Section 933(2) Companies Act 2006.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
or a fine (or both) and on summary conviction to imprisonment for a term not
exceeding 12 months or a fine (or both).69
The Insolvency Act 1986 also makes it an offence to carry on business with intent to
defraud creditors of the company (or creditors of any other person), or for any
fraudulent purpose in the course of the winding up of a company.70
Section 397 of the Financial Services and Markets Act 2000 criminalises the making of
misleading statements and practices. Section 397 applies where a person makes a
statement, promise or forecast which he knows to be misleading, false or deceptive in
a material particular; or dishonestly conceals any material facts whether in connection
with a statement, promise or forecast made by him or otherwise; or recklessly makes
(dishonestly or otherwise) a statement, promise or forecast which is misleading, false or
deceptive in a material particular.71
In addition, a person will only be considered guilty of an offence if he made the
statement, promise or forecast or concealed the facts for the purpose of inducing (or
were reckless as to whether it may induce) another person to either enter or offer to
enter into, or to refrain from entering or offering to enter into, a relevant agreement; or
to exercise, or refrain from exercising, any rights conferred by a relevant investment.72
Where a person engages in any course of conduct which creates a false or misleading
impression as to the financial market, or the price or value of any investments, he will
be guilty of an offence if he does so “for the purpose of creating that impression and of
thereby inducing another person to acquire, dispose of, subscribe for or underwrite
those investments or to refrain from doing so or to exercise, or refrain from exercising,
any rights conferred by those investments”.73
69
Section 933(3) Companies Act 2006.
70
Section 213(1) Insolvency Act 1986.
71
Section 397(1) Financial Services and Markets Act 2000.
72
Section 397(2) Financial Services and Markets Act 2000.
73
Section 397(3) Financial Services and Markets Act 2000.
74
Part 2 POCA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 11 / Date: 8/9
JOBNAME: Rider PAGE: 14 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Crown Court.75 Secondly, the prosecutor must request that the Court grant such an
order, or the Court itself must believe it is appropriate for it to do so.76 A defendant will
be deemed to have benefited from his criminal conduct where he obtains property as a
result of, or in connection with, that conduct.77 Where a person obtains a pecuniary
advantage as a result of or in connection with such criminal conduct, he will be taken
by the Court to have obtained as a result of or in connection with the conduct a sum of
money equal to the value of the pecuniary advantage.78 Therefore, the recoverable
amount for the purposes of a confiscation order is an amount equal to the defendant’s
benefit from the conduct concerned. However, in the event the defendant shows that the
amount available for confiscation is less than the benefit received, the amount
recoverable is the amount available.79
Restraint orders POCA also allows for the granting of restraint orders in advance of
trial in order to prevent the defendant dealing with any realisable property.80 Restraint
orders are granted to ensure that there is no diminution in value or sale of realisable
property. Before granting a restraint order, the Court must be satisfied that a criminal
investigation has begun and that there is reasonable cause to believe that the alleged
offender has benefited from his criminal conduct.81 The Court may make such order as
it believes is appropriate for the purpose of ensuring that the restraint order is
effective.82 These orders therefore can be used to try to prevent fraudsters spending or
hiding their stolen money while waiting for trial and maintain a certain pool of funds
from which it is possible to compensate victims.
75
Section 6(2) POCA.
76
Section 6(3) POCA.
77
Section 76(4) POCA.
78
Section 76(5) POCA.
79
Or a nominal amount, if the available amount is nil; section 7 POCA.
80
Section 41 POCA.
81
Section 40(2) POCA.
82
Section 41(7) POCA.
83
Section 69(3)(a) POCA.
84
Section 301–303 POCA.
85
Section 130 Powers of Criminal Courts (Sentencing) Act 2000.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
committed, whether intentionally caused or otherwise.86 It is for the Court to decide the
appropriate amount of the compensation order and in what manner it should be paid.
However, there are a number of practical issues that can potentially arise when courts
are trying to decide in what manner to grant such orders. For example, it is preferable
that where there is more than one victim, that each victim receive a compensation
order, and that each victim be paid on a pro rata basis. However, this is not always
possible as, for reasons discussed above, the defendant may not have the means to fulfil
such orders. Bearing that in mind, ideally in making a compensation order the Court
will take into account the means of the defendant and try to achieve as equitable result
as possible for the victims.
86
R v Corbett [1993] 14 Cr App R (S) 101.
87
Section 444(1) POCA.
88
Section 447(2) POCA.
89
Section 445(1) POCA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 26 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
FRAUD
The English Fraud Act 2006 usefully indicates that a person can be guilty of criminal
fraud in three types of situation that reflect those that lead to various civil liabilities:
(1) where the defendant makes a false representation, (2) where he fails to disclose
information, and (3) where he abuses his position.
For criminal liability subjective dishonesty is required: the accused must have been
acting dishonestly according to the standards of ordinary decent people and must
himself have realised that what he was doing was, by those standards, dishonest.1 For
civil liability objective dishonesty can suffice, so that the defendant only needs to have
been acting dishonestly according to the standards of ordinary decent people,2 though
his conduct is assessed in the light of what he actually knew at the time when he
acted.3
In the first situation4 a person is liable for fraud if he dishonestly made a false
representation and intended thereby to make a gain for himself or another or to cause
loss to another or to expose another to a risk of loss. A representation is false if it was
untrue or misleading, and the representor knew that it was, or might be, untrue or
misleading. A representation may be of fact or law or as to the state of mind of the
representor or another person. It may be regarded as made if it (or anything implying it)
is submitted in any form to any system or device designed to receive, convey or
respond to communications (with or without human intervention).
In the second situation5 a person is liable for fraud if he dishonestly failed to disclose
to another person information which he was under a legal duty to disclose, and
intended thereby to make a gain for himself or another or to cause loss to another or to
expose another to a risk of loss.
In the third situation6 a person is liable for fraud if he occupied a position in which
he was expected to safeguard, or not to act against, the financial interests of another
person and yet dishonestly abused that position, intending thereby to make a gain for
1
R v Ghosh [1982] QB 1053 (CA); R v Clowes (No 2) [1994] 2 All ER 316 (CA) 330–331.
2
Barlowe Clowes International Ltd v Eurotrust International Ltd [2005] UKPC 37, [2006]
1 WLR 1476; Starglade Properties Ltd v Nash [2010] EWCA Civ 1314, [2011] P & CR DG 17.
3
Royal Brunei Airlines v Tan [1995] 2 AC 378 (PC) 389; Aerostar Maintenance
International Ltd v Wilson [2010] EWHC 2032 (Ch) [184].
4
Fraud Act s 2.
5
Ibid s 3.
6
Ibid s 4. In such a situation offences may also be committed under Bribery Acts in various
jurisdictions.
328
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
7
Jubilee Cotton Mills Ltd v Lewis [1924] AC 958.
8
Regal (Hastings) Ltd v Gulliver [1967] 2AC 134n.
9
Vivendi SA v Richards [2013] EWHC 3006 (Ch), [2013] BCC 771.
10
Nugent v Nugent [1908] 1 Ch 546.
11
Tito v Waddell (No 2) [1977] 3 All ER 129 (Ch) 229–230.
12
Chan v Zachariah (1984) 154 CLR 178; United Dominions Corporation Ltd v Brian Pty
Ltd (1985) 157 CLR 1.
13
Abou Rahmah v Abacha [2005] EWHC 2662 (QB)[2006] 1 Lloyd’s Rep 484 [35]–[39]
accepted on appeal [2006] EWCA Civ 1492, [2007] 1 Lloyd’s Rep 115 [62]; contrast no
fiduciary relationship in LAC Minerals Ltd v International Corona Resources Ltd (1989) 61
DLR (4th) 14.
14
Nocton v Lord Ashburton [1914] AC 932.
15
Hodgkinson v Simms (1994)] 117 DLR (4th) 151.
16
Kelly v Cooper [1993] AC 305.
17
Caterpillar Logistic Services Ltd v Huesca de Crean [2012] EWCA Civ 156, [2012] ICR
981(manager); Brinks Ltd v Abu-Saleh (No 3) [1996] CLC 133 (security guard).
18
Bristol & West BS v Mothew [1998] Ch 1; Caterpillar Logistic Services (UK) Ltd v
Huesca de Crean [2012] EWCA Civ 156, [2012] ICR 981 [69]–[71].
19
Bristol & West BS v Mothew [1998] 1 Ch 1 (CA) 17.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 2 / Date: 31/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
liability to restore to the claimant the claimant’s property or the traceable product of
that property if replaced from time to time for example by profitable sales and
purchases with the proceeds of sale. If the traced product is worth less than the value of
the monetary claim the claimant can resort to a charge over the property as security for
his claim.
The weakness of a personal remedy is that it depends upon the defendant being
solvent enough to satisfy the money judgment. The strength of a proprietary remedy is
that the claimant recovers his property, so that no recourse can be had to it by the
defendant’s creditors if the defendant is insolvent, and no limitation periods apply to
oust claims against persons who had accepted the role of trustee or fiduciary in respect
of the relevant property.20 Pending the hearing of a claim for a proprietary remedy a
claimant will normally be able to obtain an interim freezing order preserving the
relevant property for the claimant if his claim is successful. No interim freezing order
can be made against a defendant’s property up to the value of a personal claim unless
there is a good arguable case that there is a real risk of any judgment against the
defendant going unsatisfied by his dissipating his assets or spiriting them out of the
jurisdiction21 and, even then, the preserved assets are available to satisfy all creditors’
claims, not just the claimant’s.22
Where rescission of a transfer of property is available, for example due to a
fraudulent representation, a claimant can recover the property unless the intervention of
third party rights has made this impossible. In such eventuality compensation can be
recovered equivalent to the value of the property that ought to have been restored to the
claimant.23
Fraudulent Gains
Where a defendant in breach of his proscriptive fiduciary duties owed to the claimant
has made gains for himself he must disgorge all his gains to the claimant even if the
gains were not made at the expense of the claimant and if the claimant would not have
been able to acquire the gains himself.24 A proprietary liability may also exist in some
circumstances.
20
Williams v Central Bank of Nigeria [2014] UKSC 10.
21
Mareva Compania Naviera SA v International Bulk Carriers SA[1975] 2 Lloyd’s Rep 509
(CA).
22
Iraqi Ministry of Defence v Arcepey Shipping SA [1981] QB 65 (CA) 72; Re Ling (1996)
142 ALR 87, 92–93.
23
D O’Sullivan, S Elliott & R Zakrzewski, The Law of Rescission, OUP 2008, 8.07–8.08.
24
Industrial Development Consultants v Cooley [1972] 1 WLR 443.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
These considerations, however, will be relevant where the fraudulent fiduciary has not
disposed in unauthorised fashion of property subject to trustee-like stewardship duties
but has acted in breach of fiduciary duty where there was a conflict of interest so as
allegedly to have caused loss for which a compensatory remedy is available. For
example he could have caused loss by failing to disclose a matter he was under a duty
to disclose or by deliberately providing misleading information.
Unfortunately, the courts have confused the distinction between substitutive perform-
ance claims and reparation for loss claims.28 The House of Lords in Target Holdings
Ltd v Redferns29 muddied the waters when dealing with a substitutive performance
claim in a fashion appropriate to a reparation claim. The claim involved a conveyancing
25
Bairstow v Queen’s Moat House plc [2001] EWCA Civ 712, [2001] 2 BCLC 531 [53]
(Robert Walker LJ).
26
For details see D Hayton, P Matthews & C Mitchell, Underhill and Hayton: Law relating
to Trusts and Trustees, 18th ed LexisNexis Butterworths 2010, art 87.
27
Re Dawson [1966] 2 NSWLR 211; Alexander v Perpetual Trustees (WA) Ltd (2004) CLR
109 [44], [104].
28
See the clear analysis of C Mitchell, ‘Compensation for Breach of Fiduciary Duty’ [2013]
CLP 1.
29
[1996] AC 421.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
fraud and was for a summary judgment for £1.5 million mortgage money that had been
held by the defendant solicitors’ firm on a bare commercial trust to pay it over in return
for receiving the required mortgage documents. The defendant paid the money over
prematurely, not receiving the required security documents till three weeks later and so
was alleged to be strictly liable for the money. The claim could have been dismissed as
misconceived on the basis that the defendant had actually performed its primary duty to
acquire the relevant conveyancing documents in return for the mortgage money, albeit
three weeks late.30 Thus there had to be a trial to see if the delay had caused loss
requiring reparation to be made to the claimant.
Instead, their Lordships in dealing with the substitutive performance claim correctly
cited31 substitutive performance cases as authority for rules of remoteness and
causation not applying, but then cited reparation cases32 for there having “to be some
causal connection between the breach of trust and the loss to the trust estate for which
compensation is recoverable, viz the fact that the loss would not have occurred but for
the breach”.33 Thus losses can only be made good if on a common sense view of
causation they were caused by the breach.34
The “incoherent”35 position is thus reached under Target that rules of remoteness and
causation are not to be applied except that compensation can only be awarded for
losses caused by a breach of trust or fiduciary duty. Judges have had to wrestle with
this where substitutive performance claims have been brought for the reconstitution of
trust funds.36
Where, however, a claim for a breach of fiduciary duty is a reparation claim for loss
(e.g. caused by non-disclosure of relevant information or by provision of deliberately
misleading information) Target is inapplicable37 and it is necessary for the claimant to
prove that the loss was caused by the breach of fiduciary duty and that the loss was not
too remote to be recoverable, a fiduciary escaping liability if he can show that the
claimant would have acted in the same way even if the fiduciary had not broken his
duty.38 Where the absence of evidence is due to the fiduciary’s breach of duty the court
can make every assumption against him and be robust in doing rough and ready justice
without justifying its award with precision.39
30
See Lord Millett, ‘Equity’s Place in the Law of Commerce’(1998) 114 LQR 214,
225–227.
31
[1996] AC 421 (HL) at 434: Caffrey v Darby (1801) 6 Ves Jun 488, Clough v Bond (1838)
3 My & Cr 490.
32
Ibid 434: Bartlett v Barclays Bank Trust Co (No 2) [1980] Ch 515, Nestle v National
Westminster Bank [1993] 1 WLR 1260.
33
Ibid 434.
34
Ibid 439, citing Canson Enterprises Ltd v Boughton [1991] 3 SCR 534 (Sup Ct of
Canada).
35
C Mitchell supra at 20, fn 28.
36
See AIB Group (UK) plc v Mark Redler & Co [2014] UKSC 58.
37
As held in Nationwide BS v Balmer Radmore (No 3) [1999] PNLR 606 (Ch) 669–670.
38
Swindle v Harrison [1997] 4 All ER 705 (CA); Amaltal Corp Ltd v Maruha Corp [2007]
3 NZLR 192 [30]; Hodgkinson v Simms [1994] 3 SCR 377 [76]; Rigg v Sheridan [2008]
NSWCA 79 [55]–[57].
39
Libertarian Investments Ltd v Hall [2013] HKCFA 94 [174].
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Where a third party dishonestly assists in, or instigates,40 any innocent or fraudulent41
breach of trust or fiduciary duty,42 whether or not he actually received any property
owned or controlled by a trustee or fiduciary, he is personally jointly and severally
liable43 for losses to the same extent as the trustee or fiduciary in respect of the breach
that he assisted or instigated. He need not be aware of the precise details as to the
relevant breach so long as he is aware that he is involved in some sort of wrongdoing
behaviour, so that he is accepting the risk of being called upon, whether by way of a
substitutive performance claim or a reparation for loss claim, to compensate the
claimant for losses flowing from whatever primary breach of trust or fiduciary duty he
assisted or instigated.44 Once the trustee or fiduciary has been found liable in respect of
the claimant’s loss, for the third party to be liable for his assistance it suffices merely to
show that his actions made commission of the breach easier than it would otherwise
have been.45 He cannot escape liability by saying that the claimant’s loss would have
occurred anyway because the trustee or fiduciary would have committed the breach
with someone else’s assistance if he had not assisted in the breach.
Acting dishonestly means simply not acting as an honest person would act, which is
an objective standard so that a morally obtuse person cannot escape liability.46 The
defendant’s conduct, however, is assessed in the light of what he actually knew at the
relevant time, as distinct from what he ought to have known if he had been a normal
reasonable person.47 In the case of a company defendant the requisite dishonesty can be
that of a director or person who is the company’s directing mind and will.48
40
Eaves v Hickson (1861) 30 Beav 136 (dishonest instigator who misled innocent trustees).
41
Royal Brunei Airlines Sdn Bhn v Tan [1995] 2 AC 378 (PC) rejecting liability being
restricted to dishonest or fraudulent breaches, the relevant dishonesty being that of the third
party assister or instigator. So far in Australia, dishonesty is still needed on the part of the trustee
or fiduciary: Farah Constructions Pty Ltd v Say-Dee Pty Ltd [2007] HCA 22, 230 CLR 89
[161]–[165]; Westpac Banking Corporation v The Bell Corporation [2012] WASCA 157
[1111].[2104], [2122], [2429].
42
Usually the breach will relate to property but, to preserve the integrity of fiduciary
relations, the breach need not relate to misapplications of property: Fiona Trust and Holding
Corp v Privalov [2010] EWHC 3199 (Comm) (61); Novoship (UK) Ltd v Nikitin [2014] EWCA
Civ [93]. A person may dishonestly assist a director to break his duty to avoid conflicts of
interest under s 175 Companies Act 2006 which extend to the exploitation of any property,
information or opportunity: Goldtrail Travel Ltd v Aydin [2014] EWHC 1587 (Ch).
43
Ultraframe (UK) Ltd v Fielding [2005] EWHC 1638 (Ch), [2007] WTLR 835 [1600].
44
Barlow Clowes International Ltd v Eurotrust International Ltd [2005] UKPC 37, [2006] 1
WLR 1476 [28]; Otkritie International Investment Management Ltd v Urumov [2014] EWHC
191 (Comm) [77].
45
Casio Computer Co v Sayo [2001] EWCA Civ 661, [2001] All ER (D) 147(Apr) (15).
46
Barlow Clowes (supra); Farah Constructions Pty Ltd v Say-Dee Pty Ltd [2007] HCA 22,
[2007] ALJR 1107 [178]; Westpac New Zealand Ltd v MAP & Associates Ltd [2011] NZSC 89,
[2011] 3 NZLR 751.
47
Ibid.
48
Crown Dilmum v Sutton [2004] EWHC 52 (Ch).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Where a person makes a profit for himself or his wholly owned alter ego company
from his dishonest assistance he must disgorge such profit, but it does not appear that
he is automatically jointly and severally liable with the defendant fiduciary whom he
assisted to make a profit,49 unlike the position for losses caused by the latter.
Where a third party receives for himself property subject to a trust, including a
constructive trust arising from a breach of fiduciary duty, he takes it subject to that trust
as a matter of priority of property interests unless he was a purchaser of the legal
interest without notice of the trust.50 If not such a purchaser, once he is aware of the
trust he holds the property and any traceable substitute (e.g. acquired by a purchase
with its proceeds of sale) under a constructive trust to restore the property to the
rightful owner and not use it for his own benefit.51 If, however, after becoming aware of
the position, he has not restored the property to its rightful owner but has retained it for
himself or disposed of it, he becomes strictly liable to a personal substitutive
performance remedy for his failure to carry out his stewardship duties as discussed
above,52 though, instead, a claimant may bring a proprietary claim to recover the
property or its traceable substitute.
The third party becomes liable once the state of his knowledge makes his actions
dishonest or unconscionable53 if he does not restore the property to its rightful owner.
Knowledge extends beyond actual knowledge to “blind-eye” knowledge54 of a person,
subjectively conscious of serious doubts as to his entitlement to deal with the relevant
property, but who wilfully shuts his eyes to the obvious or who wilfully or recklessly
fails to make the inquiries that an honest reasonable person would make.55 A person
will still be treated as having blind-eye knowledge where his own moral obtuseness
prevented his having serious doubts as to his entitlement.56
49
Aerostar Maintenance International Ltd v Wilson [2010] EWHC 2032[202]; Glandon v
Tilmunda [2008] NSWSC 218 [108]; Novoship (UK) Ltd v Nikitin [2014] EWCA Civ 908
[107-108].
50
Gray v Smith [2013] EWHC 4136 (Comm) [132]–[138]; Grimaldi v Chameleon Mining
NL (No 2) [2012] FCAFC 6 [251]; Crédit Agricicole Corporation v Papadimitriou [2015] UKPC
13.
51
Arthur v Att-Gen Turks & Caicos [2012] UKPC 30 [37]; Giumelli v Giumelli (1999) 196
CLR 101 [3]–[5].
52
Charter plc v City Index Ltd [2007] EWCA Civ 1382, [2008] Ch 313 [74].
53
Bank of Credit and Commerce International (Overseas) Ltd v Akindele [2001] Ch 437.
54
Vestergaard Frandsen v Bestnet Europe Ltd [2013] UKSC 31, [2013] 1 WLR 1556 [26].
55
Transgressing ordinary standards of honest behaviour is dishonest: Starglade Properties
Ltd v Nash [2010] EWCA Civ 1314,[2011] P & CR DG 17 [31]–[32]; Otkritie International
Investment Management Ltd v Urumov [2014] EWHC 191 (Comm) [75]–[78].
56
Barlow Clowes International Ltd v Eurotrust International Ltd [2005] UKPC 37, [2006] 1
WLR 1476; Grimaldi v Chameleon Minong N L (No 2) [2012] FCAFC 6 [267]–[268].
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
As just seen, these third parties are liable if at fault in dishonestly or unconscionably
dealing with relevant property. Can, however, a defendant, who has been unjustly
enriched at the expense of the claimant’s equitable rights in respect of property, be
strictly liable without proof of fault under principles of unjust enrichment (if the
defence of change of position is not available to diminish or negate the enrichment)?
“No” is the current orthodox57 answer in England, Australia and Canada,58 but “Yes” in
Jersey.59 Nevertheless, due to defendant’s counsel accepting that an unjust enrichment
claim can lie against recipients of trust property, the English Court of Appeal60 has
assumed this to be right so as to hold the defendant liable on such basis, though it so
happens that there was fault on his part since he was also held liable in equity on the
conventional ground of “knowing receipt” for his unconscionable behaviour. In any
event, the beliefs or assumptions of Parliament or judges cannot make the law.61
PROPRIETARY LIABILITY
A claimant needs to have had legal title to property or equitable rights under a trust
affecting property (including a constructive trust imposed upon a defendant in breach of
fiduciary duty) before he can seek a proprietary remedy enabling him to recover his
property or its surviving value in the traceable substituted product of that property.
In a case where legal title to a claimant’s land, money or a shareholding in a
company has been obtained by fraud and subsequently he exercises his right to rescind
the transaction, such property is held on trust for him from the moment he elected to
rescind the transaction.62 Prior to rescission the transaction is valid and so enables the
fraudster to pass on the legal title to a purchaser without notice of the claimant’s right
to rescind, which ranks as a “mere equity”, so that a purchaser with notice or a donee
receiving the property would take subject to the claimant’s right.
57
See C Mitchell, P Mitchell & S Watterson, Goff & Jones The Law of Unjust Enrichment,
8th ed Sweet & Maxwell, 8.50–8.68 favouring strict liability.
58
Bank of Credit and Commerce International (Overseas) Ltd v Akindele [2001] Ch 437,
466; Farah Constructions Pty v Say-Dee Pty Ltd [2007] HCA 22, 230 CLR 89 [148]–[158];
Australian Financial Services and Leasing Ltd v Hills Industries Ltd [2014] HCA 14 [1], [65],
[78] (fault based liability not part of unjust enrichment); Citadel General Assurance Co v Lloyds
Bank Canada [1997] 3 SCR 805 (liability is fault based yet regarded as part of unjust
enrichment). Also see Crédit Agricole Corporation v Papadimitriou [2015] UKPC 13.
59
Re Esteem Settlement [2002] JLR 53 [148]–[161].
60
Relfo Ltd v Varsani [2014] EWCA Civ 360.
61
National Enterprises Ltd v Racal Communications Ltd [1975] Ch 397, 406 (Russell LJ);
Baker v The Queen [1975] AC 774, 788 (Lord Diplock).
62
Shalson v Russo [2003] EWHC 1637 (Ch), [2005] Ch 281 [122], [127].
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Proprietary Remedies
If the claimant’s traced property has not been mixed with others’ property he will claim
ownership of the traced property unless it has lost value. He will then make a monetary
claim and have an equitable charge over the traced property as security for such claim.
Where the claimant’s property has been mixed with others’ property he will claim a
proportionate share of the traced property unless this represents a loss in value of his
input in which case he will have an equitable charge to secure part of his monetary
claim. In tracing money of the claimant mixed with the fiduciary’s money by the
fiduciary and determining what money was dissipated so as to be untraceable and what
money was spent on available assets or remains in a bank account, the claimant can
63
Car & Universal Finance Ltd v Caldwell [1965] 1QB 525 (CA).
64
Foskett v McKeown [2001] 1 AC 102, 127 (HL).
65
FHR European Ventures LLP v Cedar Capital Partners LLC [2014] UKSC 45.
66
Sinclair Investments (UK) Ltd v Versailles Trade Finance Ltd [2011] EWCA Civ 347,
[2012] Ch 453; FHR European Ventures LLP v Mankarious [2013] EWCA Civ 17, [2014] Ch 1.
67
Relfo Ltd v Varsani [2014] EWCA Civ 360, Federal Republic of Brazil and Sao Paulo v
Durant International Corp [2013] Jersey CA 071.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
pick and choose what he wants to claim, evidential problems caused by the wrongdoer
being resolved against him.68
LIMITATION DEFENCES
No limitation period applies to persons who had accepted office as a trustee or
fiduciary before acting in breach of duty so as to expose themselves to a personal or
proprietary remedy. Where, however, a third party becomes liable to be treated
constructively as a trustee because of a transaction with a trustee or fiduciary acting in
breach of duty he can claim the benefit of a limitation period of six years from the date
of such transaction.69 Nevertheless, if the claimant’s action is based upon the
defendant’s fraud, or facts relevant to the claimant’s right of action have been
deliberately concealed by the defendant, the six years do not begin to run until the
claimant has discovered the fraud or concealment or could with reasonable diligence
have discovered it.70
68
Shalson v Russo [2003] EWHC 1637 (Ch), [2005] Ch 281[144]. Further see Underhill
and Hayton: Law of Trusts and Trustees cited at fn 26 art 90.
69
English Limitation Act 1980 s 21 mirrored in many common law jurisdictions; Williams v
Central Bank of Nigeria [2014] UKSC 10.
70
English Limitation Act s 32.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 27 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
The Latin adage fraus omnia corrumpit encapsulates what (we think) we know about
fraud – its distinctive feature lies in its effects which per se must be negated as “fraud
vitiates everything”.1 The reprehensible nature of fraud justifies the drastic remedy of
unenforceability, or even voidability, of the fraudulent contract or act, thus confirming
the moral precept that underlies law (or right) that is to discourage and condemn any
wrongdoing and provide redress.2
Despite the reprehensible nature of fraud, very few countries have defined a general
statutory theory of fraud. French and English law are no exception. In these two legal
systems, among others, the notion of fraud has not been defined and does not trigger a
single cause of action known as civil or commercial fraud.3 However, in the absence of
a statutory definition, courts have used the adage fraus omnia corrumpit in order to
enjoin parties involved in legal relationships to act honestly, but what is the legal nature
of this principle in French law? More specifically, what is the concept of fraud that this
principle supports? This is what will be discussed in this chapter.
The French Civil Code does provide for legal actions in specific and limited cases of
fraud and attaches to them a variety of effects.4 Outside these specific cases, courts
sanction fraudulent/deceitful acts using a plethora of legal doctrines, such as illicit
cause/purpose (cause illégale),5 liability in tort (responsabilité civile), abuse of rights
(abus de droit), deceit (dol or dolus malus), bad faith and mistake, in parallel or by analogy.
1
Another Latin maxim is often associated with this one – nemo auditor propriam
turpitudinem allegans (“no one can be heard to invoke his own turpitude”).
2
“(Law as) ‘via recta’ (Right, Recht, Diritto); … le droit est redresseur de torts et n’admet
que l’on puisse frustrer son semblable …” in Henri Roland and Laurent Boyer, Adages du droit
francais, Litec, 3rd Ed., 1992, p. 288.
3
R. Fentem and L. Walker, Civil Fraud – Back to Basics, Guildhall Chambers, pp. 1–16,
No 4 (Nov 2012). As cited by the authors, according to Lord MacNaghten in Reddaway v
Banham ([1896] AC 199 at 221): “[F]raud is infinite in variety. Sometimes it is audacious and
unblushing; sometimes it pays a sort of homage to virtue, and then it is modest and retiring; it
would be honesty itself if it could only afford it.”
4
These actions include cases of fraud of third parties’ rights (action paulienne) (article
1167 and article 1397 al 9 C. Civ.), fraud in inheritance (article 882 C. Civ.), in the distribution
of assets (article 1447 al 2 C. Civ.), the management of common property (article 1421 al 1) and
disguised donations (article 911 C. Civ.). See, for an extremely interesting analysis of the
Paulian action in French law by Laura Sautonie-Laguionie, La fraude paulienne, LGDJ, Vol.
500, 2008.
5
Interestingly the text that the French government hopes to pass by way of ordonnance
reforming the French law of contract removes the concept of “cause”. This text is available at
http://www.justice.gouv.fr/publication/j21_projet_ord_reforme_contrats_2015.pdf.
338
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
This variety of legal doctrines adds to the confusion that surrounds the notion of
fraud. Fraud is often understood as a fault (faute) that might trigger a claim of civil
liability; for instance where a party has committed a fraud against third party rights.6
However, whereas the remedies available in a case of liability in tort are damages,7
annulment of the fraudulent act might be more appropriate for an evasion of the law.
Fraud also differs from abuse of rights as the latter concept does not always require a
fraudulent intention, which is an element of fraud.8 In addition, fraud differs from dol
(dolus).9 Dol is, together with mistake and duress, one of the three defects that vitiate
consent, which is a condition for a contract to be validly binding, and are therefore
grounds for avoidance of the contract.10 Although dol and fraud are two different legal
concepts, they are often used interchangeably. For instance, dol is often translated as
fraud. Whereas fraud is inherently dishonest, dol is a deceit that affects the consent of
one party in order to influence him to enter into a legal relationship. The theory of
mistake (erreur) is also used in cases of fraud,11 although a mistake might have been
committed without fraud, which does not cause the contract to be voided, such as a
mistake as to the value of the item brought or sold.
By definition, fraud (fraus or fraudis in Latin) differs from bad faith (mauvaise foi)
as the latter is broadly a conduct that is disloyal with no specific intention of
defrauding someone.12 Fraud is an aggravated manifestation of bad faith in the sense
that it is underpinned by the intention of deceiving or misleading a party to cause them
to lose a benefit accruing from their rights or to circumvent the implementation of a
legal rule to achieve an illegal end.13 Sensu stricto, fraud consists in enforcing one legal
6
Plaintiffs tend to file a claim of civil liability rather than a Paulian action, as noticed by
Laura Sautonie-Laguionie, La fraude paulienne, LGDJ, Vol. 500, 2008, p. 4.
7
Article 1147 of the French Civil Code.
8
See supra n. 2, Adages du droit francais, p. 290; Ph. Malaurie, L. Aynès and Ph.
Stoffel-Munck, Les obligations, 6th Ed., LGDJ, 2013, para. 414. In German law, see Larenz, AT
para. 20 and in English law, see the definition of fraud in Derry v Peek, 14 App. Cas. 337, HL,
at 374 (1889).
9
Article 1116 of the French Civil Code defines dol as the artifices (manoeuvres) of one
party whose aim is to induce the other party to enter into a contract (on disadvantageous terms)
as it is obvious that, without those manoeuvres, the other party would not have agreed upon the
terms. It provides that dol is a ground of avoidance/nullity of the agreement if it is proven. It will
not be presumed.
10
Article 1109 of the French Civil Code provides that there is no valid consent if the
consent was given as the result of mistake, extorted by violence (duress) or the result of deceit
(dol). Dol is also referred to in articles 1150 and 1151 of the French Civil Code with respect to
the damages available for non-performance. English law does not have an overarching structure
linking the equivalent legal instruments of mistake, duress and misrepresentation, but in practice
the courts frequently treat them as parallel doctrines, which are applied by analogy.
11
A mistake about a central feature of the contract may mean that there is no contract at all
since the parties never reached an agreement or the agreement is void for impossibility.
12
See supra n. 2, Adages du droit francais, p. 290.
13
On the comparison with fraud, which Black’s Law Dictionary equates to “bad faith”,
there are two important distinctions: fraud does include bad faith but bad faith does not
necessarily include fraud and “people go to jail for fraud. They don’t go to jail for bad faith” in
Rocking Chair Plaza v Brampton, 1988 29 CPC 2d 82, Duhaime online Legal Dictionary. See
also J. Ghestin and G. Goubeaux, Traité de droit civil, Introduction générale, LGDJ, 3rd Ed.,
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
rule to circumvent the enforcement of another one.14 Courts refer to this notion of fraud
by providing that fraus omnia corrumpit, so that the effects of the fraudulently applied
rule will be neutralised even though its conditions of application are met.
There is some uncertainty as to the genuine Roman origin of this adage, which may
explain its relatively late appearance in French law. It is mentioned for the first time in
decisions rendered by the Cour de Cassation (French Supreme Court for civil matters)
in 1817 and 1821 with respect to fraud committed against the rights of a third party
(fraus alterius),15 then in matters of land registration in 185816 and transfer of debt in
1874.17 Since then, the Cour de Cassation has consecrated the unenforceability, and
even the voidability, of the fraudulent act, on the ground that fraus omnia corrumpit.18
More recently, the Court of Appeal of Grenoble stated very clearly in a well-known
case that “the notion of fraud is a legal principle of general application in contractual
matters …”.19
Over time, fraud has remained a fluid concept that applies to a large variety of fields
and takes all kinds of forms.20 In the context of high profile scandals today across all
industry sectors, particularly in finance,21 fraus omnia corrumpit has never been so
important as a means of ensuring integrity in the marketplace. Some authors have
attempted to define a general theory of fraud and clarify the notion of fraud;22 others
have drawn a distinction based on the sanctions attaching to the fraudulent act, calling
for a theory of special frauds;23 and others have distinguished between the different
types of fraud based on the way the legal rule has been circumvented: either by
dodging the rule or neutralising it or misapplying it.24 This chapter highlights the
tremendous potential that the flexible principle fraus omnia corrumpit has to adapt to
the fight against evolving economic fraud.
1990, pp. 726–758. See also the definition of Fraud in article 4:107 of the Principles of
European Contract Law.
14
Ghestin and Goubeaux, ibid, p. 730.
15
Req., 3 July 1817, S. 1818.1.338; Req., 6 Feb. 1821, S. 1821.1.420.
16
Req., 8 Dec. 1858, DP 1859 I 184 with respect to the statute whose effects were
paralysed – 23 Mar. 1855 Act on land registration.
17
Req., 17 Feb. 1874, S. 1875 I 400.
18
Jean-Pierre Gridel, Le role de la Cour de Cassation française dans l’élaboration et la
consécration des principes généraux du droit privé, available at http://www.cedroma.usj.edu.lb/
pdf/dencom/gridel.pdf, p. 16.
19
Grenoble, 3 June 1988, Ste Barilla v Rivoire et Carret Lustucru et autres, Sem Jur., Ed.
E., No 15471, note B. Oppetit.
20
Tax fraud, electoral fraud, fraud in conflict of laws, criminal fraud, fraud against
consumers by professionals, electronic fraud and economic fraud such as the recent scandal of
sale of horsemeat in ready-made meals supposedly prepared with beef, and so on.
21
Manipulation of the London Interbank Offered Rate and the Foreign Exchange rate,
among the current high profile scandals.
22
José Vidal, Essai d’une théorie générale de la fraude en droit français, Thèse de doctorat,
Toulouse (1957).
23
Dani Rafic Itani, La théorie des fraudes spéciales, Thèse de doctorat, Droit privé (Paris
II) (2009).
24
Frédéric Dourmaux, La notion de fraude en droit privé francais, Thèse de doctorat, Droit
privé (Paris I) (2008).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
It uses traditional legal research methodology, analysing case law, statutory interpret-
ation and legal literature, to highlight the tension between the traditional classification
of fraud based on the distinction between fraud against third party rights and fraudulent
evasion of the law, and a unitary notion of fraud based on the legal principle of general
application, fraus omnia corrumpit. These two approaches to fraud will be explored in
the following two sections. It will conclude that fraus omnia corrumpit has great
potential as a legal instrument that the courts can avail themselves of in the battle
against fraud.
1. Fraud against Third Party Rights (Fraude aux Droits des Tiers)
In a decision in 1821, the Chambre des requêtes25 provided that a party who had
intentionally wrongly described the property in a mortgage could not benefit from the
nullity that would derive from it given that “dol and fraud are an exception to all the
rules” (otherwise expressed by the adage fraus omnia corrumpit). This general
principle has since targeted three types of fraud: first, fraud against creditors’ rights
(fraude paulienne) that relies on article 1167 of the French Civil Code, second, fraud
committed in the transfer of immovable rights and, third, fraud committed in violation
of contractual provisions.
As a point of comparison, it is worth noting that the UNIDROIT Principles of
International Commercial Contracts26 and the Principles of European Contract Law27
are not overly preoccupied with third party rights.28 This concern falls within the scope
of domestic law. A majority of legal systems protects third party rights and provides for
a legal action in the event of fraud against creditors’ rights. Such statutory provisions
may be found in the Netherlands,29 Spain,30 Belgium31 and France.32 When it is not
25
A previous chamber of the Cour de Cassation that does not exist anymore since 1947.
26
Unidroit Principles of International Commercial Contracts, available at http://www.
unidroit.org/english/principles/contracts/principles2010/integralversionprinciples2010-e.pdf.
27
The Principles of European Contract Law 2002 (Parts I, II and III) available at
http://www.jus.uio.no/lm/eu.contract.principles.parts.1.to.3.2002.
28
For a general discussion on European contract law, see B. Fauvarque-Cosson and D.
Mazeaud, European Contract Law, Materials for a Common Frame of Reference, European Law
Publishers, 2008, Collection droit privé comparé et européen, Vols. 6 and 7.
29
Article 3:45 to 3:48 of the Dutch Civil Code.
30
Article 1211 of the Civil Code and article 1290 and following.
31
Article 1167 of the Belgian Civil Code.
32
Article 1167 of the French Civil Code.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
integrated in the provisions concerning contract law, this action is usually found in
those dealing with bankruptcy. This is the case in English law.33
(i) Loss suffered by the creditor A creditor may claim to have suffered a loss if the
act in question has depleted the debtor’s pool of assets. This act may be an act of
impoverishment by which the debtor gives up control over one of its assets without
consideration or without adequate consideration.37 The ‘depletion’ element is met so
long as the effect of the act is to reduce the actual chance that the creditor has of being
paid.38 It may also be an act by which the debtor denies enrichment.
33
Insolvency Act 1986, Sect. No 423–425.
34
Article 1167 al 1 of the French Civil Code – les créanciers “peuvent aussi, en leur nom
personnel, attaquer les actes faits par leur débiteur en fraude de leurs droits”.
35
See for example Req., 28 Aug. 1940, S. 1940.1.103; Civ. 1, 10 Dec. 1974, S. 1975.777;
Civ. 1, 15 Oct. 1980, Bull. Civ. I, No 257; Civ. 3, 6 Oct. 2004, Bull. Civ. III No 163; Civ. 3, 12
Oct. 2005, Bull. Civ. III No 189.
36
For a general introduction on the “fraude paulienne”, See J. Francois, Les obligations –
Régime Général, 3rd Ed, Economica, 2013, pp. 329–361. Also F. Terré, Ph. Simler and Y.
Lequette, Les obligations, 11th Ed., 2013.
37
Courts have considered a large variety of acts – see for the constitution of guarantees,
Paris, 27 Jan. 2005, JCP 2005. IV. 2032; Civ. 3, 15 Nov. 1977, Bull. Civ. III, No 385; also Com.,
23 May 2000, not pub. Bull., No 96-18055, RJDA, 2000, No 1038; Com., 1 Mar. 1994, Bull.
Civ. IV, No 81, D. 1994. Somm. 215, obs. E. Fortis, Défrenois 1994, p. 1118, obs. D. Mazeaud.
38
Com., 23 May 2000, not pub. Bull., No 96-18055, RJDA, 2000, No 1038; Com., 1 Mar.
1994, Bull. Civ. IV, No 81, D. 1994, Somm. 215, obs. E. Fortis, Défrenois 1994, p. 1118, obs. D.
Mazeaud; Civ. 3, 15 Mar. 2006, Bull. Civ. III, No 64, D. 2006. IR. 1062, JCP 2006. IV.1789 in
J. Francois, Les obligations – Régime Général, 3rd Ed., Economica, 2013, p. 332.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
In principle, this transaction must cause, or contribute to, the debtor’s insolvency,
which must be established when the creditor lodges a claim.39 More precisely, the
courts have held that the creditor must prove the “apparent” insolvency of the debtor on
the day of the act in question.40 However, the Cour de Cassation has extended the
interpretation that it gives to this condition and ruled that “[t]he paulian action is
admissible, even if the debtor is not insolvent, so long as the fraudulent act has the
effect of rendering the exercise of the creditor’s (special) right upon the alienated asset
impossible.”41 This broad scope of application has raised some controversies.42 Some
authors have criticised this ruling on the basis that the protection of creditor’s special
rights – not its general rights over the debtor’s assets – should be based on the general
theory of fraud as expressed by the principle fraus omnia corrumpit (or even on the
ground of tort liability) rather than the Paulian action.43
(ii) Certain and due debt owed to the creditor The creditor must hold a receivable
that is certain (créance certaine) at the time of the fraudulent act in question. The
receivable may not be due yet at that time so long as the creditor evidences that the
transfer was performed with the intention of defrauding a future creditor.44 Although it
is not clearly stated, it is generally recognised that the creditor’s receivable must be
certain, due and payable (créance certaine, liquide et exigible) at the time the claim is
filed.45
It is worth noting that courts have expanded the scope of application of the paulian
action by relaxing the conditions for its admissibility, for example with respect to the
types of debt owed to the creditor.
(iii) Existence of a fraud Fraud is established if the creditor proves that the debtor
carried out the transfer with the sole knowledge (seule connaissance) that it would
cause his creditor a loss or prejudice (by becoming insolvent or increasing its
insolvency).46
39
Civ. 1, 10 May 1993, not pub. Bull., No 91-13976; Civ. 1, 6 Jan. 1987, Bull. Civ. I, No
1, RTD Civ. 1988.136, obs. J. M; Civ. Mestre; Civ. 1, 31 May 1978, Bull. Civ. I, No 209.
40
For Jérome Francois, the evidence of the causal link between the act in question and the
debtor’s insolvency characterises the condition of fraud rather than the loss that the creditor has
suffered. See J. Francois, Les obligations – Régime Général, 3rd Ed., Economica, 2013, p. 335.
41
Civ. 3, 6 Oct 2004, Bull. Civ. III, No 163, D. 2004. 3098, note crit. G. Kessler, JCP 2004.
IV.3169, RTD Civ. 2005, 121, obs J. Mestre and B. Fages, Défrenois 2005/6, p. 526. Also Soc.,
19 Dec. 1974, Bull. Civ. I, No 336, D. 1975.777, note O. Simon, Défrenois 1975, p. 992, note G.
Morin. Pursuant to J. Francois supra n. 40 on p. 337, the Paulian action is here transformed into
an action in rem for recovery.
42
In her thesis, supra n. 4, L. Sautonie-Laguionie advocates the extensive interpretation that
courts have given to the Paulian action.
43
See Civ., 10 Apr. 1948, D. 1948.421, note R. Lenoan, JCP 1948. II. 4403, note E.
Becque, RTD Civ. 1948.345, obs. H. et L. Mazeaud, ibid, p. 349, obs. J. Carbonnier; also Civ. 3,
8 July 1975, Bull. Civ. III, No 249.
44
Toulouse, 19 Nov. 2007, JCP 2008. IV. 1584; Com. 16 July 1991, Bull. Civ. IV, No 267;
Civ. 1, 7 Jan. 1982, Bull. Civ. I, No 4.
45
See J. Francois, Les obligations – Régime Général, 3rd Ed., Economica, 2013, p. 346.
46
Civ. 1, 14 Feb. 1995, Bull. Civ. I, No 79, D. 1996.391, note E. Agostini.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 6 / Date: 31/7
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
With respect to the relationship between the debtor and the third party, a distinction
is drawn between the acts performed gratuitously (actes à titre gratuit), which do not
require the complicity of the third party, and those entered into against consideration,
for which the complicity of the third party to the fraud must be established. The Cour
de Cassation held that “the fraud against creditors’ rights does not require necessarily
malicious intention; it derives from the sole knowledge that the debtor and his third
party have that the act in question will prejudice the creditor”.47 It is necessary to have
a fraudulent collusion between the parties to qualify the act as fraudulent.
The effect of the paulian action is to set aside the fraudulent transfer of assets so that
the creditor is reinstated to its original position. The unenforceability of the fraudulent
act is only for the benefit of the creditor who has brought the action against the
debtor.48
Although article 1167 of the Civil Code defines paulian action in broad terms, the
lack of a general theory underpinning this action has revealed the difficulties in
understanding its legal nature. Should it be considered as an application of the general
theory of fraud whose effect is the unenforceability of the fraudulent act?49 This is what
will be advocated in the second part of the chapter as it would clarify and simplify the
exercise of the creditors’ rights over the debtor’s relevant assets in a situation of fraud.
47
Civ. 1, 29 May 1985, Bull. Civ. I, No 163, RTD Civ. 1986.601, obs. J. Mestre, Défrenois
1985, p. 385; Com., 23 Oct. 2007, No 06-21.3888, Rev. Sociétés 2008, p. 798, note B. Lecourt;
CA Paris, 3eme ch. A, 9 Sept. 2008, SARL Les Trois Sources v Ste Cry Ltd, JCP 2009, I, No
2704; Civ 1ere, 29 May 1985: Bull. Civ. I, No 163; 14 Feb. 1995, D. 1996.391, note Agostini,
13 Apr. 1988: ibid I, No 91.
48
Civ. 1, 13 July 2004, not pub. Bull., No 02-10007, Défrenois 2005/4, p. 345, obs. Ph.
Thery.
49
In this sense, G. Marty and Ph. Jestaz in J. Francois, Les obligations – Régime Général,
3rd Ed., Economica, 2013, p. 360.
50
Req. 8 Dec. 1858, DP 1859 I 184.
51
“Attendu que la fraude fait exception à toutes les regles, que si la transcription a été faite
par suite d’un concert frauduleux entre le vendeur et l’acquéreur, elle ne peut produire aucun
effet.”
52
Ph. Simler and Ph. Delebecque, Droit Civil Les Suretes-La publicité fonciere, Précis
Dalloz. This principle has been used in similar circumstance by analogy – see Civ. 3. 5 July
1995, No 169, p. 115; 8 Apr. 1992 No 12, p. 77.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
mere bad faith of the second purchaser (who has recorded first) would not be sufficient
to frustrate the rights of the first purchaser. However, courts also hold that the sole
knowledge of the prejudicial effect of the act performed is sufficient.53 This element is
also required in a case of fraud against contractual provisions, as discussed below.
53
Com. 28 Oct. 1952, Gaz. Pal. 5.2.41. Fraudulent collision was imputed from the fact that
the first purchaser was in possession of the immovable real estate. The second purchaser could
not ignore the existence of the first sale.
54
Com., 27 June 1989, Société Barilla v Rivoire et Carret Lustucru et autres, Bulletin Joly
Sociétés, 1 Oct. 1989, No 10, p. 815.
55
A prior approval clause (“clause d’agrément”) is a clause which subjects the transfer of
shares by a shareholder to the prior approval of the shareholders’ meeting or another corporate
body.
56
At the time of the transfer, such prior approval clauses did not apply to a transfer between
shareholders. However, since an ordinance dated 24 June 2004, these clauses do apply to such
transfer.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
party and the beneficiary to elude the application of the prior approval agreement; and
(2) the violation of the spirit of the holding’s bylaws despite the ostensible lawfulness
of the transfers, but contradicting the spirit of the holding’s bylaws.57 Share transfers
whose object would be to defraud a third party’s rights are therefore prohibited.
As such, fraude paulienne could cover this type of fraud if it was analysed as fraud
against third party rights.58 More generally, it would be easier for courts to base their
reasoning on a general principle of ‘correction’ to ensure the ‘licit’ enforcement of legal
or contractual rules. However, the distinction between fraud against third party rights
and fraudulent evasion of the law persists as will be examined now. One difference is
that fraud against third party rights requires that fraudulent collusion between the
parties be established whereas individual acts committed by one party are sufficient to
constitute an evasion of the law, but is it enough to justify this distinction?
Evasion of the law (fraus legis in Latin) usually refers to a subterfuge by which the
fraudster circumvents the enforcement of the law with a fraudulent motive. Ostensibly
legitimate manoeuvers are performed in a way which is against the spirit of the law to
achieve an illegal end. The rule of law in this context refers to legal provisions from
which parties may not opt out.59
The doctrine of fraude à la loi came about in the French legal system via private
international law in the late 1870s through the cause célèbre of the Princess de
Bauffremont.60 The Belgian born princess was wife of a French officer whom she
wanted to divorce. However, she only obtained a separation decree from French courts
as, at the time, divorce was not admitted. She moved to Saxony where a separation
decree from a state in which divorce was not recognised was considered as a divorce
decree. She was then naturalised German and married Prince Bibesco, a Romanian
subject, in Berlin under German law. Mr de Bauffremont appealed to the French courts
against the (second) marriage. In 1878, the Cour de Cassation decided that the princess
took German nationality in order to obtain a divorce there and remarry, thus avoiding
the application of French law. It ruled that her foreign marriage had no effect on her
(first) husband on the ground of fraude à la loi.61
The theory of fraude à la loi has become a common doctrine that sanctions cases of
evasion and allows courts to void a contract or an act on the ground that the parties had
57
Note Paul le Cannu under Com., 27 June 1989, Bul. Joly Sociétés 1989, No 10, p. 815;
also J. Mestre, Rev. Soc., 1984, p. 80.
58
J. Carbonnier, droit Civil, Vol. 4, Les obligations, PUF, 16th Ed. (1992) under théorie
juridique, at 76, p. 154.
59
Some statutes have expressly provided that any agreement that would avoid the
enforcement of their provisions would be void per se (e.g. article 35 of DL 30 Sept. 1953 on
commercial leases).
60
Princesse de Bauffremont v Prince de Bauffremont, Civ. 18 March 1878, S. 1878.1.93
(note Labbé), D. 1878.1.201.
61
See Brook v Brook (1861) 9 HL Cas. 193 with respect to evasive marriages and Shaw v
Gould (1868) LR 3 HL 55 with respect to evasive divorces in English law.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
62
See J.J. Fawcett, Evasion of law and mandatory rules in private international law,
Cambridge Law Journal, Vol. 49 No. 1 (1990), pp 44–62. Whereas English private international
law has no doctrine of evasion of the law, it still recognises that “evasion of the law is
objectionable and should be stopped whenever it involves unfairness or is against the national
interest (p.56)”. This may be achieved by mandatory rules. This is a difference from French law
which has the doctrine of fraude à la loi.
63
Rapisarda v Colladon, EWFC 35 [2014].
64
Ibid. In this case, Sir James Munby, President of the Family division, summarised his
conclusions on the law, inter alia, that “… a decree, whether nisi or absolute, will be void on the
ground of fraud if the court has been materially deceived, by perjury, forgery or otherwise, into
accepting that it has jurisdiction to entertain the petition …”.
65
CE 10 June 1981 (No 19079).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 10 / Date: 31/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
of article L. 421-1 and L. 480-4 of the Urbanism Code for building without permit”.66
Similarly, in another decision,67 the Cour de Cassation ruled that the charterer might
not benefit from a provision in a contract with the charter party by which the latter
appointed a member of the shipping team to be captain of a French ship in violation of
French maritime labour law. The charterer had given his consent to this appointment
which constituted a fraude à la loi. It could not therefore benefit from this fraud.
66
Crim. 17 Oct. 2000, Stojanovic Milomir (pourvoi c/ CA Versailles 18 Nov. 1999, No
00-80612).
67
Com. 23 Nov. 1966, Bull. Civ. No 450, p. 400.
68
R 1983, 282; R 1986, 66, R 1991 92.
69
Regulation (EC) No 593/2008 of the European Parliament and of the Council of 17 June
2008 on the law applicable to contractual obligations (Rome I).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 11 / Date: 31/7
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
decide whether a sufficient intention can be imputed from the facts. Once the intention
is proven, the evasive manoeuvre will be void and the original legal provisions will
apply to the parties. In a fairly recent case,70 the Cour de Cassation criticised the
judges of a court of appeal as they did not prove the fraudulent intent of one of the
parties. This decision illustrates the difficulties in proving a case of fraud, especially
the necessary fraudulent intention.
From the dualist classification just explained, it is possible to distinguish the two
elements of fraud – the first one, the moral element, refers to the fraudulent intention
(or knowledge), which must be established by the party lodging the claim; the second
one, the material element, relates either to the violation of contractual or legal
provisions, or any acts that would cause a creditor to suffer a loss. These two elements
are common to the unitary notion of fraud, thus promoting a general theory of fraud
rooted in the principle fraus omnia corrumpit, as will be shown now.
Faced with the ambiguous dual classification, courts often use both types of fraud
interchangeably as they do overlap. Indeed, in both instances, the fraudster pursues his
own (self-) interests, even if they violate the law or conflict with third party rights. For
example, in cases of fraud in a transfer of immovable rights, the fraudulent conduct
aims at circumventing the land registry recording or any rules governing the transfer of
immovable rights. Is it a fraud against third party rights or an evasion of law? In fraud
against contractual rights, it is clear that the fraud is geared towards avoiding a rule that
has been agreed upon in a contract, meaning a binding rule or, more generally
speaking, a rule of law.71 In a paulian action, although the focus is on the loss suffered
by the creditor over the debtor’s assets, the main issue raised is about the fraudulent
70
Civ. 1, 15 May 2008, Bull. Civ. I No 06-19-535.
71
This is on the basis of the binding effect of contract as asserted in article 1134 of the
French Civil Code (pacta sunt servanda). See also Kelsen, La théorie juridique de la convention,
in Archives de philosophie du droit, 1940, p. 30 ff.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 12 / Date: 31/7
JOBNAME: Rider PAGE: 13 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
feature of the act that the debtor performed to defraud the creditor. This act aims at
avoiding the enforcement of a legal or contractual rule that is the agreement by which
the creditor has certain rights over the debtor’s assets. Similarly, evasion of the law
seeks to circumvent the lawful enforcement of the law. As this theory has been too
narrowly defined, it should be re-qualified as “fraud against any mandatory rules”.72 In
sum, both types of fraud require that a party intentionally seeks to elude the
enforcement of whatever rule is part of French law, and this is what matters.
For some authors, the distinction between the two types of fraud is purely
terminological since ‘fraudulent evasion of the law’ is traditionally applied in inter-
national private law whereas domestic law refers to ‘fraud against third party rights’.73
In any case, fraud consists of manipulating the rules of law against each other.
This position is the one that José Vidal has defended in his major doctoral work. He
states that “there is fraud whenever the subject of law succeeds to elude the
enforcement of a mandatory rule by using an efficient means, making its outcome
irreproachable on the ground of positive law”.74 He enunciates the three elements that
are required to establish a “fraud”:75 (1) a mandatory rule; (2) the intention to elude its
application; and (3) the use of efficient means to defraud a party.
1. With respect to the mandatory rule, fraud must seek to undo or avoid the
enforcement of a mandatory rule, be it legal or contractual, general or specific.
There is no limitation as to the definition of mandatory rule so long as it produces
a binding effect that the party has to respect when the conditions of enforcement
are met.
2. Fraud requires a fraudulent intention that can be defined as the intent to elude the
application of the mandatory rule or the intent to implement deceitful means in
order to achieve unlawful outcome in a licit fashion. Its definition conditions the
conception of fraud.
An objective conception of fraud derives from the violation of law per se.
Fraud is established as soon as the effects prohibited by that law have been
produced. Violation of its letter is equivalent to violation of its spirit. The
intention of the fraudster is therefore useful to highlight the fraud, but not
essential.76 This is the case of evasion of law in international private law, for
72
See supra n. 22, Vidal, Essai d’une théorie générale de la fraude en droit francais,
pp. 79–87.
73
See supra n. 13, Ghestin and Goubeaux, Traité de droit civil, Introduction générale,
p. 734.
74
See supra n. 22, Vidal, Essai d’une theorie générale de la fraude en droit francais, p. 208.
75
See supra n. 22, Vidal, Essai d’une theorie générale de la fraude en droit francais,
pp. 59–211. Grenoble, 3 June 1988, Observations B. Oppetit, 15471, p. 263; Ghestin and
Goubeaux, Traité de droit civil, Introduction générale, supra n. 13, pp. 749–753.
76
See J. Stoufflet, Fraud in Documentary Credit, Letter of Credit and Demand Guaranty,
Dickinson Law Review, Vol. 106 (2001), pp. 21–28 at 26: “In my opinion, there are strong
reasons for courts to look objectively at fraud in transactions involving documentary credits,
stand-by letters of credit and demand guaranties.”
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 13 / Date: 31/7
JOBNAME: Rider PAGE: 14 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
example. In a recent decision, the Cour de Cassation implied the fraudulent intent
from the alteration that one party made on the documents tendered to the bank.77
A subjective conception of fraud is commonly associated with a sensu stricto
definition of fraud, which requires that a fraudulent intent be proven. This ranges
from malicious intention (intention de nuire à autrui) to the sole knowledge that
the act performed will cause prejudice to a party.78 In the case of third party
involvement, the Cour de Cassation requires that fraudulent collusion between
the parties whose aim is to deprive another party from the exercise of her rights
be established.79 However, courts have understood this condition broadly and
imputed it from the sole knowledge of the prejudicial effect of the act per-
formed.80
3. The means used to elude the mandatory rule must be efficient in the sense that
they are actual and not fictive; they cover a variety of facts or acts.81 It could be
a fraud to the rights of creditors, the rights of the beneficiary of an undertaking to
enter into a contract, a preferential pact or an inalienability clause relating to
shares, a fraud against the rights of owners of a company protected by a prior
approval right … so long as the outcome reached is against the law (in its broad
sense).82
A consistent line of cases confirms that lower court judges must establish the (general)
elements that will qualify the fraud.83 “The purchase of a stake, even a majority one, in
the capital of one or several companies, also shareholders of another company, does not
qualify the fraud whose object or effect is to elude the by-laws provisions of this
company, without the elements that characterise this fraud.”84 In a following case, the
Court of Appeal of Paris confirmed this solution.85
77
Com., 19 Nov. 2013, not published.
78
See supra n. 46 and 47 – Fraud against creditors’ rights (action paulienne).
79
See supra I. (b) Fraud in the transfer of immovable rights, Req. 8 Dec. 1858, DP 1859 I
184; also see supra I. (c), Cass. Com. 27 June 1989, Bulletin Joly Sociétés, 1 Oct. 1989, No 10,
p. 815.
80
Com. 28 Oct. 1952, Gaz. Pal. 5.2.41. Fraudulent collision was imputed from the fact that
the first purchaser was in possession of the immovable real estate. The second purchaser could
not ignore the existence of the first sale.
81
This notion of fraud is particularly important in the domain of commercial law, company
law and labour law in which the number of mandatory rules is high.
82
CA Grenoble, 3 June 1988, JCO E 1989, II, No 15471, note Oppetit, and Cass. Comm.,
27 June 1989, No 88–17.6754, Dr. Sociétés 1989, No 270, Bull. Joly Sociétés 1989, p. 815; also
CA Paris, 3rd Ch. A, 26 June 2001, SA LMO v SA SIIHP, RTD Com. 2001, No 4, p. 910, obs.
Champaud and Danet; also CA Paris, 3rd Ch. B, 6 Nov. 2008, SARL Central Ambulances v
SARL Ambulances Auxerroises, RJDA, 2009, No 109, RTD Com. 2009, p. 162, obs. Champaud
and Danet.
83
See supra, Société Barilla v Rivoire et Carret-Lustucru. Also Montpellier 17 Dec. 1992,
Bujon et autres v. SA Journal Le Midi Libre et autre, Bull. Joly 1993.649, note Couret; Com. 13
Dec. 1994, Bull. Joly 1995.152, note Le Cannu.
84
Com. 13 Dec. 1994, Bull. Joly 1995.152, note Le Cannu.
85
Paris 26 June 2001, SA LMO v SA SIIHP et al., RTDC 2001.910, obs. Cl. Champaud
and Danet.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 14 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
This broad definition of fraud does not only clarify the theory of fraud but also
simplifies its conditions of admissibility. It removes unnecessary obstacles to access
and enforce the rules of law. Once the fraud is established, the principle fraus omnia
corrumpit allows the setting aside of the unlawful outcome reached through ingenious,
but lawful, subterfuges. It thus preserves the good operation of public order. It is a
corrective mechanism that fights against the illegality of fraud, but what is its nature?
Although French law does not have a general statutory principle of fraud, it does offer
a plethora of legal doctrines, such as illicit cause, abuse of right and civil liability, to
target fraudulent acts. Despite, or in addition to, these doctrines, French courts have
reiterated the originality, and relevance, of the adage fraus omnia corrumpit in specific
sets of circumstances, and have recognised it as a general principle of law (principe
général de droit).
In the Barilla case already discussed, the Court of Appeal of Grenoble clearly states
that “the notion of fraud is a legal principle of general application in contractual
matters and is not foreign to company law”.86 Interestingly, it does not list all the
different applications of the notion of fraud,87 but rather tries to unify all these
expressions under one general principle.88 In a decision of the appeal court of Dijon as
early as 1885, it was ruled that
fraud vitiates all the acts that it inspires and for which it is the only cause, the only motive,
fraus omnia corrumpit; that it is a rule of public and superior order that, to be respected and
enforced, did not need to be enacted in a formal and precise positive act, as it is enshrined in
the general principles of law, … .89
Vidal saw in the adage fraus omnia corrumpit, not only a simple maxim of morality,
but also the expression of an actual general principle of law of positive value to which
various cases could be attached.90 The Cour de Cassation has confirmed this interpret-
ation by referring to fraus omnia corrumpit as the legal ground of its decisions.91
86
Court of Appeal Grenoble, 3 June 1988, see supra, Société Barilla v Rivoire et
Carret-Lustucru.
87
For example, in company law, articles 104 and 146 of 24 July 1966 relating to the
agreements entered into between the company and one of its managers.
88
Grenoble, 14 Aug. 1869, D. 1870.2.151, which states that “… it is here the unescapable
application of the general principles of law which, to reject fraud, are an exception to all
rules …”; Dijon, 24 July 1885, D. 1886.2.217: “given that fraud vitiates all the acts that it
inspires and for which it is the only cause, the only reason, fraus omnia corrumpit, that is a rule
of general public order that has to be respected and enforced.”
89
Dijon, 24 July 1885, D. 1886.2.217.
90
See supra n. 22, Vidal, Essai d’une théorie générale de la fraude en droit francais,
pp. 386–387.
91
See, among other cases, Com. 6 July 1981, Bull. Civ. IV, No 303, p. 241.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 15 / Date: 31/7
JOBNAME: Rider PAGE: 16 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
In a recent case, the Paris Court of Appeal rejected the ostensibly valid legal
arguments made by the defendants on the ground of a fraud.92 It highlighted the
ingenuity of the fraud, but also its offensiveness, as it was aimed at transferring
the control of a company to a competitor against the clear intent of the partners in the
target company. Despite the formal regularity of the acts of transfer, these acts were
tainted by fraud and therefore set aside on the ground of fraus omnia corrumpit. The
Paris Court of Appeal thus re-asserted the flexibility and topicality of the principle.
This principle has also been qualified as an “autonomous corrective principle”,93
whose strength lies in its corrective/sanctioning power. This is the same effect that is
attached to the paulian action, which has made it a success. As such, this principle
ensures the protection of public order thanks to the originality of its sanction. As an
“exception to all rules”, it sets aside the rule that should have applied and reinstates the
affected party to the original position she was in.
Is this principle universally recognised? Most legal systems acknowledge this prin-
ciple, but still provide specific legal provisions relating to fraud (or its effects) without,
however, referring to a general theory of fraud per se. For instance, under the heading
“cause”, article 1344 of the Italian Civil Code states that “the cause is illicit when the
contract is a means of avoiding the application of a mandatory rule”.94 Article 280 of the
Portuguese Civil Code has a similar reference in a section dealing with the object of
contract.95 The German and Dutch codes prohibit any exercise of a right whose purpose
is harming the other party.96 More generally, the correction of fraudulent conduct falls
under the mechanism of fairness and good faith (Treu und Glauben) in German law.97 As
stated by Lenaerts, “the principle fraus omnia corrumpit is considered a specific
application of the principle of good faith in its limitative function”.98
92
Paris, 6 Nov. 2008, Société Central Ambulances v Société Ambulances Auxerroises, RG
No 07-18097.
93
See supra n. 13, Ghestin and Goubeaux, Traité de droit civil, Introduction générale,
p. 752. See also A. Lenaerts, The Role of the Principle Fraus Omnia Corrumpit in the European
Union: A Possible Evolution Towards a General Principle of Law?, Yearbook of European Law,
Vol. 32, No 1 (2013), pp. 460–498 at 467, who uses the same expression.
94
Article 1344 of the Italian Civil Code: “Si reputa altresì illecita la causa quando il
contratto costituisce il mezzo per eludere l’applicazione di una norma imperativa.” The interest
of this definition lies in the statutory qualification of an illicit cause in the event it eludes the
application of mandatory norms. Article 1131 of the French Civil Code defines an illicit cause
when it is prohibited by law and when it is against morality or public order.
95
Article 280 of the Portuguese Civil Code: “1 – É nulo o negócio jurídico cujo objecto
seja física ou legamente impossível, contrário à lei ou indeterminável. 2 – É nulo o negócio
contrário à ordem pública, ou ofensivo dos bons costumes.”
96
Article 226 of the German Civil Code: “The exercise of a right is not permitted if its only
purpose consists in causing damage to another.” See also Article of the Dutch Civil Code.
97
Article 242 of the German Civil Code.
98
See supra n. 93, Lenaerts, The Role of the Principle Fraus Omnia Corrumpit in the
European Union, p. 468.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 16 / Date: 31/7
JOBNAME: Rider PAGE: 17 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
By contrast, although English law recognises the rule fraus omnia corrumpit,99 it
does not have a general theory of law. It does not even distinguish in law between the
tort of deceit and fraudulent misrepresentation. As Lord Herchell in Derry v Peek100
held
[f]irst, in order to sustain an action in deceit, there must be proof of fraud and nothing short
of that will suffice. Secondly, fraud is proved when it is shown that a false representation has
been made (1) knowingly, (2) without belief in its truth, or (3) recklessly, careless whether it
be true or false.
Fraud always involves dishonesty, the motive of the person guilty of it being
immaterial.101 Although the standard of proof is the balance of probabilities, the courts
usually consider that fraud is generally a more improbable explanation for an event
than negligence. They therefore require more compelling evidence from the claimant to
prove its case. One of the principal difficulties in most fraud cases is proof of the
requisite subjective state of mind.
In sum, most courts apply the principle fraus omnia corrumpit with parsimony and
caution. Indeed, a claim of fraud must be dealt with with care and is difficult to
establish. However, a common definition of fraud based on the principle fraus omnia
corrumpit would allow the targetting of the wide ranging diversity and ingenuity of
fraud. Thanks to its flexibility, this principle is a key to the protection of the rules of
law and their lawful purposes.
CONCLUSION
Although fraud omnia corrumpit is a maxim that sounds familiar, its application is
limited to the cases where there are no specific statutory provisions and when no other
legal instruments, such as, among others, civil liability or abuse of right, that regulate
similar reprehensible acts can be implemented. However, even in highly codified legal
systems like the French legal system, this principle still finds room to apply. It gives
courts a corrective mechanism that aims to sanction any fraudulent act or conduct that
would prejudice a party or society at large. The lack of statutory definition, rather than
inhibiting the application of this recognised general principle of law, makes it
extremely flexible and able to embrace a large variety of fraudulent acts or conducts.
As demonstrated, the artificial distinction between fraud against third party rights
and evasion of the law should be abolished for the benefit of a unitary notion of fraud,
99
In HIH Casualty & General Insurance Ltd & Ors v Chase Manhattan Bank & Ors, [2003]
UKHL 6 at [15], Lord Bingham used the following words in relation to cases of civil fraud:
“… fraud is a thing apart. This is not a mere slogan. It reflects an old legal rule that fraud
unravels all: fraus omnia corrumpit. It also reflects the practical basis of commercial
intercourse. Once fraud is proved, it vitiates judgments, contracts and all transactions what-
soever.”
100
Derry v Peek (1889) 14 App. Cas. 337 at 376.
101
Derry v Peek, Ibid; Armstrong V Strain [1952] 1K.B. 232, CA [1952] 1 All E.R. 139;
Dutton v Louth Corp (1955) 116 E.G. 128, CA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 17 / Date: 31/7
JOBNAME: Rider PAGE: 18 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
thus clarifying and simplifying a claim of fraud. Courts have to be well equipped to
face the ingenuity and sophistication of fraudsters and pierce the “licit veil” covering
the fraudulent act. Once the fraud is established, the moral preoccupation of law
consists of setting aside the effects of a fraudulent act as fraud “vitiates everything”.
Even if fraus omnia corrumpit is recognised as a principle of law in most legal
systems, its role has yet to be strengthened. Its potential to address sophisticated and
ever-evolving fraudulent schemes, which the legislature cannot anticipate, is tremen-
dous, provided the courts seize this opportunity.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 28 /Pg. Position: 18 / Date: 31/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Fraud in any form is prohibited in Islamic law. It is reprehensible and regarded as a
heinous conduct. Muslims are required to lead every aspect of their lives honestly and
truthfully at all times. The stern prohibition against fraud may be found in the Qur’an
and Sunnah of the Prophet Muhammad, which are the primary sources of Islamic law.
Accordingly, this chapter starts with a discussion on the sources of Islamic law
followed by the concept of fraud as derived from the sources. This chapter then argues
that financial crimes are prohibited in Islamic law and that financial crimes such as
insider dealing may be regarded as fraud.
* This research was supported by the Ministry of Education Malaysia’s Grant ERGS/1/
2011/SS/UKM/02/5.
1
Ibn Manzur (undated). Lisan al-Arab, vol. 4 (Dar al-Ma‘arif), p. 2238.
2
Cowan, JM (1976). Arabic–English Dictionary: The Hans Wehr Dictionary of Modern
Written Arabic, 3rd Edition (New York: Spoken Language Services), p. 466.
3
Doi, ARI (1984). Shariah: The Islamic Law (Kuala Lumpur: AS Noordeen), p. 2.
4
Ibid.
5
See the Qur’an, ch. 2:21, 258.
6
The Qur’an, ch. 25:63.
7
Al-Qaradawi, Y (2013). Introduction to the Study of Islamic Law, translated by Ismail, A
et al. (Kuala Lumpur: IBFIM), pp. 45–46.
356
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Primary Sources
The Qur’an, which was revealed within 23 years to Prophet Muhammad, is The Holy
Book that prescribes principles and rulings in various aspects. This is mentioned in the
Qur’an, which is translated thus: ‘This is the Book; in it is guidance sure, without
doubt, to those who fear God.’8
The Qur’an highlights the importance of having faith in God in whatever situation,
performing acts of worship (‘ibadah) and dealing with fellow man with just and good
manners (mu’amalah). The latter also covers justness in commercial transactions in
order to attain the blessings of God for the goodness (barakah) in life. The principal
criterion of a just mu’amalah transaction is stated in the Qur’an, which is translated as
follows: ‘O you who believe, eat not each other’s property by wrong means, but let
there be among you trade and business through mutual good-will.’9
Pertaining to mu’amalah, certain aspects of transactions are stated in detail10 in the
Qur’an and some in brief.11 The brief or general principles in the Qur’an are then
critically interpreted through other sources such as the Sunnah, which is the second
primary source of Islamic law. The Sunnah comprises the words, conducts and tacit
approvals (taqrir) of the Prophet Muhammad that are real life examples of the meaning
of the revelation from God. This is mentioned in the Qur’an, which is translated thus:
‘Nor does he say (ought) of his own desire. It is no less than inspiration sent down to
him.’12 In other words, the Sunnah is the acts or practices of the Prophet Muhammad
that form the basis for the deliberation of rulings. The Sunnah is authoritative since it
explains, elaborates, specifies and interprets the meaning of the Qur’an or abrogates the
rulings in the Qur’an which are no longer relevant.13 An example of a Sunnah is where
the Prophet Muhammad said: ‘No zakah (alms tax) is imposed on less than five awsaq
(approximately 900kg) of dates; no zakah is imposed on less than five awsaq
(approximately 200 dirhams) of silver, and no zakah is imposed on less than five
camels.’14 This Sunnah explains the amount and quantity of alms tax, which is ordained
in the Qur’an but is silent about its details.15
Secondary Sources
An ancillary source of Islamic law is the fiqh (Islamic jurisprudence), which was
developed by the Muslim jurists to deal with and interpret the Qur’an and Sunnah in
8
Ch. 2:2.
9
Ch. 4:29.
10
See for example the verse relating to faraid (division of estate after death) in the Qur’an,
ch. 4:11.
11
See for example the verse relating to zakah (alms tax) in the Qur’an, ch 9:5, 11, 18, 58,
60, 67, 71, 75, 79, 99, 103. How the zakah is to be performed is detailed out in the Sunnah of
the Prophet Muhammad.
12
Ch. 53:3–4.
13
Al-Qaradhawi (2013), pp. 45–51.
14
Hadith Bukhari, translation taken from Laldin, MA (2008). Introduction to Shariah and
Islamic Jurisprudence, 2nd Edition (Kuala Lumpur: CERT), p. 78.
15
Qur’an, Ch. 2:110.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
order to align the rulings in the two primary sources with the pragmatic needs of the
society. Fiqh includes ijma’ (juristic consensus), qiyas (analogy), masalih mursalah
(public benefit), istihsan (juristic preference) and istishab (legal presumption of
continuance of condition), which are categorised as the secondary sources of Islamic
law. These sources involve the act of ijtihad, which is the exertion of mind to reach the
solution to solve the problems in hand. In other words, ijtihad is an exercise of
individual opinion in a legislative manner. Despite the fact that ijtihad is an exercise of
personal opinion, its law-making process is not based on mere speculative thought or
ad hoc law finding. On the contrary, it is arrived at through a well-defined methodology
of legal reasoning and legal interpretation called usul fiqh.16
While ijtihad by the Prophet Muhammad is authoritative, ijtihad by the Prophet’s
companions and followers could only form the secondary source of ijma’ if all of them
unanimously agree on the matter in question. An example of ijma’ is where the
companions of the Prophet Muhammad unanimously agree on qiyas as a valid source
in deducing the rulings of fiqh.17 In the event that the companions and followers could
not come to a consensus, they may reach what is called istikhlaf (difference of opinion)
that may be referred to on a case-by-case basis. As for the secondary source of Islamic
law of qiyas, it refers to the method of analogy whereby the existing ruling issued
al’asl (the origin) is compared to the furu’ (the branch) to find the illah (effecting cause
for extending a rule by analogy) that would bring to the hukm (ruling) on a particular
issue. Putting it simply, qiyas is obtained through the legal and philosophical method of
analogy, whereby a divine law revealed for a particular situation is applied to another
where some common feature exists in both situations.18
With regard to another secondary source of Islamic law of masalih mursalah, it takes
into consideration the aspect of public interest. An example of the application of
masalih mursalah is where the temporal regulation relating to financial management is
acceptable so as to bring benefit to man and prevent harm.19 As for the secondary
source of istihsan, it refers to juristic preference where Muslim jurists favour certain
rulings over other possibilities. It is acceptable as long as the istihsan is in line with the
Shar’iah.20 An example of the use of istihsan is the adoption of istisna’ (manufactur-
ing) contract in Islamic financial transactions. Meanwhile istishab refers to ‘the
presumption in the laws of evidence that a state of affairs known to exist in the past
continues to exist until the contemporary is proved’.21 An example of istishab is the
prohibition of drinking liquor,22 where it would remain until there is a state of
emergency or the reason for the prohibition has been eliminated.23 The latter may
happen, for example, when the liquor loses its intoxicating quality such as having
changed into vinegar.24
16
Dien, MI (2004). Islamic Law (Edinburgh: Edinburgh University Press), p. 4.
17
Laldin, pp. 98–99.
18
Vogel, FE and Hayes, SL (1998). Islamic Law and Finance: Religion, Risk and Return
(The Hague: Kluwer Law International), p. 43.
19
Laldin, pp. 108–109.
20
Ibid.
21
Doi, p. 83.
22
Ibid.
23
Ibid.
24
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
25
Securities Commission (2009). Resolution of Shariah Advisory Council (Kuala Lumpur),
pp. 11–12.
26
Al-Qaradhawi (2013), p. 114 citing Al-Shatibi (undated). Al-Muwafaqat, vol.1, p. 24;
Al-Raysuni (2005). Imam Al-Shatibi’s Theory of the Higher Objectives and Intents of Islamic
Law (London: IIIT), p. 109.
27
Doi, pp. 470–471.
28
Ibid.
29
Al-Qaradhawi (2013), p. 19.
30
See for example Ismail, A (2009). Nomination and Hibah Issues in the Takaful Industry,
paper presented at the ISRA Takaful Workshop, 7 May 2009, Kuala Lumpur.
31
Nyazee, IAK (1994). Theories of Islamic Law and The Methodology of Ijtihad (Kuala
Lumpur: The Other Press), p. 7.
32
Ibid.
33
Doi, p. 71.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
It may be surmised from the above that mere fraud does not cause the annulment of a
contract. There are to be misrepresentation, materiality, causation and injury or damage
(dharar). Misrepresentation includes deceptive statements (taghrir qawli), deceptive
acts (taghrir fi’li) and deliberate silence relating to material information.37 Materiality
is determined using the ‘reaction of the reasonable man test’ but with some subjective
element added in circumstances where the defrauded person is a sophisticated
contracting party.38 Materiality may be adapted as well depending on whether the fraud
takes place in a face-to-face transaction or in a transaction over an impersonal market.39
Meanwhile, causation may be transaction causation or loss causation.40 As for injury or
damage, it depends on commercial standards and practice, an example of which is
having paid an inflated price.41 The right to rescind is subject to the defrauded party’s
ability to prove within a reasonable time from the time of the discovery of the fraud
that the contract was entered into owing to wilful deceit or misrepresentation by the
other party.42 The burden of proof is upon the defrauded person to show that he would
34
Rayner, SE (1991). The Theory of Contracts in Islamic Law: A Comparative Analysis with
Particular Reference to the Modern Legislation in Kuwait, Bahrain and the United Arab
Emirates, 1st Edition (London: Graham & Trotman), pp. 207–208.
35
Al-Qaradhawi, Y (2003). The Lawful and the Prohibited in Islam (London: Al-Birr
Foundation), p. 239.
36
Mansuri, MT (2006). Islamic Law of Contracts and Business Transactions (New Delhi:
Adam Publishers & Distributors), p. 146.
37
Rayner, p. 215.
38
Jabbar, SFA (2012). Insider dealing: fraud in Islam? Journal of Financial Crime 19(2)
140–148.
39
Ibid.
40
Ibid.
41
Coulson, NJ (1984). Commercial Law in the Gulf States: The Islamic Legal Tradition
(London: Graham & Trotman), pp. 70–71.
42
Ibid., p. 126.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
not have transacted had he known of the truth.43 In other words, the defrauded party is
to prove, inter alia, transaction causation to be entitled for a rescission.44
Although the doctrine of khiyar al-tadlis (right to rescission) as elucidated above is
seemingly straightforward, a further examination of the doctrine exposes that its
application is subject to different interpretations of the various Islamic schools of
jurisprudence. To the Shafi’i, a defrauded party has the right to rescission as long as
there was fraud, notwithstanding that the defrauded person did not suffer any loss or
harm (ghabn).45 To the Hanafi, however, a defrauded party is entitled to rescission only
where there was fraud that resulted in excessive loss or harm (ghabn fahish)46 or where
there were fraud and latent defect (‘aib).47 Where there was only minimal loss or harm
(ghabn yaseer), some of the Hanafi allow claims for damages only but not rescission.48
Meanwhile, to the Hanbali, the right to rescission arises only where the fraud resulted
in excessive loss or harm and the defrauded person was not an experienced buyer.49 To
the Hanbali, experienced buyers have no right to rescission although they may have
suffered from excessive loss or harm. Where there was only minimal loss or harm, the
Hanbali gives a right to rescission only if it involved a fraudulent act (taghrir fi’li).50
To the Hanbali, a fraudulent statement (taghrir qawli) that resulted in only minimal
loss or harm does not give rise to the right of rescission. As for the Maliki, the right to
rescission arises where the buyer had trusted the vendor’s disclosure of the price under
bai’ al-amanat or bai’ el-mustarsil.51 Bai’ al-amanat is a sale where the buyer trusts the
seller’s disclosure of the original purchase price, while bai’ el-mustarsil is a sale where
the buyer or seller confides to the other that he is ignorant about the price and asks to
buy or sell at market price.52 Thus, it may be deduced that the rules concerning the
right to rescission are, in fact, diverse. The rules, for example, range from the defrauded
party not having to prove causation at all to having to prove excessive loss causation.
This is somewhat similar to the various interpretations by the US courts in relation to
the application of the elements of fraud under the SEC Rule 10b-5.53
43
Rayner, p. 229.
44
Jabbar (2012).
45
Salameh, M (1994). Nathariat Al-Aqid fi El-Fiqh El-Islami min khilal Aqid El-Bay’
(Moroccan Ministry of Religious Affairs), p. 234 and Taha, G (1971). Al-Wajeez fe El-Nathariat
El-Ammah fe El-Tizam, El-Kitab El-Awal: Masadar El-Eltizam (Baghdad), p. 202 in Al-Rimawi,
L (2004). Legal Aspects of Arab Securities Regulation with Particular Reference to Disclosure as
a Tool of Investor Protection when Offering/Listing Shares in Jordan, PhD Thesis, LSE,
pp. 222–225.
46
Comair-Obeid, N (1996). The Law of Business Contracts in the Arab Middle East
(London: Kluwer Law International), p. 107; Bellefonds, Traite, I, p. 355 in Rayner, p. 204;
Al-Rimawi, p. 220.
47
Salameh, p. 234 in Al-Rimawi, fn 803, pp. 224–225.
48
Sanhuri, Masadir El-Haqq, Pt.11, pp. 143–146, 160–189 and Mahmasani, General
Theory, Pt II, p. 426 in Al-Rimawi, pp. 225–226.
49
Salameh, p. 234 in Al-Rimawi, fn 803, pp. 224–225.
50
Ibid.
51
Ibid.
52
Al-Rimawi, pp. 225–226.
53
Jabbar (2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Dealings (3) and (4) may lead to fraudulent practices such as buying things at a very
cheap rate and later selling them at an exorbitant price57 where the subsequent buyer
does not have the information of the market price and gets cheated by the seller.58
5. Tasriyyah
This practice is done by ‘tying the udder of she-camel or sheep to allow the
animal’s milk to accumulate in her udder so as to give false impression to the
intending buyer of a very productive milk-yield’.59
In relation to this practice the Prophet Muhammad said:
Do not tie up the udder of she-camels and sheep. If any one among you buys a
she-camel or sheep whose udder have been tied up, [he] has [the] option (of
54
Ch. 83:1–4.
55
Ch. 2:188.
56
Mansuri, p. 145.
57
Doi, p. 351.
58
Ibid.
59
Mansuri, pp. 146–147.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
annulment) after milking it; either to retain it or to return [it] along with a measure of
dates (in lieu of the milk consumed by the purchaser).60
6. Inflated price in trust sale
A seller in a trust sale sells goods at an inflated price to the buyer. A trust sale
includes tawliyyah (sale at cost), murabahah (sale at profit) and wadi‘ah (sale at
discount) where the buyer depends on the price declared by the seller. If the seller
lies hoping for more profit, the buyer has the option of revoking the contract or
claiming from the seller for a reimbursement of the undue price increase.61
7. Tadlis bi al-‘Ayb (fraud with defect)
It is an implied condition in a contract that the object of contract shall be sound.
A seller is prohibited from knowingly selling a defective object. Otherwise the
buyer has the right to return the defective product to the seller provided that the
former does not realise the defect beforehand.62
8. Ikrah (coercion)
Coercion is defined in Al-Majallah as: ‘To compel, without right, a person to do
a thing without his consent or by fear.’63 Thus, coercion has some element of
force either physical or economic which is used to suppress one party’s option to
choose whether or not to enter into a particular contract. In such a situation the
buyer has the right to rescind the contract because it is classified as a voidable
one.64
Apart from the abovementioned forms of fraud, there are other types of fraud that are
prohibited in Islam such as the sale of uncertain items (gharar), hoarding (ihtikar),
falsehood, breach of promise, disloyalty and bribery.65 In fact, fraud in any form is
prohibited in Islam.66 It is prohibited because it deprives others of their rights67 and
creates unjust enrichment where one party gains at the expense of another. Islam places
particular emphasis on just and honest dealing in mu’amalah transactions. The
avoidance of fraudulent practices is to ensure that justice can be dispensed to the
contracting parties. The importance of justice in Islam can be seen in the Qur’anic
verse that relates justice with the primary object of the creation of the universe: ‘We
created not the heavens, the earth and all between them, but for just ends.’68
60
Ibid. citing San’ani, Subul al-Salam, vol. 3, p. 26.
61
Ibid., pp. 150–151.
62
Ibid.
63
Majallah, Art. 948 in Tyser, CR et al. (2001). The Mejelle: An English Translation of
Majallah el-Ahkam-I-Adliya and A Complete Code on Islamic Civil Law (Kuala Lumpur: The
Other Press), p. 149.
64
Mansuri, p. 151.
65
Ibrahim, SS et al. (2013) Fraud: In Islamic Perspective, paper presented at the 5th
International Conference on Financial Criminology 2013, jointly organised by the Accounting
Research Institute, Ministry of Higher Education and others.
66
Al-Qaradhawi (2003), p. 239.
67
Doi, p. 351.
68
Ch. 15:85
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
It is He Who has sent down to you (Muhammad) the Book (this Qur’an). In it are Verses that
are entirely clear, they are the foundations of the Book and those are the Verses of Al-Ahkam,
Al-Fara’id and Al-Hudud; and others not entirely clear … And those who are firmly grounded
in knowledge say: ‘We believe in it; the whole of it [clear and unclear Verses] are from our
Lord.’70
Some Qur’anic verses are left unclear so as to allow man to apply ijtihad and interpret
the verses71 so that they may be applied to the changing conditions of the society.
Thus, the authorities for the prohibition of financial crimes in Islam may be drawn
from a number of general principles in the Qur’an and Sunnah. The prohibition of
insider dealing,72 for example, may be derived from various Qur’anic verses and
Sunnah that command a person who occupies a position of trust (Amin) to faithfully
and honestly fulfil his obligations (amanah) and not to abuse the trust placed upon
him.73 This is similar to the position under the UK and US laws where insider dealing
is prohibited on the basis that it is tantamount to a breach of fiduciary duty. Further,
numerous Qur’anic verses and Sunnah that prohibit the taking of unfair advantage of
others and command that equality and honesty are to be observed are also authorities
for the prohibition of insider dealing. Again, this is similar to the UK and US laws that
prohibit insider dealing on the basis of fraud-on-marketplace-traders theory, the
equitable principle of fair dealing, unfair advantage theory and the parity-of-
information approach. Insider dealing would also be regarded as fraud in Islamic law.74
As discussed earlier, fraud in Islamic law includes ‘deliberate silence relating to
material information’. This means that where the information is material, fraud may
also occur by mere omission, passivity or concealment of information. Thus, insider
dealing which involves the non-disclosure of material price-sensitive information would
be regarded as fraud in Islamic law similar to the position under the US SEC Rule
69
As opposed to other verses in the Qur’an that are qat’i and muhkam, namely clear, precise
and not open to debates. See Aghnides, NP (1961). Mohammedan Theories of Finance (Lahore:
Premier Book House), pp. 112–113.
70
Ch. 3:7.
71
The interpretations of the verses are to be undertaken by the mujtahids, namely qualified
Islamic jurists and not simply by anyone. See Aghnides, pp. 114–115.
72
See further Jabbar, SFA (2010). Financial crimes: prohibition in Islam and prevention by
the Shari’a Supervisory Board of Islamic financial institutions. Journal of Financial Crime 17(3)
287–294.
73
See for example Chs. 2:283; 4:58; 8:27; 28:26.
74
Jabbar (2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
10b-5 and the UK Fraud Act 2006, but dissimilar to the common law fraud where
simple reticence does not amount to a legal fraud.75
Meanwhile, the prohibition of money laundering76 may be analogised from the
verses in the Qur’an and the Sunnah that prohibit the making of illicit gains from
unlawful or impermissible (haram) activities.77 Money laundering also goes against the
Islamic teaching of equitable distribution of income, resources and wealth among
mankind so that a just socio-economic order may be established for the benefit of the
society at large.78 This is in tandem with the secular laws that prohibit money
laundering on the basis that it misallocates income distribution, distorts commodity
prices and breeds social ills, crime and corruption.79 Finally, in Islamic law financial
crimes would be regarded generally as jinayah (crime) and specifically as ta’zir.80
Ta’zir is an Islamic criminal offence the exact scope of which is left opened by the
Qur’an and Sunnah for the State to determine if public interest so requires.
CONCLUSION
The sources of Islamic law are the ultimate reference for Muslims in conducting their
life in this world. The sources stipulate that honesty is of paramount importance and
that fraud is prohibited. Where there is fraud, the defrauded party has the right to
rescind the transaction that has been entered into provided that certain elements are
fulfilled. While the application of some of the elements are clear, there are those that
are subject to various interpretations by the different schools of Islamic jurisprudence.
Nonetheless, in Islamic law financial crimes such as insider dealing may be regarded as
fraud as well and at the same time may be categorised as the crime of ta’zir.
75
Ibid.
76
See further Jabbar, SFA (2011). Money laundering laws and principles of Shari’ah:
dancing to the same beat? Journal of Money Laundering Control 14(3) 198–209.
77
See for example Chs. 4:161; 7:157
78
Mannan, MA (1982). Why Is Islamic Economics Important? Seven Reasons for Believing
(Jeddah: King Abdulaziz University), p. 15; Ahmad, Z (1991). Islam, Poverty and Income
Distribution (Leicester: The Islamic Foundation), p. 13; Ahmad, M (1999). Business Ethics in
Islam (New Delhi: Kitab Bhavan), p. 131.
79
Tanzi, V (1996). Money Laundering and the International Financial System, IMF Working
Paper 96/55 (Washington DC: International Monetary Fund).
80
Another two categories of criminal offences in Islam are hudud and qisas. Hudud offences
and penalties are specifically prescribed in the Qur’an and Sunnah that cannot be annulled,
augmented or reduced by man. Qisas offences are specifically prescribed in the Qur’an and
Sunnah as well but the penalties prescribed may be transformed into other types of punishments.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 29 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
I. DIGITAL FRAUD
As with so many aspects of our lives, one of the oldest forms of crime has been
transformed by the newest of technologies. Information and Communications Tech-
nologies (‘ICTs’) are now central to the way we interact, both socially and commer-
cially. They also provide those who wish to defraud others with unprecedented access
to potential victims anywhere in the world at negligible cost. With approximately 3
billion people connected to the internet,1 the pool of potential victims is vast.
We also live in a world increasingly accustomed to conducting financial transactions
electronically. In 2012, 59 per cent of internet users in the EU bought goods and
services online.2 In the same year, 72 per cent of Canadians had engaged in online
banking,3 while in Australia there were over 5.8 billion credit/debit card transactions.4
According to the US Census Bureau, the seasonally adjusted estimated value of US
retail e-commerce sales for the fourth quarter of 2013 was US$69.2 billion.5
Although wonderfully convenient, the digital economy also creates diverse opportun-
ities for those who seek to exploit our trust. Online offenders may not only conceal
their real identities, they may assume realistic looking false identities. Electronically
stored data provides a tempting target for those who seek to access our identifying
information, while the production of false documents has never been easier. Even
face-to-face transactions are not without their risks, with transaction card information
vulnerable to being surreptitiously acquired.
The extent of digital fraud is difficult to assess for a number of reasons.6 First,
unclear terminology makes accurate recording problematic. Second, crime statistics
may record the commission of frauds but not the method of commission. Third,
* This chapter is based in part on Jonathan Clough, Principles of Cybercrime (CUP 2010)
ch 7.
1
International Telecommunication Union, ‘Statistics’ (2014) <http://www.itu.int/en/ITU-D/
Statistics/Pages/stat/default.aspx> accessed 6 August 2014.
2
Heidi Seybert, ‘Internet Use in Households and by Individuals in 2012’ (Eurostat, No
50/2012, 2012) 6.
3
Statistics Canada, ‘Individual Internet Use and E-Commerce 2012’ (Media Release, 28
October 2013) 1, 3.
4
Australian Payments Clearing Association, ‘Fraud Statistics 2013 Financial Year’ (May
2014) <http://www.apca.com.au/payment-statistics/fraud-statistics/2013-financial-year> accessed
6 August 2014.
5
US Department of Commerce, ‘Quarterly Retail E-Commerce Sales 4th Quarter 2013’
(Media Release, US Census Bureau News, 15 May 2014) <https://www.census.gov/retail/mrts/
www/data/pdf/ec_current.pdf> accessed 6 August 2014.
6
Jonathan Clough, Principles of Cybercrime (CUP 2010) 199.
366
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
statistical compilation is complicated by the range of public and private agencies that
may respond to consumer complaints. Finally, online fraud is likely to be under-
reported. Commercial organizations, for example, may be reluctant to report for fear of
undermining consumer confidence.
Nonetheless, available statistics suggest it is a significant problem.7 In 2012 the US
Internet Crime Complaint Center received 289,874 complaints, with an adjusted dollar
loss of US$525 million.8 In the same year, losses to credit card fraud in the UK and US
were estimated at £388 million9 and US$3.4 billion10 respectively. In relation to
identity crimes, a 2012 UK survey found that 8.8 per cent of UK adults had been the
victim of identity fraud in the previous 12 months, with losses equating to £3.3 billion
across the UK population.11 Such figures should, however, be seen in context, with card
fraud losses in the UK in 2013 representing 7.4p for every £100 spent.12
There are also the costs associated with investigating and rectifying digital frauds.13
Individuals and organizations may suffer reputational damage, while some victims may
suffer a range of emotional and psychological impacts.14 Identity crime is also
connected with organized crime and terrorism.15
7
For a comprehensive survey and analysis, see Russell G Smith and Alice Hutchings,
‘Identity Crime and Misuse in Australia: Results of the 2013 Online Survey’ (AIC Reports:
Research and Public Policy Series 128, 2014).
8
Internet Crime Complaint Center, ‘2012 Internet Crime Report’ (2012) 4.
9
Financial Fraud Action UK, ‘Annual Review 2013’ (2013) 9.
10
‘Skimming Off the Top’, The Economist (Atlanta, 15 February 2014) <http://
www.economist.com/news/finance-and-economics/21596547-why-america-has-such-high-rate-
payment-card-fraud-skimming-top> accessed 11 August 2014.
11
National Fraud Authority, ‘Annual Fraud Indicator’ (2013) 9.
12
Financial Fraud Action UK, Cheque and Credit Clearing Company and The UK Cards
Association, ‘Scams and Computer Attacks Contribute to Increase in Fraud, as Total Card
Spending Rises’ (News Release, 14 March 2014).
13
United States Government Accountability Office, ‘Information Security: Agency
Responses to Breaches of Personally Identifiable Information Need to be More Consistent’
(Report to Congressional Requesters, No GAO-14-34, 2013) 4.
14
For a detailed discussion of the impact on victims, see United Nations Office on Drugs
and Crime, ‘Handbook on Identity-Related Crime’ (2011) 107–67.
15
Kristin M Finklea, ‘Identity Theft: Trends and Issues’ (DIANE Publishing, 2010) 19–20.
16
For a detailed discussion see Russell G Smith, ‘Identity Theft and Fraud’ in Yvonne
Jewkes and Majid Yar (eds), Handbook of Internet Crime (Willan Publishing 2010); David S
Wall, ‘Micro-Frauds: Virtual Robberies, Stings and Scams in the Information Age’ in Thomas J
Holt and Bernadette H Schell (eds), Corporate Hacking and Technology-Driven Crime: Social
Dynamics and Implications (Hershey, PA (USA): IGI Global 2010); Mark Button, Chris Lewis
and Jacki Tapley, ‘Fraud Typologies and Victims of Fraud’ (National Fraud Authority, Literature
Review 2009).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
A. Fraudulent Sales
The traditional frauds associated with buying goods unseen have been transformed by
the ability to buy goods online. According to the Internet Crime Complaint Center,
non-auction/non-delivery of merchandise was one of the top-five reported crime types
in 2011.17 Even if delivered, it may be that the goods are stolen or counterfeit; a
particular concern in relation to the online sale of pharmaceuticals.18
The increase in online payment mechanisms has been accompanied by an increase in
the misuse of credit cards and bank accounts, representing one of the most common
forms of fraud.19 Because online sales are ‘card-not-present’ transactions, security
features such as signatures and PIN and chip technology are also not present. These
represent the most common type of payment card fraud, accounting for 63 per cent of
total card losses in the UK in 2012.20
B. Fraudulent Investments
The internet may also be used to promote fraudulent investment schemes, including
high risk investments, property investments and ‘Ponzi’ schemes.21 The Australian
Crime Commission estimates that between 2007 and 2012, 2,600 Australians were the
victim of serious and organized investment fraud, with estimated total losses in excess
of AUD$113 million.22 Another form of investment fraud are the so-called pump and
dump schemes, where the internet is used to disseminate information with a view to
influencing share prices.23
C. Advance-Fee Frauds
These are amongst the most common online scams,24 and while the Nigerian email
scam is probably the most infamous example, they take a wide variety of forms. All are
based around the central concept of trying to persuade the victim to pay fees in
anticipation of receiving some service or benefit, which turns out to be non-existent.25
17
Internet Crime Complaint Center, ‘2011 Internet Crime Report’ (2011) 10.
18
See Explanatory Report, Council of Europe Convention on the counterfeiting of medical
products and similar crimes involving threats to public health (CETS No. 211), [6].
19
Erica Harrell and Lynn Langton, ‘Victims of Identity Theft, 2012’ (US Department of
Justice 2013) 1.
20
Financial Fraud Action UK (n 9) 23.
21
Jane Kerr and others, ‘Research on Sentencing Online Fraud Offences’ (Sentencing
Council 2013) 22.
22
Australian Crime Commission, ‘Serious and Organised Investment Fraud Crime’
(2012) 5.
23
Sheridan Morris, ‘The Future of Netcrime Now: Part 1 – Threats and Challenges’ (Home
Office Online Report 62/04, 2004) 17–18.
24
Penny Jorna and Alice Hutchings, ‘Australasian Consumer Fraud Taskforce: Results of
the 2012 Online Consumer Fraud Survey’ (Australian Institute of Criminology, Technical and
Background Paper No 56, 2014) 2.
25
Clough (n 6) 187.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
They include ‘get rich quick’ schemes, business opportunities, educational qualifica-
tions, inheritance scams, lottery scams, financial advice scams,26 ‘hit-man’ scams,27
‘FBI’ scams,28 online rental scams,29 ‘computer support centre’ scams30 and ‘dating’ or
‘romance’ scams.31 According to a recent Australian survey, of those who received a
fraudulent request or invitation, 22.2 per cent responded by requesting further infor-
mation, supplying personal information or suffering a financial loss.32
D. Click-Frauds
Click-frauds exploit the way in which online advertising fees are commonly based on
the number of ‘clicks’ a site receives. Website owners may therefore increase the fee
they receive by employing cheap labour, or automated software, to inflate the number
of clicks their site receives.33 False websites may also be used to attract visitors who
are then redirected to the client site, or bombarded with pop-up ads.34
E. Identity Crime
‘Identity crime’ may broadly be described as the use of a false identity in the
commission of crime.35 In some cases, technology has simply amplified opportunities
that have always existed to gain access to identity information. A discarded computer
or stolen laptop may contain a wealth of private information,36 while online searches
and social networking sites may allow offenders to easily obtain targeted information
about potential victims.37 Readily available technology is now capable of being used to
produce false identification documents.
In addition to these variants of traditional methods of identity crime, there are a
number of techniques that are a direct product of digital technology.
26
Jorna and Hutchings (n 24) 2.
27
Internet Crime Complaint Center (n 8) 12.
28
ibid 9.
29
Jane Kerr and others (n 21) 3.
30
Internet Crime Complaint Center (n 8) 10.
31
ibid 16.
32
Jorna and Hutchings (n 24) 9–10. See also Stuart Ross and Russell G Smith, ‘Risk
Factors for Advance Fee Fraud Victimisation’ (Trends and Issues in Crime and Criminal Justice
No 420, 2011).
33
Wall (n 16) 72.
34
See Facebook Inc v Maxbounty Inc, 274 FRD 279 (ND Cal, 2011).
35
For a detailed discussion, see United Nations Office on Drugs and Crime (n 14).
36
Information Commissioner’s Office, ‘Unscrubbed Hard Drives Report’ (2010) <http://ico.
org.uk/news/latest_news/2012/~/media/documents/library/Data_Protection/Research_and_reports/
unscrubbed_hard_drives_report.ashx> accessed 11 August 2014.
37
Internet Crime Complaint Center (n 8) 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
38
Binational Working Group on Cross-Border Mass Marketing Fraud, ‘Report on Phishing:
A Report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney
General of the United States’ (2006) 4.
39
ibid 8–9.
40
Anti-Phishing Working Group, ‘Phishing Activity Trends Report: 1st Quarter 2014’
(2014) 2–7.
41
Canadian Internet Policy and Public Interest Clinic, ‘Techniques of Identity Theft’
(CIPPIC Working Paper No 2, ID Theft Series, 2007) 15.
42
United States Government Accountability Office (n 13) 4.
43
ibid 3.
44
The following summary is based on Federal Bureau of Investigation, ‘Malware Targets
Bank Accounts: “Gameover” Delivered via Phishing E-Mails’ (6 January 2012) <http://
www.fbi.gov/news/stories/2012/january/malware_010612/malware_010612> accessed 7 August
2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
that will purportedly help them to fix the problem, but by accessing it the victim
unknowingly downloads malware which acquires usernames and passwords.
F. Spam
45
Model Criminal Code Officers Committee of the Standing Committee of Attorneys-
General, Model Criminal Code: Chapter 3, Credit Card Skimming Offences (Attorney General’s
Department 2006) 1.
46
See, for example, R v Flore & Anor [2014] EWCA Crim 465.
47
Model Criminal Code Officers Committee of the Standing Committee of Attorneys-
General (n 45) 5.
48
Adam Carey, ‘Passengers Warned about Credit Skimming Cabbies’ The Age (Melbourne,
29 March 2014) <http://www.theage.com.au/victoria/passengers-warned-about-creditcard-
skimming-cabbies-20140329-35q2w.html> accessed 7 August 2014.
49
Model Criminal Code Officers Committee of the Standing Committee of Attorneys-
General (n 45) 5.
50
Kimberly Kiefer Peretti, ‘Data breaches: What the Underground World of “Carding”
Reveals’ (2008) 25 Santa Clara Computer and High Technology Journal 375, 377.
51
Symantec, ‘Symantec Report on the Underground Economy July 07–June 08’ (2008) 4.
52
Peretti (n 50) 387; Symantec (n 51) 20.
53
Wall (n 16) 70.
54
Federal Trade Commission, ‘Spam Summit: The Next Generation of Threats and
Solutions’ (2007) 2–3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
generate mass emails. For example, the ‘Bredolab’ botnet was estimated to have
infected 30,000,000 computers at its peak, generating 3 billion emails per day.55
Although recent reports suggest the volume of spam is declining, it remains a
significant problem, representing approximately 29 billion spam emails per day.56
Spammers are also increasingly making use of other forms of communication, such as
SMS/MMS and social networking sites. As it is not strictly fraud, the regulation of
spam is beyond the scope of this chapter. It is, however, a matter of international
concern, and one that is closely connected to the reduction of online fraud.57
55
Sophos, ‘Security Threat Report 2013’ (2013) 27.
56
Symantec, ‘Internet Security Threat Report 2014’ (2014)14.
57
All Party Parliamentary Internet Group, ‘“Spam”: Report of an Inquiry by the All Party
Internet Group’ (2003); Industry Canada, ‘Stopping Spam: Creating a Stronger, Safer Internet’
(Report of the Task Force on Spam 2005); Task Force on Spam, ‘Report of the OECD Task
Force on Spam: Anti-Spam Toolkit of Recommended Policies and Measures’ (Organisation for
Economic Co-operation and Development 2006).
58
See generally The President’s Identity Theft Task Force, ‘Combating Identity Theft: A
Strategic Plan’ (2007); Canadian Internet Policy and Public Interest Clinic, ‘Policy Approaches
to Identity Theft’ (CIPPIC Working Paper No 6, ID Theft Series, 2007); Organisation for
Economic Co-operation and Development, ‘Scoping Paper on Online Identity Theft’ (Ministerial
Background Report DSTI/CP(2007)3/FINAL, 2008); United Nations Office on Drugs and Crime
(n 14).
59
‘Skimming Off the Top’ (n 10).
60
Gregor Urbas and Kim-Kwang Raymond Choo, ‘Resource Materials on Technology-
Enabled Crime’ (Australian Institute of Criminology, Technical and Background Paper No 28,
2008) 5.
61
Although beyond the scope of this chapter, like all cybercrimes the prosecution of digital
frauds is improved by measures aimed at facilitating digital investigations and prosecutions more
broadly.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Although assuming new forms, many of the scams outlined above are simply
traditional frauds and may be prosecuted under general fraud offences.62 However, the
application of provisions that evolved in the context of tangible goods to intangible data
can present challenges. For example, courts and legislatures have grappled with
questions such as whether the receipt of electronic funds may constitute an ‘obtaining’
for the purposes of theft,63 whether electronically transferred funds ‘belonged to
another’,64 and whether a computer can be deceived65 or can consent.66 Similarly,
traditional forgery offences do not apply to the falsification of electronic data such as a
website.67
It is therefore important to ensure that existing statutes are adapted to so that they are
capable of application in the digital context. For example, article 8 of the Council of
Europe Convention on Cybercrime68 requires Parties to enact provisions aimed at
frauds committed through the input or alteration of data.69 Similarly, in the context of
forgery, article 7 requires Parties to create an offence that applies to the creation or
alteration of stored data, which may be relied upon in the course of legal transactions.70
B. Computer Offences
As the above examples illustrate, many digital frauds involve unauthorized access to or
modification of data. Such conduct falls within the first category of cybercrimes: those
offences where ICTs are the target of the offence. There is an increasing recognition of
the importance of such offences, quite independently of issues relating to fraud.71 As
ICTs are increasingly seen as part of the critical infrastructure, their protection becomes
a matter of national security as much as criminal justice.72 Given the central role that
data plays in modern financial transactions, offences relating to the misuse of data are
also an essential component in providing effective enforcement against global fraud.
62
See generally Criminal Code (Cth), pt 7.3; Criminal Code (Can), pt X; Fraud Act 2006
(UK); 18 USC § 1343. For an example of a successful prosecution for conspiracy to defraud in
relation to credit card skimming, see &&&DPP v Camara, Georges, Donka & Anania [2014]
VCC 504.
63
See R v Thompson [1984] 3 All ER 565, 570.
64
See R v Preddy [1996] AC 815; Parsons v The Queen (1999) 195 CLR 619.
65
See The Law Commission, ‘Fraud’ (LAW COM No 276, 2002) 21.
66
See Kennison v Daire (1986) 160 CLR 129.
67
Model Criminal Code Officers Committee of the Standing Committee of Attorneys-
General, ‘Identity Crime’ (Final Report, 2008) 15.
68
Convention on Cybercrime, opened for signature 23 November 2001, ETS No 185
(entered into force 1 July 2004) (‘Convention on Cybercrime’).
69
Explanatory Report, Convention on Cybercrime, [86].
70
ibid [83].
71
See United Nations Office on Drugs and Crime, ‘Comprehensive Study on Cybercrime’
(Report, 2013).
72
See, for example, Organisation for Economic Co-operation and Development, ‘OECD
Guidelines for the Security of Information Systems and Networks: Towards a Culture of
Security’ (2002).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Such offences are typically found in specific computer misuse provisions.73 These
generally encompass a range of interactions with data, described in the Convention on
Cybercrime as offences against the ‘confidentiality, integrity and availability of
computer data and systems’.74 Commonly referred to as ‘hacking’, in broad terms these
offences seek to address unauthorized access to computer systems,75 illegal interception
of computer data76 and unauthorized interference with computer data or computer
systems.77 Article 6 of the Convention on Cybercrime – ‘Misuse of devices’ – addresses
the black market in passwords and other information, which may facilitate computer
misuse.78
C. Identity Theft
1. Identity Crime refers to offences where the defendant uses a false identity to
perpetrate the crime.
2. Identity Fraud is where a false identity is used to gain money, goods, benefits or
services.
3. Identity Theft is the assumption of a pre-existing identity.81
Both ‘identity crime’ and ‘identity fraud’ are examples of existing offences that are
facilitated by the use of false identities. While traditional criminal offences may be
used to prosecute the principal offence, there is arguably a need to create a specific
offence of ‘identity theft’, which is aimed at punishing ‘the preliminary steps of
collecting, possessing and trafficking identity information’.82
73
See, for example, Criminal Code Act 1995 (Cth), pt 10.7; Criminal Code (Can),
s 430(1.1); Computer Misuse Act 1990 (UK); 18 USC § 1030.
74
Convention on Cybercrime (n 68) ch II s 1 title I.
75
ibid art 2.
76
ibid art 3.
77
ibid arts 4 and 5.
78
Explanatory Report, Convention on Cybercrime, [71].
79
United Nations Office on Drugs and Crime (n 14) 25–9; Finklea (n 15) 3.
80
Australasian Centre for Policing Research and the Australian Transaction Reports and
Analysis Centre, ‘Standardisation of Definitions of Identity Crime Terms: A Step Towards
Consistency’ (Report Series No 145.3, 2006) 9–10.
81
See also United Nations Economic and Social Council, Commission on Crime Prevention
and Criminal Justice, ‘Results of the Second Meeting of the Intergovernmental Expert Group to
Prepare a Study on Fraud and the Crime Misuse and Falsification of Identity’ (E/CN.15/2007/8,
2 April 2007) [14].
82
Model Criminal Code Officers Committee of the Standing Committee of Attorneys-
General (n 67) 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
There is still some debate over whether such offences are necessary and/or
desirable,83 and uptake internationally has been relatively limited.84 However, a number
of jurisdictions have enacted specific identity theft provisions including Australia,85
Canada,86 the UK87 and the US.88 Rather than a detailed critique, the following
provides a general overview of some of the key features of identity theft provisions.
First, such offences are typically based around a central concept of ‘identity
document’ or ‘identity information’. The process of identification has been described as
‘the association of data with a particular human being’.89 In practical terms this may
involve something known to the person, such as a PIN, something in their possession,
such as a driver’s licence, or a physical characteristic such as a fingerprint.90 An
offender must therefore acquire or fabricate identifying information in order to commit
identity theft.91
While some jurisdictions define ‘identity document’ by reference to a list of
documents,92 others extend to ‘identity information’ more broadly; for example, ‘any
information – including biological or physiological information – of a type that is
commonly used alone or in combination with other information to identify or purport
to identify an individual’.93
Although ‘identity theft’ is generally used to refer to those situations where an
existing identity is appropriated, it may also include the creation of a false identity
(‘identity fabrication’) or alteration of an existing identity (‘identity manipulation’).94
Because they may also be used as a vehicle for fraud, it is also desirable that the
definition incorporate identification information of legal persons such as corporations.95
Around the central concept of identity information, a range of conduct is then
criminalized, typically encompassing possession, trafficking and manufacturing. In
addition to the general challenge of establishing possession of data in digital form,96
the additional challenge in relation to identity information is the dual-use nature of
such information and the danger of criminalizing simple possession of another person’s
83
See United Nations Office on Drugs and Crime (n 14) 35.
84
See United Nations Office on Drugs and Crime (n 71) 99–100.
85
Criminal Code (Cth), pt 9.5.
86
Criminal Code (Can), ss 402.1–405.
87
Identity Documents Act 2010 (UK), ss 6–8; Fraud Act 2006 (UK), ss 6 and 7.
88
The principal US federal provisions were enacted as the Identity Theft and Assumption
Deterrence Act of 1998: see especially 18 USC §§ 1028 and 1028A.
89
Roger Clarke, ‘Human Identification in Information Systems: Management Challenges
and Public Policy Issues’ (1994) 7(4) Information Technology and People 6, 8.
90
ibid 17–18.
91
Economic and Domestic Secretariat, ‘Identity Fraud: A Study’ (2002) 17.
92
Identity Documents Act 2010 (UK), s 7(1); Criminal Code (Can), s 56.1.
93
Criminal Code (Can), s 402.1. See also Criminal Code (Cth), s 370.1 (definition of
‘identification documentation’).
94
Australasian Centre for Policing Research and the Australian Transaction Reports and
Analysis Centre, (n 80) 7.
95
Model Criminal Code Officers Committee of the Standing Committee of Attorneys-
General (n 67) 31. See also The President’s Identity Theft Task Force (n 58) 67.
96
Jonathan Clough, ‘Now You See it, Now You Don’t: Digital Images and the Meaning of
“Possession”’ (2010) 19 Criminal Law Forum 205.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
97
Criminal Code (Cth), s 372.2; Criminal Code (Can), ss 56.1(1) and 402.2(1); Identity
Documents Act 2010 (UK), ss 4(2) and 6(1). Also relevant may be the offence of possessing any
article for use in the course of or in connection with any fraud under Fraud Act 2006 (UK), s 6.
See also 18 USC § 1028(a).
98
Criminal Code (Can), s 402.2(2). See also Criminal Code (Can), s 56.1; Criminal Code
(Cth), ss 370.1 (definition of ‘deal’), 372.1 and 372.1A.
99
Criminal Code (Cth), s 372.3; Identity Cards Act 2006 (UK), ss 5(1) and 6(1); 18 USC
§1028(a)(5).
100
Russell Smith, ‘Transnational Cybercrime and Fraud’ in Philip Reichel and Jay Albanese
(eds), Handbook of Transnational Crime and Justice (2nd edn, Sage Publishing 2014) ch 7.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
101
United Nations Convention against Transnational Organized Crime, opened for signature
15 November 2000, 2225 UNTS 209 (entered into force 29 September 2003).
102
United Nations Office on Drugs and Crime (n 14) 263–301.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 30 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
PART VI
CORRUPTION
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Bribery and corruption have received a great deal of coverage since the introduction
and implementation of the Bribery Act 2010 and the extension of the remit of the
Serious Fraud Office.1 Bribery has been defined as ‘giving or receiving [of] something
of value to influence a transaction’.2 It has also been argued that it can include ‘money
… other pecuniary advantages … [and] non-pecuniary benefits’.3 It has been suggested
that bribery can be divided into two categories – direct and indirect4 – the latter of
which is normally conducted through an agent and arises where the respective parties
agree to meet in an attempt to gain a competitive advantage. The agent is paid a
commission from the additional revenue generated by the resultant work or trade.5
Denning, citing Latymer, stated that bribery was regarded as ‘a princely kind of
thieving’,6 yet despite these simple definitions, it is still a very difficult term to define.7
This is clearly illustrated by the wide range of statutory definitions offered by the
Public Bodies Corrupt Practices Act 1889, the Prevention of Corruption Act 1906 and
the Prevention of Corruption Act 1916. This uncertainty was clarified by the Bribery
Act 2010. The chapter begins by outlining criminalisation of bribery by virtue of the
Bribery Act 2010. It then identifies the United Kingdom’s8 bribery policy, which is
administered by the Ministry of Justice and enforced by the SFO in conjunction with
the Financial Conduct Authority.9
1
Hereinafter ‘SFO’.
2
Serious Fraud Office ‘Bribery and corruption’, n/d, available from http://www.sfo.gov.uk/
bribery–corruption/bribery–corruption.aspx, accessed 10 August 2014.
3
Sanyal, R. and Samantha, S. ‘Trends in international bribe-giving: do anti-bribery laws
matter?’ (2011) Journal of International Trade Law and Policy, 10(2), 151–164, 153.
4
Beale, K. and Esposito, P. ‘Emergent international attitudes towards bribery, corruption
and money laundering’ (2009) Arbitration, 75(3), 360–373, 362.
5
Ibid.
6
Denning, A. ‘Independence and impartiality of the judges’ (1954) South African Law
Journal, 71, 345.
7
The Law Commission, Reforming Bribery (The Law Commission: London, 2008).
8
Hereinafter ‘UK’.
9
Hereinafter ‘FCA’.
381
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
10
Pope, T. and Webb, T. ‘Legislative Comment – the Bribery Act 2010’ (2010) Journal of
International Banking Law and Regulation, 25(10), 480–483, 480.
11
Ibid.
12
William, C. ‘Trillion dollar bribery’ (2011) New Law Journal, 161(7447), 25–26, 25.
13
Sanyal and Samantha above, n 3 at 151.
14
Benstead, J. ‘Biting the bullet’ (2010) New Law Journal, 160(7434), 1291–1292, 1291.
15
Aaronberg, D. and Higgins, N. ‘Legislative Comment – The Bribery Act 2010: all bark
and no bite …?’ (2010) Archbold Review, 5, 6–9, 6. However, it must be noted that other
jurisdictions have introduced stringent legislation to tackle bribery and corruption, such as the
Foreign Corrupt Practices Act 1977. For a more detailed discussion see Rossbacher, H. and
Young, R. ‘The Foreign Corrupt Practices Act within the American response to domestic
corruption’ (1997) Journal of Money Laundering Control, 1(2), 125–137 and Maurer, V.
‘Uncharted boundaries of the US Foreign Corrupt Practices Act’ (2013) Journal of Financial
Crime, 20(4), 355–364. However, it is important to note that since its introduction, several
commentators have suggested that the Bribery Act 2010 is more effective than its US
counterpart. See for example the interesting discussion by Breslin, B., Ezickson, D. and Kocoras,
J. ‘The Bribery Act 2010: raising the bar above the US Foreign Corrupt Practices Act’ (2010)
Company Lawyer, 31(11), 362–369 and Cropp, N. ‘The Bribery Act 2010: Part 4: a comparison
with the Foreign Corrupt Practices Act: nuance v nous’ (2011) Criminal Law Review, 2,
122–141.
16
Editorial ‘The Bribery Act 2010’ (2010) Criminal Law Review, 6, 439–440, 439.
17
Ibid.
18
Aaronberg and Higgins above, n 15 at 6.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
19
Committee on Standards in Public Life, First Report: ‘Standards in Public Life’ (Cm
2850–1, 1995) 43.
20
Law Commission, Legislating the Criminal Code: Corruption No. 248 (Law Commission
1998). For an interesting commentary on these proposals see Sullivan, G. ‘Proscribing
corruption – some comments on the Law Commission’s report’ (1998) Criminal Law Review,
August, 547–555.
21
Anti-terrorism, Crime and Security Act 2001, ss. 108–110. For an interesting discussion
of this legislation see Black-Branch, J. ‘Powers of detention of suspected international terrorists
under the United Kingdom Anti-terrorism, Crime and Security Act 2001: dismantling the
cornerstones of a civil society’ (2002) European Law Review, 27, 19–32.
22
Criminal Justice and Immigration Act 2008, s. 59.
23
Bribery Act 2010, s. 1(2).
24
Bribery Act 2010, s. 1(3).
25
Bribery Act 2010, s. 2(2).
26
Bribery Act 2010, s. 2(3).
27
Bribery Act 2010, s. 2(4).
28
Bribery Act 2010, s. 2(5).
29
Bribery Act 2010, s. 2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
30
Bribery Act 2010, s. 2(4–6)
31
Bribery Act 2010, s. 6(1).
32
Bribery Act 2010, s. 6(2).
33
Bribery Act 2010, s. 6.
34
Bribery Act 2010, s. 7. For an excellent general discussion of corporate criminal liability
see Stessens, G. ‘Corporate criminal liability: a comparative perspective’ (1994) International
and Comparative Law Quarterly, 43(3), 493–520; Jefferson, M. ‘Corporate criminal liability: the
problem of sanctions’ (2001) Journal of Criminal Law, 65(3), 235–261; Clarkson, C. ‘Kicking
corporate bodies and damning their souls’ (1996) Modern Law Review, 59(1996), 557; and
Ambasta, K. ‘A leap of reasoning, but for special cases: an analysis of the ‘expiry’ of the
directing mind and will test in attribution of corporate liability’ (2012) Company Lawyer, 33(8),
227.
35
Bribery Act 2010, s. 7.
36
This is defined as either ‘a body which is incorporated under the law of any part of the
United Kingdom and which carries on a business (whether there or elsewhere), any other body
corporate (wherever incorporated) which carries on a business, or part of a business, in any part
of the United Kingdom, a partnership which is formed under the law of any part of the United
Kingdom and which carries on a business (whether there or elsewhere), or any other partnership
(wherever formed) which carries on a business, or part of a business, in any part of the United
Kingdom’. See Bribery Act 2010, s. 7(5).
37
Bribery Act 2010, s. 8(1).
38
Bribery Act 2010, s. 8(3).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
conduct of business for that organisation’.39 The introduction of the corporate criminal
liability provision is innovative and represents a new approach towards the law of
bribery.40 It is interesting to note that there is no requirement to prove that the activity
was committed in the UK or elsewhere. Indeed, there is no need to even show a close
connection to the UK as is needed for the other bribery offences under the Bribery Act
2010.41 It is a defence to the corporate criminal liability provision if the entity is able
to determine it had adequate procedures designed to prevent persons associated with
the commercial organisation from bribing another person.42 The Ministry of Justice has
stated that liability will be determined on a balance of probabilities.43 The Ministry of
Justice has published six general principles of adequate procedures which include
proportionality, top-level commitment to anti-bribery measures, risk assessment, due
diligence, communication, and monitoring and review.44 If the commercial entity is
able to demonstrate that they have adequate procedures, then no offence has been
committed. This is a complete defence. Additionally, the Bribery Act 2010 provides a
general defence for those charged under it with breaching the Acts provisions. Section
13 of the Act provides that it is a defence for a person charged with a relevant bribery
offence to prove that the person’s conduct was necessary for ‘the proper exercise of any
function of an intelligence service, or the proper exercise of any function of the armed
forces when engaged on active service’.45 The purpose of the section 13 defence is to
permit the intelligence services, or the armed forces, to undertake legitimate functions
which may ‘require the use of a financial or other advantage to accomplish the relevant
function’.46 It has therefore been introduced to allow for operational necessities. To rely
on the defence, the defendant needs to prove, on the balance of probabilities, that their
conduct was necessary.
POLICY BACKGROUND
The UK’s bribery strategy is based on the international legislative measures introduced
by the United Nations,47 the European Union48 and the Organisation for Economic
Co-operation and Development (OECD).49 In 1994, the OECD accepted a recom-
mendation that required member states to ‘take effective measures to deter, prevent and
combat the bribery of foreign public officials in connection with international business
39
Ministry of Justice, Bribery Act 2010, Circular 2011/05 (Ministry of Justice 2011)
para. 23.
40
Pope and Webb above, n 10 at 482.
41
Ministry of Justice above, n 39 at para. 22.
42
Bribery Act 2010, s. 7.
43
Ministry of Justice above, n 39 at para. 15.
44
Ibid.
45
Bribery Act 2010, s. 13(1).
46
The Government’s Explanatory Notes to s. 13 Bribery Act 2010.
47
Hereinafter ‘UN’.
48
Hereinafter ‘EU’.
49
Hereinafter ‘OECD’.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
50
Sheikh, S. ‘The Bribery Act 2010: commercial organisations beware!’ (2011) Inter-
national Company and Commercial Law Review, 22(1), 1–16, 3. See Organisation for Economic
Co-operation and Development ‘OECD Convention on Combating Bribery of Foreign Public
Officials in International Business Transactions’, n/d, available from http://www.oecd.org/daf/
anti-bribery/ConvCombatBribery_ENG.pdf, accessed 11 August 2014. For an excellent discus-
sion of the implementation of this Convention in the UK see Organisation for Economic
Co-operation and Development ‘Steps taken to implement and enforce the OECD Convention on
Combating Bribery of Foreign Public Officials in International Business Transaction’, 14 March
2014, available from http://www.oecd.org/daf/anti-bribery/anti-briberyconvention/United
Kingdom_StepsTaken_March2014.pdf, accessed 11 August 2013.
51
See Sacerdoti, G. ‘The 1997 OECD Convention on Combating Bribery of Foreign Public
Officials in International Business Transactions’ (1999) International Business Law Journal, 1,
3–18.
52
Sheikh above, n 52 at 3. See Council Act of 26 May 1997 drawing up, on the basis of
Art.K.3(2)(c) of the TEU, the convention on the fight against corruption involving officials of the
European Communities or officials of EU member States (1997) OJ C195/1. This has also been
referred to as the EU Anti-Corruption Convention. See Van den Wyngaert, C. and Stessens, G.
‘The international non bis in idem principle: resolving some of the unanswered questions’ (1999)
International and Comparative Law Quarterly, 48(4), 779-804, at 793.
53
Convention on the Fight against Corruption Involving Officials of the European Com-
munities or Officials of Member States, drawn up in Brussels, 26 May 1997, 37 ILM 12; OJ
1997 C 195.
54
OECD Convention on Combating Bribery of Foreign Public Officials in International
Business Transactions 1997, available from http://www.oecd.org/dataoecd/4/18/38028044.pdf,
accessed 13 December 2011.
55
Raphael, M., Blackstone’s Guide to the Bribery Act 2010 (Oxford University Press:
Oxford, 2010) at 116.
56
Law Commission above, n 7.
57
Sheikh above, n 52 at 4.
58
Home Office, Reform of the Prevention of Corruption Acts and SFO Powers in Cases of
Bribery against Foreign Officials (Home Office: London, 2005).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
in 2007,59 which led to the publication of its 2008 Report.60 The Report was followed
by the publication of a White Paper that resulted in the enactment of the Bribery Act
2010.61 The introduction of the Bribery Act 2010 has received a mixture of responses
from commentators. For example, some suggest that the provisions ‘go too far and fear
[that] the new “gold standard” legislation poses a threat to UK competitiveness’.62
Other concerns relate to the increased prosecutorial powers under the Act and the
compliance costs which firms in the UK are expected to meet.63 Conversely, it has also
been described as a ‘major piece of legislation, of immense practical importance to the
conduct of business, whether in the public or private sphere’.64 In many respects it is
still too early to determine who is correct; although it should go without saying that the
Bribery Act 2010 is significantly better than the UK’s previous legislation.
59
Law Commission, Reforming Bribery: A Consultation (Law Commission: London,
2007).
60
Law Commission, Reforming Bribery (Law Commission: London, 2008).
61
The Ministry of Justice, Bribery: Draft Legislation (The Stationery Office: London,
2009).
62
Pope and Webb above, n 10 at 480.
63
Ibid.
64
Editorial ‘The Bribery Act 2010’ (2010) Criminal Law Review, 6, 439–440, 439.
65
Hereinafter ‘FSA’. The transfer of functions from the FSA to the FCA were concluded by
the enactment of the Financial Services Act 2012. For a brief comment on this process see
Kokkinis, A. ‘The Financial Services Act 2012: the recent overhaul of the UK’s financial
regulatory structure’ (2013) International Company and Commercial Law Review, 24(9),
325–328.
66
Duthie, T. and Lawler, D. ‘Legislative Comment – The United Kingdom Bribery Bill’
(2010) Construction Law Journal, 26(2), 146–152, 147.
67
Monteity, C. ‘The Bribery Act 2010: Part 3: enforcement’ (2011) Criminal Law Review,
2, 111–121, 114.
68
Financial Service and Markets Act 2000, s. 6(3). For a more detailed commentary on this
statutory objective see Ryder, N. ‘The financial services authority and money laundering – a
game of cat and mouse’ (2008) Cambridge Law Journal, 67(3), 635–653.
69
For a more detailed discussion of the definition of financial crime see Harrison, K. and
N. Ryder, The Law Relating to Financial Crime in the United Kingdom (Ashgate: Farnham, UK,
2013) at 11–13.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
can adversely affect the City of London’s reputation.70 The FSA identified the threat
posed by bribery and stated that ‘there is a risk that firms could come under pressure to
pay bribes, especially if they are operating in jurisdictions where paying bribes is
widely expected. In addition, financial services firms may launder the proceeds of
corruption or be used to transmit bribes.’71 However, it is essential to note that the
transition from the FSA to the FCA resulted in a significant amendment to the statutory
objectives. Whereas the FSA had four uniform statutory objectives,72 the FCA has been
allocated a single wider objective to ‘ensure that markets function well’.73 This is
supported by three operational objectives: consumer protection, the integrity objective
and competition.74 Of particular relevance to this chapter is the integrity objective
which includes ‘protecting and enhancing the integrity of the UK financial system’75
and that the financial system must not be ‘used for a purpose connected with financial
crime’.76
The FCA does not enforce the provisions of the Bribery Act 2010, with its role only
applying where ‘authorised firms fail adequately to address corruption and bribery risk,
including where these risks arise in relation to third parties acting on behalf of the
firm’. The regulator argues that it ‘does not need to obtain evidence of corrupt conduct
to take regulatory action against a firm’.77 Therefore, authorised firms are bound to
comply with the FCA’s anti-bribery policies processes to prevent bribery and corruption
and to make sure that they conduct their business with integrity. These measures are
contained in the FCA Hand Book.78 Of particular relevance to this chapter is Systems
and Controls, or the SYSC part of the Hand Book and Principle 1 of its Principles for
Businesses. Rule 3.2.6R states that firms are required to ‘establish and maintain
effective systems and controls … for countering the risk that the firm might be used to
further financial crime’.79 This means that firms have the responsibility to assess the
70
Financial Services Authority, Anti-bribery and Corruption in Commercial Insurance
Broking: Reducing the Risk of Illicit Payments or Inducements to Third Parties (Financial
Services Authority: London, 2010) at 6.
71
Financial Services Authority, Financial Risk Outlook 2008 (Financial Services Authority:
London, 2008) at 35.
72
For a more detailed discussion of the statutory objectives of the FSA see Ryder, N. ‘Two
plus two equals financial education – the Financial Services Authority and consumer education’
(2001) The Law Teacher, 35(2), 216–232.
73
HM Treasury, ‘A new approach to financial regulation: transferring consumer credit
regulation to the Financial Conduct Authority’, 16 January 2014, available from https://www.
gov.uk/government/consultations/a-new-approach-to-financial-regulation-transferring-consumer-
credit-regulation-to-the-financial-conduct-authority, accessed 13 August 2014.
74
Financial Services Act 2012 s. 1B(3).
75
Financial Services Act 2012 s. 1D(1).
76
Financial Services Act 2012 s. 1D(2)(b).
77
Financial Services Authority ‘One-minute guide – anti-bribery and corruption in commer-
cial insurance broking’, n/d, available from http://www.fsa.gov.uk/smallfirms/resources/one_
minute_guides/insurance_intermed/anti_bribery.shtml, accessed 10 August 2014.
78
For a more detailed discussion see Financial Services Authority, Financial Crime: A
Guide for Firms (Financial Services Authority: London, 2011) at 43–49.
79
Financial Services Authority ‘SYSC Senior Management Arrangements, Systems and
Controls’ in The Full Handbook (Financial Services Authority, 2011) at Rule SYSC 3.2.6R.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 8 / Date: 31/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
risks of becoming involved in, or facilitating, bribery and corruption and are obliged to
take all reasonable steps in preventing such risks from crystallising. Authorised firms,
therefore, have an additional, regulatory, obligation. This makes them responsible for
putting in place and maintaining relevant policies and processes which can be utilised
in preventing corruption and bribery and thus allows them to conduct their businesses
with integrity.80 Rule 6.1.1R states that ‘a firm must establish, implement and maintain
adequate policies and procedures sufficient to ensure compliance of the firm including
its managers, employees and appointed representatives with its obligations under the
regulatory system and for countering the risk that the firm might be used to further
financial crime’.81
ENFORCEMENT
A person found guilty of any of the offences contained in sections 1, 2 and 6 of the
Bribery Act 2010 is liable to a maximum custodial sentence of ten years’ imprisonment
and/or an unlimited fine. For the offence found in section 7, the maximum penalty is an
unlimited fine.82 If a person is convicted under the Bribery Act 2010, the maximum
sentence that can be imposed by the court is a ten-year custodial sentence. As outlined
at the start of this chapter, the SFO is the lead enforcement agency for criminal
offences created by the Bribery Act 2010. It is fair to note that the SFO have attracted
a great deal of criticism for its record of fraud related prosecutions.83 At the time of
writing this chapter, there have been very few bribery related prosecutions instigated
under the Bribery Act 2010. It is interesting to note that none of the bribery convictions
under the Bribery Act 2010 have been brought by the SFO. The first person to be
convicted under the Bribery Act was Munir Yakub Patel, who pleaded guilty for
accepting a £500 bribe not to register penalty points on the courts traffic offences
database.84 The second conviction under the Bribery Act 2010 was Mawia Mushtaq,
who after failing to pass a driving test for a private hire taxi licence, attempted to bribe
the licensing officer in Oldham Council.85 The third person to be convicted under the
Bribery Act 2010 was Yang Li, who sought to bribe a professor at the University of
Bath with £5,000 for increasing his grade for a failed written piece of work. In this
case, the accused was found guilty and sentenced to 12 months imprisonment.86 The
Bribery Act 2010 has resulted in a small number of criminal prosecutions since it
80
Financial Services Authority above, n 77.
81
Financial Services Authority above, n 79 at 6.1.1R.
82
Bribery Act 2010, s. 11(3).
83
See for example Ryder, N., The Financial Crisis and White Collar Crime: the Perfect
Storm? (Edward Elgar: Cheltenham, UK and Northampton, MA, 2014) at 207–209.
84
R v Patel (Munir Yakub) [2012] EWCA Crim 1243.
85
See Newman, C. and Macaulay, M. ‘Placebos or panaceas: Anglo-New Zealand experi-
ences of legislative approaches to combatting bribery’ (2013) Journal of Criminal Law, 77(6),
482–496, at 490.
86
See BBC News ‘University of Bath student jailed over tutor bribe bid’, 23 April 2013,
available from http://www.bbc.co.uk/news/uk-england-somerset-22269573, accessed 13 August
2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
received Royal Assent. In May 2014 the Sentencing Council published its ‘definitive
guideline on fraud, bribery and money laundering offences’.87 It is hoped that the
guidance from the Sentencing Council will be able to provide more clarity on the
appropriate sentences for the criminal offences created by the Bribery Act 2010.88
The other option available is under the Financial Service and Markets Act 2000,
where the financial regulator has been given a plethora of investigative and enforcement
powers and a series of preventative measures which should ensure that it was well
placed to tackle bribery and corruption in the financial services sector. For example, the
FSA was a prosecuting authority for both money laundering and a limited number of
fraud related offences. It also had the power to impose financial sanctions where it had
established that there had been a contravention by an authorised person of any of its
requirements.89 Furthermore, the FCA has the power to ban authorised persons and
firms from undertaking any regulated activity.90 The FSA and the FCA have favoured
imposing financial sanctions on firms and individuals as opposed to instigating criminal
proceedings, as part of their ‘credible deterrence’ policy.91 This was summarised by
Peat and Mason, who stated:
The FSA’s policy of credible deterrence in enforcement cases involves bringing action not
just against firms, but also against individuals. The normal sanction imposed on a firm is a
financial penalty; the firm pays the fine and then carries on with its normal business. In
contrast a sanction imposed on an individual may have longer-lasting consequences.92
Teasdale stated that the ‘credible deterrence agenda has relied upon not only securing
meaningful convictions, judgments and regulatory decisions, but also upon clearly
advertising them; to the regulated community to dissuade similar behaviour, and to the
wider world to engender consumer and market confidence’.93 Lewis et al. stated that
the regulator, the FSA, has ‘levied large fines and, at worst, bans, on firms and relevant
87
Sentencing Council ‘Fraud, bribery and money laundering’, 23 May 2014, available from
http://sentencingcouncil.judiciary.gov.uk/about/Fraud-bribery-and-money-laundering.htm,
accessed 13 August 2014. Also see Sentencing Council, Fraud, Bribery and Money Laundering
Offences: Definitive Guideline (Sentencing Council: London, 2014) at 41–53. For a brief
comment see Scott, C. ‘Sentencing guidelines for fraud, bribery and money laundering offences’
(2014) Butterworths Journal of International Banking and Financial Law, 29(4), 267–268.
88
For an illustration of two cases that offered some light into the possible sentences that
could be imposed before the Bribery Act 2010 was implemented see R v Anderson (Malcolm
John) [2003] 2 Cr. App. R. (S.) 28 and R v Francis Hurell [2004] 2 Cr. App. R. (S.) 23.
89
Financial Services and Markets Act 2000, s. 206(1). For a general discussion see Travers
Smith Regulatory Investigations Group ‘FSA enforcement action: themes and trends’ (2011)
Compliance Officer Bulletin, June, 87, 1–35.
90
Financial Services and Markets Act 2000, s. 56.
91
Financial Services Authority ‘Delivering credible deterrence’, speech by Margaret Cole,
Director of Enforcement, FSA, Annual Financial Crime Conference, 27 April 2009, available
from http://www.fsa.gov.uk/library/communication/speeches/2009/0427_mc.shtml, accessed 8
March 2013.
92
Peat, R. and Mason, I. ‘Credible deterrence in action: the FSA brings a series of cases
against traders’ (2009) Company Lawyer, 30(9), 278–279, at 278.
93
Teasdale, S. ‘FSA to FCA: recent trends in UK financial conduct regulation’ (2011)
Journal of International Banking Law and Regulation, 26(12), 583–586, at 585.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
approved individuals who breached its rules – sometimes regardless of whether the
breach has resulted in actual harm to customers’.94 This point is clearly illustrated by
the significant increase in the use of financial sanctions by the regulator.95 For example,
in 2007 the regulatory agency imposed a total of £5.3m in financial sanctions.96 A year
later, the FSA reported that the figure had increased to £22.7m.97 In 2009 the amount
of financial sanctions increased to £35m.98 The figures for 2010 and 2011 illustrated an
increase to £89.1m99 and a decrease to £66.1m.100 However, in 2012 the FSA imposed
financial sanctions that amounted to £311.5m,101 a majority of which were associated
with the LIBOR scandal. As of April 2013, the FSA had imposed financial sanctions
totalling £143.1m.102 From then, the FCA imposed financial penalties of approximately
£250m.103 Martin Wheatley stated that between 2012 and 2013 regulatory agencies
‘handed out a record £312m in fines, more than triple the previous high number of
£89m’.104 Teasdale described these decisions as an example of ‘an increase in the
FSA’s readiness to take decisive action’.105 Additionally, the FCA has the power to
impose civil fines under the Financial Service and Markets Act 2000,106 for example, in
July 2011, when the FSA fined Willis Limited £6.895m for weaknesses in its
anti-bribery and corruption systems and controls.107 Here, the FSA concluded that the
company had failed to guarantee that it had established and recorded an adequate
94
Lewis, A., Pretorius, R. and Radmore, E. ‘Outsourcing in the financial services sector’
(2013) Compliance Officer Bulletin, May, 106, 1–34, at 3.
95
For a more detailed commentary on the approach adopted by the Financial Services
Authority towards imposing financial sanctions see Financial Services Authority, Financial
Services Firms’ Approach to UK Financial Sanctions (Financial Services Authority: London,
2009).
96
Financial Services Authority ‘FSA fines table 2007’, n/d, available from http://www.
fsa.gov.uk/about/press/facts/fines/2007 accessed 8 March 2013.
97
Financial Services Authority ‘FSA fines table 2008’, n/d, available from http://www.
fsa.gov.uk/about/press/facts/fines/2008, accessed 8 March 2013.
98
Financial Services Authority ‘FSA fines table 2009’, n/d, available from http://www.
fsa.gov.uk/about/press/facts/fines/2009, accessed 8 March 2013.
99
Financial Services Authority ‘FSA fines table 2010’, n/d, available from http://www.
fsa.gov.uk/about/press/facts/fines/2010, accessed 8 March 2013.
100
Financial Services Authority ‘FSA fines table 2011’, n/d, available from http://www.
fsa.gov.uk/about/press/facts/fines/2011, accessed 8 March 2013.
101
Financial Services Authority ‘FSA fines table 2012’, n/d, available from http://www.
fsa.gov.uk/about/press/facts/fines/2012, accessed 8 March 2013.
102
Financial Conduct Authority ‘Fines table 2013’, 1 October 2013, available from
http://www.fca.org.uk/firms/being-regulated/enforcement/fines, accessed 7 October 2013.
103
Financial Conduct Authority ‘Fines table 2014’, 7 August 2014, available from http://
www.fca.org.uk/firms/being-regulated/enforcement/fines, accessed 13 August 2014.
104
Financial Conduct Authority ‘The changing face of financial crime’, 1 July 2013,
available from http://www.fca.org.uk/news/speeches/the-changing-face-of-financial-crime,
accessed 8 July 2013.
105
Teasdale above, n 93, at 584.
106
Financial Services and Markets Act 2000, s. 206(1).
107
Financial Services Authority ‘FSA fines Willis Limited 6.895m for anti-bribery and
corruption systems and controls failings’, 21 July 2011, available from http://www.fsa.gov.uk/
pages/Library/Communication/PR/2011/066.shtml, accessed 24 July 2011.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
commercial rationale to support its payments to overseas third parties; failed to ensure
that adequate due diligence was carried out on overseas third parties to evaluate the risk
involved in doing business with them and failed to adequately review its relationships
on a regular basis to confirm whether it was still necessary and appropriate for Willis
Limited to continue with the relationship.108 Furthermore, the FSA fined Aon Limited
£5.25m for ‘failing to take reasonable care to establish and maintain effective systems
and controls to counter the risks of bribery and corruption associated with making
payments to overseas firms and individuals’. Here, the FSA determined that Aon
Limited had ‘failed to properly assess the risks involved in its dealings with overseas
firms and individuals who helped it win business and failed to implement effective
controls to mitigate those risks’.109 In December 2013, the FCA fined JLT Specialty
Limited £1.8m ‘for failing to have in place appropriate checks and controls to guard
against the risk of bribery or corruption when making payments to overseas third
parties’.110 The FCA stated that:
These failings are unacceptable given JLTSL actually had the checks in place to manage risk,
but didn’t use them effectively, despite being warned by the FCA that they needed to up their
game. Businesses can be profitable but firms must ensure that they take the necessary steps to
control the risks in that business. Bribery and corruption from overseas payments is an issue
we expect all firms to do everything they can to tackle. Firms cannot be complacent about
their controls – when we take enforcement action we expect the industry to sit up and take
notice.111
Additionally, the FCA has fined Besso Limited £315,000 for failing to take reasonable
care to establish and maintain effective systems and controls for countering the threat
posed by bribery.112 The FCA stated:
Despite receiving two visits from us, and numerous industry wide warnings, Besso failed to
ensure that they had proper systems and controls in place to counter the risks of bribery and
corruption in their business activities. Firms must play their part in preserving the integrity of
the UK financial system, including taking all steps necessary to prevent financial crime.
Where we find firms failing to do so, we will take action.113
It is extremely likely that the FCA will continue to impose financial sanctions on firms
who do not have adequate anti-bribery and corruption systems as part of their
obligations under its Hand Book. As for criminal prosecutions under the Bribery Act
2010, the three successful prosecutions that have been instigated have not been brought
108
Ibid.
109
Financial Services Authority above, n 107.
110
Financial Conduct Authority ‘Firm fined £1.8 million for ‘unacceptable’ approach to
bribery and corruption risks from overseas payments’, 19 December 2013, available from
http://www.fca.org.uk/news/firm-fined-18million-for-unacceptable-approach-to-bribery-corruption-
risks-from-overseas-payments, accessed 13 August 2014.
111
Ibid.
112
Financial Conduct Authority ‘Besso Limited fined for anti-bribery and corruption
systems failings’, 19 March 2014, available from http://www.fca.org.uk/news/press-releases/
besso-limited-fined-for-antibribery-and-corruption-systems-failings, accessed 13 August 2014.
113
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
by the SFO. Needless to say, the SFO has recently secured the successful conviction for
conspiracy to commit corruption.114
CONCLUSION
The prevention of bribery has recently gained significant political attention by virtue of
the introduction of the Bribery Act 2010. It is accepted that this legislation represented
a significant improvement on the existing offences under the Public Bodies Corrupt
Practices Act 1889, the Prevention of Corruption Act 1906 and the Prevention of
Corruption Act 1916.
Interestingly, the Bribery Act 2010 requires companies to have in place adequate
procedures to prevent people associated with them from being bribed. If a commercial
entity fails to prevent an associated person from committing bribery on their behalf, it
has committed an offence.115 However, provided the commercial entity is able to
demonstrate that it has in place ‘adequate procedures to prevent persons associated with
the commercial entity from undertaking such conduct’ it will avoid prosecution.116 It is
clear that this is an extension of the anti-money laundering system used by the FCA to
incorporate bribery and corruption. Importantly, the Bribery Act 2010 extended the
remit of the SFO to prosecute allegations of bribery, which is also a welcome
development. Even so, the effectiveness of the SFO will depend on it being granted the
appropriate levels of funding by the UK government. However, since the 2010 General
Election, the SFO has had its budget cut as part of a glut of extensive austerity
measures. For example, the annual budget of the SFO in 2008/2009 was £53.2m,
£32.1m in 2013/2014 and £30.8m in 2014/2015.117 The decision to reduce the budget
of the SFO, at a time when instances of financial crime have increased and the duties of
the SFO have been expanded to incorporate the enforcement of the Bribery Act 2010,
must be questioned and criticised.
114
Serious Fraud Office ‘Four sentenced for role in Innospec corruption’, 4 August 2014,
available from http://www.sfo.gov.uk/press-room/latest-press-releases/press-releases-2014/four-
sentenced-for-role-in-innospec-corruption.aspx, accessed 13 August 2014.
115
Bribery Act 2010, s. 7(1).
116
Bribery Act 2010, s. 7(2).
117
Serious Fraud Office, Serious Fraud Office Annual Report and Accounts 2011–2012
(Serious Fraud Office: London, 2012) at 7.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 31 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. INTRODUCTION
International financial crimes has emerged as a popular research topic of late,
undoubtedly due to the increased public demand for accountability and the need to fill
state coffers following the financial crisis of 2007–08. This chapter provides an
overview of how broader research on corruption and its control can inform more
specific studies of international financial crimes, and how overarching strategies to
mitigate corruption are changing due to new theoretical developments in the field.
This chapter surveys selected policy-relevant literature. It focuses on the literature
that has mushroomed since the beginning of the global anti-corruption movement in the
mid-1990s, initially led by the World Bank and later also promoted by other
international organisations such as the United Nations, the OECD, the European
Commission, and so on.
As shown below, no grand theory exists that students of corruption can readily apply
to understand all of its facets. However, most prevailing anti-corruption strategies are
based on a principal–agent view of corrupt transactions, rooted in economic theory. An
analytical approach rooted in economics can understand micro-level corrupt trans-
actions and forms of bureaucratic corruption, but is often blind to issues regarding
political economy, informal institutions and power structures. This chapter proposes
two new perspectives for research and strategy. First, historical institutionalism is a
useful analytical approach to inform anti-corruption strategies, as it recognises that
current choices are shaped by past actions, and the salience of institutions. Second, the
role of implementation is rarely studied systematically, and perhaps therefore not
prioritised in strategies.
1
Mark Philp, “Defining political corruption”, Political Studies 45, no. 3 (1997): 437.
394
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The list above shows that corruption categories are many, diverse, and often not
mutually exclusive. In fact, individual acts of corruption often form part of a broader
system of weak governance. This systemic nature of corruption is important to
2
Max Weber, The Protestant Ethic and the Spirit of Capitalism (London and Boston:
Unwin Hyman, 1930), 1.
3
UNODC, “United Nations Convention against Corruption”, United Nations (2004).
4
Robert Klitgaard, “International cooperation against corruption”, Finance and Develop-
ment: A Quarterly Publication of the International Monetary Fund and the World Bank
35(1998): 4.
5
Jesper Johnsøn, Corruption and Stabilisation: Aid Agencies’ Anti-corruption Strategies in
Fragile States, PhD thesis, University of Cambridge, 2014, 21–2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
3. PAST STRATEGIES
This section analyses the contributions of public choice theory, the literature on
rent-seeking, and the transition from neo-classical to New Institutional Economics
(NIE). These economic approaches to the study of corruption and its control have been
dominating the academic and policy space the past half century.
Public choice theory focuses on rules – and incentive related behaviour. The behaviour
of bureaucrats, politicians and voters is explained via principles for individual
decision-making. Homo economicus, a rationally calculating individual seeking to
maximise their own utility, is the main analytical unit, and is prone to corruption when
it is in that individual’s self-interest.
The scope and extent of corruption in a country is seen to be determined by that
country’s institutional arrangements, as well as the character of its civil servants and
politicians. Bureaucrats, whose job it is to design and execute public policies, can
attempt to use the policy process to maximise their private objectives at the expense of
serving the general public efficiently and equitably. The desire by organised interest
groups to subvert the rules and to extract benefits for themselves can also create
opportunities for corruption.7
Public choice theorists argue that bureaucratic corruption is related to the scope and
extent of government intervention in private market exchange. Effective control of
corruption, then, should be based on a modification of existing rules in order to change
incentive structures and constrain the ability of the state to intervene in private
exchange and create artificial scarcities.8 Importantly, public choice theorists view both
6
The definition of political science as the study of “who gets what, when, how?” can be
traced back to Harold Lasswell’s seminal book Politics: Who Gets What, When, How (Cleveland,
OH: Meridian, 1936).
7
James M. Buchanan, Robert D. Tollison and Gordon Tullock, Toward a Theory of the
Rent-Seeking Society (College Station, TX: Texas A&M University Press, 1980), 1–15.
8
Gordon Tullock, “The backward society: Static inefficiency, rent seeking and the rule of
law”, in The Theory of Public Choice, ed. James M. Buchanan and Robert D. Tollison (Ann
Arbor, MI: University of Michigan Press, 1984), 224–37.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
9
Andrei Shleifer and Robert Vishny, The Grapping Hand: Government Pathologies and
Their Cure (Cambridge, MA: Harvard University Press, 1998).
10
Anne Krueger, “The political economy of the rent-seeking society”, American Economic
Review 64, no. 3 (1974).
11
Pranab Bardhan, “Corruption and development: A review of issues”, Journal of Economic
Literature 35, no. 3 (1997): 1326.
12
J. Edgardo Campos and Vinay Bhargava, “Introduction: Tackling a social pandemic”, in
The Many Faces of Corruption: Tracking Vulnerabilities at the Sector Level, ed. J. Edgardo
Campos and Sanjay Pradhan (Washington, DC: World Bank, 2007), 5.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The early works from Rose-Ackerman and Klitgaard mark a transformation from early
economic thoughts on corruption towards the prevailing current view.13 The work was
in alignment with the public choice and rent-seeking literature, but took a different
analytical approach rooted in micro-level transactions analysis, drawing on rational
choice theory and principal–agent theory. This meant that the primary category of
corruption studied shifted from rents (which incorporated a range of corruption
categories such as bribery, facilitation payments, embezzlement, abuse of power,
conflict of interest) to mainly bribery. This was unfortunate, as bribes often only
constitute a small portion of overall rents collected.
The approach initiated by Rose-Ackerman in 1978, addressing corruption as both an
economic and political problem, became influential. Concepts such as public interest,
the structure of government and political legitimacy became part of the economic
framework of analysis. The focus and methodology remained centred, however, on the
efficiency of economic distribution and costs, and rent-seeking.14 Many political
scientists and adherents to political economy approaches therefore criticised economists
for not properly applying their concepts and tools in the analysis. For example,
although Rose-Ackerman explores themes such as legitimacy, political structure,
culture and history, her final analysis focuses on self-interest, utility maximisation and
rents: “Cultural differences and morality provide nuance and subtlety, but an economic
approach is fundamental to understanding where corrupt incentives are the greatest and
have the biggest impact.”15
Klitgaard also acknowledges the importance of the political economy of a country
for the study of corruption, but the principal–agent model is at the centre of the
analytical framework. Asymmetric information and divergent interests are seen to be at
the heart of the principal–agent problem. The basic ingredients of corruption are
presented in a stylised equation which became exceedingly popular: corruption =
monopoly + discretion – accountability.16 Anti-corruption work in the 1990s and early
2000s relied on these principles of enforcement, oversight and controls, and reduced
discretion. However, they were later found to have generated few results.17 The formula
was not complete.
The field of economics became increasingly influenced by NIE in the 1990s.
Economists studying corruption followed this trend. Interestingly, this new sub-
discipline again sought to converge with political science, similarly to public choice
13
Susan Rose-Ackerman, Corruption: A Study in Political Economy (New York: Academic
Press, 1978); Robert Klitgaard, Controlling Corruption (Berkeley, CA: University of California
Press, 1988).
14
Susan Rose-Ackerman, Corruption and Government: Causes, Consequences and Reform
(Cambridge: Cambridge University Press, 1999). 226.
15
Ibid., xi, 5–6.
16
Klitgaard, Controlling Corruption, x, 69, 71, 75.
17
Jakob Svensson, “Eight questions about corruption”, Journal of Economic Perspectives
19, no. 3 (2005): 34–6.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
4. NEW STRATEGIES
Before the mid-1990s, international organisations cared little about corruption control.
Most academics and experts considered corruption as a necessary part of development,
often as a way of “greasing the wheels” of business and overcoming rigid state
structures. Today, corruption is believed to have corrosive effects on societies, both on
their economies and their governance systems.
Most authors find the lack of “firmly grounded theories of corruption” and the
“shortage of analytically informed empirical inquiries” evident but frustrating.22 The
lack of agreement on the nature and cause of corruption has been attributed to
the diversity of the competing theoretical approaches. Due to the lack of unity in the
theoretical framework “reliance on one single strategy derived from the mode of
analysis employed limits the scope and potential impact of anti-corruption efforts.”23
Below, this section presents two new perspectives that anti-corruption research has
neglected and strategies have lacked. First, a historical institutionalist analytical
18
Robert Coase, “The nature of the firm”, Economica 4, no. 16 (1937). Oliver E.
Williamson, “The economics of organisation: The transaction cost approach”, American Journal
of Sociology 87, no. 3 (1981). Douglass C. North, Institutions, institutional change and
economic performance (Cambridge: Cambridge University Press, 1990).
19
Daniel Kahneman and Amos Tversky, “Prospect theory: An analysis of decision-making
under risk”, Econometrica 47, no. 2 (1979).
20
Anwar Shah, “Overview”, in Performance Accountability and Combating Corruption, ed.
Anwar Shah (Washington, DC: World Bank, 2007), 6.
21
Johann G. Lambsdorff, The Institutional Economics of Corruption and Reform: Theory,
Evidence and Reform (Cambridge: Cambridge University Press, 2007). 214–15.
22
Robert Williams, “Introduction”, in Controlling Corruption, ed. Robert Williams and Alan
Doig (Cheltenham, UK and Northampton, MA: Edward Elgar, 2000), xiii; Diana Schmidt,
“Anti-corruption: What do we know? Research on preventing corruption in the post-communist
world”, Political Studies Review 5, no. 2 (2007).
23
Mark Robinson, Corruption and Development (London and Portland, OR: F. Cass,
1998), 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Past strategies have either based their theoretical foundation on a view of the individual
as fundamentally corruptible, or resorted to tautological explanations based on broad
concepts such as culture. This has led to static explanations of corruption. We need an
explanatory framework that can explain how individuals can become or stay clean, or at
least cleaner. The institutionalist view that individual behaviour is profoundly influ-
enced by the surrounding formal and informal institutions offers that. For example,
Douglas North’s Nobel Prize winning work on the salience of institutions is useful for
the study of corruption. His view that institutions, formal and informal, are the “rules
of the game of a society”, the humanly devised constraints that structure political,
24
Francesca Recanatini, “Anti-corruption authorities: An effective tool to curb corruption?,”
in International Handbook on the Economics of Corruption, ed. Susan Rose-Ackerman and Tina
Søreide (Cheltenham, UK and Northampton, MA: Edward Elgar, 2011); Rema Hanna et al., The
Effectiveness of Anti-corruption Policy: What Has Worked, What Hasn’t, and What We Don’t
Know (London: EPPI-centre, social science research unit, Institute of Education, University of
London, 2011), Technical report; Christian Lessmann and Gunther Markwardt, “One size fits
all? Decentralization, corruption, and the monitoring of bureaucrats”, World Development 38, no.
4 (2010).
25
Alina Mungiu-Pippidi, “Corruption: Diagnosis and treatment”, Journal of Democracy 17,
no. 3 (2006); Anna Persson, Bo Rothstein and Jan Teorell, “Why anticorruption reforms fail –
systemic corruption as a collective action problem”, Governance: An International Journal of
Policy, Administration, and Institutions 26, no. 3 (2013).
26
Tim Davies and Silvana Fumega, “Mixed incentives: Adopting ICT innocations for
transparency, accountability, and anti-corruption”, U4 Issue 2014, no. 4 (2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
economic and social interaction, has also started to influence new strategies on
corruption, such as the World Bank’s 2012 revised Governance and Anti-Corruption
Strategy.27 This institutionalist view of corruption is, however, based on NIE’s
microeconomic orientation. Khan has criticised NIE for not being able to introduce
politics into its analysis. Although NIE overcomes some problems of earlier economic
approaches it still has serious limitations dealing with weak governance environments
and politics. Its microeconomics foundation orients it towards bureaucratic corruption
and the behaviour of individual corruptors.28
A historical institutionalist approach offers an analytical framework that is holistic,
and that can go beyond past analytical optics and credibly study rent-seeking and
patronage effects on public policy and the implementation process. Rent-seeking
behaviour need not be the result of individual greed, as economic analysis would say.
Individual behaviour is not predetermined, but influenced profoundly by surrounding
institutional pressures, both positively and negatively. This also applies to incentives for
corruption.29
The concept of “critical junctures” in historical institutionalism is used to explain the
success or failure of reforms.30 This relates to path dependence.31 Corrupt institutions
and systems of rule, established as a result of certain events taking place during
formative periods of institutional formation, would according to this logic naturally be
sticky and difficult to change. Institutions are subject to path dependency in the sense
that, once an institution has started down a track, the costs of reversal are very high.
Institutional paths are self-reinforcing.
Applying this logic to corrupt institutions, one can expect a self-reinforcing pattern
where institutions induce corrupt behaviour on the part of individuals, which in turn
reinforces the problem of corruption since – as long as most other individuals are
corrupt – it makes no real sense to actively try to change the system. Institutions can be
27
Douglass C. North, The New Institutional Economics and Development, Washington
University in St. Louis working paper (1992), 5; World Bank, Strengthening Governance:
Tackling Corruption – The World Bank Group’s Updated Strategy and Implementation Plan
(Washington, DC: World Bank, 2012), 15–21.
28
Mushtaq Khan, “State failure in weak states: A critique of new institutionalist explan-
ations”, in The New Institutional Economics and Third World Development, ed. John Harris,
Janet Hunter and Colin M. Lewis (London: Routledge, 1995).
29
Ha-Joon Chang, “Breaking the mould: An Institutionalist Political Economy alternative to
the neoliberal theory of the market and the State”, United Nations Research Institute for Social
Development – Social Policy and Development Programme Paper, no. 6 (2001): 17–20.
30
Kathleen Thelen and Sven Steinmo, “Historical institutionalism in comparative politics”,
in Structuring Politics: Historical Institutionalism in Comparative Analysis, ed. Sven Steinmo,
Kathleen Thelen and Frank Longstreth (New York: Cambridge University Press, 1992); Paul
Pierson and Theda Skocpol, “Historical institutionalism in contemporary political science”, in
Political science: State of the discipline, ed. Ira Katznelson and Helen V. Milner (New York:
W.W. Norton, 2002); Peter A. Hall and Rosemary C. R. Taylor, “Political science and the three
‘new institutionalisms’” Political Studies 44, December (1996).
31
James Mahoney, “Path dependence in historical sociology,” Theory and Society 29 (2000);
Paul Pierson, Politics in Time: History, Institutions, and Social Analysis (Princeton, NJ:
Princeton University Press, 2004); North, Institutions, Institutional Change and Economic
Performance.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
seen as inclusive or extractive, which relate to rent-seeking and patronage, and wider
distributional issues in societies.32
4.2 Implementation
Research on corruption and its control has so far neglected the role of implementation
in two key areas. First, there has been little focus on the way in which corruption
distorts public policy design and its implementation. Second, analysis of anti-
corruption strategies have tended to focus on design failure, leaving the option of
implementation failure unexplored.
How does corruption distort public policy design and implementation? Corruption is
widely thought also to negatively affect government performance, but few studies
examine the effects of corruption on the public administration and the wider govern-
ance system of a country. Ferraz and Finan show how corrupt mayors have lower
re-election chances if the public receive information on their misdeeds.33 McMillan and
Zoido document how judges, politicians and the media were bribed to support the
Fujimori regime in Peru.34 These studies document the extent of corruption, or its
effects. They do not explain why corruption occurs, how corrupt politicians or
bureaucrats manage to be successful in grabbing public funds, or what policy makers
and implementers can do to safeguard key political processes from misuse.
In short, scholars and practitioners expect that corruption distorts public policy and
its implementation, but few studies explore the ways in which such distortion takes
place. As a result, two types of corruption are understudied: rent-seeking and
patronage. This leaves important knowledge gaps on how corruption shapes policy
and its implementation. The narrow focus on bureaucratic types of corruption, bribery
and fraud, means that systemic patterns of corruption are rarely explored or explained
with a view to inform future strategies to prevent corruption.
Do strategies to curb corruption fail because of weak designs or poor implementa-
tion? The focus on both strategy and practice in implementation matters as it enables
the study of anti-corruption reforms to distinguish between theory failure and
implementation failure.35 In essence, failure of policy or programmes come from either
“weak implementation, or in the case of smooth implementation, a weak theory
regarding the types of activities and outputs needed in certain circumstances to bring
32
D. Acemoglu and J. Robinson, Why Nations Fail: The Origins of Power, Prosperity, and
Poverty (New York: Crown Publishers, 2012).
33
Claudio Ferraz and Frederico Finan, “Exposing corrupt politicians: The effects of Brazil’s
publicly released audits on electoral outcomes”, Quarterly Journal of Economics 123, no. 2
(2008).
34
J. McMillan and P. Zoido, “How to subvert democracy: Montesinos in Peru”, Journal of
Economic Perspectives 18, no. 4 (2004).
35
The concepts of theory failure and implementation failure originate from the evaluation
literature. Nicoletta Stame, “What doesn’t work? Three failures, many answers”, Evaluation 16,
no. 4 (2010): 372.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
about a desired effect”.36 Implementation failure refers to the inability of the interven-
tions to perform the intended activities. Theory failure occurs when well-implemented
activities do not produce the desired effects. Anti-corruption interventions are often
seen to fail due to flawed strategies. However, an alternative explanation is possible,
that interventions fail not because they are based on flawed reasoning, but because they
are inadequately implemented. In fact, both types of failures can be at play at different
times for different organisations. We should incorporate the possibility of implementa-
tion failure and study strategy–practice disjunctures. Strategy–practice disjunctures
may have two main forms: (a) inconsistencies between strategy propositions and
intervention designs, and (b) consistency between strategy and intervention design, but
inconsistency between intervention design and practice in implementation.37
One reason for strategy–practice disjunctures might be what has been labelled
design–reality gaps, that is, the mismatch between the expectations of the design and
the realities on the ground. However, although some failures can reasonably be
attributed to a mismatch of design to the local contexts, some organisational factors
within agencies may also matter, irrespective of the local context. Typical factors
include: (a) a mismatch between strategic proposition and the resources available for
implementation, (b) bureaucratic competition and/or culture conflicts between units,
(c) disbursement pressures and perverse organisational incentives, and (d) lack of
strong organisational centres, official policies and clear guidance on anti-corruption,
resulting in idiosyncratic decision-making.
Many reported failures of anti-corruption programmes may be more due to
implementation rather than theory failure. If this is true, then policy makers should stop
always trying to find the next generation of anti-corruption tools. As mentioned above,
the anti-corruption policy literature is ripe with apparent panaceas that after years of
enthusiasm ended up disappointing thoroughly. Instead, efforts should go into solving
the implementation challenge. Recent scholarship suggests that approaches should be
problem-driven, iterative and adaptive.38 Many problems around strategy–practice
disjunctures are already addressed in literature on public policy, public administration
and organisational management.39 Those interested in addressing the implementation
challenge should begin by building on this body of knowledge. The transnational nature
of international financial crime gives rise to multiple implementation challenges that go
36
Jos Vaessen and Frans L. Leeuw, “Interventions as theories: closing the gap between
evaluation and the disciplines”, in Mind the Gap: Perspectives on Policy Evaluation and the
Social Sciences, ed. Jos Vaessen and Frans L. Leeuw (New Brunswick: Transaction Publishers,
2010), 146.
37
Johnsøn, Corruption and Stabilisation: Aid Agencies’ Anti-corruption Strategies in Fragile
States.
38
Matt Andrews, The Limits of Institutions Reform in Development: Changing Rules for
Realistic Solutions (Cambridge: Cambridge University Press, 2013), 217.
39
Charles E. Lindblom, “The science of ‘muddling through’”, Public Administration Review
19, no. 2 (1959); Charles E. Lindblom and Edward Woodhouse, The Policymaking Process, 3rd
ed. (Englewood Cliffs, NJ: Prentice Hall, 1993); Michael D. Cohen, James G. March and Johan
P. Olsen, “A garbage can model of organizational choice”, Administrative Science Quarterly 17,
no. 1 (1972); James G. March, The Pursuit of Organizational Intelligence (London: Blackwell,
1999); B. Guy Peters, The Politics of Bureaucracy, 5th ed. (London: Routledge, 2001).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
beyond those faced within national jurisdictions and institutions. Strategies on inter-
national financial crimes need to appreciate these implementation challenges. Research-
ers and experts need to recognise the challenges, but in ex ante appraisals of strategy
design and in ex post assessments of their effectiveness.
5. CONCLUSION
Our strategic responses to corruption depend on our understanding of the phenomena,
and beliefs in what works and why. Ideally, strategies would be based on rich empirical
evidence and strong theoretical frameworks. However, neither our evidence base nor
theoretical understanding allow for that. Instead, the anti-corruption literature is a
plethora of practitioners’ individual experiences and academics’ contesting hypotheses.
Strategies against international financial crimes are needed. Most authors in this
volume would agree that these strategies are emerging, but that we do not yet know
exactly what works and why. To move forward, we need to experiment with different
approaches, credibly document the impact, and exchange knowledge. Iterative and
adaptive processes of learning are not easy of course, but there is no real alternative.
As a minimum, emerging strategies against international financial crimes should
avoid the pitfalls of the early anti-corruption movement. Much energy and resources
were spent on apparent panaceas that ended up disappointing due to misplaced
expectations. The belief that one single institution will solve a complex problem is
naive. Anti-corruption authorities are not omnipotent. Specific institutions against
international financial crimes will be dependent on the existing institutional set up at
the national or international level. Overreliance on one strategic approach is similarly
short-sighted. Past anti-corruption strategies have either merely displaced corruption
(such as decentralisation) or only attacked individual categories of corruption (such as
bribery), thereby failing to address the systemic nature of corruption. Emerging
strategies against international financial crimes should avoid an isolated focus on only
one type of crime, and appreciate the interdependencies and synergies between various
types of corruption.
Future research and strategies would benefit from adopting a historical institutionalist
lens, to understand why it is so difficult to change corrupt behaviour, and why creating
strong institutions to control corruption is paramount. Moreover, the role of
implementation should be more appreciated, both in research and actual practice. To
learn what works and why, a crucial first step is to know whether initiatives fail due to
weak designs or poor implementation. Finally, the costs of international financial
crimes are not just the direct financial costs, but also the indirect costs that occur as a
result of a distortion of public policy and its implementation.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 32 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1
UN (2014 (a)).
2
Bukovansky (2006) at 181.
3
See World Bank (2014) and EU (2014) at 37.
4
Nye (1967) at 419.
405
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Such definitions, however, are problematic for several reasons. First of all, it is not
viable to restrict the understanding and focus of anti-corruption activities to those
involving the public sector, as the World Bank and the EU definitions do. A lot of
corruption which occurs within the private sphere severely impacts the general public
as well, by for example minimising the level of tax revenues collected by the
government or limiting market competition. This would apply to behaviour such as
insider dealing or price collusion. Second, ‘abuse’ is a subjective term. Instead, it would
be more appropriate to consider the issue of transparency.5 It may be more useful for
organisations working on combating corruption to adopt a definition that would stress
the importance of disclosure and transparency (which, for example, in the case of
cabinet officials’ financial support of political parties in many states already makes the
distinction between legal and illegal activities). Accordingly, a more pertinent definition
for organisations working on combating corruption would resemble ‘the unauthorised
and undisclosed use of one’s status and power for private gains’.
It is also worth keeping in mind that the currently predominant forms of measuring
corruption – whether in terms of incidences of scandals, estimates of secret funds or
various corruption indexes, such as the Corruption Perception Index (CPI) compiled by
Transparency International – are all proxies for the real situation. For example, the
number of government corruption scandals will inevitably be lower in non-democratic
countries where the state controls the press; however, bureaucrats in such countries may
also be more prone to corruption as they are aware of the lower likelihood of public
scrutiny for corruption and have relatively low checks of accountability to the
population as a whole.
The CPI, one of the most commonly cited measures of corruption, is based on
‘expert’ opinions, including from foreign business people in the countries. These,
however, are inevitably subjective, possibly biased and, most importantly, incomparable
among different countries where different business people are being interviewed.
Razafindrakoto and Roubaud compare a large sample of households’ and ‘experts’
opinions on the extent and nature of corruption, and demonstrate a mismatch between
the two groups’ estimates of the prevalence and extent of corruption in a given
country.6 The authors noted that experts may be influenced by their ideological
inclinations and extrapolate from anecdotal experiences. Therefore it becomes very
difficult to assess how much corruption has influenced a given country’s economic
development, as it is impossible to accurately verify how pervasive the issue of
corruption is in one country compared to others.
In order to direct anti-corruption efforts to programmes and focus on areas where
they could have the most significant impact, it is useful to identify the various effects of
different types and aspects of corruption.
Numerous general theories about corruption have been proposed in academic
literature, considering the effects of corruption on a state’s economy, institutions,
society, inequalities and conflicts.7 While it is difficult to identify clear causes and
5
This is discussed in detail in Prof Rider’s chapter in this handbook (Chapter 60).
6
Razafindrakoto and Roubaud (2010).
7
See for example Campos et al. (1999), Mauro (1995), Rose-Ackerman (1978), Khan and
Jomo (2000), and Gupta (1995).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
effects of corrupt activities due to the complex nature of the phenomenon, the example
of South Korea’s development experience is interesting to consider in light of the
prevailing corruption levels.
Very few states have been able to catch up with the ‘Global North’ in terms of
development and economic growth. The ‘miracle’ growth of South Korea since the
1960s, when the state was among the poorest countries in the world, is often attributed
to its meritocratic Weberian bureaucracy and sound economic policies. For example,
Evans argues that Korea’s ‘ability to facilitate industrial transformation … has been
fundamentally rooted in coherent, competent bureaucratic organization’.8 South Korea
is being portrayed as owing its impressive economic growth records to technocrats and
austere military generals who emphasised export-oriented industrialisation; and corrup-
tion is not even evoked in many analyses of the Korean growth experience. Some
accounts, however, suggest that corruption was nevertheless rampant during Korea’s
miracle growth era, including at the highest levels – two former presidents of Korea
(Chun Doo-hwan and Roh Tae-woo) were either imprisoned or exiled for corruption
and numerous other politicians, bureaucrats, bankers, businessmen and tax collectors
have been convicted.9 It is interesting to consider the factors that enabled the rapid
development of South Korea despite the prevailing levels of corruption, in order to
establish which aspects are the most harmful to developing economies and direct the
focus of international efforts against corruption on those particular aspects, alongside
general attempts to eradicate corruption.
The proceeds of corruption is an important factor to consider in relation to
determining the effects of corruption on a country’s economic development trajectory,
especially when money used for bribery is siphoned out of developing countries.
Depriving a country of money that could otherwise be reinvested in its economy can
have serious implications on its economic performance. The government of South
Korea had realised the dangers of losing the limited amount of foreign exchange
available in the country during its industrialisation, and therefore had strict capital
controls in place (just as Germany and Sweden had during their rapid development in
the 20th century), including restricting possibilities for foreigners to purchase South
Korean companies, as well as severe penalties for taking money out of the country.
South Korea introduced penalties of a minimum sentence of ten years in prison
and a maximum sentence of death for violations of prohibitions on overseas capital
transfers.10
Of course, other factors also played a critical role in ensuring South Korea’s rapid
economic growth at the time. These included general acceptance of severely limited
personal consumption levels and low labour remuneration, as well as the political will
to enforce the aforementioned policies where required.11 This was in the context of the
unstable South Korean peace with North Korea which has been argued to have instilled
a perception of the need to develop economically in order to be able to counter possible
8
Evans (1995) at 51.
9
Kang (2002) at 177.
10
Grabel (1996) at 1772.
11
Crotty and Epstein (1996) at 144.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
threats from North Korea.12 Favourable external circumstances such as access to the US
market and financial assistance without conditionalities attached,13 as well as the nature
of the unsaturated international manufacturing market at the time of South Korea’s
industrialisation,14 also played a role in the successful development of the country.
Others have suggested that it may not be the presence, but rather the extent of
corruption that should be considered. Kang argues that the reason why corruption was
not detrimental to economic growth in Korea was because the political strength of state
agents and businesses was balanced, which meant that the business sector kept state
corruption from spinning out of control and vice versa.15 Khan suggests that as the
Korean state was resistant to societal and interest group demands, state officials and
bureaucrats had incentives to maximise payments over the long term rather than the
short term,16 which resulted in a non-detrimental ‘efficient kleptocracy’ over a long
period of time rather than ‘lump sum’ corruption, which would have damaged the
Korean economy more.
It is clearly difficult to accurately quantify and prove the effect of corruption on
states’ development. This difficulty is exacerbated by the fact that the definition of
‘development’ itself has been over time evolving and can be understood in differing
senses – from the economic aspects, namely states’ GDP growth, to measures of
people’s physical well-being, socio-political rights, capabilities, inequalities and/or
happiness.17 As demonstrated by the example of Korea, corruption on its own does not
necessarily inhibit economic growth. However, it is very likely to reduce economic
growth, as its potential implications on social relations, namely certain groups being
advantaged over others, can result in acute inequalities, social tensions and grievances,
which in turn have the potential to escalate into larger-scale conflicts.
Anti-corruption projects have therefore been gaining prominence in Western govern-
ments’ international development and international affairs considerations. Michael
groups the anti-corruption project types undertaken into four main categories: univer-
salistic, state-centric, society-centric and critical approaches to corruption.18 Michael
argues that universalistic approaches regard corruption as ‘a universal phenomenon
occurring in organisations which run according to well-defined social laws’.19 The
state-centric approaches allow more scope for the influence of individual personalities
and power struggles, therefore considering political and sociological causes of corrup-
tion. Society-centric approaches tend to consider corruption as socially constructed,
therefore emphasising the role and influence of social and cultural institutions. The
critical approach views anti-corruption efforts as futile, as having unintended conse-
quences, or even as counter-productive in combating corruption.
12
Harvie and Lee (2003) at 286.
13
See for example Painter (1999).
14
See Cline (1982) at 89.
15
Kang (2002)
16
Khan (1996)
17
This chapter considers corruption primarily in relation to states’ economies; however,
other aspects of development should be kept in mind, not least as they are often closely
intertwined, especially in relation to countries’ long-term trajectories.
18
Michael (2004) at 1068.
19
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
20
See for example Klitgaard’s (1998) proposed anti-corruption ‘toolkits’.
21
The Convention focuses on prevention, criminalisation, international cooperation and asset
recovery, which will subsequently be discussed in further detail.
22
UN Charter available at http://www.un.org/en/documents/charter/index.shtml.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
23
Hill (2010) at 1162; also see Hafner-Burton and Tsutsui (2005).
24
Huggins (1998).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
mutually understandable vocabulary book and suggest possible solutions which follow
from a study of its principles.’25
It is important to attempt to establish to what extent the ‘common language’ is
merely window dressing and masking the reality of the effects of these international
laws. Some empirical studies dispute the effectiveness of the normative aspects of
international law. Although empirical studies on the effect of international treaties on
states’ practices have been suggesting varying and often incompatible results,26
interesting theoretical analyses have been put forward. For example, Vreeland observes
that the effect that the ratification of the United Nations Convention against Torture
(UNCAT) has very much depends on the domestic politics of the state in question.27
Namely, Vreeland, citing cases from Nigeria, Gabon and Ivory Coast, observed that
multi-party dictatorships (i.e. dictatorial regimes where political power is shared or to
some extent contested) are more likely to sign and ratify the Convention than one-party
dictatorships. However, at the same time, the former are also more prone to violating
their obligations under the Convention. The author explained his observations by
suggesting that multi-party dictatorships are under more pressure from domestic actors
to engage in international human rights treaties, and the government sees it as a
low-cost mechanism to improve its image and legitimacy domestically and abroad;
whereas one-party dictatorships are rather unwilling to cave into similar demands from
their citizens and national groups, fearing to set a precedent or send the message that
political dissent will be tolerated. Therefore, ratification of the UNCAT, according to
Vreeland, has little or no intended effect on state practices.
Hill suggests interesting variations in the effects that different international treaties
and regimes have on state practices.28 In particular, that the UNCAT and the
International Covenant on Civil and Political Rights (ICCPR) leads to reduced respect
for physical integrity rights, while ratification of the Convention on the Elimination of
All Forms of Discrimination against Women (CEDAW) has a positive impact on
women’s rights situations. Hill argues that the reason for the differences in the effects
may lie in the fact that women, as a subset of the population, do not generally pose a
threat to the government’s position in power, whereas political dissidents for whom the
UNCAT and the ICCPR are more relevant, may pose a threat to the stability of a
non-democratic government.29
Taking robust action towards ensuring compliance with the UNCAC can fall into
both of these categories – it can be seen as posing a threat to the government in more
severe cases of non-democratic states with high levels of corruption within the
government, and also as a tool to strengthen the position of a ruling party within a
country. For example, China has become very active in anti-corruption activities, not
only internationally, by for example playing a key role with the International Associ-
ation of Anti-Corruption Authorities (IAACA), but also domestically. In particular,
since Xi Jinping took office as the General Secretary of the Chinese Communist Party
25
Shaw (2013) at 7.
26
See for example Hill (2010).
27
Vreeland (2008).
28
Hill (2010).
29
Hill (2010) at 1172.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
in 2012, corruption cases have been brought against a significant number of both
local-level and senior party officials. However, due to the reporting structures of the
anti-corruption agencies, these could potentially be targeted against political opponents
thereby reducing the levels of contestation of political power in the country (please see
Chapter 34 of this handbook for a more in-depth analysis of corruption in China).
Nevertheless, there is scope for the government’s stricter approach to corruption to
result in a society that is increasingly less tolerant of corruption.
Shaw suggests that ‘just as incidents of murder, robbery and rape do occur within
national legal orders without destroying the system as such, so analogously assaults
upon international legal rules point up the weaknesses of the system without denigrat-
ing their validity or their necessity’.30 Shaw argues that the rare exceptions of states
violating international law are the ones that receive the most publicity, hence the
general public perception of international law being violated more often than it actually
is. Although, as stressed by the analysis of this chapter, enforcement structures, and, in
particular, individual states’ capacities and willingness to prioritise the issues of
corruption and commit resources, are crucial for international laws to yield the desired
results.
[s]pecialised organisations, institutions and frameworks for the prevention of and combat
against corruption, bribery, money-laundering and other aspects of organised crime, with or
without law enforcement powers, e.g. anti-corruption commissions and monitoring bodies,
special investigation services, institutions and initiatives of integrity and ethics oversight,
specialised NGOs, other civil society and citizens’ organisations directly concerned with
corruption.32
30
Shaw (2013) at 6.
31
For more information see http://www.u4.no/info/about-u4/.
32
OECD (2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
80
70
60
50
40 Budgeted
30 Spent
20 Forecast budget
10
0
Source: ICAI report on DFID’s approach to anti-corruption and its impact on the poor.
33
ICAI (2014) at 1.
34
Ibid. at 10.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
that it has on development prospects.35 Accordingly, the DFID country strategies are
split into two parts: protecting UK funds and supporting efforts to reduce corruption in
the countries.36
The case of Uganda is interesting to analyse in more detail in order to illustrate the
potential leakages within international development programmes. Transparency Inter-
national has classified Uganda as ‘highly corrupt’ every year since 1996. Transparency
International’s Global Corruption Barometer 2010 ranks Ugandan law enforcement
institutions such as the Uganda Police Force and the Judiciary among the top three
corrupt institutions in Uganda; the Barometer also noted that 67 per cent of their
respondents believe that the level of corruption in Uganda has increased in the last
three years.37 There seems to be a significant number of laws and strategies adopted by
the various institutional bodies, such as the Anti-Corruption Act of 2009, the Whistle-
blowers Protection Act of 2010, The Public Finance and Accountability Act of 2003,
the Public Procurement and Disposal of Public Acts of 2003 and five-year National
Anti-Corruption Strategies. Their implementation, however, appears to be more prob-
lematic given the results from the aforementioned surveys. DFID had planned to spend
a budget of £283 million over a three-year period from 2012 to 2015 in Uganda. In
2012, however, several major international donors, including the UK, Sweden, Norway,
Ireland and Denmark, had suspended financial aid to Uganda due to corruption charges
brought against the Office of the Prime Minister; and millions of dollars of donor
funding were found to have been embezzled.38
Direct budget support, as illustrated by the example of Uganda, is susceptible to
corruption within aid programmes. Accordingly, development agencies such as DFID
have been favouring technical assistance and capacity building programmes or working
with civil society organisations and other stakeholder groups, especially in countries
where the fiduciary risk of misdirection of funds is deemed as high.39 However, strictly
focusing on technical assistance can have limited results if other issues are not
addressed. For example, training sessions to inform officials of the detrimental effects
of corruption are unlikely to yield desired results if government officials’ salaries are
insufficient to meet their needs without the additional income from engagement in
corrupt activities. An appropriate balance needs to be struck between direct budget
support and technical assistance, most importantly, focusing efforts where they are
likely to have the most significant impact, given the limited resources that international
development organisations have at their disposal.
It is interesting to note that DFID is at times being encouraged to expand its portfolio
of projects tackling corruption. The Independent Commission on Aid Impact (ICAI)
recently reviewed DFID’s efforts to ‘reduce corruption as experienced by the poor’,
concluding that DFID has not ‘developed an approach equal to the challenge [of
35
See for example DFID’s anti-corruption strategies for Zambia (DFID 2013 (a)) and
Uganda (DFID 2013 (b)).
36
This chapter will focus on the latter.
37
Transparency International (2011) and (2014).
38
DFID (2012).
39
Another example of a country approached in such a manner is Nigeria, as discussed in the
ICAI report on DFID’s approach to anti-corruption and its impact on the poor 2014, ICAI
(2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
corruption], nor has it focused its efforts on the poor. While some programmes show
limited achievements, there is little evidence of impact on corruption levels or in
meeting the needs of the poor.’40 This report was picked up by the popular media,
inspiring headlines such as ‘Confirmed: Our foreign aid fuels corruption’.41 The
response from academics and practitioners, however, was a lot more nuanced, criticis-
ing the report’s methodology and its approach to corruption.42 In particular, the
potential of an external agency such as DFID, with finite resources and its own
accountability systems, to influence a culture and habitual practices in a different
environment is arguably rather limited. DFID does not, as pointed out by the report,
focus on corruption as experienced by the poor, but rather corruption in higher-level
government institutions as well as technical assistance to increase the risks and reduce
the potential rewards for individuals engaging in corrupt activities. The report illustrates
the well-wishing ambition of some stakeholders in international development to address
a multitude of issues at once and deliver results promptly, which in turn may lead to
spreading the finite resources available too thinly and severely reducing their impact.
It is noteworthy that the leakages within aid programmes do not compare to the
funds that developing countries lose out on due to tax evasion, money laundering and
embezzlement. The UN Secretary General Ban Ki-moon has stressed that corruption
deprives developing countries of more than a trillion US dollars every year through
money laundering, illegal tax evasion and embezzlement.43 A report on stolen assets
produced by ONE estimates that $3.2 trillion of assets held offshore originate in
developing countries; and if these assets were declared, they could yield yearly
revenues of $19.5 billion in taxation.44
International efforts to facilitate the recovery of stolen assets are therefore crucial in
the fight against corruption. Initiatives such as the Stolen Asset Recovery Initiative
(StAR), established by the World Bank, and the United Nations Office on Drugs and
Crime (UNODC) have contributed significantly to a joint international effort to ‘end
safe havens for corrupt funds … and to facilitate more systematic and timely return of
stolen assets’.45 As such, the StAR initiative influences policy in the sphere of the
global fight against corruption, in addition to providing capacity building, case
assistance and facilitating the collaboration of experts from different jurisdictions.
Recovery of stolen assets is not only a powerful deterrent for corrupt activities, but also
provides developing countries with more capital while reducing their dependencies on
foreign states. Acknowledging this, DFID has also supported the International Centre
for Asset Recovery at the Basel Institute for Governance, which provides strategic case
advice, technical assistance, capacity building and informs global policy discussions on
setting standards in asset recovery.46
40
Ibid. at 1.
41
Martin (2014).
42
See for example Marquette et al. (2014).
43
UN (2014 (b)).
44
ONE (2014).
45
StAR (2014).
46
For more information, see Basel Institute on Governance (2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
4. CONCLUSIONS
This chapter has raised several issues relating to tackling corruption using means of
international law and ODA. One needs to be realistic about what can and cannot be
achieved using the differing methods of tackling corruption, and corruption in
developing states in particular. While international law can facilitate an exchange of
ideas and the diffusion of norms and values among different states, practical outcomes
will ultimately depend upon the will and capabilities of individual states to apply and
enforce these norms within the country, its institutions and operating procedures.
47
This is in addition to the preventative measures.
48
Gray et al. (2014) at 56.
49
Ibid. and Mason (2013) at 203.
50
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/331591/annual-
report-accounts-2013-14a.pdf, at 10. This is not the entire extent of DFID’s investment in asset
recovery, some of which comes under wider programmes, particularly relating to anti-corruption.
These, however, are on the same scale as DFID’s investment in POCU and OACU.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
REFERENCES
Basel Institute on Governance, 2014. Asset Recovery/ICAR, accessed on 12/12/2014 at https://www.basel
governance.org/icar.
Bukovansky, M., 2006. ‘The hollowness of anti-corruption discourse’, Review of International Political
Economy 13, 181–209.
Campos, J.E., Lien, D. and Pradhan, S., 1999. ‘The impact of corruption on investment: predictability
matters’, World Development 27, 1059–1067.
Cline, W.R., 1982. ‘Can the East Asian model of development be generalized?’ World Development 10,
81–90.
Crotty, J. and Epstein, G., 1996. ‘In defence of capital controls’, Socialist Register 32.
DFID, 2012. ‘News story: Uganda: UK suspends aid to government’, accessed on 12/12/2014 at
https://www.gov.uk/government/news/uganda-uk-suspends-aid-to-government.
DFID, 2013 (a). DFID’s Anti-Corruption Strategy for Zambia, January 2013, accessed on 12/12/2014
at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/213932/anti-corruption-
strategy-zm.pdf.
DFID, 2013 (b). DFID’s Anti-Corruption Strategy for Uganda, January 2013, accessed on 12/12/2014
at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/213930/anti-corruption-
strategy-ug.pdf.
EU, 2014. Report from the Commission to the Council and the European Parliament, EU Anti-Corruption
Report, accessed on 08/03/2015 at http://ec.europa.eu/dgs/home-affairs/e-library/documents/policies/
organized-crime-and-human-trafficking/corruption/docs/acr_2014_en.pdf.
Evans, P.B. 1995, Embedded Autonomy: States and Industrial Transformation, Princeton University Press,
Princeton, New Jersey.
Grabel, I., 1996. ‘Marketing the third world: the contradictions of portfolio investment in the global
economy’, World Development 24, 1761–1776.
Gray, L., Hansen, K., Recica-Kirkbride, P. and Mills, L., 2014. ‘Few and far: the hard facts on stolen asset
recovery’, Stolen Asset Recovery Initiative, The International Bank for Reconstruction and Development/
The World Bank and the OECD, accessed on 12/12/2014 at http://issuu.com/world.bank.publications/
docs/9781464802744/1?e=1107022/9355890.
Gupta, A. 1995. ‘Blurred boundaries: the discourse of corruption, the culture of politics, and the imagined
state’, American Ethnologist 22(2), 375–402.
Hafner-Burton, E.M. and Tsutsui, K., 2005. ‘Human rights in a globalizing world: the paradox of empty
promises’, American Journal of Sociology 110, 1373–1411.
Harvie, C. and Lee, H.-H., 2003. ‘Export-led industrialisation and growth: Korea’s economic miracle,
1962–1989’, Australian Economic History Review 43, 256–286.
Hill, D.W., 2010. ‘Estimating the effects of human rights treaties on state behavior’, Journal of Politics 72,
1161–1174.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 33edited /Pg. Position: 14 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
1
Transparency International (2011), “Corruption in the UK: Overview and Policy Recom-
mendations”, p. 1.
2
See Ting Gong (1994), The Politics of Corruption in Contemporary China: an Analysis of
Policy Outcomes, Praeger Publishers, p. 15.
3
Ibid.
4
See Barry Rider (2013), “When Chinese Whispers Become Shouts! Editorial”, Journal of
Financial Crime, 20(2).
5
See Yanan Wang (1987), Zhongguo Guanliao Zhengzhi Yanjiu (A Study of Chinese
Bureaucratic Politics), Beijing: Chinese Social Sciences Press, p. 117.
419
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
6
According to the record of “Classical Annals of Lu, Zuozhuan 14 years of Zhao Duke”
(“Zuo-Zhuan Zhao-Gong 14 Nian”); and the “Book of Documents of Xia Dynasty” (“Xia-Shu”).
7
“Book of Documents of Xia Dynasty” (“Xia-Shu”)
8
From 1600 to 1814, the tael was equal to one and half or two dollars in current terms. In
the late Qing Dynasty, the value of the tael gradually dropped to half and then one-third of its
original value.
9
See Tianquan Cheng (1983), “Zhongguo Gudai Jingji Fanzui de Sifa Zhunze” (“The
Judicial Principles for Economic Crimes in Ancient China”), Politics and Law 3, pp. 121–131.
10
Details can be found in Ting Gong (1994), The Politics of Corruption in Contemporary
China: an Analysis of Policy Outcomes, Praeger Publishers, pp. 41–46.
11
Ibid.
12
See Bing Lu, Yuxin Shi, and Yongzhao Wu (1990), Zhongguo Fanfubai Diyi Daan (The
Most Serious Case of Corruption of the New China), Beijing: China Law Press.
13
According to “News of the Communist Party of China, Corruption Case of Liu Qingshan
and Zhang Zishan”, Liu Qingshan embezzled 184 million yuan (old currency) and Zhang Zishan
embezzled 194 million yuan (old currency), exchange rate: 10,000 old Chinese yuan equals to
one new Chinese yuan.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
hand, has stimulated China’s economic growth. On the other hand, the economic
reform has involuntarily contributed to the exploding of corruption. The central planned
economy system allows public officials to make illicit gains from selling goods and
materials from state enterprises to the market due to the price margin.
Official corruption has become more pervasive than before, both quantitatively (in
terms of the amount of money involved and the number of cases investigated and
prosecuted) and qualitatively (in terms of the types of corruption and the actors
involved).14 In response to deteriorating corruption, Deng Xiaoping pointed out, “to
curb corruption, we must enhance the construction of socialist democracy and our legal
system”.15 Therefore, the “Decisions on Severe Punishment of Serious Economic
Crimes”16 was passed in 1982, in which the penalties for accepting bribes were
extended to life imprisonment and the death penalty. Since then, a number of laws and
regulations in relation to combating corruption have been promulgated.
China has a systematic anti-corruption structure led by the Communist Party Central
Committee for Discipline Inspection (CCDI). It consists of a variety of state agencies at
all administrative levels, ranging from a district level to the central level. The main
bodies against corruption within the government are the Committees for Discipline
Inspection (CDIs). The members of CDIs are elected by the party congresses at the
corresponding levels. The CDIs have overall responsibility for combating corruption
and ensuring integrity among the party cadres by providing education, overseeing the
exercise of power, and examining cases in violation of party discipline. The key
anti-corruption agencies include the People’s Procuratorate, the Ministry of Supervision
(MOS) and the Audit Office.
The corruption investigatory agency is the People’s Procuratorate, which is legalised
by the Constitution to conduct investigations, approve for arrest, and prosecute
corruption cases.17 Article 18 of the Chinese Criminal Procedure Law specifies that the
People’s Procuratorate is responsible for combating
14
See T. Wing Lo (1993), Corruption and Politics in Hong Kong and China, Buckingham,
UK: Open University Press, pp. 46–48.
15
Deng Xiaoping (1979), Selected Works of Deng Xiaoping, Volume 2, Beiing: People’s
Publishing House, p. 189.
16
Passed at the Twenty-Second Plenary Session of the Standing Committee, Fifth National
People’s Congress, on 3 March 1982.
17
Reports of the Course, Group 1: The Relationship of the Prosecution with the Police and
Investigative Responsibility, available at: http://www.unafei.or.jp/english/pdf/RS_No53/No53_
29RC_Group1.pdf.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
detention, extortion of confessions by torture, retaliation, frame-up and illegal search and
crimes involving infringement of a citizen’s democratic rights – committed by State
functionaries by taking advantage of their functions and powers.18
The investigatory force within the People’s Procuratorate was originally called the
Economic Crimes Procuratorial Department, and lately named as the Anti-Corruption
Bureau. The main function of the Anti-Corruption Bureau includes handling cases of
misappropriating public funds, acceptance of or offering bribes, dereliction of duty, and
embezzlement.19
The MOS, a subordinate organ to the State Council, is an assigned agency for
administrative supervision and inspection of the implementation of government
decrees, of administrative discipline, of administrative efficiency, and of law awareness
of public servants in performing public duties.20 In 2007, the National Bureau of
Corruption Prevention of China (NBCP) was created within the MOS in response to the
United Nations Convention against Corruption. The NBCP has no power to investigate
individual cases, but works to analyse the underlying reasons of corruption, to develop
preventative measures, and to guide the anti-corruption campaign in the public and
private sectors.21 The National Audit Office (NAO) inspects accounts of state-owned
enterprises and government entities, and publishes reports, including the annual
expenditures of different government agencies.22
Chinese anti-corruption agencies are required to exercise their power in line with law
and independently without being subject to interference by administrative organs,
public organisations, or individuals. However, the bureaucratic structure makes such
legal requirements less effective. The CDIs are subject to a dual leadership of the
Communist Party Committees at its corresponding level and its superior at a higher
level. Similarly, law enforcement agencies such as the People’s Procuratorate are also
subject to a leadership of a higher level superior and a local Political and Legal
Committee. In addition, law enforcement agencies’ finances are horizontally funded by
their corresponding level of the government. The effectiveness of anti-corruption
campaigns is therefore undermined by the multi-leaderships and their conflicting
interests.
Indeed, the effectiveness of Chinese anti-corruption effort is determined by the
Communist Party itself, in particular its top politician’s attitude and response. Retro-
spectively, every Communist Party leader in history acknowledged the detrimental
effects of corruption on the legitimacy of the leadership of the Communist Party and
initiated actions to combat corruption. However, the outcomes of various anti-
corruption campaigns have been inconsistent. In the past the majority of convicted
corrupt officials were at the bottom tier of the bureaucratic structure or disloyal
members. However, the situation has begun to change since Xi Jinping took power
during the Chinese top leadership transition in 2012. In contrast to his predecessors, Xi,
18
Article 18, Criminal Procedure Law of the People’s Republic of China.
19
China’s Efforts to Combat Corruption and Build a Clean Government, available at:
http://wenku.baidu.com/view/21993b4a767f5acfa1c7cd96.
20
The Ministry of Supervision, http://www.ccdi.gov.cn./
21
Ibid.
22
National Audit Office, http://www.cnao.gov.cn/main/index.htm.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Anti-corruption Regulations
China has a vast number of anti-corruption regulations and laws created to criminalise,
report, or punish corruption.
Article 41 of the Constitution regulates protecting whistleblowers of corruption. The
Constitution states:
Citizens have the right to make to relevant state organs complaints and charges against, or
exposures of, violation of the law or dereliction of duty by any state organ or functionary …
In case of complaints, charges or exposures made by citizens, the state organ concerned must
deal with them in a responsible manner after ascertaining the facts. No one may suppress
such complaints, charges and exposures, or retaliate against the citizens making them.
Citizens who have suffered losses through infringement of their civil rights by any state organ
or functionary have the right to compensation in accordance with the law.24
23
Kevin Yao and Ben Blanchard (08.07.2014), “Fearing Graft Probes, Chinese Officials
Shun Spotlight, Seek Retirement”, available at: http://www.reuters.com/article/2014/07/08/us-
china-corruption-idUSKBN0FD2GV20140708.
24
Article 41, Constitution of the People’s Republic of China.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
25
Article 254, Criminal Law of the People’s Republic of China.
26
Article 84, Article 85, Criminal Procedure Law of the People’s Republic of China.
27
Criminal Procedure Law of the People’s Republic of China.
28
Ibid.
29
Administrative License Law of the People’s Republic of China, available at: http://www.
lawinfochina.com/display.aspx?lib=law&id=3076&CGid=.
30
Civil Servant Law of the People’s Republic of China, available at: http://www.
lawinfochina.com/display.aspx?lib=law&id=4123&CGid=.
31
The Government Procurement Law of the People’s Republic of China, available at:
http://english.gov.cn/laws/2005-10/08/content_75023.htm.
32
The Information Office of the State Council (2011), China’s Efforts to Combat Corruption
and Build a Clean Government, available at: http://www.gov.cn/english/official/2010-12/29/
content_1775353.htm.
33
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Punishment
China has enacted substantive criminal and administrative laws and regulations that
punish violations of law and party rules. Chinese Criminal Law stipulates that anyone
who embezzles more than 100,000 Yuan (£9,400) will receive a determinate or life
sentence and even the death penalty should the offence be deemed serious enough.
Corrupt officials’ personal assets can be confiscated. If the proceeds of corruption are
between 50,000 Yuan (£4,700) and 100,000 Yuan (£9,400) the embezzler will receive
five years’ custodial sentence or more, even a life sentence. Corrupt officials’ assets
may be confiscated. Corrupt officials whose criminal proceeds are between 5,000 Yuan
(£470) and 50,000 Yuan (£4,700) will receive between one and ten years’ custody. If
officials’ corrupt proceeds are between 5,000 Yuan (£470) and 10,000 Yuan (£940) they
may receive a reduction in their sentence or be exempted from criminal penalty if they
demonstrate their remorse and actively refund criminal proceeds. Or they may receive
an administrative penalty imposed by their office or higher level office. Should criminal
proceeds be no more than 5,000 Yuan (£470), corrupt officials may receive up to two
years’ custody or detention, or be penalised with administrative sanctions by their own
or higher level office.37
The beginning of economic reform has seen a surge of economic crimes. Top
Communist Party officials urged that “when there is a choice to kill or not to kill,
choose to kill”.38 Mr Hu Jintao, former party leader, states: “Any crime which the law
regards as serious should certainly receive serious penalties, and any crime which is
punishable by the death penalty according to the law, should certainly receive the death
34
Ibid.
35
Ibid.
36
Ibid.
37
Criminal Law of the People’s Republic of China.
38
The Economist (03.08.2013) “The Death Penalty, Strike Less Hard: Most of the World’s
Sharp Decline in Executions Can Be Credited to China”, available at: http://www.
economist.com/news/china/21582557-most-worlds-sharp-decline-executions-can-be-credited-
china-strike-less-hard.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
39
Amnesty International (1997) “People’s Republic of China – the Death Penalty in China:
Breaking Records, Breaking Rules Strike Hard – Yanda”, available at: http://www.refworld.org/
pdfid/45b84b772.pdf.
40
Ibid.
41
Benjamin Haas and AibingGuo (2013) “China Widen Anti-Graft Drive as Petrochina
Ousts Managers”, Bloomberg.com, available at: http://www.bloomberg.com/news/2013-08-28/
china-widens-anti-graft-drive-as-petrochina-ousts-managers-4-.html
42
The Information Office of the State Council (2011), China’s Efforts to Combat Corruption
and Build a Clean Government, available at: http://www.gov.cn/english/official/2010-12/29/
content_1775353.htm.
43
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
antiques, and other highly valuable goods have replaced their previous counterparts.
More public officials have been exposed to scrutiny for their profit driven crimes. In
2007, the Procuratorate reported that recovered funds averaged more than £27,300.44
Between 2005 and 2009, over 69,200 cases of commercial bribery were investigated,
involving £1.659 billion of illicit funds in total.45 In 2013, more than 182,000 party
officials were penalised for corruption.46 Zhang Shuguang, former deputy chief
engineer of the Ministry of Railway, is reported to have stashed £1.8 billion in overseas
bank accounts.47
Corruption in China is a process of officials accumulating capital and resource
reallocation. Two types of corruption are commonly seen in contemporary China. The
first is corrupt officials proactively making direct contacts to seek bribes. They are
involved in project designing, product pricing and marketing, business operating,
evaluating, and proceeds hiding or laundering. The products they choose are various.
For example, some sell posts for cash, take bribes directly from their clients to bend
rules, extort through misusing of political power or influence, profiteer from public
resources, and carry out malpractice in public procurement. Luo Yingguo, party chief of
Maoming City, was selling government posts with specific price tags: £18,800 for a
technology post; £188,000 for a department-level post; £940,000 for a Deputy Mayor
post. Luo is reported to have received bribes of approximately £6.58 million.48
The second type of corruption relates to officials that do not directly contact their
clients, but rely on family members, relatives, or friends as middlemen to seek
payments. Corrupt officials and middlemen form a joint venture and share criminal
proceeds, although corrupt officials may not receive the majority of bribes in their
criminality. This type of corruption often takes place with higher level officials, who,
because of their higher bureaucratic positions, avoid the risks of seeking bribes directly.
Their high level of counter-investigation skills also minimises their risk, making it
difficult to track them down easily. Often money laundering is committed to disguise
the true ownership of the proceeds, given the proceeds involved are usually large. These
corrupt officials allow middlemen to create opportunities to seek illicit gains. The
former Minister of Railways Liu Zhijun built more than 7,000 kilometres of high-speed
rail with a total investment of £300 billion between 2007 and 2010. Twenty-three large
state-owned enterprises, through a middleman Ding Shumiao, who obtained more than
50
44
Ibid.
45
“China’s Efforts to Combat Corruption and Build a Clean Government: Information
Office of the State Council of the People’s Republic of China, December 2010, Beijing”,
(20.01.2011), Beijing Review.com.cn, available at: http://www.bjreview.com.cn/document/txt/
2011-01/17/content_325640_4.htm.
46
“Corruption: Less Party Time: The Communist Party’s Anti-Graft Campaign has had a
Surprising Impact, but a New Report Shows How Far There Is to Go”, (25.01.2014), The
Economist, available at: http://www.economist.com/news/china/21595029-communist-partys-
anti-graft-campaign-has-had-surprising-impact-new-report-shows-how.
47
He Huifeng (04.09.2013) “Zhang Shuguang, Former Top Rail Engineer, to Face Trial for
Graft”, South China Morning Post, available at: http://www.scmp.com/news/china/article/
1302838/zhang-shuguang-former-top-rail-engineer-face-trial-graft.
48
Fiona Tam (17.05.2012), “Ex-official Admits He Sold Top Jobs”, South China Morning
Post, available at: http://www.scmp.com/article/1001149/ex-official-admits-he-sold-top-jobs.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
projects from Liu. Ding made £200 million in profits, of which £4.9 million was paid
to Liu.49 It is common knowledge that family members of senior party officials
dominate the key industries in China. For example, former party chairman Jiang
Zemin’s son Jiang Mianheng is in charge of China Netcom Telecommunications
Limited, Shanghai Automobile Industry, Shanghai Information Network, and Shanghai
Airport Corporation.50 There are assumptions that grand corruption has been committed
in the process of privatisation.
Detected cases suggest that the above two methods of corruption are not clearly
disconnected. However, the methods of corruption are dynamic, and the criminals
constantly change their corruption methods in order to reduce the risk of being
exposed, and to maximise their proceeds.
49
Larry Lang (29.05.2014), “The 3 Types of Corruption That Plague China”, The Epoch
Times, available at: http://www.theepochtimes.com/n3/703805-the-three-types-of-corruption-
that-plague-china/
50
Feng Lin (01.07.2012) “How Jiang Zemin and Son Profited from Corruption”, The Epoch
Times, available at: http://www.theepochtimes.com/n2/china-news/how-jiang-zemin-and-son-
profited-from-corruption-258872.html.
51
English version of the full text of President Xi Jinping’s speech is available at:
http://www.bbc.co.uk/news/world-asia-china-20338586. The speech was given on 15 November
2012.
52
Jamil Anderlini (22.09.2013) “China Court Sentences Former Party Chief Bo Xilai to Life
in Jail”, Financial Times, available at: http://www.ft.com/cms/s/0/b5ff4d14-2340-11e3-ac3a-
00144feab7de.html?siteedition=uk#axzz37jmdiWKd.
53
Full text of the eight-point code can be accessed at: http://news.china.com/focus/fdpzlf/
11135258/20130123/17649773.html (in Chinese).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
cadres were punished due to violation of the eight-point code.54 It was because of this
newly issued principle against waste of public funds55 that certain types of industries in
China have started to struggle to survive. For example, the demand for expensive wines
for high-end restaurants has dramatically dropped, and some of these luxury restaurants
have even closed down. Business owners have told journalists that they have lost so
many customers from the public sector because of this anti-corruption campaign.56
The CCDI is a powerful weapon in the Communist Party and has been established to
exclusively deal with party cadres who are under corruption and malfeasance charges.
Party discipline and rules appear to have greater deterrent effects on party members,
given the secret internal disciplinary conduct of Shuanggui (at an appointed time and
place to confess their violation of party discipline) beyond legal process. Officials
subject to Shuanggui are not allowed to have legal counsel and contact with family for
a prolonged period of time. Indeed, this gives party discipline mighty power, beyond
public laws, in arresting, detaining and investigating party members.
The CCDI has also proactively intensified the inspection of key sectors and
industries throughout the country, under the direct leadership of the general secretary of
the CCDI Wang Qishan, aiming exclusively at thoroughly discovering and collecting
information, from both inside the party and the public, that relates to party officials’
misbehaviour.57 The area that the central inspection group looks into covers a range of
state organs at provincial and city level, government departments, state-owned enter-
prises, and public universities. The first round of an inspection tour initiated in May
2013 has brought much inspiring news, including the investigations of provincial level
cadres former Deputy Governor Guo Youming and former Vice-Chairman of Political
Consultative Conference Chen Baihuai of Hubei Province, and former Vice-Chairman
of Jiangxi Provincial People’s Congress Chen Anzhong.58
To keep up with modern technology, the newly released CCDI official website has
now included a channel for “online reports”. The CCDI has devoted large resources in
monitoring Internet information. In fact, the collapse of the former deputy head of the
National Development and Reform Commission Liu Tienan emerged from an online
54
According to “Jiezhi 12 YuediQuanguoChachuWeifanBaxiangguidingJingshenWentiHui-
zongbiao” (“Summary in 2013, of the Progress of Investigating Cadres Who Violated the
Eight-Point Code”), 09.01.2014, Central Government Website, available at: http://www.gov.cn/
gzdt/2014-01/09/content_2562681.htm.
55
In China, wasting public funds is mainly in three ways (in Chinese: sangongjingfei),
referring to public officials using public funds on outbound tourism, buying corporate cars and
administrative spending, and dining and entertainment.
56
“Sida Hangye bei Fanfuquan Jizhong” (“Four industries Were Punched by Anti-
Corruption Trend”), 02.12.2013, People’s Daily, available at: http://finance.people.com.cn/n/
2013/1202/c1004-23709209.html.
57
See CCDI official website, institutional framework, available at: http://www.ccdi.gov.cn/
xxgk/zzjg/201403/t20140314_20114.html (in Chinese).
58
“TuchuFaxianWenti, QianghuaZhensheZuoyong– 2013 XunshiGongzuoZongshu” (“High-
light the Identified Problems and Strengthen the Deterrent – Summary of 2013 Inspections”),
09.01.2014, Central Government Website, available at: http://www.gov.cn/gzdt/2014-01/09/
content_2562678.htm.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
59
“China Sacks Top Economic Official Liu Tienan”, 09.08.2013, BBC News, available at:
http://www.bbc.co.uk/news/world-asia-china-23628085.
60
“Officials Being Convicted since the 18th CCP National Congress”, 12.11.2013, Sina
News, available at: http://news.sina.com.cn/c/sd/2013-11-12/110828687589_2.shtml.
61
Yamei Wang (30.06.2014), “Flash: Xu Caihou Expelled from CCP for Graft Probe”,
Xinhua, available at: http://news.xinhuanet.com/english/china/2014-06/30/c_133449642.htm.
62
“The ordinance of the work of selecting and appointing cadres of the party and country”,
Chapter 5, Article 24(4), Promulgated on 15.01.2014, by Central Committee of the CCP.
63
Reporting by Paul Carsten, Editing by Ron Popeske (22.05.2014) “China Corruption Fight
Turns on Officials’ with Family Overseas”, Reuters, available at: http://www.reuters.com/article/
2014/05/22/us-china-corruption-idUSBREA4L0HW20140522.
64
“China Investigation Finds 1,000 ‘Naked Officials’ in Guangdong”, 07.06.2014, BBC
News, available at: http://www.bbc.co.uk/news/world-asia-china-27747097.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
demotions instead as punishment.65 Fang Xuan, for example, as one of the first, has
taken early retirement from his position as deputy chief of the Guangzhou city Party
Committee.66 This recent move indicates that the party discipline department has
extended its objective to the prevention of corrupt officials from moving their ill-gotten
gains abroad at a very early stage, not merely prosecution.
5. CHINA’S FUTURE
China has probably been the most dynamic economy in the world and is widely
predicted to be the dominant economy within the next ten years. As the largest
emerging market, China’s every move towards curbing economic crime will more or
less affect international business ethics and legal standards. It is true that the issue of
corruption is so dynamic. Since the “opening” of China’s economy, the system of
government and its instructions, along with the party in power (CCP), has had to adapt
to address both new risks and challenges, and this is an ongoing process. Today the
Chinese economy has become far more diversified and international, and political,
social, and economic changes have complicated, and will continue to complicate, the
situation. China, however, is not slow in realising that it cannot deal with all these
issues in isolation. Corrupt officials have become more intelligent and moved their
ill-gotten gains beyond the reach of domestic power and hidden their bribes and thefts
in foreign bank accounts or through purchase of overseas property.
Nonetheless, China itself has very recently taken an adventurous step and targeted its
own financial heart, Bank of China (BOC), one of China’s big four state-owned
commercial banks. According to a report published by China Central Television
(CCTV), China’s central bank, People’s Bank of China, has initiated an investigation
into BOC, which is suspected of helping Chinese clients circumvent foreign exchange
controls through its formal service “Youhuitong” at BOC’s Guangdong branch.67
“Youhuitong” basically helps Chinese citizens to transfer large sums of Chinese
currency overseas regardless of domestic foreign exchange regulation that only allows
individuals to convert up to $50,000 per year from Renminbi to foreign currency. There
must be a nexus between the recent crackdown of large numbers of “naked officials” in
Guangdong Province and the investigation into the financial authority BOC Guangdong
branch. China understands that the crime of corruption would not survive without
money laundering activities.
In terms of international collaboration, the UK Bribery Act 2010 and the US Foreign
Corrupt Practices Act have provided a two pronged attack, each Act having an
extensive extra-territorial jurisdiction. For example, recently, the British multinational
65
Demetri Sevastopulo (08.06.2014), “China Cracks Down on ‘Naked Officials’”, Financial
Times, available at: http://www.ft.com/cms/s/0/9d1f3a88-ef01-11e3-acad-00144feabdc0.html#
axzz37jmdiWKd.
66
Ibid.
67
Didi Kirsten Tatlow (11.07.2014), “China Central Bank Investigates Report of Money
Laundering”, The New York Times, available at: http://www.nytimes.com/2014/07/12/business/
international/chinas-central-bank-investigating-report-of-money-laundering.html?_r=0.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
68
Jamil Anderlini, Patti Waldmeir, Andrew Jack, George Parker, and Caroline Binham
(14.04.2014), “Police Accuse GlaxoSmithKline China Head of ‘Ordering’ Bribes”, Financial
Times, available at: http://www.ft.com/cms/s/0/fe669bfc-db23-11e3-b112-00144feabdc0.html?
siteedition=intl#axzz395ltMFl5.
69
Andrew Ward (27.05.2014), “SPO Opens Criminal Inquiry into GSK”, Financial Times,
available at: http://www.ft.com/cms/s/0/f059e6e8-e5d4-11e3-aeef-00144feabdc0.html?siteedition
=uk#axzz395ltMFl5.
70
Ibid.
71
“GlaxoSmithKline fined $490m by China for bribery”, 19.09.2014, BBC News, available
at: http://www.bbc.co.uk/news/business-29274822.
72
United Nations Office on Drugs and Crime, “UNODC’s Action against Corruption and
Economic Crime”, available at: http://www.unodc.org/unodc/en/corruption/index.html
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 14 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
$120 billion (£74bn) and fled mainly to the US, Australia, and Canada.73 In compari-
son, only a very small fraction of them have been extradited back to China, mainly due
to the lack of mutual extradition treaties. Generally, there are various reasons for the
difficulty in concluding an extradition treaty. The differences in the political system and
the distrust of the Chinese legal system in ensuring justice are perhaps the prominent
reasons. For instance, the death penalty that has been abolished in many countries still
exists in China, and this certainly frustrates extradition conditions of Chinese corrupt
officials.
In recent years, China has had remarkable success in establishing cooperative
relationships with foreign countries. The principal criminal of the Yuanhua smuggling
case Lai Changxing has finally been extradited back to China over ten years after he
fled to Canada. Furthermore, according to the news from Global Times, China has now
been working closely with the US Department of Justice on seeking effective ways of
asserting asset recovery and implementing an extradition treaty, and discussing the
possible conditions of a proceeds-sharing regime.74 It is also said that China has
provided a list of over 1,000 Chinese corrupt officials that have fled to the US.75
The efforts that China’s new leadership has made both domestically and inter-
nationally have brought much applause, while the anti-corruption campaign has not yet
reached the end. The former member of the top decision-making body the Politburo
Standing Committee, Zhou Yongkang, who once headed the party’s Central Commis-
sion for Discipline Inspection and China’s Ministry of Public Security, was formally
announced as being under investigation.76 Xi has broken the long-standing custom that
serving and retired Politburo Standing Committee members are immune from prosecu-
tion, and the scope of the campaign has been expanded to cover previously less touched
sectors such as law enforcement agencies, the energy sector, and the army.
It may be wondered whether the anti-corruption effort is determined by Xi’s political
needs. The campaign is dynamic and fluctuating, and it is very likely to ease off once
Xi has won sufficient popular support to make himself powerful enough to take control
of the country. The CCP’s anti-graft campaign may be considered to have more to do
with power politics than the law, in a historical review. Rumors have been spread that
Zhou Yongkang was involved in an “anti-Xi cabal” within the party, which also
included Bo Xilai (former Chongqing party boss). Similarly, two previous Politburo
members brought down for corruption related felonies – former Beijing party secretary
Chen Xitong (who received an 16-year jail term in 1998) and former Shanghai party
secretary Chen Liangyu (who was given an 18-year jail term in 2008) – were widely
73
People’s Bank of China (15.06.2011), Woguo Fubai Fenzi xiang Jingwai Zhuanyi Zichan
ji Jiance Fangfa Yanjiu (Research on Approaches Corrupt Officials Use to Shift Their Assets
Abroad and the Supervision System)..
74
“Zhongfang yixiang Meifang Kaichu Chaoguo 1000 Waitao Tanguan Mingdan” (“China
Has Provided the US with over 1,000 Fled Corruptive Officials’ Name List), 12.5.2014, Global
Times.
75
Ibid
76
Damien Grammaticus (29.07.2014), “Zhou Yongkang: China Investigates Ex-security
Chief”, BBC News, available at: http://www.bbc.co.uk/news/world-asia-28544428.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 15 / Date: 20/7
JOBNAME: Rider PAGE: 16 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
recognised as political foes of ex-presidents Jiang and Hu, respectively.77 Indeed, the
accomplishments of the crusade could be the by-product of internal power struggles.
Of course, it remains to be seen whether the complex apparatus of the state can
address the issues with sufficient vigour and alacrity to retain public confidence. In the
future, Chinese governments will need to look more into asset recovery, along with
convictions. Anti-money laundering regulation will be increasingly used to monitor
officials’ financial statuses. This is particularly true in relation to corrupt officials who
are laundering their ill-gotten gains to other parts of the world. There are already
rumors around the US, Canada, and the UK that the dramatic increases of their local
housing prices may be due to China’s anti-corruption campaign that stimulates corrupt
officials to move their dirty money to a relatively safer place outside Mainland China.
Moreover, China will face difficulties in tracing officials’ bribes from other juris-
dictions. As a result, promoting bilateral agreement and mutual assistance is the key.
Nonetheless, based upon the recent series of initiatives that have been taken, the public
will no doubt have been left a clear message that there will be no paradise for corrupt
officials any more in the party, and the new leadership will at all costs return a clean
government to the people.
77
David Barboza (12.04.2008), “Former Party Boss in China Gets 18 Years”, The New York
Times, available at: http://www.nytimes.com/2008/04/12/world/asia/12shanghai.html?_r=0. Chris
Bukley (6.6.2013), “Chen Xitong, Beijing Mayor During Tiananmen Protests, Dies at 82”, The
New York Times, available at: http://www.nytimes.com/2013/06/06/world/asia/chen-xitong-
mayor-during-tiananmen-protests-dies.html.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 34 /Pg. Position: 16 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
1
See for example the numerous articles on the subject in the UK Daily Mail including
‘£1billion UK aid goes to the world’s most corrupt countries: Syria and North Korea among
states that get 25 per cent more in dash to hit controversial target’, available at http://
www.dailymail.co.uk/news/article-2893033/1billion-UK-aid-goes-world-s-corrupt-countries.html
and ‘Confirmed: Our foreign aid fuels corruption – Official watchdog’s verdict on aid spending
that Cameron has defiantly ring-fenced’, available at http://www.dailymail.co.uk/news/article-
2815115/Confirmed-foreign-aid-fuels-corruption-Official-watchdog-s-verdict-aid-spending-
Cameron-defiantly-ring-fenced.html.
2
For simplicity I will use the term ‘fragile states’ to denote usually post-conflict states with
low central government capacity and high levels of corruption.
3
See for example the distinctions between ‘clan politics’ in Tajikistan, K. Collins ‘The
logic of clan politics: evidence from the Central Asian Trajectories’, World Politics 56, 2004,
224–261 and ‘prebendalism’ in P. Lewis ‘From prebendalism to predation: the political economy
of decline in Nigeria’, Journal of Modern African Studies 34, 79–103.
4
International bodies use a variety of different definitions of corruption, but here the use is
the same as used by the UK Department for International Development (DFID) and Trans-
parency International, ‘the abuse of entrusted power for private gain’. Consequently corruption is
not limited to public officials.
5
The United Nations Convention against Corruption, which was adopted by the UN
General Assembly in 2003, is the main text, but it is supported by a plethora of other treaties and
conventions supported by for example the European Bank for Reconstruction and Development,
the European Union and the World Customs Organization.
6
Ingrida Kerusauskaite ‘Corruption and international development assistance’.
435
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
more practical concerns raised by various chapters in this handbook are more likely to
have an effect on corruption within fragile states. The key focus should be on
understanding the specific context of the individual country and situation. Yes,
corruption has an insidious effect on development, but the effects are far subtler and
more complex than a traditional analysis based on Western ideas of the nation state
would indicate. The overwhelming requirement for fragile states is security, and
corruption and patronage can be important tools to secure that security in the short term
and allow the breathing space for a political class to develop the wider institutions
necessary for the society to develop. International opinion that refuses to see the needs
of such societies in the societies’ own terms risk adopting a broad brush declamatory
approach that can be counter-productive rather than working with the grain of a local
society.
These issues will be addressed through an examination of the most recent high
profile post-conflict state, Afghanistan, with some additional analysis on Iraq. These
two states have attracted a significant level of academic, governmental and journalistic
coverage so are useful case studies for phenomena present in less well studied
countries. Both countries have followed a similar path with international sponsorship of
their anti-corruption institutions.7 These countries have followed similar paths, with
the removal of a governmental class and the renewal of the whole machinery of the
government alongside a reformed national army. They are also two countries that the
author has lived in and worked in for over five years. Other countries that could have
been considered are the Democratic Republic of the Congo (DRC) and South Sudan,
where many of the same issues feature but which lack the same level of international
interest so that the issues are not as heightened as they are in Iraq and Afghanistan.
Before turning to the specifics of the Afghan and Iraqi examples, it is worth saying
something about the analytical framework that most writers adopt when considering
corruption in fragile states. Western liberal democratic states have grown up in the last
fifty years to believe in a set of worthy and laudable ideas that focus on reducing
hardship. State apparatuses have grown up that ensure access to health care, function-
ing legal systems and some level of social welfare provision. Even in a starkly unequal
society like the US, people are unlikely to starve and unlikely to be arbitrarily killed
due to their religious or ethnic affiliation. In fragile states such practices are
commonplace. This very basic difference between the societies that aid practitioners
and theorists come from and the societies that they try and influence is crucial.
Western intervention may be trying to build Western-style societies in post-conflict
countries, but by definition they are not there yet. People set up informal structures or
fall back on existing structures to provide basic security. Typically, in post-conflict
scenarios central government is weak; kin, religious or ethnic groupings coalesce
around an ideology or a charismatic individual figure in exchange for security and
some level of economic support. Usually such figures build support through a
combination of their own individual charisma, a religious or tribal base and outside
support. In Afghanistan the Taliban leadership under Mullah Omar has an obvious
7
For the development of the Afghani government’s High Office of Oversight and
Corruption see http://anti-corruption.gov.af/en/page/8463. For the much longer history of the
Iraqi Board of Supreme Audit see http://www.d-raqaba-m.iq/pages_en/default_en.aspx.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
religious element but also a charismatic leader and significant outside support from
Pakistan.8 In Iraq, even a figure whose authority is based in theory on religious
charisma, namely Muqtada-al-Sadr,9 also draws significant support and money from an
outside agent, in his case Iran. These figures lead movements that provide security and
welfare to their people. The history of the Lebanese civil war10 and the development of
Hezbollah,11 the emergence of Hamas in the Gaza strip,12 and some of the groups
within the current Syrian civil war betray the same phenomena.
In a reinforcing process these types of groups require weapons and money to defend
themselves against similar groups that grow up in the absence of any effective state.
Thus there is increased competition for money, weapons and outside support so that
groups can sustain themselves and defend their people. Even a group as militant as
Islamic State makes sense in these basic terms. These basic processes of groups
protecting themselves are taking place at multiple different levels. For example, at the
national and strategic level we use terms like the Taliban to describe a conglomeration
of groups, villages, tribes and individuals who are all driven by the same basic quest for
security.
Once international development programmes are set up in this kind of situation, they
can become another resource stream to be manipulated to promote the wider interests
of the kin or religious group. In societies with no welfare net and no agreement that it
is even a realistic requirement of government, the government minister who accepts a
bribe to facilitate a licence will be supporting an extended network of patronage in
order to maintain his position. This patronage will be extended through the direct
transfer of wealth and also through the distribution of jobs and favours across their
networks. These networks overlap and cross over, often taking on bizarre twists that
defy traditional, Western binary anti-corruption analysis. For example, in Afghanistan
President Karzai’s brother, Ahmed Karzai, was Chairman of the Provincial Council in
Kandahar and was widely believed to be involved in the drugs trade, operating a whole
parallel government alongside the traditional government structures in Kandahar.13
Despite repeated accusations of corruption, he remained in place in Kandahar until he
was killed in 2011. Various explanations exist as to why President Karzai did not move
against his brother despite significant pressure to do so,14 but one at least is that his
8
For the rise of the Taliban see Kamal Matinuddin’s The Taleban Phenomenon, Afghanistan
1994–1997, Oxford Pakistan Paperbacks, 2000 or James Fergusson’s Taliban, London: Bantham
Press, 2010 or Peter Marsden’s The Taliban, War, Religion and the New Order in Afghanistan,
London: Zed Books Ltd, 1998.
9
For the background on Muqtada Al-Sadr see Patrick Cockburn, Muqtada Al-Sadr and the
Battle for the Future of Iraq, New York: Schribner, 2008.
10
Robert Fisk, Pity the Nation: Lebanon at War, Oxford, Oxford University Press, 1991.
11
Judith Palmer Harick, Hezbollah: The Changing Face of Terrorism, London, I.B. Tauris,
2005.
12
Jean-Pierre Filiu, Gaza: A History, London, Hurst and Company, 2014.
13
Matthew Levitt and Dennis Ross, Hamas: Politics, Charity and Terrorism in the Service of
Jihad, New Haven, Yale University Press, 2006.
14
For the common belief that Ahmed Karzai was being paid by the American Government
see Filikins, Dexter, Mark Mazzeti and James Risen ‘Brother of Afghan leader said to be paid by
C.I.A.’, The New York Times, 27 October 2009.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
brother played both an official role as Head of the Provincial Council but also an
unofficial one running local patronage networks that helped give President Karzai at
least some influence in Kandahar.
President Karzai had a profound interest in supporting the structure of the state that
he ran and indeed a very personal interest in that it kept him alive. At the same time as
making speeches about corruption he was also subverting his own regime through
supporting his brother’s corruption. What his largely American advisors could not
understand was that this was a rational response to the situation that he was in. Using
traditional patronage networks to support his powerbase through corruption allowed
him to stay in power. Kandahar is Afghanistan’s main city in the south; both official
and unofficial influence there was important to sustain Karzai as a national figure.
Using these unofficial networks and patronage was also a solution that worked with the
grain of Afghan society. According to UN estimates, Afghans paid a total of $3.9
billion in bribes over the period 2009–2013.15
The Taliban initially came to power by fighting the levying of tolls on the road
network around Kandahar. Local warlords were putting road blocks in place on the ring
road and in effect competing for the right to collect taxes. Such local tax raising is
common in post-conflict and developing economies. As weak governments develop and
seek to reclaim sovereignty over their territory they try and limit such exhibitions of
non-state military authority. For example, in Afghanistan, in response to a series of
incidents involving foreign security providers (often protecting Western development
workers), the Afghan government decided to license and then ultimately remove the
foreign security companies. The intent was that the foreign companies would be
licensed and then through a transition process ultimately move to local Afghan control.
The Iraqi government had overseen a similar process in 2010. Licences to provide
security services in Afghanistan first appeared in 2011. Payments for the licences were
made to the head of the Afghan Public Protection Force’s (APPF)16 personal bank
account. At the time, the argument was made that this was for efficiency as it would
take too long to set up the main APPF bank account and they were up against a
deadline set by presidential decree. In reality, the more likely conclusion was that the
licence money never went into the official Afghan government accounts and was
instead distributed through the patronage network of senior figures within the Ministry
of the Interior and Ministry of Defence. Nobody at the APPF was in a position to
challenge the activities of the head of the organisation.
Such situations are common in post-conflict societies. Societies with weak govern-
ments tend to favour an authoritarian approach. They also rely on a disavowal of
personal responsibility so power and responsibility becomes concentrated at the top of
an organisation. Low- or mid-level staff refusing to take any responsibility for an issue
15
Quoted by Ben Macintyre, The Times, 30 March 2010. For more recent estimates of the
prevalence of corruption in Afghanistan see the various reports by the UN Office on Drugs and
Crime who together with the Afghan government’s High Office of Oversight and Anti-
Corruption produced the 2012 report entitled Corruption in Afghanistan: Recent Patterns and
Trends.
16
The author was one of the main advisors helping the Afghan government set up the APPF
from January 2012 through to August 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
can concentrate power to an absurd degree. The author has seen police salaries not paid
for up to three months because there was no head of the organisation to sign the
individual payments. The need for the signature of the senior figure in an organisation
is common in such situations and in theory is supposed to limit corruption when all it
actually does is concentrate it. Security staff, most notably on the large Kajaki Dam
project in the summer of 2013, ended up kidnapping central government officials to
speed up their salary payments.
In this situation the international community became trapped by the government it
had been instrumental in creating. Hamid Karzai became increasingly critical of
Western involvement in his country and (allegedly) more and more corrupt. Both were
necessary to sustain himself and his regime and as a consequence the international
community could do little to tackle corruption without undermining the leader of the
regime that they were largely responsible for creating. The dynamics of the situation,
and in particular the need to sustain a new elite whose only common interest was in
sustaining their own patronage networks, meant that the International Security Assist-
ance Force (ISAF)17 could do very little to tackle the president on corruption. The new
opportunities in government created new alliances and elites which overrode older
ethnic differences in order to maintain access to lucrative government posts and to
maintain their patronage networks. The same phenomena can be seen in the career of
Marshal Fahim, a Panjshiri and close ally of Massod Fahim. He became Defence
Minister following the fall of the Taliban, despite having overseen the arrest and
interrogation of President Karzai in 1994, and then went on to become President
Karzai’s running mate in the 2009 presidential elections.18
Competing military and aid priorities and shifting foci over time further exacerbate
these problems. Armies of all ages come with huge logistical tails that generate large
scale opportunities for fraud within the local economy. There was a particularly stark
example of this during the West’s campaign in Afghanistan, revealed by the publication
of a report ‘Warlords Inc.’19 by the US House of Representatives. The report focused on
corruption within the security arrangements to support ISAF’s logistical arrangements
in Afghanistan. The report disclosed that as part of a $2.16 billion contract, tens of
millions of dollars were being diverted to local warlords including the Taliban.
Logistics managers estimated that between $1.6 and $2 million was going to the
Taliban every week as, broadly speaking, local trucking companies were required to
provide their own security when transporting goods round the ring road in Afghanistan.
In the majority of areas it was much simpler to pay off the local warlord (or in some
cases police chiefs) than to take security personnel from one area into another. The US
government was in theory paying for security personnel to accompany truck move-
ments all round the country. In practice, the control of the ring road was broken up
17
For a history of ISAF and its relationship with the various separate US missions see
http://www.nato.int/cps/en/natohq/topics_69366.htm.
18
James Fergusson, op. cit. Ch. 11.
19
Warlord, Inc.: Extortion and Corruption along the U.S. Supply Chain in Afghanistan.
Report of the Majority Staff. Representative John F. Tierney, Chair Subcommittee on National
Security and Foreign Affairs Committee on Oversight and Government Reform. U.S. House of
Representatives, June 2010.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
amongst roughly seven different armed groups who were all paid to allow the trucks to
pass. Whilst combat arms of ISAF were trying to degrade the Taliban and its affiliates,
the Logistics and Combat Service Support (CSS) arms were paying the Taliban and
related forces to allow the trucks to move and therefore allowing them to build up their
forces. The report led to the issue of convoy security shifting from being a peripheral
one to be being one of ISAF’s three strategic focuses for the period 2012–2013.
Referring to all of ISAF’s activities, and not specifically to the issue of convoy security,
Lt. General Nick Carter, ISAF’s Deputy Commander, said: ‘We had a role in
contributing to corruption, and that was because of the way we spent our money,
because of the way we contracted, and because of our logistics system.’20
Such contradictory situations often happen in confused military situations where
political priorities and interests shift;21 but it should be remembered that by the time
these abuses were documented the US had already been in Afghanistan for almost ten
years. Part of the reason that these abuses took so long to be uncovered was that the US
military had shifted their focus from Afghanistan in 2003 with the invasion of Iraq. Iraq
provides an interesting parallel to the Afghanistan example, covering as it does a
similar timescale and set of issues but coming from an entirely different starting point.
20
Operationalizing Counter/Anti-Corruption Study, 28 February 2014, Joint and Coalition
Operational Analysis (JCOA).
21
For an analysis of the US domestic influence on policies within Afghanistan see Lori
Maguire ‘The US Congress and the Politics of Afghanistan: an analysis of the Senate Foreign
Relations and Armed Services Committees during George W. Bush’s second term’, Cambridge
Review of International Affairs 26, no. 2 (2013), 430–452.
22
Zaid Al-Ali, The Struggle for Iraq’s Future: How Corruption, Incompetence and
Sectariansim Have Undermined Democracy, New Haven, Yale University Press, 2014.
23
Transparency International has Iraq as 170th (out of 175) (i.e. the sixth most corrupt
country in the world of those measured), see http://www.transparency.org/country#IRQ.
24
For an evocative account of corruption in government in pre-revolutionary Syria see Diana
Darke’s My House in Damascus: An inside view of the Syrian Revolution, London, Haus
Publishing Ltd 2014, 126–136.
25
Zaid Al-Ali, op. cit. Ch. 7.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
feeling on the part of the Sunni minority that they were being excluded politically and
hence economically, and being violently persecuted by Shia militias. In Sunni terms,
they were being denied access to the resources to fight back. It is noteworthy that
Maliki kept a firm grip of the defence and interior ministries. This was in part about his
own security, but it was also because they allowed significant levels of graft.
The impact of these policies was revealed when the rapid expansion of the Islamic
state in the summer of 2014 revealed huge weaknesses within the Iraqi army, including
that the Iraqi government was paying for up to 50,000 soldiers who either did not exist
or never actually turned up for work.26 Following the rapid expansion of the Islamic
state, these revelations led to a major reorganisation (including sackings) of the higher
echelons of the Iraqi military.27 Units were understrength and not as well equipped in
reality as on paper. Both of these factors also contributed to low morale even further
undermining military effectiveness.28 The problem was exacerbated by having almost
entirely Shia units operating in largely Sunni areas; this has been identified specifically
in relation to the fall of Mosul in the summer of 2014. The counter-argument could be
made that if the salaries of the Sunni tribes in Anbar had kept on being paid in 2011
and 2012, there would have been no need for the 50,000 missing soldiers to fight. Is
there a substantive difference between paying the salaries of 50,000 Shia security
personnel though government structures to try and control an overwhelmingly Sunni
area or through patronage allowing the money to go straight to Sunni tribal forces to
keep the peace in their own areas?
The success of the US-led ‘awakening’ movement in the Sunni areas of Iraq allowed
the US to withdraw from an Iraq with some degree of stability.29 The process of turning
local tribal leaders against their previous allies Al-Qaeda was based on distributing
funds to tribal leaders and their retinues. The Iraqi state was effectively undermining its
own military by subsidising an alternative force. Traditional development analysis
would suggest that this type of approach undermines the development of the state, but
it did allow three years of rough stability in the Sunni areas of Iraq (2009–2012).30
Unfortunately, the time was not used by the Maliki government to build up a nationally
based army that would have included Sunnis. The peace started to break down, as
26
Patrick Cockburn, The Jihadis Return: ISIS and the New Sunni Uprising, New York, OR
Books, 2014.
27
The Iraqi government fired 26 top leaders, 10 were forced to retire and 18 others were
moved to new positions, including the former Army Chief of Staff Babacar Zebari, Al Sumaria
News, 12 November 2014.
28
Various media accounts include references to the low morale of the Iraqi forces, including:
Martin Chulov, Fazel Hawramy and Spencer Ackerman, ‘Iraq army capitulates to Isis militants
in four cities’, The Guardian, 11 June 2014; Liz Sly and Ahmed Ramadan ‘Insurgents seize Iraqi
city of Mosul as troops flee’, The Washington Post, 10 June 2014.
29
For the background to this see the paper by Najim Al-Jabouri and Sterling Jensen ‘The
Iraqi and AQI roles in the Sunni Awakening’, available at http://cco.dodlive.mil/files/2014/02/
Prism_3-18_Al-Jabouri_Jensen.pdf.
30
See D. Green and W. Mullen’s Fallujah Redux: The Anbar Awakening and the Struggle
with Al-Qaeda, Annapolis, Naval Institution Press, 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Sunnis feared it would,31 as these payments moved from being made by the US
military to coming from the Maliki-led government. The Iraqi government started to
stall and then stopped the payments entirely. In the longer term, these types of
strategies do undermine the coherence of national armies and security strategies, but in
the short term they may well be a necessary part of ensuring sufficient stability to allow
the breathing space for longer-term state development.
We are in the ironic position where if one form of state corruption had persisted (the
payments to the Sunni tribes) then another form of state corruption (the ghost soldiers)
would never have been revealed. Corruption is not a zero-sum game; the use of
patronage that would be counted under international definitions of corruption as a form
of state policy may be a legitimate short-term policy to allow more effective state
apparatus to develop. The key issue is that these short-term policies need to be
integrated alongside broader strategies that include developing anti-corruption pro-
grammes. As the experience of paying warlords in Afghanistan shows (and the recent
US Department of Defense report quoted earlier makes clear32), emphasis must be put
on a coherent approach. In the Afghan context, different arms of the US government
were pursuing differing and sometimes contradictory aims. Allowing patronage to
support wider state building aims may be a legitimate tactic at a particular stage of
development, but it needs to be understood that it has to run in parallel with strategies
to normalise central government control or oversight.
Whilst the analysis has focused on the two extreme examples of Iraq and Afghan-
istan, it is worth pausing and putting some of these examples into a wider context.
Though the focus has been on military and security issues, many of the same basic
issues of patronage being part of the everyday functioning of politics can be seen in
more developed economies. State building strategies in post-conflict states need to
recognise that corruption can be a rational choice in fluid political situations. Policy
makers and military planners need to adopt subtler and more co-ordinated policies to
ensure that if patronage is used to contribute to security it is part of a wider strategy.
This is not to propose an open policy on corruption in post-conflict states, but merely to
encourage those involved in state building to consider the issues in a local rather than
a purely Western context.
FURTHER READING
Addison, T., Geda, A. and Le Billon, P. ‘Financial reconstruction in conflict and post-conflict economies’,
WIDER Discussion Papers/World Institute for Development Economics (UNU-WIDER), No. 2001/90.
Al-Ali, Z. The Struggle for Iraq’s Future: How Corruption, Incompetence and Sectarianism Have
Undermined Democracy, New Haven, Yale University Press, 2014.
Buchanan, J., Tollison, R. and Tullock, G. Toward a Theory of the Rent-Seeking Society, College Station,
Texas A&M University Press, 1980, 1–15.
Bräutigam, D. and Knack, S. ‘Foreign aid, institutions, and governance in Sub{Saharan Africa’, Economic
Development and Social Change 52, no. 2 (2004): 255–285.
31
J. Hendren, ‘Iraq’s Sunnis fear life without US oversight’, ABC News, 1 October 2008,
available at http://abcnews.go.com/International/story?id=5926340&page=1.
32
Operationalizing Counter/Anti-Corruption Study, op. cit.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 35 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
PART VII
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Over the last few decades, increasing attention has been paid not only to prosecuting
those who commit crimes but also to depriving them of the proceeds of those crimes. In
the United Kingdom, a key policy document was the Report of the Cabinet Office’s
Performance and Innovation Unit, ‘Recovering the Proceeds of Crime’, published in
June 2000. This discussed why the British Government felt that asset recovery was
important before setting out how this was to be achieved, paving the way for the
Proceeds of Crime Act 2002. Although certain forms of recovery of criminal property
were already in place in the United Kingdom, the 2002 Act both extended these forms,
including the introduction of civil proceedings, and brought all the provisions under
one piece of legislation, ending the divide that had existed up to then between drug
trafficking and all other forms of crime.1
There are clear reasons why the removal of criminal property is important, above and
beyond the mere fact that international instruments now demand it.2 One is the
commonly stated argument that since certain crimes are committed in order to make
money, if conviction will result not only in a prison sentence but also removal of the
proceeds, then the motivation will be removed. In itself, this is questionable: almost 30
years after severe measures were first introduced in the United Kingdom to remove
property linked to drug trafficking,3 the incidence of drug trafficking remains high.4
Similarly, in the United States, despite the use of both criminal and civil forfeiture
provisions to combat drug trafficking, the problem remains sufficiently severe for New
York City to maintain a specialist investigation and prosecution unit devoted solely to
this category of offence.5 It is, however, true that certain forms of acquisitive crime
both provide extravagant lifestyles for the offenders and cause considerable hardship
for the victims. Corruption and embezzlement by political leaders are particular
examples, with leaders being found in possession of assets with a value that dwarfs
their official salaries. A particularly notable example was Teodoro Obiang, Minister of
Forestry and Agriculture (and son of the President) of Equatorial Guinea, who settled a
1
The provisions relating to terrorist property, however, continued to be covered separately
in the Terrorism Act 2000, as subsequently amended.
2
For example, Recommendation 4 of the Financial Action Task Force.
3
Through the Drug Trafficking Offences Act 1986. This Act was later superseded by the
Drug Trafficking Act 1994, itself replaced in 2003 with the coming into force of the Proceeds of
Crime Act 2002.
4
In the financial year ending 2013/14, there were 30,648 separate seizures of Class A drugs
in England and Wales. Source: Home Office, ‘Seizures of drugs in England and Wales, financial
year ending 2014’, <https://www.gov.uk/government/statistics/seizures-of-drugs-in-england-and-
wales-financial-year-ending-2014> accessed 1 February 2015.
5
Office of the Specialist Narcotics Prosecutor for the City of New York.
447
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
forfeiture action brought against him by the U.S. Department of Justice in October
2014. Despite an official salary of US$6,799 per month, he was able to buy a mansion
in Malibu, California, for a price of $38.5 million6 and his total assets were stated by
the Department of Justice to be over $100 million.7 Similarly, at the other end of the
scale, there are communities where a combination of severe poverty and a strong sense
of loyalty to one’s family mean that even long prison sentences are not a sufficient
deterrent. Put bluntly, if a man engages in violent robbery, kidnapping or poaching of
endangered animals and is sentenced to ten years’ imprisonment, he may regard that as
an acceptable price to pay for his parents being able to have a comfortable house, his
aunt receiving medical treatment or his cousin going to school. This is a reality in many
parts of the world. If, however, the man knows that conviction will result not just in a
prison sentence but in him and his family being stripped of what little property they
have, the deterrent may be rather greater.
Before continuing, however, one needs to define the concept of ‘criminal property’.
Property shown to be the proceeds of, at least, serious crimes is generally included in
most jurisdictions. The United States, however, at both Federal and state level, focuses
with equal vigour on the ‘instrumentality’ of a crime: property not deriving from a
crime, but rather used to commit it or even merely to facilitate it. In the United
Kingdom, in contrast, although such a concept exists, it is confined to certain specific
offences, notably drug trafficking, smuggling (whether of drugs or other contraband),
human trafficking and certain of the more serious road traffic offences.
6
‘Equatorial Guinea dictator’s son “splurged millions of impoverished country’s money”’,
The Telegraph, 26 October 2011, <http://www.telegraph.co.uk/news/worldnews/africaandindian
ocean/equatorialguinea/8851377/Equatorial-Guinea-dictators-son-splurged-millions-of-impoverished-
countrys-money.html> accessed 2 February 2015.
7
‘Second Vice-President of Equatorial Guinea agrees to relinquish more than $30 million
of assets purchased with corruption proceeds’, Justice News, 10 October 2014, U.S. Department
of Justice, <http://www.justice.gov/opa/pr/second-vice-president-equatorial-guinea-agrees-
relinquish-more-30-million-assets-purchased> accessed 2 February 2015.
8
Proceeds of Crime Act 2002, s 76(1)(a).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
practice given to pursuing the proceeds of the former offences than the latter, but that
could swiftly change with a change of government policy.
Secondly, confiscation, like its criminal law counterparts in other jurisdictions, is
dependent on a criminal conviction. Property may be seized prior to conviction, but
only in order to prevent the defendant from hiding it or, worse, transferring it to a
jurisdiction from which it will be difficult or even impossible to retrieve it.9 If it is to be
definitively confiscated, the defendant must first be convicted of a criminal offence.
Even the criminal lifestyle provisions, discussed below, under which the burden of
proof shifts to the defendant to show that the property is not in fact the proceeds of
crime, require a criminal conviction (or, in some cases, more than one) before they will
apply.
It should be noted that the proceeds of overseas crimes are also covered: the
definition of criminal conduct extends to conduct which ‘would constitute [an] offence
if it occurred in England and Wales’.10 The impact of this, however, is limited by the
requirement of a criminal conviction before an English court. Although the extent to
which the English criminal courts have jurisdiction over acts committed overseas has
grown in recent years, it is still relatively limited, compared to that in some other
jurisdictions.11 In terms of offences likely to give rise to proceeds, the key offences are
bribery of a foreign public official12 and involvement in child prostitution or child
pornography.13 All of these offences only cover defendants who are British citizens or
residents. Foreign nationals (not resident in the United Kingdom) who commit crimes
abroad may, however, find themselves subject to the English courts in relation to
money laundering where the proceeds are transferred to, from or within the United
Kingdom. A notable example was James Ibori, the former Governor of Delta State,
Nigeria, convicted in February 2012 of laundering £50 million derived from defrauding
Delta State government funds. The entire amount involved, however, was estimated to
have been as £157 million or even higher.14
9
To do so would, if the property were indeed derived from a criminal offence, constitute
the money laundering offence of transfer of criminal property and/or removal of it from the
jurisdiction (Proceeds of Crime Act 2002, s 327). But this may be of limited comfort if the
property cannot be retrieved.
10
Proceeds of Crime Act 2002, s 76(1)(b).
11
For example France, whose criminal courts have jurisdiction over crimes (the most serious
category of offence) committed by French nationals abroad as well as in France and also over
délits (moderate offences) committed abroad, albeit with the additional proviso in the case of
délits that the act was also a criminal offence in the jurisdiction in which it was committed (the
double criminality rule). Code Pénal, art 113–16.
12
Bribery Act 2010, s 6.
13
Sexual Offences Act 2003, ss 48–50. For the purposes of these offences, a child is a
person under the age of 18 unless the defendant has reasonable grounds to believe that they were
at least 18 or a person under the age of 13 in any event. Trafficking persons for sexual
exploitation, whether within the United Kingdom or elsewhere, is a separate offence under
s 59A.
14
In his sentencing remarks, the trial judge, Judge Anthony Pitts, referred to the £50 million
which Ibori admitted to having laundered as ‘perhaps … a ludicrously low figure and the figure
may be in excess of £200 million’. Mark Tran, ‘Former Nigeria state governor James Ibori
receives 13-year sentence’ The Guardian, 17 April 2012.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The procedure leading to a confiscation order begins with a hearing that follows the
conviction itself. It is triggered either by the prosecution or by the trial judge: under
section 6 of the 2002 Act, the court must proceed with a confiscation hearing if either
the prosecution asks it to or if it ‘believes it is appropriate to do so’. The first stage is
to determine whether or not the defendant has a ‘criminal lifestyle’. In practice,
however, this will be a simple matter. The criteria for determining a criminal lifestyle,
discussed below, are clearly stated, and hence there is little room for discretion. Put
another way, either the defendant satisfies one of the criteria (and if they do, this will
already be a matter of record) or they do not. If they do not, the court focuses on the
specific offences of which the defendant has just been convicted. This will include any
offences ‘taken into consideration’,15 but not any offences of which they were
convicted in the past or in respect of which they have been charged but not yet
prosecuted.16 Aided by the prosecution, the court then determines what ‘benefit’ the
defendant has derived from their present crime(s). This will often be the money that
they have derived from the offence. For example, in a case involving the sale of
smuggled alcohol or tobacco,17 it will be the money that they have received from
selling the contraband goods; in a fraud case, it will be the proceeds of the fraud. It
may, however, be other forms of property: in an insider dealing case the securities that
were purchased, in a theft case the property that was stolen.
It should also be considered that while some crimes enable the offender to make
money, others enable them to save it. An example is where a person (natural or legal)
engages in a business that is in itself legitimate but saves costs by employing
undocumented, or even trafficked, workers.18 This will enable them to pay these
workers below the legally prescribed minimum wage and also evade the payment of
National Insurance contributions. The money from the business is derived from a
legitimate activity such as farming, food processing or the manufacture of clothes, but
costs are saved, resulting in higher profits, through a criminal offence.19 Where this is
15
Where the defendant has in fact committed several other offences similar to that for which
they have been prosecuted, they may ask for these to be taken into consideration by the court for
the purposes of sentencing. This will not result in further actual convictions; however, it will
mean that they receive a somewhat higher sentence than would otherwise have been the case (to
reflect their overall criminality). These other offences are then considered dealt with: the
defendant will not be prosecuted for them at some later date.
16
Past convictions may, however, trigger the criminal lifestyle provisions; similarly, a future
conviction may trigger them in a subsequent hearing. See below.
17
A conviction for any kind of drug trafficking offence will trigger separate criminal
lifestyle provisions; see below.
18
It is preferred to use the term ‘undocumented workers’ rather than the more popular
‘illegal workers’, since the persons are not illegal per se, they are merely not legally permitted to
work in the jurisdiction concerned. See Hsiao-Hung Pai, Chinese Whispers: The True Story
behind Britain’s Hidden Army of Labour (Penguin 2008).
19
For a detailed discussion of how saved costs have been deemed by the English courts
(although less so in the United States) to constitute the proceeds of crime, see R.C.H. Alexander,
‘“Cost savings” as proceeds of crime: a comparative study of the United States and United
Kingdom’ (2011) 45(3) The International Lawyer 749.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
the case, the position taken by the English courts has been that the entire proceeds
(receipts) derived through the illegal activity.20
A further category of proceeds is where the criminal offence does not directly
produce an income but creates the opportunity to obtain it. The classic example of this
is bribery. In the case of the corrupt recipient of the bribe, the money or other gift, such
as the payment of tuition fees for the recipient’s children at expensive overseas schools
or universities, is the proceeds. But the payer of the bribe also gets something: this is,
for the most part, why they pay it! A company may pay a bribe in order to obtain a
commercial contract. Mabey & Johnson and Innospec are merely two well-publicised
examples; in both cases, the sentence imposed included a confiscation order based on
the profits from the contracts corruptly obtained plus, where it may be calculated, the
value of the pecuniary advantage of excluding competitors from the bidding process.21
One may remark that the focus on profits, rather than gross receipts, in corruption
cases, as confirmed by the Court of Appeal in R v Sale (Peter 22) somewhat contrasts
with that taken with respect to cases involving the illegal use of undocumented workers
in R v Xu, cited with approval by the Court of Appeal in R v Harvey (Jack) less than a
month earlier.23 Space, however, precludes a further discussion of this here.
It must be stressed that in such cases, the burden is firmly on the prosecution to
prove that the property to be confiscated (or rather its value – see below) is a benefit
from the defendant’s crime; it is not for the defendant to prove that it is not. The court,
in order to establish the benefit, may order the defendant to provide it with specified
information, such as financial records, and, if the defendant fails to do so, may draw
such inferences from the refusal as it sees fit.24 Further, section 6 of the 2002 Act
makes clear that the standard of proof is the civil one of the balance of probabilities,
that is, 50.0001 per cent. But ultimately, it is down to the prosecution to demonstrate to
the court that the assets to be confiscated are the defendant’s benefit from their criminal
behaviour. Demonstrating this is by no means simple in every case. The case of James
Ibori, referred to above, is a case in point. The first part of the proceedings was clearly
a success: Ibori pleaded guilty to a series of offences, including both fraud and money
laundering, and was sentenced to 13 years’ imprisonment. Further, in his sentencing
remarks, Judge Anthony Pitts made clear that a confiscation hearing would follow. The
course of that confiscation hearing, however, has to date been less than ideal from the
prosecution’s point of view.25 Originally scheduled for October 2013, itself 18 months
after Ibori was sentenced, it was adjourned to April 2014. The 2014 hearing, however,
20
R v Xu (David Kai) [2008] EWCA Crim. 2372, approved in R v Harvey (Jack) [2014] 1
WLR 124 at p. 139.
21
R v Innospec Ltd. [2010] Lloyds Rep. FC 462. That it may not always, however, be
possible for the court to calculate this additional pecuniary advantage was stated clearly by the
Court of Appeal in R v Sale (Peter) [2014] 1 WLR 663 at pp. 675–76.
22
Note 21 supra. It is to be noted that that the Court in Sale did not seek to distinguish
Harvey on this point; where it did cite the decision (in another context), it did so with approval.
It did not refer to Xu at all.
23
Note 20 supra.
24
Proceeds of Crime Act 2002, s 18.
25
The confiscation case, at the time of writing, is still ongoing following a reference to the
Court of Appeal and hence no final outcome has yet been reached.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
ended with Judge Pitts admitting that by the end of the defence submissions, he was
‘confused’.26 Those submissions had included that the fact that Ibori had admitted
defrauding and laundering £50 million27 did not, as the prosecution claimed, prove that
he had personally benefited at all; this notwithstanding the fact that he had been shown
to have considerable assets, including properties both in London and elsewhere in
England and luxury cars.
It should further be noted that it is not in fact mandatory after a criminal conviction
to seek a confiscation order at all. The court is obliged to hold a hearing if the
prosecution asks it to do so or, alternatively, if it itself deems it appropriate. Should the
prosecutor not apply for confiscation or the court not decide that it is appropriate,
neither is required to explain why. In consequence, by no means every conviction for a
crime that potentially gives rise to proceeds is followed by a confiscation hearing. A
combined report in March 2010 by the bodies responsible for overseeing the Crown
Prosecution Service, the courts and the police stated as much: ‘not all cases with
restraint and confiscation potential are identified as such, largely because issues are not
mainstreamed into the daily work of frontline police investigators and CPS area
prosecutors’.28 In possible explanation, the report went on to remark on the complexity
of confiscation hearings: ‘there is a feeling that the identification of and exploitation of
cases is a job best left to the specialists, because it is a separate complex area of law
which should not impinge on the main job of prosecuting and sentencing criminals in
the conventional way’.29 Since that report was published, some action has been taken
and asset recovery specialists are now used by the CPS in at least some cases, including
the Ibori case However, it may be remarked that the Ibori case is not the kind of case
that the report most had in mind; even before 2010, a confiscation order would be
sought in a large-scale fraud and money laundering case such as this. One suspects that
it is the smaller cases of acquisitive crimes that the report had in mind – and in these,
confiscation orders are still not sought as often as they might be.
Where the defendant is shown to have a criminal lifestyle, however, the matter, from
the prosecution point of view, becomes a little simpler: the burden of proof shifts to the
defendant. Every item of property that the defendant received during the period of six
years up to the start of their trial is presumed to derive from crime; similarly, every
item of expenditure during the same period is presumed to have been funded from the
proceeds of crime. This may seem draconian – indeed, it is and is intended to be – but
26
‘Ibori London case: I’m confused, British judge admits’ This Day Live, 16 April 2014
<http://www.thisdaylive.com/articles/ibori-london-case-i-m-confused-british-judge-admits/176300/>
accessed 17 August 2014.
27
Emma Glanfield, ‘Former Wickes cashier who became a Nigerian state governor and
defrauded some of the world’s poorest people out of £157 million may not have to pay back a
penny’ Mail Online, 9 April 20 <http://www.dailymail.co.uk/news/article-2600746/Former-
Wickes-cashier-Nigerian-state-governor-defrauded-worlds-poorest-people-157million-not-pay-
penny.html> accessed 17 August 2014.
28
Criminal Justice Joint Inspection, ‘Joint thematic review of asset recovery: restraint and
confiscation casework’ (2010) para. 2.4 <http://www.hmic.gov.uk/media/joint-thematic-review-
of-asset-recovery-restraint-and-confiscation-casework-full-report-20100324.pdf> accessed 17
August 2014.
29
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the third presumption is harsher still. Every asset that the defendant holds on the day
following their conviction is presumed to derive from crime, regardless of how long
ago they acquired it. Section 76 is explicit: property acquired or expenditure incurred
before the 2002 Act was passed is included. In other words, if the defendant acquired
an asset, say, 35 years ago (at the time of writing 23 years before the 2002 Act was
passed), but still has it on the day after their conviction, the presumption will apply to
it.
The presumption is rebuttable: if the defendant shows that a particular asset or item
of expenditure has a legitimate origin, its value will not be included in the confiscation
order. But if they cannot, it is subject to confiscation. Also not included is any property
that was the subject of an earlier confiscation order. Hence, although earlier convictions
may, as seen below, cause the criminal lifestyle provisions to be applied, the value of
any confiscation order that followed them will be subtracted from the sum of the
defendant’s assets. No item of property is to have its value confiscated twice.
As indicated above, however, a criminal lifestyle will only be determined in certain
circumstances. Three categories are set out in section 75. The first is where the
defendant is convicted of one of a specified list of offences. This is in many ways a
successor to the original ‘confiscate all’ presumption applied to those convicted of drug
trafficking under the Drug Trafficking Offences Act 1986, part of the 1980s ‘war on
drugs’ and since replaced by the 2002 Act itself. Drug trafficking is still a ‘criminal
lifestyle’ offence, but it has been joined by a number of categories, contained in
Schedule 2 of the Act:
A number of these offences are substantive crimes under English law regardless of
where in the world they are committed; however, it will be recalled that the definition
of criminal property extends to the proceeds of any act committed outside the United
Kingdom if it would be a criminal offence were it committed within it.
A single conviction for any of the above offences will trigger the criminal lifestyle
provisions; this is designed to indicate the seriousness with which the British
Government regards them.
The second category applies to repeat offenders: either where the defendant has two
previous convictions from two separate occasions – again, the relevant period is six
years up to the start of the current proceedings – or where they have been convicted of
three other offences in the current proceedings. In either case, for the criminal lifestyle
provisions to apply, the prosecution must also show that the defendant derived a benefit
from each of the offences. This contrasts sharply with the first category, where the mere
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
conviction is sufficient: no actual benefit need be proven. Furthermore, for the repeat
offender category, the prosecution will be required to show that the benefit from the
current offence was at least £5,000. Thus, for example, three convictions of relatively
small scale insider dealing, giving rise to total proceeds of £3,000, will not suffice. The
prosecution may seek to show that the benefit was in fact higher than that, in order to
trigger the criminal lifestyle provisions, but the burden of proving this will be on it.
The final category is where the offence was committed over a continuous period of at
least six months; an example would be sustained embezzlement or other fraud. Again,
the prosecution must show that the offence gave rise to a benefit of at least £5,000
before the burden of proving the origin of the assets will shift to the defendant.
Although the criminal lifestyle provisions have rightly been described as draconian,
they do offer an advantage to the prosecution that is more than the obvious. It is not
simply that the prosecutor is spared the effort of calculating the defendant’s removable
assets: they, or their investigator, will still need to assess what assets the defendant
holds now, what they have received over the past six years (or more if the trial has been
lengthy) and what they have spent over the same period. This will be all the more
challenging where some, possibly even a large part, of the assets are located abroad: it
is well known that some jurisdictions are rather more cooperative with foreign
investigations than others. Rather, where the defendant has been convicted of acquisi-
tive crimes and has significant established assets, but there is doubt regarding what
level of benefit they actually derived from those crimes, the criminal lifestyle
provisions require the defendant to ‘explain or lose’. The Ibori proceedings, discussed
above, were a case in point. Ibori pleaded guilty to laundering £50 million derived from
fraud and was found to have assets that included a number of high-value real estate
properties in London and elsewhere and a number of luxury cars including a Bentley, a
fleet of Range Rovers and an armoured Mercedes Benz,30 as well as amassing a credit
card balance of £920,000, despite having an official salary of £4,000 per annum.31
However, his defence claimed that the prosecution had failed to show that he had
personally benefited from the fraud. Had the criminal lifestyle provisions been applied,
it would have been for Ibori himself, not the prosecution, to show how these assets,
including the credit card expenditure, had been funded.
This in turn raises a further issue. It highlights the problems that can be caused by
only certain money laundering offences being included in the list of specified criminal
lifestyle offences. Although transfer, conversion, concealment and removal from the
jurisdiction of criminal property under section 327 of the 2002 Act, as well as
facilitating another person’s benefit from criminal property under section 328, are
on the Schedule 2 list, acquisition, use and possession of criminal property under
section 329 are not. That is not to say that the presumptions can never be applied in
section 329 cases, but it does mean that, for them to be, either the defendant will need
to have been convicted of multiple offences or the prosecution must show that the
current offence was committed over a protracted period of time. Neither is necessary
following a conviction under either section 327 or 328. Yet acquisition, possession or
30
‘Former Nigeria governor James Ibori jailed for 13 years’, BBC News, 17 April 2012
<http://www.bbc.co.uk/news/world-africa-17739388> accessed 18 August 2014.
31
Mark Tran, note 14 supra.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
use are precisely the kind of money laundering offences with which Ibori and his like
are most vulnerable to being charged. While one could argue that houses, cars, and so
on represent conversion of criminal property, that is, from money to a house, car or
whatever, it may be more difficult to prove to a criminal standard that the conversion
took place in the United Kingdom; the purchases may have been made from abroad.32
In contrast, proceeds discovered in a U.K. bank account or houses, cars and the like can
much more easily be shown to have been received within the jurisdiction – and
certainly possessed and used there. If the criminal lifestyle provisions could be applied
following a conviction for a section 329 offence, the assets of such individuals could
much more simply be pursued.
Lest the extension of the criminal lifestyle provisions be considered a draconian step
too far, it must be remembered that, as stated above, the presumptions are rebuttable.
Although the burden of proof is on the defendant, section 10(6)(a) of the 2002 Act is
clear: no presumption is to be applied if it is shown to be incorrect. If the defendant
shows that a given asset has a legitimate origin, that asset is not subject to confiscation.
Although mention has been made of criminal property consisting of cars, houses and
the like as well as actual cash, it should be stressed that what is actually confiscated,
whether or not the criminal lifestyle provisions are applied, is the value of the assessed
property, not the property itself. This was remarked on in the recent case of R v Waya
(Terry).33 Often, this will make little difference. The only way that a defendant can
raise the funds necessary to meet the order may well be to sell the assets concerned.
Alternatively, if the defendant fails to pay, an enforcement receiver may take property
that has already been seized pending the confiscation order and sell it. However, if a
defendant does have sufficient funds from a legitimate source and chooses to use them
to pay the order rather than part with an asset that they particularly like, they are free
to do so. An example would be a senior officer of a financial institution convicted of
insider dealing or fraud who has significant assets derived from the salary from the
position which they abused to commit the offence.
Brief mention should be made of the position of victims of crime. Unlike some other
jurisdictions,34 the United Kingdom does not require confiscated funds to be used for
certain specific purposes.35 Rather, they are paid into the ‘Consolidated Fund’, in effect
for HM Treasury to use to whatever end it pleases.36 That purpose may be linked to law
enforcement; alternatively, it may be contributing to the building of a new railway line
or even simply reducing the deficit. It is not, however, the purpose of the Act that a
victim seeking compensation finds that, by the time a compensation order is made, all
32
In Ibori’s case, one of the properties and at least one of the cars were located in South
Africa and the purchase transactions may well have taken place there.
33
[2013] 1 AC 294.
34
For example, several U.S. states.
35
Other than expenses incurred during the confiscation process, such as the fees of
management receivers: ss.54 and 55.
36
http://www.parliament.uk/site-information/glossary/consolidated-fund/. Last accessed, 26
June 2015. The key exception to this is that part of the funds may be paid to the authorities of
another jurisdiction if either the offence was committed there or that jurisdiction has provided
assistance in the investigation. More recently, funds have also been allocated to community
projects or other “good causes”.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
assets that could have satisfied it have been confiscated. Section 13 of the Act therefore
provides that where the court finds that, following the making of a confiscation order,
the defendant will not have sufficient assets left to satisfy a compensation order in full,
the balance (i.e. the difference between the level of the compensation order and the
level of the remaining assets) is to be paid out of the confiscated assets. Nonetheless, it
should be considered in this context that under English criminal procedure, in contrast
to that of some civil law jurisdictions,37 the victim is not separately represented at the
offender’s trial and the amount awarded in a compensation order may therefore be less
than they might have received in a subsequent civil action.
At the other end of the scale is the power to award compensation to the alleged
offender. Although a confiscation order may only be made after a criminal conviction,
suspected assets may be seized, or an account frozen, before that as an interim measure
if there is reason to fear that they will otherwise be dissipated. This raises the question:
what if assets are seized, but the defendant is acquitted at trial? In many cases, the
answer is simple: the assets are returned or the freezing order lifted as the case may be.
But in others, the assets may have significantly deteriorated in value or the business
that they were used to fund gone into insolvency. Where, therefore, the defendant is
acquitted or their conviction is quashed on appeal or the investigation is dropped before
the matter even gets to trial, but, by then, they have suffered loss in relation to seized or
restrained property due to ‘serious default’ on the part of an investigating officer,
section 72 of the 2002 Act provides them with the right to compensation. A wide range
of investigating agencies are covered, including the police, the Crown Prosecution
Service, the National Crime Agency and even the immigration services.38 As with most
causes of action, the onus is on the person concerned to make an application, but if
they do so, the Crown Court is empowered to make the order. A similar power exists
under section 73 of the 2002 Act where a confiscation order is made but later amended
or discharged.
‘Serious default’ is not defined in the Act, nor has its meaning been clarified by the
judiciary: in the few cases in which section 72 has been considered, they focused on
other issues, such as whether a confiscation order should have been made at all,39
whether a private prosecutor is entitled under the 2002 Act to apply for such an order40
or who, when assets have been held by an appointed management receiver under an
order which should not have been made, should pay the management receivers’ fees.41
It was remarked in submissions in Crown Prosecution Service v Eastenders Group that
it is a high test to satisfy,42 but the Supreme Court did not comment on this in its
judgment. That such a provision for compensation exists at all, however, may be seen
by some as controversial. The author held ‘off the record’ conversations with senior
representatives of law enforcement from two other jurisdictions as to their view on
whether compensation should ever be paid in such circumstances. One remarked that if
37
For example, France.
38
The full list is set out in s 72(9).
39
Sumal & Sons (Properties) Ltd v Newham LBC [2013] 1 WLR 2078.
40
R v Zinga [2014] 1 WLR 2228.
41
Crown Prosecution Service v Eastenders Group [2015] AC 1.
42
Ibid. at p. 12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
a person is arrested on suspicion of a serious offence and held on remand for several
months, but then acquitted, they were not entitled to compensation either in his home
jurisdiction or in England and Wales; the same, he felt, should apply to wrongful
seizure of assets. Another took a rather more nuanced approach: precisely in order to
avoid the introduction of a provision like section 72 of POCA 2002, his agency had
offered a settlement in cases where it took the view that the assets should not have been
restrained. In England and Wales, the debate over how to balance the protection of the
innocent (or at least the acquitted – one must remember that a criminal conviction
requires a very high standard of proof) against the risk to the budgets of law
enforcement agencies, not least in an age of austerity, may well continue.
CIVIL RECOVERY
A chapter on the pursuit of criminal property would not be complete without at least
referring to the civil recovery regime, contained in Part 5 of the 2002 Act. This
provides that the National Crime Agency43 may bring civil proceedings to recover
proceeds of crime. The targeted property is termed ‘property obtained through unlawful
conduct’, but its definition is much the same as ‘criminal property’ discussed above.
The key feature is the civil standard of proof: not only must it be shown on the balance
of probabilities that the property to be removed is derived from a criminal offence, but
the same standard applies to showing that a criminal offence even occurred. Nor need
it be shown what type of offence gave rise to the property: it is sufficient to show, on
the balance of probabilities, that the property derived from one of a number of possible
activities, each of which is a criminal offence (or would be if it were committed in the
United Kingdom). Similarly, the criminal conduct may be that of the current holder of
the property or, alternatively, that of someone else: section 242 is clear that either will
suffice.
Such a wide-ranging provision might be expected to be a very powerful weapon
indeed against the proceeds of crime. Its effect, however, at least at present, is less
significant than its counterparts in some other jurisdictions. A key reason is that that it
is only to be used when there is no realistic prospect of the offender being convicted,
for example where they are deceased or, less extreme, in a jurisdiction that is unlikely
to extradite them.44 The policy is that asset recovery should not be used as a convenient
alternative to prosecution: criminals should be prosecuted and sentenced wherever
possible and their assets can then be removed through confiscation. The 2000 Report of
the Cabinet Office’s Performance and Innovation Unit, ‘Recovery of the Proceeds of
Crime’, referred to at the beginning of this chapter, made this very clear. It even
referred to cases in the United States, where, faced with a limited prosecution budget,
it was decided to prosecute a cannabis trafficker rather than a heroin dealer because the
43
Previously the Serious Organised Crime Agency and, before that, the Asset Recovery
Agency,
44
For a full discussion of this, see Anthony Kennedy, ‘Civil recovery proceedings under the
Proceeds of Crime Act 2002: The experience so far’ (2006) 9(3) JMLC 245.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
former had greater funds that could be forfeited.45 That said, at least two prosecutors in
the United States46 informed the author that the volume of forfeitable assets had never
been the decisive factor neither in their offices nor that of any other prosecutor’s office
that they had encountered. It would appear, therefore, that the British Government’s
concern was inspired by a fairly atypical case.
The reservation of civil recovery actions for cases where it has been accepted that a
criminal prosecution is unrealistic is, certainly, a marked contrast to the approach in the
United States. As has been stated directly by leading U.S. asset forfeiture specialist
Stefan Cassella:
Civil forfeiture is not part of a criminal case. In a civil forfeiture case, the Government files
a separate civil action in rem against the property itself, and then proves by a preponderance
of the evidence that the property was derived from or used to commit a crime. Because a civil
forfeiture does not depend on a criminal conviction, the forfeiture action may be filed before
indictment, after indictment, or if there is no indictment at all.47
Either/or it most definitely is not. A further contrast, however, is referred to rather more
obliquely in Cassella’s remarks: civil forfeiture can be and regularly is used to remove
not merely the proceeds of a crime but also any property that is used to commit it,
termed in U.S. forfeiture law the instrumentality. Although there are, as previously
referred to, specific cases where an instrumentality of a crime may be removed under
English law (and indeed that of the United Kingdom in general), they are the exception,
not the rule and furthermore do not form any part of the civil recovery regime. In Part
5 of the Proceeds of Crime Act 2002, as seen above, property liable to civil recovery is
‘property derived from unlawful conduct’, not property used to commit it. In contrast,
in the United States, property that forms the instrumentality of a crime will often be
very much the target of the civil forfeiture laws.48 Examples have included not only a
ranch used for drug trafficking but also the horses on the ranch as these, by providing
the superficial appearance of legitimate activity, were also held to facilitate the
45
It should here be clarified that the term ‘forfeiture’ has rather different meanings in the
United Kingdom and the United States. In the United Kingdom, it refers to: (1) the removal of
cash – but only cash – where a legitimate origin cannot satisfactorily be shown, (2) the removal
of assets which are unlawful by their very nature, such as contraband goods, illegal drugs and
firearms or pornographic material, (3) property used to commit certain very specific offences. In
the United States, in contrast, it refers to the removal of any property linked to crime, whether
proceeds, instrumentality or subject.
46
It is a common requirement imposed both on law enforcement officers and prosecutors in
the United States that any comments they make may not be attributed either to them personally
or to their agency/office. This applied to the two prosecutors referred to here.
47
Stefan D. Cassella, Asset Forfeiture Law in the United States (Juris, 2nd edition, 2013),
p. 14.
48
The United States does not have any all-encompassing civil forfeiture statute analogous to
Part 5 of the Proceeds of Crime Act 2002 in the United Kingdom, but rather has a very wide
range of different statutes covering property related to different specific crimes. Whether the
proceeds, instrumentality or both, can be forfeited will depend on the particular crime and
statute. See Cassella (2013) supra, pp. 4–5. The 1st edition in fact contains a CD supplement,
providing a chart of which statutes provide for the forfeiture of property related to which crimes.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
In themselves, however, even these four will not be sufficient; a fifth condition must
also be met: ‘it would not be just and equitable’ for the court to make the order. The
combination was described as ‘a high hurdle’ in the recent case of National Crime
Agency v Amir Azam and others (No. 2).51 Here, Kalsoom Sanam, the ex-wife of Amir
Azam, a man claimed by the National Crime Agency to have funded his assets through
drug dealing and money laundering, sought to oppose a civil recovery order in respect
of a house on the basis that that house would form the basis of a claim for financial
49
U.S. v Rivera 884 F.2d 544 (11th Circuit, 1989).
50
City of Portland v 1985 Porsche 944 924 P.2d 334 (Court of Appeals of Oregon, 1996).
51
[2014] EWHC 3573. High Court of Justice, Queen’s Bench Division, 30 October 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 16 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
provision following their divorce. Andrews J made it clear that she found Kalsoom a
completely innocent party and indeed had considerable sympathy for her:
She has done nothing to deserve the situation in which she has found herself. This is not the
case of a woman who was happy to live ‘high on the hog’ from the proceeds of crime with no
questions asked, turning a blind eye to where the money was coming from. … She genuinely
believed that Thurza Court was hers to keep as a wedding gift; that was what she was told by
both Mohammed [her ex-father-in-law] and Mr. Azam, although it was not in fact the truth.
… If the court had an unfettered discretion as to what should happen to the property
registered in her name, there would be much to be said for allowing her to keep it.52
She went on, however, to state clearly that the court in fact had no discretion at all:
either the conditions in section 266(3) and (4) were satisfied, in which case an order
must not be made, or they were not, in which case they must be. The innocence of the
holder of the property, or even any hardship that might be caused to them, was
irrelevant. In the present case, she found that Kalsoom had not taken any steps either
before obtaining the property or afterwards which she would not have done otherwise –
since she neither knew that she would receive the house until shortly before it was
transferred to her, nor was in a position to do much with it afterwards. Thus the
condition in section 266(4)(b) was not satisfied. Parliament had clearly intended the
exceptions set out in section 266(3) and (4) to be the only exceptions to the rule that
recoverable property was to be recovered and the court’s duty was to give effect to that.
CONCLUSION
In conclusion, the United Kingdom is equipped with significant measures to remove
criminal proceeds from offenders and those linked to them. In practice, however,
although there have been a number of successes, the record could be significantly
better: the Ibori case, in particular, has not proven the system’s finest hour. It is
suggested that amendment of the criminal lifestyle provisions, to include all money
laundering offences, would be a useful step forward. Another would be to have a group
of confiscation specialists within the Crown Prosecution Service, not merely the
National Crime Agency, and to place confiscation hearings in their hands rather than
the general prosecutors. This was hinted at four years ago in the Criminal Justice Joint
Inspection report; perhaps it is now time that it was implemented. As for civil recovery,
this is already in the hands of a specialist unit, the National Crime Agency, and the
recent case of National Crime Agency v Azam and others (No. 2) demonstrates that the
National Crime Agency has both the willingness and the ability to use the provisions
effectively. It could, however, be more effective if its use were widened. In the United
States, criminal prosecution and civil forfeiture work well under a ‘both and’ system
rather than ‘either/or’. Perhaps the United Kingdom could learn from this. The scope
for removal of the instrumentality of a crime could perhaps also be extended: the
offences whose instrumentality is currently liable to forfeiture in the United Kingdom
are few and a decidedly ‘mixed bag’.
52
Ibid. at paras. 66–67.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 14 / Date: 20/7
JOBNAME: Rider PAGE: 17 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
On the other hand, the Azam case does raise troubling questions about whether the
application of the civil recovery regime in the United Kingdom is unduly inflexible. In
the United States, although the innocent owner defence does not exist in the laws of all
states, it does in several, as it also does at Federal level. The Federal defence was
introduced as part of the Civil Asset Forfeiture Reform Act (CAFRA) of 2000, passed
in response to a perception that the previous system was on occasion abusive. It may be
that a similar review is required in the United Kingdom.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 36 /Pg. Position: 15 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
A criminal should not benefit from his crimes. The proposition has long been accepted,
but only in the last generation has it translated to an explicit feature of international
jurisprudence. A consensus has formed in support of the proposition that ownership of
wealth obtained through crime is a rescindable title. The mechanisms designed to bring
that proposition to effect can be considered under the headings of confiscation and
forfeiture.
Sticking with founding principles, there are two issues claiming early consideration.
The first relates to the nature of the mechanisms that enable a court to confiscate
wealth and force forfeiture. Are they a means of imposing further punishment against
the offender? Or are they instead actions to be focussed on the wealth itself, no matter
who owns it when the action is enforced? To embrace the Latin: are these actions in
personam, that is, against the person; or in rem, that is, against the thing or object or
amount of money that embodies the wealth?
The answer in practice is both: some of these mechanisms are in personam and some
are in rem. The significance of the distinction and how it is applied, however, is a
useful way into considering different approaches to confiscation and forfeiture: what
unites and what separates them, and what the key differences are.
The second issue relates to justification. What is the basis for the action being
undertaken in the first place? That a crime has been committed? That might seem
obvious; but in practice it is not actually so straightforward. What crime, for instance?
How do you attach the crime to the wealth being confiscated or forfeited? Is there even
a need to define or specify the crime that renders the wealth recoverable under these
mechanisms? If so: to what standard of proof?
Issues around justification remain contentious, but again offer a useful entry point to
understanding the key issues relating to confiscation and forfeiture that exercise the
minds of legislators, prosecutors, defenders, law enforcers, and also (let’s not forget!)
criminals everywhere.
462
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
orders applied against the person convicted. The basis of the confiscation order may
either be object based, with a value applied to specific assets proven to be the proceeds
of crime, or value based, using an assessment of the benefit obtained from the crime.
‘Forfeiture’ is taken to refer to mechanisms which are not conviction based – often
referred to in the literature as non-conviction based asset forfeiture. These are
mechanisms relying on civil process to assert legal title over property deemed to be
criminal on behalf of the state. These are therefore in rem measures against the objects
held to constitute criminally derived wealth; for example, cash deposits, cars, yachts,
racehorses, real estate and other forms of value investment.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
proof have been at least partially accommodated by the relevant courts to enable cross
border co-operation.1
The self-evident reality of globalisation is that a continuous increase in levels of such
co-operation is vital for the maintenance of any effective response to organised crime in
every jurisdiction. Criminals will continue to exploit borders to frustrate the objectives
of confiscation and forfeiture mechanisms. Improved understanding of how different
traditions interpret their international obligations is therefore clearly a necessary
ongoing cause. But that understanding is dependent on the ability to build international
consensus, which in turn might require settlement of some notable bones of contention.
1
For example, A_Company v. Federal Office of Justice ATF 132 II 178 (Switzerland).
2
Proceeds of Crime Act UK S75.
3
‘Draconian and Manifestly Unjust: How the Confiscation Regime Has Developed’, Sir
Ivan Lawrence QC Amicus Curiae, Issue 76, Winter 2008, 22–24.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
suffered by the state becomes enforceable in the normal way of a civil claim. This
interpretation has been challenged in the UK courts, but without success.4 The net
effect of the case law has been to establish that a confiscation order is a ‘penalty’ for
the purposes of European Convention on Human Rights (‘ECHR’) Article 7 (‘No
punishment without law’), but that the confiscation proceedings do not entail a
‘criminal charge’ for the purposes of Article 6 (‘Right to a fair trial’). This is despite
the fact that confiscation proceedings form a non-discretionary part of the sentencing
procedure following conviction. The conviction is regarded as one thing; asking the
court to assume identified property as criminal is regarded as another.5
4
Welch v the United Kingdom [1995] 20 EHRR 247.
5
R v Briggs-Price [2009] 1 AC 1026.
6
I am indebted in respect of this section to a succinct analysis of the relevant case law and
arguments included in his paper presented at the CBA Spring Conference at Newcastle in April
2012 by Rudi Fortson QC, entitled ‘Confiscation, Sentencing in Drug Cases, and Other “News”’.
7
Lord Rodger, para 65, R v Biggs-Price, ibid.
8
Gale v SOCA [2011] UKSC 49.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
9
Serious Crime Bill (HL), 2014, Chapter 2.
10
R v Banks [1996] EWCA Crim 1655. This quote is highlighted in a short survey by David
Winch, ‘Confiscation Contrasts – England v Scotland’, www.accountingevidence.com, October
2008.
11
R v Steed [2011] EWCA Crim 75.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
contention that ‘it was more likely than not that he was involved in criminal conduct
over and above the Count to which he pleaded guilty’.12
On appeal, these findings were considered ‘fatal’ to the defendant’s case. They
demonstrated that the appellant was unable to establish on the balance of probability
the extent to which sources of his assets and expenditure were legitimate and which
were illegitimate. Since he was unable to prove the relevant split the court was entitled
to assume it all constituted criminal benefit.13
The conviction for tax evasion was sufficient in this case to provide the key in the
door to the levelling of the lifestyle charges. This was despite the fact that the de
minimis requirement for the use of the lifestyle provisions was £5,000. This difficulty
was overcome by adding the following year’s assessed tax payable to the £3,558
already found to have been evaded. The defendant had not submitted a tax return for
that period either.
It was suggested afterwards that the use of an apparently token tax evasion charge in
these circumstances may have been to ‘free up resource’ in the prosecutor’s office by
avoiding the need to prove the underlying criminal offences, and that this might be
regarded as a new way of fining criminals without full complex trials.14 The obvious
response is that the prosecutor is bound to take all decisions on the basis of a judgment
on what serves the public interest. How that judgment might be affected by the
availability of confiscation and forfeiture mechanisms is a key consideration, however,
in developing consensus on how they should be used and in what circumstances. This
is considered more explicitly towards the end of the chapter.
There have been instances where the UK Court of Appeal has considered that the
prosecutor has stretched the intention of the relevant legislation too far. In Shabir v R,
it was held in the original case that the defendant, a dentist, had falsely inflated claims
made to the National Health Service for payment.15 The amount relating to the false
items claimed over six monthly claims was in total £464. Each of the monthly claims
had included legitimate items which had taken the total value of the six claims to
£179,731. The defendant was convicted of obtaining money by deception in respect of
six money transfers, totalling £179,731. As he had been convicted of six offences, and
the benefit of £179,731 exceeded the de minimis threshold of £5,000, the confiscation
mechanism was applied on the basis that it had been established by the rules of that
mechanism that the defendant had a ‘criminal lifestyle’.
This was too much for the Court of Appeal. It held that the true extent of the
offending was £464, quashed the confiscation order of £179,731, and replaced it with
one for £464 instead.16
The case perhaps illustrates that prosecutors are not above brazen opportunism (and
also that higher courts of appeal are not deaf to common sense), but again the issue of
12
R v Steed, ibid, Judgment, para 42 (a)–(c).
13
In R v Jatvinder Singh [2009] EWCA Crim 1095 paras 8–9, the court said, ‘Where there
is a mixed legitimate and illegitimate business … it is for the (defendant) to demonstrate what
those proportions are.’
14
Elspeth Orcharton, ‘Crime and Punishment’, CA Magazine, April 2011, Institute of
Chartered Accountant of Scotland.
15
Facts as related in Shabir v R [2008] EWCA Crim 1809.
16
Shabir v R, ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
motive lurks in the background. In England, prosecutors are able to lay claim to some
18 per cent of recovered criminal funds. There is therefore an incentive to seek value
from cases, wherever it might be deemed to be had. It is hard to imagine that in this
case the monetary ‘prize’ did not have a bearing on the decision to attempt confiscation
of the higher number.
17
RICO was enacted by section 901(a) of the Organised Crime Control Act of 1970,
codified as Chapter 96 of Tile 18 of the United States Code.
18
The Proceeds of Crime Act 1996 (Ire).
19
The Criminal Assets Bureau Act 1996 (Ire).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
orders of some 57 million Euros, and tax payments of some 137 million Euros.20 This
success, at least initially, overshadowed the use of the criminal process, and left CAB
open to the criticism that it was operating outside the basic tenets of Human Rights –
in particular those relating to presumption of innocence and the right to a trial by jury.
Was this not essentially a process of criminal sanction that escaped the obligations of
the criminal standard of proof (i.e. beyond reasonable doubt)?
These criticisms have been tested extensively in the Irish and European courts, and
the CAB mechanism has proven resilient. In particular, it has established beyond
further challenge that it is a civil and not a criminal process. Like RICO in the US, the
statutory objective of CAB is to deprive access to criminal assets, and therefore falls to
be considered a punitive rather than a criminal process. There is a separate post-
conviction criminal confiscation process in which CAB has no role, and, where the two
processes arise in the same case, there is a specific provision that the criminal
confiscation route takes precedence.
As to its essential fairness, the Irish Supreme Court gave its settled view in 2012 as
follows: ‘… as has been pointed out, repeatedly, a person directly or indirectly in
possession of the proceeds of crime can have no constitutional grievance if deprived of
their use.’21
The same judgment went on to assert that the relevant provisions of the Proceeds of
Crime Act 1996 were ‘… designed to achieve a desirable social objective and be
proportionate’.22 An essential feature underpinning this objective, therefore, is that the
public purse is the beneficiary and not CAB itself, an issue of some sensitivity in
adjacent jurisdictions.
20
CAB Statistics, Irish Examiner and Francis H. Cassidy, ‘Targeting the Proceeds of Crime:
An Irish Perspective’ published in ‘Stolen Asset Recovery’, Theodore S. Greenberg et al, World
Bank 2009.
21
CAB v Kelly & another [2012] IESC S64.
22
ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Public trust in criminal justice can be reckoned to depart at the point non-conviction
based forfeiture starts to be perceived as a substitute for criminal prosecution. If the
state’s activity in crime can be reduced, even if in caricature, to an exercise in state
revenue raising, then domestic consent and the scope of international co-operation will
evaporate. The sense that you can buy yourself out of prosecution and its consequences
23
‘Public Attitudes to Asset Recovery and Awareness of the Community Cashback Scheme
– Results from an Opinion Poll’ Eva Gottschalk (Research and Analysis Unit – Home Office)
September 2012.
24
www.scotland.gov.uk/Proceeds of Crime and Asset Recovery.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
is not something that nation states can afford to take root, being essentially the first
cousin of corruption.
In Scotland, the decision to refer cases to the asset forfeiture agency (known as the
Civil Recovery Unit (‘CRU’)) rests with the national prosecuting agency (The Crown
Office and Procurator Fiscal Service ‘COPFS’). The prosecutor takes responsibility for
the relevant decision by applying well understood criteria used in considering prosecu-
tions. These are: (a) there is a reasonable prospect of conviction; and (b) the
prosecution is in the national interest. The referral by COPFS to the CRU embodies the
decision that on current evidence there is no feasible prosecution. The primacy of
criminal prosecution is thereby recognised and the process for transferring a case from
this sphere to civil asset recovery is commonly understood. The clarity of this process
sustains confidence in the criminal justice system and enables the civil recovery process
to engage with clarity of remit. The risk of civil recovery becoming a fast track to
disposal of difficult cases where there are assets to be had is practically and visibly
managed and the respective workings of the prosecution mechanism and the non-
conviction based asset recovery mechanism are distinct and clear.
The debate concerning appropriate standard of proof in asset recovery has been
exhaustively tested in transnational courts, in particular the European Court of Human
Rights. The settled view is that the civil standard is appropriate, which is not to ignore
that in some civil law jurisdictions, such as Switzerland, the criminal standard of
‘intimate conviction’ will continue to be applied. The difference has not proved
insurmountable in enabling co-operation between states of different jurisdictional
tradition, such as the US and Switzerland. The legitimacy of using this standard,
however, would soon erode if the primacy of criminal process was perceived as being
undermined in those jurisdictions which exercised the civil proof consensus.
The fiscal benefits of allowing direct incentivisation are not easily dismissed. The most
significant barriers to effective prosecution of serious economic crime are resource
based – principally, the availability of the relevant, generally expensive, skills.
Incentivisation provides a solution that has the potential to make all of the regimes and
mechanisms discussed more effective and more capable of serving public benefit.
There are pitfalls of course to allowing the relevant agencies to operate apparently in
the manner of a profit maximising private enterprise. But rather than closing off the
option and the benefits it can provide, the introduction of such schemes can be rendered
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
palatable, not to say safe, through properly manned and funded independent account-
ability mechanisms with a remit of maintaining public confidence in the relevant
criminal and civil processes and possessing suitable discretionary reproving powers.
IN CONCLUSION
The idea of depriving criminals of their assets has taken root in all the major
jurisdictions. Informal networks like CARIN (Camden Assets Recovery Interagency
Network) have emerged to share experience, consider best practice and develop a pool
of international expertise. The continued development of confiscation and forfeiture as
principal tools deployed against organised crime will depend upon the continued
development of this shared expertise to the extent that the levels of capability are
achieved that match the skills available to modern criminality. That means resourcing
will become more prominent as an issue and the debate will deepen about how the
ethical purpose of justice based systems can accommodate the revenue raising function
they increasingly, at least in some cases, resemble. One thing is certain: no lasting
progress will be made unless it is on the basis of securing and developing international
consensus.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 37 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
ORIGIN
Modern day money laundering offences derive from three main sources.
1. International Conventions
The provisions of these conventions may have direct or indirect effect depending upon
the constitutional law of the signatory state. The main treaties dealing with money
laundering are as follows:
2. Inter-governmental Bodies
The Financial Action Task Force (“FATF”) is a policy making inter-governmental body,
which issues Recommendations and other guidance aimed at combating money
laundering.7
1
I am most grateful for the invaluable assistance of Gary Balch, Shane Nainappan, Jeremy
Rawlins, Ryuji Hirako and Yuichiro Tachi who have assisted me with my research for this
chapter.
2
The United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic
Substances, Vienna, 1988.
3
The United Nations Convention against Transnational Organized Crime, Palermo, 2000.
4
As above, at Article 2(a).
5
As above, at Article 2(b).
6
The Council of Europe Convention on Laundering, Search, Seizure and Confiscation of
the Proceeds from Crime, Strasbourg, 1990, and the Council of Europe Convention on
Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing
of Terrorism, Warsaw, 2005. It is of interest to note that not all the signatories to Council of
Europe conventions are European. For example, the Strasbourg Convention has also been ratified
by and is in force in Australia. Not all countries are yet signatories to both conventions.
7
http://www.fatf-gafi.org/pages/aboutus/.
473
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
FATF members currently represent most major financial centres in the world.8
Countries wanting to become FATF members must provide a written commitment at
the political/Ministerial level, to include the endorsement and support of the Recom-
mendations, which they are expected to implement in domestic legislation. Members
must also agree to be monitored by way of mutual evaluations to ensure compliance
with FATF Membership Criteria.9
The provisions in some jurisdictions might extend beyond that required under inter-
national law or expected pursuant to, for example, the FATF Recommendation.
INTERNATIONAL LAW
Article 3 of the Vienna Convention includes the money laundering provisions. Article 6
of the Palermo Convention covers the same. Although worded slightly differently, in
part because of the Conventions’ different aims, it can be seen in these provisions that
each party to the Convention must establish domestic criminal offences for the
following types of money laundering, when committed intentionally:
The requisite level of mens rea under the provisions of both Conventions is knowledge
– in the case of the Palermo Convention knowing that the property is the proceeds of
transnational organised crime and in the case of the Vienna Convention knowing that
the property is derived from a specified drug trafficking offence.
8
At present there are 36 members of FATF – 34 countries and two regional organisations,
the European Commission and the Gulf Cooperation Council. Associate Members cover much of
the remainder of the world, including the Asia/Pacific Group on Money Laundering, Caribbean
Financial Action Task Force, Eurasian Group, Eastern and Southern Africa Anti-Money
Laundering Group, Financial Action Task Force on Money Laundering in South America, Inter
Governmental Action Group against Money Laundering in West Africa, and the Middle East and
North Africa Financial Action Task Force. A number of other organisations and governmental
bodies have observer status. For an up-to-date list, see http://www.fatf-gafi.org/pages/aboutus/
membersandobservers/.
9
http://www.fatf-gafi.org/pages/aboutus/membersandobservers/membershipprocessand
criteria.html.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
FATF RECOMMENDATIONS
The FATF Recommendations adopt the basis of the Palermo and Vienna Conventions
but extend them to a far wider number of offences than to mere transnational organised
crime or drug trafficking. Recommendation 3 states that
Countries should criminalise money laundering on the basis of the Vienna Convention and the
Palermo Convention. Countries should apply the crime of money laundering to all serious
offences, with a view to including the widest range of predicate offences.10
Not all FATF members have yet complied with implementing the Vienna and Palermo
Conventions. For example, Japanese legislation was not considered to be Palermo
Convention compliant in the 2008 FATF Mutual Evaluation Report.11 Article 60 of the
Japanese Criminal Code (Punishment of Co-principals) required the
actions of at least one member of the group to rise [sic]the group to the level of an attempt to
commit the agreed upon crime … Absent an action which can be punished as an attempt by
at least one member of the group, common planning and preparations to commit a crime are
not punishable.12
Corrective legislation was before the Diet. It was also noted that although signed, Japan
had not yet ratified the Palermo Convention. These issues have still not been resolved.13
The Interpretive Note to Recommendation 3 of the FATF Recommendations explains
that:
10
FATF “International Standards on Combating Money Laundering and the Financing of
Terrorism and Proliferation: The FATF Recommendations” (February 2012), at page 12, found
at http://www.fatf-gafi.org/topics/fatfrecommendations/documents/internationalstandardson
combatingmoneylaunderingandthefinancingofterrorismproliferation-thefatfrecommendations.
html.
11
Third Mutual Evaluation Report: Anti-Money Laundering and Combating the Financing
of Terrorism –Japan (FATF, 17 October 2008), at paragraphs 944–949.
12
As above, summarised at paragraph 186.
13
For the continued lack of a conspiracy offence, see the Japan Times report “Conspiracy
law in the works, Japan tells FATF” (19 January 2014) which details that the Bill before the Diet
was defeated, found at: http://www.japantimes.co.jp/news/2014/01/19/national/conspiracy-law-
in-the-works-japan-tells-fatf/#.U-XOBLQQFkU. For the continued failure to ratify the Palermo
Convention, see “FATF calls on Japan to enact adequate anti-money laundering and counter
terrorist financing legislation” (FATF, 27 June 2014) found at: http://www.fatf-gafi.org/countries/
j-m/japan/documents/japan-aml-cft-deficiencies.html.
14
As above, footnote 10, at page 34, paragraph 2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
… all offences that fall within the category of serious offences under their national law, or
should include offences that are punishable by a maximum penalty of more than one year’s
imprisonment, or, for those countries that have a minimum threshold for offences in their
legal system, predicate offences should comprise all offences that are punished by a minimum
penalty of more than six months imprisonment.15
1. The offence of money laundering should extend to any type of property that
directly or indirectly represents the proceeds of crime.18
2. It should not be necessary that a person be convicted of a predicate offence.19
3. Predicate offences to extend to conduct that occurred in another country, subject
to a dual criminality provision.20
4. There is no requirement for money laundering offences to apply to persons who
committed the predicate offence, where required by the fundamental principles of
a country’s domestic law.21
15
As above, at page 34, paragraph 3.
16
As above, at page 34, paragraph 4.
17
As above, at page 113. Its inclusion in the 2012 FATF Recommendations is detailed in the
FATF Annual Report 2012–2013 (FATF/OECD, 2013).
18
As above, at page 34, paragraph 4.
19
As above, at page 34, paragraph 4.
20
As above, at page 34, paragraph 5.
21
As above, at page 34, paragraph 6.
22
Note laws rather than criminal offences, as is required for concealing etc. in FATF
Recommendation 3.
23
In England and Wales, see sections 330–332 and 333 of the Proceeds of Crime Act 2002.
In the United Arab Emirates there is a failing to report offence (Articles 15 and 7) and a
tipping-off offence (Article 16) in relation to suspicious transactions, the Article numbers
relating to the Federal Law No (4) of 2002 Regarding Criminalization of Money Laundering.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Group, which is an Associate Member of FATF.24 In this report it was said that a breach
of the prohibition on tipping off in Angolan law “is sanctioned by an administrative
penalty” of between US$12,500 and US$2,500,000 for a natural person and double that
for a financial institution. The report concluded that “[c]onsidering the level of income
in Angola, these penalties are considered adequate and dissuasive”.25 A criminal
sanction only existed for revealing or facilitating the disclosure of the identity of the
reporting person. So although many countries criminalise tipping off or failing to report
by financial institutions, it is not necessarily a requirement of the FATF Recommenda-
tions that this be the case.
Whoever acquires, possesses, uses, converts, or conveys assets, knowing they originate from
a criminal activity, committed by himself or by any third party, or who perpetrates any other
act to hide or conceal their unlawful origin, or to aid the person who participated in the
felony or felonies to avoid the legal consequences of his acts, shall be punished with …26
In other countries, domestic criminal law extends beyond that required under inter-
national law or through FATF Recommendations. Two examples are as follows.
1. Mens Rea
In the United Kingdom the requisite level of mens rea required to commit the offence
of money laundering is just suspicion. The relevant section within England and Wales
is section 340(3) of the Proceeds of Crime Act 2002, which defines criminal property
for the purposes of the money laundering offences contained within sections 327–329
of the Act (amongst others):
24
Mutual Evaluation Report: Anti-Money Laundering and Combating the Financing of
Terrorism – Republic of Angola (Eastern and Southern Africa Anti-Money Laundering Group,
October 2012), see Title Page 2.
25
This flexible standard of penalties dependent upon the country can be conversely
demonstrated with the example of Japan. The 2008 FATF Mutual Evaluation Report on Japan
noted with regard to the penalties for concealment/receipt money laundering offences at
paragraph 199 that “While both comparatively light punishments and harsh punishments
(imprisonment with labour) seem to be provided, there does not appear to be an adequate middle
ground. While these two types of punishments can be sentenced separately or together, there
does not appear to be a punishment available which a rich individual would find dissuasive
below the threshold of imprisonment with labour.”
26
Organic Act 10/1995, dated 23 November, on the Criminal Code, as published in the
Official State Gazette for Spain number 281 on 24 November 1995. This translation is of the
2011 Criminal Code, as found at http://www.legislationline.org%2Fdownload%2Faction%
2Fdownload%2Fid%2F5160%2Ffile%2FSpain_Criminal_Code_Codigo_Penal.pdf.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 5 / Date: 14/10
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Lowering the standard of mens rea prevents defendants from arguing that although they
suspected or believed they were laundering funds, they did not actually know that this
was the case. On the other hand, difficulties can arise.
First, there may be difficulties with mutual legal assistance if the overseas state
cannot find dual criminality.
Second, it may be that offences such as conspiracy to commit money laundering still
require a higher standard of proof. This was the case in the English House of Lords
case of Saik,27 in which it was found that although “[r]easonable grounds for suspicion
are enough for the substantive offence of laundering money”28 the mental element
required for a conspiracy under English law was “intention or knowledge that a fact or
circumstances necessary for the commission of the substantive offence will exist”.29 In
conspiracy cases, mere suspicion was not enough – “a decision to deal with money
suspected to be the proceeds of crime is not the same as a conscious decision to deal
with the proceeds of crime”.30
2. Specific Offences
Some countries have heightened sentencing powers and separate offences for niche
wrongdoing. Such offending can be explicitly criminalised. For example, in Japan there
is a very complicated criminal provision at Article 9 of the Act on Punishment of
Organized Crimes and Control of Crime Proceeds (established in 1999)31 running in
length in the English translation to around a thousand words. In short,32 Article 9
makes it an offence for a shareholder to control a company using criminal proceeds
from specified offences, in particular where such property is indistinguishably mixed
with other kinds of property. One of the purposes of this Article is to increase the
sentencing powers available. Whereas such offending could also be caught by the
standard concealment offence found at Article 10 (the sentence for which is a minimum
of five years and/or 3,000,000 yen) or the receipt of criminal proceeds offence found at
Article 11 (the sentence for which is a minimum of three years and/or 1,000,000 yen),
the Article 9 offence carries a minimum sentence of five years and/or 10,000,000 yen.
27
[2007] 1 A.C. 18 (HL).
28
As above, at paragraph 1.
29
As above, at paragraph 7.
30
As above, at paragraph 32.
31
I use a “Tentative Translation” available at the OECD website found at www.oecd.org/
site/adboecdanti-corruptioninitiative/46814471.pdf.
32
Though the Article is obviously much more complicated than this
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
SPECIFIC ISSUES
There are a number of specific issues with money laundering offences that are either
important or interesting to consider. I will be focusing in particular on the laws of the
United Kingdom, the United States of America, Japan and the United Arab Emirates.
As detailed above, and as permitted by FATF, there is some variation as to the predicate
offences required for a money laundering offence to be committed in each jurisdiction.
In the United Kingdom, the approach is open-ended. The proceeds of any crime,
wherever committed in the world, can be laundered, subject to dual criminality. For
England and Wales, this can be seen at section 340(2) of the Proceeds of Crime Act
2002 which states:
In the United Arab Emirates and Japan, there is a list of specified offences.34 The
United Arab Emirates however takes an interesting approach. Article 1(2)(g) of Federal
Law No (4) of 2002 regarding Criminalization of Money Laundering includes as a
specified offence for money laundering “[a]ny other related offences referred to in
international conventions to which the State is a party”. This is a flexible approach that
assists the United Arab Emirates in being as compliant as possible with its international
obligations.
In the United States of America, there is also a list-based approach to predicate
offences. The laundering must relate to a “Specific Unlawful Activity” or “SUA”. The
list of SUAs is set forth in 18 U.S.C. § 1956(c)(7), which cross-references another SUA
33
Directive 2005/60/EC of the European Parliament and of the Council of 26 October 2005
on the prevention of the use of the financial system for the purpose of money laundering and
terrorist financing. Draft legislation was approved by the European Parliament for a Fourth
Anti-Money Laundering Directive in March 2014; however, the final test is yet to be finalised.
34
In the United Arab Emirates, see Article 2 of Federal Law No (4) of 2002 Regarding
Criminalization of Money Laundering (updated 10 February 2002, but understood to be recently
updated to meet the FATF Recommendations. This is apparent from UAE Anti-Money Launder-
ing Draft Law Amended (The National, 20 April 2014) found at http://www.thenational.ae/uae/
government/uae-anti-money-laundering-draft-law-amended. In Japan, see Article 2 of the
Schedule to the Act on Punishment of Organized Crimes, Control of Crime Proceeds and Other
Matters; the list of specified offences is quite extensive running to 68 paragraphs, many of which
contain multiple qualifying offences. Obviously, the Japanese Anti-Drug Special Provisions Law
containing money laundering provisions relates to specific offences.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
list at 18 U.S.C. § 1961. Certain foreign predicate offences can form the basis of a
money laundering charge pursuant to § 1956(c)(7)(B), as long as the requisite financial
transaction occurred in whole or in part in the United States of America. The defendant
must have known that he was conducting a transaction with the proceeds of some form
of unlawful activity, although he does not need to know precisely which unlawful
activity on the SUA list produced the proceeds. It is not therefore a defence to money
laundering for the defendant to say “I didn’t know it was drug money; I thought it was
the proceeds of insurance fraud.”
It is one thing to have a list of crimes that can constitute predicate offences, but what if
the prosecution cannot prove the specific offence that the money is supposed to have
derived from? There is again a variety of positions throughout the world.
The United States of America has a strong position on this issue. The Government
need not trace laundered funds to a particular offence (e.g. a specific instance of drug
dealing on a certain date and time).35 The Government only needs to prove that the
money came from a category of offences such as drug dealing or mail fraud; in other
words, that the money is the proceeds of some specific unlawful activity.36 The
Government may rely upon circumstantial evidence, such as the defendant’s involve-
ment in criminal activity, a lack of legitimate income, a history of using the proceeds of
crime to purchase personal items and so on, to prove that funds are the proceeds of
criminal activity.37 Courts have consistently held that evidence of a lack of legitimate
income is enough to establish the proceeds element.38 In addition, the jury does not
even need to be unanimous as to which specified unlawful activity was the source of
the laundered funds.39
In the United Kingdom, the position is even stronger in the criminal courts. As well
as being able to prove the predicate offence by showing that it derives from unlawful
conduct of a specific kind or kinds, it will also suffice to provide “evidence of the
circumstances in which the property is handled which are such as to give rise to the
irresistible inference that it can only be derived from crime”.40 There is therefore not
even a requirement to prove a category of offending. Obviously, this is more easily
facilitated in a jurisdiction which does not have a list-based approach to predicate
offences. Such irresistible inferences cannot however be reached in the same manner in
non-conviction based forfeiture proceedings, where money laundering is said to be the
unlawful conduct. Such action is taken under Part 5 of the Proceeds of Crime Act 2002
(which deals with civil recovery and cash forfeiture). In these non-conviction based
35
United States v. Jackson, 983 F.2d 757, 766 (7th Cir. 1993).
36
United States v. Mankarious, 151 F.3d 694, 702 (7th Cir. 1998).
37
United States v. Shafer, 608 F.3d 1056, 1067 (8th Cir. 2010); United States v. Eastman,
149 F.3d 802, 804 (8th Cir. 1998).
38
United States v. Hardwell, 80 F.3d 1471, 1483 (10th Cir. 1996); United States v. Eastman,
149 F.3d 802, 804 (8th Cir. 1998); United States v. Taylor, 239 F.3d 994, 999 (9th Cir. 2001);
United States v. Souffrant, 517 Fed. Appx. 803, 821 (11th Cir. 2013).
39
United States v. Loe, 248 F.3d 449, 468 (5th Cir. 2001).
40
R v. Anwoir [2009] 1 W.L.R. 980 (CA), at paragraph 21.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
proceedings, the applicant must “show that the property seized was obtained through
conduct of one of a number of kinds each of which would have been unlawful
conduct”.41
In the United Arab Emirates, the legislation is not clear on this point. Article 2(1) of
Federal Law No (4) of 2002 regarding Criminalization of Money Laundering states that
a person must intentionally convert, transfer, conceal, and so on, property derived from
an offence specified in Article 2(2) but gives no guidance as to what the position is if
alternatives are alleged. In addition, the legal system in the United Arab Emirates is not
based upon the common law doctrine of binding precedents. The view of the Crown
Prosecution Service Liaison Magistrate in the United Arab Emirates is that “[i]n
practice the State will need to prove the predicate offence” and that “[m]ere inference
relating to a ‘category’ of offences in a broad sense is unlikely to be sufficient – unless
you have a Judge who is willing to adopt a ‘wider’ definition”.
The position in Japan is not dissimilar – again this is a jurisdiction with a list-based
approach of specified predicate offences. The view of two Prosecutors in the Tokyo
District Prosecution Office’s Special Investigation Unit is that “[t]he court requires
[the] prosecutor to clarify the contents of [the] predicated offence because predicated
offences are limited in Japanese legislation”. In general, the prosecutor has to show “by
whom, when, where, [and] how … the alleged proceeds was [sic] made. It is not
enough for [the] prosecutor to point the category of predicated offence or criminal
origin of the proceeds. In addition [the] prosecutor has to prove the mens rea that [that]
defendant knew the proceeds was derived from specific crime”.
3. Tax Offences
As noted above, in 2012, the FATF Recommendations included for the first time within
the designated categories of cases “tax crimes (related to direct and indirect taxes)”
and, according to the Interpretive Note to Recommendation 3, “each country should, at
a minimum, include a range of offences within each of the designated categories of
offences”. Also included for tax purposes within the FATF Recommendations is
“smuggling; (including in relation to customs and excise duties and taxes)”.
There is, however, considerable variance between jurisdictions as to how tax offences
are dealt with in money laundering cases, and a number of difficulties can arise, no
doubt in part due to this international obligation being only recently formed.
In the United Kingdom, domestic law “recognises that the proceeds of crime can
include not just specified money or property, but also a pecuniary advantage, such as
not paying tax that is lawfully due”.42 By way of contrast, where an overseas authority
seeks confiscation assistance from the United Kingdom in a tax evasion case, the
United Kingdom does not appear to be able to assist. There is reference only to benefit
41
Angus v. United Kingdom Border Agency [2011] E.W.H.C. 461 (Admin) at paragraph 29
– a cash forfeiture case. For civil recovery cases, see The Director of Assets Recovery Agency v.
Green [2005] E.W.H.C. 3168 (Admin).
42
From paragraph 107 of the Explanatory Notes to the Serious Crime Bill 2014–15. For
England and Wales, see sections 76(4) and (5) of the Proceeds of Crime Act 2002 and the House
of Lords case of R v. Smith (David Cadman) [2002] 1 W.L.R. 54.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
and not to a “pecuniary advantage” within the governing legislation.43 The United
Kingdom is seeking to correct this potential loophole within the Serious Crime Bill
2014–15.44
The position is different in the United Arab Emirates, which has no direct tax and, as
a consequence, no tax offences. There is therefore an issue when dealing with the
laundering of some foreign “tax proceeds” and it adds an extra dimension when the
United Arab Emirates deals with mutual legal assistance requests for assistance in
overseas tax cases. In addition, the UAE law on international cooperation45 states at
Article 53 that:
The request of the judicial assistance may be denied in the following instances:
1 – If the act on which the request is based does not constitute a crime if it is committed
in the State territory …
… 4 – If the request is related to an absolute financial crime (such as taxation and customs
crimes).
Of course, the above is only discretionary, but it may cause difficulties. It may be that
some tax offences could be described as equivalent to a “fraud”, which might assist.
In Japan, the Schedule to the Act on Punishment of Organized Crimes and Control of
Crime Proceeds, as described above, does not include tax evasion within its long list of
specified offences.
In the United States of America, tax evasion on legal source income is also not a
specified predicate offence, whether for foreign or domestic money laundering.
However, it should be noted that pursuant to 18 U.S.C. § 1956(a)(1)(A)(ii), any person
who, knowing that the property involved in a financial transaction represents the
proceeds of some form of unlawful activity, conducts or attempts to conduct such a
financial transaction which in fact involves the proceeds of a specified unlawful activity
with the intent to violate section 7201 of the Internal Revenue Code (tax evasion) is
guilty of a money laundering offence. It is understood that this “intent” is rarely
charged and in any event requires approval from the Department of Justice’s Tax
Division. Thus, while intent to evade taxes on illegal-source income can be a
motivation for money laundering, “laundering the proceeds of tax crimes” does not
violate US anti-money laundering laws in their current form.
43
Part 11 of the 2002 Act, in particular section 447, and the Proceeds of Crime Act 2002
(External Requests and Orders) Order 2005, in particular articles 7–8, 21–22 and Chapter 4.
44
Paragraph 109 of the Explanatory Notes to the Serious Crime Bill 2014–15 states that
“[n]ew subsection (6A) of section 447 of POCA provides that the value of any pecuniary
advantage obtained as a result of criminal conduct is to be treated as if it were a sum of money
to the same value. The effect is to enable external orders to be used for the recovery of a
pecuniary advantage obtained by criminal conduct in the same way as such orders can currently
be used to recover property or sums of money.”
45
Federal Law No 39 on International Judicial Co-operation in Criminal Matters (issued on
31 October 2006).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
4. Self-laundering
Another area with variance between jurisdictions, albeit decreasingly so, is whether or
not a defendant can commit a money laundering offence when laundering the proceeds
of his own crime.
In the United Kingdom, the United Arab Emirates and the United States of America
there is no requirement within the domestic legislation for laundering to be of a third
party’s assets. Self-laundering is a criminal offence.46 By way of contrast, in Germany
there is no criminal liability for self-laundering.47
The position in Japan is that self-laundering is an offence but not in all situations:
The perpetrator of the predicate offence is not punishable under Japanese law for the initial
acquisition, and subsequent possession and use of the proceeds of a predicate offence … For
the initial perpetrator of a predicate offence, the property in question is not (yet) derived from
a predicate offence, but is the object of the predicate offence. Acquisition, use and possession
of the object of the predicate offence, by its perpetrator, are therefore part and parcel of
committing the predicate offence … The initial perpetrator only commits a money laundering
offence by attempting to hide the criminal origin of the proceeds, which is adequately
covered by the Japanese Law.48
By way of contrast, see two other jurisdictions where the position is less clear. First, in
Iceland, the position on self-laundering was reported in the last FATF Report in 200649
as being unclear:
Legal practice has been based on the principle that it is not possible to convict the same
individual for the further exploitation of the gains of a criminal act, and in particular an
offence of an economic nature, following a conviction of that individual for the original
offence. However, Icelandic authorities believe that it is possible under the current legislation
to convict someone at the same time of both of the predicate offence and money laundering,
although no judicial rulings have been passed resolving this point finally.50
Second, in China, the position is more clear-cut the other way. As FATF explain in their
Mutual Evaluation Report on China,51 “[a]ll three money laundering offences apply to
46
See the lack of such a requirement in the wording of sections 327–329 and 340 of the
Proceeds of Crime Act 2002 for England and Wales as representative of laws within the United
Kingdom; 18 U.S.C. § 1956(c)(9) for the United States of America; and Articles 1 and 2 of
Federal Law No 4 of 2002 regarding Criminalization of Money Laundering for the United Arab
Emirates.
47
Mutual Evaluation of Germany: 3rd Follow-Up Report (FATF, June 2014); see page 7
where it is noted that draft legislation to address this point “should be presented to the
Bundestag by the end of 2014”.
48
See the FATF Mutual Evaluation Report on Japan as referred to above, at paragraphs
179–183.
49
Third Mutual Evaluation Report: Anti-Money Laundering and Combating the Financing
of Terrorism – Iceland (FATF, 13 October 2006). There has been no FATF Report since to
determine if this is still the position.
50
Above at page 5.
51
First Mutual Evaluation Report: Anti-Money Laundering and Combating the Financing of
Terrorism – China (FATF, 29 June 2007).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
In summary, although there is increasing international convergence as to what domestic
money laundering offences should cover, significant variations remain between the
jurisdictions. Where differences remain, so too does the potential for the more liberal
jurisdictions to become the forum of choice for money launderers. In addition, dual
criminality problems may arise when requests for mutual legal assistance are made.
52
See above at paragraph 90.
53
See above at paragraph 90.
54
See above at paragraph 93.
55
See above at paragraph 93.
56
Mutual Evaluation 8th Follow-Up Report: Anti-Money Laundering and Combating the
Financing of Terrorism – China (FATF, 17 February 2012).
57
See above at paragraph 60.
58
See above at paragraph 60.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 38 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
This chapter examines one particular aspect of the anti-money laundering framework in
the United Kingdom1 which has proved problematic in practice. It focuses on the part
of the anti-money laundering framework which requires, in appropriate circumstances,
the making of suspicious transaction reports coupled with the need to obtain consent to
proceed with transactions. It also considers the potential problem of tipping off after a
report has been made. It then considers whether this rather complex and cumbersome
regime is actually making an effective and balanced contribution to the fight against
organised crime and money laundering.2
Although the focus of the chapter is on the current position in the UK, it is necessary
to study the development through the various international efforts, in particular by first
of all examining the pioneering work of the Financial Action Task Force on Money
Laundering in issuing its Recommendations3 in relation to making suspicious activity
reports. This will then be followed by an exploration of developments at the European
Union4 level in response to the FATF Recommendations. The position the UK will then
be examined.
As will be seen later in the chapter, what is in place is a complicated anti-money
laundering framework which is no longer concerned simply with banks and other
financial service providers, but also with a wide range of professionals such as lawyers
and accountants, as well as other types of businesses such as bureaux of exchange and
even casinos.5 The legal and regulatory framework which the UK has in place is
intended to be in compliance with both the FATF Recommendations and European
Directives. It is no surprise that the framework is really complicated, and for those in
1
Hereafter ‘UK’.
2
This is a continuation of our work on this topic and considers further some of the matters
contained in our earlier publication: A. Campbell and E. Campbell ‘Solicitors and Complying
with the Anti-Money Laundering Framework: Reporting Suspicions, Applying for Consent and
Tipping-off’ in N. Ryder, U. Turksen and S. Hassler (Eds) Fighting Financial Crime in the
Global Economic Crisis (Routledge, 2014), Chapter 6 110; see also the Editorial ‘Some
Thoughts on Reporting Suspicions, Applying for Consent and Tipping-off’ in (2014) 17.3
Journal of Money Laundering Control 258.
3
Hereafter ‘FATF’ and the ‘FATF Recommendations’.
4
Hereafter ‘EU’.
5
The FATF and the global anti-money laundering efforts resulted from a meeting of the G7
in France in 1989. The G7 group of Ministers consisted of the leaders of the following countries:
Canada, France, Italy, Japan, United Kingdom, United States and West Germany.
485
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the regulated sector,6 compliance is both an expensive and time consuming business.
According to Colin Tyre, complying ‘with the statutory anti-money laundering regime
has imposed a heavy burden on the legal profession in the UK’,7 but this applies
equally to all types of business covered by the framework. Not surprisingly this heavy
burden does not make anti-money laundering compliance very popular with many of
those in the regulated sector, and that is particularly true in the UK where the general
perception is that the authorities have taken a ‘gold-plated’ approach, and in many
respects have gone significantly further than required either by the FATF Recommenda-
tions or EU requirements. Despite this the level of compliance in the UK is actually
very high, but it is not without its problems. The relationship between consent
applications and ‘tipping-off’, after a suspicious activity report has been made, is one
such problem area, and it is this which is the focus of this chapter.
THE BACKGROUND
At a meeting of the G78 in 1989 the decision was taken to establish a body which
would produce a set of measures to assist in the international fight against money
laundering,9 and in 1990 the newly created FATF published a set of 40 Recommenda-
tions which, since then, have formed the basis of the international effort in the fight
against money laundering;10 this in turn led to the European Community publishing the
first Anti-Money Laundering Directive the following year. This chapter concentrates on
those parts of the Recommendations and European Directives which are concerned
with reporting suspicious activity and the related issues of consent applications and
tipping off.11
6
This term is being used to cover all of those legal persons who are subject to money
laundering reporting requirements. In the UK this not only includes banks but such professionals
as solicitors and accountants when involved in certain activities.
7
Tyre was writing specifically about the legal profession. See Colin Tyre QC ‘Anti-money
Laundering Legislation: Implementation of the FATF Forty Recommendations in the European
Union’ (2010) Journal of the Professional Lawyer 69, at 82.
8
It was not intended only to apply to the G7 countries, but also to as many other countries
as possible.
9
Kevin Shepherd has produced an excellent history of the creation and development of the
FATF and its work: ‘Guardians at the Gate: The Gatekeeper Initiative and the Risk Based
Approach for Transactional Lawyers’ (2009) 43 Real Property, Trusts and Estates Law Journal
607.
10
After the events of September 11th 2001 the focus also turned to terrorist financing, but
that is beyond the scope of this chapter.
11
For a detailed account of the anti-money laundering framework in the UK see Robin
Booth, Simon Farrell, Guy Bastable and Nicholas Yeo Money-Laundering Law and Regulation:
A Practical Guide (Oxford University Press, 2011). For a specialist account in relation to the
legal profession see Peter Camp Solicitors and Money Laundering: A Compliance Handbook
(3rd ed) (The Law Society, 2009).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Money laundering and the consent regime in the United Kingdom 487
12
Since then the term Financial Intelligence Unit (FIU) has come to be used for the body in
each country to which reports must be made.
13
Recommendation 16. The FATF Recommendations (FATF, Paris, 1990).
14
The issue of what would amount to suspicion is not being discussed here but it has not
been unproblematic. For reading on this see Booth et al. above n 11 at 44.
15
Recommendation 17, 1990.
16
Although the term financial institution is used in the wording of the Recommendations,
these also apply to what are described as ‘designated non-financial businesses and professions’,
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
or are related to terrorist financing, it should be required, by law, to report promptly its
suspicions to the financial intelligence unit.
So, in relation to reporting and tipping off, the position has not changed,17 but now it is
not only financial institutions which have to comply with these requirements, but also
several designated non-financial businesses and professions. For reporting and tipping
off this means lawyers,18 accountants and dealers in precious metals/stones.19 The
scope of the Recommendations has been considerably widened as a result of this, but at
the time of writing not all countries have included lawyers within their money
laundering reporting frameworks.20
Interestingly, the Article from the earlier sets of FATF Recommendations which
provided that financial institutions refrain from carrying out transactions until they have
apprised the authorities is no longer there.
a term which covers lawyers, notaries and accountants as well as dealers of precious metals and
trusted company service providers.
17
Other than incorporating terrorist financing.
18
This covers lawyers, notaries and other independent legal professionals when they engage
in a financial transaction on behalf of a client. It does not cover the situation where legal
privilege applies. It is beyond the scope of this chapter to discuss this aspect, but for further
information see Peter Camp above n 11 at 304.
19
For further information see Recommendation 23.
20
These include Canada, Japan and the United States. For further reading on this see A
Lawyers Guide to Detecting and Preventing Money-Laundering: A Collaborative Publication of
the International Bar Association, the American Bar Association and the Council of Bars and
Law Societies of Europe (International Bar Association, the American Bar Association and the
Council of Bars and Law Societies of Europe, October 2014).
21
Directive 91/308/EEC.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Money laundering and the consent regime in the United Kingdom 489
making a report, but Article 7 provided that ‘Member States shall ensure that credit and
financial institutions refrain from carrying out transactions which they know or suspect
to be related to money-laundering until they have apprised the authorities referred to in
Article 6.’ So, in effect, it was a suspicious transaction report regime. The Article goes
on to provide that ‘those authorities may, under conditions determined by the national
legislation, give instructions not to execute the operation’. So under this provision there
was no actual requirement for consent to be obtained before continuing with the
transaction. Once a report had been made the FIU would have had the power to prevent
the transaction taking place, but only if it acted quickly enough to give instructions not
to proceed with the transaction before it had been executed. If the transaction had
already taken place there would be no liability for the financial institution. The
financial institution’s duty was to make a report and then carry out its customer’s
instructions – there was no requirement to delay proceeding with the transaction until
consent from the FIU had been received.
Article 8 introduced the concept of ‘tipping-off’ by providing that financial insti-
tutions and their directors and employees ‘shall not disclose to the customer concerned
nor to other third persons that information has been transmitted to the authorities … or
that a money laundering investigation is being carried out’.
This Directive introduced a reporting regime based on the first set of FATF
Recommendations but actually going further than was strictly required as it introduced
a reporting regime which was mandatory, but there was no need to obtain the consent
of the authorities to proceed with a transaction. The only real difficulty which the
reporting institution faced would be where the FIU instructed it not to proceed with the
transaction in question, and that instruction was received prior to the transaction having
taken place.
Articles 6 and 7 were amended by the second money laundering Directive22 but only
in so far as to extend the reach of the legislation beyond the financial sector to include
lawyers, accountants and others.23 Articles 6 and 7 essentially remained the same in
terms of the reporting requirements but now extended beyond the financial sector and
lawyers and accountants when performing so-called Gatekeeper functions, which were
now covered.24
In 2005 the third, and current, Directive25 was published. Article 22 contained an
amended reporting requirement which now provided that those in the regulated sector
shall be required to cooperate fully:
22
Directive 2001/97/EC.
23
Once again the EU was responding to changes to the FATF Recommendations.
24
This FATF Recommendation to include lawyers was controversial and, although adopted
by the EU, has been the subject of a number of challenges e.g. by Belgian lawyers. It has also
been criticised by organisations representing lawyers. Challenges elsewhere have been more
successful e.g. Canada. The United States has declined to follow this FATF Recommendation. It
is beyond the scope of this chapter to discuss the position of lawyers in relation to anti-money
laundering compliance in general and in relation to the topics which are the focus of this chapter.
For further information see A Lawyer’s Guide to Detecting and Preventing Money-Laundering:
A Collaborative Publication of the International Bar Association, the American Bar Association
and the Council of Bars and Law Societies of Europe (October 2014).
25
Directive 2005/60/EC.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
(a) by promptly informing the FIU, on their own initiative, where the institution or person
covered by this Directive knows, suspects or has reasonable grounds to suspect that
money laundering or terrorist financing is being committed or attempted; (b) by
promptly furnishing the FIU, at its request, with all necessary information, in accordance
with the procedures established by the applicable legislation.
This Directive has clearly followed the relevant FATF Recommendation and imposed a
greater sense of urgency by including the term ‘promptly’. The scope of the mental
element was also widened to ‘knows, suspects or has reasonable grounds to suspect’.
What about proceeding with a transaction after a suspicious activity report has been
made? Article 24 (a) is rather vague about this: ‘Member states shall require the
institutions and persons covered by this Directive to refrain from carrying out transactions
which they know or suspect to be related to money laundering or terrorist financing until
they have completed the necessary action in accordance with Article 22 (a).’
This simply contains the requirement to make a suspicious activity report in
appropriate circumstances. So the necessary action under the Directive only extends to
making a report to the FIU. The Article goes on to provide: ‘In conformity with the
legislation of the Member States, instructions may be given not to carry out the
transaction.’
So there is still no EU requirement that an application for consent to proceed with
transactions has to be made to the FIU before the transaction is actually undertaken. To
comply with Article 21 (a) all that is required is that a report be made to the FIU before
the transaction is undertaken.
At the time of writing there is a proposal for a fourth Directive, but this will not
bring about any changes in relation to the reporting requirements and the wording will
be unchanged.26
The UK’s predicate money laundering offences are found in sections 327–329 of the
Proceeds of Crime Act 200227 and, in addition, there are two related offences of failing
to disclose and tipping off. However, this chapter is not concerned with the actual
money laundering offences, but instead with the action which has to be taken when a
person in the regulated sector has knowledge or suspicion of money laundering. This
requires the making of a suspicious activity report and a consent application, if a
transaction is to take place, and introduces the tipping off offence.
Basically, where a person in the regulated sector has been instructed to undertake a
transaction on behalf of a customer/client but has knowledge or suspicion that the
property involved is derived wholly or partly from criminal activity, that person is
26
The 4th Money Laundering Directive is expected to be introduced in 2015.
27
Hereafter ‘POCA’.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Money laundering and the consent regime in the United Kingdom 491
required to make a suspicious activity report and apply for consent to proceed with the
transaction.
In relation to the money laundering offences in each of the three sections, the
wording provides that an offence is not committed if an authorised disclosure has been
made to the National Crime Agency28 and the person carrying out the transaction has
received appropriate consent before doing the act referred to in the relevant section.29
A person in the regulated sector will be guilty of the offence of failing to disclose if
she ‘(a) knows or suspects, or (b) has reasonable grounds for knowing or suspecting
that another person is engaged in money laundering’.30
This means that when a person in the regulated sector has made a suspicious activity
report to the NCA that person will have a defence provided that the report is made as
soon as is practicable after having formed the knowledge or suspicion. Of singular
importance, under the UK legislation, is that the person who made the report must
refrain from undertaking the relevant transaction until consent to proceed has been
provided by the NCA or, otherwise, by the lapse of the relevant time periods.31 To
proceed with any transaction without either the appropriate consent or by the passage
of time exposes the reporter to criminal liability for being involved in money
laundering.
So essentially, as soon as a report has been made to the NCA, the proposed
transaction is frozen until consent is given or the relevant period of time has elapsed.32
It is at this point the position becomes complicated and sometimes difficult for the
person who made the suspicious activity report, particularly because of the tipping off
offence. Under the UK law tipping off is the communication to another person of the
fact that a suspicious activity report has been made and that this is likely to prejudice
an investigation. Leaving aside the issue of ‘likely to prejudice an investigation’, this
brings about some potentially difficult problems for anyone who has made a report and
is expected to proceed with a transaction by a customer/client. For example, a bank
which has been instructed to transfer money overseas with immediate effect, and which
has formed reasonable suspicion, must make a suspicious activity report, but as soon as
it has done so it will not be able to continue with the transfer until consent has been
received.33 The customer may demand an explanation for the delay to the transfer being
made but the bank cannot inform its customer of the fact of the suspicious transaction
report having been made.
The decision to give or refuse consent is now made by the NCA as the UK’s FIU. After
a number of concerns had been raised about the decision-making process for consent
28
Hereafter ‘NCA’ – the UK’s FIU.
29
See POCA section 338 ‘Authorised Disclosures’.
30
POCA section 330.
31
See below for details on the time periods.
32
Further details on the time periods are provided below. For how they work, see A.
Campbell and E. Campbell, above n 2 at 123.
33
Or the relevant time period has elapsed.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
applications,34 the Home Office issued guidelines regarding the policy on consent
applications, and this focuses on the principles of effectiveness, proportionality and
engagement.35 It is recognised that in relation to the issue of proportionality, ‘in the
majority of cases consent should only be refused when a criminal investigation with a
view to bringing restraint proceedings is likely to follow or is already under way.’
The NCA has only been in operation for approximately fifteen months at the time of
writing and the latest published figures available are for the year ending October 2012;
however, as the Home Office guidelines are still applicable the policy should be
unchanged.36 This shows that the average turnaround time for a consent application was
3.1 days, having risen from 2.8 days the previous year.37 The figures also show that 9.5
per cent38 of consent applications were refused during that year.
So in just over 90 per cent of cases consent will be given, but it is interesting to note
that in more than 50 per cent of cases consent requests were referred to other bodies,
such as HM Revenue and Customs, and this can obviously lead to delays in the consent
process.
So, on the basis of the latest figures available, it would appear that anyone making a
suspicious activity report will have to accept the possibility of an average delay in
being able to continue with the transaction of at least three days. However, it is also
quite possible that the delay could be considerably longer, especially if the matter has
also been passed on to another agency.
The two time periods which come into play as soon as a consent application has been
made also need to be understood. The first is a seven working day period, which starts
on the day after the suspicious activity report has been received. In practice this means
the possibility of this period lasting up to 11 calendar days.39 At the end of this period,
if nothing has been heard from the NCA, the person who made the report can proceed
with the transaction. However, where consent is refused during this period a second
time period comes into operation. This is a 31 calendar day period running from the
day consent is refused. This means that there can, in total, be a period of up to 42 days,
although it seems unlikely to be the case in practice that this would happen very often.
34
See Booth et al. above n 11 at 110: ‘The absence of criteria governing the exercise of the
discretion to refuse consent fuelled concerns in the reporting sector and in the judiciary about the
potential for “… the arbitrary and capricious exercise of power …” (Judge Norris QC in New
Bridge Holdings & Enjien Ltd v Barclays Bank [2006] EWHC 3773 (Ch), quoted by Longmore
LJ in K Ltd v National Westminster Bank Plc [2006] EWCA Civ 375), whether by SOCA or by
a law enforcement agency.’ Booth et al. also quote the observation of Ward LJ that ‘as matters
stood at the time … there were no published criteria for checking whether or not SOCA were
acting lawfully. Their inner workings were totally lacking transparency’.
35
Home Office, Consent Policy, 2008.
36
When the Serious Organised Crime Agency was responsible.
37
Suspicious Activity Reports Regime Annual Report 2012 (NCA, November 2014) at 29.
38
A total of 1229 out of 12,915 consent applications made according to the NCA; the range
has tended to be between 8 per cent and 12 per cent a year.
39
For example, if a report is made on a Friday, the period of seven working days will only
commence on the following Monday.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 8 / Date: 31/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Money laundering and the consent regime in the United Kingdom 493
Tipping Off
Anyone who makes a suspicious activity report needs to be fully aware of the tipping
off offence and its relationship with the consent process. It has to be fully appreciated
by the person making a report that the customer/client about whom the report has been
made can be told nothing about the reason for any transactional delay. That will often
be difficult in practice. If a customer of a bank or a client of a solicitor wants to know
why a transaction has not proceeded at the expected time, it is simply not possible to
give any explanation, and the problems associated with this are obvious. As Nicola
Bolton notes, ‘… there are only so many ways of saying nothing, even for an
experienced solicitor …’.40
On the one hand, an innocent customer/client is likely to assume incompetence on
the part of the bank, solicitor or accountant and will not want to deal with them in
future. And, of course, they may wish to take legal proceedings for failure to complete
the transaction on time if any loss has occurred as a result. The professional who has
made the report will have no defence available in this situation. On the other hand, the
professional criminal will quickly work out the reason for the delay. The fact that the
transaction has not gone ahead and that no explanation is being given will effectively
suffice to ‘tip off’ the customer/client but without giving rise to the tipping off offence.
Also, the professional on the other side of the transaction, whether a bank awaiting the
receipt of a money transfer or a solicitor awaiting completion of the conveyance of a
property, will quickly be able to work out the reason why no explanation is being given
for the delay. However, the reason cannot be communicated to the customer/client.
CONCLUSIONS
As has been seen from the foregoing, neither the FATF Recommendations nor the
European Directives actually require a consent process such as that which is in place in
the UK.
It is not entirely clear where the impetus for the current legal position in the UK
came from, but it is suggested that this form of ‘gold plating’ has gone much further
than is actually necessary in the fight against money laundering. The requirement of the
Directives is to report suspicions to the national FIU and only desist from entering into
the transaction if the FIU orders it not to proceed. The UK has, of its own volition,
added this additional layer to the reporting and tipping off process.
Perhaps a rethink of the whole procedure is necessary. For a start, is it really
necessary to have to apply for consent for all transactions where there might be some
element of criminal activity, especially if that amount is very small in relation to the
value of the transaction in question?
Arguably, the need to make an application for consent should depend on the type of
transaction that is taking place. It is fully understandable that an application for consent
40
Nicola Bolton Tipping Off: A Practical Guide to What You Can Tell Your Client (The Law
Society, London, 2010). Available at www.thelawsociety.org.uk/advice/articles/a-practical-guide-
to-tipping-off/ (accessed 18 December 2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
may be necessary when a customer of a bank, where the bank has some suspicions,
wishes to immediately make an electronic transfer of a large amount of money outside
of the jurisdiction. However, the situation is surely different, for example, in the
situation where a client of a solicitor wants to purchase a residential property. In this
situation the money being used for the purchase is simply being transferred from one
form of asset to another. Does there really need to be a requirement that consent should
have to be applied for to continue with the transaction? What does this really achieve in
practice?
The relationship between the consent process and tipping off is, in our opinion, an
unhelpful and unnecessary part of the UK’s anti-money laundering regime which is in
need of some degree of reform. Although the Home Office has issued guidance on the
consent process it is arguable that the lengthy time periods which exist are also
unhelpful. Although the average time period for consent to be given is a little over three
days, there is the potential for a much lengthier period of delay. Also, a delay of three
days in the completion of the transaction can often cause significant problems for the
person who has made a report.
It may be that it is considered necessary to continue to have a consent application
regime to apply in certain situations, but the current position ensures that the NCA will
receive far more applications for consent than are strictly necessary, and many of these
will be for relatively superficial criminal activity and not really the kind of matters that
the NCA needs to focus on. Reform in this area would clearly relieve the burden on the
NCA and allow it to focus its attention on the more serious forms of criminal activity
and money laundering.
Our research has demonstrated that this process is unpopular with those who operate
within the regulated sector in the UK and most do not really understand why they are
subjected to such a regime. Those with an awareness of other jurisdictions often ask
why the UK has subjected them to such a complex and difficult process while in some
other jurisdictions this would not be the case. The most obvious example is in relation
to lawyers, who often point out that although the United States subscribes to the FATF
Recommendations, are not covered by the relevant legislation and therefore do not have
to report suspicious transactions or make applications for consent to continue with
transactions. It is difficult to provide an adequate explanation to them as to why UK
lawyers should be treated differently.
As Tyre notes:
The present regime, however, remains open to the criticisms that it is unnecessarily complex
and risks criminalising normal business activity and technical errors committed unwittingly
by practitioners. Unfortunately, the Government is not yet persuaded that a radical overhaul
of the statutory regime is required in order to meet these criticisms.41
41
Tyre above n 7 at 82.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Money laundering and the consent regime in the United Kingdom 495
the most unhelpful aspect of the tipping off offences is that they are counter-productive. It is
the combined effect of the operation of the consent regime and the tipping off offences that is
itself most likely to alert money launderers as to the fact that they are under suspicion and
have been reported to the authorities.42
42
Booth et al. above n 11 at 198.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 39 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
In the United States, federal prosecutors routinely employ asset recovery as a tool of
law enforcement. The approach takes two forms. In criminal cases, the prosecutor may
seek to recover or “forfeit” property as part of the defendant’s sentence, if the
defendant is convicted. Alternatively, the prosecutor may commence a civil proceeding,
naming the property as the defendant and seeking to forfeit the property independent of
any criminal proceeding.
This chapter discusses the American experience with civil, or non-conviction-based,
asset recovery. It discusses the prosecutor’s motivations for seeking to forfeit assets, the
types of property that may be forfeited, the procedures that govern civil asset forfeiture,
the advantages of civil or non-conviction-based asset forfeiture over criminal forfeiture,
and the ways in which the United States, through judicial decisions and legislation, has
reconciled the non-conviction-based approach with the requirements of basic human
rights and civil liberties.
TERMINOLOGY
In the United States, the term “civil forfeiture” refers to non-conviction-based forfeiture
proceedings. It contrasts with “criminal forfeiture,” which requires a criminal convic-
tion and is imposed as part of a criminal sentence. Experience shows, however, that the
term “civil forfeiture” can be confusing when employed in the international context.
To avoid the confusion and the unnecessary distraction created by the use of the term
“civil forfeiture” when discussing asset recovery in the international context, I will use
the term “non-conviction-based” forfeiture from this point forward.
WHY DO FORFEITURE?
The prosecutor may have multiple reasons for seeking to recover the assets involved in
the commission of a criminal offense. Indeed, it would be the rare case if only one of
1
The views expressed in this chapter are solely those of the author and do not necessarily
reflect the views of the United States Department of Justice or any of its agencies. This chapter
is an updated version of an article entitled “Civil Asset Recovery: The American Experience”
that appeared in Eucrim: The European Criminal Law Associations’ Forum, 3/2013, pp 98–103.
496
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the following motives were to apply. Frequently, they are overlapping and mutually
reinforcing.
As the US Supreme Court recently recognized, forfeiture serves a multitude of
punitive and remedial purposes.2 First, forfeiture serves the non-punitive purpose of
taking the profit out of crime.3 Whatever benefit the wrongdoer obtained or retained as
a consequence of his offense is simply forfeited to the Government.
Second, forfeiture is seen as a form of punishment. Incarceration is a form of
punishment but so is forcing the wrongdoer to disgorge the accouterments of the lavish
lifestyle he acquired through his criminal acts. Indeed, many prosecutors relate that it
was the loss of the luxury items acquired through a life of crime, not the period of time
to be spent behind bars, that most distressed defendants.
Third, forfeiture serves as a deterrent. If one fraudster, child pornographer, corrupt
politician, or drug dealer is not permitted to retain the fruits of his crime, perhaps the
next person will be less likely to travel the same road.
Fourth, forfeiture is used as a form of prevention; it allows the Government to
deprive wrongdoers of the tools of their trade and the economic resources they would
employ to commit similar or more serious crimes in the future.4 In drug trafficking
cases, for example, the prosecutor does not want the drug dealer to keep the airplane
that might be used again to smuggle drugs or the land where he could produce another
load of marijuana. The benefit of using the forfeiture laws to intercept the flow of guns
to Mexico or the export of a flight simulator to a government that sponsors terrorism is
obvious.
Fifth, another form of prevention is the disruption of criminal organizations.5 Money
is the glue that holds organized criminal enterprises together; they have to recycle the
money in order to keep the scheme going to lull more victims into the fraud scheme, to
buy more drugs, to finance acts of terrorism, or to pay bribes to corrupt officials.
Moreover, it is often noted that it is harder for a drug organization to replace the money
seized by law enforcement after the drugs have been distributed than it is to replace the
drugs if they are seized beforehand. Thus, taking the money does more to interrupt the
cycle of drug distribution than any number of buy/bust arrests of street dealers or
seizures of drugs as they are being imported.
Sixth, forfeiture is used in the United States as a means of recovering property that
has been taken from victims and of restoring it through processes known as “restitu-
tion” and “restoration.” The United States has a robust set of restitution laws, but for
2
See Kaley v. United States, 134 S. Ct. 1090 (2014) (noting that forfeiture serves to punish
the wrongdoer, deter future illegality, lessen the economic power of criminal enterprises,
compensate victims, improve conditions in crime-damaged communities, and support law
enforcement activities such as police training).
3
See United States v. Ursery, 518 U.S. 267, 291 (1996) (“[Forfeiture] serves the additional
nonpunitive goal of ensuring that persons do not profit from their illegal acts”).
4
See von Hofe v. United States, 492 F.3d 175, 184 (2d Cir. 2007) (“Like imprisonment,
which incapacitates convicted criminals, forfeiture may be said to incapacitate contraband”).
5
See Caplin & Drysdale v. United States, 491 U.S. 617, 630 (1989) (“[A] major purpose
motivating congressional adoption and continued refinement of the racketeer influenced and
corrupt organizations (RICO) and [continuing criminal enterprise] forfeiture provisions has been
the desire to lessen the economic power of organized crime and drug enterprises”).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
procedural reasons, forfeiture is a more effective way of recovering money for victims
than ordering the defendant to pay restitution.6
Seventh, forfeiture is used to protect the community and to demonstrate to the
community that law enforcement is working in its interest. If the police are able to use
the forfeiture laws to shut down a crackhouse and turn it into a shelter for battered
women, they have at once removed a hazard to public health and safety, provided a
much-needed resource to a community, and created a visible demonstration of the
effectiveness of the local law enforcement agency’s efforts.
Finally, forfeiture is used as a way of encouraging cooperation between state and
federal law enforcement agencies and of focusing their resources on the economic
aspects of crime. Through a program called “equitable sharing,” state and local law
enforcement agencies that assist federal law enforcement in investigating and prosecut-
ing federal offenses leading to the forfeiture of assets are allowed to use a portion of
those assets to supplement their budgets. They are not, however, allowed to pay the
salaries of the agents or officers who handle the cases and thereby are given an
incentive to dedicate resources to matters that have the highest federal priority.
NON-CONVICTION-BASED FORFEITURE
All of these motives apply equally to criminal and non-conviction-based forfeiture. The
difference between the two approaches is procedural.
In a criminal case, forfeiture is part of the defendant’s sentence.7 After the defendant
is found guilty beyond a reasonable doubt, the court determines on a balance of the
probabilities whether the property the Government is seeking to forfeit was derived
from, used to commit, or was otherwise connected to the crime in a way that would
allow it to be forfeited to the Government. If the property is unavailable, the
Government may obtain a personal money judgment against the defendant and may
satisfy that judgment out of any assets of equal value that the defendant may own –
property known as “substitute assets.”8 Finally, the Government must give notice of the
forfeiture order to any third parties with an interest in the forfeited property and afford
them an opportunity to contest the forfeiture on the ground that it belongs to the third
party and not to the defendant.
6
See United States v. Blackman, 746 F.3d 137, 2014 (4th Cir. 2014) (“The Government’s
ability to collect on a [forfeiture] judgment often far surpasses that of an untutored or
impecunious victim of crime … Realistically, a victim’s hope of getting paid may rest on the
Government’s superior ability to collect and liquidate a defendant’s assets” under the forfeiture
laws).
7
See Libretti v. United States, 516 U.S. 29, 39 (1995) (“[C]riminal forfeiture is an aspect of
punishment imposed following conviction of a substantive criminal offense”).
8
See, e.g., United States v. Vampire Nation, 451 F.3d 189, 201–03 (3d Cir. 2006) (rejecting
the argument that a forfeiture order must order the forfeiture of specific property; as an in
personam order, it may take the form of a judgment for a sum of money equal to the proceeds
the defendant obtained from the offense, even if he no longer has those proceeds, or any other
assets, at the time he is sentenced).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
9
See United States v. One Assortment of 89 Firearms, 465 U.S. 354, 361–62 (1984)
(holding that acquittal on gun violation under 18 U.S.C. § 922 does not bar civil forfeiture under
18 U.S.C. § 924(d); One Lot Emerald Cut Stones & One Ring v. United States, 409 U.S. 232,
234–35 (1972) (per curiam) (determining that acquittal on a criminal smuggling charge does not
bar later civil forfeiture).
10
See United States v. $196,969.00 in U.S. Currency, 719 F.3d 644, 646 (7th Cir. 2013) (in
a civil forfeiture case, the defendant is “the thing”; the claimant is like a plaintiff in a “suit
nested within the forfeiture suit”); United States v. $8,440,190.00 in U.S. Currency, 719 F.3d 49,
57 (1st Cir. 2013) (in a civil forfeiture case, the defendant is the property, and persons raising
defenses to the forfeiture must establish standing to intervene).
11
See 18 U.S.C. § 983 (2009); Fed. R. Civ. P. Rule G (Supplemental Rules for Admiralty or
Maritime Claims and Asset Forfeiture Actions). The process is also described in detail in
chapters 3–14 of Stefan D. Cassella, ASSET FORFEITURE LAW IN THE UNITED STATES, Second
Edition, Juris Publishing (New York 2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
If the Government files a forfeiture action directly against the property, and no one files
a disputing claim, the property may be forfeited to the Government directly without any
judicial forfeiture proceeding. In the United States, 80 percent of forfeiture cases –
involving as much as $600 million in a recent year – are resolved in this fashion.
The Government can only obtain a forfeiture order as part of the sentence in a criminal
case if the defendant lives long enough to be tried, convicted, and sentenced. If the
defendant dies before his conviction is final, as in the case of Kenneth Lay, head of the
Enron Corporation, non-conviction-based forfeiture becomes the principal means of
recovering property traceable to the underlying crime.
In the United States, law enforcement agents commonly find criminal proceeds in the
hands of a courier – a person who was not himself involved in the commission of the
crime. It is often clear from the circumstances that the money at issue is criminal
proceeds, but neither the Government nor (in most cases) the courier knows who the
money belongs to or who committed the underlying criminal offense. In such cases,
there is no chance of bringing a criminal prosecution, yet it is still desirable for the
Government to recover the money. Thus it is not unusual in the United States to file a
forfeiture case against a very large sum of currency that was seized from a courier.
Many of these are drug cases, but the scenario appears in other contexts as well (the
financing of terrorism being one prominent example).
It is quite common for a person to commit an offense using property that belongs to a
third party. For example, a robber may carry out a robbery using someone else’s gun.
In a criminal case, the Government cannot forfeit property that belongs to a third
party if the third party has been excluded from the proceeding, as this would violate the
12
The advantages and disadvantages of criminal and non-conviction-based forfeitures under
US federal law are discussed in more detail in Chapter 1 of ASSET FORFEITURE LAW, supra note
11. See also Stefan D. Cassella, The Case for Civil Forfeiture: Why In Rem Proceedings Are an
Essential Tool for Recovering the Proceeds of Crime, 11 Journal of Money Laundering Control
8 (2008).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
third party’s right to due process. In fact, criminal forfeiture laws have a procedure
specifically designed to exclude the property of third parties from a criminal forfeiture
order, even if the third party knew about or was even complicit in the commission of
the crime. Yet if the third party was aware that his property was being used for a
criminal purpose – or was willfully blind to that fact – he should be made to forfeit the
property. The procedural device for forfeiting property held by a non-innocent third
party is non-conviction-based forfeiture.
There are many cases where the interests of justice do not require a criminal conviction
on the offense giving rise to the forfeiture. Some of them involve relatively minor
crimes, while others involve property owned by a person who played a minor role in
the offense and is not going to be prosecuted. In such cases, the forfeiture of the
property in a separate non-conviction-based forfeiture action – and not criminal
prosecution – is probably the best way to recover the property.
Finally, there are very serious cases in which the criminal defendant will admit to
committing a particular offense but will not admit to other conduct that gave rise to the
lion’s share of his criminal proceeds. In such a case, non-conviction-based forfeiture is
needed to recover the much larger body of assets involved in the scheme.
In all of these instances, the point is the same: because criminal forfeiture is imposed
as part of the defendant’s sentence, there can be no forfeiture if no one is convicted or
if the property belongs to a person who was not convicted. So, where the interests of
justice do not require a conviction, non-conviction-based forfeiture provides a means of
imposing a punishment that fits the crime.
Criminal forfeiture is available only when there is a conviction, but there can be no
conviction as long as the accused is a fugitive from justice. Non-conviction-based
forfeiture, however, allows the Government to file an action against the assets that the
fugitive left behind, or placed in a jurisdiction from which they may be recovered. For
example, if a person steals money from a US aid program in Afghanistan and cannot be
extradited to the US, but has placed the proceeds of the fraud in a country that
recognizes and enforces external forfeiture judgments, the United States may use
non-conviction-based forfeiture to obtain a judgment against the money.13 The fugitive
retains the right to contest the forfeiture, but only if he is willing to surrender to face
the criminal charges; he cannot ignore the process of the court in the criminal case and
ask the court to protect his property interests in the civil one.14
13
See United States v. Sum of $70,990,605, 4 F. Supp.3d 189, 203 (D.D.C. 2014) (forfeiture
action against funds fraudulently derived from aid for Afghanistan Reconstruction).
14
See 28 U.S.C. § 2466 (codifying the “fugitive disentitlement doctrine”).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Finally, federal prosecutors use non-conviction-based forfeiture when the defendant has
already been prosecuted elsewhere (in one of the 50 states or in a foreign country) and
thus will not be prosecuted federally, but there are assets related to the crime that may
be recovered under federal law. For example, if someone commits an offense in
Norway or Nigeria and conceals the proceeds of the crime in the United States, a
federal prosecutor can use the non-conviction-based forfeiture laws to recover that
property, even though the defendant has already been convicted of the criminal offense
in a Norwegian or Nigerian court. This can often be a more efficient way of recovering
the property than trying to register and enforce a foreign confiscation order.
15
See Caplin & Drysdale, 491 U.S. at 630.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the Supreme Court in the decade from 1992–2002; others were addressed legislatively
in the Civil Asset Forfeiture Reform Act of 2000 (CAFRA).
The following is a brief discussion of how some of the most prominent issues were
resolved.16
The practice in admiralty included a reverse burden of proof: once the Government
showed that it had a reasonable basis to believe the property was subject to forfeiture
(what the courts in the United States call “probable cause”), the burden was on the
property owner to prove that it was not. The Supreme Court repeatedly held that this
was constitutional: the presumption of innocence embodied in the Bill of Rights applies
only in criminal cases. But the presumption of innocence is so ingrained in American
practice and culture, and in the expectations of the jurors who will decide civil cases if
they go to trial, that it made sense to modernize the procedure by placing the burden on
the Government to establish the connection between the property and a criminal
offense in the first instance. This was accomplished with CAFRA.
In practice, placing the burden of proof on the Government has made very little
difference to the outcome of cases. Generally, the Government’s evidence is fairly
strong, and the number of cases in which the evidence was evenly divided, such that
the allocation of the burden of proof mattered, were few. Indeed, the amount of
property forfeited has more than tripled since CAFRA was enacted.
Finding a way to deal with innocent third parties who have an interest in the property
subject to forfeiture was more controversial. In Bennis v. Michigan,17 the Supreme
Court affirmed two centuries of precedent and held that imposing strict liability on
third parties does not violate their due process rights. But in CAFRA, the Justice
Department proposed, and Congress enacted, a uniform innocent owner defense. By
statute, the defense gives third parties the opportunity to protect their property from
forfeiture, even if it was derived from or used to commit a crime, if (1) they did not
know of, or took all reasonable steps to prevent, the illegal use of the property; or (2)
they acquired the property interest as a bona fide purchaser for value without reason to
know that it was subject to forfeiture.18
16
For a complete discussion of the development of asset forfeiture law in the United States,
including the application of constitutional protections embodied in the Bill of Rights to
non-conviction-based proceedings, see Chapter 2 of ASSET FORFEITURE LAW, supra note 11.
17
516 U.S. 442, 446 (1996).
18
See United States v. One 1990 Beechcraft, 619 F.3d 1275, 1278 (11th Cir. 2010)
(explaining that § 983(d) was enacted in response to the Supreme Court’s decision in Bennis,
holding that an innocent owner defense is not constitutionally required, and to bring uniformity
to federal forfeiture law which contained a variety of inconsistent innocent owner provisions
prior to CAFRA). The uniform innocent owner defense, codified at 18 U.S.C. § 983(d), is
discussed in detail in Stefan D. Cassella, The Uniform Innocent Owner Defense to Civil Asset
Forfeiture, 89 KY. L.J. 653 (2001).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
There was also a great deal of litigation over the steps the Government must take to
provide notice of the forfeiture action to interested parties. In an in rem action, it is not
always immediately apparent that the property owner is aware that a forfeiture action
has been commenced. The rule that emerged, and was eventually codified, is that the
Government must send written notice to any person who appears to have an interest in
the property within 60 days of its seizure and must also publish notice on the Internet
on an official Government website.19
Another controversial issue – and the subject of three separate Supreme Court cases in
the 1990s – involved the proportionality of the forfeiture to the seriousness of the
crime. A forfeiture may potentially be large enough to implicate the Excessive Fines
Clause of the Eighth Amendment, making the forfeiture unconstitutional. Thus, in
United States v. Bajakajian,20 when a traveler leaving the Los Angeles airport with
$347,000 concealed in his luggage committed the relatively minor offense of not
reporting the currency on his Customs form, the Supreme Court held that the forfeiture
of the entire $347,000 was unconstitutional because it was “grossly disproportional to
the gravity of the offense.” However, the Court did not say how much could be
forfeited without being unconstitutional; lower courts have been wrestling with this
question ever since.
Generally, the forfeiture of the actual proceeds of a crime is never problematic – it is
difficult to envision how the forfeiture of a crime’s proceeds could be disproportional,
let alone grossly disproportional, to the gravity of the offense. But the situation may be
different when valuable property, such as a person’s home, is used to facilitate the
commission of an offense. At what point, for example, does the forfeiture of the home
become disproportional to the offense of collecting or producing child pornography, or
subjecting children to sexual abuse?21
Another set of issues arises when there is a non-conviction-based forfeiture action and
a parallel criminal investigation or trial.
Under the Fifth Amendment to the Bill of Rights, a criminal defendant has the right
to remain silent and put the Government to its proof. When the Government files a
parallel civil forfeiture action, however, the defendant is presented with a Hobson’s
choice: does he invoke his right to remain silent so that what he says cannot be used
against him in his criminal case but in doing so foregoes his opportunity to defend his
property, or does he give evidence in the forfeiture case? There are various ways to deal
19
See United States v. Dusenbery, 534 U.S. 161, 167, 172–73 (2002).
20
524 U.S. 321, 322–23 (1998).
21
The case law on the application of the Excessive Fines Clause to civil and criminal
forfeiture is discussed in detail in Chapter 28 of ASSET FORFEITURE LAW, supra note 11.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
with this problem, but the choice that was made in CAFRA was to allow the defendant
who is subject to criminal liability in a related case to ask that a related non-criminal
case be stayed until the criminal case is over, thus making it unnecessary for him to
make the choice between his property and his right to remain silent.22
A criminal defendant has the right to court-appointed counsel in a criminal case under
the Sixth Amendment but, as mentioned earlier, that right does not extend to civil cases.
In CAFRA, however, Congress created a limited right to court-appointed counsel if the
property subject to forfeiture is the claimant’s primary residence. The view was that no
one should be at risk of losing his home without having counsel to defend him.
The right to counsel also arises when the defendant in a criminal case claims that he
needs property that the Government has seized or restrained under the forfeiture laws to
pay for counsel of his choice in the criminal case. The Supreme Court has held that
there is no constitutional right to exempt criminally derived property from forfeiture so
that a defendant may use it to hire counsel;23 but criminal defendants who first
demonstrate that they lack other funds with which to retain counsel do have a right to
a pre-trial hearing at which the Government must establish probable cause to believe
that the property is likely to be forfeited.24
CONCLUSION
The American experience with civil, or non-conviction-based, asset forfeiture spans
more than two centuries. In that time, it has become an essential tool of law
enforcement, resulting annually in the recovery of over $2 billion in assets derived from
or used to commit federal crimes. As the use of non-conviction-based forfeiture has
expanded, enormous attention has been given to the protection of individual rights and
civil liberties by the courts and the national legislature, with the result that litigants now
have a high level of confidence that their rights will be protected regardless of what
form the Government’s forfeiture action may take.
The process of refining the forfeiture laws and procedures is not yet complete.
Matters of significance are litigated daily, and new cases are pouring in from the trial
and appellate courts. But the major issues having been resolved, it is certain that
non-conviction-based forfeiture will continue to play a significant role in efforts to
deprive criminals of the fruits of their crimes and to take the instruments of crime out
of the hands of those who would use them to violate the law. Indeed, with the
22
See 18 U.S.C. § 981(g).
23
See United States v. Monsanto, 491 U.S. 600 (1989).
24
See United States v. Farmer, 274 F.3d 800, 804–05 (4th Cir. 2001) (defendant entitled to
a probable cause hearing where property he needs to hire counsel in criminal case has been
seized or restrained in related civil forfeiture case). Cf. Kaley v. United States, 134 S. Ct. 1090
(2014) (Roberts, C.J., dissenting) (“To even be entitled to the hearing, defendants must first
show a genuine need to use the assets to retain counsel of choice”).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
globalization of the financial system and the resulting ease with which criminals of all
persuasions are able to move criminal proceeds across international borders, it is highly
likely that non-conviction-based forfeiture will assume an even greater role in recover-
ing the proceeds of crime that are generated in one nation and transferred to another,
particularly where the Government has little likelihood of bringing the wrongdoer to
justice through a traditional criminal trial.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 40 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
With the almost daily diet of news of failed banks, rigging of rates, tax evasion and
complicity in money laundering the challenge for banks and financial institutions the
world over is becoming starkly clear. As Sarah Dahlgren, head of the Financial
Institution Supervision Group in the US, said recently, “We may be at a low point of
confidence and trust between the public and the financial sector.”1
The combating of financial crime continues to occupy a high political profile,
particularly in the wake of the economic crisis of the last few years and given the risks
to the integrity of our financial systems. In this sense the banks and other financial
institutions remain at the very centre of this fight against the twin evils of money
laundering and terrorist financing – to which one can now add compliance with
international sanctions.
Although the crusade against financial crime is an ever moving target, requiring ever
more resources and refocusing on the part of banks and others, a good deal of progress
has been made by both the banks and also those who enforce the laws and regulate the
industry. Despite the increased role of governments, law enforcement agencies and
even civil society, the pressure remains largely on the banks, in an increasingly global
and complex market, to retain the clearest perspective on the risks posed by their
commercial activities. This has created tensions for the banks and financial institutions
as they try to strike an appropriate balance between providing services in existing and
new markets, meeting their contractual obligations to their customers and increasing
economic well-being and market stability on the one hand, and properly discharging
their duties under criminal laws and regulatory requirements on the other. It has not
been an easy path.
There is no question that in recent years the pendulum has swung against the banks
and financial institutions due to reckless abandon in how they conduct their commercial
business, bordering in some cases on criminality, and led to a marked increase in
enforcement and regulatory investigations.2 But it has not just been at the institutional
1
Gina Chon, “New York Federal Reserve steps up pressure on bank ethics”, Financial
Times, 27 July 2014 – see http://www.ft.com/cms/s/0/e0dd5ee8-140a-11e4-b46f-0144feabdc0.
html?siteedition=uk#axzz3JF6lZ5ky.
2
See for example the Financial Services Authority’s Policy Statement “PS11/15 Financial
crime: a guide for firms” on 9 December 2011. This contains guidance on steps firms can take
to reduce their financial crime risk, including in their dealings with high risk and Politically
Exposed Person (PEP) customers.
507
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
level that banks have felt the heat: Money Laundering Reporting Officers (MLROs),
those charged with maintaining a strong line against the activities of those intent on
using the financial systems for nefarious purposes, have now fallen individually into an
unwanted, and some would argue unexpected, spotlight. The 2012 fines by the UK’s
Financial Services Authority (FSA) against both Habib Bank AG Zurich and its former
MLRO, Syed Itrat Hussain, of £525,000 and £17,500, respectively, for failures to take
reasonable care to establish and maintain adequate anti-money laundering (AML)
systems and controls suggests a tough regulatory approach that puts bank officials
making judgment calls at risk for personal liability.3 That same year the FSA followed
up with a fine for Coutts of £8.75 million, once again for failings in respect of its AML
systems and controls.4
This chapter will examine the current regulatory environment in the UK, but first sets
the scene by reviewing the increasing jurisdictional enforcement of US interests in this
sector. We will discuss the risks businesses face in one of the most interconnected
industries in the world, and how well banks and financial institutions are rising to the
challenge.
3
http://www.fsa.gov.uk/library/communication/pr/2012/055.shtml.
4
http://www.fsa.gov.uk/library/communication/pr/2012/032.shtml.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Since 1970 the Bank Secrecy Act (BSA) has imposed information management and
disclosure requirements on financial institutions on the theory that the best means of
detecting illicit financial activities is by access to the businesses through which such
money flows. The 1992 Annunzio-Wylie Anti-Money Laundering Act (AMLA) man-
dated the current “suspicious activity report” (SAR) requirements in the BSA, which
took effect in the form of Treasury Department regulations in 1996. The USA
PATRIOT Act later amended the BSA to more broadly define covered financial
institutions and to require them to establish AML programmes that include internal
policies, procedures and controls; the designation of a compliance officer; an ongoing
employee training programme; and an independent audit function to test programmes.
It also requires financial institutions to exercise due diligence over private banking and
correspondent banking of foreign persons by implementing policies, procedures and
controls to reasonably detect and report instances of money laundering through those
accounts. Financial institutions are subject to civil and criminal penalties for non-
compliance.
Recognising the sensitivity of SARs and the concomitant risks to financial insti-
tutions and their employees, the BSA incorporates strict confidentiality requirements
and a safe harbour provision:
Any financial institution that makes a voluntary disclosure of any possible violation of law or
regulation to a government agency or makes a disclosure pursuant to this subsection or any
other authority, and any director, officer, employee, or agent of such institution who makes,
or requires another to make any such disclosure, shall not be liable to any person under any
law or regulation of the United States, any constitution, law, or regulation of any State or
political subdivision of any State, or under any contract or other legally enforceable
agreement (including any arbitration agreement), for such disclosure …
The litigation surrounding these provisions has produced somewhat mixed results,
warranting reasonable care on the part of financial institutions filing SARs in order to
protect themselves from civil liability in defamation and other actions. The scope of the
BSA’s confidentiality restrictions has been at issue in the context of litigation discovery
proceedings. The leading case is Whitney Nat’l Bank v Karam, 306 F. Supp. 2d 678
(S.D. Tex. 2004), in which the federal district court, relying on the statutory language
and agency regulations, held that the bank cannot be required to produce an SAR or
supporting documents pertaining to the preparation of an SAR or information that
would reveal the existence of an SAR. However, it denied the exemption for documents
developed in the ordinary course of business relating to the defendant’s banking
activities, transactions and accounts. Documents in this group may be evidence of
suspicious conduct that the bank relied upon in deciding to file the SAR, but inasmuch
as they are prepared in the ordinary course of business, they are subject to discovery.
The case law on the BSA’s safe harbour provision is split among the circuits of the
US Court of Appeals, and has not been reconciled by the Supreme Court of the US.
The 11th Circuit, in Lopez v First Union National Bank, 129 F.3d 1186 (11th Cir.
1997), held that in order to come under the safe harbour provision, the bank’s
disclosure must be based on a good faith suspicion of illegal activity involving the
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
account. Of the two consolidated cases decided in Lopez, both alleged violations of
federal privacy laws in connection with bank disclosures to federal authorities and the
resultant seizure of accounts by the government. In the first case the bank had made
the disclosure in response to verbal instructions by a government agent. In the second
the bank disclosed information on 1100 accounts based on “unusual amounts” and
“unusual movements” of money at the bank. If the disclosures had been made in
connection with the presentment of a seizure warrant, the court held that the banks
would have been protected. In subsequent cases, however, the 2nd and 1st Circuits have
held that the safe harbour provision affords financial institutions an unqualified
immunity for filing SARs and that there is no requirement that the SARs be based on
a good faith suspicion. On 13 March 2013 the Comptroller of the Currency testified
before a Senate committee that his office would strongly support legislation that
clarifies that the safe harbour from liability for filing SARs is absolute and there is no
good faith requirement. What is growingly evident is that banks and financial
institutions must often make difficult judgment calls and incur heavy administrative
burdens in delivering on these obligations.
The PATRIOT Act provided additional tools for the US Government’s post-9/11 fight
against money laundering and terrorist financing by enacting “information sharing”
provisions. Section 314(a) authorises a programme under which the Financial Crimes
Enforcement Network (FinCEN) channels requests from federal state and foreign law
enforcement agencies to covered financial institutions which are required to search
their records and respond through FinCEN. The attendant procedures and certification
process are designed to ensure that the subject of a request is suspected based on
credible evidence of engaging in terrorist activity or money laundering. Financial
institutions are required to review the lists that FinCEN regularly publishes and report
matches of accounts and transactions in their records. Financial institutions are subject
to penalties for failure to maintain an adequate section 314(a) review system and may
incur significant administrative burdens, including BSA requirements that may be
triggered by the requests, as well as follow-up investigative demands by law enforce-
ment.
While section 314(a) is mandatory, section 314(b) encourages voluntary sharing of
information among financial institutions on the suspected use of transaction proceeds
for terrorist activities or money laundering and includes a safe harbour provision. In
order to qualify for this protection the financial institution must notify FinCEN of its
participation in the 314(b) programme; take reasonable steps to verify that the other
financial institution has submitted such notice to FinCEN; and set up a system to
safeguard the information and use it only for purposes of: (1) identifying and, where
appropriate, reporting on activities that may involve terrorist financing or money
laundering; (2) determining whether to establish or maintain an account, or to engage
in a transaction; or (3) assisting in compliance with AML requirements. Financial
institutions may not exchange SARs, but may be covered by the general BSA safe
harbour provision if they do not comply with all of the requirements for section 315(b)
protection. The Comptroller of the Currency has testified that his office would support
legislation to expand the section 314(b) safe harbour beyond money laundering and
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
terrorist financing, and to eliminate or modify the notice requirement to FinCEN, which
may be limiting the ability of financial institutions to share information.5
The reality that FFIs can be vehicles for terrorist financing, money laundering and tax
dodging by US entities has prompted Congress to enact innovative, and by some
accounts heavy-handed, legislation to empower the US Government to enforce its laws.
Taking full advantage of its legal jurisdiction and the importance of its financial
markets to other countries and their financial institutions, the US has mandated an
unprecedented, worldwide flow of financial information, apparently with great success.
Section 319 of the PATRIOT Act gives federal authorities the power to bring an in
rem forfeiture action against a foreign bank’s correspondent account in a US bank
where it can be shown that an account in the foreign bank houses illicit proceeds. The
forfeiture may be up to the amount in the foreign account, and it is the foreign bank’s
obligation to make itself whole by effecting a set-off from the foreign account,
provision for which typically would be included in the foreign bank’s agreement with
its customer. The illicit funds need never have transited the correspondent account in
the US and forfeiture actions may be brought against the proceeds of all specified
unlawful activities. The US Government generally brings section 319 forfeiture actions
only if the foreign jurisdiction is unable or unwilling to assist in the forfeiture of the
foreign account.
While US persons have long been required to report foreign income and accounts to
the Internal Revenue Service (IRS), and are subject to harsh penalties for non-
compliance, the 2010 Foreign Account Tax Compliance Act (FATCA) is starting to
make bank secrecy a thing of the past.6 This has created new tensions in the
relationship between the banks and its customers. The law requires FFIs to register with
the IRS and agree to report certain information on accounts of US persons and foreign
entities in which US persons have substantial interests. FATCA provides for a 30 per
cent withholding of taxable US amounts by non-participating FFIs, by participating
FFIs that are unable to obtain reportable information from their customers, and by US
financial institutions making US source payments to foreign entities if they are unable
to provide FATCA documentation about these entities.
The US Government has now finalised or reached agreements in principle with more
than 100 countries, including all key financial centers, and in the case of Russia a law
allowing its banks to participate. The agreements either obligate the country to gather
information from its FFIs and transmit it to the IRS or to facilitate the direct reporting
by its FFIs to the IRS. Where foreign legal or other impediments to FATCA compliance
exist, the country generally agrees to make changes or arrangements to enable
5
Testimony of Thomas J. Curry, Comptroller of the Currency before the Committee on
Banking, Housing, and Urban Affairs of the US Senate, 7 March 2013. See http://www.occ.gov/
news-issuances/congressional-testimony/2013/pub-test-2013-41-written.pdf.
6
See some of the international press about the far reaching nature of FATCA: http://
www.lejournalinternational.fr/FATCA-Brings-an-End-to-Swiss-Banking-Secrecy_a994.html and
http://www.economist.com/node/21547229.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
reporting. For example Switzerland, which chose the FFI direct reporting route,
exempts FFI FATCA reporting from liability under Article 271 of its criminal code. It
also streamlined its administrative assistance procedures and will process group
requests by the IRS to identify account holders who do not consent to FFI reporting of
their information.
FATCA implementation comes amidst a vigorous enforcement effort by the Depart-
ment of Justice (DOJ) to curb US tax evasion through offshore financial institutions.
The initiative began with the investigation and high-profile 2009 deferred prosecution
agreement with UBS AG in which the Swiss bank admitted guilt on conspiracy charges
to defraud the US, discontinued providing banking services to US customers with
undeclared accounts, and paid $780 million. This led to a 2009 agreement with the
Swiss Government that has provided the IRS with a wealth of information about secret
Swiss bank accounts used to evade US taxes and has fuelled numerous investigations.
In January 2013 Wegelin Bank, the oldest private bank in Switzerland, became the first
foreign bank to plead guilty to felony tax charges, and in May 2014 Credit Suisse AG
pleaded guilty to conspiracy to aid and assist US taxpayers in filing false income tax
returns and other documents with the IRS and agreed to pay $2.6 billion.
The Credit Suisse deal has been criticised as too lenient given the bank’s active role
in soliciting thousands of US accounts, the relatively small amount of money paid, the
lack of sanctions on continuing operations in the US and the failure to use available
resources to develop criminal cases against senior executives. On the other hand, in
November 2014 a federal jury acquitted Raoul Weill, formerly the third ranking
executive at USB, on criminal conspiracy charges in connection with the secret
accounts hidden from the IRS. The $1.9 billion settlement with HSBC in 2012 for
money laundering has also come under much fire. In the HSBC money laundering
settlement, one of the charges against its US operations was for the failure to maintain
an adequate AML compliance programme. Increasingly, US financial institutions are
being taken to task for such violations by regulatory agencies, which have the authority
to impose sanctions. For example in January 2014 FinCEN announced that it has fined
JPMorgan Chase Bank, N.A., $461 million for wilfully violating the BSA by failing to
report suspicious transactions arising out of Bernard L. Madoff’s decades-long,
multi-billion dollar fraudulent investment scheme. Nor are smaller banks overlooked.
The Office of the Comptroller of the Currency issued a consent order in June 2014 for
a $500,000 penalty against Associated Bank, N.A., Green Bay, Wisconsin, for failures
in its BSA compliance programme involving monitoring, due diligence, risk assess-
ment, testing of its programme and the training and adequacy of its staff.
THE UK POSITION
It should be no surprise given the significant changes that are occurring in the US and
internationally that the UK has been undergoing its own seismic changes in how banks
and financial institutions interact with government agencies and its own customers. The
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 6 / Date: 8/9
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Financial Conduct Authority (FCA) and its predecessor the FSA7 have shifted their
emphasis in the last 4–5 years from advising banks and financial institutions on how to
create adequate policies and procedures to accountability under criminal laws and
regulatory obligations, partly in response to the Bribery Act of 2010. The FSA/FCA
thematic reviews have provided a clear direction on where the fault lines may lie for
banks and financial institutions, providing more guidance on issues such as third party
due diligence, Gifts and Hospitality, risk assessment, training and key performance
indicators. The UK Parliamentary Commission on Banking Standards has even now
suggested the implementation of new senior management level obligations on whistle-
blowing.8
The statutory and regulatory position in the UK is now clear. The Proceeds of Crime
Act 2002 (POCA) is the UK primary legislation for money laundering while the
Terrorism Act 2000 (TACT) covers the situation with regard to the financing of
terrorism. Part 7 of POCA outlines the money laundering offences and what constitutes
criminal property, sets out the legal requirement to make a disclosure or SAR and the
offences of failing to disclose, and details a requirement to obtain consent to carry out
a prohibited act, placing time restrictions on the National Crime Agency (NCA) and
law enforcement to issue consent to those making the SAR. Part 3 of TACT covers the
corresponding provisions in cases of terrorist financing.
The three main money laundering offences are broad in scope and comply with the
international standards as set by the Financial Action Task Force (FATF). They are as
follows:9
Under POCA a conviction for one of the three money laundering offences carries a
14-year sentence and an unlimited fine. POCA also provides for an offence of failing to
disclose suspicion of criminal property/money laundering, which carries a 5-year
sentence and an unlimited fine.
POCA also requires any individual or company in the regulated sector who either (1)
knows or suspects or (2) has reasonable grounds to know or suspect, that another
person may be engaged in money laundering, or that any or all of the property they are
7
The FSA was replaced by the Financial Conduct Authority and Prudential Regulation
Authority in 2013.
8
See for example the British Bankers Association https://www.bba.org.uk/policy/financial-
crime/anti-bribery-and-corruption/anti-bribery-and-corruption-guidance/.
9
The FATF is an inter-governmental body established in 1989 and sets the standards and
promotes effective implementation of legal, regulatory and operational measures for combating
money laundering, terrorist financing and other related threats to the integrity of the international
financial system, http://www.fatf-gafi.org/.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
dealing with may be criminal property, to report their suspicion of money laundering to
a constable, a customs officer or nominated officer (MLRO or equivalent). The
nominated officer must report their suspicion to the NCA through the prescribed
methods.
Under Part 3 of TACT the decision as to whether or not to obtain consent will arise
in any of these scenarios
For those firms or individuals outside the regulated sector, the legislation only requires
the nominated officer to make the disclosure if they know or suspect that another is
engaged in money laundering or criminal property: the ‘reasonable grounds’ condition
does not apply.
In an effort to offer some protection to the banks and financial institutions, POCA,
through the UK Financial Intelligence Unit based in the NCA, provides a consent
regime which requires institutions or individuals to ask for permission to carry out a
prohibited act if a suspicion has been raised prior to the activity that there is a
suggestion of criminal property in whole or in part attached to the business. The
legislation also stipulates the type of permission required, which is either ‘nominated
officer’ consent, whereby NCA will issue consent to the nominated officer only, or
‘appropriate consent’, where a nominated officer, the NCA, a constable or a customs
officer, may issue consent to carry out the prohibited act.10
But compliance with the law creates a potential problem with regard to a POCA
regulated bank or financial institution and its customers, as the consent regime means
that the NCA has 7 working days from the day after the report was made in which to
give or withhold consent and on the 8th day consent is assumed. Or, in circumstances
where the consent is withheld, the NCA has a further 31 calendar days in which to
obtain a restraint order and on the 32nd day consent is assumed. The 31 days starts as
soon as consent is withheld during the initial moratorium period.
The compliance with the POCA and TACT regimes is now creating tensions for the
banks and financial institutions in the UK in how they regulate their relations with
customers once they are into the legal requirement to make an SAR, particularly since
POCA has “tipping off” provisions at section 333A.11 Under section 333A(1), it is a
10
See the NCA Guidance on consents at http://www.nationalcrimeagency.gov.uk/
publications/24-obtaining-consent-from-the-nca/file.
11
TACT also has similar tipping off provisions under section 21D(1) and section 21D(3).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
criminal offence to disclose to a third party that an SAR has been made by any person
to the NCA or other law enforcement agents if that disclosure might prejudice any
investigation that might be carried out as a result of the SAR. Under section 333A(3) it
is also a criminal offence to disclose that an investigation into a money laundering
offence is being contemplated or carried out if that disclosure is likely to prejudice that
investigation.12
The balance to be struck between the need to comply with the law and to provide a
contractual service to the customer is presenting quite a challenge for the UK’s banks
and financial institutions. In terms of the risks of civil litigation there are a number of
ways in which the banks, financial institutions and their staff expose themselves on the
basis of poor or inadequate compliance with the plethora of AML and related
standards.
Failure to undertake appropriate due diligence or to assess the due diligence
information obtained, in circumstances where, as a result, the institution is then used as
an instrument of fraud, means the victim of the fraud may sue for negligence.13
Of more concern, given compliance with the POCA requirements, in a case where
the bank or financial institution’s official comes to a conclusion that there may be an
underlying criminal offence and so seeks consent from the NCA, the bank may still be
the subject of a civil law suit on the basis that the bank has knowledge or provided
knowing assistance and so acted in breach of a fiduciary duty. The SAR, and the
materials and assessments made in advance of submitting the SAR, could possibly
provide the necessary evidence in a civil trial of such a breach. In fact, obtaining
“consent” may create the very evidence on which a claimant can rely to found a civil
liability. The risk to the bank, and even the individual making the decision, such as an
MLRO, is that the provision of “consent” from the NCA will only protect the bank
and/or the individual with regard to a prosecution under the AML regime. It will not
provide a defence from a civil law suit. So to mitigate the risk it’s imperative that the
information disclosed in the SARs is limited as much as possible to the statutory
POCA tests of “knowledge or suspicion of money laundering, or reasonable grounds to
suspect money laundering”. In this sense banks and financial institutions should be
wary of handing over privileged materials to prevent the client from seeking an order
for breach of contract as well as a breach of the fiduciary relationship.
In the haze of such difficult decision-making the bank or financial institution should
certainly notify professional indemnity insurers at the earliest opportunity of any
circumstances that might give rise to a claim. This should be the case whether the NCA
or law enforcement agents have provided consent yet or not, given the risk of civil
liability arising whether consent has been provided or not. That said the bank or
12
For those outside the remit of a regulated entity under POCA there is a catch all offence
under section 342(1) of prejudicing a confiscation, civil recovery or money laundering
investigation, if the person making the disclosure knows or suspects that an investigation is
being, or is about to be, conducted.
13
Armstrong DLW GMBGH v Winnington Networks Ltd [2012] EWHC 10 (Ch) (11
January 2012) http://www.bailii.org/ew/cases/EWHC/Ch/2012/10.html.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
14
For a comprehensive review of possible risks see the Law Society’s Practice Notes at
http://www.lawsociety.org.uk/advice/practice-notes/aml/civil-liability/#sthash.JEML2KJo.dpuf.
15
Judgment available at http://www.outertemple.com/userfiles/Documents/SharvHSBC
Judgment.pdf.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
markets in Zimbabwe, for example, or will a court infer this at some point in the
future? All that the bank and its staff can currently do, or so it seems, is to record
detailed reasons evidencing consideration of the question and justification for not
submitting an SAR, as a guard against future possible investigation and even litiga-
tion.16
The legal tussle during 2013–2014 between Barclays and Dahabshiil, one of the largest
remitters of money into and out of Africa, in particular Somalia, demonstrates the new
fault lines that are now emerging for banks and how they size up and deal with risk and
relationships that are seen as risky.17
Dahabshiil mounted a high-profile legal challenge against Barclays, the largest UK
bank dealing with remittance companies, after its decision to close its accounts and
those of some 250 other money transfer companies in May 2013 as part of a drive to
meet stricter UK money laundering rules. Dahabshiil initially managed to block the
closures on competition grounds, arguing that although Barclays contractually had the
right to close any accounts it wanted by giving notice of its intention to withdraw
banking services from their businesses, Barclays’ closure was an unlawful abuse of its
dominant position in the market for the provision of banking services to money service
businesses contrary to Article 102 of the Treaty on the Functioning of the European
Union (TFEU) and the Chapter II prohibition in the Competition Act of 1998.
Dahabshiil initially won an injunction against Barclays and eventually agreed an
out-of-court settlement with the bank, that included making alternative banking
arrangements, in April of this year.
Aid groups criticised Barclays’ move saying that such actions could have far-
reaching adverse consequences for countries like Somalia with no formal banking
system and raising fundamental questions about the trend in risk-minimising account
closures across the world’s financial centres. This practice, now known as de-risking,
can be seen as a natural reaction to the double risks of law enforcement attention and
the threat of civil litigation.
The question is now whether the banks and others are unreasonably avoiding risk or
are reasonably minimising it. The issue has become topical at the highest levels, with
the FATF, in October, producing guidance on this issue and reminding banks to only
“terminate customer relationships, on a case-by-case basis, where the money laundering
and terrorist financing risks cannot be mitigated” and to avoid “the wholesale cutting
loose of entire classes of customer”.
In an effort to inject some proportionality into the debate and lower the risk of
withdrawing banking from more classes of individuals and firms, the UK Government
and other groups, such as the British Bankers’ Association, are working towards
creating a “safe corridor” for payments between the UK and Somalia. But this will not
16
For an excellent summary of the case see http://www.shlegal.com/Asp/uploadedFiles/File/
Newsletters/2012_newsletters/06_12/06-12%20Lessons%20from%20Shah.pdf.
17
Every year, migrant Somalis send around $1.3 billion back to their home country,
according to the charity Oxfam.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 11 / Date: 14/10
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
solve the broader growing view of those in the banking world who feel that the risks
are simply not worth taking any longer.
CONCLUSIONS
The risk to US and UK banks and financial institutions of non-compliance with AML
laws and regulations and reporting requirements currently appear to outweigh any risks
of civil liability to customers or third parties. FATCA, just one example of this new
world of regulatory compliance obligations, is already imposing extraordinary admin-
istrative burdens on US institutions and foreign institutions and governments, and has
resulted in the closing of accounts and the withdrawal of assets. These business
challenges are the foreseeable consequences of a new environment of openness made
possible by technological capabilities and fuelled by the fight against money launder-
ing, terrorist financing, sanctions regimes and the determination of the US to recoup the
enormous revenues lost to tax evasion. Despite the collapse of the Swiss bank Wegelin
in 2013 after the US DOJ indicted it for federal felony tax charges, there remains the
feeling that the big banks are “too big to fail”.18 And yet after what has been a very
difficult period for banks and financial institutions and, of course, their clients, the
banks seem to be turning a corner as profitability seems to be returning to the financial
sectors.
So what now lies ahead for banks and financial institutions in terms of compliance
and their dealings with clients and the information that comes across their counters?
Well, in the US, the current global policeman in this area, the messages seem to be
clear. The Federal Reserve Bank of New York is stepping up pressure on banks to
improve their ethics and culture following allegations of benchmark rate rigging.
President of the Federal Reserve Bank, William Dudley, has already gone on record
to state that tougher capital requirements may not solve the problem of banks’
“apparent lack of respect for law and regulation”. He added, “There is evidence of
deep-seated cultural and ethical failures at many large financial institutions.” Mr
Dudley went on to say, “I reject the narrative that the current state of affairs is simply
the result of the actions of isolated rogue traders or a few bad actors within these firms
… The problems originate from the culture of the firms, and this culture is largely
shaped by the firms’ leadership.”19
If Dudley’s statement reflects government resolve, we can expect that banks and
financial institutions, their boards and officers will be held to yet higher standards of
accountability for their actions in order to promote a true corporate climate of lawful
compliance. In return banks and financial institutions can insist on clear and reliable
guidance from government and safe harbour protections against civil liability to their
customers. The risks from law enforcement, regulators and even clients need to be
assessed in a much more nuanced manner. From a UK perspective, what is a potentially
18
“HSBC, too big to indict?” New York Times, 11 December 2012, see www.nytimes.com/
…/hsbc-too-big-to-indict.html.
19
http://mic.com/articles/101920/wall-street-s-top-regulator-just-sent-a-shot-across-the-bow-
to-big-banks.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 12 / Date: 8/9
JOBNAME: Rider PAGE: 13 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
worrying development is the response of the banks to those clients that represent
unnecessary risk. The Dahabsiil case highlights what may become a growing trend,
namely that in assessing risk even on a client-by-client basis, as the FATF advises, the
banks use the opportunity to clear their balance sheets of overly compliance demanding
clients. In addition to the consequent loss of business, damage to customer relationships
and possible harm to the economies of countries like Somalia, such behaviour may well
be counterproductive to government objectives, exacerbating rather than alleviating the
risks to the financial centres from money laundering and the financing of terrorism.
As the President of the FATF, Roger Wilkins, recently put it in an article to the
Financial Times, “You wouldn’t close a toll road because there may be a few criminals
travelling down it every now and then – but that is what is happening if you take it to
extremes.”20
20
Martin Arnold, Financial Times, “Financial task force warns on banks’ approach to
de-risking”, Financial Times, 13 November 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 41 /Pg. Position: 13 / Date: 8/9
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Effectiveness is defined by the Financial Action Task Force (FATF) as ‘(t)he extent to
which the defined outcomes are achieved’.1 Universal agreement on what those
‘defined outcomes’ were for the Anti-Money Laundering (AML)/Combating the
Financing of Terrorism (CFT) system was absent in the past. During the drafting
process of the 2013 Procedures for the 4th Round of Mutual Evaluations2 the FATF
decided to define the outcomes and assess the extent to which countries achieve them.
After long internal debate the FATF defined the overall outcome of its measures against
money laundering as well as terrorist financing as follows for purposes of its mutual
assessment methodology: ‘Financial systems and the broader economy are protected
from the threats of money laundering and the financing of terrorism and proliferation,
thereby strengthening financial sector integrity and contributing to safety and security.’3
This chapter focuses on the effectiveness question relating to AML/CFT measures. It
considers the evolution of the effectiveness question from a focus on the FATF itself to
a focus on the impact of the implementation of its standards on crime and on the crime
risk profiles of countries. The chapter considers some tensions between the defined
outcome and the FATF Recommendations and closes with observations regarding
questions that are absent from the current focus.
1
Financial Action Task Force, Methodology for Assessing Technical Compliance with the
FATF Recommendations and the Effectiveness of AML/CFT systems (2013) para 38.
2
Ibid, para 2.
3
Ibid, para 42.
4
William Gilmore, Dirty Money (Council of Europe, 3rd edn, 2004) 89.
5
G7 Summit, Economic Declaration (Paris, 14–16 July 1989) <http://www.g8.utoronto.ca/
summit/1989paris/communique/drug.html> para 52.
520
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
assembled over 130 experts6 from a diverse range of backgrounds including diplomats,
‘civil servants, some senior police, investigating judges, regulators and politicians’ who
had a common interest in ‘monitoring and regulating different aspects of the drugs
trade on a global basis’.7 By February 1990, the task force had delivered a detailed
report containing what became known as the ‘FATF 40 Recommendations’. This report
was endorsed at Ministerial level in May of that year and presented to and adopted by
the G7 Houston Summit in July 1990.8
To advance AML, the Recommendations had to be adopted by the global community.
International recognition of the Recommendations as global standards was however
neither immediate nor automatic. The political sensitivity of some of the Recommenda-
tions, especially their impact on sovereignty, posed an obstacle. To address this, the
FATF emphasised the expertise informing the Recommendations, for example by
describing its working group sessions as ‘expert meetings’, with comprehensive inputs
from government agencies, law enforcement and policy departments.9 Kerwer and
Hülsse believe this ‘expertisation’ by the FATF assisted in acquiring legitimacy and
adding authority to the Recommendations.10 By the mid-1990s, the FATF gained
recognition as the global AML standard-setter and had developed into a politically
significant group. This standing was enhanced as the task force moved quickly to adopt
Special Recommendations on terrorist financing by December 2001, thereby position-
ing itself centrally within the global political response following the September 2001
terrorist attacks.
The FATF was not only concerned with legitimacy, however. During the first decades
of its existence it had sought ways to demonstrate the effectiveness of its strategy. This
question was largely focused on the effectiveness of the FATF as a global standard-
setter rather than the effect that its Recommendations had when implemented in
practice.
6
Gilmore supra at n 4, 94.
7
Michael Levi, Controlling the International Money Trail: A Multi-level Cross-National
Public Policy Review (Economic and Social Research Council, 2003) 13.
8
Gilmore supra at n 4, 89.
9
Dieter Kerwer and Rainer Hülsse, ‘How International Organizations Rule the World: The
Case of the Financial Action Task Force on Money Laundering’ (2011) 2(1) Journal of
International Organization Studies 50, 56.
10
Ibid, 58.
11
Jason Sharman, ‘Power and Discourse in Policy Diffusion: Anti-Money Laundering in
Developing Countries’ (2008) 52(3) International Studies Quarterly 635–656.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
countries and two regional organisations,12 whose lack of representation could have
eroded the global legitimacy of its standards.13 The FATF mitigated this risk in two
ways.
First, it leveraged the influence and expertise of member countries to establish
regional FATF-style bodies (FSRBs) that resemble the FATF in their structure and
operations, and assume responsibility for implementation of the international standards
by countries within their region. By adopting this model, the FATF has been able to
achieve a global coverage of their standards, especially ensuring the engagement of
‘weaker’ jurisdictions where it was feared that financial crime might flourish if the
standards were not implemented.14
Second, after 2001 the FATF also leveraged the membership and expertise of the
international financial institutions (IFIs), particularly the World Bank and the Inter-
national Monetary Fund (IMF).15 Their Financial Sector Assessment Program (FSAP)
and Report on the Observance of Standards and Codes (ROSC) processes as well as
their technical assistance broadened and deepened the international implementation of
the Recommendations.
Two other critical components contributed to the success of the global programme.
The first was the adoption of an evaluation programme to assess how countries meet or
exceed compliance with the standards. The model used for this evaluation has been
‘borrowed’ from the Organisation for Economic Co-operation and Development
(OECD) and rests on the concept of mutual evaluation by other countries.16 FATF and
FSRB members17 contribute to evaluation teams who assess compliance levels of
countries against complex, standardised criteria. The second element was leveraging
political and economic pressure, especially exerted at a financial institution level,
against non-compliant countries. These may result in restrictions being placed on the
operations of that country’s financial sector.18
In 2000 the FATF launched a ‘name and shame’ process of ‘blacklisting’ those
countries that refused to cooperate or were slow to reach satisfactory levels of
implementation. The Non-Cooperative Countries and Territories (NCCT) programme
was a coercive measure encouraging states to adhere to, or comply with, the FATF
12
In June 2014 the FATF announced that it had commenced a process to consider the
readiness of a small number of candidate countries to join the FATF.
13
Kenneth Blazejewski ‘The FATF and Its Institutional Partners: Improving the Effect-
iveness and Accountability of Transgovernmental Networks’ (2008) 22(1) Temple International
and Comparative Law Journal 1, 2.
14
Ibid, 7.
15
The IFIs initially felt that financial crime, while a contributor to instability within a
country, may be outside of their jurisdiction. See William Holder, ‘The International Monetary
Fund’s Involvement in Combating Money Laundering and the Financing of Terrorism’ (2003)
6(4) Journal of Money Laundering Control 383, 386.
16
Levi supra at n 7, 14.
17
The IFIs also conduct evaluations through the FSAP and ROSC processes. Although these
are not strictly mutual evaluations, there is information sharing and collaboration between the
IFI assessment teams and those of the FATF.
18
IMF, Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT) –
Report on the Review of the Effectiveness of the Program (International Monetary Fund, 2011)
83.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 3 / Date: 8/9
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Recommendations. While it can be claimed that the NCCT programme gained results,
it was controversial. The divisive programme was phased out and replaced with a more
objective and generally supported grey and blacklisting process, identifying high-risk
and non-cooperative jurisdictions as part of the International Co-operation Review
Group (ICRG) framework.
To date three rounds of mutual evaluation have been conducted and the fourth is
underway.19 In general the assessments have shown that adoption levels of individual
Recommendations differ from country to country. No country is yet fully compliant
with the FATF Recommendations, although the compliance levels of developed
countries are generally higher than those of developing countries, and levels of
compliance are also higher in relation to the more established Recommendations as
compared to newer Recommendations.20
By 2012 the FATF could therefore demonstrate nearly universal country-level
adoption of its standards with increasing levels of national compliance. The system was
therefore sufficiently mature to enable the FATF to move its focus from the adoption of
the Recommendations to the effectiveness of their implementation at a national level.
19
Concepcion Verdugo Yepes, Compliance with the AML/CFT International Standard:
Lessons from a Cross-Country Analysis (IMF Working Paper 11/177, 2011).
20
Ibid, 6.
21
Financial Action Task Force supra at n 1.
22
Ibid, para 42.
23
Ibid, para 43.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 4 / Date: 8/9
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
1. Policy, coordination and cooperation mitigate the money laundering and financing
of terrorism risks.
2. Proceeds of crime and funds in support of terrorism are prevented from entering
the financial and other sectors or are detected and reported by these sectors.
3. Money laundering threats are detected and disrupted, and criminals are sanctioned
and deprived of illicit proceeds. Terrorist financing threats are detected and
disrupted, terrorists are deprived of resources, and those who finance terrorism
are sanctioned, thereby contributing to the prevention of terrorist acts.
The actual effectiveness assessment focuses primarily on the extent to which a country
meets 11 specified Immediate Outcomes.24 In essence countries that meet these
Immediate Outcomes would be assumed to meet the three Intermediate Outcomes and,
in turn, the High-Level Outcome too.25
While there is much to commend in this set of outcomes it is important to appreciate
that they were identified as the intended outcomes of the FATF standards more than
two decades after the original Recommendations were adopted. There is little evidence
that a strategic outcome-focused approach – or indeed the High-Level Outcome defined
for purposes of this assessment – informed the drafting of the original Recommenda-
tions or the subsequent revisions of the Recommendations. The risk of such an ex post
facto definition of the purpose of the AML/CFT system is a possible misalignment
between the actual Recommendations and the defined outcome. It is submitted that
traces of such misalignment are present.
24
These are not directly relevant to this chapter. Examples of the Immediate Outcomes
include: ‘Money laundering and terrorist financing risks are understood and, where appropriate,
actions coordinated domestically to combat money laundering and the financing of terrorism and
proliferation’; ‘International cooperation delivers appropriate information, financial intelligence,
and evidence, and facilitates action against criminals and their assets’; ‘Supervisors appropriately
supervise, monitor and regulate financial institutions and DNFBPs for compliance with
AML/CFT requirements commensurate with their risks’; and ‘Financial institutions and
DNFBPs adequately apply AML/CFT preventive measures commensurate with their risks, and
report suspicious transactions’.
25
Financial Action Task Force supra at n 1, para 43.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 5 / Date: 8/9
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
as a whole.26 The FATF’s initial 1989 focus was primarily aimed at the banking sector
and bureaux de change. By 2003 it had broadened to a range of financial institutions
and designated non-financial businesses and professions (DNFBPs).27 While some of
its pre-2012 Recommendations and guidance reached broader than regulated financial
services and DNFBs,28 the FATF had not explicitly adopted a brief encompassing the
economy as a whole. Such a broad focus would have required appropriate Recom-
mendations to address money laundering and terrorist financing threats to non-financial
business activities, for example trade-based laundering controls for exporters,29 a
prohibition on the issuing of high denomination bank notes and measures to limit
informal economic activity.30 The revised Recommendations however retained their
limited focus on financial institutions and DNFBPs, not even explicitly broadening the
narrow, defined group of DNFBPs identified in 2003. Countries are however required
to consider extending AML/CFT regulation to other additional types of businesses and
professions that are identified in risk assessments as vulnerable to the risk of money
laundering or terrorist financing abuse.31 Any such counter-measures would only be
national rather than global in nature and may therefore have limited effect and even
negative economic consequences for the country concerned.
Despite not being reflected in the Recommendations the FATF did consider some of
the broader elements. Informal economic activity was for example considered a
sufficient risk factor to be included as a possible contextual matter that assessors should
consider when designing their assessment for a particular jurisdiction.32 These refer-
ences however are peripheral to the assessment and largely optional. It is also possible
that the risk-based approach that was entrenched as mandatory in the 2012 Recom-
mendations33 may lead countries over time to fashion and adopt control measures to
26
Louis de Koker, ‘Aligning Anti-Money Laundering, Combating of Financing of Terror and
Financial Inclusion: Questions to Consider when FATF Standards Are Clarified’ (2011) 14(4)
Journal of Financial Crime 361.
27
Financial Action Task Force, The Forty Recommendations (2003).
28
For pre-2012 Recommendations in this regard see Recommendation 20 on more secure
money management and broadening AML/CFT controls to other high-risk businesses and
Special Recommendations VI on alternative remittance and IX on cash couriers.
29
Ross Delston and Stephen Walls, ‘Reaching beyond Banks: How to Target Trade-Based
Money Laundering and Terrorist Financing Outside the Financial Sector’ (2009) 41(8) Case
Western Reserve Journal of International Law 85; John Zdanowicz, ‘Trade-Based Money
Laundering and Terrorist Financing’ (2009) 5(2) Review of Law and Economics 858; Samuel
McSkimming, ‘Trade-Based Money Laundering: Responding to an Emerging Threat’ (2009)
15(1) Deakin Law Review 37; Clare Sullivan and Evan Smith, Trade-Based Money Laundering:
Risks and Regulatory Responses (Australian Institute of Criminology, 2011). This topic was
deemed sufficiently important for the FATF to issue Best Practices on Trade-Based Money
Laundering (2008), but the guidance was not incorporated into the Recommendations.
30
Louis de Koker supra at n 26.
31
Financial Action Task Force, International Standards on Combating of Money Laundering
and the Financing of Terrorism and Proliferation: The FATF Recommendations (2012),
Recommendations 1 and 10, read with their interpretative notes.
32
Financial Action Task Force supra at n 1, para 8. See also pp 97 and 100 in respect of
potential relevant information that assessors may consider.
33
Financial Action Task Force supra at n 31.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
mitigate broader money laundering risks that reach beyond the ambit of the current
Recommendations. This is however unlikely in respect of matters such as trade-based
laundering or even the issuing of high denomination bank notes, where solutions
require international cooperation and joint action.
The reach of the High-Level Outcome is therefore not reflected in the Recommenda-
tions themselves, limiting the probability that effective implementation of the Recom-
mendations will result in the protection of financial systems and the broader economy.
34
Louis de Koker, ‘The 2012 Revised FATF Recommendations: Assessing and Mitigating
Mobile Money Integrity Risks within the New Standards Framework’ (2012) 8 Washington
Journal of Law, Technology and Arts 165, 175.
35
Louis de Koker supra at n 26, 367–368.
36
Ian Angell and Dionysios Demetis, ‘Systems Thinking about Anti-Money Laundering:
Considering the Greek Case’ (2005) 8(3) Journal of Money Laundering Control 271, 277.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 7 / Date: 8/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the FATF recognizes this danger in relation to low risk financially excluded customers,
it still embraces the exclusionary strategy in relation to higher risk customers – those
whose transactions are often of particular interest to law enforcement.37
There are also more fundamental questions regarding the link between the counter
money laundering strategy of the FATF and the High-Level Outcome. The early
financial crime countermeasures rely heavily on assumptions of causality. Under-
pinning much of the countermeasure strategy is the assumption that the ‘anticipation of
conviction and punishment reduces the loss from offences and thus increases social
welfare by discouraging some offenders’.38 A second assumption is that ‘going after the
money’ provides both a deterrent and punishment for organised criminal groups.39
Taking this further is the linking of money laundering control to the underlying
predicate offence where the ‘ultimate goal of the AML regime is to deter criminals
from laundering monies, and thereby deter them from committing predicate crimes in
the first place’.40 Ultimately this leads to a ‘plausible assumption that as the cost of
laundering goes up, the profits from crime are reduced. If the goal of crime is to
achieve profits, then the inclination is reduced.’41 Collectively these assumptions
underpin most of the FATF standards. The ability to test their validity is unfortunately
reduced by a lack of reliable data, for example data on the scale of the criminal
problem and on criminal behaviour in different countries around the world.
The challenges regarding quantification of proceeds of crime illustrates the data
dilemma. Generally cited IMF statistics arising from a report in the 1990s suggested
that 2–5 per cent of global gross domestic product (GDP) was laundered yearly.42 The
FATF itself tried to measure the value of money laundering at the turn of the century,
but this initiative did not produce tangible results.43 Attempts to quantify the proceeds
of crime are not only complicated by the absence of reliable data but also by the lack
37
Financial Action Task Force, FATF Guidance: Anti-Money Laundering and Terrorist
Financing Measures and Financial Inclusion (FATF, 2011, revised 2013); Financial Action Task
Force, ‘FATF Clarifies Risk-Based Approach: Case-by-Case, Not Wholesale De-risking’ State-
ment (Paris, 23 October 2014) <http://www.fatf-gafi.org/documents/news/rba-and-de-
risking.html>. See also Financial Action Task Force, ‘Drivers for “De-risking” Go Beyond
Anti-Money Laundering / Terrorist Financing’ Statement (Brisbane, 26 June 2015) <http://
www.fatf-gafi.org/topics/fatfrecommendations/documents/derisking-goes-beyond-amlcft.html>.
38
Gary Becker, ‘Crime and Punishment: An Economic Approach’ (1968) 76(2) Journal of
Political Economy 169, 204.
39
Ethan Nadelmann, ‘Unlaundering Dirty Money Abroad: U.S. Foreign Policy and Financial
Secrecy Jurisdictions’ (1986) 18(1) University of Miami Inter-American Law Review 33, 34;
Jeffrey Quillen, ‘The International Attack on Money Laundering: European Initiatives’ (1991)
Duke Journal of Comparative and International Law 213–240.
40
Donato Masciandaro, Előd Takáts and Brigitte Unger, Black Finance (Edward Elgar,
2007) 202.
41
Mariano-Florentino Cuellar, ‘The Tenuous Relationship between the Fight against Money
Laundering and the Disruption of Criminal Finance’ (2002) 93(2–3) Journal of Criminal Law
and Criminology 311, 385.
42
Vito Tanzi, Money Laundering and the International Finance System (IMF Working Paper
96/55, 1996).
43
United Nations Office on Drugs and Crime, Estimating Illicit Financial Flows Resulting
from Drug Trafficking and Other Transnational Organized Crimes (2011) 19.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 8 / Date: 8/9
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
44
See for example Peter Reuter and Edwin M. Truman, Chasing Dirty Money: The Fight
against Money Laundering (Institute for International Economics, 2004); Brigitte Unger, The
Scale and Impacts of Money Laundering (Edward Elgar, 2007) ch 3; John Walker and Brigitte
Unger, ‘Measuring Global Money Laundering: “The Walker Gravity Model”’ (2009) 5(2) Review
of Law and Economics 821.
45
According to the Recommendation these statistics should include statistics on the
suspicious transactions received and disseminated; on money laundering and terrorist financing
investigations, prosecutions and convictions; on property frozen, seized and confiscated; and on
mutual legal assistance or other international requests for cooperation. Despite the use of
‘efficiency’ in Recommendation 33 the examples of statistics that countries are required to keep
appear more focused on effectiveness than efficiency. The list for example does not include
public and private costs of the AML/CFT system. The FATF is however also focused on the
efficiency of its internal organisational and working methods to enhance effectiveness and
efficiency. See for example Financial Action Task Force, Objectives for FATF XXV (2013–2014):
Paper by the Incoming President (2013) 1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 9 / Date: 8/9
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
financing offences increased the risks faced by such countries and institutions. In that
context the cost arguments became less sustainable. These arguments are furthermore
complicated by difficulties with estimating financial and other costs accurately.46
Despite these difficulties financial efficiency should not be removed from the analysis.
Neither should social costs be ignored. For many developing countries with limited
resources, money that is spent on AML/CFT to support global crime combating efforts
may be diverted from social investment and infrastructure expenditure even though the
crime and terrorist risks faced by the country itself may be low.
An enquiry that is only focused on effectiveness may not consider the cost of
over-compliant behaviour as long as the intended outcomes are achieved. A case in
point is the FATF reliance on reporting by financial institutions and DNFBPs of
suspicious transactions. They are required to report suspicious transactions to the
financial intelligence unit.47 It is costly to train employees to identify suspicious
transactions correctly. Even with the appropriate training, institutions lack access to
criminal intelligence that is needed to identify the relevant transactions. Law enforce-
ment may have such intelligence but it is often too sensitive to allow them to share that
with institutions. This decreases the odds of institutions identifying and reporting
relevant transactions. Concerned about regulatory penalties should they fail to identify
a transaction correctly, institutions tend to over-comply48 and report complex and
extraordinary transactions that may not actually involve any criminal funds. This in turn
increases the impact of the reporting obligations on privacy of citizens, leading to the
reporting of a large number of confidential transactions that are actually legitimate.
This flood of useless transaction data may drown financial intelligence units and
decrease their ability to identify and respond to reports of actual criminal transactions.
AML/CFT controls may also have economic impacts, for example by raising cost
barriers for new entrants to the regulated market. Financial institutions and DNFBPs
are required to have appropriate compliance systems and resources to mitigate money
laundering and terrorist financing risks. While existing institutions have been able to
grow their compliance framework as AML/CFT rules expanded, new entrants must
budget to establish a comprehensive system upfront. These cost barriers are increasing
in height as the system develops, and may increasingly impact on competitiveness in
the market.
Financial exclusion is a major social cost. For close on two decades the FATF was
not particularly receptive to arguments that its exclusionary AML/CFT strategy also led
to the exclusion of socially vulnerable people who are not able to prove their identities
to regulated institutions.49 This attitude softened, and in 2011 the FATF issued a
guidance paper (revised in 2013) guiding countries and institutions on ways to align
46
Hans Geiger and Oliver Wuensch, ‘The Fight against Money Laundering: An Economic
Analysis of a Cost–Benefit Paradoxon’ (2007) 10(1) Journal of Money Laundering Control 91;
Milind Sathye, ‘Estimating the Cost of Compliance of AML/CTF for Financial Institutions in
Australia’ 2008 15(4) Journal of Financial Crime 347.
47
Financial Action Task Force supra at n 31, Recommendation 20.
48
Louis de Koker and John Symington, ‘Conservative Corporate Compliance: Reflections
on a Study of Compliance Responses by South African Banks’ (2014) 30(1) Law in Context 228.
49
Louis de Koker supra at n 26, 367–368.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 10 / Date: 8/9
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
50
Financial Action Task Force supra at n 36.
51
Financial Action Task Force supra at n 31, Recommendation 10, read with its interpret-
ative note.
52
Hennie Bester, Doubell Chamberlain, Louis de Koker, Christine Hougaard, Ryan Short,
Anja Smith and Richard Walker, Implementing FATF Standards in Developing Countries and
Financial Inclusion: Findings and Guidelines (FIRST Initiative, World Bank, 2008) 158–162;
Dahabshiil Transfer Services Ltd v Barclays Bank plc and Harada Ltd and another v Barclays
Bank plc [2013] EWHC 3379 (Ch).
53
See Iain Murray, Operation Choke Point: What It Is and Why It Matters (Competitive
Enterprise Institute, 2014).
54
Financial Action Task Force supra at n 37.
55
Charles Freeland, ‘How Can Sound Customer Due Diligence Rules Help Prevent the
Misuse of Financial Institutions in the Financing of Terrorism?’ (2002) 4(2) European Journal of
Law Reform 291, 298; Donato Masciandaro, Előd Takáts and Brigitte Unger supra at n 340, 32.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 11 / Date: 8/9
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
The shift of the effectiveness focus from the FATF as global standard-setter to the
impact of the national AML/CFT system on national crime and crime risk is
commendable. While aspects of the current effectiveness framework can be questioned,
it should be viewed as the first step in a process that will mature over the next years.
The results of the enquiry will inform improvements to the conceptual framework and
should over time also inform the revision of the AML/CFT standards to improve their
effectiveness and, it is hoped, also their efficiency.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 42 /Pg. Position: 12 / Date: 14/9
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
532
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 1 / Date: 8/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
AML: balance between controlling serious crime and human rights 533
The retreat of privacy clashes with the duty of confidentiality owed by financial
facilitators to their customers, the classic duty to keep financial affairs secret.1 While
this privacy norm has a venerable history, it has arguably gently and quietly withered
through years of AML regulation.2
A more pronounced tension between AML regulation and rights occurs in the context
of lawyers. Most jurisdictions acknowledge that the relationship between members of
the legal profession and their clients merits some degree of special recognition.3 The
relationship is sacrosanct in a way that differs from other relationships, devolving
principally from the function that lawyers occupy in a justice system. Unlike other
professionals, lawyers are central to the mechanism of social order, integral parts of the
system through which justice is mediated and determined. They are simultaneously
advocates for individual clients and advocates for the legal apparatus itself, owing
duties to both clients and to the broad machinery of justice. The private character of
their relationships warrants greater deference, the confidences between lawyers and
their clients being paramount to a well-organized society.
AML regulation interferes with the privileged nature of that relationship. Requiring
that lawyers collect information about their clients to possibly relay to the state or
requiring that they report suspicions about the nature of their clients activities abrogates
confidentiality. Lawyers in the United States have resisted regulation given concern that
intrusive disclosures violate the sanctity of the attorney–client relationship.4 Other
jurisdictions, perhaps with reluctance, have brought lawyers directly into the ranks of
money laundering prevention.
Uneasiness exists over the balance between attacks on the financial dimension of
crime and the privileged nature of legal relations. An initial Canadian attempt to impose
AML regulation on lawyers failed.5 A subsequent attempt was blocked by a determin-
ation that some elements of AML law interfere with the independence of legal
1
Tournier v National Provincial and Union Bank of England [1924] 1 KB 461 (CA).
2
Some refer to the complete demise of the duty of confidentiality: Michael Levi,
‘Regulating Money Laundering: The Death of Bank Secrecy in the UK’ [1991] Br J Criminology
109; Organisation for Economic Co-operation and Development, The Era of Bank Secrecy Is
Over: The G20/OECD Process Is Delivering Results, 26 October 2011. Others suggest the duty
continues to exhibit modest signs of life: Tara Walsh, ‘The Banker’s Duty of Confidentiality:
Dead or Alive?’ [2010] Edinburgh Student LR 1.
3
See generally, Daniel Fischel, ‘Lawyers and Confidentiality’ [1998] U Chicago L R 1;
James Moliterno and George Harris, Global Issues in Legal Ethics (Thomson West, 2007)
82–93; David Greenwald and Marc Russenberger, Privilege and Confidentiality: An Inter-
national Handbook (Bloomsbury Professional, 2012).
4
American Bar Association, ‘Gatekeeper Regulations on Lawyers’ <http://www.american
bar.org/advocacy/governmental_legislative_work/priorities_policy/independence_of_the_legal_
profession/bank_secrecy_act.html> accessed 5 April 2013. Recent initiatives suggest the United
States’ Senate anticipates bringing lawyers under formal financial reporting rules. The American
Bar Association has created, and continues to advocate for, a voluntary code of best practices for
legal counsel in the context of money laundering prevention.
5
Law Society of British Columbia v Canada [2001] 207 DLR 4th 726; Federation of Law
Societies of Canada v Canada (Attorney General) 6 December 2001 (delivered orally in
chambers); Federation of Law Societies of Canada v Canada (Attorney General) [2002] 207
DLR 4th 740; Federation of Law Societies of Canada and the Law Society of Saskatchewan
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 2 / Date: 8/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
counsel.6 Requirements that legal counsel in France report suspicious financial activity,
arguably the most contentious debate, were not found to violate privacy protections
contained in the European Convention on Human Rights.7 The special quality of
communications with lawyers was acknowledged: ‘… Article 8 protects the confiden-
tiality of all “correspondence” between individuals, it affords strengthened protection to
exchanges between lawyers and their clients. This is justified by the fact that lawyers
are assigned a fundamental role in a democratic society, that of defending litigants.’8
However, the degree of interference was justifiable, necessary and not disproportion-
ate to the underlying aim of shackling serious crime.
[2002] SKQB No 153; Federation of Law Societies of Canada v Canada (Attorney General)
[2002] NSR 2nd 53. See also, M M Gallant, ‘Canada, Crime Control and Co-opting Legal
Counsel: Canvassing the Confidentiality Crisis’ [2003] J Financial Crime 308.
6
Federation of Law Societies of Canada v Canada (Attorney General) [2013] BCCA 147.
The Court determined that the independence of the legal profession was a constitutionally
protected right violated by the AML regime. However, the decision is on appeal to the Supreme
Court of Canada.
7
Michaud v France App No 12323/11 (ECHR, 12 December 2012).
8
Ibid paragraph 118.
9
See, United Nations Convention against Transnational Organized Crime, Article 12 (7),
which provides that states consider ‘the possibility of requiring that an offender demonstrate the
lawful origin of alleged proceeds of crime or other property liable to confiscation …’; Financial
Action Task Force, FATF Recommendations (FATF, 2012). Recommendation 4 provides that
countries consider, in the context of confiscation proceedings, requiring that an offender
demonstrate the lawful origins of the property liable to confiscation.
10
See generally, Janet Ulph, Commercial Fraud: Civil Liability, Human Rights and Money
Laundering (OUP, 2006) 131–152; Robin Booth, Simon Farrell, Guy Bastable and Nicholas Yeo,
Money Laundering Law and Regulation: A Practical Guide (OUP, 2011) 53–74.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
AML: balance between controlling serious crime and human rights 535
shift the balance of the rights equation, making it easier to impose criminal liability at
the expense of any rights.
More delicate rights considerations arise from laws that apply post-conviction, laws
triggered by a criminal conviction for a money laundering offence or some other
serious crime. Aimed at ensuring that AML fully tackles the financial element of crime,
the thrust of post-conviction rules is to expand the scope of assets liable to confiscation
or forfeiture. Some jurisdictions may realize that expansion by the explicit endorsement
of the civil standard of proof as the standard that governs the confiscation process.11
The potential scope may be increased by reliance on a series of presumptions about the
origins of resources, presumptions that are triggered by the prior conviction.12 In other
jurisdictions, the expansion of liability to confiscation may be expressed as enhanced
reliance on prima facie evidence.13
There is some acknowledgement that post-conviction confiscation may not
adequately respect rights. When AML confiscation regimes render the taking of assets
disproportionate to the underlying offence, potentially capturing some measure of
lawfully acquired property interests, the regime may fail to satisfy the rule of law.14
The taking may violate constitutional norms if it is excessive.15 If the confiscation of
assets can convert into a term of imprisonment, it may trigger the application of a
higher order of rights.16
More worrisome questions about the proper balance between regulating criminal
finance and the rule of law emerge from the contemporary tendency of AML law to
rely on non-conviction based models forfeiture.17 Non-conviction based forfeiture
anticipates the taking of property for an alleged connection to crime in the absence of
any prior criminal conviction. More than merely modifying the rules of a particular
process to facilitate the taking of property post-conviction, non-conviction based
takings dispense with any criminal legal rules. In species, property is liable to be forfeit
for its relation to criminal activity although the criminal allegations need not be proven
in accordance with the dictates that govern the criminal legal process. The models
11
South African confiscation law explicitly rejects any application of any civil legal
attributes to confiscation proceedings. While many national regimes provide for the governance
of the civil standard of proof, the South African regime is much more unequivocal in identifying
confiscation as a civil proceeding. In setting out the framework for confiscation, South African
law specifically provides that confiscation is a civil proceeding, specifically incorporates the
rules of evidence applicable to civil proceedings, pointedly precludes the application of any
criminal rules of evidence, and clearly rejects any rules of construction that would apply in
criminal proceedings: Prevention of Organized Crime Act 121 of 1998 (SA), article 13.
12
Proceeds of Crime Act 2002 (UK) article 10.
13
Prevention of Organized Crime Act 121 of 1988, article 22.
14
R v Waya [2012] UKSC 51.
15
United States v Bajakajian (1998) 524 US 321 (criminal forfeiture); Alexander v United
States (1993) 509 US 062.
16
Welch v UK (1995) 20 EHRR 247.
17
The first hints of global endorsement of the non-conviction based strategy occurred in
2012: Financial Action Task Force, The FATF Recommendations, February 2012, Recommenda-
tion 4. International conventions related to tainted finance do not speak directly to reliance on
non-conviction based confiscation. The revised FATF recommendations mark the first formal
global endorsement. Individual states introduced the strategy much earlier.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
purport to operate within the confines of the civil legal justice mechanisms. As such,
non-conviction based takings mark a radical shift from the criminal law to the civil law,
from criminal proceedings to civil actions.
Post-conviction regulation of criminal finance is widely endorsed. The non-
conviction approach is less common.18 The United States leads in this area, having
operationalized non-conviction based models in the early 1970s. Called forfeiture, or
civil forfeiture, US law permits the civil taking of laundered moneys, sometimes known
as the forfeiture of the proceeds of crime.19 Early versions of US law allowed that
taking to occur upon an extremely low threshold of proof, the equivalent to that
required for the issuance of warrants.20 Legislative changes, in part responsive to
rights-based considerations, altered that threshold to enable assets linked to crime to be
forfeit upon proof to the higher civil standard of a balance of probabilities. A
non-conviction based Australian AML law presents perhaps the most extreme version
of a civil legal model. The law permits the making of unexplained wealth orders.21 The
regime provides that once the state has seized property for alleged connection to crime,
the burden of proof then lies with a property claimant to establish legitimate title.
Under this framework, the civil forfeiture law appears to assume the correctness of the
state’s claim unless the claimant can prove otherwise. This differs widely from the
established nature of civil legal governance. Conventionally, civil actions demand that
anyone who seeks to disrupt the status quo, seeks to disrupt any existing propriety
relationships, carries the initial legal burden to prove their case to the governing civil
standard. This Australian model countenances the placing of that burden on the
claimant and has yet to be tested for its congruence with rights-based norms.22
In discerning whether the US model conforms to constitutional norms, civil
forfeiture has been found to be consistent with the protection against double jeopardy,
classically the protection of the right not to be accused and tried twice for the same
offence.23 There is no doubt that underlying facts of civil forfeiture proceedings relate
to allegations of criminal, as opposed to civil, wrongdoing. AML forfeiture laws, in the
context of the United States and elsewhere, do not contemplate a taking of property
18
Examples of non-conviction based forfeiture include Proceeds of Crime Act 2002 (UK),
Part 5; Prevention of Organized Crime Act 121 of 1998 (SA) Chapter 6; Criminal Property
Forfeiture Act, 2004 (Manitoba).
19
American federal law contains multiple forfeiture provisions related to earnings tainted by
crime; see, Charles Doyle, Crime and Forfeiture, Congressional Research Service Report for
Congress, May 2013, 3–13.
20
The low threshold of proof was one of many criticisms of civil forfeiture regulation. See,
Tamara Piety, ‘Scorched Earth: How the Expansion of Civil Forfeiture Doctrine Has Laid Waste
to Due Process’ (1991) 45 U Miami L R 911; Amy Ronner, ‘Prometheus Unbound: Accepting a
Mythless Concept of Civil In Rem Forfeiture with Double Jeopardy Protection’ (1996) Buffalo L
R 655.
21
Proceeds of Crime Act 2002 (Australia) Part 2-6. Unexplained wealth is the difference
between a person’s wealth and wealth that is lawfully acquired.
22
For a compelling critic, see Anthony Gray, ‘Forfeiture Provisions and the Criminal/Civil
Divide’ (2012) 15 New Crim L R 32 and Anthony Gray, ‘The Compatibility of Unexplained
Wealth Provisions and “Civil” Forfeiture Regimes with Kable’ (2012) 12 QUT L Justice J 18.
23
One Lot Emerald Cut Stones v United States (1972) 409 US 232; United States v One
Assortment of Firearms (1984) 465 US 354; United States v Ursery (1996) 518 US 267.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
AML: balance between controlling serious crime and human rights 537
24
Gale and Another v Serious Organized Crime Agency [2011] UKSC 49. The situation may
be entirely different when shifting of standards of proof, or other changes to the rules of classic
criminal proceedings, are relevant to a conviction rather than to the confiscation process:
Sekanina v Austria (1993) 17 EHRR 221; Rushti v Austria (2001) 33 EHRR 56.
25
Chatterjee v Ontario (Attorney General) [2009] 1 SCR 624.
26
Austin v US (1993) 509 US 602.
27
National Director of Public Prosecution v RO Cook Properties [2004] A All SA 491
(SCA).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
of crime. Presumptively, any assault on criminal assets does not contemplate any
forfeiture of property that is of lawful origin. The object, after all, is to forfeit money
derived from criminal activity. Few have heeded any distinctions between the proceeds
of crime and the profits of crime.28 The pervasiveness of the language of the proceeds
of crime greatly risks forfeiture of property that, given that the forfeiture may include
legitimate earnings or legitimately acquired property, fails to respect rights.29
Whether in the context of criminal confiscation or non-conviction forfeitures, AML
regulation obviously interferes with property rights. AML law targets assets. It permits
the temporary seizure and the permanent forfeiture of property. Claims that regulation
unduly interferes with individual rights to property ring rather hollow.30 Rights to
property are never absolute. Most democratic societies permit the ceding of rights to
property when the abrogation is reasonable and justified by some other compelling
public interest. In the context of collisions between property rights and the control of
serious crime, the former is apt to yield. Provided the forfeiture process affords some
measure of due process, some right to be heard or opportunity to contest the taking, the
legitimate public interest in controlling serious crime trumps rights to property.
28
In at least one context, the US Supreme Court held that the term ‘proceeds’ referred to the
net profits of money laundering offences: United States v Santos (2008) 553 US 507.
29
Many regimes do offer a measure of protection for innocent property owners, individuals
whose property may, without their knowledge, have been co-opted into criminal pursuits. For
example, section 17 of the Criminal Forfeiture of Property Act, CCSM c. CC 306 (Manitoba),
provides for orders to protect the interests of property owners, or others having some interest in
property liable to forfeiture, provided they have done all that could reasonably be done in the
circumstances to prevent that property from being used to engage in unlawful activity.
30
Saccoccia v Austria [2008] ECHR 1734.
31
See generally, Aniceto MasFerrer and Clive Walker, Counter-Terrorism, Human Rights
and the Rule of Law: Crossing Legal Boundaries in Defense of the State (Edward Elgar, 2013).
32
In particular, see Christina Eckles, ‘EU Counter-Terrorist Sanctions: The Questionable
Success Story of Criminal Law in Disguise’ in Colin King and Clive Walker (eds), Dirty Assets:
Emerging Issues in the Regulation of Criminal and Terrorist Assets (Ashgate, 2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
AML: balance between controlling serious crime and human rights 539
framework and is amenable to control through the detection, interception and forfeiture
of illegal earnings that would otherwise be invested in the terrorist activity. Terrorism is
not, however, a profit-oriented crime. Earnings of completely lawful origins can be
placed at its disposal. Equally, the resources may be modest, a few hundred dollars
used to purchase the materials for bomb-making coupled with the cost of rail tickets.
Reorienting a regulatory system principally aimed at finding larger sums of money
derived from crime to suit the particularities of terrorist finance is an awkward task.33
To confront the particularities of terrorist finance, a strand of rights-based concern is
reliance on what might be referred to as forms of ‘associational’ liability.34 With
terrorist finance, the assets allegedly targeted for terrorist activity may not, in and of
themselves, hint at their criminal properties. Rather, the hint of criminality may derive
from their association with certain individuals or their association with particular
entities. Modern terrorist finance laws can attach liability to the interception and
temporary or permanent forfeiture on the basis of association with a terrorism cause
without the need to establish some element of a guilty mind, or upon lower, and very
low, evidential thresholds.35 Problems of secrecy, or reliance on undisclosed evidence,
accentuate these difficulties.
Intervention by the United Nations Security Council (UNSC) arguably tipped the
balance precariously towards the wholescale retreat of the rule of law. While the bulk
of AML regulation has its origins in international conventions, the UNSC, in the wake
of September 11, 2001, uniquely and perhaps understandably sought to unilaterally
forge the contents of domestic terrorist finance laws.36 The outcome was the intercep-
tion and seizure of assets allegedly linked to terrorism with no capacity, under national
law, to challenge that taking. Formal consistency with the UNSC edit would deny any
opportunity to contest a decidedly negative consequence, effectively truncating any
sense of a functional rule of law. Fortunately, this kind of taking was repeatedly found
33
There is controversy over the fusing of the AML strategy with terrorist finance: Ibrahim
Warde, The Price of Fear: The Truth Behind the Financial War on Terror (University of
California Press, 2007) 47.
34
Different scholars refer to liability, guilt or some other legal consequence devolving from
associations, however tenuous, with some aspect of terrorism: see, Laura Donohue, ‘Anti-
Terrorist Finance in the United Kingdom and United States’ (2006) 27 Mich J Int’l L 303, 410;
Kent Roach, ‘Must We Trade Rights for Security? The Choice between Smart, Harsh, or
Proportionate Security Strategies in Canada and Britain’ (2006) 27 Cardozo L R 2152,
2173–2185.
35
Ibid Donohue, 406–409.
36
The UNSC action was unprecedented since this organ usually only applies directly to the
actions of individual states. It does not ordinarily purport to dictate the contents of national laws:
see Andrea Bianchi, ‘Assessing the Effectiveness of the UN Security Council’s Anti-Terrorism
Measures: The Quest for Legitimacy and Cohesion’ (2006) 17 Euro J Inter L 881; Gilbert
Guillaume, ‘Terrorism and International Law’ (2004) 53 Int Comp L Q 537; Michelle Gallant,
‘Funds, Rights and Terror: Her Majesty’s Treasury v Mohammed Jabar Ahmed and Others’
(2010) 21(3) King’s L J 569.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 8 / Date: 9/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
not to accord with fundamental principles of law.37 To maintain the balance between
confronting terrorism and the rule of law, some basic element of procedural justice was
due.
Pursuing terrorism also precariously tips the balance in another way. The introduc-
tion of terrorism into the mix of serious crimes to which the AML strategy applies
alters any risk-based appraisal of the balance between regulation and rights. In
balancing constraints on rights and the pressing societal interest in suppressing terror,
the scale of potential injury factors into the analysis. Although the risk of a single
incident may be low, the results of a single incident may be catastrophic. Drug
trafficking, corruption and tax evasion may very well be serious crimes whose control
requires some modest modification to conventional legal norms. Given its catastrophic
potential, however, terrorism alters the framework of the rule of law analysis. The
degree of risk justifies limitless intrusions into fundamental rights.
37
Her Majesty’s Treasury v Mohammed Jabar Ahmed and Others [2010] UKSC 2. This
decision occurs as part of a series of challenges involving domestic measures taken pursuant to
the UNSC resolution: Kadi v Council [2009] AC 1225; R v HM Treasury and Other Actions
[2008] UKHL 26; Case T-338/02 SEGI and Others v Council [2004] ECR II-1647; Abousfian
Abdelrazik v Minister of Foreign Affairs and the Attorney General of Canada [2009] FC 580.
38
Liliya Gelemerova, The Anti-Money Laundering System in the Context of Globalization: A
Panopticon Built on Quicksand (Wolf Legal Publishers, 2011) 230–243; Donohue [n 34]
405–406.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
AML: balance between controlling serious crime and human rights 541
the edifice of controls derives its strength from the fact that money laundering, despite
years of intervention, continues to constitute a significant serious problem.39
Apart from the scale of alleged illegal assets brought into the state treasury, the
achievements of AML regulation are a grossly understudied area of inquiry. Methodo-
logical difficulties inherent in measuring achievement as a function of crime control,
rather than revenue generation, are profound. Clearly there are benefits in detecting,
intercepting and forfeiting money linked to crime. If rights need to cede in that effort,
certainly they should cede to the public interest in crime control rather than any
state-driven interest in revenue collection.
39
Sharman argues that AML regulation continues to expand because it has become a norm
of behaviour, the thing that ‘good’ states do, rather than because the strategy succeeds in
controlling crime: Jason Sharman, The Money Laundry: Regulating Criminal Finance in the
Global Economy (Cornell University Press, 2011) 131–164.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 43 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
The entrepreneurship of internet technology has given birth to a lush domain. The
fertile technology ground has attracted and cultivates multiple forms, shapes, and sizes
of deviant behaviors and the accompanying laundering facilities to fund the illegal and
nonconforming activities. Technology has provided an enhanced environment for the
development of illicit activities, particularly the activities of the sale of arms, the sale of
drugs and the training of terrorists.
The upscale mall in Nairobi, the train station in China, the twin towers in New York
City, the subway in London – terror knows no borders. It recognizes no statutes or
international agreements. There is no functioning golden rule. The terrorists assume the
trappings of phantoms. The lack of a well-described, clearly defined opponent without
a public schedule makes the defense against terror exceedingly difficult. As a result
terrorists are leaving a profound and indelible mark on the global economy and the
global psychology.
Terror and terrorists are impacting the world economy. They are destabilizing the
global psychological climate. Terrorists need funds. The funds needed for their
frightening enterprises are intimately connected with banks and financial institutions,
with hawala and the underground exchanges.
The illicit funds are deposited into accounts. Creative and skilled money launderers
have discovered and designed numerous ways to legitimize their funds, to launder their
funds. The financial institutions attempt to disassociate themselves from the money
launderers, to identify themselves as innocent owners without knowledge of the
criminal activities from which the funds are derived. Certainly the banks deserve the
opportunity to prove that funds received were legitimate and were not involved in
criminal activity. It is necessary to discover the determined identity of the launderers.
The ability and the political will to restrict the funds available for illegal activities, be
it drugs or arms or trafficking or terror will be paralleled by a decrease in the illegal
activities.
FORFEITURE/CONFISCATION
The government of the United States has awarded itself the ability to forfeit funds
suspected of being involved in or connected to financial crimes, including from the
correspondent accounts of foreign banks. The courts have addressed, and continue to
address, in the affirmative the question of whether banks must forfeit funds when the
funds can be and are traced to illicit activities.
542
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 1 / Date: 9/9
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Any deposit of funds by a foreign bank into an interbank account in the United
States can be targeted. The funds can be forfeited to the government of the United
States.1 It does not matter that the crime took place on foreign soil and the funds were
deposited into foreign banks’ accounts. It does not matter that the foreign banks have
no knowledge of any illegal activities of the banks’ customers.2 The foreign bank from
which the funds were forfeited has no standing in a United States court to contest the
forfeiture.3 In many instances the foreign bank will be foreclosed from defending itself
against the seizure of funds.4 If the foreign bank is a correspondent bank, the foreign
bank has little or no recourse.
The practice of forfeiture has a long history. Forfeiture is a divesture of property
without compensation. Violators were not allowed to keep the fruits of their crime or
the breach of their contracts. Neither were the instrumentalities allowed to remain with
the violator.5 The use of forfeiture was a defense or punishment for crimes – a common
law conviction of felonies and treason.6 The estate of a convicted felon was extin-
guished; a person convicted of a felony forfeited his chattels to the Crown; his lands
reverted by escheat to his lord. Any person convicted of treason forfeited all real and
personal property to the Crown.7
The funding of terrorist activities is a burgeoning industry. The use of forfeiture is
viewed as a partial solution and, hence, continues to be in use. Under present forfeiture
laws the government is authorized to seize funds that are alleged to be the proceeds of
a crime or are connected in some way to a crime. Enacting the use of forfeiture is an
attempt to curb money laundering and prevent criminals from protecting and safeguard-
ing their illegal funds by placing the funds in countries which have either minimum
money laundering regulations or no money laundering controls. Forfeiture statutes
allow the government to initiate a civil in rem proceeding against the property itself.
The property is determined to be the wrongdoer.8
1
C. Anne Pogue, ‘If It Weren’t for the Flip-Side – Can the USA Patriot Act Help the U.S.
Pursue Drug Dealers and Terrorists Overseas without Overstepping Constitutional Boundaries at
Home?’ 14 Cornell J.L. & Pub. Pol’y 477, 493–495 (2005) (discussing the practical difficulties
that arise with the application of the Patriot Act).
2
United States v. Union Bank for Sav. & Inv. (Jordan), 487 F.3d 8, 15–16 (1st Cir. 2007).
3
Id. at 16.
4
Id.
5
John Madinger and Sydney A. Zalopany, Money Laundering: A Guide for Criminal
Investigations 61 (CRC Press 1999).
6
Mark Pieth and Gemma Ailofi, A Comparative Guide to Anti-Money Laundering: A
Critical Analysis of Systems in Singapore, Switzerland, the UK and the USA, 289–291 (Edward
Elgar 2004).
7
Id.
8
See Otto G. Obermaier and Robert G. Morvillo, White Collar Crime: Business and
Regulatory Offenses, 6A.01, at 6A-4 (Law Journal Press, 2 Vols. Rel. 47/13 2002). See also F.
Baldwin and T. DiPerna, ‘The Rule of Law: An Essential Component of the Financial War
against Organized Crime and Terrorism in the Americas,’ 14 Journal of Financial Crime 405
(Emerald, London 2007).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
However, the launderers have developed expertise in the search for loopholes and
proficiency in innovative and creative ways to legitimize the funds. The launderers have
numerous practices and procedures that prevent their assets from being seized.9
(A) heightens the requirements that international financial institutions must undertake
in order to reverse the effects of money laundering;
(B) increases the record keeping and reporting requirements of financial institutions
in order to increase communication between law enforcement and financial
institutions;
(C) focuses on the smuggling of currency and counterfeit funds.12 Congress adhered
to the belief that many foreign banks provided significant assistance to the money
launderers.13
From its investigations and findings,14 Congress concluded that the efforts of law
enforcement to detect and prevent money laundering were hindered by outmoded and
9
Title III of the USA Patriot Act.
10
18 U.S.C. 1956(c)(7)(b). Section 1956(c)(7)(b) contains the list of foreign crimes that can
be used as predicates for a money laundering offense: public corruption and all crimes of
violence. Thus, the laundering of the proceeds of any offense and the transfer of any funds into
or out of the United States with the intent to promote any such offense is violation of the law.
11
Title III of the USA Patriot Act.
12
Id.
13
Title III of the USA Patriot Act, section 302(a)(2) (‘money laundering, and the defects in
financial transparency on which money launderers rely, are critical to the financing of global
terrorism and the provision of funds for terrorist attacks’).
14
USA Patriot Act, Title III, section 302 (5) & (6).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
For purpose of a forfeiture under this section … , if funds are deposited into an account at a
foreign financial institution, and that foreign financial institution … has an interbank account
in the United States with a covered financial institution … , the funds shall be deemed to
have been deposited into the interbank account in the United States, and any restraining
order, seizure warrant, or arrest warrant in rem regarding the funds may be served on the
covered financial institution, and funds in the interbank account, up to the value of the funds
deposited into the account at the foreign institution … may be restrained, seized, or
arrested.18
Interbank, also called correspondent, accounts are utilized by foreign banks to facilitate
transactions in jurisdictions where the banks do not have a physical presence.19 Many
foreign banks have an increasing need to acquire U.S. currency; hence, the use of such
interbank accounts in the United States has become imperative.20 Many foreign banks
conduct virtually all external transactions to the bank through their United States
interbank accounts.21 As a result, interbank accounts continue to be the money
launderers’ choice. There is no corresponding need to directly establish an account.
Prior to the enactment of the Patriot Act and section 981(k), the U.S. government
could not readily acquire forfeiture of laundered funds in the interbank accounts of
foreign banks.22 The foreign bank was considered to be the owner of all funds in its
interbank account. The foreign bank was entitled to assert an innocent owner defense to
an attempted forfeiture.23 In nearly all cases, the bank would be determined to be
15
USA Patriot Act, Title III, section 302 (9).
16
USA Patriot Act, Title III, section 302 (9).
17
18 U.S.C. 981(k)(4)(A), 984(c)(2)(B). The statute defines an interbank account to be an
account held by one financial institution at another financial institution primarily for the purpose
of facilitating customer transactions.
18
18 U.S.C. 981(k)(1)(A).
19
USA Patriot Act section 319(a), 115 Stat. at 311.12.
20
See generally Minority Staff of S. Permanent Subcomm. on Investigations, 107th Cong.,
Report: Correspondent Banking: A Gateway for Money Laundering, 11–14 (Comm. Print 2001).
21
United States v. Union Bank for Savings & Inv. (Jordan) supra note 3 at 11–13 (1st Cir.
2007), USA Patriot Act, Title III, section 302(a)(6). (Corresponding banking facilities are one of
the banking mechanisms susceptible in some circumstances to manipulation by foreign banks to
permit the laundering of funds by hiding the identity of real parties in interest to financial
transactions.)
22
Id. at 41–42.
23
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
innocent of any criminal wrongdoing and the forfeiture of funds would fail.24 With the
establishment of section 981(k), the government’s civil forfeiture power was expanded
in two significant ways:
1. The law provides that any restraining order, seizure warrant, or arrest warrant in
rem against the funds deposited at the foreign bank may be served on a U.S. bank
holding an interbank account for the foreign bank. The funds in the interbank
account may be restrained, seized, or arrested up to the value of the funds
deposited at the foreign bank.25 Most significantly, the deposit of forfeitable funds
at a foreign bank, rather than the continued existence of forfeitable funds, will
trigger the forfeiture of an equivalent amount of funds from the foreign bank’s
interbank account at a U.S. bank.26 Most significantly, the deposit of forfeitable
funds at a foreign bank, rather than the continued existence of forfeitable funds,
will trigger the forfeiture of an equivalent amount of funds from the foreign
bank’s interbank account at a U.S. bank.27
2. The owner of the funds in an interbank account may contest the forfeiture of
funds.28 However, the foreign depositor, and not the foreign bank that holds the
account, is considered to be the owner of the funds.29 Section 981(k)(4)(b)
defines the owner as the person who owned the funds at the time such funds are
deposited into the foreign financial institution. This section expressly excludes the
foreign financial institution or any other financial institution which may have
acted as an intermediary in the transfer of funds into the interbank account.30 The
foreign bank is not considered to be the owner of the funds unless (a) the basis
for the forfeiture action is wrongdoing committed by the foreign bank or (b) it
establishes, by a preponderance of the evidence, that it had discharged all or part
of its obligation to the depositor of the funds before the seizure occurred.31
24
Id.
25
18 U.S.C. 981(k)(I)(A). (‘For the purpose of a forfeiture under this section or under the
Controlled Substances Act … if funds are deposited into an account at a foreign financial
institution … , and that foreign financial institution … has an interbank account in the United
States with a covered financial institution … , the funds shall be deemed to have been deposited
into the interbank account in the United States, and any restraining order, seizure warrant, or
arrest warrant in rem regarding the funds may be served on the covered financial institutions,
and funds in the interbank account, up to the value of the funds deposited into the account at the
foreign financial institution … may be restrained, seized, or arrested.’)
26
United States v. Union Bank for Sav. & Inv. (Jordan), supra note 2 at 15.
27
Id.
28
Id. (Section 984 provides for the forfeiture of ‘any identical property found in the same
place or account as,’ inter alia, forfeitable ‘funds deposited in an account in a financial
institution,’ 18 U.S.C. 984(a), so long the forfeiture action is commenced within one year of the
underlying offense.)
29
18 U.S.C. 981(k)(3).
30
18 U.S.C. 981(k)(4)(B). (‘Except as provided in clause (ii), the term “owner” – (I) means
the person who was the owner as that term is defined in section 983(d)(6) of the funds that were
deposited into the foreign financial institution … or any financial institution acting as an
intermediary in the transfer of the funds into the interbank account.)
31
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
A foreign bank may not recover any funds seized from its interbank account unless the
aggregate balance in all the accounts of its depositor at the time of seizure is less than
the amount of forfeiture funds originally deposited by the depositor at the foreign
bank.32 Any fluctuations in the amount held by the depositor at the foreign bank as a
result of periodic withdrawals and additional deposits from other sources will not affect
the ability of the United States to seize funds from the foreign bank’s interbank
account. The U.S. government is entitled to seize funds up to the amount equivalent to
what the foreign bank owes to the depositor at the time of the seizure.
In the Union Bank of Jordan,33 the United States Court of Appeal for the First
Circuit affirmed the theory and belief that the Patriot Act legislation has a direct
extraterritorial impact upon foreign banks.34
CYBER TECHNOLOGIES
A primary consequence of the 2001 United Nations Security Council Resolution 137335
was to oblige universal compliance with the main provisions of the 1999 United
Nations International Convention for the Suppression of the Financing of Terrorism.36
Resolution 1373 required all member states to ‘freeze without delay funds and other
financial assets or economic resources of persons who commit, or attempt to commit,
terrorist acts’.37 Prior to the twin towers attack the international community had paid
little attention to any counterterrorism agenda.38 After 9/11 the international community
began with haste to focus on preventing the financing of terrorism. Reducing the threat
32
United States v. Union Bank for Sav. & Inv. (Jordan), supra note 2 at 17.
33
Julian A. Malins, QC: ‘Now the interesting thing about parallel jurisdictions is that they
often decide cases in different ways. If you want a decision which is favorable to a bank, try
England, not the U.S. If you want a decision favorable to an insurance company, try the U.S. and
not England. Why? In England, the banks are extremely generous to and accommodating of
lawyers. As a result, when those lawyers become judges, they are most favorably inclined to
banks. With insurance companies, it is the opposite. English insurers never pay and are dreadful
to their policyholders. As a result, when English lawyers get to become judges and try insurance
cases, the insurance company is in trouble. In the U.S., the situation is exactly reversed. The
U.S. banks are ruthless and horrid, so U.S. judges are always against the bank. But U.S. insurers
and so the judges, when an insurer does actually fight a case, tend to be sympathetic. So, when
acting for the bank, cite English cases and when acting for insurers, cite U.S. cases!’
34
United States v. Union Bank for Sav. & Inv. (Jordan), supra note 2 at 11. See also: F.
Baldwin, ‘The Rule of Law, Terrorism and Countermeasures including the USA Patriot Act
2001,’ 16 Fla. Jo. In’l L 1 (2003).
35
S.C. Res. 1373, U.N. Doc. S/RES/1373 (Sept. 28, 2001).
36
International Convention for the Suppression of the Financing of Terrorism, adopted Dec.
9, 1999, 39 I.L.M., 270, 2178 U.N.T.S. 38349.
37
Press Release, Security Council, SC/7158, ‘Security Council Unanimously Adopts Wide-
Ranging Anti-Terrorism Resolution,’ U.N. Doc. SC 7158 (Sept. 28, 2001).
38
See generally, e.g., ‘George Tenet: At the Center of the Storm CIA’ (2007), interview by
Scott Pelley with George Tenet, 60 Minutes (CBS television broadcast, Apr. 29, 2007), available
at http://www.cbsnews.com/stories/2007/04/25/60minutes/main2728375.html (last visited Jan. 5,
2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
of future terrorist attacks assumed priority. Preventive measures against financing terror
in collaboration with the existing money laundering preventative measures have
become the accepted and observed global standards. Countries focused on the
attempted control of the funds of criminals, particularly terrorists, in their goal of
reducing crimes.39
39
FATF, ‘Money Laundering FAQ,’ available at http://www.fatf-gafi.org/document/29/
03343.en_32250379_32235720_33659613_1_1_1_1.00.html (‘[T]argeting the money laundering
aspect of criminal activity and depriving the criminal of his ill-gotten gains means hitting him
where he is vulnerable. Without a usable profit, the criminal activity will not continue’) (last
visited Dec. 2, 2011).
40
United States v. Union Bank for Sav. & Inv. (Jordan), supra note 2 at 20.
41
Id. at 12–13.
42
Id.
43
Id.
44
Id.
45
Id.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
seizure from their customers calls for the implementation of additional security
measures. The great risk of seizure requires foreign banks to initiate anti-money
laundering programs. The money laundering programs required may be, and often are,
more demanding than the programs of their own jurisdiction. Foreign banking laws
may impose a mandated duty to pay depositors. The laws now limit the ability of
foreign banks to reduce the risk of forfeiture under U.S. law. Importantly, section
391(a) of the Patriot Act provides that after consultation with the U.S. Secretary of
the Treasury, the U.S. Attorney General may terminate a forfeiture proceeding. The
termination would be based on a conflict of law between the United States and the
foreign bank’s home jurisdiction.46 This provision would only apply if the termination
is in the interest of U.S. justice and provided that U.S. national interest is not harmed.47
An alternative solution may lie in the hands of the home country of the foreign bank.
All governments could work together in ensuring that money launderers are punished
and the prosperous industry of international crime is eradicated. The foreign bank’s
home country must seek to eradicate money laundering. The foreign government would
need to initiate a collaborative relationship with the U.S. government, allowing for U.S.
banking laws to be enforced in their country. In addition the home country would
provide protection for its banks whose funds are subject to seizure by waiving all
liability of the bank to foreign depositors in cases of U.S. seized funds to ensure that
the depositor of laundered funds suffers the consequences.
CONCLUSION
Technology has facilitated such extensive global advancement in the funding of crimes,
be it the sale of drugs, the sale of arms, trafficking of children and women or the
production of terror, that state intervention is a necessity.48 It is no longer feasible to
argue that electronic commerce should be allowed to operate unregulated.49 The crimes
and the consequences are global. The responsibility falls upon the individual country to
intervene and impose the necessary criminal sanctions to combat terrorism. The foreign
banks must take advantage of contractual laws in their home jurisdictions and protect
themselves by contract.50 All available options for passing on the loss to the foreign
depositor through forfeiture and alternative measures need to be explored.
46
18 U.S.C. 981(k)(1)(B).
47
Id.
48
S. V. Joga Rao, Law of Cyber Crimes and Information Technology Law, 10 (Wadhwa
Nagpur 2004) and Peter Bergen, Holy War, Inc. (The Free Press 2001).
49
See generally Robert Shaw, ‘Should the Internet be Regulated,’ 2(4) IFO Institute for
Economic Research at the University of Munich 42 (October 2000), available at http://
www.ifo.de/doccidl/forum401-pc1.pdf (last visited Dec. 4, 2011).
50
Cf. Landers v. Heritage Bank, 188 Ga. App. 785, S.E. 2d 353, 355 (Ga. Ct. App. 1988)
(considering whether a bank customer’s ‘signature card [was] effective’ to permit the bank to
debit the customer’s account based on a debit to the bank’s own account); cf. also Freese v.
Regions Bank, N.A., No. A06A2154, 284 Ga. App. 717, 644 S.E. 2d 549, 2007 Ga. App. Lexis
398, at *8 (Ga. Ct. App. Mar. 30, 2007) (noting as a general principle that ‘[t]he UCC permits
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
One must ask whether a compliant bank, innocent of wrongdoing, should suffer
sanctions in order to provide the U.S. government with the additional tools needed to
curb international financial crimes.
The United States is committed to pursuing those who provide the funding for
terrorist activities. The pursuit has not significantly limited the threats to the global
economic infrastructure and to the safety and stability of the world community. As
banks have been required to know their customers, countries must take serious steps to
know the fraudsters, those phantom terrorists and funders. Regulators and governments
must join forces and share communications to address the continuing threats.51 With
increased communication, the continuing restrictions on funds, and the forced coming
out of the terrorists, the threats of terror and the terrorists may decline.52
It is important that the U.S. government provides assistance to those countries
needing to close loopholes and those needing to write and implement money laundering
legislation. Governments know their terrorists, their tactics, and their funding sources.
Governments work together, especially in the development of technology expertise and
the protection of records. Governments proceed with caution where legislation might
become a key issue of the regulation drafting.53
parties to a contract of deposit to agree between themselves as to their duties and the legal
consequences which flow therefrom’).
51
After completing a 60-day comprehensive policy review, President Obama appointed a
cyber-security coordinator. The Patriot Act provides the United States one additional weapon
against terrorists in the international community, including terrorism financing through legal and
popular virtual markets and gaming environments. It is with the aid of analysis of most current
typologies, setbacks, and alternatives like those described here that the cyber-security coordina-
tor’s task will be a bit easier, but at what cost to the rule of law?
52
Icelandic Government Information Centre, Icelandic PM Says the British Invocation of
Anti-Terrorism Laws Is a Hostile Measure, www.iceland.org (Oct. 9, 2008), available at
http:www.iceland.org/info/iceland-crisis/timeline/nr/6411 (last visited Jan. 2, 2012).
53
C. Lewis, ‘Don’t Overlook Human Rights Risks when Negotiating and Drafting Inter-
national Commercial Transaction Agreements,’ 42(3) Section of International Law American Bar
Assoc. (2013).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 44 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
PART VIII
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
By the traditional criminal justice system the following is adopted as a simple
description: the criminal justice system in England and Wales at the day of writing, in
its substantive, procedural and evidential components. By financial and economically
motivated crime, it is presumed that the crimes go beyond simple theft and robbery and
simple instances of deception employed to dishonestly appropriate property or services,
for example, passing a dud cheque. If efficacy is measured by its deterrent effect then
the system plainly fails, given the extent to which fraud of some kind is encountered in
the United Kingdom’s economy.1 If efficacy is measured by the system’s ability to
deliver swift, timely justice to the victim, again it is failing, as will be seen below.
There are several reasons why the system cannot deliver the product with which it
would satisfy society. To identify and explain the problems this chapter is divided into
two parts: Part One, a simplified history of the common law as it has developed to deal
with fraud; Part Two, the way ahead, a review of what may be done to improve the
system.
1
The National Fraud Authority’s publication, the Annual Fraud Indicator, published in June
2013, estimated the fraud loss to the United Kingdom at £73 billion per annum.
2
See the chapter headings in Arlidge and Parry on Fraud, by A Arlidge, A Milne and P
Sprenger, fourth edition, Sweet & Maxwell, 2013.
553
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
This chapter will focus upon fraud committed outside any specific regulated
environment. In the United Kingdom it is likely that any fraud committed within a
regulated environment will, initially at least, be dealt with by the specific regulator,
which will probably employ any investigative tools available in that regulated sphere.
The regulator may prosecute, if that is determined to be the proper solution, using
crimes applicable to that regulated activity, which are so designed for ease of proof.
The actus reus and mens rea may be more widely cast than within the traditional
criminal law.3
PART ONE
Fraud in England and Wales
The common law of England and Wales dealt swiftly and surely with simple economic
crimes. What is now described as theft, robbery or forgery were felonies, and a
convicted felon faced the possibility of the death penalty. Fraud, as described above,
was not a crime: if a person was deceived into parting with his money more fool he.
This is somewhat surprising, but it should be understood that commerce, in the early
middle ages and until the middle of the 19th century, was underpinned by the use of the
bond, a written promise to pay a fixed sum in the event of a failure to perform the
terms set out on the bond, which was signed by the promisor and witnessed. The
common law courts enforced such bonds efficiently and the debtor faced prison if he
could not meet the judgment for the common action for debt on the bond.4
The common law, sure and swift, was also harsh to the point of savagery. It had one
redeeming feature: all serious crime, all felonies, would be prosecuted before a jury,
where the prosecution carried the burden of proving its case beyond reasonable doubt,
unanimously, in the minds of twelve men. The system survived in its essentials until the
reforms of the Victorian era. It retained several rugged and simple features well into
modern times: it was only after an enactment in 1898 that the accused was permitted to
give evidence in his own defence.5
Procedurally, the modern criminal justice system started with the Metropolitan Police
Act 1839, and with it the creation of a disciplined, professional body of investigators.
The law relating to the conduct of interviews and how investigators should act to secure
admissions or confessions that would be accepted by the court was confused for some
time and led eventually to the Judges’ Rules, in 1912, revised in 1965.6 The whole
process of investigation was brought within a comprehensive, principled system by the
3
Taking investment fraud as an example, beyond the Theft Act 1968, Part 7 of the Financial
Services Act 2012 creates a set of offences of wider scope than for dealing with simple
misappropriation.
4
See An Introduction to English Legal History, by JH Parker, fourth edition, Butterworths,
2002, at pages 323 to 327.
5
See the Criminal Evidence Act 1898, section 1(1).
6
The Rules were issued by the judges of the King’s Bench to give the English police
guidance after the Home Secretary had requested such guidance.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Police and Criminal Evidence Act 1983 (PACE) and the detailed codes made
thereunder, which remain in place today.
Comprehensive legal assistance was not provided to those without funds until 1949,
and thereafter legal aid became available to provide any accused with the means to
obtain a solicitor upon his arrest and counsel to represent him at trial for any serious
offence, that is, in cases tried before the Assizes and Quarter Sessions, which became
the Crown Court in 1972.7 Until the Criminal Justice and Public Order Act 1994 came
into force, upon arrest, the best advice a suspect could receive was to say nothing,
unless he possessed conveniently available evidence to demonstrate that he was
innocent. Before the 1994 Act the accused, at trial, could put the Crown to strict proof
without fear of judicial comment upon, or the jury being invited to draw any adverse
inference from, his failure to answer questions upon interview under caution and
refraining from giving evidence.8
Regarding the substantive criminal as it contemplated dishonesty, all types of theft,
including much fraud as described, was bundled together in the Larceny Acts,
culminating in the 1916 Act, which simplified what had existed before. A reasoned and
comprehensive code was eventually adopted with the Theft Act of 1968.9 That Act
however failed to provide the means to deal with dishonest activity carried on over a
period of time, which activity could be encompassed by one charge.10 Such means
existed with the common law offence of conspiracy to defraud.
The criminal justice system had thus developed in the modern era in a manner which
was considerably fairer to the accused, taken overall, in procedural, evidential and
substantive features. As the accused’s right to silence was maintained from arrest to
verdict, his lawyers did not need great forensic skill to defend a man without a positive
defence. Upon conviction even for a serious fraud the accused did not face a
particularly harsh penalty and, to round matters off, recovery of the proceeds of the
accused crime would be possible in the criminal courts only in the very simplest of
cases.11
It is a truism worth repeating that there is no such thing as a simple fraud. Anyone
with a mind to scheme in a dishonest fashion can be expected to apply a little thought
to distance himself from the victim, physically and evidentially. The perpetrator would
7
The Poor Prisoners Defence Act 1907 had made a limited provision for legal assistance to
the poor. The Legal Aid and Advice Act 1949 provided people unable to pay with free legal aid.
The Crown Court was established under the Courts Act 1971, replacing the Courts of Assize and
Quarter Sessions.
8
The Criminal Justice and Public Order Act 1994 received Royal assent on 3 November
1994.
9
All offences under the 1968 Act (other than for taking a vehicle without consent) require
proof of “dishonesty”: there was no corresponding mens rea under the various larceny Acts,
where the requisite intention varied from crime to crime.
10
This is a consequence of the need to avoid duplicity in the drafting of a charge: see the
Indictment Rules 1971, which forbid an allegation to be made of more than one offence in any
one count on the indictment.
11
The court has power to make restitution orders under section 148 of the Power of the
Criminal Courts Act (Sentencing) 2000. Such orders should only be made in the plainest of
cases.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
be likely to use a company as a cover for his identity and as an evidential hurdle for the
prosecution to overcome. Correspondingly, anything other than a simple fraud is
difficult and time consuming to investigate and to prove in a court of law to a jury of
average intelligence.
It became apparent in the last quarter of the 20th century that there were grave
problems with the fraud trial process.12 Some of the difficulties were judicial creations.
Appellate courts and law reformers failed to keep in mind an obvious criterion by
which their rulings needed to be tested: could a jury understand the refinements that the
judiciary and reformers placed upon the law? It is also questionable whether the
authors of any of the substantive, procedural and evidential changes that have been
rolled out in the last 40 years fully recognised the capabilities and resources of those
who would have to work within the system.13
Two examples are offered of judicial decisions, the consequence of which were not
fully realised, which have given rise to difficulty. In 1966, the House of Lords, in Tesco
Supermarkets Ltd v Nattrass, adopted the principle of identification, whereby a
corporation could not be convicted of an offence of any moral turpitude, including
dishonesty, for acts of its officers or employees committed in the course of their duties
or employment other than where it could be shown that such acts were committed with
the consent or connivance of the corporation’s controlling mind. In practice it will be
rare for the prosecutor to find proof at board level of dishonesty.14 In 1982, in the
Queen v Ghosh, the House of Lords endorsed a definition of dishonesty that may be
beyond the understanding of juries:
In determining whether the prosecution has proved the defendant has acted dishonestly the
jury must first of all decide whether according to the ordinary standards of reasonable and
honest people what was done was dishonest. If it was not dishonest by these standards, that
is an end to the matter and the prosecution fails. If it was dishonest by those standards then
the jury must consider whether the defendant himself must have realised that what he was
doing was by these standards dishonest.15
It is difficult to apply this principle to commercial situations with which the common
man is not familiar.
In 1968, in the Court of Appeal, Lord Denning set out the law relating to disclosure:
the prosecution should provide the defence with the previous convictions of the
witnesses the Crown proposed to call and the names and addresses of witnesses it did
not propose to call, but who had been interviewed beforehand.16 Disclosure could be
accomplished in most cases by a simple exchange of letters. The following 30 years
12
Consultation followed, leading to The Fraud Trials Committee Report, the “Roskill
Report”, which was published in January 1986.
13
The system appears to demand that the fraud prosecutor make good bricks with little
straw. Under the Criminal Procedure Rules, under the active management of the trial judge given
by rule 3.5, the prosecutor may be forced to trim the prosecution case to suit, lighten the
indictment and/or reduce the number of witnesses.
14
[1972] AC 153.
15
[1982] QB 1053 at 1064.
16
Dallison v Caffrey [1965] 1 QB 378.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 4 / Date: 9/9
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
saw the authorities struggle with Irish republican terrorism, using electronic surveil-
lance and covert investigation, and where investigators employed advanced scientific
forensic techniques for the first time. The rules of this new game were not clear and
could not be easily accommodated by the usual disclosure. In a series of decisions that
culminated in the Queen v Keane, the judiciary created a new jurisprudence.17 It was
necessary to disclose any material that might weaken the prosecution case or might
strengthen the defence, however remote the possibility of such effect. The conse-
quences of any serious failure to disclose was the quashing of a conviction. The impact
of the enlarged disclosure obligations was considerable and rapidly felt. A great part of
the investigative resource was sucked in. Fraud trials were particularly badly affected,
and this was before the electronic revolution gave rise to massive data storage on so
many devices encountered in a typical commercial fraud investigation.
Two major changes were needed, and as a matter of some urgency: some means of
narrowing the issues in a fraud trial were necessary and there was a related need to rein
in the disclosure process. Section 2 of the Criminal Justice Act 1987 gave the Serious
Fraud Office, the SFO, the newly created prosecuting authority concerned with the
most serious frauds, the power to call upon any person to produce specified material,
furnish information and/or to submit to interview.18 The provision anticipated an
interview of the suspect under compulsion, but which could not be used as original
evidence by the prosecutor. It might be referred to at trial if the interviewee gave
evidence which contradicted what he had said in the interview. Section 2 did not long
survive as a useful tool. It fell foul of human rights obligations in the European Court
of Human Rights.19 There followed two enactments which have gone some distance
towards providing the means to surface the issues in dispute before trial and curtailing
unwarranted disclosure. The Criminal Justice and Public Order Act 1994 set aside the
accused’s right to silence.20 Section 34 of the Act permits the judge at trial to comment
upon, and the jury to draw adverse inference from, the failure of the accused, when he
was interviewed or charged after being cautioned, to mention any fact relied upon by
the defence which the accused, in the circumstances existing at the time, could
reasonably have been expected to mention. Section 35 of the Act permits the judge to
comment upon, and the jury to draw an adverse inference from, the failure of the
defendant to give evidence at trial. The Criminal Procedure and Investigations Act
1996, Part II, empowered the Secretary of State to prepare codes of practice covering
criminal investigations in England and Wales. Thus was introduced the Criminal
Procedure Rules, whereby trial management, including a detailed pre-trial process, and
criminal procedure generally, would be the subject of court control, including the
17
[1994] 1 WLR 746.
18
This was the effect of section 2(8). Otherwise, the subject of a section 2 notice faced
criminal sanction if he failed to furnish the information, documents or submit to interview. Such
an interview might be conducted even after a person had been charged, see the Queen v Director
of the SFO ex parte Smith [1993] AC 1.
19
See Saunders v the UK (1997) EHCR 313 and the Attorney General’s guidance that
followed, which precluded the use of the record of interview in evidence.
20
The “right to silence” is a misnomer. It comprises a number of immunities, which apply in
different situations. See Lord Musthill in the Queen v Director of the SFO ex parte Smith [1993]
AC 27 at pages 30 to 31.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 5 / Date: 9/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
process of disclosure.21 The process anticipates that, before trial, issues between the
prosecution and defence will be clearly identified, as a part of which process the
defence are obliged to file a written statement of defence, describing any dispute with
the prosecution evidence, the basis of such dispute and the underlying reasoning.22
The pendulum has continued to swing away from the defendant. The Fraud Act 2006
saw the introduction of simple, flexible fraud offences.23 They are also inchoate, in that
they do not require the demonstration of any deception in the mind of the victim.24 As
a safety first, the common law offence of conspiracy to defraud has been retained,
despite the difficulties that continue to attend upon its use.
PART TWO
21
Section 3 of the Criminal Procedure and Investigations Act 1996, “CPIA 1996”, describes
the statutory disclosure test, as the Act has been subsequently amended. The prosecutor is under
a duty to disclose “to the accused any prosecution material which has not been previously
disclosed to the accused and which might reasonably be considered capable of undermining the
case for the prosecution or of assisting the defence”. It is worth noting that this obligation does
not apply to neutral material, nor to material which might strengthen the Crown case.
22
This is a remarkable change. Under section 5 of the CPIA 1996 the defence must serve a
defence statement within 14 days of the prosecution completing its initial disclosure.
23
The three basic fraud offences set out in sections 1 to 4 cover a wide range of activity:
false representations, failure to disclose information, and an abuse of position.
24
For offences of obtaining property or pecuniary advantage by deception under the Theft
Act 1968 it was necessary for the prosecutor to lead evidence of the effect of the deception on
the mind of the victim, which may be difficult.
25
This was confirmed by the Director of the Serious Fraud Office, David Green QC, when
he was interviewed on the radio programme Law in Action by Joshua Rosenberg, BBC Radio
Four, 8 March 2014.
26
The Blue Arrows trial is regarded by commentators as the start of the decline. It was a
“costly disaster” in 1992 and is said to have led to a loss of confidence in the Serious Fraud
Office which even today daunts prosecutors. See Corporate Crime, by Shelley Horan, Blooms-
bury Professional, 2011, paragraphs 8.08 to 8.11 and the Queen v Cohen (1992) 142 NLJ 1267.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 6 / Date: 9/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
brought to book frauds involving major players in the financial services industry.27 It is
notable that the United Kingdom has been reluctant to adopt those measures which
appear to give American prosecutors their edge.
The United States’ prosecution process, compared to its English counterpart, is truly
fearsome. The power under the hood comes in no small part from the offence
provisions known as RICO.28 Conviction of a RICO offence (which will be available in
any fraud perpetrated by more than one person through a series of related acts) means,
for a middle-aged professional, the equivalent of a life sentence. The threat of such a
prosecution readily generates prosecution witnesses who will plead to a lesser
alternative charge to become part of the prosecution case. The defendant in the United
States is under the same pressure to plead guilty, at least to a lesser offence, as part of
a comprehensive plea bargain, including any related civil claim and restitution. Another
highly significant factor in the United States is that corporations are, in most
circumstances of fraud, vicariously liable for criminal acts committed by their officers
or employees acting in the course of their employment.29 Thus, corporations have every
incentive to plead and cooperate to the full, implicating their former controllers, when
they are found to have committed an offence.
Powers of investigation are not the answer in the United States: the compelled
deponent takes an “immunity bath”.30 Less dramatic, but of no little importance, are the
tools to secure the testimony of a witness. In the United States the investigator has legal
tools which are unavailable to the English police. It is a serious offence to tell a
deliberate lie to a police officer or federal agent investigating a crime.31 The
endorsement on the pro-forma English witness statement presently employed offers
what is an empty threat.32 In practice, a witness can readily “withdraw” from his
obligation to give testimony to the matters described therein. Prosecutors in England
and Wales are, quite naturally, slow to call a witness they know has “gone bent”. There
27
In the 1980s the Office of the United States Attorney in New York achieved notable
success in prosecuting major figures in the financial services industry for offences of dishonesty,
including Ivan Boesky, the leading arbitrageur, and the inventor of the junk bond, Michael
Milken.
28
The Racketeer Influenced and Corrupt Organizations Act, commonly referred to as
“RICO”, Chapter 96 Title 18 of the United States Code.
29
This is an oversimplification: whether a corporation may be convicted of an offence
requiring proof of knowledge varies throughout the United States’ jurisdictions at state and
federal level. See United States v Bank of New England (1987) 821 F2d 844. See also Corporate
Criminal Liability (2002) 79(2) American Criminal Law Review.
30
See paragraphs 10.1 to 10.07 of Grand Jury Practice, by Howard Goldstein, Law Journal
Press, 2013.
31
The federal criminal provision which contemplates the making of false statements is
section 1001 of Title 18 of the United States court. It is widely employed and may catch a
denial. It carries a penalty of up to five years’ imprisonment. There are similar provisions in state
laws, and a wide jurisprudence of offences of obstructing justice.
32
Section 89 of the Criminal Justice Act 1967. It is an offence to wilfully make a statement
material to proceedings that a person knows to be false or does not believe to be true, which
carries a penalty of up to two years’ imprisonment. If a reluctant witness is called it is not
difficult to deliberately avoid, evade or confuse. As a last resort it is sometimes alleged that the
witness was somehow intimidated by the taker into falsehood.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
33
The federal material witness provision is the offence created in Title 18 USC 3144. It is
employed as a power to detain material witnesses to ensure their testimony before a criminal
trial or a grand jury. There are state provisions which are equivalent.
34
See Forbes Magazine 5/21/13: “Once reserved for drug crimes wiretapping takes centre
stage in white-collar prosecutions”, an article which details the employment of wiretaps in
insider dealing investigations, in particular, the investigation of the Wall Street dealer Raj
Rajaratnam.
35
See the Regulation of Investigatory Powers Act 2000, commonly referred to as “RIPA”.
Note that it is forbidden to refer to telephone interception in evidence.
36
See the website of the Sentencing Council, www.sentencingcouncil.org.uk. On January
2014 it published sentencing guidelines for corporate fraud as part of an exercise which finally
published guidelines for all types of fraud in May 2014.
37
Law in Action, BBC Radio 4, 8 March 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 8 / Date: 9/9
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
At the same time, the Director of the SFO commented favourably on the availability
to the prosecution of the “Deferred Prosecution Agreement”, a tool which had only just
become available, and again following similar American practice.38 A company might
avoid prosecution for wrongdoing if it had discovered this as having been carried out
by its officers or employees, but only where the company fully acquainted the
authorities with what had happened, cooperated fully in any investigation and made
sufficient restitution. The Director stressed that such agreements were useful, but they
were not a panacea.
Given the difficulties associated with prosecuting fraud and the potential for such
investigations for sucking in resources there must be a good argument for abandoning
criminal prosecution as the primary doctrine and concentrating at the outset on the civil
recovery of the proceeds of wrongdoing. This course of action has been possible since
the enactment of the Proceeds of Crime Act 2002. It is possible to pursue the proceeds
of criminal activity in the absence of a prosecution on a civil basis, with a
correspondingly lower standard of proof, on the balance of probabilities.39 Procedur-
ally, such recovery is also far less demanding than the criminal process, such as the
drafting of an indictment to meet extensive and continuous wrongdoing. Such a civil
action does not require rigorous particulars, nor the clear identification of the criminal
activity out of which the monies have flowed.40 The jurisprudence continues to
develop. What restricts the evolution of civil recovery as a major feature of society’s
response to fraud is constitutional, the degree to which it can be permitted as a first
choice, as an alternative to prosecution.41
The Chief Justice has renewed calls for serious fraud to be tried before a judge alone
or with professional assessors.42 Given the experience of Hong Kong, trial of fraud by
a judge sitting alone does not remove all the problems, but it does make the trial shorter
and more manageable.43 It is the length of the trial that continues to cause concern;
juries may forget evidence or possibly become truculent. The law permits trial by a
judge alone in England and Wales, but only in circumstances where it is reasonable to
fear that a jury would be interfered with.44 Change will be difficult to achieve. The Bar
has done an excellent job of persuading the public in England and Wales of the benefits
38
Ibid.
39
See Part 5 of the Proceeds of Crime Act 2002, “POCA”.
40
But no other civil claimant has such wide investigatory powers, even available before
action. See Part 8 of POCA.
41
The wide discretion to use POCA given to the National Crime Agency is curbed by
guidelines issued by the Attorney General: see Asset Recovery: Prosecutors Guidelines,
published in 2009.
42
The Lord Chief Justice put this forward in his speech to Justice on 3 March 2014. See
Chief Justice helps politicians grasp hot potato, The Guardian, 4 March 2014.
43
The District Court in Hong Kong offers trial with judge alone. Its sentencing powers are
limited to seven years’ imprisonment, which corresponds to frauds involving tens of millions of
US$. Massive frauds are dealt with within the High Court sitting with a jury. Hong Kong has all
of the United Kingdom’s problems and more, as there have been no reforms regarding disclosure
or the right to silence.
44
See section 44 of the Criminal Justice Act 2003.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 9 / Date: 9/9
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
of jury trial and the evils of any alternative. Austerity may compel the Bar to a common
sense view. Surely, the judge and a small number of professionally qualified lay
assessors should be enough to ensure that a fair and just determination is arrived at,
particularly if they are required to give reasons for their determinations which can be
scrutinised by an appeal court?
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 45 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Ever since Lord Roskill published his Fraud Trials Committee report in 1986 there has
been a lively debate about the best methods of managing the investigation, prosecution
and trial of complex fraud cases. The Criminal Justice Act 1987 adopted some of the
recommendations of the Roskill report, including the setting up, in 1988, of the Serious
Fraud Office (‘SFO’) which could both investigate and prosecute. It was given a range
of powers distinct from other law enforcement, including assertive investigatory tools,
transfer provisions and preparatory hearings.1 Other recommendations, principally a
Fraud Trials Tribunal to try complex fraud cases in place of a jury, were put on hold.2
The significance of the joint investigation and prosecution powers granted to the SFO
must be seen in the context of the structure adopted in setting up the Crown
Prosecution Service (‘CPS’) two years previously,3 the cornerstone of which was a
strict separation of powers between police and prosecutor. Other fraud prosecutors,
notably the Financial Conduct Authority (‘FCA’) and the Competition and Markets
Authority (‘CMA’), also have investigation and prosecution powers, while the fraud
prosecutions conducted by the Central Fraud Group in the CPS maintain the separation
of powers which underscores the formation of the CPS. The advantages and disadvan-
tages of the respective systems have given rise to some comment from time to time, but
it is fair to say that the differences have not created significant legal problems over the
years. In 2010 there was discussion at the instigation of the Home Office about setting
up a single fraud prosecutor within the CPS which would prosecute all significant fraud
cases, with the police conducting the investigations, in place of what was referred to as
‘the alphabet soup’ of fraud prosecutors. This plan was abandoned, but remains an
option for future legislation.4
In this Chapter, I will outline some of the main issues that impact on the effective
management of the investigation and prosecution of complex fraud cases, against the
background of the different structures of UK fraud law enforcement. The headline
practical issues include: planning a case strategy; evidence management (evidence
gathering, document management); disclosure; witness and suspect interviews; confis-
cation and compensation; decision time (evidence review, legal review, prosecution/
charging decision); alternative case resolution: making decisions about pursuing
1
Sections 2, 4 and 7 of the 1987 Act.
2
Section 43 Criminal Justice Act 2003 contains a provision for the prosecution to elect for
the trial of a fraud case to be conducted without a jury. Although the provision reached the
statute book, it has failed to get the required affirmative resolution from both Houses of
Parliament that would implement it.
3
The Prosecution of Offences Act 1985.
4
See, for example, a Fraud Advisory Panel paper: ‘Roskill Revisited: is there a case for a
unified fraud prosecution office?’ M Raphael, J Benstead, E Porter and R Stow. March 2010.
563
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
alternative remedies;5 judicial management (court listing, engaging with the trial judge
at plea and case management, and other preliminary/preparatory, hearings). The
over-arching case management issue, however, if a trial is the only option, is trying to
pour a quart into a pint pot: constructing a case out of the mountains of available
material in a complex fraud allegation that the trial judge will accept is manageable and
capable of being tried by a jury. Achieving a manageable trial, which reflects the true
criminality of the conduct alleged, includes all the guilty parties, and at the same time
provides full scope for asset recovery, has long been the Holy Grail of fraud
prosecutors.
CASE STRATEGY
Effective case management starts with detailed strategic planning. As soon as decisions
have been taken about which charges are likely to be pursued, against whom, and the
evidence that will be necessary to prove them, time limits must be set out, budgets
agreed and resources allocated. In addition:
5
Including Deferred Prosecution Agreements, civil asset recovery, civil claims and regula-
tory sanctions.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
+ Can any legal difficulties be foreseen that should be subject to detailed legal
advice at an early stage?
+ Should independent Counsel be retained immediately, so as to advise on strategy
and legal issues?
Having reviewed such issues, consideration needs to be given to whether the case can
be presented in a single trial, or whether a series of trials will be necessary. What needs
to be proved, and against whom, to present a coherent account of the activity that is
alleged to be criminal? This question should be approached from the perspective that
the shorter the case, the fewer the resources that will need to be devoted to it by the
prosecution, the defence and the court. There is also less risk that the case will fail
through sheer complexity.
Inevitably, as the case evolves, it will change shape and focus, and therefore there
must be regular scrutiny of the case strategy.
Being able to persuade the trial judge at the plea and case management hearing stage
that the case team has planned the case with trial management issues as a major
consideration from the outset is a critical element in the presentation of the case to the
court. Therefore, a decision log must be kept of the major decisions, not only for
internal consumption, but also to demonstrate to the court the fact that issues have been
given proper consideration at all stages.
EVIDENCE MANAGEMENT
(1) Evidence Selection
One aspect of all complex fraud enquiries is the sheer volume of material that can be
gathered. First, therefore, the case team must decide how far the process of collecting
evidence can be restricted. It is important to avoid being burdened by a mass of
material that is, in reality, surplus to requirements, and which will consume resources
in scheduling, analysis and disclosure. Very clear planning is necessary to identify the
essential search sites, and what to uplift from them. The timing of this exercise is also
critical: strike too soon in the investigation, and the significance of some material may
not be appreciated. Leave it too late and evidence may have been destroyed.
Drafting the search warrant requires a level of evidence to support the reasonable
suspicion that a crime has been committed by the accused and that there is likely to be
relevant material at the addresses, so as to comply with the relevant legislation.6 This
means that the investigation must have progressed to a considerable extent before a
warrant can be applied for, unless there is clear and compelling evidence of, for
example, continuing criminal activity or an intent to destroy evidence.
Following the serious criticism by the Divisional Court of the SFO’s search warrant
applications against the Tchenguiz brothers7 during the investigation of the collapse of
6
Section 8 of the Police and Criminal Evidence Act 1984 (‘PACE’); section 2(5) of the
Criminal Justice Act 1987; section 176 Financial Services and Markets Act 2000.
7
Tchenguiz v Serious Fraud Office and others CO/4236/2011: Thomas LJ and Silber J.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Kaupthing Bank, there has been considerable focus by prosecutors on what constitutes
reasonable suspicion, in particular in the context of where the information relied on
was sourced. In addition, judges are now required to give reasons for their decision to
grant a warrant, and there is more emphasis on the good practice of keeping a full note
of the ex parte application for the warrant.
Ensuring that only relevant and necessary material is seized is, however, easier said
than done. The temptation is to worry that if an investigator does not seek and collect
a sufficiently wide spectrum of material something vital will be missed. It may, in
addition, be difficult to be sure, at an early stage of an enquiry, whether certain
evidence, or venues, will be relevant. There is also the problem that the prosecutor may
find that he or she is obliged to pursue ‘a reasonable line of enquiry’,8 and therefore
simply deciding that he or she is going to ignore part of the available evidence that
does not appear to be relevant to the enquiry may not work.
An additional consideration is that, where material is requisitioned from an innocent
third party, that third party might complain that the exercise of gathering all the
material together is too disproportionate, and expensive, to be justified. Where the
requesting party has some degree of influence over the recipient of the notice, as, for
example, the FCA will have over a regulated firm, the situation may be manageable,
but where no such control exists, and, in particular, where the third party is in another
jurisdiction, problems may ensue.
Material that needs to be accessed from third parties in other jurisdictions will need
to be requested through Letters of Request under Mutual Legal Assistance Treaties. The
turnaround time for these requests can exceed a year, and careful planning, and
significant expertise, has to be deployed in ensuring a useful outcome.
All competent investigators in well-run investigations will therefore seek to identify
the relevant evidence with as much precision as possible. Again, the picture will change
as the case evolves, but early decisions will have a profound impact on the outcome of
the proceedings.
Second, once material has been gathered, how can it be effectively assessed? Much of
it will be in digital format, which will be transferred to the investigators’ own systems.
Some will be in hard copy form, and it will be scanned on to the system. Some will be
audio, from recorded lines or other sources, and this may need to be transcribed. All
this material will then require detailed analysis, generally by using highly sophisticated
software, carefully chosen search terms, and a lot of hard work. There are dozens of
software packages, and hundreds of businesses, offering to undertake these tasks, at
considerable expense. Every law enforcement authority will of course have acquired a
document management system, at considerable expense, and will rely on it for all the
routine analysis of the terabytes of digital material acquired during the enquiry.
While such systems perform incredible feats, there can be problems. It is not unusual
for the system used by an investigator to crash or malfunction at some point during the
8
See paragraph 3.5 of the Code of Practice issued pursuant to section 23(1) of the Criminal
Procedure and Investigations Act 1996.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
investigation, and this may cause concerns about the integrity of the material stored on
the system. The process of uploading the material on to the system can lead to files
being corrupted, either by human error or system failure. The length of time taken to
upload material can cause delays to an enquiry.
One vital part of the analysis performed by the system will be to identify potentially
privileged material, and to segregate it, where there is a genuine concern about the
existence of such material, for inspection by independent counsel.
Investigators frequently encounter encoded digital media. Coding has become
increasingly effective, mainly because it has been developed for use by the forces of
law and order. Unlocking a password protected laptop presents few problems for an
averagely skilled technician, but an Iron Key USB stick is a greater challenge.
It may be necessary to acquire records from, for example, telecoms or internet
providers. The formal application process can take a considerable amount of time to
complete, and therefore by the time this, often vital, material is available, the enquiry is
likely to be well-advanced. There will follow a period of careful analysis, which may
necessitate further applications. Access to this material is carefully monitored by
regulators, and is sometimes resisted by the suppliers, and special care has to be taken
to ensure proper compliance with the regulations. This includes skilled drafting of
applications, including the provision of detailed reasons for the application rather than
standard form rubric, scrutiny and approval by designated officers, and regular
oversight at a more senior level within the law enforcement agency, so as to ensure that
there is full compliance with the provisions of the Regulation of Investigatory Powers
Act 2000.
DISCLOSURE
This is not the place to go into any analysis of the disclosure regime, as set out in the
Criminal Procedure and Investigations Act 1996, the Code of Practice, the Attorney
General’s Guidelines and the Criminal Procedure Rules 2013.9 Suffice to say that for
most prosecutors, disclosure is a major headache which uses huge resources, and which
far too often leads to the premature collapse of a case. Disclosure manuals have been
drafted and adopted by all the major prosecutors, and the CPS version, which is viewed
as definitive, can be accessed on-line.
Because disclosure is such a risk, and a burden, it goes without saying that a detailed
disclosure plan must be developed and followed. At the same time a detailed record of
all material examined must be kept and a decision log must be maintained by all
investigators and prosecutors working on the exercise.
Many prosecutors in complex fraud cases now use disclosure management docu-
ments (under the Disclosure Case Management Initiative10), as well as a range of
sophisticated check and balance systems. The disclosure management document will be
9
Other guidance includes: ‘Control and Management of Heavy Fraud and Other Complex
Criminal Cases’ (2005); ‘Disclosure: A Protocol for the Control and Management of Unused
Material in the Crown Court’ (2006); and the CPS Disclosure Manual (2005).
10
Launched by the Senior Presiding Judge on 3 June 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
served on the defence and the court, setting out the methodology and reasoning of the
disclosure exercise that has been undertaken. When the court and the defence have had
an opportunity to consider the document they can comment on it, and often the Crown
will make changes to the document to accommodate reasonable requests. These will
typically involve such matters as the search terms to be applied to analysis of digital
material, and the date spread for a review of, for example, e-mail traffic. Contested
issues can be resolved by the court following an application under section 8 of the 1996
Act.
The 1996 Act also requires a defendant to submit a defence statement,11 which
should set out any disclosure requests that the defence can identify after they have
considered the primary disclosure supplied by the prosecution.
By these means the genuine disclosure issues should become apparent to all sides,
and there should be no surprises during the run up to, and the course of, the trial. This
statement, however, will provoke a hollow laugh from many prosecutors whose cases
have been prematurely halted on a disclosure point.
11
Section 5(5) of the 1996 Act.
12
Although a whistle-blower will usually be protected by confidentiality, their information
will establish the important lines of enquiry.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
PROCEEDS OF CRIME
Asset recovery has been dealt with in other chapters. In this chapter some practical
issues will be briefly discussed.
All investigators and prosecutors will have asset forfeiture at the forefront of their
minds throughout the investigation and trial. Not only is it a government priority to
seize the proceeds of crime, and also clearly in the public interest that victims should
be compensated for loss suffered through criminal activity, but, in addition, law
enforcers will be well aware that they can receive a share of assets recovered through
confiscation under the Proceeds of Crime Act 2002.13 That share amounts, if you are
both investigator and prosecutor, to about 38 per cent of recovered funds. The Court
Service also gets a slice, with the remainder going to the consolidated fund. Tracing of
assets is therefore a top priority from the outset of an investigation.
Where funds and assets are identified during an investigation, a Restraint Order may
be applied for in order to secure them for confiscation or compensation.14 The Order is
often served at the time of initial arrest, and before charges are preferred. It may be the
13
The ‘Asset Recovery Incentivisation Scheme’.
14
Section 40ff. of the Proceeds of Crime Act 2002
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
case that such an Order will be in force for some months, or even years, before the
trial. The respondent may, at any time, seek to discharge or vary the Order on the
ground that there has been undue delay in continuing the proceedings,15 or that ‘within
a reasonable time proceedings for the offence are not started’.16
Once a Restraint Order has been granted and served, the respondent may not use or
dispose of his or her restrained assets beyond any amounts specified in the Order, or
agreed with the prosecution. Restrained funds may not be used to pay the legal
expenses of the criminal trial. For the prosecutor, managing a Restraint Order can be
time-consuming where the respondent has to rely on the allowance made for his or her
living expenses in the Order, or by agreement following the service of the Order. In
some cases the value of the assets exceeds the amount restrained, and the respondent
may use his or her surplus assets without any restraint. Applications may be made in
foreign jurisdictions for assets identified in those jurisdictions to be restrained.
While recovering and identifying funds for the purposes of POCA is important, there
is another important reason for tracing funds – the fraud investigator’s watch-word is
‘follow the money’, and evidence of where funds end up is often critical in proving a
case against a defendant. Linking the funds to the accused is important evidence, and
where there have been serious efforts to engage in complex movement of funds, the
prejudicial effect of this evidence often helps to secure a conviction. Moreover, money
laundering offences, carrying a maximum of 14 years’ imprisonment, can also be added
to the indictment.17
PROSECUTION DECISIONS
However well a case has been managed during the investigation, and even if everything
has gone to plan, it is vital to review, as independently as possible, the evidence and the
legal position in the light of the results of the enquiries. This review must be carried out
with the Code for Crown Prosecutors in mind: is there sufficient evidence? Is a
prosecution in the public interest?
A CPS case will be reviewed completely independently of the police investigation,
and the CPS has the final decision about charging suspects. However, in any complex
fraud case it is likely that a CPS lawyer will have been advising the investigators, often
with independent counsel, from an early stage, and therefore they will have had a
considerable input into the planning and strategy of the case.
SFO lawyers will be even closer to the investigation, being part of a unified
organisation. The same applies to the FCA and the CMA. Whether such proximity to
the investigators is a good thing is a matter for debate: the advantages include that the
legal issues in the case can be kept under review at all times, and the case will not (in
theory at least) stray from these limits. One disadvantage is that it is much more
difficult to give dispassionate advice about the charging decision when the lawyer is so
closely aligned to the decisions that have been made throughout the investigation.
15
Section 40(7) POCA.
16
Section 42(7) POCA.
17
The maximum sentence for Fraud Act 2006 offences is ten years.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
18
February 2014. Schedule 17 Crime and Courts Act 2014.
19
Published by the CPS and the SFO in June 2013, and a new Part 12 of the Criminal
Procedure Rules (24 February 2014). The Code is required under paragraph 6.
20
In nearly 300 cases.
21
See, for example: “Why have no high level executives been prosecuted in connection with
the financial crisis?” by US District Judge Jed S Rakoff, 21 November 2013.
22
Paragraph 4 of the Schedule.
23
Other agreed penalties might include disgorgement of profits, compensation for victims
and a charitable donation – paragraph 5(5).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
JUDICIAL MANAGEMENT
As soon as a complex fraud case is transferred to the Crown Court the prosecutor
should inform the presiding judge about the facts and features of the case so that he or
she can decide how to allocate it. This initial information is an important part of the
trial process, and in addition to a statement of the facts, it should contain a concise
account of the issues that are likely to be encountered, including the length of trial,
number of defendants, severance possibilities, mitigating and aggravating features of
the facts, and likely pleas.
When a judge is allocated to the case he or she will ideally preside at the first
post-transfer hearing, and at all subsequent pre-trial hearings. The judge will set a
timetable for the various stages of the pre-trial process, dealing with such matters as
disclosure, severance, legal argument and trial date.
The judge will have trial manageability, particularly in the context of jury issues, at
the top of the agenda. Current thinking24 is that four or five defendants and a trial of 12
weeks is the maximum that can be dealt with in a manageable trial, save in the most
extreme circumstances, and pressure will be exerted on the prosecution to reduce its
case to those limits by severance and/or pruning the indictment.
24
At least at Southwark Crown Court, the main fraud trials court centre in London.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 46 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
The advocate is not obliged to conduct a case in accordance with whatever the client, or when
the advocate is a barrister, the solicitor, instructs him. Save for well established principles,
like the defendant’s personal responsibility to enter his own plea, and make his own decision
whether to give evidence, the advocate alone remains responsible for the forensic decisions
and strategy.1
Case reports may tell us the outcome of the trial and any arguments taken but can
rarely tell us the strategy decided upon and executed by the defendant and his legal
counsel. On the rare occasions when the Court of Appeal does comment on the strategy
evidently executed by a legal defence team, it is often to express a negative view of it
or to refuse a ground of appeal brought by a defendant who has been convicted and
now regrets the particular strategy which he and his barrister agreed upon.
What is strategy and how is it learned? When a junior criminal defence barrister in
England or Wales begins their training at Law School, they are taught to read the
prosecution’s evidence, identify legal and evidential challenges, take the defendant’s
instructions and put forward his defence by highlighting that which supports his version
of events whilst undermining that which does not. This is not strategy, it is merely basic
case preparation.
In addition to the basic preparation of the case, a successful advocate will always
develop a clear strategy for the case as a whole. Taking a step back he will appreciate
the wider, more significant issues whilst treating legal arguments over the admissibility
of evidence and points of law as battles to be lost and won. The judicial bench will be
considered a no mans land until claimed by the most worthy side, and the defendant,
like the King in a chess game, must be ring fenced and protected at all costs.
It is not enough, however, to have one strategy for a case. A defence team must be
able to adapt the original strategy as the case evolves through, for example, the service
of new evidence or the loss of a defence witness, and so on.
The aim of this brief chapter is to outline the tools required to develop a strategy for
defending individuals charged with white collar crimes whilst highlighting some of the
challenging decisions commonly faced by defence barristers in England and Wales.
1
R v Farooqi 2014 1 Cr App R 8.
573
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 1 / Date: 9/9
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
PREPARATION
A barrister cannot claim to have a case strategy if he has not read into the case,
established the issues, familiarised himself with all the material in the case and spotted
the potential weaknesses which must be overcome to secure a conviction. In large
financial crime cases, it is often said that the devil is in the detail: a lesson hard learned
by lawyers who have cut corners to their client’s peril.
Before counsel can begin to read and analyse 30,000 pages of evidence, he must
establish the issues with the defendant.
Contrary to popular belief, the issues are often simple in financial crimes. Is it
conceded that a financial crime has been committed as alleged or at all? If so, is the
defence lack of dishonesty or lack of knowledge of a financial crime? Does the client
assert that another party is at fault and that he or she was tricked into innocent
participation? And so on.
Of course, the detail of the financial crime and piecing together of the jigsaw of
evidence and disclosure will be a significantly more complex task. Remembering the
simple core issues and using them to make up the skeleton of an advocate’s closing
speech will ensure that the case remains accessible to a jury despite the complexities
within the evidence.
WITNESSES
Financial crime allegations usually lead to significant numbers of both witnesses of
fact, such as complainants who have suffered loss, and professional witnesses who have
investigated and exhibited evidence. Unique to financial crime allegations, there may
also be ‘guilty witnesses’ such as a person who was party to dishonest conduct but, for
reasons of their own, contacted the authorities as a whistleblower or gave evidence
against former colleagues in exchange for immunity. These witnesses must be treated
with caution. It may be that aggressive cross examination before a jury will make them
appear to be equally or more guilty than the defendant which may lead to the jury
distrusting the prosecution and acquitting the defendant. Alternatively, the jury may
dislike yet believe the witnesses and convict the defendant on the basis that they are all
as bad as each other. Attacking the credibility of prosecution witnesses cannot,
therefore, be the only aim of a defence strategy in such cases.
PRELIMINARY HEARINGS
Case strategy should not be decided on the eve of trial. It should be established at the
earliest possible stage to ensure that counsel can request the appropriate disclosure and
instruct any necessary experts for the defence. Furthermore, strategy ought to be
established early so that the barrister who attends the preliminary hearing does not say
too much about his client’s defence before full advice on the evidence and potential
legal challenges has been given.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
In England and Wales, a case which is to be tried in the Crown Court before a judge
and jury is required to have a Plea and Case Management Hearing.2 Ideally, the
prosecution will have drafted a clear indictment of the charges and served all of the
evidence on which it seeks to rely by this time. The defence will have served a defence
statement clearly setting out the defence and resulting contentious issues. Legal
arguments such as those relating to bad character, hearsay evidence, challenges to the
admissibility of the evidence including the need for expert evidence are set out along
with the list of witnesses whose evidence will be tested by cross examination at trial.
A general principle of practice requires that the prosecution adduce all evidentiary
matter it intends to rely upon as probative of the defendant’s guilt before it closes its
case. Whether any evidence could be introduced later in the trial is a decision for the
trial judge’s discretion.3 This means that the prosecution may serve evidence once the
trial has begun and continually serve notices of further evidence until the time has
come for the defence case to begin. It is always a risk therefore to positively assert
detailed aspects of a defence case where evidence is outstanding. A common example
is when the prosecution have not yet served telephone evidence. This will include a
forensic analysis of the defendant’s phone and phones of any other relevant party. The
analysis will show which persons the defendant is regularly in contact with and may
include any incriminating text messages sent or received by the defendant. The phone
data will also paint a picture of the defendant’s physical whereabouts at relevant times
through cell site information. By way of illustration, defendant X is sure that he was at
home all day on the 7 July 2014 and that he has never met the alleged victim. When the
forensic analysis of his phone is served, it may reveal that he was not at home on the
7 July 2014 (or at least his phone was not) and that he received 12 text messages from
the alleged victim. At an early hearing it is always the decision of counsel whether to
advise his client that it is in his best interests to merely give an outline of his defence
so he can be advised on the strength of the evidence yet to be served. By taking this
cautious approach, counsel is not presuming that his client is lying or guilty of the
crime alleged rather he is allowing for the possibility that the defendant may be
confused about dates or people in the months or years after the relevant period or
exaggerating his defence because he is scared of being convicted of an offence. In
financial crime cases, this is particularly relevant to strategy as the allegation is likely
to relate to a lengthy period of time and specific meetings, telephone calls and other
points of contact which the defendant may easily misremember. Furthermore, there is a
higher likelihood of relevant disclosure which would assist the defendant such as
minutes of conferences, work diaries or email chains.
DISCLOSURE
Just as counsel must be fully aware of the detail within the evidence so he must not
forget about the unused material or disclosure in the case.
2
Criminal Procedure Rules 2013, Part 3.
3
R v Rice 1963 1 QB 857, 47 Cr App R 79 CCA.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
In 2010, the first contested cartel prosecution was brought by the Office of Fair
Trading (OFT) in R v George, Crawley and Others (the BA case). The case collapsed
when the defence identified thousands of documents which ought to have been
disclosed under the prosecution’s disclosure obligations but had not been.
In the BA case, Virgin had blown the whistle on allegedly anti-competitive behaviour
which it said had taken place between its employees and those at British Airways (BA).
Virgin subsequently secured immunity from the OFT in relation to both civil penalties
and criminal prosecution for the individuals involved. Four BA employees were
charged with the cartel offence.4 It was only after the trial had begun that approxi-
mately 70,000 emails which Virgin had led the OFT to believe had been corrupted or
damaged were established to be recoverable and disclosable. There was focus on a
particular email which showed that the decision by Virgin to increase the passenger fuel
surcharge was made before phone conversations between the two airlines which the
prosecution had alleged involved an anti-competitive agreement. As the trial had
commenced, the prosecution took the view it was too late to seek an adjournment to
properly extinguish its disclosure obligations and therefore offered no evidence against
the four accused. The case was both expensive and embarrassing for the OFT who
commented in their press release at the time that the collapse of the case was the result
of ‘an oversight, which occurred at a time when the UK criminal cartel regime was still
relatively new and the OFT’s approach to the handling of leniency applications in the
context of parallel criminal and civil investigations was still evolving’.5 Arguably, there
is no other case which so clearly shows the importance of understanding the
prosecution’s disclosure obligations or the need for the defence to assure itself they
have been met.
The prosecution’s disclosure obligation is set out as follows: ‘The prosecutor must –
disclose to the accused any prosecution material which has not previously been
disclosed to the accused and which might reasonably be considered capable of
undermining the case for the prosecution against the accused or of assisting the case for
the accused.’6
Of course, it is critical for counsel to be fully aware of the issues in the case before
he analyses the disclosed material so that he can see what material has not been
disclosed as well as what material has. This will ensure that a timely request for
disclosure is made as part of the defence statement or, if not then forthcoming, in a
later formal application.7
LEGAL ARGUMENTS
Having identified the issues, taken instructions from the defendant, scheduled the
evidence, identified complex lines of cross examination of witnesses and analysed the
4
s.188 Enterprise Act 2002
5
OFT press release 47/10, 10 May 2010 – no longer available since the abolition of the
OFT.
6
s.3 Criminal Procedure and Investigations Act 1996.
7
s.8 Criminal Procedure and Investigations Act 1996.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
disclosure, counsel will now have a clear idea of any legal arguments for the defence.
It is a strategic decision for counsel to decide which legal points should be taken and
which should be left alone.
There is often evidence which counsel considers should not be admissible for a
myriad of reasons – its provenance or content may lead to a challenge that ‘having
regard to all the circumstances, including the circumstances in which the evidence was
obtained, the admission of the evidence would have such an adverse effect on the
fairness of the proceedings that the court ought not to admit it’.8 The likely areas of
concern are often police conduct of the case including search, caution, identification
procedures, purported expert evidence and interview where there may be breaches of
the police Codes of Practice leading to the material being potentially inadmissible.9
There may also be bad character or hearsay evidence and any confessions to consider
along with any niche legal points.
There are plenty of safeguards in place within the criminal justice system to ensure
that the jury hear all the evidence whilst protecting the defendant from faults in the
system, and the common remedy to admissibility challenges brought under s.78 Police
and Criminal Evidence Act 1984 is a judicial direction to the jury at the close of the
trial addressing the weight the evidence should be given in all of the circumstances.
It may be the best strategy to fight every point but it may alternatively be better to
forgo a tenuous admissibility challenge in favour of highlighting the tenuous nature of
the prosecution’s case in cross examination before a jury.
ABUSE OF PROCESS
Separate consideration must always be given to whether it would be an abuse of the
court’s process to try any defendant. Abuse of process is a vast topic of itself and many
excellent texts have been written about it.10 There are two general categories of case in
which the court will stay proceedings as an abuse of its process: (i) where it will be
impossible to give the defendant a fair trial; and (ii) where a stay is necessary to protect
the integrity of the criminal justice system.11
It may be impossible to give the defendant a fair trial in cases where the prosecution
has been brought after a significant delay, meaning the evidence cannot be challenged.
Unsurprisingly this argument is most common in historic sex abuse cases, but it has
been utilised in a complex fraud case in which 8000 items of disclosure, sought by the
defence for over a year despite two adjournments, had still not been provided by the
prosecution up to a few days before the trial was due to begin. The only remedy to
ensure the defendant had a fair trial was a third adjournment which the judge
8
s.78 Police and Criminal Evidence Act 1984.
9
Police and Criminal Evidence Act 1984 Codes A, B, D, E, F, G and H.
10
For example, Abuse of Process, 2nd Edition by Colin Wells (Jordan Publishing 2011).
11
Chapter 4, paragraph 75, Archbold Criminal Proceedings 2014; R v Maxwell 2011 2 Cr
App R 31.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
considered would have been inappropriate. The proper course was to stay proceedings
as an abuse of process.12
A stay may be necessary under the second limb that it would be ‘unfair to try the
defendant’ when fairness to the accused, although not irrelevant, is overridden by the
primary importance of the court to protect the integrity of the criminal justice system.
Two well known examples of this would be, first, the rule against double jeopardy
where it is unfair for a defendant to be punished twice for an offence arising out of the
same or substantially the same set of facts. This may be relevant in financial crimes
where an individual has been tried for the same offence in a foreign jurisdiction.
Second, entrapment by the authorities. The courts have long considered that it is not
acceptable that the state through its agents should lure its citizens into the commission
of offences before prosecuting them for the same actions.13
The second limb of abuse may also be utilised where the prosecution has reneged on
a promise that he or she would not be prosecuted. The critical consideration is whether
the defendant, on being made any promise by the prosecution, acted to his detriment.
Of course, counsel will have to consider how long the defendant was left to believe that
he would not be prosecuted and any prejudice to him from his co-operation whilst
under that belief.
In financial crime cases, it is also worth considering who is in effective control of a
prosecution. Is a bank, for example, the complainant and ‘prosecutor’? In such cases
where the complainant is a powerful entity there is a heavy burden on it to make
available full and frank disclosure to the prosecution including privileged material so
that it can be made available to the defence. Any concerns over this may compromise
the integrity of proceedings. Referring back to the BA case, it would have been open to
the defence to consider an abuse of process argument had the prosecution continued
with the case against the four BA individuals on the basis that Virgin had not properly
made the 70,000 documents available to the prosecution.
THE TRIAL
Twelve members of the public are watching everything that happens in the courtroom
and potentially see some things that happen outside the courtroom if the defendant is
on bail. They see the way in which the defendant behaves at the back of court, how the
judge treats counsel, how the prosecutor and defence counsel interact, let alone the
evidence of every witness and item of documentary evidence. English barristers
sometimes refer to the jury as a twelve headed beast because when one juror sees
something which he considers to be important, he will tell the others. Furthermore, it is
naïve to believe that those twelve people are not making judgements about each and
every little thing they see.
The aim of a great barrister is to persuade the jury that, on hearing all of the
evidence, they cannot be sure of the guilt of the defendant. That much is a given. A
subtle part of the process of persuading the jury is influencing what they see and hear
12
R v Olivier, unreported, 27 September 2007, CA 2007 EWCA Crim 3483.
13
R v Latif and Shahzad 1996 2 Cr App R 92 HL.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
through the trial process other than the evidence. This is known as ‘changing the
temperature of the courtroom’.
In a very serious case, it may be the best strategy to show respect and deference to
the offence and victim (such as murder or defrauding the vulnerable). Alternatively, in
a case in which the complainants present as greedy it may be that counsel will attempt
to lighten the mood either with appropriate humour or a more casual manner of
speaking to the judge. Of course, this is a high-risk strategy in so far as it can go very
wrong if done badly. If the jury consider that the jokes are not funny or appropriate
they may dislike the barrister and, by extension, his client’s defence. If the judge
suspects that the barrister is trying to make light of the alleged offence and does not
agree that the offence should be viewed as such, he may comment on counsel’s manner
in the presence of the jury thus alerting them to the strategy and ultimately under-
mining it.
Successfully changing the temperature of the courtroom is done by experienced
advocates who, on weighing up the likely response they will get from certain behaviour
or actions, tread carefully and with subtlety whilst changing how the jury perceive
proceedings.
THE GIFT
More controversial than jury observation, some counsel take the view that in nearly
every case, the prosecutor will make an unintentional ‘gift’ to the defence. This is likely
to be a mistake such as a misrepresentation of the weight to be given to a piece of
evidence or something said which could be turned around and used in retaliation by the
defence. By way of example, in a case in which a woman was charged with seriously
assaulting her sister, the prosecutor did exactly this. The sister had a number of
previous convictions for offences of dishonesty; however, the defendant also had
previous convictions. The defence did not apply for the jury to be made aware of the
sister’s character because the prosecution would have rightly been given leave to
adduce the defendant’s character. Just before the prosecutor finished her closing speech
at the end of the trial she commented that the sister was a woman who had ‘never been
in trouble with the law’. It was, of course, a misleading statement. The defence made
an application for this misleading impression to be put right and the judge directed that
the prosecutor should inform the jury of the sister’s previous convictions in full. The
jury acquitted the defendant. It can only be speculated upon how much of an impact
this late information had on the jury in light of the fact they had seen and heard all of
the evidence, but it was another string to the defence bow.
Similar but less extreme, in a serious drugs case, the prosecutor said in his opening
speech, ‘the evidence is such that you will be sure he was present on that date’. The
evidence was called and was not as strong as the prosecutor had presumed it would be.
In his closing speech he stated ‘whether or not he was present on that date you must be
sure that he was involved’. In defence counsel’s closing speech the two statements were
repeated to highlight the ‘changing of the goalposts’ of the prosecution and demonstrate
that the jury could not even be sure of what they were supposed to be sure about. The
jury acquitted in under ten minutes.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
14
A defendant of effective good character is a person who has minor irrelevant or historic
previous offences such that the court can treat him as a person of good character.
15
s.100 Criminal Justice Act 2003.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
It is rare for the defence strategy in relation to character to give rise to a successful
point of appeal against conviction. In R v Adams,16 the Court of Appeal stated:
In our judgment the strategy adopted by the appellant’s legal advisers at trial was a
reasonable one. It succeeded in defeating the prosecution attempt to put in the appellant’s
character. We are also of the opinion that there is no reason to suppose that if the defence had
put in the evidence which we have concluded they ought to have done, it would have made it
more likely that the prosecution would have been able to put in the appellant’s character or
introduce evidence in rebuttal.
16
R v Adams 2007 1 Cr App R 34.
17
s.34 Criminal Justice and Public Order Act 1994.
18
s.35 Criminal Justice and Public Order Act 1994.
19
Crown Court Bench Book 2010, page 283 onwards.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 9 / Date: 9/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
cross examination by the prosecution, will the defendant strengthen or weaken his own
defence?
CLOSING SPEECHES
The final chance for defence counsel to address the jury before the judge summarises
the facts and directs the jury on the law is his closing speech. Counsel’s job is first and
foremost to persuade the jury. The barrister who speaks for the longest duration and
who reminds the jury of every piece of evidence is unlikely to be the barrister who
persuades the jury most successfully. Two more subtle approaches are, first, to
anticipate and highlight judicial directions favourable to the defendant, for example, a
good character direction or direction that the prosecution expert evidence has been
undermined and should be given less weight. Second, counsel may like to find one
point to ‘hang the defence on’. English barristers are familiar with the famous phrase
from the US case against OJ Simpson in which defence attorney, Johnnie Cochran, told
the jury that in relation to the glove ‘if it doesn’t fit, you must acquit’. This one simple
expression was the hook to hang the defence on and the jury acquitted.
Lawyers often disagree when deciding the best approach to present a particular
defence, but if they act in the defendant’s best interests, clearly advise the defendant on
his different options in terms of case strategy and ensure he is satisfied with the chosen
approach, then they are on the right path to develop a successful strategy.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 47 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Why is it that when we hear the term ‘whistleblower’ we are caught with mixed
emotions? Is the whistleblower someone to admire? To be protected? Or someone
being a nuisance? What is it about the term that stimulates this reaction? What does the
term mean and what are the connotations that it raises? This chapter describes the
origins of the meaning of whistleblower, some of the issues that raise those emotions,
what legislation has been adopted to address how whistleblowers can be protected and
concludes by arguing that the real protection for the whistleblower lies in building
organisations that support systems that prevent crime and values that support an ethical
culture.
More than one origin is claimed for the term ‘whistleblower’. One account has its
origin in the practice of English police officers who would blow their whistle when
they noticed the commission of a crime. The whistle would alert other law enforcement
officers and the general public of danger. Its contemporary use has been attributed to
Ralph Nader who, in a 1971 conference presentation and subsequently in book form,1
applied the term to the person who disclosed information about defects in the
automobile industry.
Since then, whistleblowing has regularly been applied in the news media to reports
of wrongdoing, mostly of illegal, immoral or illegitimate practices. They provide many
of our more sensational news stories. There are many examples. In recent times,
the general public has been engrossed with the Julian Assange and Wikileaks saga, the
Murdoch press and The News of the World phone hacking and more recently the
disclosure by US Defence Department member, Edward Snowden, of the surveillance
of the general public by the US Government.
Despite the espoused good intentions of the whistleblowers in disclosing wrong-
doing, they do not always receive the rewards or approbation that they may have
expected. Assange is currently confined to the Ecuadorian embassy in the UK. The
News of the World no longer exists and the journalist whistleblower, who blew the
whistle, took his own life. Snowden is currently hiding somewhere in Moscow and
seeking asylum in a number of countries.
Most whistleblower reports are from internal sources. Many are directed towards
government mismanagement. In one example from Victoria, Australia, in 2008, the
Victorian State Ombudsman received a complaint about matters raised in Parliament by
a Member of Parliament (MP) regarding a Local Government Council (Brimbank) and
allegations of ‘threats, bribery, intimidation, misuse of Council funds, mismanagement,
1
Nader, R., Petkas, P.J. and Blackwell, K. 1972. Whistle Blowing. New York, Grossman.
583
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
2
Norington, B. 2014. Messenger becomes focus of suspicion. The Weekend Australian,
Inquirer, 28–29 June, p. 15.
3
ABC News Updated Thu Jul 4, 2013 5:51pm AEST.
4
Francis, R.D. and Armstrong, A. 2011. Corruption and whistleblowing in international
human aid agencies. Journal of Financial Crime 18(4), 319–335.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 2 / Date: 9/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
organisation and was most distressed by the way he was treated when he blew the
whistle (sidelined and ignored and finally having no choice but to leave). In fact,
whistleblowers are often left frustrated, humiliated or ostracised at great personal cost.
His experience was not unique.
Research shows that employees who have blown the whistle are usually loyal to an
organisation and would rather have a wrongdoing corrected by raising the issue with
their organisation rather than cause a scandal by blowing the whistle.5 Many people
will not blow the whistle for fear of a negative reaction – everything from loss of
relationships at work, loss of their job or loss of contracts if the whistleblower is an
outside contractor. The old truism of ‘shooting the messenger’ bringing bad news
appears to be still dominant in most workplaces.
Whistleblowers may not be protected if they disclose information to the media. Nor
are journalists immune to prosecution if they are found to have access to information
that is not in the public domain.6 It is also difficult to draw a line between ‘leaking’, for
example, Ministerial leaks of confidential information to journalists, and disclosure of
government information by a whistleblower. The former may be rarely challenged, but
the latter is the only one protected. Currently, before the Federal Parliament in Australia
is new legislation under which spies who leak sensitive information will face new
penalties of up to ten years’ jail.
In Egypt, the recent convictions of journalists for reporting events that challenged
public authority point to new threats to those who disclose information even when it is
in the public domain. Governments in most western countries are introducing ‘data
retention’ legislation that will require records of internet communications to be retained
by providers to help intelligence and law enforcement agencies to carry out investiga-
tions and prosecutions. In the UK, information such as the time and destination of
phone calls, text messages, emails and Skype calls must be retained for up to a year. In
Australia, legislation currently before Parliament is seeking a two-year retention
period.7
The rapid distribution of secret public sector information has been made possible by
access by the general public to the new sophisticated information technology used in
communications (ITC) and social media. Twitter, Youtube, and so on, have changed the
means of whistleblowing so that there are some questions raised about, on the one
hand, whether legislation across the globe is keeping up with the changes and about, on
the other hand, how whistleblowers should be protected and whistleblowing should be
managed.
5
Vandekekchhove, W. and Tshuridu, E.E. 2010. Risky rescues and the duty to blow the
whistle. Journal of Business Ethics 97(3), 365–380.
6
Dorling, P. 2012. Secrets, lies and perils of a whistleblower. The Age, 18 February, p. 14.
7
Wroe, D. and Massola, J. 2014. Internet data to be stored under new crime, spying laws.
The Age, 16 July, p. 3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
DEFINITION OF A WHISTLEBLOWER
As early as 1981, the US Merit Systems Protection Board defined whistleblowers as
employees who report illegal or wasteful activities within government operations. Over
20 years later, in 2003, under the governance standards set by Standards Australia
International,8 a whistleblower was a person, being a director, manager, employee or
contractor of an entity, who, whether anonymously or not, attempts to make or wishes
to make a report in connection with reportable conduct and where the whistleblower
wishes to avail themselves of protection against reprisal for having made the report.
Here, the issues of anonymity and protection were raised.
A broad definition of whistleblowing used in studies in the US9 refers to wrongdoing
in terms of perceived illegal, immoral or illegitimate practices under the control of
employers, and included errors of both commission and omission. This ignored any
motivation for wrongdoing but included wrongdoing that was not only illegal but
viewed as immoral or illegitimate.
Latimer and Brown’s10 studies of whistleblowing greatly influenced the legislation
introduced in Australia. They limited the scope of whistleblowing to disclosures within
the power of employers to take action. It was comprehensively defined as the disclosure
by organisational members (former or current) of illegal, immoral or illegitimate
practices under the control of their employers to persons or organisations that may be
able to take some action.
Perhaps because of the negative connotations attached to the term ‘whistleblowing’,
the term used in legislation in Australia and the UK to refer to whistleblowing was
‘public disclosures’ and to those who report misdoings was ‘disclosers’. In the US the
term used is ‘relator’ referring to the person who relates the complaint.
The Australian Government’s PID Act11 refers to the reporting of information that is
of public interest and which alleges a breach of the Australian Public Service (APS)
Code of Conduct by an employee or employees within an agency. The APS Code of
Conduct states:
+ An APS employee must act with honesty and integrity in the course of APS
employment.
+ An APS employee must maintain appropriate confidentiality about dealings that
the employee has with any Minister or Minister’s member of staff.
+ An APS employee must at all times behave in a way that upholds the APS values
and good reputation of the APS.
8
Standards Australia International 2003. Whistleblower Protection Programs for Entities.
Corporate Governance Australian Standard AS 8004-2003. Sydney, Standards Australia Inter-
national.
9
Near, J.P. and Miceli, M.P. 1985. Organizational dissidence: The case of whistleblowing.
Journal of Business Ethics 4(1), 1–6.
10
Latimer, P. and Brown, A.J. 2008. Whistleblower laws: International best practice.
University of New South Wales Law Journal 31(3), 796–797.
11
Australian Government. Public Interest Disclosure Act 2013, http://www.comlaw.gov.au/
Details/C2013A00133.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
APS values are: (a) that the APS is apolitical, performing its functions in an impartial
and professional manner, and (b) that it has the highest ethical standards.
The PID Act refers to disclosures (Table 48.1) made by a person who is, or has been,
a public official to an authorised internal recipient or supervisor, to a legal practictioner,
or to anybody if (a) the disclosure has not been adequately dealt with or (b) there is
substantial and imminent danger to health or safety. The provisions of the sub-sections
go from (A) to (I) iii, and need to be considered in their entirety. A disclosure may be
made directly to the Inspector-General of Intelligence and Security (IGIS, in relation to
an intelligence matter) or to the Commonwealth Ombudsman (in relation to other
government agencies), or to an investigative agency prescribed in rules made under the
PID Act. In limited circumstances, an external disclosure outside government, or an
emergency disclosure in the case of substantial and imminent danger, is permitted. The
exception is intelligence information or information that poses a risk to security and
defence.
The stated objective of the Act is: to promote the integrity and accountability of the
Commonwealth public sector, to encourage public disclosures, to protect the people
making the disclosures and to ensure that the matters are properly investigated. A
further restriction on whistleblowers is that conduct is not disclosable under the Act if
it relates only to actions taken or decisions made by:
+ politicians
+ private individuals or companies
+ courts or tribunals
12
See, for example, Armstrong, A. and Francis, R.D. 2014. Legislating to protect the
whistleblower: The Victorian experience. Australian Journal of Corporate Law 29(1), 101–111.
13
Armstrong, A.F. and Francis, R.D. 2010. Whistleblowing. Paper presented to the workshop
Whistleblowing, 28th International Symposium on Economic Crime, Jesus College, University
of Cambridge, September 2010.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 5 / Date: 31/7
JOBNAME: Rider PAGE: 6 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Table 48.1 Types of disclosable conduct addressed by the Australian Public Interest
Disclosure Act 2013
A discloser may disclose information to his/her supervisor (who is then obliged under
section 60A to give the information to an authorised officer) or an authorised officer of
the agency to which the person belongs or formerly belonged, the Ombudsman, or an
investigative agency. The disclosure provisions do not affect an APS employee’s right
to complain to the Commonwealth Ombudsman about actions taken or decisions made
by an agency.
For intelligence and defence matters the disclosure is referred to an authorised officer
who is the principal officer of the agency, or to a public official who is appointed by
the principal officer of the agency as an authorised officer for the purposes of this Act.
The principal officer of the allocated agency must investigate the disclosure and prepare
a report, within a set time and in accordance with the requirements of the Act. When a
disclosure complies with the legislation, protection is available to the discloser.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 6 / Date: 9/9
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
14
OECD 2009. Recommendation for Further Combating Bribery of Foreign Public Officials
in International Business Transactions. Working Group on Bribery in International Business
Transactions,
15
KPMG 2011. Global Anti-Bribery and Corruption Survey 2011, www.kpmg.com/…/
global-anti-bribery-corruption-survey-o-201106.asp.
16
OECD 2011. G20 Anti-Corruption Action Plan: Study on Whistleblower Protection
Frameworks, Compendium of Best Practices and Guiding Principles for Legislation. Paris,
OECD.
17
Wearing, W. 2005. Cases in Corporate Governance. London, Sage.
18
Transparency International 2007. Policy Paper: Poverty Aids and Corruption.
www.Transparency.org.content/download/20572/285905.
19
Miceli, M.P. and Near, J.P. 2013. An international comparison of the incidence of public
sector whistle-blowing and the prediction of retaliation: Australia, Norway and the US.
Australian Journal of Public Administration 72(4), 433–446.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
many public servants take considerable pride in their commitment as public servants to
values such as impartiality, fairness and ethical behaviour.
Another reason why whistleblowing legislation is necessary is that, as indicated
above, retaliation for whistleblowing has traditionally been the norm in most organ-
isations.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
20
Brown, A.J. 2008. Public Interest Disclosure Legislation in Australia: Towards the Next
Generation. Brisbane, Griffith University, Commonwealth Ombudsman, NSW Ombudsman and
Queensland Ombudsman.
21
Miceli, M.P. and Near, J.P. 2013. An international comparison of the incidence of public
sector whistle-blowing and the prediction of retaliation: Australia, Norway and the US.
Australian Journal of Public Administration 72(4), 433–446.
22
Miceli, M.P., Near, J.P. and Dworking, T.M. 2009. A word to the wise: How managers and
policy-makers can encourage employees to report wrongdoing. Journal of Business Ethics 86(3),
379–396; Brown, A.J. 2008. Public Interest Disclosure Legislation in Australia: Towards the
Next Generation. Brisbane, Griffith University, Commonwealth Ombudsman, NSW Ombudsman
and Queensland Ombudsman.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
The whistleblower must also be kept informed of the response to the disclosure and
progress of an investigation.
23
Brown, A.J. and Roberts, P. 2010 The Australian legislative experience. In D. Lewis (ed.)
A Global Approach to Public Interest Disclosure Legislation, pp. 56–73. Cheltenham, UK and
Northampton, MA, Edward Elgar; Miceli, M.P., Near, J.P. and Dworking, T.M. 2008. Whistle-
blowing in Organizations. Lea’s Organization and Management Series, New York, Routledge/
Taylor & Francis; Smith, R. and Brown, A.J. 2008. The good, the bad, and the ugly:
Whistleblowing in our times. In A.J. Brown (ed.) Whistleblowing in the Australian Public
Sector: Enhancing the Theory and Practice of Internal Witness Management in Public Sector
Organizations, pp. 121–151. Canberra, ANU E-Press.
24
Miceli, M.P. and Near, J.P. 2013 An international comparison of the incidence of public
sector whistle-blowing and the prediction of retaliation: Australia, Norway and the US.
Australian Journal of Public Administration 72(4), 433–446.
25
Armstrong, A.F. and Francis, R.D. 2013. Protecting the Whistleblower. Paper presented to
the workshop Whistleblowing, International Symposium on Economic Crime, Jesus College,
University of Cambridge, September.
26
Zhand, J., Chiu, R. and Wei, L. 2009. Decision-making process of internal whistleblowing
behaviour in China: Empirical evidence and implications. Journal of Business Ethics 88(S1),
25–41.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 10 / Date: 9/9
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
If an individual makes a public interest disclosure, the individual is not subject to any
civil, criminal or administrative liability (including disciplinary action) for making the
public interest disclosure, proceedings for defamation or termination of a contract on
the basis that a disclosure constitutes a breach of the contract. This is not the case,
however, if the person making the disclosure knowingly contravenes a designated
public disclosure restriction, and they are not protected from prosecution if they have
been involved in the illegal conduct being disclosed.
This means that the disclosure must comply with the procedures defined by the Act
and not disclose information, such as intelligence information, whose circulation is
specifically restricted.
Section 16 of the PS Act in Australia provides that a person performing functions in
or for an agency must not victimise or discriminate against an APS employee because
the employee has reported breaches (or alleged breaches) of the Code to an authorised
person, that is, a supervisor or official designated to receive complaints.
The Federal Court or Federal Circuit Court may make orders for civil remedies
(including compensation, injunctions and reinstatement of employment) if a reprisal is
taken against a person (the whistleblower) because of a public interest disclosure
(including a proposed or a suspected public interest disclosure).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
27
The Privacy Act 1988, www.oaisc.gov/au/privacy-act.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Notification to Discloser
The Ombudsman’s Office has several roles. The Ombudsman determines standards for
the procedures for dealing with disclosures, gives information and assistance, keeps
records of disclosures under the PID Act and conducts investigations. Its main role is to
investigate disclosures referred to it by an agency or a discloser. Evidence of a criminal
offence may be referred to the police. Another of the Ombudsman’s duties under the
PID Act is conducting educational and awareness programmes relating to the Act.
Matters referring to intelligence or national security, being outside the Ombudsman’s
responsibilities, require the Ombudsman to consult with the IGIS.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Table 48.4 lists the types of disclosures that qualify for protection in the UK. They are
very similar to those found in the Australian Act. The differences are that the UK Act
specifies that disclosure includes information about events that are ‘likely to occur’ (a
miscarriage of justice) or a matter that is deliberately concealed. The Australian Act
disclosures that qualify for protection include any item that perverts the course of
justice or causes waste within the public sector.
The scope in both Acts extends to employees of all government entities including
health and education authorities, but specifically excludes the private sectors. The 2013
amendments to the UK Act were designed to close a loophole that allowed whistle-
blowers to blow the whistle on matters of private interest (e.g. breach of their
employment contract) and ensure it applies only to matters of public interest. Both Acts
apply to information about misconduct in the home or foreign countries. The UK Act
requires the disclosure to be ‘in the public interest’, not for personal gain and to be
‘reasonable’. In an assessment of ‘reasonable’ a court should take into account the
identity of the person to whom the disclosure is made, the seriousness of the matter,
whether it is likely to continue, whether the disclosure is a breach of confidentiality
owed to their employer, and what kind of action was taken as a result of the disclosure.
In addition to employees, The UK Act applies to a greater diversity of people than
the Australian Act. It covers workers, contractors, trainees, agency staff, homeworkers,
police officers and every professional in the National Health Service. This is more
extensive than the Australian legislation that specifically excludes political office
bearers and police from the Act.
28
Public Interest Disclosure Act 1998, www.gov.uk/pga.1998.
29
Enterprise and Regulatory Reform Act 2013, www.gov.uk/government upload-regulation-
reform-act-2013.policy.PDF; Enterprise and Regulatory Reform: A Guide, 17 October 2013.
Department for Business, Innovation and Skills. Policy Paper. BIS/13/9906.
30
Dehne, G. Guide to PIDA. Public Concern at Work, www.pcaw.org.uk/guide-to-pida.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 14 / Date: 9/9
JOBNAME: Rider PAGE: 15 SESS: 7 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 15 / Date: 14/9
JOBNAME: Rider PAGE: 16 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the matter can also be raised with the person who may be responsible for the
malpractice.31 The purpose is for those in authority in the organisation to be forewarned
of potential malpractice, investigate it and take such steps that will remove any
unwarranted danger. One advantage of this approach is that in addition to facilitating
early detection of malpractice, the law can more readily hold people to account for
their actions where it can be shown they had actual notice of, ignored or failed to
combat the malpractice. The early action can also reduce the costs and time in courts
for businesses. One disadvantage is that those warned of discovery may take evasive
action to get rid of the whistleblower.
CONCLUSION
While both Australian and UK Acts provide increased protection for the whistle-
blowers, there are a number of issues that remain to cloud the objectivity at first
suggested by the legislation in the Acts. First, what is the appropriate response of an
organisation to a complaint? How should the complaint and the whistleblower best be
managed? For example, if a matter has been investigated by an investigating entity then
natural justice means that if a decision is to be made about their conduct this person has
the right to:
31
Sweet & Maxwell 2014. Current Law Statues, www.sweetandmaxwell.co.uk.
32
Concern at Work website, www.pcaw.org.uk.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 16 / Date: 20/7
JOBNAME: Rider PAGE: 17 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
If a person has been the subject of allegations that are wrong or unsubstantiated, then it
is necessary for the employer and the investigating entity to ensure that there are no
adverse consequences for this person arising out of the disclosure or its investigation.
This is particularly crucial where information has become well known across the
organisation where the person works.
Related questions are: who should have responsibility for investigations into the
whistleblower disclosures? Should organisations be compelled to introduce whistle-
blower management structures? Should responses to whistleblower disclosures be
mandatory?
Second, are moral issues emerging from whistleblowing? Ralph Nader33 identifies
the conflict that can be experienced by the loyal employee:
The key question is, at what point should an employee resolve that allegiance to society (e.g.
the public safety) must supersede allegiance to the organization’s policies (e.g. the organ-
ization profit), and then act on that resolve by informing outsiders or legal authorities? It is a
question that involves basic issues of individual freedom, concentration of power and
information flow to the public.
33
Nader, R., Petkas P.J. and Blackwell, K. 1972. Whistle Blowing. New York, Grossman.
34
Bowden, P. 2005. A Comparative Analysis of Whistleblower Protection. Australian
Association for Professional and Applied Ethics 12th Annual Conference 28–30 September
2005.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 17 / Date: 20/7
JOBNAME: Rider PAGE: 18 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
35
Francis, R.D. and Armstrong, A. 2011. Corruption and whistleblowing in international
human aid agencies. Journal of Financial Crime 18(4), 319–335.
36
Brown A.J. (ed.) 2008. Whistleblowing in the Australian Public Sector: Enhancing the
Theory and Practice of Internal Witness Management in Public Sector Organizations. Canberra,
ANU E-Press.
37
Vandekekchhove, W. and Tshuridu, E.E. 2010. Risky rescues and the duty to blow the
whistle. Journal of Business Ethics 97(3), 365–380.
38
Fraud Enforcement Recovery Act 2009, www.justice.gov/civil/docs_forms/C-FRAUDS_
FCA_primer.pdf.
39
Fraud Statistics – Overview, October 1, 1987–September 30, 2012, Civil Division, U.S.
Department of Justice (24 October 2012), http://www.taf.org/DoJ-FCA-statistics-2012.pdf.
40
Munro, P. 2013. Once lionised, now the enemies of a security-obsessed State. The Age. 13
July, pp. 21–22.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 18 / Date: 9/9
JOBNAME: Rider PAGE: 19 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 48 /Pg. Position: 19 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. INTRODUCTION
Whistleblowing involves a conflict between an employee’s duties of loyalty to her
employer and her duty to uphold the law – to participate in enforcement of the law by
disclosing wrongdoing. When the disclosure involves issues of national security, as in
the case of Edward Snowden,1 governments, claiming to be guardians of the public
interest, see employee duties of confidentiality (or non-disclosure) as consistent with
the public interest.2 Wikileaks3 and Edward Snowden’s disclosures have raised general
questions about what citizens have a right to know about how their governments
behave.4 Governments may discourage or fail to encourage whistleblowing even where
it might help to improve the quality of public services.5 In these non-national security
contexts governments which fail to encourage whistleblowing are more vulnerable to
criticism. When governments have made commitments to open government and
transparency (whether by proclamation, as in the case of the US, or by treaty, as in the
case of the EU), these failures to encourage disclosures of wrongdoing and problems
are especially significant.6
1
See, e.g., William E. Scheuerman, ‘Whistleblowing as Civil Disobedience: The Case of
Edward Snowden’ Philosophy & Social Criticism (2014) published online 8 June 2014 (DOI:
10.1177/0191453714537263) (noting the US Government’s draconian response to Snowden’s
disclosures); Patrick Weil, ‘Citizenship, Passports, and the Legal Identity of Americans: Edward
Snowden and Others Have a Case in the Courts’ The Yale Law Journal Forum (23 April 2014).
2
Cf. Alan M. Katz, ‘Government Information Leaks and the First Amendment’ 64 Cal. L.
Rev. 108, 109 (1976) (‘Discussion of information leaks most often focuses on national defense
information, because national defense is the area in which the government presumably has the
greatest interest in regulating the flow of information’).
3
See, e.g., Alasdair Roberts, ‘WikiLeaks: the Illusion of Transparency’ 78 International
Review of Administrative Sciences 116 (2012); Mark Fenster, ‘Disclosure’s Effects: WikiLeaks
and Transparency’ 97 Iowa L. Rev 753 (2012).
4
For a discussion of transparency see, e.g., Albert J. Meijer, Deirdre Curtin, and Maarten
Hillebrandt, ‘Open Government: Connecting Vision and Voice’ 78 International Review of
Administrative Sciences 10 (2012).
5
See, e.g., House of Commons Committee of Public Accounts, Whistleblowing (HC 593,
1 August 2014) (noting that governments in the UK had sometimes failed to protect whistle-
blowers from victimization).
6
On problems of transparency see, e.g., Caroline Bradley, ‘Transparency Is the New
Opacity: Constructing Financial Regulation after the Crisis’ 1 Am. U. Bus. L. Rev. 7
(2011–2012).
602
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Whistleblowing in the private sector does not involve the same type of conflict
between different public interests.7 Arguably duties to private sector employers should
cede to the obligation to comply with the law – especially where breaches of the law
carry criminal sanctions.8 An employee who discloses insider trading, market manipu-
lation, or sanctions-busting should not be criticized for breaching duties to an employer
who, at the very least, did not work hard enough to prevent such activities. Whistle-
blowing in these contexts could help to improve compliance.9
Ensuring compliance with laws regulating economic and financial activity is a
perennial concern for policy-makers and law enforcement personnel.10 This concern
has intensified as policy-makers increasingly rely on regulated financial firms as
gatekeepers and aids to enforcement of a range of different objectives from the control
of money laundering to the enforcement of sanctions.11 Financial firms are required to
know their customers and file suspicious activity reports,12 and they are responsible for
ensuring that they do not facilitate financial transactions in violation of sanctions13 or to
evade tax laws. But a number of visible examples of non-compliance with these
obligations have threatened to reduce confidence in the integrity of the financial
markets.14 Similarly, concerns about ensuring the integrity of financial benchmarks
involve an emphasis on ensuring compliance.15
7
A potential whistleblower would need to weigh the risks of retaliation against a perceived
duty to disclose. Employer retaliation may be counter-productive. See, e.g., Tina Uys, ‘The
Politicisation of Whistleblowers: A Case Study’ 9 Business Ethics: A European Review 259–
267. (2000) (noting that retaliation may ‘transform … a loyal employee into a political activist’).
8
Although cf. e.g., Orly Lobel, ‘Citizenship, Organizational Citizenship, and the Laws of
Overlapping Obligations’ 97 Cal. L. Rev. 433, 434 (2009) (arguing that there is a ‘deep
ambivalence within judicial and statutory doctrines about the role of individuals in resisting
illegality in their group settings’).
9
However, cf. Kate Kenny, ‘Banking Compliance and Dependence Corruption: Towards an
Attachment Perspective’ Edmond J. Safra Working Paper No. 38 (6 March 2014) <http://
ssrn.com/abstract=2405615> accessed 8 August 2014, at 27 (Whistleblowers suffer for disclos-
ing wrongdoing: they are ‘isolated, humiliated and cast out’).
10
Compliance is not a fee-generating activity. Cf Kenny, supra note 9, at 19 (noting that
sometimes compliance personnel in banks are described as ‘business prevention officers’).
11
See, e.g., Financial Action Task Force, Guidance on the Risk-Based Approach to
Combating Money Laundering and Terrorist Financing: High Level Principles and Procedures,
2–3 (June 2007) (‘A risk-based approach should not be designed to prohibit financial institutions
from engaging in transactions with customers or establishing relationships with potential
customers, but rather it should assist financial institutions to effectively manage potential money
laundering and terrorist financing risks’); Maria Bergström, Karin Svedberg Helgesson, and
Ulrika Mörth, ‘A New Role for For-Profit Actors? The Case of Anti-Money Laundering and Risk
Management’ 49 J. Common Market Studies 1043 (2011).
12
See, e.g., Basel Committee on Banking Supervision, Sound Management of Risks Related
to Money Laundering and Financing of Terrorism, 9 (January 2014).
13
See, e.g., Bank Mellat v. HM Treasury [2013] UKSC 39.
14
See, e.g., United States Senate, Permanent Subcommittee on Investigations, Committee on
Homeland Security and Governmental Affairs, Offshore Tax Evasion: The Effort to Collect
Unpaid Taxes on Billions in Hidden Offshore Accounts (26 February 2014).
15
See, e.g., Financial Stability Board, Reforming Major Interest Rate Benchmarks (22 July
2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 2 / Date: 9/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Some commentators have argued that compliance may be improved through encour-
aging whistleblowing and, in particular, by paying rewards or financial incentives to
whistleblowers. Paying rewards to whistleblowers may counteract the strong social
pressures which favour silence.16 For this reason policy-makers in the US have decided
that in defined circumstances whistleblowers should be compensated. In other juris-
dictions the situation of a whistleblower is more precarious as whistleblowers may
infringe obligations of professional secrecy.17 In some jurisdictions whistleblowers are
protected from retaliation, but not remunerated for their efforts.18 In the UK, the
Parliamentary Commission on Banking Standards argued that whistleblowing should be
encouraged,19 but so far the UK’s financial regulators are not persuaded that the
payment of rewards to whistleblowers will in fact improve enforcement.20
16
See, e.g., Kenny, supra note 9, at 22–23.
17
See, e.g., Bradley J. Bondi, ‘Don’t Tread on Me: Has the United States Government’s
Quest for Customer Records from UBS Sounded the Death Knell for Swiss Bank Secrecy Laws’
30 Nw. J. Int’l L. & Bus. 1 (2010); Scott Schumacher, ‘Magnifying Deterrence by Prosecuting
Professionals’ 89 Indiana L. J. 511 (2014).
18
See, e.g., Terry Morehead Dworkin and A.J. Brown, ‘The Money or the Media? Lessons
from Contrasting Developments in US and Australian Whistleblowing Laws’ 11 Seattle Journal
for Social Justice 653, 655 (2013) (noting that the US approach ‘contrasts sharply with
the approach taken in Australia, where there are no rewards, and where, in addition to the
institutional or structural model, law reform has focused on legitimating whistleblowing to the
media as a means of inducing change’).
19
Report of the Parliamentary Commission on Banking Standards, Changing Banking for
Good (Vol. 1, HL Paper 27-I, HC 175-I , June 2013) (Parliamentary Commission on Banking).
20
Bank of England Prudential Regulation Authority (PRA), Financial Conduct Authority
(FCA), Financial Incentives for Whistleblowers: Note by the Financial Conduct Authority and
the Prudential Regulation Authority for the Treasury Select Committee (July 2014) (PRA/FCA
Note).
21
See, e.g., <http://www.dogthebountyhunter.com/> accessed 8 August 2014; Laura I.
Appleman, ‘Justice in the Shadowlands: Pretrial Detention, Punishment, and the Sixth Amend-
ment’ 69 Wash. & Lee L. Rev. 1297, 1308–1310 (2012) (although note that some states do not
allow bounty hunters. Id. at 1309); Taylor v. Taintor, 83 U.S. (16 Wall.) 366 (1872).
22
See, e.g., Jeremy A. Rabkin, ‘The Secret Life of the Private Attorney General’ 61 L. &
Contemp. Probs 179, 180 (1998) (noting that ‘[f]or lawyers today, it is far less inviting to play
the role of “private attorney general” than it was in the 1970s’).
23
See, e.g., Joshua P. Davis and Robert H. Lande, ‘Toward an Empirical and Theoretical
Assessment of Private Antitrust Enforcement’ 36 Seattle U. L. Rev. 1269 (2013) (arguing that
private antitrust enforcement has been effective in compensating victims and promoting
deterrence).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
together to enforce their rights in circumstances where individual suits would have been
prohibitively expensive.24 But commentators argued that many class actions were really
nuisance suits designed to force businesses to agree to settlements to avoid the costs of
litigation and Congress and the courts have limited the availability of class actions,25
including securities class actions.26 Policy-makers in the US worry about how to ensure
the benefits of private enforcement while limiting its costs.27
Conceptually, rewarding whistleblowers for their disclosures is related to this idea of
a private component to law enforcement.28 Just as the possibility of treble or punitive
damages29 might encourage litigation the possibility of a reward may lead people to
become whistleblowers rather than remaining silent. Indeed, writers about private law
enforcement and whistleblowing often cite the US False Claims Act.30
When Congress enacted the Dodd-Frank Act in response to the global financial crisis
it included new provisions in section 922 relating to rewards for whistleblowers,31 to
encourage people with knowledge of violations of the securities laws to help with the
prosecution of the violations,32 and similar provisions in section 748 with respect to
violations of the Commodities Exchange Act.33 There is some possibility for overlap of
24
Cf. Samuel Issacharoff, ‘Class Actions and State Authority’ 44 Loy. U. Chi. L. J. 369, 371
(2012–2013) (‘The class action offers an alternative form of collective organization to the state
– without the elements of popular participation, political consent, and electoral accountability
that justify governmental authority in a democracy’).
25
See, e.g., Wal-Mart Stores v. Dukes 131 S. Ct. 2541 (2011); Jean R. Sternlight and
Elizabeth J. Jensen, ‘Using Arbitration to Eliminate Consumer Class Actions: Efficient Business
Practice or Unconscionable Abuse?’ 67 Law and Contemporary Problems 75–104 (Winter 2004).
26
See, e.g., A.C. Pritchard, ‘Securities Law in the Roberts Court: Agenda or Indifference?’
37 J. Corp. L. 105, 109–110 (2011–2012).
27
See, e.g., David Freeman Engstrom, ‘Agencies as Litigation Gatekeepers’ 123 Yale L. J.
616, 619 (2014).
28
Enforcement in the US clearly involves a mix of public and private elements. Cf. Margaret
H. Lemos and Max Minzner, ‘For-Profit Public Enforcement’ 127 Harv. L. Rev. 853 (2014)
(arguing that financial incentives affect public enforcement).
29
For a discussion of punitive damages see, e.g., Robert J. Rhee, ‘A Financial Economic
Theory of Punitive Damages’ 111 Mich. L. Rev. 33 (2012).
30
See, e.g., Rabkin, supra note 23, at 197–199. See also, e.g., J. Randy Beck, ‘The False
Claims Act and the English Eradication of Qui Tam Legislation’ 78 N.C. L. Rev. 539
(1999–2000). Cf. Mathew Andrews, ‘The Growth of Litigation Finance in DOJ Whistleblower
Suits: Implications and Recommendations’ 123 Yale L. J. 2422 (2014) (discussing implications
of third party funding for false claims litigation).
31
Dodd-Frank Wall Street Reform and Consumer Protection Act, H.R. 4173, 111th Cong.
(2010) codified at 15 U.S.C. Section 922 adds a new section 21F to the Securities Exchange Act
of 1934 (15 U.S.C. 78a et seq.). The Sarbanes-Oxley Act of 2002 was an earlier attempt to
encourage whistleblowing by employees of public companies by providing for protection from
retaliation. See, e.g., Richard E. Moberly, ‘Unfulfilled Expectations: An Empirical Analysis of
Why Sarbanes-Oxley Whistleblowers Rarely Win’ 49 Wm. & Mary L. Rev. 65 (2007). The SEC
had a bounty programme in place even before the Sarbanes-Oxley Act, but few applications for
bounties were made. SEC, Office of Inspector General, Evaluation of the SEC’s Whistleblower
Program (Report No. 511, 18 January 2013) at v (SEC OIG Report).
32
S. Rep. No. 111–176, at 110 (2010).
33
Commodities Futures Trading Commission, Whistleblower Incentives and Protection, 76
Fed. Reg. 53172 (25 August 2011).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
the two regimes as the same circumstances might give rise to regulatory action by both
regulators.34 The US Securities and Exchange Commission (SEC) and Commodities
Futures Trading Commission (CFTC) rules implementing the Dodd-Frank whistle-
blower provisions are broadly similar.35
Under the Dodd-Frank Act the SEC may pay financial rewards to whistleblowers
who provide information relating to a violation of the securities laws to the SEC which
results in judicial or administrative action by the SEC under the securities laws that
produces monetary sanctions exceeding $1,000,000. The SEC may pay a reward for
‘original information’ which is ‘derived from the independent knowledge or analysis of
a whistleblower’ and ‘is not known to the Commission from any other source, unless
the whistleblower is the original source of the information’. The reward will generally
be between 10 and 30 per cent of the amount of the monetary sanctions. Rewards may
not be paid to whistleblowers who work for regulatory agencies, the Department of
Justice, a self-regulatory organization, the Public Company Accounting Oversight
Board, or a law enforcement organization, or to those who are convicted of a criminal
violation related to the securities law violation in question. The statute aims to reward
whistleblowers whose information was truly useful, and not those whose involvement
in the acts in question are culpable. Initially whistleblowers may provide information
anonymously, although they must disclose their identity before receiving any payment.
The SEC established an Office of the Whistleblower in August 2011, and has also
issued regulations to implement the new rules.36 The Adopting Release for the SEC’s
regulations noted that the SEC has received 240 comments on its proposals, many of
which focused on the relationship between the whistleblower rules and internal
corporate compliance programmes.37 The Dodd-Frank Act had not indicated whether or
not whistleblowers might be expected to work through internal compliance systems
before making disclosures to the SEC. The SEC announced that it would provide
incentives for whistleblowers to participate in internal compliance systems; for
example, whistleblowers who do work through internal systems may receive increased
rewards and those who interfere with internal compliance systems could see their
rewards reduced as a consequence.38 For employees of smaller companies the idea of
reporting internally may be unrealistic because of the risk of retaliation.39 Some
34
See, e.g., SEC, Securities Whistleblower Incentives and Protections, 76 Fed. Reg. 34300,
34305 (13 June 2011).
35
See, e.g., Thomas W. White et al., ‘CFTC and SEC Whistleblower Bounties: Largely
Similar But Important Differences Remain’ (22 August 2011) <http://www.wilmerhale.com/
pages/publicationsandnewsdetail.aspx?NewsPubId=94288> accessed 8 August 2014. These are
not the only US regimes for rewarding whistleblowers. See, e.g., Michelle M. Kwon, ‘Whistling
Dixie about the IRS Whistleblower Program Thanks to the IRS Confidentiality Restrictions’ 29
Va. Tax Rev. 447 (2010).
36
SEC, Securities Whistleblower Incentives and Protections, supra note 34, at 34300 (13
June 2011).
37
SEC, Securities Whistleblower Incentives and Protections, supra note 34, at 34300.
38
Id. at 34301.
39
See, e.g., Chelsea Hunt Overhuls, ‘Unfinished Business: Dodd-Frank’s Whistleblower
Anti-Retaliation Protections Fall Short for Private Companies and Their Employees’ 6 J. Bus.
Entrepreneurship & L. (2012).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 5 / Date: 9/9
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
commentators are concerned that employers may seek to limit whistleblowing through
retaliation or through agreements with employees (even if the agreements are un-
enforceable) that undermine the SEC’s Whistleblower Program and are inconsistent
with the policy reflected in the Dodd-Frank Act.40 Others worry that the Program may
encourage employees to look to the SEC for rewards rather than working internally to
fix compliance.41
As a result of comments, and in order to increase the possible number of awards, the
SEC provided that the $1 million recovery prerequisite for awards could comprise two
or more smaller recoveries.42 Although the SEC had proposed to take a narrow view of
when whistleblowers were coming forward voluntarily (in order to be eligible for
rewards), commenters quibbled with the SEC’s analysis of voluntariness. The SEC
wrote that
our final rule narrows the types of requests that may preclude a later whistleblower
submission from being treated as ‘voluntary’. All requests from the Commission are still
covered, as we believe that a whistleblower award should not be available to an individual
who makes a submission after first being questioned about a matter (or otherwise requested
to provide information) by the Commission staff acting pursuant to any of our investigative or
regulatory authorities.43
In addition the rules provide that people who are subject to a legal duty to report
information to the SEC are not eligible to be rewarded as whistleblowers.44 Certain
employees who are responsible for compliance are not eligible to be rewarded as
whistleblowers,45 nor are people responsible for outside audits who owe legal obliga-
tions to the SEC.46
40
See, e.g., Jordan A. Thomas, Labaton Sucharow, Petition for Rulemaking and the Issuance
of a Policy Statement Regarding Certain Aspects of the Dodd-Frank Whistleblower Program (18
July 2014) <http://www.sec.gov/rules/petitions/2014/petn4-677.pdf> accessed 7 August 2014.
41
See, e.g., Rachel S. Taylor, ‘A Cultural Revolution: The Demise of Corporate Culture
through the Whistleblower Bounty Provisions of the Dodd-Frank Act’ 15 Tenn. J. Bus. L. 69, 70
(2013) (arguing that ‘Dodd-Frank’s failure to meaningfully support internal reporting has an
injurious effect on corporate cultures of trust and compliance’). Although cf. Justin Blount and
Spencer Markel, ‘The End of the Internal Compliance World as We Know It, or an Enhancement
of the Effectiveness of Securities Law Enforcement – Bounty Hunting under the Dodd-Frank
Act’s Whistleblower Provisions’ 17 Fordham J. Corp. & Fin. L. 1023, 1044 (2012) (doubting the
effectiveness of internal compliance systems).
42
SEC, Securities Whistleblower Incentives and Protections, supra note 34, at 34301.
43
Id. at 34307.
44
Id. at 34309.
45
Id. at 34314 (noting that the exclusion promotes ‘the goal of ensuring that the persons
most responsible for an entity’s conduct and compliance with law are not incentivized to
promote their own self-interest at the possible expense of the entity’s ability to detect, address,
and self-report violations’).
46
Id. at 34314 (‘The exclusion for auditors performing engagements required by the
securities laws reflects the fact that these individuals occupy a special position under the
securities laws to perform a critical role for investors. Further, as adopted, our rule permits such
individuals to become whistleblowers under certain circumstances’).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 6 / Date: 9/9
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The SEC’s Adopting Release covers 85 pages of the Federal Register, and a detailed
analysis of the rules is therefore necessarily beyond the scope of this short chapter. The
SEC’s analysis of the issues of interpretation raised by the statute and attempts to
balance the advantages and disadvantages of encouraging whistleblowing by means of
financial rewards led to a complex set of rules.47 This complexity is not unusual in US
securities regulation, but analysing the complexities of the rules would be hard for
prospective whistleblowers with no knowledge of securities regulation.48 Whistle-
blowers need either a certain level of confidence in their ability to navigate the system
or expert support.49 The prospect of the financial rewards for whistleblowing seems to
have engendered an industry of lawyer and non-lawyer representatives of prospective
whistleblowers, which in turn has led to questions about whether the activity of
representing whistleblowers should be regulated.50
The CFTC announced its first whistleblower payment in May 2014.51 By that time
the SEC had made a number of payments.52 Evaluating how successful these
programmes are is difficult. For example, when the SEC’s Office of the Inspector
General examined the SEC’s programme and consulted other federal government
agencies with whistleblower programmes to assess whether the amounts the SEC paid
were appropriate it discovered that the agencies generally did not have an opinion about
award levels as they were set by statute.53 The SEC reports that it has received an
47
The Government Accountability Project, which provides support to whistleblowers, states
that whistleblowers and the lawyers who help them in seeking both remedies for retaliation
under Sarbanes-Oxley and bounties can face ‘very complex claims requiring sophisticated
strategies and difficult decisions as to the timing of bringing multiple claims’. Government
Accountability Project, Banking Sector Accountability: Understanding and Handling the Com-
plex ‘SOX Plus One’ Whistleblower Claim, 6 (18 September 2013) <http://www.whistleblower.
org/sites/default/files/BSA.pdf> accessed 7 August 2014.
48
The SEC’s Office of Inspector General has stated that: ‘The implementation of the final
rules made the SEC’s whistleblower program clearly defined and user-friendly for users that
have basic securities laws, rules, and regulations knowledge.’ SEC OIG Report, supra note 31, at
v. The Report notes that the user-friendliness of the system is improved by the website. Id. at 11.
49
Cf. Kenny, supra note 9, at 16 (noting that ‘Swiss whistleblower Rudolf Elmer, who spoke
out against large-scale tax evasion in an offshore branch of Julius Baer bank’ said ‘there is no
school for whistleblowers’).
50
See, e.g., Alison Frankel, ‘Is SEC Whistleblower Program Underregulated?’ (2 October
2013) <http://blogs.reuters.com/alison-frankel/2013/10/02/is-sec-whistleblower-program-under
regulated/> accessed 8 August 2014.
51
CFTC Press Release, ‘CFTC Issues First Whistleblower Award’ (PR 6933-14, 20 May
2014) <http://www.cftc.gov/PressRoom/PressReleases/pr6933-14> accessed 8 August 2014.
52
See, e.g., SEC, 2013 Annual Report to Congress on the Dodd-Frank Whistleblower
Program, 14 (SEC 2013 Annual Report) (noting that six awards had been paid to whistleblowers
and that ‘In each instance, the whistleblower provided high-quality original information that
allowed the Commission to more quickly unearth and investigate the securities law violation,
thereby better protecting investors from further financial injury and helping to conserve limited
agency resources’).
53
SEC OIG Report, supra note 31, at 23.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
54
SEC 2013 Annual Report, supra note 52, at 8 (noting the receipt of 334 tips in fiscal year
2011, 3001 in 2012 and 3238 in 2013).
55
SEC 2013 Annual Report, supra note 52, at 15.
56
Employment Rights Act 1996, 1996 c. 18, Part IVA, as amended by the Public Interest
Disclosure Act 1998, 1998 c. 23 and the Enterprise and Regulatory Reform Act 2013, 2013 c. 24.
57
Department for Business, Innovation and Skills, Enterprise and Regulatory Reform Act
2013: Policy Paper, 10 (June 2013).
58
Id. at 11 (‘In future, whistleblowing claims will only be valid where an employee blows
the whistle in relation to a matter for which the disclosure is genuinely in the public interest.
This will exclude breaches of individuals’ employment contracts and breaches of other legal
obligations which do not involve issues of a wider public interest’).
59
Department for Business, Innovation and Skills, Whistleblowing Framework Call for
Evidence (July 2013) (BIS Call for Evidence).
60
Department for Business, Innovation and Skills, Whistleblowing Framework Call for
Evidence: Government Response, 9 (June 2014) (BIS Government Response).
61
The Government proposes to add student nurses to the category of employees. Id. at 17.
62
Department for Business, Innovation and Skills, Whistleblowing Framework Call for
Evidence: Government Response, 7 (June 2014).
63
Id. at 15.
64
See, e.g., id. at 12, 18, 20.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
financial institutions had failed to report wrongdoing,65 and arguing that new measures
were necessary to encourage whistleblowing.66 The Government’s call for evidence
asked for evidence on the usefulness of financial incentives for whistleblowing,67
noting that financial incentives were available in the US, but stating that it was unclear
whether the financial incentives prompted disclosures.68 A ‘majority of respondents’
opposed the introduction of financial incentives, suggesting that the introduction of a
profit motive would corrupt the process, interfere with working relationships and have
negative effects on the whistleblowing process.69 Those who supported financial
incentives seem to have been motivated by a desire to protect whistleblowers from
adverse consequences of their actions rather than by wanting to pay them for
disclosures.70 The Government suggested that in due course it might consider financial
incentives for specific circumstances or cases.71
The UK’s FCA and PRA have agreed that whistleblowers should be encouraged and
protected but have concluded that there is no empirical evidence to support paying
financial incentives to whistleblowers.72 They stated that research showed that most
whistleblowers did not receive payments, that there was no empirical evidence that
payments increased the number or quality of disclosures, that the governance structure
for financial incentives was complex and costly, that whistleblowers incurred costs
(although they could be limited by contingent fee arrangements) and that financial
incentives might undermine effective internal whistleblowing systems.73 In addition, the
regulators said that financial incentives for whistleblowers would involve ‘moral and
other hazards’ and that public policy norms in the UK were different from those in the
US.74 The conclusions were based on discussions with a number of US agencies and
the secondment of an FCA staff member to the SEC,75 and the note cites no academic
literature on when payments might affect behaviour.76 The ‘British Bankers’ Associ-
ation and organisations representing whistleblowers’ in the UK opposed financial
incentives.77 The regulators stated that they would develop plans to encourage
65
Parliamentary Commission on Banking, supra note 19, at 45.
66
Id. at 45–47. The Commission said that the FCA should research the impact of financial
incentives in the US. Id. at 46–47.
67
BIS Call for Evidence, supra note 59, at 16–17.
68
Id. at 16.
69
BIS Government Response, supra note 60, at 19.
70
Id. (‘Of those respondents who considered that the introduction of incentives would be
appropriate as a form of reward, this view was formed mainly in light of the fact that the
individuals are acting in the public interest not their own, yet suffer a personal detriment.
Responses suggest individuals should be rewarded for any stress, loss or detrimental effects they
have suffered as a result of blowing the whistle’). The Government thought such harms could be
remediated through claims before an employment tribunal. Id. at 20.
71
Id. at 20.
72
PRA/FCA Note, supra note 20.
73
Id. at 2.
74
Id. at 3.
75
Id. at 4.
76
Cf. Uri Gneezy, Stephan Meier, and Pedro Rey-Biel, ‘When and Why Incentives (Don’t)
Work to Modify Behavior’ 25:4 Journal of Economic Perspectives 1–21 (2011).
77
PRA/FCA Note, supra note 20, at 4.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
4. CONCLUSIONS
Financial incentives for whistleblowers are part of the regulatory tool-box in the US,
but have not found the same acceptance elsewhere. Although the US False Claims Act
qui tam action has its origins in English common law, the action was abandoned in
England because it was perceived to encourage extortion and fraud.82 This history may
help to explain why the UK Government and regulators have been reluctant to reward
whistleblowers. However, even in the US, where policy-makers have chosen to reward
whistleblowing, whistleblowers are still vulnerable to employer retaliation, and the
rules reflect some uncertainties about the employee’s role, and about the appropriate
balance between encouraging internal compliance and external enforcement.
78
Id. at 6.
79
Bank of England Prudential Regulation Authority and Financial Conduct Authority,
Whistleblowing in Deposit-Takers, PRA-Designated Investment Firms and Insurers, Consultation
Paper FCA CP15/4, PRA CP6/15 (February 2015).
80
Id. at 5.
81
Id. at 6.
82
See, e.g., Beck, supra note 30 at 548 (‘for centuries, qui tam legislation produced
significant and recurring problems in England, such as widespread extortion of secret settlements
and fraudulent or malicious prosecution of innocent defendants’).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 49 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Etymologically, the word ‘audit’ is derived from the Latin word ‘audire’ which means
to hear. Auditing appears to date back to around 350 BC in ancient Greece, Egypt and
China1 and, in England, to the Exchequer during the reign of Henry I (1100–1135),
where audit officers were appointed to make sure that state revenue and expenditure
transactions were properly accounted for.2 Similar auditing activities have also been
traced back to the Italian City States of Florence, Genoa and Venice.3 It seems that
pre-1840 auditing involved the performing of detailed verification of every transaction.
Some authors4 have argued that the audit objective was that of verifying the honesty of
persons in charge of fiscal rather than managerial responsibilities. Following the
industrial revolution, auditors began utilizing sampling techniques because it was
nearly impossible to audit every transaction. This came about because of the acceler-
ating growth of the world economies, the advancement of credit granting institutions,
the socio-developments in the UK and the development of the Stock Exchange. The
evolution in auditing as well as the application of the materiality concept caused a
change in audit opinion from ‘complete assurance’ to ‘reasonable assurance’.
The auditing profession has been criticized and auditors have been sanctioned for
failure to: (a) gather sufficient competent evidence, (b) exercise due professional care,
(c) exercise a sufficient level of professional scepticism, (d) obtain evidence related to
management representations and (e) express an audit opinion.5 Francine McKenna lists
four cases of auditors having been sued: (a) Deloitte settled claims for the failures of
Bear Stearns and Washington Mutual; (b) KPMG settled claims against it for New
Century and Countrywide; (c) Ernst & Young was facing a class action suit by the
1
Lee J, ‘Government auditing in China’, Journal of Accountancy (1986) 62: 190; Boyd E,
‘History of auditing’, in Brown R (ed.), A History of Accounting and Accountants (Edinburgh:
TL & EC Jack 1905) p. 74.
2
Gul F, Teoh H, Andrew B and Schelluch P, Theory and Practice of Australian Auditing
(3rd edn, Australia: Nelson 1994).
3
Brown R, ‘Changing audit objectives and techniques’, Accounting Review (1962) 37(4):
696–703.
4
Fitzpatrick L, ‘The story of bookkeeping, accounting and auditing’, Accounting Digest
(1939) 217; Littleton AC, Accounting Evolution to 1900 (American Institute Publishing 1933).
5
McKenna F, ‘Auditor independence, professional skepticism, auditors’ fraud obligations:
case studies and examples’. (Georgia Southern Fraud and Forensic Accounting Conference,
16 May 2013) <retheauditors.com/wp-content/themes/magazine/…/GSFFAConf2013.pdf>
accessed 19 December 2013.
612
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 1 / Date: 9/9
JOBNAME: Rider PAGE: 2 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
NewYork Attorney General for Lehman; and (d) PwC was sued by Federal Deposit
Insurance Corporation (FDIC) for crisis-era failure Colonial Bank.6
As Lee Teck-Heang and Azham Md Ali have put it, ‘in view of the economic
condition, the audit function was mainly to provide credibility to the financial
statements prepared by company managers for their shareholders’.7 In Dicksee’s
Auditing, published in England in 1892, the objectives of an audit were stated as ‘the
detection of fraud; the detection of technical errors; and the detection of errors of
principle’.8 Some years later, a close look at Montgomery’s Auditing 1934 and 1940
editions shows a shift in the bearers of fraud detection responsibility. In the 1934
edition of the book9 it is stated that ‘an incidental objective of an audit is the detection
of fraud’ whereas six years later the ‘primary responsibility … for the control and
discovery of irregularities necessarily lies with management’.10
6
See supra n. 5 at p. 42.
7
Teck-Heang L and Ali A, ‘The evolution of auditing: an analysis of the historical
development’, Journal of Modern Accounting and Auditing (2008) 4(12): 1–8 at p. 4.
8
Sherer M and Turley S, Issues in Auditing (3rd edn, Sage 1997) at p. 33.
9
Montgomery R, Auditing, Theory and Practice (5th edn, New York: Ronald Press 1934) at
p. 26.
10
Montgomery R, Auditing, Theory and Practice (6th edn, New York: Ronald Press 1940) at
p. 13.
11
Alleyne P and Howard M, ‘An exploratory study of auditors’ responsibility for fraud
detection in Barbados’, Managerial Auditing Journal (2005) 20(3): 284–303.
12
Porter BA, ‘Auditors’ responsibilities with respect to corporate fraud – a controversial
issue’, in Sherer M and Turley S (eds), Current Issues in Auditing (3rd edn, Paul Chapman
1997).
13
Oyinlola AO, ‘The Role of auditors in fraud detection, prevention and reporting in
Nigeria’ (2010) at p. 3 <http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1456&
context=libphilprac> accessed 15 December 2013.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 2 / Date: 9/9
JOBNAME: Rider PAGE: 3 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
duty to consider the substantial truth as well as the mechanical correctness of accounts.
However, in Re London and General Bank (No.2) [1895] 2 Ch. 673, Lindley L.J.
rejected the view that the auditor is an insurer who guarantees the absolute correctness
of accounts. In Re Kingston Cotton Mill Co. (No.2) [1896] 2 Ch. 279, Lopes L.J.
established the following principles:
+ Auditors must exercise reasonable skill, care and caution when they are called
upon to audit.14
+ What is reasonable skill, care and caution must depend on the particular
circumstances of each case.15
+ An auditor is not bound to be a detective.16
+ An auditor is a watchdog not a bloodhound.17
+ If there is anything calculated to excite suspicion he should probe it to the
bottom.18
+ The duties of auditors must not be rendered too onerous.19
The above principles have been reiterated in later cases and extended the auditor’s duty
to audit outside the books in Re City Equitable Fire Assurance Company [1925] Ch.
406.
Other relevant principles worth mentioning are:
14
Lopes LJ (1896) at 284.
15
See supra n. 14 at 288.
16
See supra n. 14 at 288.
17
See supra n. 14 at 288.
18
See supra n. 14 at 289.
19
See supra n. 14 at 290.
20
Re London and General Bank (1895).
21
Re Kingston Cotton Mills Co. (No.2) [1896].
22
The London Oil Storage Co. Ltd v. Sear Hasluck & Co. (1904).
23
Armitage v. Brewere and Knott (1932).
24
Fomento (Sterling Area) Ltd v. Selsdon Fountain Pen Co. Ltd (1958).
25
Pacific Acceptance Corporation Ltd v. Forsyth and Others (1970).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
+ Auditors have a duty to warn management of any suspected fraud of which they
may have become aware, irrespective of whether it is material or not.26
+ Although professional standards constitute a satisfactory guide to the court in
determining what is reasonable, it is always the court’s prerogative to determine
whether an auditor has properly performed his duty with reasonable care and
skill.27
+ Auditors have a duty to audit the financial affairs of the company throughout the
relevant accounting period and not merely to report an opinion as to the truth and
fairness of the financial statements.28
Brenda Porter asserts that despite the fact that case law has in some cases determined
that auditors have a duty to detect fraud, the courts have attempted to maintain the
auditor’s duty within reasonable limits.29 William Boynton and Raymond Johnson have
argued that since the fall of Enron, auditing standards have been revamped to
re-emphasize the auditor’s duty to detect fraud.30 In reviewing the professional
standards one could argue that William Boynton and Raymond Johnson are correct
since the auditing profession has attempted to encompass these expectations and
judicial principles and revised many auditing standards to close what Brenda Porter
referred to as the ‘expectation gap’.31 On the same note Brenda Porter, Ciaran
ÓhÓgartaigh and Rachel Baskerville state that ‘as politicians become involved in the
profession’s affairs, the profession’s standard setting bodies review – and in many cases
– revise their auditing standards’.32
The audit profession is engaged in the clarification of the auditing responsibilities, as
a means of avoiding legal intervention imposing new regulations or detrimental court
rulings.33 In fact, the International Auditing and Assurance Standards Board (IAASB)
reviewed all the International Standards on Auditing (ISAs) and issued one new
standard addressing communication of deficiencies in internal control; sixteen stand-
ards contained new and revised requirements and twenty standards have been
redrafted.34
More specifically, ISA 240 ‘The Auditor’s Responsibilities Relating to Fraud in an
Audit of Financial Statements’ states that the objective of the auditor is:
26
See supra no. 25.
27
Pacific Acceptance Corporation Ltd v. Forsyth and Others (1970); Lloyd and Cheyham v.
Littlejohn (1987).
28
WA Chip and Pulp Pty Ltd v. Arthur Young & Co. (1987).
29
See supra n.12.
30
Boynton W and Johnson R, Modern Auditing: Assurance and the Integrity of Financial
Reporting (8th edn, John Wiley & Son Inc 2005).
31
See supra n. 12; Porter B, ÓhÓgartaigh C and Baskerville R, ‘Audit expectation–
performance gap revisited: evidence from New Zealand and the United Kingdom Part 2: changes
in the gap in New Zealand 1989–2008 and in the United Kingdom 1999–2008’, International
Journal of Auditing (2012) 16: 215–247.
32
See supra n. 31 at 235.
33
Holm C, Lansted LB and Seehausen J, ‘Establishing proactive auditor responsibilities in
relation to fraud: The role of the courts and professional bodies in Denmark’, International
Journal of Auditing (2012) 16: 79–97 at p. 92.
34
See supra n. 31.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
+ to identify and assess the risks of material misstatement of the financial statements due
to fraud;
+ to obtain sufficient appropriate audit evidence regarding the assessed risks of material
misstatements due to fraud, through designing and implementing appropriate responses;
and
+ to respond appropriately to fraud or suspected fraud identified during the audit.35
The Standard also requires auditors to be more proactive in searching for fraud during
the course of an audit since auditors are now expected to: (a) consider incentives and
opportunities presented to potential fraudsters as well as rationalizations justifying the
fraudulent act; (b) inquire more closely into reasons behind errors, accounting
estimates, unusual transactions and transactions with related parties that appear to lack
business rationale; (c) obtain reasonable assurance that the financial statements are free
from material misstatement; (d) make inquiries of management and those charged with
governance regarding management’s assessment of the risk that the financial statements
may be materially misstated or the risks of fraud in the entity or whether they have
knowledge of any actual or suspected or alleged fraud affecting the entity; (e) assess
the risks of management override of controls and design audit procedures accordingly;
(f) hold discussions with the engagement team and exchange ideas about how and
where they believe the entity’s financial statements may be susceptible to material
misstatement due to fraud; and (g) in the exceptional circumstances where the ‘auditor
has doubts about the integrity or honesty of management or those charged with
governance, the auditor may consider it appropriate to obtain legal advice to assist in
determining the appropriate course of action’.36 The Standard does clarify that the
‘primary responsibility for the prevention and detection of fraud rests with both those
charged with governance of the entity and management’.37
The auditor, in accordance with ISA 200 ‘Overall Objectives of the Independent
Auditor and the Conduct of an Audit in Accordance with International Standards on
Auditing’, shall maintain professional scepticism, ‘considering the potential for man-
agement override of controls and recognizing the fact that audit procedures that are
effective for detecting error may not be effective in detecting fraud’.38
To restore public confidence and to limit the auditors’ responsibilities on fraud
detection, the US Congress in 2002 passed the Sarbanes-Oxley Act (SOX). Following
the 2008 financial crisis, in the UK, the House of Lords’ Economic Affairs Committee
held an inquiry into the role of auditors and the European Commission developed a
Green Paper.
According to SOX, auditors are not required to detect fraud but to ‘report specific
situations and events relating to fraud and illegal acts to the clients’ audit committee as
35
International Auditing and Assurance Standards Board, ‘The auditor’s responsibilities
relating to fraud in an audit of financial statements’ ISA 240 (2009) at para. 10.
36
See supra n. 35 at para. A63.
37
See supra n. 35 at para. 4.
38
International Auditing and Assurance Standards Board, ‘Overall objectives of the
independent auditor and the conduct of an audit in accordance with international standards on
auditing’, ISA 200 (2009) at para. 4.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 5 / Date: 9/9
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
39
Chong G, ‘Detecting Fraud: What are Auditors’ Responsibilities’, Journal of Corporate
Accounting and Finance (2013) 24(2): 47–53 at p. 49.
40
Statement on signing the Sarbanes-Oxley Act of 2002, 38 Weekly Compilation of
Presidential Documents 1286 (30 July 2002).
41
Reach DM, ‘Keeping your friends close but your auditors closer: corporations risk waiver
when independent auditors request work product’ (2011) <http://papers.ssrn.com/sol3/
papers.cfm?abstract_id=1929610> accessed 17 December 2013, p. 33.
42
Holm C, Lansted LB and Seehausen J (2012) supra n. 33 at 80; EU Commission, Green
Paper on the Role, Position and Liability of the Statutory Auditor in the European Union (1996).
43
Salehi M and Mansoury A, ‘Firm size, audit regulation and fraud detection: empirical
evidence from Iran’, Management (2009) 4(1): 5–19.
44
American Institute of CPAs (AICPA) (2002) SAS 99 ‘Consideration of Fraud’ issued by
the Auditing Standards Board of the American Institute of CPAS.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
internal and external auditors.45 Furthermore, two characteristics that affect the
opportunity for fraud are organizational structure and management style. Situational
factors such as a perceived low risk of being detected and a perception that upon
conviction the likely penal sanction will be relatively lenient, contribute to fraud. The
incentives and/or pressures may arise due to economic, industry, social or other
conditions that threaten the financial stability of the fraudster. Such pressures could be
the loss of one of the family’s incomes, extra marital affairs placing a strain on
disposable income, gambling, and so on. As argued by Maria Krambia-Kapardis,
‘ultimately a trusted person with an unshareable financial problem who perceives an
opportunity to commit fraud does so as a result of neutralizing verbalisations that make
possible frauds’.46 Auditors are thus asked to keep in mind these three components that
make fraud possible and apply them in fraud detection.
It is evident from studies in many countries, Gary Monroe and David Woodliff in
Australia;47 Mark Epstein and Marshall Geiger in the US,48 Christopher Humphrey,
Peter Moizer and Stuart Turley in the UK49 and Patrick Leung and Gerald Chau in
Hong Kong,50 that financial statement users believe that the auditors ought to have a
primary audit responsibility to detect all irregularities. This has led to the creation of
the expectation gap concept. In this context, Brenda Porter has argued users’ expect-
ations are beyond what is reasonably expected by common law and by the auditing
profession.51
METHODS USED
It must be acknowledged that on the one hand auditors are asked to ‘do everything
possible to prevent material financial statement fraud’ whereas on the other hand the
reality is that ‘auditing is a competitive business, subject to the same demands for
profitability and return on capital, as other businesses’.52 At the same time, as James
Bierstaker, Richard Brody and Carl Pacini point out, entities of all kinds are taking
more and different steps to fight fraud; and, to make things worse, the traditional red
45
Krambia-Kapardis M, Enhancing the Auditor’s Fraud Detection Ability (Peter Lang 2001)
at p. 70.
46
See supra n. 45 at p. 74.
47
Monroe G and Woodliff D, ‘An empirical investigation of the audit expectation gap:
Australian evidence’, Accounting and Finance (1994) 34: 47–74.
48
Epstein M and Geiger M, ‘Investor views of audit assurance: recent evidence of the
expectation gap’, Journal of Accountancy (1994) 177(1): 60–66.
49
Humphrey C, Moizer P and Turley S, ‘The audit expectation gap in Britain: an empirical
investigation’, Accounting and Business Research (1993) 23: 395–411.
50
Leung P and Chau G, ‘The problematic relationship between audit reporting and audit
expectations: some evidence from Hong Kong’, Advances in International Accounting (2001)
14: 181–206.
51
See supra n. 12.
52
Makkawi B and Schick A, ‘Are auditors sensitive enough to fraud?’ Managerial Auditing
Fraud (2003) 18(6): 591–598 at p. 591.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
flags approach is not considered effective,53 because the existence of red flags
represents conditions associated with fraud but does not indicate the presence of
fraud.54 Various techniques for detecting or preventing fraud include: ‘fraud policies,
telephone hot lines, employee reference checks, fraud vulnerability reviews, vendor
contract reviews, and sanctions, analytical reviews, password protection, firewalls,
digital analysis and other forms of software technology and discovery sampling’.55
Others56 suggest a more advanced statistical methodology of integrated fraud risk
factors. James Bierstaker, Richard Brody and Carl Pacini have reported that the most
frequently used techniques are virus protection, firewalls, password protection, internal
control review and improvement whereas the least frequently used are forensic
accountants, digital analysis, staff rotation, employment contracts and data mining.57
Interestingly, the same authors have found that forensic accountants are least often used
to combat fraud (14 per cent) but are rated as most effective. Nowadays, the eclectic
fraud detection model suggested by Maria Krambia-Kapardis in 2001, covering
fraudster characteristics as well as auditor firm and auditor characteristics, appears to
be in need of updating, and a more holistic approach is required if auditors are to detect
fraud.58 A holistic approach would also encompass corruption detection, corporate
social responsibility, corporate governance and ethics.59
Bilal Makkawi and Allen Schick state that there is no consensus on the relevant
significance and value of each auditing procedure in the evaluation of audit risk and the
risk of material misstatement caused by fraud.60 Nowadays auditors are asked to ‘audit
smarter’ since the audit fee is not based on the work done but is rather a fixed fee. A
key point in the detection of fraud is the ‘auditor’s recognition of the signs’ that fraud
exists.61 ‘Auditing smarter means that auditors have to achieve a greater balance
between effectiveness and efficiency’ and in doing so they have ‘greater awareness of
the context in which the audit takes place’.62 In order for the auditors to be effective
and efficient, they need to exercise greater scepticism and perform a better assessment
of management’s integrity; thus, they need to understand the relationship of audit
procedures and audit objectives as well as the likelihood of certain kinds of accounting
frauds in fraud-prone industries.63
53
Bierstaker JL, Brody RG and Pacini C, ‘Accountants’ perceptions regarding fraud
detection and prevention methods’, Managerial Auditing Journal (2006) 21(5): 520–535 at
p. 521.
54
Krambia-Kapardis M, ‘A fraud detection model: a must for auditors’, Journal of Financial
Regulation and Compliance (2002) 10(3): 266–278.
55
See supra n. 53 at p. 523.
56
See, for example, Sitorus T and Scott D, ‘Integrated fraud risk factors and robust
methodology: a review and comment’, International Journal of Auditing (2009) 13: 281–297.
57
See supra n. 53.
58
See supra n. 45.
59
See Krambia-Kapardis M, Preventing Fraud and Corruption: Averting Corporate Col-
lapses and Financial Crisis. (Palgrave Macmillan 2016).
60
See supra n. 52.
61
See supra n. 52.
62
See supra n. 52 at 593.
63
Krambia-Kapardis M and Zopiatis A, ‘Investigating incidents of fraud in small economies:
the case for Cyprus’, Journal of Financial Crime (2010) 17(2) :195–209
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 8 / Date: 9/9
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Brainstorming sessions are used by audit teams to assess fraud risk factors. Joseph
Brazel, Tina Carpenter and Gregory Jenkins have emphasized that tangible benefits can
be derived from higher quality brainstorming.64 The audit team discussion suggested by
ISA 240 and the brainstorming session suggested by Brazel et al. could be a combined
procedure.
The traditional audit risk model has provided a more proactive integrated approach to
preventing and detecting fraud. Hubert Glover and June Aono argued that ‘corporate
culture and industry traits are denoted as interaction terms to parallel the posited
relationship between a client’s business and its respective industry segment’.65 A
corporate culture promoting self-maximizing behaviour encourages the tendency to
manipulate financial information to achieve a personal objective, whereas ‘industry
traits’ refer to the inherent risks, focusing on the nature of the culture of the industry.
‘The interaction of corporate culture and industry traits yields the overall effect of the
client’s management philosophy and the general management style of the industry’.66
Thus, Hubert Glover and June Aono have suggested that auditors ought to carry out a
corporate culture review, including an analysis of the corporate board minutes and
management’s overall philosophy. The auditors ought to also carry out an industry traits
review in an effort to obtain information regarding operational, financial and manage-
rial issues related to specific industries as well as companies. Overall, auditors ought to
change their audit approach from reactive to being more proactive.67
64
Brazel JF, Carpenter TD and Jenkins JG, ‘Auditors use of brainstorming in the consider-
ation of fraud: reports from the field’, Accounting Review (2010) 85(4): 1273–1301.
65
Glover HD and Aono JY, ‘Changing the model for prevention and detection of fraud’,
Managerial Auditing Journal (1995) 10(5): 3–9 at p. 6.
66
See supra n. 65 at p. 7.
67
See supra n. 42.
68
See supra n. 5 at p. 19.
69
See supra n. 5.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
years of inspections of the eight largest accounting firms deficiencies were found that
were attributable to a lack of professional scepticism when performing audit procedures
and performing audit tests.70
Rosemary Fullerton and Cindy Durtschi have reported that ‘auditors who rank higher
on the scepticism scales generally have a significantly greater desire to increase their
information search related to fraud symptoms’.71 The same authors have argued that if
an auditor is more sceptical about the possibility of fraud existing, fraud detection
improves. Whilst training can improve professional scepticism, the same authors have
found that, after training, the differences between high and low scepticism groups were
narrow for several of the personality characteristics. Professional scepticism is affected
by the assessed level of management’s integrity.
Regarding client integrity, studies from Australia,72 New Zealand73 and the United
States74 found that the evaluation of client integrity was perceived by auditors as one of
the most difficult steps in the audit process. Richard Bernardi reported that fraud
detection rates vary according to the position of the auditor vis-à-vis being a senior or
a manager and whether the auditor is experienced or inexperienced in cue selection.75
In addition, Richard Bernardi found that auditors with high moral development are
more sensitive to the client’s integrity ratings.76 However, once auditors develop trust in
a client, this will affect their audit decision and, as Francine McKenna mentioned
above, his/her professional scepticism.
The more suspicious an auditor becomes about a client’s low integrity, the more
sceptical the auditor should be.77 William Kerler and Larry Killough have found that
over time auditors develop trust in a client and this trust will impair their professional
scepticism, since there is a negative relationship between trust and perceived fraud
70
See supra n. 5.
71
Fullerton RR and Durtschi C, ‘The effect of professional scepticism on the fraud detection
skills of internal auditors’, Working Paper Series (2004) <http://papers.ssrn.com/sol3/
papers.cfm?abstract_id=617062> accessed 19 December 2013, at p. 2.
72
Van Peursem KA and Pratt MJ, ‘Difficult and critical auditing procedures: New Zealand
auditor perceptions’, Accounting Forum (1993) 16(4): 43–63.
73
Kelly CF, ‘Auditor’s perception of the audit process’, Unpublished working paper (Deakin
University, Australia 1991).
74
Chow CW, McNamee AH and Plumlee RD, ‘Practitioners perceptions of audit step
difficulty and criticalness: implications for audit research’, Auditing: A Journal of Practice and
Theory (1987) 6(2): 123–133.
75
Bernardi RA, ‘Fraud detection: the effect of client integrity and competence and auditor
cognitive style’, Auditing: A Journal of Practice and Theory (1994a) 13(Supplement): 68–84;
Bernardi RA, ‘Reply to comments on: Fraud detection: the effect of client integrity and
competence and auditor cognitive style’, Auditing: A Journal of Practice and Theory (1994b)
13(Supplement): 97–101.
76
Richard Bernardi (1994a), see supra n. 75.
77
Messier SA, Bernardi RA and Bernard JJ, ‘A review of the impact of client trustworthi-
ness on the audit decision-making process’, Journal of Forensic and Investigative Accounting
(2014) 6(1): 222–247.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
risk.78 They have also found that moral reasoning does not have an effect on trust in
management, whilst auditors who had experience in fraud detection tended to be more
sceptical. Management’s competence and integrity are significantly related to audit
risk.79 When management’s integrity and competence is low, audit risk is decreased as
the auditor’s level of moral development increases. However, when competence is high
and integrity is low, audit risk increases as moral development increases. It has been
found by Philip Beaulieu80 and Samantha Messier, Richard Bernardi and Jeffrey
Bernard81 that auditors respond to risk and management’s integrity by adjusting audit
work; thus at audit planning stage auditors compensate for low client integrity by
extending audit evidence and/or audit fees. Management integrity was also found by
Schroeder and Verreault82 to be an important factor in determining audit withdrawal as
well as prior estimates of the likelihood of fraud existing at the client.83 Jenny Goodwin
found that auditors are less likely to trust evidence from an internal or external source
where they place low integrity on the source provider.84
Interestingly, the external auditor’s role in detecting fraud has become more
complicated and controversial over the years but, in addition, the auditor’s capabilities
have been called into question. Ian Fraser and Chris Pong have questioned whether any
‘independent’ external auditors are capable of auditing effectively the accounting
intricacies of the ‘new’ capitalism, since the ‘complexities involved may be too great
for “outsiders” to grapple with effectively’.85 Auditors are required to communicate
with stakeholders and be involved in ‘dirtier data-processing’, but the auditors’
dependency on the client may create fundamental problems compromising the quality
of auditor independence.86
78
Kerler WA and Killough LN, ‘The effects of satisfaction with a client’s management
during a prior audit engagement, trust, and moral reasoning on auditors perceived risk of
management fraud’ Journal of Business Ethics (2009) 85(2): 109–136.
79
Ponemon LA, ‘The influence of ethical reasoning on auditors perceptions of manage-
ment’s competence and integrity’, Advances in Accounting (1993) 11: 1–29.
80
Beaulieu PR, ‘The effects of judgments of new clients integrity upon risk judgments, audit
evidence, and fees’, Auditing: A Journal of Practice and Theory (2001) 20(2): 85–100.
81
See supra n. 77.
82
Schroeder RG and Verreault K, ‘An empirical analysis of audit withdrawal decisions’,
Advances in Accounting (1987) 5: 205–220.
83
See supra n. 77.
84
Goodwin J, ‘The effects of source integrity and consistency of evidence on auditors
judgments’, Auditing: A Journal of Practice and Theory (1999) 18(2): 1–16.
85
Fraser I and Pong C, ‘The future of the external audit function’, Managerial Auditing
Journal (2009) 24(2): 104–113 at p. 108.
86
Power M, The Audit Society: Rituals of Verification (Oxford: Oxford University Press
1997) at p. 145.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 11 / Date: 9/9
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
87
See supra n. 43.
88
See supra n. 43 at p. 9.
89
DeAngelo LE, ‘Auditor size and audit quality’, Journal of Accounting and Economics
(1981) 3(3): 181–199.
90
Dye R, ‘Auditing standards, legal liability and auditor wealth’, Journal of Political
Economy (1993) 101(5): 887–914.
91
Craswell A, Stokes D and Laughton J, ‘Auditor independence and fee dependence’,
Journal of Accounting and Economics (2002) 33(2): 253–275.
92
See supra n. 85 at p. 104.
93
See supra n. 85 at p. 108.
94
See supra n. 85 at p. 105.
95
See supra n. 86 at p. 145.
96
Khan MA, ‘Role of audit in fighting corruption’, Paper presented for an Ad Hoc Group
Meeting held 26–27 September (St Petersburg, Russia 2006).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
The auditor’s legal responsibilities as prescribed in common law, as far as fraud
detection is concerned, has evolved over the years, but have been kept within
reasonable limits. The auditing profession on the other hand has been extending this
role of detection and it now expects auditors to exercise professional scepticism and be
more proactive in their search of fraud. As far as legislative requirements, Sarbanes-
Oxley does not expect auditors to detect fraud, but to report specific situations and
events relating to fraud and illegal acts. There is no expectation of detecting corruption,
and as stated above, auditors do not have such skills.
Auditors are expected to assess the level of client integrity and base their work on
this assessment. Due to the inherent difficulties created by exogenous and endogenous
factors, auditors nowadays are not equipped to detect fraud. As mentioned above,
auditors need to audit outside the books and to utilize professional scepticism to assess
the honesty and integrity of management as well as identify any opportunities that can
be used by the fraudster to commit a fraud against a corporation. However, as argued
above, because fraud is rare and fraudsters are educated and trusted in the business
environment, auditors do not have the skills and know-how to detect fraud. Bigger audit
firms, due to their size and the higher stake they have to lose should they issue a wrong
audit opinion, appear to resist management pressure and are generally stricter in issuing
opinions.
Mahdi Salehi and Ali Mansoury stated that the ‘dominant reasons for corporate
failure are bad operational and strategic decisions, unanticipated exogenous shocks and
the dysfunctional behaviour of the firm’s executives and employees’.97 External
auditors are not fraud examiners or forensic accountants; they are expected to form an
opinion on the reliability of the internal controls and on the truth and fairness of the
financial statements. As already stated, fraud detection ‘requires unique skills’,98 and
these skills can be found in the work of a forensic accountant and not an external
auditor. Given that ‘auditors appear to encounter corporate fraud only incidentally … it
is difficult for individual auditors to build up expertise in fraud detection’.99 Thus,
financial statement users ought not to be relying on auditors to detect and report fraud
but should instead use forensic accountants for this purpose, unless auditors adopt a
holistic audit approach.
97
See supra n. 43 at p. 16.
98
See supra n. 39 at p. 47.
99
Nicolaescu E, ‘Internal auditors’ role in detecting fraud’, Contemporary Readings in Law
and Social Justice (2013) 5(1): 106–111 at p. 108.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 50 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
This chapter focuses on the definition and scope of the concept of ‘control liability’ and
the application of such liability, as well as the role of ‘compliance’ within financial
institutions, as a tool for combating financial crime. The term ‘compliance’ in this
context is not merely the ‘compliance function’ (as a constituent of an institution’s
wider assurance, regulatory control, prudential and reporting framework), but it also
encapsulates the much broader range of officers, employees, agents, professional
advisers, contractors and counterparties (collectively ‘actors’) whose responsibility
might variously include everyday observance with legal, regulatory and financial
crime-related obligations.
The genesis of this chapter is the growing influence of regulatory risk on the
successful use of traditional ‘control liability’ as a credible ‘stand-alone’ tool in the
battle against financial crime.
The preservation of ‘financial stability’ has taken precedence over cultural and other
behavioural dynamics within institutions. As such, regulatory policy and enforcement is
potentially now acting with material unintended consequences upon the effectiveness of
the ‘control function’. This is arguably undermining the efficacy of holding financial
institutions to account (and more specifically their senior management and ‘compli-
ance’ function) as a principal instrument in the fight against financial crime. The legal
risks of increased personal liability (potentially criminal) now being faced by those
who are mandated to police and in essence have ‘control’ over the detection and
interdiction of financial crime must be aligned with the measured benefits expected by
global prudential policy makers.
The provisions of the US enacted Dodd Frank Act;1 the EU enacted European
Market Infrastructure Regulation;2 Alternative Investment Fund Managers Directive;3
1
Dodd-Frank Wall Street Reform and Consumer Protection Act 2010 124 Stat. 1376, 111
Cong. 2d Sess. (USA).
2
Regulation (EU) No 648/2012 of the European Parliament and of the Council of 4 July
2012 on Over-the-counter (OTC) derivatives, central counterparties and trade repositories [2012]
OJ L201/1.
3
Directive 2011/61/EU of the European Parliament and of the Council of 8 June 2011 on
Alternative Investment Fund Managers and amending Directives 2003/41/EC and 2009/65/EC
and Regulations (EC) No 1060/2009 and (EU) No 1095/2010 [2011] OJ L174/1.
625
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Capital Requirements Directive IV4 and related Regulation;5 and most notably in the
UK, the Financial Services Act 20126 and Financial Services (Banking Reform) Act
20137 have, without doubt, brought about truly blockbuster changes in the conduct of
all business within the global financial services sector: changes that were focused on
market and institutional structures plus prudential reforms.
Criminal misconduct and integrity failings were not, at least at first, identified as
personifying the financial crisis. However, when one looks behind the prudential policy
espoused in consequence of the crisis, one can readily identify within the many enacted
reforms a manifestly increased expectation of individual responsibility, combined
strongly with a demand for cultural amelioration and behavioural ‘control’.
‘Control liability’ is as much a tool in the fight against the external threats from
financial crime as it is about policing threats from ‘inside’. Accordingly, it is
appropriate to appraise the extent to which the newly emergent regulatory landscape
has impacted both institutional and individual attitudes to financial crime obligations.
4
Directive 2013/36/EU of the European Parliament and of the Council of 26 June 2013 on
access to the activity of credit institutions and the prudential supervision of credit institutions
and investment firms, amending Directive 2002/87/EC and repealing Directives 2006/48/EC and
2006/49/EC [2013] OJ L176/338.
5
Regulation (EU) No 575/2013 of the European Parliament and of the Council of 26 June
2013 on prudential requirements for credit institutions and investment firms and amending
Regulation (EU) No 648/2012 [2013] OJ 176/1.
6
Financial Services Act 2012, c. 21 (UK).
7
Financial Services (Banking Reform) Act 2013, c. 33 (UK).
8
There are a plethora of insider dealing cases both in the UK and US. However, these are
often prosecuted under civil and administrative regimes rather than criminal indictments. Indeed,
the recent LIBOR and FX-related prosecutions have focused on market abuse and anti-
competitive practices. See Conduct Costs Project for details of all ‘conduct costs’ incurred by ten
of the largest banks over the period 2008–2014 (http://blogs.lse.ac.uk/conductcosts/), including
those relating to financial crime.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Control liability and compliance: tools for controlling financial crime 627
Control liability and successful compliance functionality relies upon the placing of a
statutory obligation upon a control person. A ‘control person’ is not a new concept.
Liability of ‘controlling persons’ and persons who aid and abet regulatory or other
violations was first introduced in 1934 by section 20 of the US Securities and
Exchange Act.9 The US Securities and Exchange Commission (SEC) defines a ‘control
person’ as an individual or body who possesses, directly or indirectly, ‘the power to
direct or cause the direction of the management and policies of a person, whether
through the ownership of voting securities, by contract, or otherwise’.10 This is,
however, far from universally applied, even within the US. The lack of an agreed
definition has in fact caused concern among commentators11 due to the uncertainty that
such a nebulous concept brings.12 Should, for instance, control liability be imposed by
virtue of an official position or by virtue of a regulatory-mandated control function? It
remains unclear whether ‘status as a director [or say, money laundering reporting
officer] establishes (or should establish) a presumption of control’.13 While a presump-
tion of such would be rebuttable, the legal risk presented by this uncertainty could lead
to protectionist disclosures and, ultimately, undermine the control liability doctrine.
Coupled with the historically effective defence of acting in good faith and/or not
knowingly or recklessly inducing an act of violation, the vagueness and fact-dependent
nature of ‘control’ and ‘culpability’ has, as we explore further below, led to an
ever-increasing focus on the ‘deterrent effect’ of civil enforcement proceedings and on
individual ‘accountability’.
Control liability and compliance obligations must engender (at both an institutional
and individual level) an approach to the threats of financial crime that is focused on
protecting the integrity of the firm, its clients, the financial markets and society. It
should not be premised singularly on an assessment of regulatory risk. There is no
place for regulatory neurosis14 in the scoping of financial crime-related responsibilities.
That said, a certain degree of specificity within the regulatory law is required. This is
9
Securities and Exchange Act 1934 c. 404, § 20(a), 48 Stat. 881 at 899 (codified as
amended at 15 USC § 78t).
10
US Code of Federal Regulations 17 CFR § 230.405 – Definition of Terms.
11
See for example, Erin L. Massey, ‘Control person liability under section 20(a): striking a
balance of interests for plaintiffs and defendants’, 6 Houston Business and Tax Law Journal
(2005) 109–143 for a discussion on the US courts’ approach to ‘control liability’.
12
The International Monetary Fund, in its Financial System Abuse, Financial Crime and
Money Laundering – Background Paper (12 February 2001) at para 9, notes that the reporting of
financial system abuse is complicated by the fact that ‘… no internationally accepted definition
of financial crime exists’.
13
For discussion of the position in the US see Louis Loss, Joel Seligman and Troy Parades,
Fundamentals of Securities Regulation (6th ed., New York, Wolters Kluwer Law & Business,
2011) 607–623.
14
For a discussion on the meaning and application of ‘regulatory neurosis’ in the context of
bank conduct, culture and responsibility, see Roger McCormick and Chris Stears, ‘Banks:
conduct costs, cultural issues and steps towards professionalism’, 8 Law and Financial Markets
Review (2014) 134–144.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
not only in an attempt to fill the evidential gaps in respect of facilitator liability left by
the criminal law but to also set reasonable expectations for governance, risk manage-
ment and operational compliance on financial institutions, given their collective and
vital importance in combating financial crime.
15
Financial Services and Markets Act 2000, c. 8 (UK) as amended by the Financial Services
Act 2012, c. 21 (UK).
16
s. 1H(3) Financial Services and Markets Act 2000, c. 8 (UK), as amended by the Financial
Services Act 2012, c. 21 (UK).
17
See s. 52 Criminal Justice Act 1993, c. 36 (UK).
18
Proceeds of Crime Act 2002, c. 29 (UK) as amended by the Serious Organised Crime and
Police Act 2005, c. 15 (UK).
19
The Money Laundering Regulations 2007, SI 2007/2157 (UK).
20
Financial Conduct Authority (FCA) Handbook, PRIN 2.1.1 R.
21
FCA Handbook, SYSC 6.1.1 R and see also, SYSC 6.3: Financial Crime.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Control liability and compliance: tools for controlling financial crime 629
Notably, financial institutions have not only the obligation to report money launder-
ing knowledge or suspicion,22 they must report to the regulator where a firm knows,
suspects or has reasonable grounds for suspicion that a transaction involves market
abuse.23 Given that ‘insider dealing’ will produce criminal property, the POCA will also
require a report to the National Crime Agency in tandem with that filed with the
regulator.
The regulatory system places obligations on so-called approved persons24 to act, inter
alia, with integrity, to observe proper standards of market conduct and deal with the
regulator(s) in an open and cooperative way.25 Furthermore, such ‘approved persons’
‘must take reasonable steps to ensure that the business of the firm for which he/she is
responsible [i.e. within that person’s accountable function], is organised so that it can
be controlled effectively’.26 What is deemed effective ‘control’ is a matter for the firm
to assess, although ultimately, much depends on the ‘expectations’ and enforcement
practices of the regulator(s).
A) Institutional Risk
Research undertaken by the Conduct Costs Project illustrates the immediate financial
consequences of regulatory enforcement of control liability:
22
See Regulation 20(1)(b) Money Laundering Regulations 2007, SI2007/2157, FCA Hand-
book, SYSC 6 and requirements of ss. 330/331 Proceeds of Crime Act 2002, c. 29. See R v Da
Silva [2007] 1 WLR 303 for the accepted test of ‘suspicion’.
23
FCA Handbook, SUP 15.10.2 & 3 R and SUP 15.10.4 G.
24
Being a person in relation to whom the regulator has given its approval under s. 59
Financial Services and Markets Act 2000, c. 8 (UK) for the performance of a controlled
function; see also FCA Handbook, SUP 10.A. The Statements of Principle for Approved Persons
are espoused under authority provided by s. 64 of FSMA 2000.
25
FCA Handbook, APER 2.1A.1 G and APER 2.1A.3 P.
26
FCA Handbook, APER 2.1A.3 P: Statement of Principle 5.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Note: Amounts in millions of GBP; sample consists of ten internationally active banks; see website for
underlying data and notes of interpretation.
Source: Conduct Cost Project, 2014 (http://blogs.lse.ac.uk/conductcosts/).
27
Being GBP157.43 billion, see http://blogs.lse.ac.uk/conductcosts/files/2014/07/CCP4-
Summary-Table-and-Results.pdf for the Project results and http://blogs.lse.ac.uk/conductcosts/
2014/01/13/conduct-costs-definition-and-reporting-issues/ for the Project’s working definition of
‘conduct costs’.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Control liability and compliance: tools for controlling financial crime 631
sign a Deferred Prosecution Agreement (DPA)28 for violations of the US Bank Secrecy
Act, the Trading with the Enemy Act and assorted other offences. This in effect placed
the bank on ‘criminal probation’. The reality, however, is that had HSBC been formally
indicted for these ‘crimes’, and likewise many other institutions who fell foul of the
law, the US government could no longer have conducted business with it – which
would have been highly damaging to the global market place. The US regulators hit as
hard as they could ‘civilly’, but they were unable or unwilling to go further in spite of
public outcry for fear of destabilising the very banking system that they seek to police
and protect.
Institutions should, of course, reasonably face liability where they fail to meet their
obligations. However, such liability can only ever be effective when, and if, it is
uniformly and fairly applied by regulators across all market participants, without
exception and without political bias. The Financial Services Authority (FSA), for
instance, was heavily criticised in respect of its supervision and review of RBS29 and,
later, its reliance on confidentiality protections in justifying its refusal to disclose its
findings.30 Likewise, the Parliamentary Commission on Banking Standards, when
commenting on the collapse of HBOS, concluded that the ‘FSA was not so much the
dog that did not bark as a dog barking up the wrong tree’.31
Regulatory ineptitude has on occasion been matched with what might be viewed as a
degree of overreach. Take for example the potential ‘control liability’ in tax matters.
The reporting with respect to the crime of tax evasion is now also in the process of
being added to the list of ‘gatekeeper’ duties of financial institutions, although a very
grey line is emerging. Tax evasion is a financial crime in most jurisdictions but tax
avoidance schemes, through which large volumes of funds are capable of being
processed to legally avoid assessment, are not. Such schemes are, at worst, morally
questionable. However, they are being increasingly targeted by governments who are
able to infer a ‘conspiracy to evade taxation’ as sufficient grounds for disclosure by
facilitating financial institutions. This places institutions at risk should a scheme,
subsequently proven to be wholly lawful, result in an action for damages by the
scheme’s beneficiaries or advisers.
The point here is that in the pursuit of its statutory objectives of maintaining market
integrity – thus imposing liability for financial crime-related failings – regulators must
secure a consistent and predictable approach to overseeing (and enforcing) the control
framework. A failure to strike this balance will lead to the unintended consequences of
a regulatory-risk-focused approach to control liability and to costly protectionist
reporting practices.
28
See, USA v HSBC Bank USA, N.A. and HSBC Holdings Plc, United States District Court,
Eastern District of New York, Cr. No. 12-763, Deferred Prosecution Agreement, dated 10
December 2012, available at http://www.justice.gov/opa/documents/hsbc/dpa-executed.pdf.
29
See HC Treasury Committee, The FSA’s Report into the Failure of RBS, Fifth Report of
Session 2012–2013 (19 October 2012) HC 640.
30
Ibid, para 1. See s. 348 of FSMA 2000 for reference to the confidentiality obligations
placed on the regulator.
31
Parliamentary Commission on Banking Standards, ‘An Accident Waiting to Happen’: The
Failure of HBOS, Fourth Report of Session 2012–2013 (4 April 2013) HL Paper 144, HC 705 at
para 84.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 7 / Date: 9/9
JOBNAME: Rider PAGE: 8 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
32
See supra, n 10.
33
[2012] EWHC 1283 (QB).
34
SEC v Theodore W. Urban, Securities Exchange Act Rel. No. 66259 (26 January 2012),
Admin. Proc. File No. 3-13655.
35
SEC v Theodore W. Urban, Initial Dec. Rel. No. 402 (8 September 2010), 99 SEC Docket
3215 at 52, citing John H. Gutfreund, 51 SEC 93 (1992) at 108.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Control liability and compliance: tools for controlling financial crime 633
The key to efficiencies in interdiction by the financial sector is at the ‘individual’ level.
Regulatory risk must be such that it instils a sense of ‘ownership’ and responsibility for
combating the financial crime threat: it must apply equal weight to ethical practices as
it does to the cost/benefit of enforcement. A culture that supports ‘whistleblowing’ for
instance would embody an ethically centric approach to financial crime obligations.
Individuals must have faith in the integrity of such policies and therefore the absence
of undue regulatory risk. However, as the SEC case against Ray Dirks illustrates,
regulatory risk can prevail. Although Dirks acted in the public interest by revealing a
36
FSA Final Notice, David Davis (5 July 2012), FSA Ref No. DTD01011 paras 6–18.
37
FSA Final Notice, Alexander Ten-Holter (26 January 2012) paras 2.4 & 2.5.
38
FSA Final Notice, Darren Morton (6 October 2009) paras 6.10–6.12.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
fraud, he was indicted by the SEC and convicted for ‘insider trading’. On appeal to the
US Supreme Court, the conviction was overturned on, inter alia, the premise that the
offence required a breach of fiduciary duty and an intention (not necessarily on the part
of the insider) to benefit from that breach.39 This ‘fraud theory’ of insider trading
remains good law in the US. However, this conflicts with the view of the SEC and the
position in the EU, namely that anti-fraud provisions ‘require equal information among
all traders’40 and that maintaining an orderly market is paramount. This conflict
exemplifies the unavoidable regulatory risk faced by ‘control persons’. One might
argue that the SEC’s approach places greater weight on the effects on ‘the market’
rather than establishing truth and fairness and an adherence to what is ethically correct.
On the other hand, a recent global survey conducted by the Economist Intelligence
Unit found that although most firms have embarked on heavy duty internal programmes
to enhance ethical conduct, 53 per cent of financial services executives say that
adhering to ethical standards will inhibit career progression at their firms.41 The
regulator would no longer countenance such a reality.42
Indeed, legislative reaction to the perceived inadequacies of the criminal law has
given rise to yet further regulatory risk. Section 36 of the Financial Services (Banking
Reform) Act 2013 imposes criminal liability on senior managers whose reckless action
(or inaction) causes the failure of the institution. Regardless of how well intended, the
practicalities of prosecuting this ‘control liability’ is considered questionable. This is
because there exist definitional issues (including ‘implied responsibility’ by delegated
authority) that are likely to create much interpretive debate and thus legal risk. Equally,
the growing use of ‘regulatory attestations’ is presenting some concern. Commentators
have observed that:
[a]though not specifically required by the regulatory regime, individuals are [being] asked to
confirm that the internal measures for which they are responsible are adequate and in
compliance with FCA rules. Its potential use as an enforcement tool, it is argued, will cause
senior management to take greater responsibility for the operational realities of the firm.
While (even a cognitive perception of) greater accountability through attestations must be
welcomed, there may be unintended consequences. They may simply reinforce the preoccu-
pation with regulatory compliance rather than tackling the root causes of misconduct and
seeking to place ‘good conduct’ at the centre of the bank’s business models. This is, in fact,
the approach regulators expect of firms.43
39
Dirks v SEC 463 US 646 (1983), cited in John Kay, ‘Do not criminalise traders just for
being in the know’, Financial Times (4 February 2014).
40
Ibid at 463 US 657.
41
The Economist Intelligence Unit, A Crisis of Culture: Valuing Ethics and Knowledge in
Financial Services (2013) at 9.
42
See Martin Wheatley, FCA, ‘The fairness challenge’, Mansion House Speech (24 October
2013).
43
Roger McCormick and Chris Stears, ‘Banks: conduct costs, cultural issues and steps
towards professionalism’, 8 Law and Financial Markets Review (2014) 134–144 at 141.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Control liability and compliance: tools for controlling financial crime 635
reinforce a real ‘ownership’ of risk that will bolster the efficacy of utilising financial
institutions in policing financial crime.
In truth, regulators across the globe were ‘caught out of their depth’ by the scale and
complexity of financial product engineering, the implications of global credit expan-
sionism, the financial market drivers and other socio economic conditions that preceded
the 2008 crash. This was aggravated by a lack of understanding of the changing nature
of financial crime since 9/11, 2001 and the absence of a public–private information
exchange necessary to manage the same. Policy mistakes, market mis-readings, lack of
‘relevant reporting’ of key information and inadequate regulation bears a large measure
of responsibility for the crisis and for the financial crimes subsequently discovered.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
The key ingredient to a real success in dealing with the roots of financial crime is not
just a highly resourced and professional compliance function but a workable partner-
ship between public (government and regulators) and private parties – and realistic
expectations. Having a ‘best in class’ legal and compliance function, while essential in
order to ‘protect’ the institution, is not of itself sufficient to identify all potentially ‘bad
apples’. The public and private sector rely on separate bodies of intelligence in order to
combat crime, and the bringing together of such sources is often prohibited by Data
Protection and other source protection issues. Stuart Levey, HSBC’s chief legal officer,
illustrated the point when he stated that the private sector reports potentially nefarious
conduct to the government through methods like ‘suspicious activity reports’, but has
no understanding of ‘the illicit conduct government is most concerned about and its
assessment of who may be engaged in that conduct. The reporting would be enhanced
if there were a greater understanding [by institutions] of the government’s concerns.’44
CONCLUSION
The unprecedented scale of enactments now swamping the financial services industry
represents a unified response to rightly perceived systemic weaknesses, cultural
malaise, fundamental risk assessment, and management errors and acts of financial
criminality. However, (re)establishing ‘best practice’ competence among persons work-
ing in the financial services sector requires a cultural revolution – not regulatory
mandate. But, this should not be limited to inappropriate sales incentives or poor
customer outcomes. While the regulatory focus on outcomes is an important one, it is
not given due regard in the context of facilitator liability for failures in financial crime
prevention.
It is this author’s view that regulation should underpin and facilitate, but not embody,
the manner of approach to financial crime threats. Responsibility for financial crime
prevention is not a duty to a third party that must be discharged, but the recognition
that the institution (and the individual) has an economic, reputational and ethical
responsibility to root out financial crime. We need regulation/regulators to adopt an
approach that does not engender regulatory neurosis. We need financial institutions
(and those individuals charged with policing the integrity of the financial markets) to
take ownership of the financial crime risk for themselves and not as a means of
managing regulatory risk. We need a complementing ethically centric culture of
professional pride and impeccable behaviour. This must, in turn, be endemic to the
institution and manifested in its governance arrangements, systems and controls and
whistleblowing policies and protections.
Much debate has focused on the perceived evidential hurdles in bringing criminal
prosecutions against institutions (and/or individuals) that have failed in their duty to
combat financial crime, the immediate criticism being of the integrity failings at the
point of most likely interdiction – i.e. the financial institution – and the response: to
mete out fines of ever-increasing severity. While this is a virtuous and necessary
44
Rachel Ensign, ‘HSBC’s top lawyer on what banks need to spot “truly bad actors”’, WSJ
Risk & Compliance Journal (11 June 2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 13 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
Control liability and compliance: tools for controlling financial crime 637
endeavour, focusing on more regulation and providing prosecutors with further tools to
exact punishment (DPAs, regulatory attestations and the like) has caused policy makers
to miss a vital issue and, perversely, risks undermining the efficacy of ‘control liability’
as a necessary tool in combating financial crime. A holistic view of the institutional
(and/or individual) response to financial crime responsibilities should not simply be
measured as a function of the firm’s ‘compliance’ profile. Rather, one must account for
the impact of regulatory ‘expectation’ and enforcement practice on the discharge of
‘control’ duties. This is the axiom of this chapter.
Regulatory ‘direction’, together with enforcement of control liability and compliance
failings, needs to be met with reasoned policy objectives. Duty must meet with
‘expectation’. ‘Expectation’ must be communicated. In short, education and an enlight-
ened ‘awareness’ are therefore essential if one is to drive up the efficiencies of the
unassuming policemen of the financial sector.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 51 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Far-reaching changes need to be made in the way law enforcement agencies access
intelligence and disrupt crime because cyberspace means that the traditional approach
that has served so well for more than 40 years is no longer fit for purpose.
Since the early 1970s, ‘intelligence led policing’ and Problem Oriented Policing
(POP) have provided the model for tackling criminality in most western countries. The
problem is that these models rely on the localized nature of the relationship between
the victim, the location and the offender.1
The development of the internet and the ability of criminals to commit crime from
great distances, often beyond the jurisdiction of the victim and local law enforcement
agencies, are testing the traditional model of combating crime.
This development has major implications for the way law enforcement agencies
address all types of environmental and situational crime including economic crime. The
growing reliance by society on the ‘internet of things’2 world is arguably having a
greater impact on less tangible concepts like economic crime than on ‘real world’
property or location crimes such as robbery or burglary.
Moreover, the increased societal use of the internet has much wider implications that
significantly challenge sovereign nations and governments as their laws prove to be
inadequate for making timely interventions against criminals or for allowing disruption
to their activities online.
To be more effective:
1
Leigh, A., Read, T. and Tilley, N., (1996), Problem Oriented Policing: Brit POP, London:
Home Office.
2
Refers to the interconnection of uniquely identifiable embedded computing. The intercon-
nection of these embedded devices (including smart objects) is expected to usher in automation
in nearly all fields, while also enabling advanced applications like a Smart Grid. Höller, J.,
Tsiatsis, V., Mulligan, C., Karnouskos, S., Avesand, S. and Boyle, D., (2014) From Machine-to-
Machine to the Internet of Things: Introduction to a New Age of Intelligence, Oxford: Elsevier.
638
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
It will be far from easy to get a consensus between governments and to persuade law
enforcement agencies to change an approach that has served them so well for so long.
All British police forces place Local Intelligence Officers (LIOs), at the heart of the
collection of intelligence to drive operations at the Basic Command Unit (BCU) level.
This approach feeds into a Force Intelligence Bureau (FIB), and prioritization of
resources is driven through the use of the National Intelligence Model (NIM).
But the need for change is illustrated by comparing the figures on armed robbery
with economic theft and fraud online. The British Bankers’ Association (BBA) reported
in December 2013 that in 2011 there were 66 armed robberies against banks and other
financial institutions in the UK, compared to 847 in 1992.3 In the same period online
financial crime has increased massively.
Fraud, which hits individuals, the public and private sectors, costs the UK £73 billion
each year4 and is increasingly conducted online. Some 40 per cent of crimes reported to
Action Fraud in 2012 were committed online, with criminals taking advantage of the
vulnerabilities of online services and their users.
The use of the internet makes crime possible on a significant scale: a single
‘phishing’ email (an email where the sender purports to be a trustworthy entity to
secure financial or other details) can target very large numbers of people and is often
used by criminals based overseas or making use of overseas IT infrastructure.
3
www.bbc.co.uk/news/technology-25526671, accessed 16 July 2014.
4
National Fraud Authority (2013), Annual Fraud Indicator, www.gov.uk/government/up
loads/system/uploads/attachment_data/file/206552/nfa-annual-fraud-indicator-2013.pdf, accessed
July 2014.
5
Brantingham, P. J. and Brantingham, P. L. (1991), Environmental Criminology, Prospect
Heights, IL: Waveland Press.
6
Cornish, D. B. and Clarke, R. V. (1987), ‘Understanding crime displacement: An
application of rational crime theory’, Criminology, 25: 933–948. Doi: 10.1111/j.1745-9125.
1987.tb00826.x.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 2 / Date: 31/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
features of the offender and features of the location; they form a linked paradigm
which, if interrupted on any of the three vectors, will cause a crime to fail.
The POP model suggests that there must be a motivated offender who has come to
the same location as an attractive target. For property crimes the target is an object and
for personal crimes a human being. So, if the target is not in the same place as a
motivated offender, there will be no crime.
The model is further supported by ‘controllers’, whose presence can also prevent or
disrupt crime. These controllers fall into three broad categories that map against the
features of victims, locations and offenders.
Offenders often have ‘handlers’, who have some control over their behaviour, and
would include parents, relatives, siblings, peers and teachers.
Victims have ‘guardians’, who seek to protect them from attack and targets of theft
or damage. Formal examples include the police, neighbourhood watch, neighbours and
security patrols. They are close to a victim or target and will act in a formal (police) or
informal (neighbours) role to reduce the likelihood of a crime.
Locations and places usually have owners or ‘managers’ with a vested interest in
controlling or regulating security. There can be an overlap between the roles of
handlers and guardians as security to guard a site will act in a guardian role. Similarly,
other owners or neighbours who have a communal interest in protecting locations will
have a wider manager effect beyond their own location. For instance, a block of small
commercial units in an enclosed space may share security and control of the wider
area; or a car park attendant will protect many individual cars to the benefit of many.
The POP approach emphasizes the dependencies between victim location/places and
offenders. The theory infers that a crime cannot occur when one of these elements is
missing. The second level ‘controllers’ supports the theory that even where victim,
location and offender are present, the chances of disrupting a crime in the physical
environment is greatly increased by active involvement of one or more of those
controllers.
All these elements have traditionally provided good sources for collecting the
intelligence needed to detect and disrupt crime. Guardians will note descriptions,
vehicle numbers and the names of offenders. Handlers may inform on the criminal to
help disrupt their criminal activity. Managers use closed-circuit television (CCTV) to
provide intelligence and evidence to identify offenders.
Good intelligence remains at the heart of effective crime disruption and has
traditionally been carried out by local collection of intelligence from citizens, victims,
forensic examination of crime scenes and building networks of informers in the
criminal world, to give context and specific information about local crimes.
The Brantinghams’ model provided a solid approach to collecting this intelligence
through contact with victims. Several studies conclude that property crime, including
burglary, theft and shoplifting, are often committed by offenders within a two mile
radius of their homes.7 Local intelligence has therefore been a vital part of operations
which have focused on catching and prosecuting the offender.
7
http://www.popcenter.org/learning/60steps/index.cfm?stepNum=16, accessed July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
8
Section 419 of the Nigerian Penal Code that deals with advance fee fraud.
9
Association of Chief Police Officers, UK.
10
UN Office on Drugs and Crime (UNODC) (2011), Estimating Illicit Financial Flows
Resulting from Drug Trafficking and other Transnational Organised Crimes, www.unodc.org/
documents/data-and-analysis/Studies/Illicit financial_flows_2011_web.pdf, accessed 15 July
2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
There is also strong evidence that ‘new’ crimes such as phishing and Trojans are
being used as a way to obtain sensitive financial and identity information, which
provide the information that is essential for committing ‘old’ crimes such as insurance
and mortgage fraud and thefts against individuals and the global banking system.
Organized crime groups are also engaged in intellectual property crime, including the
supply of counterfeit medicines and electrical goods, while increasing numbers are
involved in stocks and derivative market abuse.
The number, sophistication and impact of cybercriminals continue to grow. Whether
for financial gain or just to cause disruption of services, threats evolve to frustrate
network security defences, and many business and home computers fail to keep what
protection they have up to date. ‘Hacking’ has become an increasingly mature
marketplace where technical skills and data can be purchased by criminal groups to
carry out specific attacks.
In 2008, more than 55,000 phishing website hosts were detected, a 66 per cent
increase on the previous year. In the same period, spam detected across the internet
grew by 192 per cent, from 119.6 billion messages to 349.6 billion. In 2008, bot
networks were responsible for distributing about 90 per cent of all spam email.
Criminals are developing their own sophisticated tools, but also use legitimate or
publicly available software, such as peer to peer and social networking to network and
to share files and illegal images.11 The trend therefore is for the threat to internet
security and the opportunity for crime to continue growing.
The interconnectedness of citizens on social media such as Facebook and Twitter
provides a rich source for cybercriminals to infiltrate larger groups at a single hit.
Additionally, the growing use of anonymous services such as TOR12 makes the
identification of offenders and collection of intelligence increasingly difficult.
This annual growth of threat and impact suggests that the environmental crime
operational model is no longer a viable option. Indeed, the biggest crime fighting
organization in the western world has re-evaluated its mission approach. In April 2014,
the new director of the US Federal Bureau of Investigation (FBI), James Comey, told
the RSA Conference in San Francisco that for him cybercrime was a bigger priority
than terrorism. His agents are moving to a more proactive stance against online crime.
He said that ‘… agents will shift from a reactive mode into a more forward-looking
approach when tackling internet criminals, by offering services with fast response times
you’d expect from computers rather than their slower human builders’ (Comey J, April
2014).
The FBI has acknowledged the need for timely and effective intelligence collection
to disrupt activity online and has built a database of malware samples, Binary Analysis,
Characterization, and Storage System (BACSS), for its investigators to offer services to
ensure faster response to identified malware and attacks.
Effective and timely intelligence is still at the heart of this approach, and the very
nature of the crimes and the modus operandi being used means that traditional
11
Home Office (2010), UK National Cyber Crime Strategy, HMSO, paras 32–33.
12
Anonymized internet access referred to as ‘The Onion Router’ (TOR). TOR is free
software and an open network designed to defend against traffic analysis and identification by
state security or law enforcement.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
intelligence collection from forensic, crime scene analysis and local intelligence is fast
being replaced by effective analysts with good online skills and capability for early
identification of denial of service attacks and theft of personal data that could be used
for traditional theft or fraud later.
The approach of the FBI suggests that disruption and prevention are more important
in tackling online criminality than conventional reactive investigations leading to the
arrest of an offender after the event. This shift in approach, which is being replicated in
many other countries, is recognition in part of the multi-jurisdictional issues and
complexity of chasing criminals to ground across international borders.
However, there is a problem in building a consensus between governments. Com-
pare, for example, the following comments. The US State department says it has
advanced U.S. initiatives to preserve the open Internet and promoted the worldwide
deployment of broadband communications through the World Telecommunication Policy
Forum. We are an active member in the Freedom Online Coalition, a forum for like-minded
governments – over 20 and growing – committed to collaborating to advance Internet
freedom. This has provided us and others an opportunity to coordinate efforts and work with
civil society to support the ability for individuals to exercise their universal human rights and
fundamental freedoms online.13
In contrast, the UK Home Office Cyber Crime Strategy of 2010 seems to advocate a
more robust and regulatory approach when it says it
believes that actions should be legal or illegal according to their merits, rather than the
medium used, so that what is illegal offline should be illegal online. The Home Office
believes that the internet and other communication technologies are the conduit for the
criminal activity for such groups, rather than being the cause. We are committed to ensuring
that where additional legislative or regulatory tools are appropriate to tackle cybercrimes
these are introduced swiftly and effectively.14
13
US Department of State public website, ‘Internet Freedom’, http://www.state.gov/e/eb/cip/
netfreedom/index.htm, accessed July 2014.
14
Home Office (2010), UK Cyber Crime Strategy, HMSO, para 27, page 9.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 6 / Date: 31/7
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
to and through jurisdictions where lower standards exist, presenting the cybercriminal
with enhanced opportunities to avoid detection, prosecution and imprisonment.
If governments and law enforcement agencies are to regain the initiative, there will
have to be changes in the environmental crime model. It is also clear that the POP
model is not an answer because it presumes that in most if not all cases the victim,
place/location and offender are closely spatially located and can be dealt with in one
jurisdiction.
MLATs have traditionally been reserved for obtaining witness statements, seeking
disclosure of banking or other documents which are usually out of reach of the offender
who consequently cannot lose, alter or destroy them. However, with the three vectors
postulated in the problem triangle now widely distributed across international borders
and the offender controlling the evidence on his or her personal computer, it is no
longer possible to make this assumption of spatial co-location and MLATs become too
slow and ineffective.
A different approach is needed even where the offender can be identified – in these
cases, obtaining the evidence or recovering stolen assets becomes more complex in an
online cross jurisdictional crime.
For example, two Russian hackers, Vasily Gorshkov and Alexey Ivanov,15 were
detained in the US in 2000 but the evidence and assets were held in Russia. In this
case, the FBI used covertly obtained passwords to access computers in Russia from the
US and extracted data and evidence. This active online approach seems to indicate that
a MLAT was seen as not feasible given the relations between the US and Russia, or
more likely that the use of a MLAT was seen as too bureaucratic and slow to meet
operational need.
Despite arguments in the US courts that this approach breached the constitutional
rights of the defendants, the actions of the FBI were upheld. A second defence claiming
that the FBI had broken Russian law was also dismissed by the court on the grounds
that Russian law had no application in the US. The court also ruled that even in the
event it had applied, the agents had acted correctly and ‘complied sufficiently’.
The Russian government responded by issuing arrest warrants for the two FBI
agents. Though these were never followed up or carried out, it demonstrates the high
level of concern and feeling when one nation ‘invades’ the territory of another even at
the virtual level.
Faced with these difficulties, law enforcement agencies are expanding their concept
of disruption to consider more active operations upstream or online to attack offenders
– with many offenders resident in states which offer no, or poor co-operation with other
countries, this kind of intelligence led disruption operation becomes cost effective and
timely.
Countries are making efforts to work together to recognize the growth in the use of
the internet not just as a source for good but also as increasing opportunities for
criminality and harm to nations.
The Convention on Cybercrime, also referred to as the ‘Budapest Convention,’ first
considered these issues in 2001. It seeks to build co-operation between member states:
as of March 2014, 42 countries have ratified this convention with another 11 countries
15
United States v Gorshkov, 2001 WL 1024026 U.S. Dist. LEXIS 26306 (WD Wash 2001).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 7 / Date: 9/9
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
having signed but not yet ratified it in domestic law. This convention seems to be a
positive step but it stops short of authorizing states to operate independently across
borders and still seeks to rely on mutual co-operation.
Several other nations have responded to the increase of online crime and the
ineffectiveness of MLAT processes to assist in a timely manner; they have passed laws
that provide protection from criminal liability to certain law enforcement agencies for
computer related acts done outside their own country. Australia for instance, has a law
that allows federal police to carry out online operations.16
Canada views international collaboration as an essential way of securing cyberspace
and acknowledges the benefit from being seen as a trusted partner in this area. It
supports international efforts to develop and implement a global cyber-governance
regime that will enhance security. The Canadian government plans to develop a
cybersecurity foreign policy.
The US International Strategy for Cyberspace (2011) aims to unify its engagement
with international partners on the full range of cyber issues and to ensure that partners
at home and abroad understand the priorities and how this can be used to reduce the
threats from criminal or military action in cyberspace.
The UK took the lead in a multilateral dialogue with the 2011 London Conference
on Cyberspace and promotes the adoption of international norms of behaviour in
cyberspace. The development of a cohesive UK cyber defence strategy has also helped
to co-ordinate the collection and understanding of emerging threats, whether they are
state sponsored, individual’s intent on crime or organized or sophisticated crime groups
seeking to attack the private and public purses.
This approach allows law enforcement agencies to share intelligence that was
previously the domain of intelligence agencies or the military. However, while they
now have a better intelligence picture, it is unclear how they can tackle criminals and
disrupt them online.
The Computer Misuse Act 1990 in the UK sets out to prevent computer crime in
three categories: unauthorized access to computer material, unauthorized access with
intent to commit or facilitate commission of further offences and unauthorized
modification of computer material.
Unfortunately, these very clauses also prevent law enforcement agencies from
undertaking online disruption operations themselves, as the Computer Misuse Act
makes such activity illegal.
Providing strong network defences and educating potential victims on how they can
protect themselves from online criminality has some value, but maintaining a defensive
line at the victim or location vector allows the offender to act with relative impunity
from his or her own part of the world and target many thousands of people at one time.
Inevitably, they will find a less well-protected victim to exploit and this merely
displaces crime as offenders move to those less well-protected regimes or networks.
Most strategies stress the need for better alliances and partnerships with like-minded
countries or allies, including the capacity building of less developed countries. They
identify with the role of international organizations such as the Council of Europe, the
16
Criminal Code Act 1995, No 12 (Cth), at 476.5, ‘Liability for certain acts’ includes Secret
Intelligence Service and Australian Signals Directorate.’
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
G7, the Internet Governance Forum, the Organisation for Economic Co-operation and
Development (OECD), the Organization for Security and Co-operation in Europe
(OSCE), and the United Nations, but they provide little detail as to the role that each
organization plays or should play and how to ensure consistency across them. The
North Atlantic Treaty Organization (NATO) is also mentioned by several countries with
respect to cybersecurity in the military context (Canada, Finland, Germany, the
Netherlands, Spain and the UK). The European Union is referred to by European
countries. Spain and Germany also indicate a possible extension of the role of the
European Network and Information Security Agency (ENISA). As one sets the scale of
the problem posed by internet crime alongside the international and national measures
taken to address them thus far, it becomes clear that there is a compelling need to
enhance considerably the ability of law enforcement agencies to operate across borders.
Failure to do so will make it much harder to meet the challenge of criminal groups
which, motivated by financial gain, seek to exploit their entrepreneurial skills gained in
the ‘real’ world to maximize the benefits from digital crime in the virtual world.
CONCLUSION
The emphasis of effort to date appears to be towards better collaborative working and
defence for systems and potential victims. This, however, is not enough. There has to
be a wider acceptance that states should take an intelligence led approach including
online action to disrupt offenders, regardless of their geographical location. The
example of the FBI taking direct action and being supported by their courts is
indicative of this, as is Australia’s legislation which recognizes that sometimes law
enforcement officers need to take direct action.
The ambition should be to develop new national and international strategies that
create a system that achieves the right balance between helping drive economic and
social prosperity, respecting the openness of the internet and protecting cyberspace-
reliant societies against cyber-threats.
This strategy will be unbalanced if it does not include effective protocols and policies
that will allow, in specific circumstances, law enforcement officers to take action across
borders to disrupt and prevent crime as well as being able to secure evidence to support
traditional enforcement and prosecution of offenders.
If we do not find a way of defining this new balance and ensure that law enforcement
agencies can fight cybercriminals, the risk to citizens will continue to grow as our
dependency on the internet for critical and economic services increases.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 52 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
53. Extradition
Colin Wells and Emma Stuart-Smith
WHAT IS EXTRADITION?
Extradition is the legal process for returning a person to the jurisdiction of a foreign
state, at the request of that state (“the requesting state”). They may be requested to
return only for the purpose of criminal prosecution or for sentencing or the execution
of sentence. They cannot be returned for the purpose of investigation.
It is different to deportation which is the process by which a country removes the
person from within the state.
Extradition is a crucial process in the combating of crime, and in particular serious
and organised crime, on an international level and through international judicial
cooperation. It serves to ensure that a person cannot escape justice by leaving a
country. The law also serves to protect those whose extradition is sought in such
circumstances where they would suffer injustice or oppression.1
In this chapter we will provide a concise overview of the law of extradition and the
basis upon which someone may oppose extradition. We also focus upon the key
principles that lie at the heart of extradition law and have particular importance to
international financial crime. Due to the complexity of this area of law, it is impossible
to provide a comprehensive overview in this text. Of particular note, we do not deal
with procedural issues, abuse of process, bar by reason of earlier extradition to the UK2
or cases where someone is charged with an offence in this jurisdiction or serving a
sentence in this jurisdiction. Therefore the reader will need to make direct reference to
the primary legislation and specialist texts if representing someone facing extradition
proceedings.
1
As per Lord Bingham, Knowles v Government of USA [2006] UKPC 38, para.12.
2
S.18, 19 and 96 EA 03.
3
Of the Council of the European Union, 13.6.02.
4
Extradition Act 2003 (Designation of Part 1 Territories) Order 2003 S.I. 2003/3333 as
amended.
647
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
territories,5 those territories which the UK has bilateral treaty arrangements with, is
dealt with in Part 2 of the Act.
Part 3 of the EA 03 deals with extradition to the UK from category 1 territories.
Extradition requests from category 2 countries to the UK are made under the Royal
Prerogative.
BARS TO EXTRADITION
The EA 03 sets out the bars to extradition, which if made out, must result in the
discharge of the extradition request.7
Double jeopardy:8 the principle of double jeopardy prevents a person from being
prosecuted twice for the same offence in different jurisdictions. Therefore a person’s
5
Extradition Act 2003 (Designation of Part 2 Territories) Order 2003 S.I. 2003/3334 as
amended.
6
S.2(2) EA 03 and s.70(4) EA 03.
7
S.11–19A (category 1 territories) and s.79–83A (category 2 territories).
8
S.12 and s.80 EA 03.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Extradition 649
extradition is barred if it would violate the rule against double jeopardy, in other words,
if the person has already been acquitted or convicted of the same offence as the
extradition request.
Absence of a prosecution decision:9 a person’s extradition to a category 1 territory is
barred if there are reasonable grounds for believing that the competent authorities in
the territory have not made a decision to charge or try the person for the offence, and
the person’s absence from the territory is not the sole reason for that failure, and the
territory does not prove the contrary.
Extraneous considerations:10 a person cannot be extradited where it appears that the
warrant issued is in fact issued for the purpose of prosecuting or punishing him on
account of his race, religion, nationality, gender, sexual orientation or political opinion,
or if the person may be prejudiced at trial or punished or detained for those reasons.
The defendant must show a causal link between the issue of the warrant or the
prejudice and the grounds.11
The passage of time:12 a person must not be extradited if and only if it appears that
it would be unjust or oppressive to do so by reason of the passage of time since either
he is alleged to have committed the extradition offence, or alleged to have become
unlawfully at large where he is alleged to have been convicted of the offence.13 The
court will consider whether the defendant is a fugitive from justice. Delay caused by
the defendant by fleeing the country, concealing his whereabouts or evading arrest
cannot be relied upon as a ground for holding it to be unjust or oppressive to return
him14 save “in the most exceptional circumstances”.15
The key issue is the effect of any delay and whether it would be unjust or oppressive
to extradite the defendant, not whether it would be unjust or oppressive to try him.16 If
the court is bound to conclude that a fair trial is impossible, then it would be unjust or
oppressive to extradite the defendant.17 However, the court will have regard to the
safeguards which exist under the domestic law of the requesting state which protect a
defendant against a trial rendered unjust or oppressive by the passage of time,18 such as
abuse of process jurisdiction. There must be more than the normal degree of disruption
9
S.12A, inserted by s.156 Anti-social Behaviour, Crime and Policing Act 2014 (“ABCP
Act”), in force 21.7.14.
10
S.13 and s.81 EA 03.
11
Hilali v Central Court of Criminal Proceedings Number 5 and another [2006] EWHC
1239 (Admin) para.62.
12
S.14 and s.82 EA 03.
13
S.14 and s.82 EA 03.
14
Kakis v Government of the Republic of Cyprus [1978] 1 WLR 779, para.782–783.
15
Kakis (ibid.) para.782 and Gomes v Republic of Trinidad and Tobago [2009] 1 WLR 1038,
para.29.
16
Woodcock v Government of New Zealand [2004] 1 WLR 1979, para.20, cited in Gomes
(ibid.) para.32; Knowles v Government of the United States of America [2007] 1 WLR 47,
para.31.
17
Woodcock (ibid.) para.21.
18
Woodcock (ibid.) para.21–22.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
which flows from extradition before it can be considered oppressive to extradite the
defendant.19
The person’s age:20 a person cannot be extradited if they would have been under the
age of criminal responsibility at the time the alleged offence was committed. The age
of criminal responsibility in England and Wales is ten years old.
Hostage taking considerations:21 this has been repealed as of 21 July 2014 and
therefore only applies to cases where prior to 21 July 2014 the judge has not decided
whether there are bars to extradition under section 11(1) of the EA 03.22 A person’s
extradition is barred if the country is a party to the International Convention against the
Taking of Hostages and it appears that 1) if extradited he might be prejudiced at his
trial because communication between him and the appropriate authorities would not be
possible, and 2) the act or omission constituting the extradition offence also constitutes
an offence under section 1 of the Taking of Hostages Act 1982 or an attempt to commit
such an offence. The appropriate authorities are the authorities of the territory which
are entitled to exercise rights of protection in relation to him.23
Specialty:24 the rule of specialty prevents someone from being dealt with in the
requesting state for an offence other than that which he was extradited for, one
disclosed by the same facts as that offence, or where consent has been given by an
appropriate judge.25 The bar means that someone must not be extradited to a country
where there are no specialty arrangements in place with that country. This principle is
dealt with in greater detail later in the chapter.
Forum:26 the forum bar was brought into force on 14 October 2013. It was enacted to
allow cases to be prosecuted in the UK where more appropriate to do so, rather than in
the requesting state following extradition.
A person’s extradition will be barred by reason of forum if the extradition would not
be in the interests of justice.27 It would not be in the interests of justice if the judge 1)
decides that a substantial measure of the defendant’s relevant activity was performed in
the UK, and 2) decides, having regard to the specified matters28 only, that the
extradition should not take place.29
The specified matters are: 1) the place where most of the loss or harm resulting from
the extradition offence occurred or was intended to occur; 2) the victim’s interests;
3) the belief of a prosecutor as to the most appropriate jurisdiction to prosecute; 4) the
availability of the evidence in the UK; 5) any delay which may be caused;
6) consideration of the location of witnesses, co-defendants and other suspects and the
practicality of their evidence being given; 7) the defendant’s connections with the
19
Steblins v Government of Latvia [2006] EWHC 1272 (Admin) para.13.
20
S.15 EA 03.
21
S.16 (category 1) and s.83 (category 2) EA 03.
22
S.158 ABCP Act 2014.
23
S.16(2) and s.83(2) EA 03.
24
S.17 and s.95 EA 03.
25
S.17(3) and s.95(3) EA 03.
26
S.19B and s.83A EA 03.
27
S.19B(1) and s.83A(1) EA 03.
28
S.19B(3) and s.83A(3) EA 03.
29
S.19B(2) and s.83A(2) EA 03.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Extradition 651
UK.30 The judge must give regard to the desirability of not requiring the disclosure of
material which is subject to restrictions on disclosure in the requesting state. A
prosecutor may provide a certificate to the effect that the defendant should not be
prosecuted in the UK; if they do, the judge must decide that the extradition is not
barred by reason of forum.31
Proportionality:32 This applies to those who are accused of an offence. The judge
must decide whether extradition would be compatible with the European Convention on
Human Rights (ECHR) (see below), and whether extradition would be disproportion-
ate. In deciding whether it would be disproportionate, the judge must take into account
only the matters specified at section 21A(3) of the EA 03, namely:
30
S.19B(3) and s.83A(3) EA 03.
31
S.19C–D and s.83B–C EA 03.
32
S.21A, as inserted by s.157 ABCP Act 2014, in force on 21.7.14.
33
S.25 and s.91 EA 03.
34
[2014] EWHC 770 (Admin).
35
The category 2 territories that do not have to prove a prima facie case are designated at
Extradition Act 2003 (Designation of Part 2 Territories) Order 2003, Article 3.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
HUMAN RIGHTS
The judge cannot order the extradition of a person if it would be incompatible with
their Convention rights within the meaning of the Human Rights Act 1998; in such
circumstances the person must be discharged.36 Therefore every extradition case
requires careful consideration as to whether the person’s extradition would violate their
Convention rights.
The state has a duty to safeguard the lives of those within its jurisdiction and a duty to
refrain from the intentional and unlawful taking of life.37 The test is whether there is a
real risk to the defendant’s life in the requesting state.38 Where the risk to life is from
non-state agents, it is also necessary to show a lack of reasonable protection in the
requesting state.39
A person must not be extradited if he could be, will be or has been sentenced to
death for the offence in the requesting state;40 the requesting state may provide a
written assurance that the death penalty will not be imposed or will not be carried
out.41
36
S.21 and s.87 EA 03.
37
Osman v UK [1998] 29 EHRR 245.
38
[2008] EWCA 547 (Admin).
39
R (Bagdanavicius) v Secretary of State for the Home Department [2005] 2 AC 668,
para.24.
40
S.94(1) EA 03.
41
S.94(2) EA 03.
42
R (Ullah) v Special Adjudicator [2002] EWCA Civ 1856, para.48.
43
Al-Saadoon and Mufdhi v United Kingdom App. No.61498/08 [2010] ECHR 282,
para.123.
44
See Harkins and Edwards v The United Kingdom App. No.9146/07 and 32650/07.
45
McKinnon v Secretary of State for the Home Department [2009] EWHC 2021 (Admin).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Extradition 653
Extradition will violate Article 5 if there is a real risk of a “flagrant breach” of Article
5 in extraditing the person to the requesting state.46 The Court in Othman v UK (ibid.)
gave the example of such a breach as if the requesting state had arbitrarily detained an
applicant for many years without any intention of bringing him to trial.
Extradition is incompatible with Article 6 if the defence shows there is a real risk of a
flagrant denial of justice or fair trial in the requesting state.47 Ordinarily, an issue as to
the admissibility of evidence is for the requesting state to decide upon. However, where
it can be demonstrated that the approach taken by the requesting state’s courts to
admissibility will itself be such as to create a real risk of a fundamentally unfair trial,
then extradition may be prevented on Article 6 grounds.48 In Brown v Rwanda49
extradition was refused due to the real risk that the appellants would suffer a flagrant
denial of justice; key considerations were the independence of the judiciary and the
availability of witnesses.
In Norris v USA (No.2)50 it was stated that the interference with family life must be
“exceptionally serious” before extradition will become a disproportionate interference.
However, this test was clarified by the Supreme Court in HH v The Deputy
Prosecutor51 in which it was said: “The test is always whether the gravity of the
interference with family life is justified by the gravity of the public interest pursued …
Exceptionality was a prediction … not a test”.52 The best interests of the children of the
requested person are a primary consideration to the Article 8 inquiry.53
46
Othman v The United Kingdom App. No.8139/09, para.233.
47
Brown v Government of Rwanda [2009] EWHC 770 (Admin) para.34.
48
R (Ramda) v Secretary of State for the Home Department [2002] EWHC 1278 (Admin),
para.22; also see Othman v United Kingdom App. No.8139/09 in relation to evidence obtained
by torture.
49
Supra n 47.
50
[2010] UKSC 9, para.56.
51
[2012] UKSC 25.
52
HH v The Deputy Prosecutor (ibid.), para.32.
53
HH v The Deputy Prosecutor (ibid.), para.33.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Background
Brian O’Brien, a US national, appealed to the Supreme Court, against a decision of the
Court of Appeal Criminal Division (“COACD”),54 upholding an order of the first
instance Criminal Court, to send the appellant to prison for 15 months for contempt of
court in disobeying a Restraint Order made against him under section 41 of the POCA
2002. Mr O’Brien had failed to make disclosure of his assets, had removed assets from
the jurisdiction and had failed to repatriate assets from abroad.
The appellant argued that his committal was unlawful by reason of the speciality
provisions of Part 3 of EA 03. After committing the contempt the appellant fled to the
USA, from where he was extradited on substantive allegations of boiler room fraud.
The appellant argued that it was not thereafter open to the Crown Court to punish him
for his earlier contempt, for which he had not been extradited.
The COACD rejected the appellant’s arguments but emphasised the importance of
the speciality rule which is based on international cooperation between sovereign
states. R v Seddon55 set the appeal in its proper extradition-speciality context, as
Hughes LJ in the COACD stated:
54
[2012] 1 WLR 3170.
55
[2009] 2 Cr App R 9.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Extradition 655
Manifestly, the principle of specialty applies only to criminal offences and has nothing
to do with civil matters.
If the contempt in the O’Brien case was criminal, the EA 03 makes it clear that the
principle of specialty applies:
The Court of Appeal was persuaded that the contempt constituted by breach of a POCA
2002 Restraint Order is a civil not a criminal contempt for a number of reasons:
1. Firstly, this conclusion is supported by and consistent with the general discussion
on the classification of contempt in English law. The fact of a custodial
punishment is neutral; what matters is the nature of the contempt (breach of an
existing order of the Court) and the purpose of the punishment (coercive as well
as punitive).
2. Secondly, the Restraint Order in the context of confiscation proceedings is closely
analogous to the freezing injunction in civil proceedings.
3. Thirdly, nothing in the predecessor regimes to POCA 2002 supports the conten-
tion that contempt constituted by a breach of a restraint order is a criminal rather
than a civil contempt. To the contrary, authorities decided under those regimes
speak with one voice, namely, that such contempt is to be characterised as civil
contempt.
4. Fourthly, as to the POCA 2002 regime itself:
i) POCA does not produce a radical departure from the position prevailing under
the previous regimes. While it is true that under POCA, jurisdiction to make
Restraint Orders has been transferred from the High Court to the Crown
Court, the COACD viewed the basis of this change as administrative – rather
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
However, the Court of Appeal certified the following points of law of general public
importance:
Ground 1
On the first issue the Supreme Court held that section 151A of the EA 03 does not
apply directly to this case. In any event, the sections relied upon by the appellant
cannot be read in isolation, and reading the Act as a whole it is clear that conduct
constituting an extradition offence must be a criminal offence under the law of the
requesting state, here the UK (see paragraph 36 of the judgment).
Each of Parts 1–3 of the EA 03 contain a similar definition of extradition offence, in
each case referring to “conduct punishable with imprisonment or another form of
detention for a term of 12 months or a greater punishment”, with a common structure
across the definitions.
Part 1 of the EA 03, an EU Framework Decision, makes it a prerequisite of a valid
arrest warrant that the conduct the person is accused of or has been convicted of
constitutes a criminal offence under the law of the requesting state. In relation to Part 1
(dealing with extradition from the UK to other Member States), the definition of
“extradition offence” accordingly requires that an offence either be a listed extraditable
offence or an offence under UK law.
Part 2 of the EA 2003 provides a similar scheme in relation to extradition from the
UK to those non-EU countries with which the UK has extradition arrangements (see
sections 137–138 EA).
56
[2011] EWCA Crim 446; [2011] 2 Cr App R(S) 101 at [50].
57
[2009] 1 WLR 1179.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Extradition 657
Part 3 of the EA 2003 deals with extradition to the UK. Section 148 (within Part 3)
has no direct application to this case, since the UK judiciary is not involved in the
process of obtaining Mr O’Brien’s extradition. Nonetheless section 151A should be
understood in the light of the wider scheme of the 2003 Act. Nothing can constitute an
extradition offence unless it is a criminal offence in the relevant state, here the UK (see
paragraph 36 of the judgment).
Ground 2
A Restraint Order under POCA 2002 is an interim remedy, aiming to prevent the
disposing of realisable assets during a criminal investigation. The Crown Court has an
inherent jurisdiction to treat a breach of such orders as contempt of court. There is a
well-recognised distinction between “criminal contempt”, covering conduct which itself
is a crime, and “civil contempt”, covering conduct which is not itself a crime but is
punishable by the court in order that the court’s orders be observed. A civil contemnor
does not receive a criminal record.
If a victim of Mr O’Brien’s fraud had obtained a freezing order against him similar
to the POCA 2002 Restraint Order and he had disobeyed the order, the victim would
have been able to bring contempt proceedings following his extradition. There is no
relevant difference with a POCA 2002 order. The key is the nature and purpose of the
order, not the court in which the order was made. Mr O’Brien’s contempt was civil, and
his committal was not barred by the speciality principle.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 53 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
1
For convenience the term state will be used irrespective of whether the place is a nation,
a country, a federation, a republic, a colony or a territory.
2
“Bulk Cash Smuggling and the Globalization of Crime: Overcoming Constitutional
Challenges to Forfeiture under 31 USC 5332” 22 Berkeley Journal of International Law 98
(2004).
3
Assistant US Attorney, US Attorney’s Office, Baltimore, Maryland, USA.
4
Unless otherwise indicated, hereafter, reference to a state or states, shall be a reference to
a separate jurisdiction with its own administration and legal system, whether it is a nation, a
federation, a republic, a colony or a territory.
658
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 1 / Date: 9/9
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
5
https://www.unodc.org/unodc/en/treaties/CTOC/.
6
https://treaties.un.org/Pages/ViewDetails.aspx?src=TREATY&mtdsg_no=XVIII-12&chapter
=18&lang=en.
7
For a number of parties have specified that they are not bound by some of the provisions
of the convention.
8
Supra n 5.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
However, it is the governments of participating states that must necessarily take the
lead role in securing co-operation. It is they that have agreed to abide by the United
Nations Convention, and this can only be achieved by the enactment of domestic
legislation putting into effect the principles of the convention. Thereafter, it is their
representatives who negotiate treaties or agreements with their counterparts in other
places, signifying and acknowledging that the parties to the agreement will co-operate
in accordance with the terms of any agreement. That there is a legal framework, a piece
of legislation, a statute or a regulation within a participating state is essential, as it is
important for the process in both the requesting state and any co-operating state that
there is a rule of law and that it is adhered to.
Co-operation is sometimes informal in nature. Most informal co-operation occurs at
the law enforcement level. It can be as simple as an officer in the Hong Kong Police
telephoning or emailing an officer in the Australian Federal Police,9 to ascertain if a
person of interest is residing at a particular address in Sydney. Once confirmation is
received, and if the person is wanted for a crime in Hong Kong, then the request will be
formalized, firstly by the issue of a warrant of arrest in Hong Kong,10 and then the
issue of an Interpol Red Notice,11 which will be circulated to the 190 members of
Interpol, including Australia.
Formal co-operation is achieved through law enforcement and the prosecuting
authorities following procedures prescribed by their states’ respective legislative
provisions or in compliance with treaties or agreements to enlist the assistance of their
counterparts in other jurisdictions.
For the law enforcement professional, the first point of contact for co-operation is
Interpol;12 for European law enforcement it is Europol.13
For prosecutors, whilst direct co-operation is ultimately achieved on a state to state
basis, the International Association of Prosecutors is also a helpful source of infor-
mation and provides codes of best practice for prosecuting agencies.14
Organizations offering assistance to developing states will often be urged to fully
participate in the international community by co-operating with other states, including
co-operating in their efforts to combat corruption and other financial crime; thus the
guidance and influence of organizations such as the Organisation for Economic
Co-operation and Development,15 the World Bank16 and the International Monetary
Fund17 may also have the result of securing co-operation in the battle against
transnational financial crime.
9
In this type of situation the initial contact would likely have been made via the Australian
Federal Police Liaison Officer at the Australian Consulate in Hong Kong.
10
For example, the power for a magistrate to issue a warrant of arrest is provided for in s9
of the Magistrates Ordinance, Chapter 227, Laws of Hong Kong.
11
See Interpol website – “Notices” at http://www.interpol.int/INTERPOL-expertise/Notices.
12
For information about Interpol see the Interpol website at http://www.interpol.int/.
13
For information about Europol see the Europol website at https://www.europol.europa.eu/.
14
http://www.iap-association.org/.
15
http://www.oecd.org/.
16
http://www.worldbank.org/.
17
http://www.imf.org/external/index.htm.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Where corruption is an issue, the Financial Action Task Force will provide guidance
to states directed at “threats to the integrity of the financial system and [to] help ensure
a level playing field”,18 and the International Association of Anti-Corruption Author-
ities,19 formed in 2006, primarily for the purpose of implementing the 2003 United
Nations Convention against Corruption, will also provide information concerning best
practice. The non-governmental organization Transparency International20 has also been
instrumental in encouraging co-operation in combating corruption through maintaining
and publishing a country by country performance index of the incidence of corruption
in each country.
There is little point in obtaining evidence abroad if it will not be admitted at the
offender’s trial, so it is important when evidence is sought that it will be in an
admissible form. If evidence is being obtained with the assistance of a foreign court, a
difficulty that is sometimes encountered is the need to comply with both the law of the
co-operating state and the law of the requesting state. To ensure that the laws in both
places are complied with, careful planning will be necessary.
18
http://www.fatf.gafi.org/pages/aboutus/.
19
http://www.iaaca.org/.
20
http://www.transparency.org/.
21
Usually requiring the requesting state to provide a reciprocity undertaking.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Evidence may be required firstly as pre-trial evidence for the purpose of building a
case that will support the issue of a warrant of arrest, and if the offender is abroad, a
request for his extradition; secondly, the evidence may be required for production at the
offender’s trial in the requesting state. Evidence may be in the form of exhibits,
including documentary exhibits, or depositions containing the evidence of witnesses
taken before a magistrate, a judge or a consular officer.
If testimony is taken abroad in the form of a deposition and the deponent is not going
to be available to testify at the trial, its admissibility at the trial of the offender may be
challenged unless the offender or his legal representative is afforded the opportunity of
cross examining the deponents.
The process by which evidence is obtained by way of commission rogatoire or letters
of request has been in existence for many years; more modern legislation, however,
appears to have had its genesis with the promulgation of the Hague Convention on the
Taking of Evidence Abroad in Civil and Commercial Matters 1970. Although this
instrument, as the name suggests, concerned the obtaining of evidence for production in
civil and commercial cases, when its provisions were adopted in the form of domestic
legislation in some jurisdictions, provisions for the taking of evidence for use in
criminal cases were also included.22
Most jurisdictions that have legislation of this nature require, as a pre-requisite to
applying for a letter of request in a criminal case, that criminal proceedings must have
been commenced against a suspect or that such proceedings are contemplated.23
Where the requesting state has mutual legal assistance legislation, and has signed a
mutual legal assistance agreement with the co-operating state, then the letter of request
procedure will be unnecessary. Whilst the existence of an agreement does make the
process simpler, legislation may allow for requests to be considered from places with
which there is no agreement.24
Mutual legal assistance legislation commonly contains provisions which facilitate the
gathering of pre-trial evidence, such as documents, banking records and other exhibits
at the investigation stage, as well as evidence for use in the trial itself, including the
oral testimony of witnesses.
The relevant Hong Kong statute is Cap. 525;25 its provisions are fairly typical. For
example, s12(1) enables a domestic search warrant to be sought so that evidence to
assist the requesting state can be obtained. To invoke this provision it is necessary that
22
For example, the UK Evidence (Proceedings in Other Jurisdictions) Act 1975.
23
For Hong Kong now see sections 77E and 77F of the Evidence Ordinance. In Australia,
similar provisions can be found in various state legislation – see, for example, Part 4 of the New
South Wales Evidence on Commission Act 1995. For the procedure in the United States see US
Attorneys Criminal Resource Manual 275. For the United Kingdom see sections 5 and 6 of the
Evidence (Proceedings in Other Jurisdictions) Act 1975.
24
For an example of such a provision, see s5(4) of the Mutual Legal Assistance in Criminal
Matters Ordinance, Chapter 525, Laws of Hong Kong [“Cap. 525”].
25
Supra n 24.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Typical extradition legislation35 will contain provisions describing the procedure for
requesting the surrender of a fugitive36 by the prescribed authority of the requesting
state, the specified authority in the place in which the offender is located to whom the
request is to be addressed and the process that is to be followed in effecting the
surrender, including details of the court or authority that is empowered to order the
surrender, and the legislation also usually includes provisions concerning any appeal
against a surrender order and the time period within which such an appeal must be
filed.
26
Which includes an investigation, a prosecution or an ancillary criminal matter, such as
proceedings concerning the confiscation of crime proceeds – see s2.
27
Which is an offence allegedly committed in the requesting state for which the maximum
penalty is not less than 24 months imprisonment – see s2.
28
Referred to in the section as a thing.
29
Hong Kong’s senior law officer, the equivalent of the Attorney-General.
30
There is no detailed definition of the term thing in Cap. 525; in s2; it is merely stated that
“thing includes material”; material, on the other hand, includes “any books, document or other
record in any form whatsoever, and any article or substance”.
31
Which includes a police officer, a customs officer, an independent commission against
corruption officer or any other person authorized in writing by the Secretary for Justice.
32
See s10(1) of Cap. 525.
33
An exhibit or thing seized by an authorized officer under the authority of a search warrant
issued under s12(1) would be produced in this way.
34
Or extradition.
35
The relevant Hong Kong law is the Fugitive Offenders Ordinance, Chapter 503, Laws of
Hong Kong. The relevant Australian law is the Extradition Act 1988. The relevant US law is 18
US Code Chapter 209. The relevant UK law is the Extradition Act 2003.
36
Or wanted person or suspect.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
It is usual for the legislation to provide for the signing of agreements, orders or
treaties with other states. Requests by one signatory country to another must comply
with the terms of the agreement.
Whilst the existence of an agreement makes the process of requesting the surrender
of a fugitive offender from an agreement state and surrendering a fugitive offender to
that state simpler, the legislation may also provide that applications from states with
which there is no formal agreement may be considered where there are special
provisions allowing for such an arrangement and this may require the provision of a
reciprocity undertaking.37
In the absence of a formal treaty or other arrangements for the extradition of a
fugitive, an informal arrangement, such as lawful deportation, may be used to effect the
repatriation of the fugitive.38
Extradition legislation, or agreements which follow the enactment of legislation,
usually contain a number of common features, including the need for dual criminality39
and that extradition requests will not be entertained for offences of a political nature;
there are also sometimes provisions which preclude or restrict extradition for taxation
or revenue offences.40 Some states will refuse to extradite for offences that attract
certain types of punishment, such as torture or the death penalty. Where a state does not
recognize capital punishment and a request is received to extradite a fugitive to a
requesting state which has the death penalty, unless the requesting state undertakes not
to seek the death penalty for the offence, or not to carry out the sentence if the
sentencing court imposes the death penalty, then the request will be refused. This
requirement will usually be incorporated in any extradition treaty or agreement.41
Some states will decline to extradite their own nationals.42 The refusal to extradite a
state’s own citizens usually has nothing to do with the state’s desire to assist its
37
See, for example, s194 of the Extradition Ordinance 2003 [UK]. Hong Kong does not
have such a provision, primarily because of its status and the need to have its extradition
arrangements ratified by China.
38
See, for example, the case of Lai Changxing, who was deported from Canada to China
following protracted negotiations, primarily involving the issue of whether or not Lai would be
facing the death penalty if convicted of major financial crimes. A report concerning the case can
be found on the BBC website at http://www.bbc.co.uk/news/world-us-canada-14245141.
39
That is, the offence that is the subject of the request must also be an offence in the
co-operating state.
40
See, for example, s5(2) of Cap. 525.
41
See, for example, Article 4 of the Agreement between the Government of Hong Kong and
the Government of the United States of America for the surrender of Fugitive Offenders Order,
made under the Fugitive Offenders Ordinance, Chapter 503, Laws of Hong Kong, sub.leg. 503F.
42
Countries which will refuse to extradite their own citizens include Austria (s12 of the
Extradition and Legal Assistance Act), Brazil (Article 5 of the Brazilian Constitution 1988), the
People’s Republic of China (Article 8 of the Extradition Law), the Czech Republic (Article
14(4) of the second Charter of Fundamental Rights and Freedoms), France (Articles 696-1 to
696-7 of the Code of Criminal Procedure, legislative part), Germany (Article 16(2) of the Basic
Law for the Federal Republic of Germany, although Germany will extradite a citizen to another
member state of the European Union in accordance with a European arrest warrant), Japan
(Article 2 of the Law of Extradition) and the Republic of China, that is, the state also referred to
as Taiwan (Article 4 of the Law of Extradition).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
citizens, but is more likely because, in accordance with that state’s criminal justice
system, a citizen can be dealt with for the crime in that state, wherever the crime was
committed.
As with the gathering of lawfully obtained evidence, it is imperative that the means
by which a fugitive is retrieved from another state is lawful. The consequence of the
unlawful surrender of a fugitive could be that the trial of the fugitive will be
permanently halted.43
In the introduction to her article, “When Co-operation and Intervention Meet: Sover-
eignty in the Mexico-United States Relationship”,44 Alba Izado Leon Hernandez wrote
Sovereignty is a cornerstone of the international system and of modern nation-states. Yet the
traditional understanding of this concept is being challenged by problems of such magnitude
and extent that they cannot be dealt with by one state single-handedly. This situation is
further compounded by the fact that anarchy permeates the international system and states
seek to maintain control over their “sovereign” territory. Because of this, cooperation can
become difficult to achieve, as protecting the self-interest of a state from both internal and
external challenges tends to prevail over efforts at collaboration.
43
See, for example, the cases of R v. Horseferry Road Magistrates Court ex parte Bennett
[1994] 1 AC 42 [UK] and Moti v. R 283 ALR 393 [Australia].
44
3(4) Amsterdam Law Forum 54 [2011], at 54.
45
Although the reluctance to give way on matters concerning state sovereignty is not limited
to new and emerging nations. Similar problems arose when members of the European Union
were endeavouring to agree upon common foreign and security policies. See the article by
Sascha Mueller, a lecturer at New Zealand’s University of Canterbury, “Europe’s Dichotomy –
the Matter of Sovereignty” 9 New Zealand Forces Law Review 55 (2009).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
II. Corruption
The problem that more often militates against obtaining co-operation in some places is
the problem of corruption. Whilst corruption is not the exclusive province of develop-
ing states, corruption appears to be more often present in such states.
In the British Journal of Criminology in 200346 Professor Jean-Germain Gros47
emphasized that transnational crime was “one of the many challenges of the post-Cold
War” and had “become an integral part of the private accumulation strategies of some
public officials, entrepreneurs and ordinary citizens”. Non-compliant or rogue states
provide safe havens in various places, where the financial criminals, whilst ever they
have the funds to pay bribes to corrupt officials, can come and go with impunity. The
problem often arises in developing economies where ordinary citizens are living in
poverty and are beholden to the whim of public officials and wealthy tycoons for
handouts just to survive. Where corruption is endemic in a society, and the criminal is
prepared to provide financial rewards in the form of bribes in return for protection and
a secure place to live, it can be an extremely difficult task to persuade such a society to
provide assistance to something that is as esoteric as the international community in its
fight against financial crime. For the government official and the businessman the
rewards are just too great to give up, and for the ordinary citizen, whose main focus is
on where his next meal is coming from, and is reliant upon any scraps that the corrupt
official or businessman will throw his way, it is unrealistic to expect him to rebel
against corrupt practices, although history does show that if the conduct of the leaders
of a state becomes too oppressive then citizens will eventually revolt. What are needed
as a first step are incentives focused upon assisting the poor to help themselves.
In October 2013, the World Bank Group introduced a strategy it calls its Corporate
Scorecard. This strategy is “grounded in two ambitious goals”, namely, “ending
extreme poverty by reducing the percentage of people living on less than $1.25 a day to
3 percent by 2030; and promoting shared prosperity by fostering income growth for the
bottom 40 percent of the population in every country”.48
The International Association of Anti-Corruption Authorities49 currently has over 300
organizational members, representing the majority of anti-corruption law enforcement
agencies from around the world. The World Bank is also an organizational member.
Apart from continuing to promote and support implementation of the United Nations
Convention against Corruption, it also fosters constructive collaboration among its
members for the prevention of corruption, asset recovery and international
co-operation.50 One of its future initiatives is the preparation of a digest of good
practices.
46
“Trouble in Paradise. Crime and Collapsed States in the Age of Globalization” 43(1)
British Journal of Criminology 63 (2003).
47
Professor of Political Science and Public Policy and Research Fellow in the Center for
International Studies, University of Missouri-St Louis.
48
www.corporatescorecard.worldbank.org.
49
Supra n 19.
50
http://www.iaaca.org/Documents/workplan/201103/t20110316_512871.shtml.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
In pursuing its objectives, the Financial Action Task Force has issued a number of
recommendations; those recommendations set the standard for anti-money laundering
initiatives and encourages member countries to comply with the recommendations. An
important initiative for encouraging members to comply is the use of peer reviews,
where members evaluate other members’ compliance with the recommendations
through an assessment and preparation of a detailed report.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 54 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. INTRODUCTION
Convictions and indictments of genocide and crimes against humanity emanating from
the International Criminal Court (ICC) seem, at first glance, decidedly removed from
the realm of financial crime. However, upon closer look, the history and work of the
ICC is replete with characteristics relating to financial crime. For instance, the modern
form of the ICC was triggered by a proposal for a court to address the concerns of
money laundering and transnational organised crime. Further, there exist often-
overlooked financial aspects to the crimes currently within the jurisdiction of the ICC.
This chapter will address the ways in which the ICC and financial crimes intertwine.
Part 2 will address the history of the ICC with attention to the purposeful exclusion of
financial crimes. Part 3 will examine proposals to expand the current jurisdiction of the
ICC to encompass crimes such a bribery, corruption and terrorist financing. Part 4 will
examine the financial aspects of the core crimes of the ICC. Part 5 will conclude.
The current President of the International Criminal Tribunal for the Former Yugo-
slavia (ICTY) remarked in 1995 that: ‘The internationalization of criminal law,
including the enforcement of its provisions, has assumed central importance. Not only
do crimes against humanity, genocide and war crimes raise our indignation; we are
deeply concerned about terrorism, drug trafficking, money laundering and white collar
crime.’1
1
Theodor Meron, ‘The Internationalization of Criminal Law’ (1995) 89 Am Soc Int L Proc
297, 297.
2
Letter from the Permanent Representative of Trinidad and Tobago to the United Nations
Addressed to the Secretary-General (21 August 1998), UN Doc A/44/195; Patrick Robinson,
‘The Missing Crimes’ in Antonio Cassese et al (eds), The Rome Statute of the International
Criminal Court: A Commentary: Volume I (Oxford University Press 2000) 499–500.
668
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
reignited the debate surrounding a possible international criminal court,3 and the
General Assembly instructed the International Law Commission (ILC) to address the
question of establishing an international criminal mechanism with particular juris-
diction over individuals involved in illicit drug trafficking.4
The final draft statute proposed by the ILC in 1994 separated the ‘treaty crimes’,
including terrorism and drug trafficking, from the ‘core’ international crimes of
genocide, aggression, war crimes and crimes against humanity. After listing the core
crimes as subject to the jurisdiction of the court, the draft statute allowed for crimes
pursuant to treaty provisions listed in the annex to be encompassed by the court, as
long as the conduct alleged constituted an exceptionally serious crime of international
concern.5 Already, the shift away from the initial focus on international financial crimes
– or, at the least, crimes such as drug trafficking and complementary financial crimes
such as money laundering – towards the violent crimes seen at the time in Yugoslavia
is evident.
The report of the Intersessional Meeting of the Preparatory Committee on the
Establishment of an International Criminal Court in 1998 incorporated the crimes of
terrorism (including ‘sponsoring’ and ‘financing’)6 and drug trafficking, although it
attached the proviso that
[t]he Preparatory Committee considered the following three crimes (crimes of terrorism …
and crimes involving the illicit traffic in narcotic drugs and psychotropic substances) without
prejudice to a final decision on their inclusion in the Statute. The Preparatory Committee also
discussed these three crimes only in a general manner and did not have time to examine them
as thoroughly as the other crimes.7
Such a proviso was a clear indication of the waning of support for the inclusion of
these treaty crimes.8
Support continued to decline as the inclusion of drug trafficking and terrorism met
with great resistance at the Rome Conference in 1998. The arguments against inclusion
centred upon claims that the presence of these crimes would trivialise the role of the
3
The idea of an international criminal court surfaces as early as the 15th Century: see
Sandra L Jamison, ‘A Permanent International Criminal Court: A Proposal that Overcomes Past
Objections’ (1995) 23 Denver J Int L & Pol 421. The General Assembly had requested the ILC
to prepare a draft code of offences against the peace and security of mankind following World
War II: Formulation of the Principles Recognized in the Charter of the Nuremberg Tribunal and
in the Judgment of the Tribunal, GA Res 177 (II) (21 November 1947).
4
International criminal responsibility of individuals and entities engaged in illicit traffick-
ing in narcotic drugs across national frontiers and other transnational criminal activities:
establishment of an international criminal court with jurisdiction over such crimes, GA Res
44/39, UN Doc A/RES/44/39 (4 December 1989) para 1.
5
‘Draft Statute for an International Criminal Court’ (1994) II YB ILC, art 20(e).
6
United Nations Diplomatic Conference of Plenipotentiaries on the Establishment of an
International Criminal Court, Report of the Preparatory Committee on the Establishment of an
International Criminal Court, UN Doc A/CONF.183/2 (14 April 1998) 21.
7
ibid.
8
Robinson (n 2) 503.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Court and stretch its resources.9 Further, it was contended that jurisdiction should be
limited to a few core crimes to promote a unified, coherent system: the role of the
proposed Court was codification, not progressive development – too much emphasis on
the latter would result in fewer ratifications and hence a weaker mandate.10
The United States delegation had previously argued that
[t]his court should not concern itself with incidental or common crimes, nor should it be in
the business of deciding what even is a crime. This is not the place for progressive
development of the law into uncertain areas, or for the elaboration of new and unprecedented
criminal law. The court must concern itself with those atrocities which are universally
recognised as wrongful and condemned.11
Much of the criticism focused on the apparent lack of gravity of drug-related crimes
and terrorism – the formulation of Article 20(e) of the ILC’s Draft Statute evinces a
particular concern to ensure that treaty crimes reach sufficient gravity, despite the
oft-recited preamble that the Court will only have jurisdiction over the ‘most serious
crimes of concern to the international community’.12 The prevailing view at the Rome
Conference was that these treaty crimes do not meet the ‘conceptual conditions for core
crime status because they are not, by definition, a threat to international peace and
security or so egregious as to shock the conscience of humanity’.13
A strong argument against the inclusion of treaty crimes (including the financial
crimes of money laundering and terrorist financing) was that they are not crimes under
international law – they are crimes created by treaties which ‘envisage that national
legislation will be enacted to make specified conduct criminal under the relevant
national law’.14 The demarcation of treaty crimes from core crimes in Article 20(e) of
the ILC’s Draft Statute reflects this distinction.15 As a corollary, the detailed content of
the crimes is not defined at an international level – Professor Crawford emphasised that
‘[t]hose conventions cover a wide range of conduct, far wider than could justifiably be
9
Robinson (n 2) 502–503; Neil Boister, ‘The Exclusion of Treaty Crimes from the
Jurisdiction of the Proposed International Criminal Court: Law, Pragmatism, Politics’ (1998)
3(1) J Conflict Security L 27, 35.
10
Boister, ‘The Exclusion of Treaty Crimes’ (n 9) 35. The non-universal ratification of
treaties in which the crimes of drug trafficking and terrorism were contained presented a further
problem for their inclusion in the Rome Statute: ibid 31.
11
United Nations, ‘United States Representative Tells Legal Committee International
Criminal Court Should Not Be Direct Part of United Nations’ (Press Release, GA/L/3046, 23
October 1997); Andreas Schloenhardt, ‘Transnational Organised Crime and the International
Criminal Court: Towards Global Criminal Justice’ (Crime in Australia: International Connections
conference, Melbourne, 29–30 November 2004) 8–9.
12
Draft Statute (n 5) preamble; Rome Statute of the International Criminal Court (adopted
17 July 1998, entered into force 1 July 2002) 2187 UNTS 90, preamble. See also Boister, ‘The
Exclusion of Treaty Crimes’ (n 9) 28.
13
Neil Boister, ‘Treaty Crimes, International Criminal Court?’ (2009)12 New Crim LR 341,
346.
14
James Crawford, ‘The ILC Adopts a Statute for an International Criminal Court’ (1995)
89 AJIL 404, 410 cited in Boister, ‘The Exclusion of Treaty Crimes’ (n 9) 32.
15
Jurisdiction over war crimes (primarily found in the Geneva Conventions) were limited to
‘serious violations’, presumably easier to locate in customary international law.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
16
Crawford (n 14) 410.
17
Boister, ‘Treaty Crimes’ (n 13) 345–346.
18
Boister, ‘The Exclusion of Treaty Crimes’ (n 9) 31.
19
United Nations Diplomatic Conference of Plenipotentiaries on the Establishment of an
International Criminal Court, Final Act of the United Nations Diplomatic Conference of
Plenipotentiaries on the Establishment of an International Criminal Court, UN Doc
A/CONF.183/10 (17 July 1998) Resolution E.
20
International Criminal Court Assembly of States Parties, Report of the Bureau on the
Review Conference: Addendum, UN Doc ICC-ASP/8/43/Add.1 (10 November 2009) 17; see also
International Criminal Court Assembly of States Parties, Report of the Working Group on
Amendments, UN Doc ICC-ASP/10/32 (9 December 2011) 4–5.
21
Written Question by Jean-Claude Martinez to the Commission, ‘Wider Jurisdiction for the
International Criminal Court Encompassing Financial Crimes’ (European Parliament Question,
P–1835/09, 17 March 2009).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The UN Office on Drugs and Crime finds that multinational criminality moves $2.1
trillion per year across borders.22 Several authors have proposed that the ICC adopt a
money laundering statute to allow such crimes to be prosecuted at the international
level.23 They suggest that the ICC is the suitable forum to prosecute international
money laundering and drug trafficking due to its far-reaching jurisdiction and availabil-
ity of resources to investigate this particular type of crime.24 It has been proposed that
the proceeds confiscated from drug trafficking could be used to fund the prosecution of
the crime itself, rather than stretch the current resources of the Court.25 Authors further
contend that crimes such as money laundering are in fact more appropriate for the
international criminal jurisdiction of the ICC than the current violent crimes as they
rely on documentary evidence, rather than witness testimony, which is often difficult to
procure for logistic and political reasons.26 As such, the ICC would not face the
backlash and problems it has had prosecuting the core crimes.27 However, this is more
a testament to the sometimes-flawed conduct and architecture of the ICC rather than an
argument to extend its jurisdiction.28
The World Bank estimates that more than $1 trillion is paid in bribes each year.29
Appeals for the ICC to extend its jurisdiction to include the crimes of bribery and
corruption are also prevalent.30 The Socio-Economic Rights Accountability Project in
22
United Nations Office on Drugs and Crime, ‘Estimating Illicit Financial Flows from Drug
Trafficking and Other Transnational Organized Crimes’ (Research Report, UNODC, October
2011) 7.
23
Michael Anderson, ‘International Money Laundering: The Need for ICC Investigative and
Adjudicative Jurisdiction’ (2012–2013) 53 VA J Int L 763, 765; Bruce Zagaris and Sheila M
Castilla, ‘Constructing an International Financial Enforcement Subregime: The Implementation
of Anti-Money Laundering Policy’ (1993) 19 Brook J Int L 871, 955.
24
ibid 766; Molly McConville, ‘A Global War on Drugs: Why the United States Should
Support the Prosecution of Drug Traffickers Before the International Criminal Court’ (2000) 37
Am Crim LR 75, 96.
25
McConville (n 25) 99.
26
Anderson (n 23) 779.
27
McConville (n 25) 96.
28
Anderson presents an uncritical, rosy view of the ICC which at times ignores the inherent
complications of the Court: see, eg, Anderson (n 23) 779–781 and ‘abundant resources’: 782.
29
The World Bank, ‘Costs of Corruption’ (Feature Articles, 8 April 2004) http://go.world
bank.org/LJA29GHA80.
30
See, eg, Schloenhardt, ‘Transnational Organised Crime’ (n 11); Ophelie Brunelle-
Quraishi, ‘Assessing the Relevancy and Efficacy of the United Nations Convention against
Corruption: A Comparative Analysis’ (2011) 2 Notre Dame J Int & Comp L 101; Stephen
Kingah, ‘The Effectiveness of International and Regional Measures in Recovering Assets Stolen
from Poor Countries’ (2011) 13 U Botswana LJ 3, fn 107.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Nigeria, for example, petitioned the ICC to investigate the corruption of past govern-
ments.31 It is argued that the United Nations Convention against Corruption is
weakened by its enforcement regime and the inherent difficulties of investigating a
crime that is conducted in secret, with the consent of both parties, and with no apparent
or direct victim.32 The Global Organization of Parliamentarians against Corruption
suggests that the ICC is well-equipped to respond to worldwide corruption. A 2013
Discussion Paper notes that while the focus of the Court is on predominantly violent
crimes committed during crises and armed conflict, the very nature of corruption
offences is that ‘their prosecution is less dependent on the testimony of victims, and
more focused on documentary evidence accessible to objective subject-matter
experts’.33 As such, the ICC would not have to rely so much on witness testimony –
often logistically burdensome – and its resources would not be unreasonably stretched,
as is so often argued when resisting the inclusion of new crimes in the jurisdiction of
the ICC.
Many of the criticisms launched against the inclusion of terrorism and drug trafficking
at the Rome Conference continue to apply to the inclusion of financial crimes in
the jurisdiction of the ICC. Some criticisms have in fact acquired more force. The
argument that an extension of jurisdiction would unduly burden the resources of the
Court resounds even more persuasively given the recent budget concerns and increased
caseload.34
However, the argument that the gravity of financial and economic crimes is not
sufficient to justify intervention of the ICC lacks merit. An individual financing
terrorism or laundering money to perpetuate violent crimes against hundreds of victims
may in fact be of comparable gravity to an individual committing a single act of
pillaging as a war crime. The issue of gravity is a red herring when dealing with the
jurisdiction of the Court, as the threshold of only the ‘most serious crimes of concern’
is already in place – a lone soldier committing a single act of pillaging will not attract
the attention of the Court, while an individual at the apex of an international terrorist
financing ring ought to.
However, the political will to broaden the jurisdiction of the ICC does not currently
exist. Exclusive of the general State objections to intrusion of their sovereignty,35 many
States are already discontented with the Court, particularly in Africa. The vitriol in
31
‘SERAP v Nigeria’ (SERAP, 2010) http://serap-nigeria.org/escrs-corruption-in-nigeria/. It
must be noted that the petition has received no response, and called for investigations as far back
as 1985, which would be against the temporal jurisdiction of the Court.
32
Brunelle-Quraishi (n 30) 147.
33
Global Organization of Parliamentarians against Corruption, ‘Prosecuting Grand Corrup-
tion as an International Crime’ (Discussion Paper, GOPAC, 1 November 2013) 6.
34
Blake Evans-Pritchard, ‘Mali Case Throws Spotlight on ICC Budget Constraints’ (Institute
for War and Peace Reporting, 6 August 2012) http://iwpr.net/report-news/mali-case-throws-
spotlight-icc-budget-constraints.
35
Andreas Schloenhardt, ‘Transnational Organised Crime and the International Criminal
Court: Developments and Debates’ (2005) 24 UQLJ 93, 113; Brunelle-Quraishi (n 30) 149.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
which the Court is sometimes held and the political backlash felt renders any extension
of its jurisdiction very unlikely.36 Indeed: ‘A review and inclusion is not going to
happen soon, and the mere fact that the ICC’s statute will have to be amended to
include such offences will be a formidable barrier to the ICC ever taking responsibility
for them.’37
There is limited space in this chapter to delve into the plethora of legal issues that are
integral to establishing individual criminal responsibility for financial crimes connected
to the core crimes of the Statute; however, a few critical issues can be addressed.
36
Abdul Tejan-Cole, ‘Don’t Bank on Prosecuting Grand Corruption as an International
Crime’ (Open Society Initiative for Southern Africa, 6 March 2012) 36.
37
Schloenhardt, ‘Developments and Debates’ (n 35) 113.
38
Kabuga (Indictment) Case No. ICTR-44B-1 (1 October 2004); Morten Bergsmo (ed),
‘Criteria for Prioritizing and Selecting Core International Crimes Cases’ (Forum for International
Criminal and Humanitarian Law, Publication Series, 2010) 259.
39
Mark B Taylor, ‘Conflict Financing: What’s Wrong with War Economies?’ (Report,
Norwegian Peacebuilding Resource Centre, May 2013) 2.
40
Luis Moreno-Ocampo, ‘Report of the Prosecutor of the ICC’ (Second Assembly of States
Parties to the Rome Statute of the International Criminal Court, 8 September 2003).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
41
Prosecutor v Van Anraat, LJN:BA6734, Gerechtshof’s-Gravenhage, 2200050906-2 (9
May 2007); James G Stewart, ‘Corporate War Crimes: Prosecuting the Pillage of Natural
Resources’ (Open Society Justice Initiative Publication, 2011) para 127.
42
Musema (Judgment) Case No. ICTR-96-13-A (27 January 2000); Julia Graff, ‘Corporate
War Criminals and the International Criminal Court: Blood and Profits in the Democratic
Republic of Congo’ (2004) 11(2) Human Rights Brief 23, 25.
43
Stewart (n 41) para 128.
44
Graff (n 42) 25.
45
Rome Statute, art 28(b)(i).
46
Reinhold Gallmetzer, ‘Prosecuting Persons Doing Business with Armed Groups in
Conflict Areas’ (2010) 8 J Int Crim J 947, 947–948.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
knowledge of the intention of the group to commit the crime.47 The ICC will have to
grapple with these complex issues of liability if corporate officers or individuals ever
come before the Court for conduct amounting to financial crimes connected to the
underlying offences of the Statute.48
The unique intersectional jurisdiction of the ICC renders it a suitable forum to
prosecute individuals responsible for financial crimes connected to the core crimes of
its jurisdiction. The ICC has jurisdiction over crimes occurring in the territory of a
State Party, as well as over individuals committing crimes who are nationals of a State
Party. As such, it may prosecute a national of Belgium (a State Party) aiding and
abetting war crimes in Iraq (not a State Party) through money laundering, or
businesspeople from America (not a State Party) in the DRC (a State Party).49
A particular war crime that has been intrinsically linked to financial crimes is that of
pillage. In June 2000 the Security Council established a Panel of Experts on the Illegal
Exploitation of Natural Resources and Other Forms of Wealth in the Democratic
Republic of Congo.50 The Panel stated that ‘networks derive financial benefit through a
variety of criminal activities including theft, embezzlement and diversion of “public”
funds, undervaluation of goods, smuggling, false invoicing, non-payment of taxes,
kickbacks to public officials and bribery’.51
An important aspect of money laundering is identifying the constitutive underlying
crime from which the proceeds of the financial transaction derive52 – in situations of
armed conflict within the purview of the ICC, this could include the war crime of
pillage.53 Scholars are exploring ‘how the war crime of pillage can be used against
companies whose theft of natural resources has sustained deadly conflict’.54 In
November 2013, Swiss gold refiner Argor was accused of laundering gold allegedly
pillaged from the DRC from 2004 to 2005.55 The Swiss anti-impunity non-
governmental organisation (NGO), TRIAL, filed a complaint to the federal prosecutor
alleging that the company had committed ‘aggravated laundering’ when it reportedly
refined pillaged gold from the DRC, the sale of which contributed to financing the
47
Rome Statute, art 25(3)(d).
48
Graff (n 42) 26.
49
Stewart (n 41) para 147; Rome Statute, art 12.
50
Statement by the President of the Security Council, UN Doc S/PRST/2000/20 (2 June
2000).
51
Final Report of the Panel of Experts on the Illegal Exploitation of Natural Resources and
Other Forms of Wealth of the Democratic Republic of the Congo, UN Doc S/2002/1146 (16
October 2002) para 21.
52
Anderson (n 23) 774.
53
Rome Statute, art 8(2)(b)(xvi).
54
Tejan-Cole (n36) 36.
55
‘Swiss Refiner Argor Accused of Laundering DRC Gold’ BBC (4 December 2013)
http://www.bbc.com/news/world-europe-24811420.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 9 / Date: 9/9
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
4.3 Forfeiture
56
‘TRIAL files a criminal denunciation to the Swiss Federal Prosecutor against a Swiss
refinery company suspected of laundering looted gold from the Democratic Republic of the
Congo’ (TRIAL, 4 November 2013) http://www.trial-ch.org/en/about-trial/trial-acts/details/
article/trial-denonce-au-ministere-public-de-la-confederation-une-entreprise-suspectee-de-blanchi
ment-dor-p.html?tx_ttnews%5BbackPid%5D=1188&cHash=fc4c226a928ed245b4c54617df675c
4e.
57
Lubanga, ‘Request to States Parties to the Rome Statute for the Identification, Tracing and
Freeing or Seizure of the Property and Assets of Mr Thomas Lubanga Dyilo’ (Decision of 31
March 2006), Case No. ICC-01/04-01/06 (Pre-Trial Chamber I).
58
Rome Statute, art 75.
59
Manuel Galvis Martínez, ‘Forfeiture of Assets at the International Criminal Court: The
Short Arm of International Criminal Justice’ (2014) 12 J Int Crim J 193, 194.
60
See, eg, arts 7(1)(c), 8(2)(a)(iv), 8(2)(b)(xiii); Martínez (n 59) 195.
61
Martínez (n 59) 207.
62
ibid 206–207.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
parking fees at Faro airport almost surpassing the value of the plane.63 Moreover, both
the freezing and forfeiture provisions of the Statute entail that such actions are without
prejudice to the rights of bona fide third parties, creating a further obstacle to the
sourcing of proceeds of crime.64
Despite these challenges, the ICC has potential to effectively use forfeiture of
criminal proceeds for reparations to victims – this potential would be further realised if
the ICC prosecuted individuals for financial crimes connected to the underlying crimes
of the Statute.
5. CONCLUSION
The inclusion of financial crimes in the Rome Statute was awash with difficulties from
its initial conception. Future proposals to extend the jurisdiction of the Court are
unlikely to go forward, given the numerous challenges – political, financial, and legal –
that the Court already faces. However, the ICC has the power to prosecute individuals
who directly finance the commission of the underlying crimes of the Statute – it
potentially has the power to prosecute those more indirectly involved, such as those
financing the commission of crimes through money laundering. If the ICC extended its
mandate in this way, it would act as a powerful deterrent on rationally acting
enterprises and business people operating in this area. If an enterprise adapted its
operations to further avoid criminal prosecution in this way, it would make it more
difficult for criminal groups to obtain financing for their conduct.65
Former ICC Prosecutor Luis Moreno-Ocampo stressed that ‘[t]he mandate of the
ICC is to go up the chain of command to those most responsible, to those who ordered
and financed the violence’66 – international financial criminals are often among those
most responsible for crimes during situations of conflict.
63
ibid 212.
64
Rome Statute, arts 93(1)(k), 77(2)(b).
65
Gallmetzer (n 46) 955–956.
66
Luis Moreno-Ocampo, ‘Keynote Address’ (Sexual Violence as International Crime:
Interdisciplinary Approaches to Evidence, Interdisciplinary Colloquium, The Hague, 16 June
2009) 9, http://lexglobal.org/files/SexualViolence-speechOcampo.tif_.pdf.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 55 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
Issues and barriers regarding policing financial crime in offshore jurisdictions are at the
core no different to those of non-offshore jurisdictions: they involve the delicate
balancing of politics, resolve and law.1 The utility of this chapter in a handbook on
financial crime dictates that, whilst formally acknowledging that there is always the
underlying current of politics and resolve, focus must primarily be on the law.
Whilst a handbook is designed to be practical, the usual formality that comes with
academic publication has to be relaxed to a degree. Due to the nature and sensitivity of
issues to be covered in this chapter, it will not be possible to provide citations for every
proposition or assertion and the reader has to take a leap of faith in accepting the
writer’s experience and reliability of source of information. Undoubtedly many readers
will be able to relate such anecdotal evidence to their personal experiences. At the end
of the day, it would have been a greater disservice not to have included the uncited
examples.
1
Kevin M. Stephenson et al. “Barriers to Asset Recovery: An Analysis of the Key Barriers
and Recommendations for Action” Stolen Asset Recovery Initiative 2011, The International
Bank for Reconstruction and Development/The World Bank.
2
See John Grisham “The Firm” Dell, reprint edition (25 August 2009).
679
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
tend to favour the Cayman Islands. Those readers wishing to make contributions
regarding other jurisdictions for future editions of the handbook are encouraged to do
so to ensure relevant evolution and maximum utility.
3
Reg v. Preddy [1996] AC 815.
4
See section 133 Proceeds of Crime Law 2008 (Cayman Islands) and section 327 Proceeds
of Crime Act 2002 (UK).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 2 / Date: 9/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
to “transfer” the funds to the Cayman Islands. Actually what he is really expressing is
the desire to access to an equivalent amount in the Cayman Islands – which is not the
same thing as transferring the funds.
The individual will establish an account with the bank in the Cayman Islands (“Bank
B”). He will then direct Bank A to lodge funds into his account in Bank B and this is
effected by the individual extinguishing the chose action between him and Bank A.
Bank A then creates a debtor/creditor relationship with Bank B and then Bank B
creates a debtor/creditor relationship with the individual. There has effectively been a
contemporaneous extinguishing and creation of choses in action of the same value
which gives the impression that the funds have been “transferred” (the legal sleight of
hand). This is also typical of legal offshore transactions.
The reality is that all the offshore Financial Crime Unit (FCU) has access to is the
evidence of the creation of a chose in action between Banks A and B (if they are lucky)
and the creation of the chose in action between Bank B and the individual. The source
of the funds is not known and the suspicion only arises by virtue of the creation of the
contract between the individual/entity and Bank B and the legal duty of disclosure by
Bank B to the regulating authority that the transaction is not in accordance with the
customer’s profile. What is often forgotten is that it is not an offence for a customer to
deposit funds contrary to his usual profile. This is not merely semantics because when
provided with intelligence the FCU has to decide what next to do.
Where the funds are truly the proceeds of crime it is common for beneficial
ownership of the funds to be hidden. For example, how often is it the case that an
offshore registered corporation is involved in the trafficking of illicit drugs in a NOJ, let
alone in an offshore jurisdiction? It is always a corporeal being whose name may never
be seen on a financial transaction or record.
The Cayman Islands has an interesting power in section 192 Criminal Procedure
Code (2014 Revision) that goes a long way to overcoming the beneficial ownership
hurdle. Section 192 provides:
192. (1) Any court may order the seizure of any property which there is reason to believe has
been obtained by or is the proceeds or part of the proceeds of any offence, or into which the
proceeds of any offence have been converted, and may direct that the same shall be kept or
sold and that the same, or the proceeds thereof if sold, shall be held as such court directs until
some person establishes a right thereto to the satisfaction of such court. If no person
establishes such a right within twelve months from the date of such seizure, the property or
the proceeds thereof, shall vest in the Financial Secretary for the use of the Islands and shall
be disposed of accordingly.
Therefore, this single section has the potential of overcoming many of the barriers
associated with offenders, who whilst never entering the offshore jurisdiction, abuse
their privacy laws in a bid to avoid confiscation by hiding beneficial ownership. There
is also the added benefit to the Cayman Islands of being able to confiscate and keep the
funds where a lawful claim is not made.
Surprisingly, however, this is a provision which is rarely used in preference to Part
III of the Proceeds of Crime Law 2008 which has the higher threshold requirement of:
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. There is not a separate wire transfer facility for legitimate and unlawful
transactions. The bulk of wire transfers are automated and are legitimate.
2. Even before the popularity of wire transfers, historically, it was not illegal to
carry large amounts of cash across borders.
3. These days, funds for large transactions are transferred electronically so a fair
question an offshore financial investigator might ask is: “How can you tell the
difference between a clean and dirty wire transfer?”
4. In view of the strict disclosure regimes in NOJs, why can’t an offshore bank rely
on the due diligence of the supposed highly regulated bank from the NOJ to have
sent clean funds?
5. How often does part of a request for mutual legal assistance include a disclosure
that a bank in the requesting NOJ has been prosecuted for facilitating the
movement of funds to the offshore jurisdiction?
6. If the NOJ cannot prosecute or obtain confiscation orders in its home jurisdiction,
why does it believe that it would be any easier in the offshore jurisdiction?
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
5
See sections 4 and 5 of the Confidential Relationships (Preservation) Law (2009 Revision)
(Cayman Islands).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Regardless of into which category it falls, the domestic offshore policing agency will
invoke its investigative resources to identify and interrogate domestic suspects in the
same fashion as any police force would throughout the world. It will issue warrants,
obtain orders and seize property in accordance with its domestic laws. To obtain these
remedies or ancillary orders there must be evidence. This is rarely a concern in a
domestic investigation because, when it comes to evidence, the police know what they
have and what they are likely to get. They can swear on information in the genuine
belief that they have full control and can honour any undertaking that they are giving to
a court. The systems of justice in which they operate are also comforted by the
knowledge that if the courts are misled there will be real consequences. Most
importantly, when it comes to assessing the viability of an investigation and ultimately
whether to prosecute, they are in a position to know and address the variables.
The model can be quite simple when investigating domestic financial crime:
6
See Part IV Proceeds of Crime Law 2008 (Cayman Islands).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
3. If the answer is yes, they will formulate a plan or strategy and commence the
investigation whilst continually monitoring the public interest element, progress
and impact on resources.
4. Police may even seek assistance from their prosecuting agency on the merits of
the investigation and what assistance they may need to progress it to prosecution.
5. They will immediately start gathering evidence to meet their local code for
prosecution7 and, until the evidence reaches the level of a realistic prospect of
conviction, they will not lay a charge.8
6. During the process, the police will assess whether they meet relevant statutory
tests to seize or restrain property.9 The court will undoubtedly set a review
timetable in place which ensures the prompt investigation of the offences.
7. One must never forget that there is a presumption of innocence in relation to any
suspect; therefore, the proverbial “lap of honour” should not be run after only
successfully securing a first instance restraining order. The real investigation work
is yet to come.
8. In some jurisdictions, suspects may have access to restrained funds for legal
expenses; in others they may not,10 which can affect the issue of level playing
fields and human rights.11 It is worthy of note at this juncture that a single request
for assistance from a NOJ can wipe out the annual budget for an offshore
jurisdiction which quite often does not have a system of taxation to fund complex
financial investigations.12
9. Police will then assess whether they need assistance from other jurisdictions and
the timetabling implications it will have on their investigation. They will also
assess the consequences of the non-arrival of international evidence in the context
of whether they should continue with any investigation or restraint.
10. Once the investigation is exhausted the police are in a position to review whether
there is a realistic prospect of conviction and proceed to charge. If not, the
investigation will stop until evidence is forthcoming and, of course, any property
restrained will most likely be released.
11. Assuming that the police have formed a view that there is sufficient evidence to
charge and a realistic prospect of conviction, the brief is forwarded to the relevant
prosecuting agency, which often operates constitutionally independently13 and has
the final call on whether to prosecute. It is dangerous for police not to properly
7
Code for Crown Prosecutors of England and Wales http://cps.gov.uk/publications/code_
for_crown_prosecutors/introduction.html. Whilst not formally replicated in all jurisdictions, the
philosophy is still followed in most common law jurisdictions.
8
ibid at paragraph 4.4.
9
See s. 192 Criminal Procedure Code (Cayman Islands), Part III Proceeds of Crime Law
2008 (Cayman Islands).
10
s. 45(4) Proceeds of Crime Law 2008 (Cayman Islands).
11
See schedule 1 of the Human Rights Act 1998 (UK).
12
Office of the Auditor General Cayman Islands “Financial and Performance Reporting:
year ending 30 June 2014” which shows an annual budget of just over US$3.5 million for the
prosecution function of the Office of the Director of Public Prosecutions.
13
s. 57(4) of the Constitution of the Cayman Islands 2009.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
consider this from the outset as considerable expenditure may be outlaid only to
have the prosecuting agency not proceed on public interest grounds.14
The issues for the police are relatively simple and require a balancing of resolve,
evidence and public interest. Full control of the investigation lies with the domestic
jurisdiction. When it comes to policing domestic financial crime, it is rare for offshore
jurisdictions to need the assistance of a NOJ.
14
Paragraphs 4.7–4.12 Code for Crown Prosecutors of England and Wales.
15
See s. 133 Proceeds of Crime Law 2008 (Cayman Islands).
16
See Criminal Justice (International Cooperation) Law 2004 (Cayman Islands).
17
See section 1 Fraud Act 2006 (UK).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
RESOURCING
Offshore jurisdictions, unlike many of their onshore counterparts, do not have the
resources that come with funding through taxation and economies of scale.
Taking a typical jurisdiction like the United Kingdom, one can see an infrastructure
that not only has the budget of a highly taxed population but also many specialist
departments charged with limited mandates, which can never be duplicated in offshore
jurisdictions. Often these NOJ operational budgets exceed the entire budget for the
considerably smaller offshore prosecution agency.
The difficulty, however, becomes even more apparent when what are being breached
are basic human moral values that require any society or community to intervene via
the rule of law. Having said that, the financial cost is real and has a minimum threshold
regardless of in which jurisdiction the issue arises.
It is therefore imperative that when considering the role of policing in offshore
jurisdictions, requesting nations must assess the following:
18
Many jurisdictions do not define fraud but would consider various other offences relating
to dishonesty as equivalent.
19
Sections 4 and 5 Confidential Relationships (Preservation) Law (2009 Revision) (Cayman
Islands).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
14. What would be your expectations in relation to a requesting nation if the same
request were made of you?
15. If the circumstances were reversed, would you be able to lawfully assist in the
same fashion as being requested by you?
It is not satisfactory to simply say that there will be a sharing arrangement when
proceeds are recovered because the costs of policing and investigation are not
dependent on outcome.
20
For example, it is the duty in the international community for all countries to work
together to overcome the scourge of economic crime.
21
Kevin L. Stephenson et al. “Barriers to Asset Recovery: An Analysis of the Key Barriers
and Recommendations for Action” Star Initiative Barriers studies recommendation 2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
least the evidence that would be necessary to secure a conviction in the jurisdiction
where the predicate offence occurred.
Some unhelpful requests of offshore jurisdictions appear in the following style:
Therefore the first issue that needs to be resolved is how much information and
evidence is the requesting jurisdiction prepared to give?
The second is, assuming that you are able to secure the seizure of the property, how
do you anticipate that the suspect will retaliate. What is the evidence that s/he would
offer to defeat such a claim. Is there a corporate veil and how is it proposed to be
pierced? If the funds were onshore what hurdles would you anticipate and how do you
intend to assist the offshore jurisdiction to overcome this problem?
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 11 / Date: 9/9
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
is considerable incentive in ensuring that the more proactive investigators are discour-
aged from being vigilant with investigation. A strategic removal of an investigator can
undo years of investigation and may even see the end of the prosecution and/or
confiscation.
The time is fast approaching where appointments of financial investigators and
prosecutors should be in NOJs and not the offshore jurisdictions. Many offshore
jurisdictions brief counsel from outside the jurisdiction for serious domestic trials and
investigations; however, this can be a costly exercise which the requesting NOJ should
seriously consider financing.
CONCLUSION
The most attractive features of simplicity and remoteness, both geographically and
legally, of offshore jurisdictions also double as their Achilles’ heel when it comes to
policing financial crime. It is important to note that whilst the world must unite to
defeat this scourge on international society, it is just not possible to expect offshore
jurisdictions to be responsible for the policing of financial crime.
Domestically, whilst on a smaller scale, they face the same challenges as NOJs and
those third world nations that attract the interest of various international organizations.
The time has come to concentrate less on criticizing what offshore jurisdictions have
not done to concentrating on how it is possible for offenders to send illicit funds
offshore.
The hurdles and barriers for investigators and prosecutors alike are real and need to
be owned by the world in a structured and organized fashion.
There has been considerable academic and policy discourse: the time has well and
truly come to redirect some real resources to the front.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 56 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
To protect consumers and investors, various federal and state agencies share powerful
tools to enforce the rules and regulations governing the banking and securities
industries and their practices. This chapter introduces the main authorities responsible
for the creation and civil enforcement of banking and securities laws, canvasses the
wide range of regulated conduct, and provides examples of how civil enforcement
authority is employed and the consequences of civil enforcement actions.1
I. SECURITIES REGULATION
Securities regulation refers to the body of rules, regulations, and laws that govern
securities transactions, including both the marketing of securities and the reporting and
disclosure obligations of issuers of US-traded securities. A security is a complex
investment instrument that represents an interest in something else, such as a company.
Millions of ordinary US citizens invest their savings in securities. Unfortunately,
securities transactions are susceptible to fraud and manipulation. Consumer protection,
along with the promotion of overall stability, fairness, and confidence in the securities
markets, are the primary goals of securities regulation.
Securities are regulated at the federal and state levels, and by self-regulatory
organizations (“SROs”), the largest of which is the Financial Industry Regulatory
Authority (“FINRA”). At the federal level, the Securities and Exchange Commission
(“SEC”) is primarily responsible for the civil enforcement of securities laws. At the
individual state level, each state’s attorney general is primarily responsible for
enforcing that state’s securities laws.
Federal securities laws are comprised of a variety of Acts and their amendments. The
primary Acts are the Securities Act of 1933 (the “Securities Act”) and the Exchange
Act of 1934 (the “Exchange Act”). The Securities Act primarily regulates the
distribution of new securities. It includes general antifraud provisions barring material
omissions or misrepresentations in connection with the offer or sale of securities. In
addition, the Securities Act includes reporting and disclosure requirements for secur-
ities issuers. The Exchange Act, which led to the SEC’s creation, is more broadly
1
Responsibility for criminal enforcement falls to the Department of Justice (“DOJ”).
691
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 1 / Date: 14/10
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
focused than the Securities Act, and regulates the trading of existing securities as well
as the activities of securities brokers and securities exchanges. The Exchange Act’s
protections extend to both sellers and purchasers of securities. Like the Securities Act,
it includes a general prohibition on fraud and material misstatements or omissions in
connection with the purchase or sale of a security as well as reporting and disclosure
requirements. It also includes provisions addressing stock manipulation, improper
trading while in possession of material non-public information (known as insider
trading), and misstatements in SEC filings.
In parallel to these Acts, FINRA writes and enforces rules and regulations that
govern all US brokerage firms and their registered representatives. Every US state has
enacted its own securities laws, commonly referred to as “blue sky” laws, which vary
widely in their terms and scope. Many blue sky laws predate federal securities laws, as
they were passed in the years leading up to the Great Depression as a response to the
increasing numbers of ordinary investors losing money in the financial markets.
Following the 1929 market crash, in 1934, the SEC was created to help restore public
faith in the markets. It oversees the securities industry’s key participants, including
exchanges, broker-dealers, investment advisers and mutual funds, and enforces regu-
lations that require the disclosure of material financial information in connection with
the offer and sale of securities.
The SEC’s Enforcement Division, one of five SEC divisions, investigates and civilly
prosecutes securities law violations, bringing hundreds of civil actions each year. The
SEC’s civil enforcement actions may result in court imposed injunctions that bar future
activity, including the debarment or suspension of individuals from acting as corporate
officers or directors of SEC-regulated companies, monetary penalties, and disgorge-
ment of profits.
In addition to civil enforcement actions, the Enforcement Division may also bring
administrative actions against regulated persons, which are heard by an Administrative
Law Judge. Administrative proceedings may result in cease-and-desist orders, disgorge-
ment of profits, debarment or suspensions from securities-related employment, and
licensing revocations or suspensions.
b. FINRA
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Created in 1913, the Federal Reserve is the central banking system of the US. Among
other things, it conducts US monetary policy and maintains the stability of the US
banking system. The Federal Reserve also supervises state-chartered banks, bank
holding companies, foreign branches of US national and state banks, and state-
chartered branches and agencies of foreign banks.
The OCC, a bureau of the US Department of the Treasury, regulates and supervises all
nationally chartered banks as well as the federal branches and agencies of foreign
banks. It carries out its supervisory responsibilities by conducting bank examinations;
reviewing and approving bank licensing applications; issuing rules, regulations, and
interpretive guidance; and taking enforcement actions against banks that do not comply
with applicable laws and regulations. The OCC may remove officers and directors of
financial institutions under its control, enter into agreements with institutions to change
their banking practices, issue cease and desist orders, and assess civil monetary
penalties.
FinCEN is also a bureau of the US Department of the Treasury. FinCEN protects the
US financial system from money laundering by implementing, administering, and
enforcing the Bank Secrecy Act (“BSA”), the federal anti-money laundering and
counter-terrorism financing statute. Among other things, FinCEN collects, analyzes,
and disseminates financial intelligence to US enforcement authorities and to their
international counterparts. FinCEN enforces the BSA by issuing regulations for US
financial institutions and imposing civil penalties, suspensions, and debarments from
the industry.
f. State Regulators
Except where federal law preempts a specific area of the law, states have their own
banking and securities laws, which are enforced by state regulators and law enforce-
ment agencies.
g. Private Individuals
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
rights of action increases the accountability of bad actors and can also provide
regulators and enforcement authorities with important investigatory leads.
i. Unregistered broker-dealers
The overwhelming majority of the liability provisions included in the securities laws
focus on disclosure and registration requirements. Entities or individuals that engage in
the business of effecting transactions in securities may qualify as broker-dealers under
the securities laws. Broker-dealers must register with the SEC, which requires, inter
alia, filing a registration, or “BD” form, hiring staff with qualified securities licenses,
maintaining a minimum net capital, and joining an SRO, like FINRA. Section 15(a)(1)
of the Exchange Act makes it unlawful for any broker-dealer to use the mail or any
other means of interstate commerce, such as the telephone, facsimile, or the internet,
unless the broker-dealer is registered with the SEC.
“Associated persons,” that is, individuals who work for a registered broker-dealer, do
not generally have to register separately with the SEC. However, they must be
supervised properly by a currently registered broker-dealer, have a qualified securities
license, and register with the SRO of which their employer is a member.
In addition to the general antifraud provisions of the federal securities laws discussed
below, broker-dealers must comply with requirements that are designed to maintain
high industry standards. These requirements include, among others, a duty of fair
dealing to customers, an obligation to recommend only investments or investment
strategies that are suitable to a particular customer, a duty of best execution, which
requires a broker-dealer to obtain the most favorable terms available under the
circumstances for customer orders, and a duty to provide customers with certain
confirmation information regarding transactions.
A broker-dealer’s failure properly to register with the SEC can have significant
consequences. For example, in May 2014, the SEC filed charges against a California-
based securities salesman who sold millions of dollars in oil-and-gas investments
without being properly registered with the SEC as a broker-dealer. The salesman,
Behrooz Sarafraz, agreed to settle the SEC charges by paying over US$22 million,
which included disgorgement of his commissions, prejudgment interest, and a penalty.2
2
“SEC Charged Unregistered Securities Salesman for Selling Millions of Dollars in
Oil-and-Gas Investments” (US Securities and Exchange Commission, 15 May 2014) <http://
www.sec.gov/News/PressRelease/Detail/PressRelease/1370541837538#.U87PuFa9-0t> accessed
29 July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
rule prohibits fraudulent devices and schemes, misstatements and omissions of material
facts, and acts and practices that operate as a fraud or deceit.3
To establish a Rule 10b-5 fraud claim, the SEC must show (i) a manipulation or
deception through a misrepresentation or omission, (ii) materiality, (iii) that the
misrepresentation or omission was made in connection with the purchase or sale of a
security, and (iv) scienter.
The SEC recently secured a judgment in a Rule 10b-5 action against Fabrice Tourre,
a former Goldman Sachs Group vice president. The SEC accused Tourre of deceiving
investors through misstatements and omissions of key facts relating to a synthetic
collateralized debt obligation called Abacus 2007, a highly complex security linked to
the collapse of the mortgage market. Specifically, the SEC claimed Tourre concealed
from investors the information that the same hedge fund involved in putting the deal
together was betting against it. A jury found Tourre liable for defrauding investors and
ordered him to pay more than US$850,000.4 Goldman Sachs reached a related
settlement with the SEC and agreed to pay US$550 million, the SEC’s largest-ever
penalty paid by a Wall Street firm.5
3
FINRA Rule 2120 parallels SEC Rule 10b-5, prohibiting members from using manipu-
lation, deception, or fraud in the purchase or sale of a security. The SEC and FINRA therefore
have concurrent enforcement authority over such fraudulent conduct.
4
SEC v Tourre, No 10-cv-03229 [SDNY 2013].
5
Consent, SEC v Goldman Sachs & Co, No 10-cv-3229 [SDNY 14 July 2010] <http://
www.sec.gov/litigation/litreleases/2010/consent-pr2010-123.pdf> accessed 29 July 2014.
6
“SEC Enforcement Actions, Insider Trading Cases” (US Securities and Exchange Com-
mission) http://www.sec.gov/spotlight/insidertrading/cases.shtml> accessed 29 July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 5 / Date: 9/9
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
that he turned down a US$2 million settlement offer by the SEC while spending US$12
million in legal fees for his defense.7
7
“Billionaire Mark Cuban Takes on the SEC” (The Washington Post, 20 November 2013)
<http://www.washingtonpost.com/business/economy/billionaire-mark-cuban-takes-on-the-sec/20
13/11/20/2b67134a-4a7c-11e3-be6b-d3d28122e6d4_story.html> accessed 29 July 2014.
8
The FCPA is also enforced criminally by the DOJ. Criminal enforcement of the FCPA is
broader than civil enforcement. In addition to US issuers, criminal enforcement extends to US
domestic concerns, which include US citizens, nationals, residents or entities organized under
the US laws or with their principal place of business in the US (15 USC §78dd-2). In addition,
any person acting within the territory of the US may be subject to criminal enforcement of the
FCPA (15 USC §78dd-3).
9
SEC Cease and Desist Order, In the Matter of Hewlett-Packard Company, Release No
71916 (9 April 2014).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
b. FINRA
FINRA pursues more enforcement actions than the SEC, but has levied significantly
less in penalties. For example, in 2013, FINRA pursued 1,535 enforcement actions
compared to the SEC’s 686; however FINRA imposed sanctions of only US$74.5
million compared to US$3.4 billion received by the SEC.10 In context, these numbers
are unsurprising. Where FINRA and SEC jurisdiction overlap, the SEC tends to take on
the most serious fraud-based cases, many of which are referred by FINRA. These cases
generally result in higher penalties. On the other hand, FINRA is more focused on
disciplinary actions that result in bars or suspensions for brokers. In 2013, for example,
FINRA barred 429 brokers and suspended 670.11
Some examples help to understand FINRA’s focus. In one recent disciplinary action,
FINRA barred a Florida broker, Jeffrey Rubin, from the securities industry for making
unsuitable recommendations to his customer, a National Football League (“NFL”)
player, to invest in illiquid high-risk securities issued in connection with a now-
bankrupt casino in Alabama. The customer lost US$3.5 million. The broker also
recommended the investment to 30 other NFL players, who collectively lost approxi-
mately US$40 million. In exchange for recommending the investment, Rubin received
a 4 percent ownership stake in the casino and a US$500,000 referral fee. The matter
was settled with Rubin consenting to the entry of FINRA’s findings without admitting
or denying the charges.12
In another recent action that resulted in a settlement, FINRA ordered David Lerner
Associates, Inc. (“DLA”), a New York firm, to pay approximately US$12 million in
restitution to affected customers who purchased shares in Apple REIT Ten, a non-
traded US$2 billion Real Estate Investment Trust that DLA sold. FINRA alleged that
DLA targeted unsophisticated and elderly investors, that it failed to perform adequate
due diligence to determine whether the investment was suitable, and that it used
misleading marketing materials that presented misleading and incomplete performance
results. FINRA also fined DLA’s founder, President and CEO, David Lerner,
US$250,000 and suspended him from the securities industry for one year, followed by
a suspension from acting as principal for two years, because he personally made false
claims regarding the investment. FINRA also sanctioned DLA’s head trader, William
Mason, US$200,000 and suspended him from the securities industry for six months.
Finally, FINRA required DLA to retain independent consultants to review and propose
10
“FINRA Weighs Tougher Stance” (The Wall Street Journal, 19 June 2014) <http://
online.wsj.com/articles/wall-street-watchdog-finra-under-pressure-to-toughen-sanctions-1403219
509> accessed 29 July 2014.
11
Id.
12
“FINRA Bars Florida Broker for Unsuitable Recommendations and Unapproved Secur-
ities Transactions Involving 31 NFL Players” (FINRA 7 March 2013) <https://www.finra.org/
Newsroom/NewsReleases/2013/P218417> accessed 29 July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
changes to its supervisory systems and training and DLA agreed to revise its
advertising procedures.13
13
“FINRA Sanctions David Lerner Associates $14 Million for Unfair Practices in Sale of
Apple REIT Ten and for Charging Excessive Markups on Municipal Bonds and CMOs” (FINRA
22 October 2012) <http://www.finra.org/Newsroom/NewsReleases/2012/P191729> accessed 29
July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
The BSA (codified as 12 USC §1818(s) and 12 CFR §21.21) requires US financial
institutions to develop and implement a system of controls designed to detect and
prevent money laundering. Specifically, the BSA requires financial institutions to make
and keep records of certain financial transactions, including cash purchases of
negotiable instruments and cash transactions exceeding US$10,000 (daily aggregate
amount), and to report suspicious activity indicative of money laundering, tax evasion,
or other criminal activities.
Title III of the Uniting and Strengthening America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism Act of 2001 (known as the USA
PATRIOT Act) enhances law enforcement agencies’ ability to investigate and prosecute
international money laundering and terrorist financing. The Act strengthens existing
AML requirements for financial institutions, with an emphasis on bolstering communi-
cation between law enforcement agencies and financial institutions; subjecting foreign
jurisdictions, foreign financial institutions, and certain types of vulnerable accounts to
specialized scrutiny; and strengthening record keeping and reporting requirements. Of
particular interest for financial institutions is section 311, which identifies jurisdictions
and financial institutions of “primary money laundering concern” for which enhanced
due diligence and monitoring controls are required.
Broker-dealers are subject not only to BSA requirements, but also to FINRA Rule
3310, which includes additional standards for broker-dealer AML compliance pro-
grams. Specifically, Rule 3310 requires firms to develop and implement a written AML
compliance program that is approved in writing by a member of senior management
and reasonably designed to achieve and monitor the firm’s ongoing compliance with
the requirements of the BSA and the implementing regulations promulgated thereunder.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
14
Deferred Prosecution Agreement, US v HSBC Bank USA, NA, No 12-CR-763 (EDNY
2012) <http://www.justice.gov/opa/documents/hsbc/dpa-executed.pdf> accessed 29 July 2014.
15
A “deferred prosecution agreement” or “DPA” is a mechanism by which an entity can
avoid prosecution for violations of law by promising to fix the problem that led to the violations.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
US$1.256 billion. In addition, HSBC paid a fine totaling US$665 million to the OCC,
the Federal Reserve, and the Treasury Department.
In February 2014, FINRA assessed an US$8 million fine against Brown Brothers
Harriman & Co (“Brown Brothers”) for AML compliance failures, including the failure
to monitor and detect suspicious activity related to penny stock transactions (stocks that
trade at low prices outside the major exchanges and that may be easily manipulated by
fraudsters).16 The fine represents the highest fine ever levied by FINRA. In another
unprecedented action, FINRA also found the former Global AML Compliance Officer
of Brown Brothers responsible for the AML compliance program failures and imposed
a fine of US$25,000 and a one-month suspension from engaging in business activities.
c. TD Bank, NA
In September 2013, FinCEN, the OCC, and the SEC brought an enforcement action
against TD Bank, NA (“TD Bank”) under the BSA for failing to report almost
US$1 billion in suspicious money-laundering transactions. FinCEN and the OCC
assessed a combined fine of US$37.5 million against TD Bank.17 The SEC assessed a
separate fine against TD Bank for US$15 million. FinCEN found that TD Bank’s failure
to implement proper training for its employees as part of its AML compliance program
contributed to TD Bank’s failure to detect and timely report the suspicious activity.18
d. JPMorganChase, NA
A DPA may require an entity to submit to a monitor who is charged with overseeing the entity’s
efforts to fix the problem. A DPA is often accompanied by the payment of a fine and an
acknowledgement of wrongdoing.
16
Brown Brothers Harriman & Co and Harold A Crawford, FINRA Letter of Acceptance,
Waiver, and Consent, No 2013035821401 (30 January 2014). <http://www.finra.org/web/groups/
industry/@ip/@enf/@ad/documents/industry/p443448.pdf> accessed 29 July 2014.
17
Jonathan Stempel, “TD Bank to Pay $52.5 Million in U.S. Settlements over Ponzi
Scheme” (Reuters, 23 September 2013) <http://www.reuters.com/article/2013/09/23/us-tdbank-
settlement-ponzi-idUSBRE98M10Y20130923> accessed 28 July 2014.
18
Press Release (FinCEN, 23 September 2013) <http://www.fincen.gov/news_room/nr/html/
20130923.html> accessed 29 July 2014.
19
JPMorgan Chase Bank, NA, Deferred Prosecution Agreement (6 January 2014) <http://
www.justice.gov/usao/nys/pressreleases/January14/JPMCDPAPR/JPMC%20DPA%20Packet%20
(Fully%20Executed%20w%20Exhibits)%20-%20downloaded%20from%20online.pdf> accessed
29 July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 11 / Date: 9/9
JOBNAME: Rider PAGE: 12 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CONCLUSION
As business becomes more global and financial institutions expand their operations into
new emerging markets, financial institutions face greater regulatory scrutiny under the
banking and securities laws. Such increased scrutiny, it may be argued, is necessary to
protect the investing public and maintain confidence in the US markets, especially as
the securities and banking markets become more accessible to an increasing number of
participants.
On the other hand, the current regulatory environment in the US encourages financial
institutions to minimize their risk of violating AML and securities laws. One way
financial institutions attempt to mitigate this risk is by developing more elaborate and
costly compliance programs. For example, HSBC’s compliance costs have increased
exponentially since its 2012 settlement with the government, and CitiBank and
JPMorgan have also indicated a significant increase in compliance costs.20
Financial institutions may protect themselves from enforcement actions by refusing
to do business with customers from countries or particular industries or sectors
perceived to be “high risk.” Not only will this “de-risking” likely result in the closing
off of access to the US banking and securities markets for large swaths of global
customers, but it also forces these customers to turn to banking and securities markets
outside the US that may not be as secure or protective. Foreign customers are thereby
exposed to predatory risks and manipulative practices that the US laws, and the broad
civil authority to enforce these laws, aim to eradicate.
20
Fitch Ratings (5 April 2013) <http://www.justice.gov/usao/nys/pressreleases/January14/
JPMCDPAPR/JPMC%20DPA%20Packet%20(Fully%20Executed%20w%20Exhibits)%20-%20
downloaded%20from%20online.pdf> accessed 29 July 2014.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 57 /Pg. Position: 12 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1. INTRODUCTION
Many of those unfamiliar with asset recovery assume that civil actions have little
relevance in the world of financial crime. They assume that the recovery of assets is
only carried out through cooperation of interested prosecutors bringing anti-money
laundering actions in support of some foreign nation’s claim over assets in their
jurisdiction.
While international cooperation continues to improve, it remains the case that some
jurisdictions are slow or unwilling to act on mutual legal assistance requests. The speed
and diligence in pursuing any criminal claim is also out of the victim’s hands, unless of
course the victim is a state. Civil actions can be the most effective, and sometimes the
only, way to recover stolen assets.
The most powerful weapons in the litigator’s armoury are freezing and search orders.
Such orders are only known in the common law (excluding the United States), although
in civil law countries, there may often be equally effective remedies.
Many fraudsters rely upon international financial centres to dissipate and hold their
ill-acquired wealth. Many of those, particularly Cayman Islands, British Virgin Islands
(BVI), Channel Islands, Isle of Man, Hong Kong, Singapore and Dubai International
Finance Centre (DIFC), are common law jurisdictions, broadly adopting and adapting
the law of England and Wales.
As such, this chapter focuses on English law. As civil law jurisdictions also play a
significant role, French, German and Dutch law are also referred to.
The chapter first discusses a number of practical issues arising in the tracing of assets
– that is the exercise in finding where they are or what they have become, rather than
the equitable remedy of tracing. It then discusses matters to consider when seeking to
freeze them.
1
Any views expressed in this chapter are personal. The authors thank Aurelie Kahn for
providing French law assistance
703
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the substantive claim leads to a judgment in their favour. It may well also put the
defendant under significant financial pressure.
However, it can end badly if the application is made in undue haste (as well as after
undue delay), damaging the prospects of recovery in the substantive claim and leading
to damages claims and costs orders against the claimant. The courts are mindful that
while freezing orders are necessary to make civil recovery effective, they are also
misused by litigants seeking to disadvantage a defendant for the wrong reasons.
Self-evident as it may appear to seasoned practitioners, it is vital to have an
understanding from the outset of where the misappropriated funds are likely to be
found. This is where asset tracing comes into play. To begin with, the claimant would
use the factual evidence they already possess (such as emails or other documents left
behind in the wrongdoer’s office) to form an idea as to where to start. Most fraudsters
were at one stage in a position of trust, and often leave behind a documentary trail – it
is rare to be in a position of trust and generate no paper. The claimant would then need
to enlist the help of appropriate investigators (international lawyers, forensic account-
ants and private investigators) to find out what they can from available public records.
Witnesses may also help. In any case, the claimant will need to put together a rough
picture of (1) what was misappropriated and (2) how.
Of course, much of the information and evidence needed to prosecute a fraud case is
not easily found or publically available. It will not take long to hit the wall of nominee
shareholders and opaque trusts. The civil courts can be particularly effective in
allowing access to this information.
For instance, claimants can apply for a third party disclosure order (formerly
‘Norwich Pharmacal’ orders).2 These orders require a third party, who has facilitated
wrongdoing (whether innocently or not) to disclose information that will assist in
identifying the wrongdoer and allow assets to be traced.3 Banks through which
misappropriated funds are believed to have passed are the obvious target for these
orders. They are commonly used to obtain disclosure of a fraudster’s bank account
details – information ordinarily protected by a bank’s duty of confidentiality.
Claimants must demonstrate compelling evidence of fraud, the need for urgent
action, focused disclosure, and notice.4 While these orders are relatively rare, in a clear
case of fraud they should be relatively straightforward to obtain. They are particularly
helpful as a pre-freezing injunction remedy; especially when sought in combination
with gagging orders so the defendant is not tipped off.
The claimant will also be able to access a raft of (hopefully) detailed and helpful
information about the defendant’s asset position through the disclosure order, which is
almost always obtained alongside a freezing injunction. In some cases, claimants can
seek the more extreme measure of a search order. This is discussed further in sections
3.6 and 4.1 below.
The importance of developing a detailed understanding of where and in what form
the misappropriated assets lie cannot be understated. While claimants are often
2
CPR 31.18.
3
Norwich Pharmacal Co v Customs and Excise Commissioners [1974] AC 133.
4
See Rugby Football Union v Consolidated Information Services Limited [2013] 1 All ER
928 for a recent example.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 2 / Date: 20/7
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
5
It is named after Mareva Compania Naviera SA v International Bulkcarriers SA [1975] 2
Lloyd’s Rep 509, but was first granted months earlier in Nippon Yusen Kaisha v Kara Georgis
[1975] I WLR 1093.
6
Fourie v Le Roux [2007] 1 WLR 320 [32].
7
CPR 25.1(1)(f). The American Cyanamid test for interim injunctions must also be
satisfied.
8
A freezing order upheld at the return hearing will remain in place throughout the litigation
unless discharged earlier.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
‘convenient’ forum – there are usually a number of courts that may have jurisdiction.
Not all will grant freezing orders.
Likewise, while it is not necessary (and indeed is often impossible) for the tracing
exercise to be entirely complete, it would normally be unwise to commence action
without having made significant efforts to do so.
It can be challenging to prove that there is, objectively, a real risk or ‘solid likelihood’
of dissipation of assets.9 It is rare in practice to find direct evidence that a respondent
is about to dissipate his assets (for example, that he has put key real estate up for an
urgent auction). Generally, the risk of dissipation is intrinsically linked to the nature of
the claim – fraud. Meaningful evidence of dishonesty will generally suffice,10 however,
the court will carefully scrutinise whether the evidence justifies an inference that assets
will likely be dissipated.11
The court will consider, inter alia, the nature of the assets (the more liquid, the easier
to dissipate); the ease with which enforcement over the assets can take place; and any
evidence of the respondent moving assets out of the jurisdiction or manipulating assets
through sophisticated corporate structures and international accounts.12 The respond-
ent’s conduct is key. Applicants should consider whether the respondent has previously
evaded service, refused to attend for cross-examination, perjured themselves or
otherwise failed to comply with court process.13 The aim is to demonstrate the
respondent has a general propensity to dissipate assets.14
As freezing orders are generally obtained ex parte, the court places a great deal of trust
in the applicant to tell the full story – not just the facts that support its case. The
applicant must make full and frank disclosure of any matters relevant to the application,
including those harmful to its case. This includes the arguments and facts likely to be
relied upon by the defendant (the applicant can of course counter these points). This is
a very important part of the application. It must be dealt with clearly and comprehen-
sively.
Full and frank disclosure is an area where freezing orders may come undone.
Applicants should consider whether the respondent has previously been investigated for
and cleared of any wrongdoing; whether, in the case of alleged corruption by a
government official, the defendant is likely to argue that there was government
knowledge of the alleged corruption, or political motivation for the allegations made;
9
Thane Investments Ltd v Tomlinson [2003] EWCA Civ 1272.
10
Rosen v Rosen [2003] EWHC Civ 309.
11
Ibid, [28].
12
Stronghold Ins v Overseas Union [1996] LRLR 13.
13
Thane Investments v Tomlinson [2003] EWCA Civ 1272.
14
Gorunova v Berezovsky [2013] EWHC 76 (Ch).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
and whether some aspect of the respondent’s background or character would militate
against any alleged dishonesty.
Applicants should consider their own conduct, including whether evidence has been
obtained improperly. The extent of the applicant’s investigations may also be scrutin-
ised – the duty of disclosure covers not only the facts known to the applicant, but also
additional facts that should have been known had proper enquiries been made. This can
be a difficult area for a party’s lawyer to investigate.
If it transpires that full and frank disclosure was not made, there is a presumption
that the court will set aside the freezing order.15 The court will, however, bear in mind
the need to act proportionately.16 Freezing orders are known to have been discharged
where the applicant relied upon improperly obtained evidence; failed to identify
weaknesses in its own case; and/or failed to address arguments likely to have been
raised by the respondent.17 This has often resulted in significant adverse cost awards,
granted on an indemnity basis.18
Clearly, this duty can provide fertile grounds for challenge by a defendant.
Applicants faced with a challenge should consider whether the discharge application is
being made for tactical purposes – courts are very much alive to this.19 Regardless of
tactics, applicants should carefully consider the basis of the challenge, cure any errors
and explain how they arose.
The freezing order will generally cover the value of the claim together with likely legal
costs and interest.20 The defendant can deal with any surplus assets as he sees fit. Note
that the court will want evidence of all of the respondent’s known assets – this is where
the tracing exercise mentioned above comes into its own.
The freezing order’s purpose is to prevent the respondent from evading the court
process by unjustifiably disposing assets – thus it will not prevent the respondent from
legitimately spending money, and is not intended to act as security for the claim and/or
costs. Respondents can spend money on ordinary living expenses (to be construed
subjectively by looking at the respondent’s lifestyle)21 and legal costs (for the instant
claim and for others brought or defended by the respondent),22 carry out ordinary
business transactions and pay debts when they fall due. However, if the applicant can
15
Brinks MAT v Elcombe [1988] 1 WLR 1350. This is so even if the omitted fact would not
have affected the court’s view on the merits.
16
Memory Corporation v Sidhu [2000] 1 WLR 1443.
17
See e.g. Franses v Somar Al Assad and Ors [2007] EWHC 2442 (Ch).
18
Ibid.
19
Worldcom International v Home Communications Ltd (Unreported, 16 September 1998,
Walker J).
20
The quantum can be higher if, for example, the applicant does not know the extent of the
fraud at the time of the application.
21
A v C [1981] QB 961.
22
Halifax v Chandler [2001] EWCA Civ 1750.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
show that the respondent has access to other unfrozen funds from which expenses can
be met, an order may be granted without these exceptions.23
The respondent’s lawyers will quickly consider whether there are grounds for a
variation. The usual arguments are that the sum frozen is too high; the weekly
allowance is insufficient or would be better paid on some other basis; or that a variation
is necessary to allow the respondent to trade effectively. Applicants should be mindful
of this at the outset.
If the defendant has insufficient assets within the jurisdiction, the court can grant a
worldwide freezing order. While these are exceptional orders, they are often granted in
corruption cases.
Since the English court has no jurisdiction over overseas parties, the worldwide order
must be recognised or enforced by the relevant foreign courts to be effective (the court
cannot grant any order without having jurisdiction).24 Not all jurisdictions recognise
English orders and judgments. Many jurisdictions will, however, grant local interim
relief to give effect to an English worldwide freezing order, including the United States
(even though it does not grant such orders itself), Jersey, BVI, Cayman Islands,
Singapore, Hong Kong, Canada, Australia, DIFC and, pursuant to the Brussels
regime,25 Switzerland, Norway, Iceland, Denmark and all EU member states. Enforce-
ment may be granted even if no other relief is sought locally. The claimant will need to
obtain the English court’s consent to commence proceedings overseas, so that the court
can maintain oversight.
The applicant must generally wait until the freezing order is upheld following an
inter partes hearing before seeking overseas enforcement – it is usually difficult if not
impossible to enforce an ex parte interim order overseas.26 Of course, the alternative to
waiting is to seek a freestanding interim injunction overseas, and to put relevant
overseas third parties on notice through a Mareva by letter (discussed below).
There are a number of countries, such as China and Russia, which are not known to
enforce English worldwide freezing orders. It is crucial, therefore, to consider where
the respondent’s assets are located at the outset. Litigants should also be aware that
worldwide freezing orders are not binding on foreign third parties until enforced by
their local court.
Once a bank or other third party within the jurisdiction has been served, they become
under a specific obligation (1) to comply with the freezing order and (2) not to permit
23
See e.g. Parvalorem v Oliveira and others [2013] EWHC 4195 (Ch).
24
It nonetheless remains effective against the defendant.
25
Comprising the Brussels Regulation (Council Regulation (EC) No 44/2001) and the 1988
Lugano Convention.
26
See e.g. Brussels Regulation I, articles 33, 34(2) and 38 and D’Hoker v Tritan Enterprises
Limited [2009] EWHC 948 (QB).
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the respondent to breach it.27 If a third party knowingly assists in the disposal of assets
subject to the freezing order, then like the respondent, it may be in contempt of court.
Claimants can put into place a ‘Mareva by letter’ as a stopgap before a freezing order
is sought. The claimant should inform all relevant institutions (chiefly, the defendant’s
bank/s), by letter, that the defendant is alleged to have committed a wrongdoing. Under
the common law Royal Brunei Airlines v Tan29 principle, if the financial institution
assists the fraudster in committing a further crime or act of money laundering (e.g. by
allowing them to move the money) while under reasonable suspicion of the wrong-
doing, it may be guilty of reckless or dishonest assistance, and liable as an institution.
Banks will therefore generally freeze the defendant’s bank accounts, at least to allow
time for them to do their own investigations. Practitioners should ensure that the letter
gives sufficient cause to render the bank ‘reasonably suspicious’. A well-researched
letter is of course more likely to be effective than a rushed missive. In reputable
jurisdictions, this tool can be particularly effective.
Where there is good reason to believe that assets ostensibly held by third parties in
reality belong to the respondent, the court may grant a freezing order against a third
party.30 This is known as the Chabra jurisdiction,31 useful where, as is often the case,
the fraudster’s affairs are structured through sham trusts, offshore corporate groups or
other opaque vehicles designed to distance the fraudster from the asset. In the authors’
experience it is possible to obtain these orders where there is clear evidence of
collusion, impropriety or participation by the third party.
27
Her Majesty’s Commissioners of Customs and Excise v Barclays Bank plc [2006] UKHL
28.
28
See JSC BTA Bank v Ablyazov & others [2010] EWHC 2352 (Comm) for a good
overview of the process and requirements.
29
[1995] 2 AC 178.
30
TSB Private Bank International SA v Chabra [1992] 1 WLR 213.
31
Ibid.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
A more extreme order that can assist in the tracing and freezing process is the search
order (formerly the ‘Anton Piller’ order).32 They are by their nature intrusive, and allow
a victim of fraud to search an alleged fraudster’s premises to obtain evidence relevant
to the case. The aim is to preserve evidence that a fraudster might otherwise destroy in
an effort to frustrate the case. Refusal to comply will be contempt of court, punishable
by a fine or imprisonment.33
Search orders are not granted lightly. They are invasive – often involving the imaging
of computers and handheld devices to secure relevant evidence – and will immediately
put a defendant on the back foot. Because they are made without notice, as with a
freezing order, the claimant must make full and frank disclosure and provide a
cross-undertaking in damages.
Another extreme tool is the passport order, appropriate where there is a real risk that
the respondent will flee the jurisdiction in an effort to frustrate the court process.34
These orders require the delivery up of the respondent’s passport. They are a potent
tool, particularly where the respondent is an overseas national who cannot return home
during the asset disclosure process. As such, they are not granted lightly.
4.3 Cross-Examination
If the respondent has been evasive or the tracing process unfruitful, the applicant may
choose to seek an order requiring the respondent to attend for cross-examination. The
respondent’s answers will not only assist in shedding further light on the whereabouts
of his ill-gotten gains, but can lead to powerful character and conduct evidence against
him if he refuses to respond or perjures himself.
The claimant can also seek orders preserving property,35 securing a specified fund,36 or
appointing a receiver to hold the defendant’s assets.37
32
CPR 25.1(1)(h). See Anton Piller KG v Manufacturing Processes Ltd [1976] Ch 55 for the
requirements. See also Lock International plc v Beswick [1989] 1 WLR 1268.
33
Contempt may extend to third parties on notice who assist in or permit the breach.
34
Bayer AG v Winter [1986] 1 WLR 497.
35
CPR 25.1(1)(c).
36
CPR 25.1(1)(l). The American Cyanamid test applies. See also Sports Network Ltd v
Calzaghe [2008] EWHC 2566.
37
Senior Courts Act 1981, s 37. The freezing injunction alone must be insufficient and there
must be a measurable risk it will be breached: JSC BTA Bank v Ablyazov [2010] EWCA Civ
1141.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
5. OVERSEAS CASES
Freezing orders are widely granted in common law countries such as Canada, Australia,
Hong Kong, New Zealand, Cayman Islands, Jersey and BVI. Each of these jurisdictions
has been prepared to grant ‘freestanding orders’ – where the only relief sought in that
jurisdiction is a freezing order. Freezing orders have also been granted in numerous
African jurisdictions with common law heritage, including South Africa, Kenya,
Nigeria, Ghana and Botswana.
However, there are many jurisdictions that do not grant freezing orders at all –
including various parts of Asia, the Middle East and some civil law African juris-
dictions. It is noteworthy that the Federal Courts of the United States do not have the
power to grant freezing orders (they can, of course, grant attachment orders over
particular assets within the jurisdiction – see e.g. Deckert v Independence Shares
Corp38). In the 1999 case of Grupo Mexicano de Desarrollo v Alliance Bond Fund,39
the US Supreme Court found that it lacked the power to grant pre-trial freezing
injunctions. It emphasised that England’s adoption of the freezing injunction was a
‘dramatic departure from prior practice’, and that ‘the requirement that the creditor
obtain a prior judgment is a fundamental protection in our debtor–creditor law’.40 The
Court held that it had ‘no authority to craft a ‘nuclear weapon’ of the law’ and that ‘the
debate concerning this formidable power over debtors should be conducted and
resolved where such issues belong in our democracy: in the Congress’.41
The United States has made progress in terms of legislating a power for its courts to
grant freezing orders. In July 2012 (some 13 years after the Grupo Mexicano decision)
the US Uniform Law Commission approved and recommended for enactment in all
states the Uniform Asset-Freezing Orders Act, designed to create a uniform process for
the grant of pre-trial asset freezing orders. It has not yet been adopted by any state.
While the New York District Court has been prepared to grant freezing orders, it cannot
do so in respect of non-local assets, so this scope is limited.
While their appearance and formulation are vastly different to the common law freezing
order, civil law jurisdictions such as France, Germany and the Netherlands have long
granted pre-trial attachment orders under the systems of ‘référé’ (in France),42 ‘arrest’
38
311 US 282 (1940).
39
527 US 308 (1999).
40
Ibid, 322.
41
Ibid, 329.
42
French Code of Civil Procedure, articles 808, 809, 872 and 873.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
or ‘einstweilige Verfügung’ (in Germany),43 and ‘conservatoir beslag’44 (in the Nether-
lands). The technicalities of these procedures are beyond the scope of this chapter, but
the key points are that protection can be sought both before and during the substantive
proceedings, granted against the defendant and/or a third party, and in certain
circumstances obtained ex parte. The protection granted is in rem rather than in
personam. Similar provisions exist in Swiss and Belgian law.
French and Dutch (but not German) civil courts can grant ‘protective attachment
orders’, similar to common law freezing orders, save that they are in rem. The orders
can attach all movable assets – most commonly bank accounts – subject to a prescribed
limit set by the court. Their effect is to make it impossible for the defendant to dispose
of assets bound by the order.45 When judgment is obtained in the claimant’s favour, the
attachment becomes seizure and the seized assets will vest in the plaintiff (who takes
priority over other creditors).
French, German and Dutch courts can also grant attachment orders, targeting specific
assets that are the subject of the dispute. These orders are the civil law’s answer to
common law proprietary injunctions. While there is no concept of the assets being held
on ‘constructive trust’, civil law courts can nonetheless ring-fence a portion of the
defendant’s total assets, which are then made the subject of an asset guarantee in favour
of the claimant.
More limited asset preservation orders are also available in other civil law European
countries, as well as in China, Japan and Russia. Unfortunately the limited scope of this
chapter does not permit discussion of these jurisdictions.
43
Zivilprozessordnung § 916 to 945.
44
Dutch Code of Civil Procedure, article 700 et seq.
45
See e.g. Dutch Code of Civil Procedure, articles 718–723.
46
See e.g. Credit Suisse Fide Trust v Cuoghi [1998] QB 818; Mobil v Petroleos de Venezuela
[2008] 1 Lloyd’s Rep 684.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
worldwide freezing order but declined to do so;47 whether the primary court will be
affronted by the decision; and whether it will be making an order which it cannot
enforce.48
While there must be a jurisdictional link between England and the primary
jurisdiction,49 this requirement has been applied quite robustly. In Royal Bank of
Scotland plc v FAL Oil Company Ltd [2012] EWHC 3628, the High Court held that it
had jurisdiction to grant worldwide freezing and disclosure orders despite the respond-
ents not being resident in or having any assets in England, and the substantive
proceedings being brought in the United Arab Emirates (where freezing injunctions are
unknown outside the DIFC). A jurisdictional link was found on the basis that the
respondents had (overdrawn) credit facilities in England, and that the loan agreements
underpinning those facilities were subject to English law and contained English court
exclusive jurisdiction clauses.
Likewise, in Motorola Credit Corporation v Uzan [2004] 1 WLR 113(CA), the fact
that the US court was constitutionally prohibited from making a pre-judgment freezing
order was interpreted not as a decision not to make that order, but rather, a situation
where it would welcome the English court’s assistance. This robust approach is
particularly adopted in fraud cases, where the English courts have generally been less
concerned about comity and more concerned about fighting dishonest behaviour.50
47
This will militate against making the order, but will not necessarily be prohibitive: Credit
Suisse Fide Trust v Cuoghi [1998] QB 818.
48
Motorola Credit Corporation v Uzan [2004] 1 WLR 113 (CA).
49
Mobil v Petroleos de Venezuela [2008] 1 Lloyd’s Rep 684.
50
See e.g. Haiti v Duvalier [1989] 2 WLR 261 (CA): there was no apparent link between
the former Haitian President or his assets and England, but his English solicitors were presumed
to have knowledge of the whereabouts of his assets.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 58 /Pg. Position: 11 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
INTRODUCTION
This chapter gives an introductory account of the disqualification regime in the UK’s
Company Directors Disqualification Act 1986 (‘the CDDA’).1 The CDDA is a
paradigm example of a mature ‘disqualification’ system having the following charac-
teristics:
Several jurisdictions have developed similar regimes that share some or all of these
features. Examples include: Australia;2 Ireland;3 Hong Kong;4 New Zealand;5 Singapore;6
1
For a more comprehensive account of the CDDA than space allows here, see A Walters &
M Davis-White QC, Directors’ Disqualification and Insolvency Restrictions (Sweet and Max-
well 2010) (hereinafter ‘Walters & Davis-White’.
2
Corporations Law (Cth), Pt 2D.6.
3
Companies Act, 1990, Pt VII.
4
Companies (Winding Up and Miscellaneous Provisions) Ordinance, Pt IVA.
5
Companies Act 1993, ss 151(2), 382–385.
6
Companies Act (2006 revision), Pt V.
714
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 1 / Date: 14/10
JOBNAME: Rider PAGE: 2 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
South Africa;7 Sweden;8 and various offshore jurisdictions.9 Other jurisdictions take a
more limited approach.10
OVERVIEW
The United Kingdom has had disqualification legislation since 1928. On the recom-
mendation of the Cork Committee in 1982,11 the miscellaneous provisions then on the
statute book were consolidated and strengthened by the enactment of the CDDA. The
CDDA applies to England and Wales and Scotland.
7
Companies Act 71 of 2008, ss 69, 162.
8
Trading Disqualification Act, Lag (1986:436) om näringsförbud.
9
For example, the Channel Islands and the Isle of Man: see further Walters & Davis-White,
ch 16.
10
For example, in the United States, the Securities and Exchange Commission has power
under federal securities law to ban individuals from serving as an officer or director of a public
corporation on grounds of unfitness: see Jayne Barnard, ‘SEC debarment of officers and
directors after Sarbanes-Oxley’ (2004) 59 Business Lawyer 391. CDDA disqualifications are not
limited to public companies.
11
Report of the Review Committee, Insolvency Law and Practice (Cmnd 8558, 1982), paras
1761–1766, 1810–1825.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 2 / Date: 14/10
JOBNAME: Rider PAGE: 3 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
competition law and his conduct as a director makes him unfit to be concerned in
the management of a company (section 9A).
7. Power to disqualify a person whom the court declares liable to contribute to a
company’s assets on an application of the company’s liquidator under sections
213 or 214 of the Insolvency Act 1986 (fraudulent or wrongful trading).
The meaning of ‘company’ in the CDDA’s gateway provisions extends to a wide range
of entities. Disqualification jurisdiction can be exercised to sanction managerial
misconduct in limited companies, unlimited companies,13 banks,14 building societies,15
incorporated friendly societies,16 National Health Service foundation trusts,17 open-
ended investment companies,18 limited liability partnerships,19 community interest
companies20 and insolvent general partnerships.21
12
The UK government proposes to extend the reach of the CDDA so that misconduct in
connection with overseas companies could also provide grounds for disqualification: Department
of Business, Innovation and Skills, Transparency & Trust: Enhancing the Transparency of UK
Company Ownership and Increasing Trust in UK Business – Government response (April 2014),
57–59.
13
CDDA ss 22(2)(a), 22(9) read alongside Companies Act 2006 s 1(1).
14
CDDA ss 21A–21B.
15
CDDA ss 21C and 22A.
16
CDDA s 22B.
17
CDDA s 22C.
18
CDDA s 22D.
19
Limited Liability Partnerships Regulations 2001 SI 2001/1090 reg 4(2).
20
Companies (Audit, Investigations and Community Enterprise) Act 2004 ss 26, 32–38;
Companies Act 2006 ss 1, 2(1)(b).
21
Insolvent Partnerships Order 1994 SI 1994/2421 arts 3 and 16.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 3 / Date: 14/10
JOBNAME: Rider PAGE: 4 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Disqualification proceedings are civil proceedings brought in the public interest. Using
the powers in sections 6–8, the Secretary of State for Business, Innovation and Skills
commences the vast majority of CDDA proceedings. Sections 6–8 expressly direct the
Secretary of State to determine whether disqualification would be ‘expedient in the
public interest’ before proceedings are commenced.23
The system for investigating and sanctioning corporate misconduct through the
gateway of CDDA s 6 illustrates how the CDDA works as a whole. Official receivers in
the pursuit of their public functions24 and private sector insolvency practitioners
appointed as liquidators, administrators or administrative receivers are obliged to report
misconduct to the Secretary of State.25 These reporting mechanisms are the channels
through which those responsible for investigation and enforcement within the Depart-
ment of Business, Innovation and Skills gather evidence. In some cases, the conduct
under investigation may support enforcement action in the public interest both under
the criminal law and under the CDDA. The process under sections 8 and 9A is
similar.26
22
CDDA s 1(1)(a).
23
CDDA ss 7(1), 8(1).
24
Insolvency Act 1986 s 132; Re Pantmaenog Timber Co Ltd [2004] 1 AC 158, [43]–[45].
25
CDDA s 7(3). Insolvency practitioners are also obliged to report on criminal misconduct:
see eg Insolvency Act 1986 s 218.
26
CDDA ss 8(1A), 9C.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 4 / Date: 14/10
JOBNAME: Rider PAGE: 5 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
the road’27 – and as an individual and general deterrent.28 The approach to regulation is
ex post. Consistent with the idea that the law should be facilitative of enterprise, UK
corporate law does not impose any specific ex ante training or qualification require-
ments on directors. The principal sources of legal accountability are the statutory duties
in the Companies Act 2006 and the threat of disqualification under the CDDA for
directors who behave irresponsibly or improperly.
It is frequently said that the rationale of the CDDA is the protection of the public from
abuse of the privilege of limited liability29 and one effect of CDDA disqualification is
to prohibit the disqualified person for a defined period from trading through the
medium of a limited company without the court’s permission. However, the legislation
is not exclusively concerned with regulating abuse of limited liability. We saw earlier
that disqualification jurisdiction is not restricted to limited companies but extends to
unlimited companies and insolvent general partnerships. In theory, the CDDA targets
not only those who abuse limited liability, but also those who (more broadly) act
improperly in the management of companies, financial institutions, investment vehicles
and other specified entities.
Disqualification jurisdiction is exercised primarily by civil courts. There has been some
debate over whether civil disqualification proceedings should properly be classified as
quasi-criminal proceedings. One theory advanced in support of such a classification is
that disqualification is a form of punishment that severely restricts the liberty of the
disqualified person. The UK courts have generally resisted the idea that civil courts
exercising disqualification powers are exercising quasi-criminal jurisdiction, preferring
instead to emphasize the protective rather than the penal aspects of disqualification.30
The courts instead tend to emphasize the protective rather than the penal aspects of
disqualification.
To say that the CDDA is ‘protective rather than penal’ does not get us very far as
public protection and punishment are not mutually exclusive. We incarcerate violent
offenders to punish their offences and to prevent them from harming the public.
Nevertheless, the judicial emphasis on protection over punishment implies that the
courts regard disqualification as a civil regulatory rather than a criminal proceeding.
Were the courts to adopt the view that CDDA disqualification is a quasi-criminal
jurisdiction, there would be implications for the manner in which proceedings are
conducted, especially as regards such matters as the formulation of the allegations
27
A phrase used by Woolf LJ in connection with the CDDA in Re Westmid Packing Services
Ltd [1998] 2 All ER 124, 132.
28
See, in particular, Re Grayan Building Services Ltd [1995] Ch 241, 253, 257–258.
29
Ibid, 257; Re Pantmaenog Timber Co Ltd [2004] 1 AC 158, [78].
30
Re Lo-Line Electric Motors Ltd [1988] Ch 477, 486 and, see further, Walters &
Davis-White, ch 2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 5 / Date: 14/10
JOBNAME: Rider PAGE: 6 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
against the director, the standard of proof, the admissibility of evidence (notably
hearsay evidence, character evidence and compelled evidence), the approach to
statutory interpretation (notably whether the statutory prohibitions should be broadly or
narrowly construed)31 and costs.
Judicial resistance to the importation of criminal procedural norms into civil
disqualification proceedings has been reinforced by a series of rulings by the European
Court of Human Rights to the effect that CDDA disqualification proceedings affect
‘civil rights and obligations’ but do not involve a ‘criminal charge’ for the purposes of
the fair trial guarantee in Article 6 of the European Convention on Human Rights.32
The classification of disqualification proceedings as a form of civil regulatory rather
than criminal process can therefore be regarded as largely settled. That said, however,
the courts recognize that civil proceedings brought by the Secretary of State acting in
the public interest differ in character from ordinary civil litigation between private
parties.33
In arriving at its determination the court must: ‘… decide whether [the relevant]
conduct, viewed cumulatively … has fallen below the standards of probity and
competence appropriate for persons to be fit to be directors of companies’.35 If the
director’s conduct is criminally culpable it will almost certainly fall short of the
standard expected of directors.36 However, the Secretary of State need not establish that
the director’s conduct was criminally culpable in order to prove unfitness. The general
31
It is a well-established canon of construction that penal legislation should be strictly
construed in the defendant’s favour: see eg R v Allen [1985] AC 1029, 1034; R v Clarke [1985]
AC 1037, 1048.
32
EDC v United Kingdom [1998] BCC 370; Wilson v United Kingdom (1998) 26 EHRR
CD195; DC, HS and AD v United Kingdom [2000] BCC 710; WGS and MSLS v United
Kingdom [2000] BCC 719.
33
Re Finelist Ltd, Secretary of State for Trade and Industry v Swan [2004] BCC 877.
34
Re Crystal Palace Football Club (1986), Secretary of State for Trade and Industry v
Golberg [2004] 1 BCLC 597, [46].
35
Re Grayan Building Services Ltd [1995] Ch 241, 253.
36
See eg Re Vintage Hallmark plc [2007] 1 BCLC 788.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 6 / Date: 14/10
JOBNAME: Rider PAGE: 7 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
standard is one of probity and competence. A director whose conduct is not dishonest
but demonstrates ‘incompetence or negligence in a very marked degree’37 will be found
unfit.38
The CDDA does not require the application of a single fixed ‘one size fits all’
standard to all directors. The enquiry is, to a large degree, contextual and fact sensitive
without being entirely subjective. The courts have laid down a series of irreducible and
non-delegable minimum standards and, in particular, an expectation that all directors
should inform themselves as to the company’s affairs and finances regardless of
whether or not they are actively involved in the day to day running of the company’s
business.39 Beyond minimum standards of participation in governance and supervision
of delegates, what is expected of a director will depend on his role, functions and
responsibilities in the particular corporate setting. Thus, while the courts have used the
CDDA to fashion minimum standards of competence, the precise nature and intensity
of a director’s responsibility in relation to a given company will ultimately depend on
the facts of each case.40
In determining whether a director’s conduct makes him unfit, CDDA s 9 requires the
court to have regard in particular to the matters listed in Part 1 of Schedule 1 and,
where the relevant company has ‘become insolvent’,41 in addition, to the matters listed
in Part 2 of that Schedule. These matters include ‘any misfeasance or breach of any
fiduciary or other duty by the director in relation to the company’ and so bring
directors’ core fiduciary duties and duties of care, skill and diligence squarely within
the scope of the CDDA. Otherwise, the Schedule summarily restates a series of specific
statutory obligations under the Companies Acts and the Insolvency Act that place
particular emphasis on proper record keeping, financial reporting and filing obligations.
As the Schedule is neither exclusive nor exhaustive,42 the courts often pay it lip service.
The Schedule underscores the point that the statutory concept of unfit conduct has
within its purview a wide range of directorial obligations under corporate law,
corporate insolvency law and the general law. Disqualification therefore provides an
alternative and additional sanction to the ordinary civil and/or criminal sanctions that
flow from a breach of these legal obligations.
At the same time, unfit conduct is an overarching concept that has a life of its own.
It is neither necessary nor sufficient to establish a breach of an underlying fiduciary or
statutory obligation in order to establish unfitness. The courts consider each matter of
37
Re Sevenoaks Stationers (Retail) Ltd [1991] Ch 164, 184.
38
Examples include Re Melcast (Wolverhampton) Ltd [1991] BCLC 288; Re Austinsuite
Furniture Ltd [1992] BCLC 1047; Re Linvale Ltd [1993] BCLC 654; Re Thorncliffe Finance Ltd
[1997] 1 BCLC 34.
39
Re Barings plc (No 5) [1999] 1 BCLC 433, 489.
40
Re Barings plc (No 5) [1999] 1 BCLC 433, 482–489.
41
Meaning that the company has entered liquidation, administration or administrative
receivership: CDDA s 6(2).
42
Re Migration Services Ltd [2000] 1 BCLC 666. It is also out of date and ripe for reform:
see Department of Business, Innovation and Skills, note 12 above, 52–56.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 7 / Date: 14/10
JOBNAME: Rider PAGE: 8 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
misconduct and determine whether on its own, or taken cumulatively with other matters
alleged and proven, that matter is sufficient to make the director unfit.43 Thus, section
6 allows for a broad enquiry unshackled from the specific requirements of any
underlying civil cause of action or criminal offence.44
Subject to the important caveat that the question whether a director’s conduct makes
him or her unfit is highly fact dependent, it is possible to identify specific instances of
misconduct that the Secretary of State has consistently targeted and which have often
led to a finding adverse to the director. The list that follows is illustrative rather than
exhaustive:45
43
Re Copecrest Ltd [1996] 2 BCLC 477, 485.
44
For example, in order to recover damages from a director for breach of his or her duty of
care and skill, it is not sufficient for the claimant to establish a breach of the applicable standard
of care. It must also be established that the breach caused loss. A director could therefore
conceivably escape ordinary civil liability for want of causation but find that his or her conduct
comes under scrutiny if section 6 or 8 of the CDDA is triggered.
45
See further Walters & Davis-White, ch 5.
46
Re Bath Glass Ltd [1988] BCLC 329, 333. Compare Re World of Leather plc [2006] BCC
725.
47
Re Sevenoaks Stationers (Retail) Ltd [1991] Ch 164; Re Copecrest Ltd [1996] 2 BCLC
477.
48
CDDA Sch 1 Pt II para 7; Re City Pram & Toy Co Ltd [1998] BCC 537. Compare Re
World of Leather plc [2006] BCC 725.
49
CDDA Sch 1 Pt I paras 4(h), 5(a); Re Swift 736 Ltd [1993] BCLC 896.
50
Re Transtec plc [2007] 2 BCLC 495.
51
CDDA Sch 1 Pt II para 8; Re Grayan Building Services Ltd [1995] Ch 241; Re Funtime
Ltd [2000] 1 BCLC 247.
52
CDDA Sch 1 Pt II para 10; Re Copecrest Ltd [1992] 2 BCLC 477.
53
Re Vintage Hallmark plc [2007] 1 BCLC 788; Re Plazoo Pipe Systems [2008] 1 BCLC
120.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 8 / Date: 14/10
JOBNAME: Rider PAGE: 9 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Duration of Disqualification
1. Over 10 years for ‘particularly serious cases’, including cases where a director
who has already had one period of disqualification imposed on him in the past, is
disqualified again.
2. Between six and 10 years for serious cases that do not merit more than 10 years.
3. Five years or less for cases that are, relatively speaking, not very serious.
Orders
When the court disqualifies a person, it makes an order in the terms of CDDA s 1 for
a specified period of time up to the statutory maximum. A disqualification order
provides that the disqualified person (1) shall not be a director of a company, act as a
receiver of a company’s property or in any way, whether directly or indirectly, be
concerned or take part in the promotion, formation or management of a company
unless (in each case) he or she has the permission of the court and (2) shall not act as
an insolvency practitioner.58 The prohibition on acting as an insolvency practitioner
cannot be relaxed by the court during the currency of the order.
Undertakings
54
A court that makes a finding of unfitness under CDDA s 6 is obliged to disqualify for a
minimum of two years: CDDA s 6(4). A five year maximum applies in certain circumstances:
CDDA ss 2(3)(a), 3(5), 5(5).
55
Re Sevenoaks Stationers (Retail) Ltd [1991] Ch 164, 174.
56
Re Westmid Packing Services Ltd [1998] 2 All ER 124.
57
The UK government proposes to give the Secretary of State and the courts additional
powers to make compensation orders against disqualified directors where the misconduct has
caused identifiable loss: Department of Business, Innovation and Skills, note 12 above, 66–67.
58
Within the meaning of Insolvency Act 1986 s 388.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 9 / Date: 14/10
JOBNAME: Rider PAGE: 10 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
all other respects to a disqualification order.59 The CDDA provides that the Secretary of
State may accept an undertaking offered by a director if it appears expedient in the
public interest to do so instead of applying for, or proceeding with, an application for a
disqualification order. The Secretary of State can lawfully refuse to accept an
undertaking unless the director agrees to an accompanying schedule of unfit conduct
setting out the factual basis of the disqualification.60 Around 75–80 per cent of
disqualifications are arrived at by way of disqualification undertakings.61 Undertakings
have therefore become a widely used and effective mechanism for disposing of
disqualification cases.
59
CDDA ss 1A, 7(2A). There is similar facility for disqualification cases based on
competition law breaches to be settled on undertakings: CDDA s 9B.
60
Re Blackspur Group plc (No 3), Secretary of State for Trade and Industry v Eastaway
[2002] 2 BCLC 263; Walters & Davis-White, ch 9.
61
Walters & Davis-White at 9.10; Insolvency Service, Annual Report and Accounts
2011–12, 30.
62
CDDA s 18; The Companies (Disqualification Orders) Regulations 2009 SI 2009/2471.
The register is accessible online at http://bit.ly/1oRmuiu and http://bit.ly/1eEx9GH.
63
See eg, ‘Leeds director disqualified for failure to pay business rates’, 19 May 2014,
http://bit.ly/1roVnQk.
64
Charities Act 1993 s 72(1)(f).
65
Pensions Act 1995 s 29(1)(f).
66
The Police Authority Regulations 2008 SI 2008/630 reg 14(1)(c).
67
The School Governance (Constitution)(England) Regulations 2012 SI 2012/1034 reg 17
and Sch 4 para 11(a).
68
See eg The Council for Healthcare Regulatory Excellence (Appointment, Procedure etc.)
Regulations 2008 SI 2008/2927 reg 2(c)(ii); The Care Quality Commission (Membership)
Regulations 2008 SI 2008/2252 reg 4 and para 13(a) of Schedule.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 10 / Date: 14/10
JOBNAME: Rider PAGE: 11 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
Criminal Liability
Civil Liability
69
R v Brockley [1994] 1 BCLC 606.
70
R v Seager [2010] 1 WLR 815.
71
CDDA s 15(1)(a).
72
CDDA s 15(3)(a).
73
CDDA s 15(2).
74
Re Prestige Grindings Ltd, Sharma v Yardley [2006] 1 BCLC 440, [11]. The provision
also creates a form of accessory liability: CDDA s 15(1)(b).
75
Hill v Secretary of State for the Environment, Food and Rural Affairs [2006] 1 BCLC 601.
76
CDDA ss 1(1), 1A(1), 17.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 11 / Date: 14/10
JOBNAME: Rider PAGE: 12 SESS: 6 OUTPUT: Wed Oct 14 15:09:05 2015
could undermine the protective purpose of the CDDA, especially its deterrence
function.77
While each case turns on its own particular facts, the court balances a range of
factors such as: the need of the disqualified person to earn a living; the need of the
company in relation to which permission is sought to have the applicant involved in
management; and whether the public will be adequately protected from harm having
regard to78 the nature and seriousness of the misconduct that resulted in disqualifica-
tion, the trading prospects and governance of the company in relation to which
permission is sought and the likelihood of repetition of the previous misconduct.79 The
applicant must satisfy the court that there is unlikely to be any repetition of the
previous misconduct and must demonstrate that conditions within the company in
relation to which permission is sought are such that it is not a breeding ground for
recurring misconduct.80
The court rarely grants an application for permission without imposing conditions.
Common conditions include: requirements that publicity be given to the order granting
permission; the appointment of independent monitors to the board to oversee the
applicant’s conduct; the institution of general financial controls and specific controls
designed to prevent the recurrence of previous misconduct; and limitations on the
amount of remuneration the applicant may receive.81 These safeguards are invariably
drafted in a form that makes continuing permission conditional on the applicant abiding
by the conditions. Thus, if the applicant fails to comply with any of the conditions,
permission is automatically withdrawn and the applicant is automatically in breach of
the original prohibitions and exposed to the full gamut of criminal and civil liability in
CDDA ss 13 and 15.82
77
Re Tech Textiles Ltd [1998] 1 BCLC 259, 267.
78
Re Streamhaven Ltd [1998] 2 BCLC 64.
79
Re TLL Realisations Ltd [2000] BCC 998; Re Tech Textiles Ltd [1998] 1 BCLC 259.
80
Re Dawes & Henderson Ltd [1999] 2 BCLC 317; Re TLL Realisations Ltd [2000] 1 WLR
634; Re Westminster Property Management Ltd (No 2) [2001] BCC 305; Re Servaccomm
Redhall Ltd [2006] 1 BCLC 1; Re Morija plc [2008] 2 BCLC 313.
81
Re Gibson Davies Ltd [1995] BCC 11; Re Tech Textiles Ltd [1998] 1 BCLC 259; Re
Amaron Ltd [1998] BCC 264; Re Hennelly’s Utilities Ltd [2005] BCC 542.
82
Secretary of State for Trade and Industry v Rosenfield [1999] BCC 413, 419; Re TLL
Realisations Ltd [2000] BCC 998, 1018.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 59 /Pg. Position: 12 / Date: 14/10
JOBNAME: Rider PAGE: 1 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
1
See generally T. Kaiser and P. Merl (eds), Reputational Risk Management in Financial
Institutions (2014) Risk Books and R. Saleuddin, ‘Reputation risk management on financial
firms’ 22 Journal of Financial Regulation and Compliance (2014) 287.
2
See K. Zweigery and H. Kotz, An Introduction to Comparative Law (1998, 3rd Ed)
Oxford University Press, Ch 5 p 49.
3
For an illustration of this see B. Rider and L. Ffrench, The Regulation of Insider Trading
(1979) Macmillan and S. Frommel and B. Rider (eds), Conflicting Legal Cultures in Commer-
cial Arbitration (1999) Kluwer.
4
B. Rider (ed), Corruption – The Enemy Within (1997) Kluwer.
726
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 1 / Date: 20/7
JOBNAME: Rider PAGE: 2 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
5
See D. Chaikin and J. Sharman, Corruption and Money Laundering: a Symbiotic
Relationship (2009) Palgrave and more generally B. Rider and M. Ashe (eds), Money
Laundering Control (1996) Sweet & Maxwell and B. Rider, ‘The wages of sin – taking the profit
out of corruption – a British perspective’ Dickinson Journal of International Law (1995) 391. It
is also worth noting that in many jurisdictions the control of insider dealing is often associated
in time and in legislation with money laundering, see B. Rider, ‘The control of insider trading –
smoke and mirrors!’ 1 International and Comparative Corporate Law Journal (1999) 271.
6
For a discussion of the institutional aspects see B. Rider, The Promotion and Development
of International Co-operation to Combat Commercial and Economic Crime (1980) Common-
wealth Secretariat, London, B. Rider, ‘Policing the City – combating fraud and other abuses in
the corporate securities industry’ 41 Current Legal Problems (1988) 47 and B. Rider ‘Blindman’s
bluff – a model for securities regulation’ in J. Norton and M. Andenas (eds), Emerging Financial
Markets and the Role of International Financial Organisations (1996) Kluwer.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 2 / Date: 9/9
JOBNAME: Rider PAGE: 3 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
7
See B. Rider, ‘Probing probity: a discourse on the dark side of development’ in S.
Schlemmer-Schulte and K. Tung, International Finance and Development Law (2000) Kluwer
and in regard to the similar issues that arise in regard to insider abuse, B. Rider and M. Ashe,
Insider Crime (1993) Jordans and B. Rider, ‘The control of insider trading: smoke and mirrors’
in E. Lederman and R. Shapira, Law, Information and Information Technology (2001) Kluwer.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 3 / Date: 20/7
JOBNAME: Rider PAGE: 4 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
TRANSPARENCY
It has been argued that one of the most significant dangers presented by corrupt activity
is that it is done in secret. Indeed, as in the case of fraud and other crimes of
dishonesty, what is done is done in secret. The desire to create and maintain secrecy
itself gives rise to what some criminologists describe as ‘slippery slope’ crimes.8 In
other words, to hide what has been done, records may be distorted and others brought
into the web of corruption. Transparency has often been invoked as a weapon to deal
with conduct that might not survive the glare of publicity and possibly attendant public
criticism. Indeed, the famous observation of Louis D. Brandeis, that ‘sun light is the
best disinfectant and electric light is the best policeman’, has much to commend it.9 In
practice, disclosure of relevant details might not only focus opprobrium – particularly
in a democracy – but also empower those who deal with the relevant individuals or
organisations to re-evaluate the terms upon which they continue their relationship or,
indeed, discontinue it.
Disclosure also assists in enforcement in that it either provides those responsible for
policing with a ‘red flag’ indicating the need for action or, if there is a failure of candid
disclosure, a preliminary offence, which may in practice be much easier to sanction.
For example, as in other areas of self-dealing such as insider trading, it is often easier
to prosecute persons who have failed to make a report than proceed to the investigation
and proof of often complex substantive offences.
There are, however, obvious limitations to the effectiveness and efficacy of the so
called fish bowl philosophy. Perhaps most importantly it assumes that disclosure of
certain types of conduct will throw up concerns on the part of those to whom disclosure
is made. In other words, those who are made aware of the relevant facts must not only
be of the view that they are abusive or at least objectionable, but also they must be
empowered to take some form of action to denounce and hopefully correct and punish
such conduct as it is revealed. It is only on this basis that transparency can be an
effective control mechanism against self-interested and corrupt dealings.
While in some societies the mere fact that what is considered to be unethical conduct
is revealed will, given the homogeneity of moral attitudes, be a sufficient disincentive
to abuse, there are others where perhaps the value of reputation is less or is more
equivocal. Indeed, there are some societies and situations where the ability to secure
personal or, in particular, benefits for members of one’s family or supporters is seen
primarily as confirmation of status and power, which itself is applauded or at least
condoned by members of that society or group. For example, a recent survey conducted
in China10 among senior business executives revealed that most retained what they
considered to be Confucian values. Consequently, in the conduct of their businesses,
8
For an excellent discussion of this see M. Levi, The Phantom Capitalists (2008, Rev Ed)
Ashgate.
9
L. Brandeis, Other People’s Money and How the Bankers Use It (1914) Harpers, Ch V.
10
R. Chan, D. Ho, A. Lau and A. Young, ‘Chinese traditional values matter in regulating
China’s company directors: findings from an empirical research’ 34 Company Lawyer (2013)
146. See also B. Rider, H. Yan and Li Hong Xing, The Prevention and Control of International
Financial Crime (2010) China Financial Publishing House, Chs 1 and 2.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 4 / Date: 20/7
JOBNAME: Rider PAGE: 5 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
even though they involved at least in part the management and use of other people’s
money, advancement of personal and family interests came first. Indeed, there was little
knowledge of the ‘fiduciary’ obligations on directors and officers imposed by China’s
Corporations Act, and several respondents went as far as saying that if these impeded
the advancement of family interests the law needed to be changed! It is also the case
that there are still many societies where the giving of a gift is considered a mark of
respect and is not necessarily given in the expectation of a specific benefit. In such
cases, a failure to acknowledge this expectation might even be a justification for
criticism.
11
See generally B. Rider, K. Alexander, L. Linklater and S. Bazley, Market Abuse and
Insider Dealing (2009) Tottle, Chs 1 and 2 and B. Rider and M. Ashe (eds), The Fidiciary, the
Insider and the Conflict (1995) Brehon Sweet & Maxwell.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 5 / Date: 20/7
JOBNAME: Rider PAGE: 6 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
relationship any benefit that has come to him by virtue of that relationship – often
referred to as the secret profits rule – full disclosure and the consent of the other party
will in effect render what would otherwise have been a breach of the duty of loyalty
unobjectionable. It is probable that in most cases the same rule would apply to the
taking of a bribe, although it is possible that as the rules are applied in certain
jurisdictions the two situations might not be entirely the same.12 This is something that
we will return to.
Before we do move on, however, there is a point that is worth making in regard to
the involvement of corporations in corruption and unethical conduct. In recent years
much has been made of the importance of ensuring good governance structures and
procedures in companies.13 Indeed, until the recent financial crisis many argued that in
large measure such closer internal systems of control had much to commend them over
the costly one size fits all approach. Of course, governance, while still of value, was
seen to be a very weak barrier to the rampant greed and self-interest that characterised
the conduct of many in the financial industry leading up to the near collapse of the
western banking system after the so called sub-prime fiasco.14 While governance can
never replace competent and effective external and public policing, it can still assist. It
has at least an educative role and proper procedures may throw up earlier misconduct
particularly if reinforced with sound compliance. It is also far more recognised that the
reputation of corporations is a valuable asset which management has a responsibility to
protect. We are near to judges finding directors of companies personally responsible in
the discharge of their duties to their companies for failing to adequately protect this
asset of the business. Indeed, in one case in England an employee of a bank that had
collapsed in large measure due to the frauds and abuses that it facilitated around the
world was in fact permitted to proceed with a claim seeking compensation from the
bank’s directors for their failure to run the bank properly and thereby safeguard
the employability and reputation of its staff.
12
See B. Rider, ‘Blunting the sword of justice’ 19 Journal of Financial Crime (2012) 324
and B. Rider, ‘The practical and legal aspects of interdicting the flow of dirty money’ 3 Journal
of Financial Crime (1996) 234, and for a discussion of similar issues in Shar’ah see B. Rider,
‘Corporate governance for institutions offering Islamic finance’ in C. Nethercott and D.
Eisenberg (eds), Islamic Finance: Law and Practice (2012) Oxford University Press.
13
See for example, B. Rider and C. Nakajima, ‘Corporate governance and supervision’ in S.
Archer and R. Karim (eds), Islamic Finance: The Regulatory Challenge (2007) Wiley Finance;
C. Nakajima, ‘Responsible business’ 20 Journal of Financial Crime (2013) 256 and C. Nakajima,
‘The importance of legally imbedding corporate social responsibility’ 32 Company Lawyer
(2011) 257.
14
See in particular N. Ryder, The Financial Crisis and White Collar Crime: The perfect
storm? (2014) Edward Elgar.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 6 / Date: 20/7
JOBNAME: Rider PAGE: 7 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the conduct occurs will impact on and shape the form of misconduct in question.
Indeed, this will also be reflected in the laws that are invoked to address it. In
developing countries, particularly where the state is rather more involved in the conduct
of activities, which in a developed economy might be rather more in the hands of the
private sector, there will be greater opportunity to engage in misappropriation and
diversion of state assets. This is a particular issue in countries which still have a
significant public business economy such as China. In fact it was recognised by the
Nanking National Government in China in 1927 that, given the greater degree of
involvement of officials in making or participating in decisions which made a material
impact on the fortunes of economic actors, there is a greatly enhanced opportunity for
insider dealing by officials. Indeed, it is interesting that this recognition resulted in the
imposition of law to address this problem. Article 41 of the Revised Stock Exchange
Law 1935 specifically outlawed speculation on the markets by officials, and all this was
well before the development of the communist state.
The greater involvement of government in fostering entirely beneficial programmes
such as those relating to the protection of the environment and natural resources has
similarly provided opportunities for officials to in effect take advantage of information
on the design and implementation of their own policies. It is also relevant that the more
the state is involved in the ownership and control of enterprise the more likely that it
will interpret such misconduct as an offence against the state. It has been said, for
example, that in the USSR, because of the degree of state and collective involvement in
the economy, more fraudsters and other economic criminals were executed than in any
other country.15 Their misconduct was clearly identified as a crime against the state’s
interests. It is important to note that this might still have important implications in
addressing the control of corruption. For example, in one recent case in China the
execution of an individual who had misappropriated funds from a state owned
enterprise in Jilin and then laundered the money through Hong Kong, Singapore and
Italy, effectively prevented satisfactory legal assistance from the country where the
money had ended up.
WHY DO WE DO CORRUPTION?
Over the years a considerable amount of discussion has taken place in the academia as
to the nature and implications of corruption. While we need not rehearse this here, it is
desirable in modelling more efficacious responses to the threats associated with
corruption, to recognise the practical significance of Edwin Sutherland’s explanation of
deviant white collar behaviour.16 In a nutshell and grossly simplistic terms, Sutherland
15
‘Russia ranks first in use of death penalty’ Los Angeles Times 5 February 1972. China
regularly uses the death penalty for serious cases of economic crime, but see B. Rider, ‘A tale of
two cities’ 19 Journal of Financial Crime (2012) 4 and B. Rider, ‘When Chinese whispers
become shouts’ 20 Journal of Financial Crime (2013) 136.
16
See E. Sutherland, White Collar Crime (1949) Dryden Press; E. Sutherland, White Collar
Crime: The Uncut Version (1983) Yale; and E. Sutherland, ‘Is White collar crime crime?’ 10
American Sociological Review (1945) 132.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 7 / Date: 20/7
JOBNAME: Rider PAGE: 8 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
recognises that in the case of certain forms of economically motivated activity we are
all susceptible to temptation. The determination of whether we actually engage in
conduct that might be characterised as criminal or abusive will in large, perhaps
determinant, measure be resolved by our own cost benefit analysis. In other words, we
will assess the rewards as compared with the risk of something unpleasant happening to
us. There will in any given situation be a host of factors which influence our subjective
determination of this balance and where the tipping point is encountered.
Morality and education will have a role to play, as will the efficiency of detection
and the mechanisms of punishment. However, it is important to take on board that the
moral and ethical aspects might vary,17 and in many cases of what might be described
as financial crimes there may well be a perception that they reflect no great moral
principle and are essentially technical offences. The perception in a society that
undertaking the activity in question is commonplace or that most would – given the
opportunity – engage in it, will be powerful factors. Indeed, this was all powerfully set
out in the context of Filipino society in an article recently published in Planet
Philippines (Eight Ways Filipino Politicians Justify Corruption, September 2013).
The potential for ambiguity in designing the controls, and certainly in policing them,
is perhaps best illustrated again by reference to a form of misconduct that is quite
closely related to corruption, namely insider dealing. While arguments based on the
abuse of loyalty may in the circumstances be relatively strong or weak, the justification
often invoked in the criminalisation of the misuse by insiders of privileged information
is the adverse impact that this may have on investor confidence. It is argued that
investors will be less attracted to markets where there is not a semblance of equality of
opportunities to profit. For many reasons this simplistic contention is not always
convincing. However, it is the case that few individuals are likely to see a profound
moral imperative here. Their castigation of insider trading as an abuse, at this level, is
probably rather more associated with their jealousy that someone else who is in a
privileged position is able to take a benefit which they are unable to access.18 Indeed,
the same argument is manifest in regard to some of the excesses that we have seen on
the part of bankers in the lead up to the recent global financial crisis. As a result, it is
possible that morality may play less of a role in the balance of opportunities and risks
than some think and hope for. The prime issue may be simply at what price is the risk
of punishment and possibly loss of reputation worth taking.
Consequently, the level of detection and likelihood of effective enforcement action
consequent upon detection is, on this analysis, a significant if not determining factor.
The more that can be done to render the risk of detection and the certainty of effective
policing and punishment, the higher will be the financial threshold to wrongdoing.
17
See for a perspective on this issue, Siti Faridah Abdul Jabbar, ‘Corruption: delving into the
muddy water through the lens of Islam’ 20 Journal of Financial Crime (2013) 139 and B. Rider,
‘Back to basics’ in The Changing Landscape of Islamic Finance: Imminent Challenges and
Future Directions (2010) Islamic Financial Services Board and also in Strategies for the
Development of Islamic Capital Markets (2011) Asian Development Bank and IFSB in Ch 3.
18
See B. Rider and H. Ffrench, ‘Should insider trading be regulated? Some initial
considerations’ 95 South African Law Journal (1978) 79 and B. Rider, ‘Insider trading – a crime
of our times’ in D. Kingsford Smith (ed), Current Developments in Banking and Finance (1989)
Stevens.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 8 / Date: 20/7
JOBNAME: Rider PAGE: 9 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Thus ‘soft’ and early – essentially extra-legal – procedures and devices, such as
compliance, transparency and whistle blowing have a real role to play in fixing the
tipping point. None the less, given the efficacy, or rather the lack of efficacy, in
bringing economic criminals and those involved in corruption to justice, the threshold
may be rather lower than we assume. Having regard to the nature of the likely offender
it may not be necessary to invoke the full panoply of criminal justice that is more
usually encountered for other forms of crime and misconduct. By definition we are
dealing with more or less the elite in a given society, or at least those who have a
privilege the exercise of which is worth influencing. One does not bribe people for the
sake of it – there will always be a purpose and usually one that has economic
significance.
19
United Nations Convention against Corruption was adopted by resolution 58/4 of the UN
General Assembly 31 October 2003 and came into force on 14 December 2005.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 9 / Date: 20/7
JOBNAME: Rider PAGE: 10 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
of states within their own domestic law to provide meaningful assistance to other states
and even private actors in pursuing the proceeds of corruption and other crimes has
increased dramatically. Also, the willingness and capacity of states acting within their
domestic laws to move promptly and effectively to interdict and freeze tainted wealth is
infinitely greater today than it has even been. This was illustrated in the rapid response
of many European countries to the requests of new governments to identify and freeze
the assets of former leaders and their families during the so called Arab Spring. There
are many examples of cases in the past where it has taken years to trace and then
initiate steps, often without success, to interdict wealth ‘stolen’ and diverted from
countries such as the Philippines, Pakistan, Haiti and Indonesia. On the other hand, the
British government was able to effectively respond to a request received from the
Egyptian government in regard to Mr Hosni Mubarak within minutes. The system of
and for international mutual assistance today in this respect bears no resemblance to
that even five years ago. A prerequisite to this is an effective request from the relevant
lawful authority in the state concerned, and this may well constitute a problem where it
remains unclear exactly where authority actually does reside in a state that has gone
through turmoil. The provision, perhaps from other governments, intergovernmental
organisations and even the private sector, of timely technical assistance and support
may prove in practical terms to be crucial.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 10 / Date: 20/7
JOBNAME: Rider PAGE: 11 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
by those taking on those in power and authority, let alone seek to assist and protect
them, is in my opinion one of the greatest threats to the efficacy of the law.
Of course, it is not always the case that those in power will be so bold to stoop to
intimidation, violence and misinformation. Perhaps an even more shocking response is
to attack the standing and resources of the agencies that have been set up specifically to
promote integrity and police the relevant law. Although politicians are inclined, often
with the support of the media, to bemoan the inadequacies of agencies responsible for
promoting integrity in, for example, the financial markets or discovering and pursuing
financial crime and corruption, there are again too many examples where as a result of
the perceived effectiveness of such agencies their budgets have been slashed and their
recruitment curtailed. Whether this be predicated on the notion that such have become
too overbearing and powerful – undermining the very values that they are tasked to
protect – or simply on the basis that they have done their job, it is not hard to find
examples of the virtual emasculation of, in particular, the enforcement and surveillance
capabilities of these agencies throughout the world.
ELITE ENFORCEMENT
On the other hand, it has also to be recognised that there are too many examples around
the world of elite prosecutorial and investigative agencies, set up specifically to
spearhead the fight against corruption and economic crime, themselves becoming
tainted by the very ills that they are addressing. There have been real examples of such
agencies being undermined from within as a result of penetration by criminals and the
corruption of key personnel. One need only consider the example of the Commercial
Crime Unit in Hong Kong and its corrupt director, Warrick Reid. As Lord Templeman,
then one of the most distinguished judges in the Privy Council, observed: ‘bribery is an
evil practice which threatens the foundations of any civilised society. In particular,
bribery of policemen and prosecutors brings the administration of justice into disrepute
… in [this] case the amount of harm caused to the administration of justice in Hong
Kong … cannot be quantified.’20 Indeed, even in that bastion of propriety, Singapore, a
similar agency established to fight economic crime and corruption had problems, albeit
less dramatic. Sadly there are many other examples.
In the view of the author the ever present danger of specialised law enforcement
agencies, and in particular those established to fight really serious economic criminals
and the most corrupt and powerful members of our societies, becoming part of the
problem is exacerbated by a failure on the part of politicians and the media to properly
understand and appreciate the real problems in doing the work they do. In some,
perhaps the majority, of cases where such agencies, and in particular their directors,
have stepped over the line and become associated with the problem rather than the
solution, the initial reason has been a desire, perhaps even a laudable desire, to meet the
expectations of those who have appointed them and set them their task. The reality is
that in all systems of law – whether common law, civilian, Roman Dutch, or as in the
Philippines, an intriguing mix thereof – it has proved over time incredibly difficult to
20
Attorney General for Hong Kong v. Reid (1994) 1 All ER 1.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 11 / Date: 9/9
JOBNAME: Rider PAGE: 12 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
secure convictions through the traditional processes of the criminal justice system for
economic crime and in particular fraud and corruption. The reasons are many and
varied and a detailed discussion is beyond the scope of this chapter. It is not without
interest, however, that even the most developed and respected legal systems have in
reality fared little better when judged in terms of convictions. For example, back in
1986 an eminent senior criminal judge, Lord Justice Roskill, appointed to make
recommendations for the improvement in England of the trial of fraud cases, reported
that ‘the public no longer believes that the criminal justice system can effectively and
efficaciously bring the perpetrators of fraud to book. The overwhelming evidence
brought before us suggests that the public is right’.21 Despite many new laws,
procedures and agencies, few in the UK would have any confidence that the situation
has got any better.22
The record elsewhere, including in the USA, is little better. Indeed, it is largely as a
result of the criminal justice systems’ profound inability to deliver results – in terms of
convictions, or for that matter the seizure and interdiction of the proceeds of crime –
that many law enforcement agencies around the world have redefined their objectives
as the disruption of crime rather than the traditional investigation and prosecution of
crime. The emphasis now placed on the disruption of organised crime – including
terrorist organisations and serious economic criminality – has inevitably impacted on
the way in which we attempt to deliver justice. There is, for example, a much greater
emphasis on the role of intelligence, and in particular financial intelligence thrown up
by our anti-money laundering systems.23 On the other hand, the more we involve
the spy rather than the traditional policeman in these tasks, and move away from the
discipline of a traditional prosecution, the greater the risks to human rights and the
greater the risks of justifying actions on the basis of their empirical results.
Experience appears to demonstrate that the temptation to meet the unrealistic short
term expectations of politicians has resulted in a tendency to bend the rules and
procedures to achieve what appear to be results – recognised as justifying the special
powers, budgets and status that these agencies are given. Elitism breeds an ambition for
21
Report of the Fraud Trial Committee (1986) HMSO para 1. See also B. Rider,
‘Combatting international commercial crime’ Lloyd’s Maritime and Commercial Law Quarterly
(1985) 217, B. Rider, ‘Policing the international financial markets’ in C. Lye and R. Lazar (eds),
The Regulation of Financial and Capital Markets (1990) Singapore Academy of Law and B.
Rider, ‘Policing the international financial markets – an English perspective’ XVl Brooklyn
Journal of International Law (1990) 179.
22
It is reported that of some 81,631 reports of suspected fraud by businesses in London in
2013 to 2014 there were only nine successful convictions. Of some 103,000 suspected cases of
business-related crime only 758 were considered solvable by the police, H. Warrell, ‘Police
urged to crack down on business crime’ Financial Times 23 July 2014. The UK police also fail
to identify a suspect in three quarters of property related crimes, R. Ford, The Times July 18
2014, albeit the Home Secretary asserts ‘criminal gangs are running swathes of Britain’ R. Ford,
The Times 12 June 2014.
23
See B. Rider, ‘Intelligent investigations: the use and misuse of intelligence – a personal
perspective’ 20 Journal of Financial Crime (2013) 293. See also S. Keene, Threat Finance,
Disconnecting the Lifeline of Organised Crime and Terrorism (2012) Gower. See generally K.
Hinterseer, Criminal Finance, the Political Economy of Money Laundering in a Comparative
Context (2002) Kluwer.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 12 / Date: 9/9
JOBNAME: Rider PAGE: 13 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
a level of success that a proper and responsible administration of law cannot in all
probability achieve. Consequently, the very real pressures within the organisation in
terms of career security, development and esteem, as well as externally in terms of
continued support and standing, become almost irresistible. The inclusion of evidence
that has been procured in dubious circumstances, perhaps even illegally, is a step
towards fabrication and manipulation of evidence – the ends justify the means. The fact
that this corrupts the very fabric of the legal system and makes justice a delusion is
obscured by expediency and pragmatism.
Having said this, specialisation in the investigation and pursuit of corruption is vital.
To identify and then recruit or to foster similar skills and specialisations within the
confines of more traditional law enforcement structures, and in particular police
organisations, is problematic. Traditional justice agencies do not provide the career
structures that can comfortably accommodate the sort of specialisations that are
required for the effective investigation of, for example, economic crime and corruption.
Of course, if there is the political will then it is conceivable that significant
organisations capable of supporting highly specialised skills can be established and
operated. A good example of this is the Independent Commission Against Corruption
(ICAC) in Hong Kong. However, the very considerable resources that have been placed
at the disposal of the ICAC over the years are in practical terms beyond the reach of
most countries, and those that have attempted to emulate the experience of Hong Kong
with lesser resources have on the whole not fared as well as it was hoped. The ICAC,
in terms of its structure and operations, has to be considered in the historical context of
Hong Kong and the political imperatives that gave it so much significance in the
political system such as it was and is. For example, for much of its life the ICAC
operated within a colonial environment, which had implications for, in particular,
accountability and its independence. There are those who wonder whether its perceived
strengths will, or indeed can, survive – at least as they are – in the modern reality of
Hong Kong.
PROSECUTORIAL INDEPENDENCE
To remain firmly within what we regard as the rule of law, the role of prosecutors is
vital, not only constitutionally and in terms of due process, but also in achieving a fair
and focussed investigation tailored to the production of admissible evidence. There may
be debate as to the desirability and, in some jurisdictions, the acceptability of
prosecutors directing case development and, in particular, investigation, but the benefits
for investigators of access to prosecutorial advice cannot be denied. Indeed, this is one
of the particular strengths of the US justice system. The civilian system provides, at
least in form and structure, greater support and focus in terms of the magisterial
involvement, but is essentially different to the common law procedure. The coming
together of both systems provides a number of advantages, but is perhaps idealistic.
The special powers accorded to prosecutors, for example, in the UK in the Serious
Fraud Office (SFO), while criticised by some as starting down the inquisitorial path, in
practice have not resulted in an appreciable improvement in the efficacy of traditional
prosecution. Of course, as we have seen, there are real dangers in prosecutors being
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 13 / Date: 20/7
JOBNAME: Rider PAGE: 14 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
CIVIL ENFORCEMENT
Indeed, the perception, and probably the reality, that Federal prosecutors in the USA
were unenthusiastic in prosecuting securities offences led to the development within the
US Securities and Exchange Commission (SEC) of its own civil enforcement juris-
diction. Frustration with the traditional criminal process encouraged enforcement
lawyers within the SEC to develop a relatively effective process of civil enforcement
based on seeking injunctive relief in the Federal courts. The efficacy of using
essentially civil law procedures in fighting economically motivated crime, with the
attendant practical and evidential advantages, has resulted in administrative enforce-
ment assuming a very significant role in the USA in the enforcement of not just the
securities laws but increasingly those concerned with integrity, such as the Foreign
Corrupt Payments Act. As the use of civil enforcement has become more widespread in
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 14 / Date: 20/7
JOBNAME: Rider PAGE: 15 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
the courts, Congress has imposed certain constraints and to some degree regularised the
processes and sanctions in statute.
Obviously, there is not the opportunity to explore civil enforcement in more detail
here,24 although it is a very important additional weapon in the arsenal of those seeking
to fight economic crime and corruption. On the other hand, there is a need for
circumspection as the procedures that have been developed in the USA, while effective
and relatively efficient, are the product of US legal history and jurisprudence. They are
not easily transportable into other systems. For example, the attempt by statute to
emulate the SEC’s jurisdiction in regard to market abuse in the UK has not been
entirely successful. The English courts have also been unimpressed with attempts by
regulators, and in particular the SFO, to utilise civil processes when what has occurred
is clearly criminal. Judges have deplored the use of the ‘soft’ option of civil
enforcement and effectively ‘agreed’ penalties where crime is involved. Judges in other
jurisdictions, such as Hong Kong, have declined to recognise and give effect to US
court orders in regard to civil enforcement25 on the basis that what is at issue is
essentially a criminal matter dressed up as a civil one. Having said this, the
development of the US law in regard to tracing and forfeiture of criminal property
through a civil process in rem has met with a great deal more support in foreign courts.
24
See B. Rider, ‘Civilising the law – the use of civil and administrative proceedings to
enforce financial services law’ 3 Journal of Financial Crime (1995) 11 and, in particular, S.
Bazley, Market Abuse Enforcement: Practice and Procedure (2013) Bloomsbury Professional.
25
For example, Nanus Asia Co v. Standard Chartered Bank (1990) 1 HKLR 396. However,
the Hong Kong courts, as have most common law jurisdictions, have been prepared to recognise
and support in rem orders by US courts in regard to proceeds of crime.
26
See K. Stephenson et al, Barriers to Asset Recovery, Stolen Assets Recovery Initiative
(2011) World Bank and UNODC and B. Rider, ‘Pursing corruption – civil weapons: old law in
new bottles!’ in Legal Studies in the Global Era: Legal Issues beyond the Boarders (2010) Chuo
University Press.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 15 / Date: 20/7
JOBNAME: Rider PAGE: 16 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
taking of ‘secret profits’.27 These principles have been applied not merely to those in
private relationships but also those in positions of trust in government. Examples
include ministers, senior officials and even members of the armed forces, who use their
position to exploit others. The importance of these principles is much wider than it
might at first seem. They are of practical importance not just in those jurisdictions that
embrace the pragmatism of the common law.28 For example, it is common to find in
corporation laws the statutory incorporation of the duties of loyalty upon which this
liability to account is based. A good and pertinent example of this is sections 31 to 34,
and in particular section 34, of the Corporation Code of the Philippines, or articles 21,
116, 148 and 149 of China’s Companies Statute. Furthermore, the courts in a number
of common law jurisdictions have held that the principles of fiduciary accountability,
and in particular the imposition of a constructive trust, apply where the money ends up.
Therefore, a Singapore court had no hesitation in invoking these principles in regard to
the proceeds of corruption in Indonesia held in a Japanese bank in Singapore.29
It is, however, the ability of the law to trace the proceeds of corruption and fraud into
other property and to then regard it as belonging to the person with the equitable claim
that is perhaps the most significant weapon. In a series of cases involving corruption
and breaches of fiduciary duty, invariably committed overseas, English courts, in
common with those in many other common law countries, have been prepared to trace
such property and impose on it a constructive trust.30 Anyone who comes into
possession of the property or who exercises control over it will – if they have
knowledge of the circumstances or are reckless – be held equally liable to the same
extent as the wrongdoer.31 Such third parties will only escape liability if they have
acted in good faith and given proper consideration for the property before they
appreciate the true facts or before parting with it.
Indeed, there will be similar civil liability on those who dishonestly assist in the
laundering of such property. Thus, those who provide accounting, legal and banking
services might well be exposed to liability. The state of knowledge required for this
form of liability includes wilfully turning a blind eye to facts that would have put an
27
See supra at n 11, and in particular Regal (Hastings) Ltd v. Gulliver (1967) 2 AC 134, and
generally R. Pearce, J. Stevens and W. Barr, The Law of Trusts and Equitable Obligations (2010,
5th Ed) Oxford University Press, Pt V and A. Burrows, The Law of Restitution (2011) Oxford
University Press, Ch 26.
28
See for example, B. Rider, ‘The regulation of insider trading in the Republic of the
Philippines’ 19 Malaya Law Review (1977) 355.
29
Sumitomo Bank Ltd v. Karitika Ratna Thahir (1993) 1 SLR 735. See also M. Ashe and B.
Rider, The International Tracing of Assets (2000) FT Law and Tax.
30
See FHR European Ventures LLP v. Cedar Capital Partners (2014) UKSC 45, noted B.
Rider, ‘A simple approach to justice’ 21 Journal of Financial Crime (2014) 379 and Attorney
General of Hong Kong v. Reid (1994) 1 All ER 1 contra Sinclair Investments (UK) Ltd v.
Versailles Trade and Finance Ltd (2011) 3 WLR 1153. See also B. Rider, Old Weapons for New
Battles (2009) Centre of Anti-Corruption Studies, ICAC, Hong Kong and B. Rider, ‘Corruption
– the sharp end of governance’ in S. Ali (ed), Risky Business: Perspectives on Corporate
Misconduct (2010) Caribbean Law Publishing Co. for these developments in context.
31
See Selangor United Rubber Estates Ltd v. Craddock (No 3) (1968) 1 WLR 1555,
Governor and Company of the Bank of Scotland v. A (2001) 3 All ER 58 and Armstrong DLW
Gmbh v. Winnington Networks Ltd (2012) 3 All ER 425.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 16 / Date: 9/9
JOBNAME: Rider PAGE: 17 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
honest and reasonable person on notice that something improper was afoot. Thus, the
English courts have not hesitated to impose personal liability on an accountant in the
Isle of Man who incorporated English companies and then opened bank accounts for
these companies in London, on behalf of a crooked French lawyer and an employee of
an Italian company, without asking the questions that an honest and reasonable person
in his position should have asked.32 Indeed, in another case, the court held that even a
lawyer who had good grounds for suspecting that a client whose monies he had placed
into certain overseas trusts may be related to an investigation in the USA, if he wished
to escape personal liability was under an obligation to search out those who might have
a claim against these funds and inform them.33
32
Agip (Africa) Ltd v. Jackson (1992) 2 All ER 451.
33
Finers v. Miro (1991) 1 WLR 35. Of course, this has implications for those who handle
and advise on the handling of other people’s wealth in the ordinary course of their business; see
for example, the Bank of Scotland case cited at n. 31, Shah v. HSBC (2010) All ER 477 and B.
Rider, ‘When risk becomes reality’ 13 Journal of Money Laundering Control (2010) 313, and on
the dilemmas faced by financial institutions B. Rider, ‘Compliance: an international perspective
on some of the challenges facing global compliance today’ (2014) Occasional Paper 72, Central
Bank of Sri Lanka.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 17 / Date: 20/7
JOBNAME: Rider PAGE: 18 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
was considered improper, has in certain respects modified its views. However, in regard
to the sorts of cases that we are here discussing, the issue of attorney’s fees, while
crucial, is only one factor. There will be a need for covering considerable other costs –
primarily in regard to investigation and the freezing of suspect monies. There will also
in most cases be the need to conduct legal proceedings in a number of jurisdictions.
There are few lawyers and investigators who are able and willing to assume an almost
‘business’ interest in the matter and obtain independent funding for these additional
costs. In practice, however, few of these cases have so far resulted in significant levels
of recovery. The development of a class of international ‘bounty hunters’ is something
which may in time occur, and there are many in the development community that
would welcome it.
It is perhaps worth making the observation here that while commendable for a
number of reasons – and not least that those who abuse their positions should not be
allowed to retain the benefits and nor should their families – procedures that at best are
capable of taking back what should never have been stolen might not present a
significant disincentive to those who are contemplating the risk and rewards. Ideally,
such procedures should never trump the application of the criminal law and the
prospect of a criminal penalty. Having said this, there is room for debate as to how the
imposition of criminal penalties might be modified and mitigated by meaningful
co-operation on the part of those under investigation. In cases where corrupt individuals
have willingly made restoration, there is scope for the amelioration of the defendant’s
position. Indeed, in the USA it is not uncommon to condition civil penalties and even
fines on the basis of co-operation. It is also not uncommon in similar circumstances,
particularly in the context of taxation, to compound conduct that might otherwise result
in serious criminal sanctions.
While there is no doubt that things have improved jurisprudentially, there are still
many governments and agencies that remain cautious as to what information they share
with other governments. This is exacerbated by the approach of some countries which
allow their agencies to retain some of the property seized either as an incentive or to
facilitate further enforcement. While the US authorities have for many years been
prepared to share seizures, after deduction of their expenses, with other states, few
other governments have in practice done this – Switzerland being a notable exception.
The UN Convention specifically provides for this and hopefully this will herald a more
constructive approach.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 18 / Date: 9/9
JOBNAME: Rider PAGE: 19 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
suffered any direct harm other than the violation of the duty of loyalty owed to them. In
fiduciary law it is enough that the fiduciary has improperly benefited from his position
irrespective of whether the benefit in question could have gone to or even been taken
by the principal. It is the violation of stewardship upon which the liability is predicated.
Given this, it is not always clear that the state, or in particular a corporation, will have
a sufficient incentive to embark on possibly expensive and unpredictable litigation. It is
also the case that there may well be reservations about ‘washing their dirty linen in
public’. Indeed, with the emphasis that is increasingly being placed on ‘control’
liability – particularly in the USA and the UK – it might not be in the interests of
anyone in a corporation, for example, to draw attention to acts of corruption. Not only
might shareholders consider that directors and others were asleep on their watch, but
there might be the prospect of regulatory and legal liability for a failure in compliance
such as under section 7 of the UK Bribery Act 2010.
While the development of control liability, especially for misconduct relating to
integrity, has been regarded as a means of improving compliance and attributing
responsibility, it is a double-edged sword. Senior management may well be reluctant to
report suspected violations of provisions possibly giving rise to control liability or in
co-operating with the investigation of the predicated wrongdoing. Indeed, in some
societies the arguments are at best evenly balanced. However, there is another and
perhaps even more pertinent consideration. There is a real risk in demonising
businesses and their managements. This concern is perhaps best illustrated in regard to
the cases that have arisen in the USA and the UK in particular, in regard to economic
sanctions violations and money laundering. There have been a number of cases where
major international financial institutions, such as the Hong Kong and Shanghai Bank,
Barclays Bank and the Standard Chartered Bank, have been accused of significant
failures in compliance in regard to such issues. Very large fines and costly settlements
have resulted. There has been a very high level of criticism of the management of these
and other institutions in the media. The problem with all this is that it remains to be
convincingly seen whether the relevant underlying laws relating to the identification
and interdiction of suspect funds work and have any real value within the legal system.
If one considers the level of successful enforcement in regard to criminal and suspect
property in the vast majority of jurisdictions, then one might be excused for doubting
the efficacy of such laws and the cost that they impose both directly and indirectly, in
terms of risk, on ordinary financial institutions which provide a vital service to the
economy.
Considering all this, who else might have an incentive to complain and initiate action
in cases of corruption? Perhaps the most likely candidates will be those who have
suffered loss as a consequence of the corruption. Of course, in most cases their damage
will be a result of what the corruption has facilitated rather than the corrupt act itself –
for example, those who have lost relatives or sustained injury when, as in China, a
major road bridge collapsed as a result of the failure of inspectors to properly monitor
its construction. In many cases, perhaps the vast majority, those who have been harmed
will not under their domestic law have a particularly clear cut claim to compensation.
Here we are talking about a claim for the damage and losses that have resulted from the
corrupt action, rather than restitution of the illicit payments. The UN Convention does
place an obligation on states to facilitate such actions. Providing a new cause of action
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 19 / Date: 20/7
JOBNAME: Rider PAGE: 20 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
is one thing; actually empowering those who have been harmed to bring such is a very
different matter. Without a litigation-friendly environment with the possibility of class
actions and contingent attorney fees, it is hard to see that in many countries this would
be a meaningful and viable strategy. In the USA the False Claims Act has long enabled
citizens to bring civil claims on behalf of the state based on allegations of fraud and
misconduct against the government. Litigants and their lawyers are then, if successful,
permitted to share in the recovery.
A real problem in practice, where there are multiple causes of action and the
prospect of regulatory and disciplinary action, civil enforcement and criminal prosecu-
tion – possibly in a number of jurisdictions, more or less at the same time – is that of
managing parallel proceedings. The ‘best evidence’ rule which permeates the laws of
most jurisdictions will necessitate the deployment of the best evidence in each and
every proceeding. There is also the primacy of causes and actions. Should the criminal
case proceed first, albeit it may well take a very long while to be resolved? If not, is
there not a real issue in a subsequent criminal case of unfair prejudice? The imposition
on an individual of the need to defend multiple actions involving disproportionate
resources surely also raises issues of human rights? These and many other practical
issues have not been adequately considered domestically, let alone in the context of the
various international initiatives.
CRIMINAL CULPABILITY
There are those who argue that the gold standard in combating serious corruption must
involve the robust use of criminal law. We have already touched upon this in the
context of institutional and procedural considerations. Over the last few years many
states have revised their criminal laws to improve the drafting of the primary offences
relating to corruption and, in particular, the taking and giving of bribes. This is not the
place to attempt a discussion of the substantive law. However, while very few cases
have so far been brought under it, the author has no hesitation in commending as a
good model the UK’s Bribery Act 2010. Before its enactment, the UK’s anti-bribery
law was antiquated and inefficient. In practice, in the UK, as in a number of common
law countries, it is other provisions in the ordinary criminal law that have been utilised
with some effect. The re-shaping of the law relating to fraud in the UK, in the Fraud
Act 2006, and especially the creation of a ‘new’ offence of criminal breach of trust, is
particularly welcome in this context.34 Perhaps of most significance, however, has been
the use of anti-money laundering laws and provisions for confiscating and taxing
criminal property.
34
Another issue relevant to the discussion is the standard of culpability that is considered
acceptable for the imposition of responsibility in the criminal law. An example of this is the
discussion that has surrounded the creation of a new offence for senior managers of relevant
financial institutions in the UK whose reckless decisions result in the failure of the institution,
section 36 Financial Services (Banking Reform) Act 2013. Similar concerns have manifested
themselves in the law relating to directors duties in the civil law, see B. Rider, ‘Amiable lunatics
and the rule in Foss v. Harbottle’ 37 Cambridge Law Journal (1978) 270.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 20 / Date: 20/7
JOBNAME: Rider PAGE: 21 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
Having said this, the efficacy of anti-money laundering laws in the context of
corruption control has yet to be proved. For such provisions to be able to bite there is
a need for the conduct that is considered corrupt to be, had it occurred within
jurisdiction, a criminal offence. In part this is why it was desirable to provide clearly in
UK law that the bribery of a foreign official anywhere in the world by an agent of a
British company or a company with a defined relationship with the UK is a specific and
serious offence. While it is the domestic law where the anti-money laundering law is
invoked that is relevant, it is the case that the approach of other jurisdictions is not
uniform, particularly in regard to such issues as facilitation payments and the conduct
of independent actors. It is also the case that the record of most countries in actually
forfeiting or confiscating the proceeds of crime is far from impressive. For example, in
the UK, the amount of criminal property that has been confiscated is a miniscule
proportion of the assumed whole. Even in the relatively clear cut case of drugs-related
crime, it is guessed that in the UK we are confiscating less than 0.001 per cent of the
suspect wealth involved.35 Indeed, there are those who consider that this ‘guestimate’ is
significantly over-estimated. In the case of fraud and corruption, the amounts that have
been confiscated are ridiculously small. Indeed, as we have seen, our record in policing
the predicate crime is also far from impressive. The fact is that even in the USA the
proportions are not vastly different. In most countries they are far worse.
As we have indicated earlier in our discussion, when one considers the considerable
cost involved in creating and maintaining compliance in this context and the impact,
particularly in terms of legal, regulatory and ‘reputational’ risk, on the banks and other
intermediaries, of in effect placing them in the front line in the ‘war’ against organised
crime, terror and now corruption, it is far from clear how proportionate our strategies
are. Of course, it is misguided to attempt to judge the efficacy of such laws on the basis
of convictions or, for that matter, the amounts of criminal property taken out of the
criminal pipeline. In the modern world the information and intelligence thrown up by,
for example, suspicion-based reporting systems is arguably of considerable significance
to other areas of law enforcement and not least those concerned with proactively
protecting our integrity and security. Sadly, it is difficult to judge how effective
disruption as a policing tool is, particularly in the context of our current discussion. It
is probable that disruption as a strategy in law enforcement is better suited to dealing
with organisations and structures that require a consistent and timely flow of funds.36
35
The UK National Audit Office estimated that the UK confiscation of criminal assets was
no more than 26 pence in every £100 of criminal property and that in only 2 per cent of cases is
the full amount of the confiscation order actually collected, NAO Confiscation Orders, 17
December 2013. See also Report of the House of Commons Committee of Public Accounts,
Confiscation Orders, 21 March 2014, SO. See also B. Rider, ‘Taking the profit out of crime’ in
B. Rider and M. Ashe (eds), Money Laundering Control (1996) Sweet & Maxwell and B. Rider,
‘Recovering the proceeds of corruption’ 10 Journal of Money Laundering Control (2007) 5,
particularly p 26 et seq, and A. Kennedy, ‘An evaluation of the recovery of criminal proceeds in
the UK’ 10 Journal of Money Laundering Control (2007) 33.
36
See A. Leong, The Disruption of International Organised Crime (2007) Ashgate and supra
at n 18. See also B. Rider, ‘The enterprise of crime’ in B. Rider and M. Ashe (eds), Money
Laundering Control (1996) Sweet & Maxwell.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 21 / Date: 20/7
JOBNAME: Rider PAGE: 22 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
37
Bribery Act 2010 section 13. See also on this R (on the application of Corner House
Research) v. Director of the Serious Fraud Office (BAE Systems plc, interested party) (2008)
EWHC 714 and (2008) UKHL 60 in regard to the legality of halting corruption-related
investigations and proceedings on the basis of national security, and see R. Norton-Taylor and R.
Evans, ‘No national security issue says agency’, The Guardian 16 January 2007 and M. Evans et
al in The Times 17 January 2007.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 22 / Date: 9/9
JOBNAME: Rider PAGE: 23 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
38
See n 34 supra.
39
Re Supply of Ready Mixed Concrete (No 2) (1995) 1AC 456 and Meridian Global Funds
Management Asia Ltd v. Securities Commission (1995) 2 AC 500.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 23 / Date: 9/9
JOBNAME: Rider PAGE: 24 SESS: 5 OUTPUT: Wed Oct 14 15:09:05 2015
proposal for improving our approach in prosecuting fraud and corruption in the UK by
the shadow Attorney General has advocated a far more robust use of such principles.40
Section 7 of the UK’s new Bribery Act 2010 in this sense is somewhat revolutionary,
albeit not quite as draconian as some would have liked. This provision accords criminal
responsibility to a company for the acts of an agent who, notwithstanding having no
authority, has committed the offence in section 6 of bribing an official of an overseas
government. The company is entitled to a defence if it can show that it put in place
‘adequate arrangements’ to prevent such misconduct. In certain cases directors and
others of a company that is so convicted can be held personally liable, provided they
had knowledge of what was going on. Given the very wide and all-encompassing
definition in the statute of what amounts to bribery, there has been widespread concern
in the commercial and business sectors as to what is said to be an unfair and
unreasonable exposure to criminal liability. However, it is clear that the enactment of
this offence has greatly increased the concern of managements to ensure that they have
in place adequate compliance and training programmes. Thus, this provision has
already had significant beneficial results.
It is also not without interest that the UK Financial Conduct Authority (which has
taken over from the defunct Financial Services Authority) considers that it would be a
breach of General Principle 3 of their rules and regulations for a financial institution in
the UK not to have tailor made compliance procedures aimed at the giving of bribes, or
facilitating of bribery and other forms of financial misconduct. In such circumstances
the FCA is empowered to impose unlimited fines and take other action, including
against persons in control and those responsible for compliance. There is a palpable
change of attitude in the management of British businesses, in the financial sector and
generally, in regard to the risks thrown up by these laws and regulations.
40
Labour’s Policy Review: Tackling Serious Fraud and White Collar Crime (2013) Labour.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 24 / Date: 9/9
JOBNAME: Rider PAGE: 25 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
varies greatly on this. Some are prepared to waive prosecution and on the basis of full
co-operation regard the repentant party as an informer and even a competent witness.
Indeed, in such circumstances they might even be brought into a witness protection
programme – something that is often needed in serious cases of corruption, particularly
involving allegations against those still in office and especially those in law enforce-
ment. The position in England is usually that the prosecution will not agree to barter
away the possibility of a conviction, but will attempt to assist in mitigation of sentence.
The area of plea bargaining is one that is equally controversial. Again, in the USA
plea bargaining plays a major role in securing convictions for economic crime cases
and, in particular, those involving continuing enterprises. In Britain there has been
reluctance to adopt this approach, and recent attempts by the SFO to do so, without the
involvement of the court, and ‘agree’ levels of financial penalty (in collaboration with
the US authorities) have been declared unlawful and wholly unacceptable.41 On the
other hand, it has been accepted that encouraging in particular corporations that
discover misconduct has occurred to ‘self-accuse’ themselves to the authorities is
desirable and to be encouraged. The SFO in such cases is able, with the agreement of
the court, to enter into a deferred prosecution agreement with the ‘defendant’ under the
terms of which no prosecution will be initiated within a period provided agreed steps
are taken to remedy what has occurred and make restoration. If these conditions are
properly observed, under monitoring, then the case will be dropped.42 In the USA
considerable reliance is now being placed on similar procedures.
41
In R. v. Innospec Ltd (26 March 2010, Southwark Crown Court) Lord Justice Thomas
censured the SFO for failing to adhere to the rule of law. In his remarks on sentencing the
learned judge stated, ‘it is clear that the SFO cannot enter into an agreement under the laws of
England with an offender as to the penalty in respect of the offence charged’. He emphasised
that such deals had no effect and, indeed, in a subsequent case Bean J specifically rejected the
recommendation of the SFO for a suspended sentence on the basis that the accused had
co-operated fully and had done a ‘deal’ with the UK and US authorities. Thomas LJ considered
that a traditional fine was the appropriate financial penalty and emphasised that there should be
no difference, given the seriousness of the offence of corruption, between the UK and USA. In
previous cases the SFO had settled a much smaller financial penalty than the millions imposed,
albeit also by settlement, in the USA. Thomas LJ thought that ‘if the penalties in one state are
lower than in another, businesses in the state with lower penalties will not be deterred so
effectively from engaging in corruption in foreign states whilst businesses in states where the
penalties are higher may complain that they are disadvantaged in foreign states’. He also noted
the very considerable fines that were imposed in cases involving allegations of wrongdoing
under competition law and made the point that corruption could have an even more serious
impact on trade and business. He was not impressed by the argument that the SFO and the USA
had brokered their deal because they did not want to put the business out of business. In his
opinion, if the business was corrupt it should be sanctioned. Indeed, Thomas LJ stated that it was
improper for the SFO to try and do deals with the American authorities. See C. Nakajima,
‘Mabey may be the bridge we need’ 19 Journal of Financial Crime (2012) 124.
42
Deferred prosecution agreements are now authorised pursuant to Schedule 17, Crime and
Courts Act 2013. See Deferred Prosecution Agreements Code of Practice, 2013, Serious Fraud
Office and Crown Prosecution Service.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 25 / Date: 20/7
JOBNAME: Rider PAGE: 26 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
UNEXPLAINED WEALTH
Perhaps a rather more controversial suggestion for strengthening the hands of those
who are concerned with discouraging and pursuing corruption is the development of
procedures that identify unexplained wealth. Again, the UN Convention contains a
provision basically commending such an approach without actually obliging countries
to enact such laws.43 The British colonial governments, in imposing criminal codes on
many parts of the Empire, were concerned about misconduct in public office, albeit the
same degree of concern appears not to have been felt at home! The Bribery Ordinance
in Hong Kong is of particular interest in this respect. Section 10 in effect creates a
statutory presumption that any wealth over and above the lawful remuneration of a
public official is the proceeds of corruption. In addition to the offence of having
excessive unexplained wealth, there are provisions for its recovery and also for the net
to be thrown over close relatives and associates. Similar provisions were enacted in
other parts of the Commonwealth. Today in many countries, and even in Hong Kong,
there has been concern as to whether such laws comport with human rights.
It is also the case that in not a few developing countries there is an express or
implicit desire to see some degree of reallocation of wealth. South Africa is a good
example of this. Consequently, the strict operation of such a provision is unlikely to
find political favour. None the less, it is probable that the identification of unexplained
wealth will play an increasingly important role in the identification of those suspected
of tax fraud and evasion and possibly other acquisitive crimes. At the intelligence level,
net worth analysis has always been an important and useful tool. Now that there is so
much more information available it is certain to become even more effective. It is also
the case that under the laws relating to identification and interdiction of criminal
property, we are increasingly adopting procedures which focus on unexplained wealth.
For example, in the UK two convictions within a period will enable the court to
presume that wealth in the hands of the defendant is the proceeds of a lifestyle of crime
and to avoid confiscation the defendant will be required to explain the source of this
wealth. Indeed, in civil proceedings against assumed criminal property it is possible to
allege that unexplained wealth is likely to be the proceeds of crime on a civil burden of
proof. Indeed, given the practical problems in establishing the nexus to a specific crime
it makes a lot of common sense to focus simply on unaccounted for wealth.
Even if there is reluctance to bring into law specific consequences, as a result of
holding unexplained wealth it may well be possible to achieve at least some of the
practical advantages of such a strategy through contract law and, in particular,
employment law. The incorporation of obligations to declare wealth and explain
unearned income and to provide for monitoring within compliance systems has much to
commend it if the relevant activity is such as to carry high risks of temptation.
Similarly, appropriate provisions can be included in transactional contracts – although
43
Article 20 provides that ‘subject to its constitution … each state party shall consider
adopting such legislation and other measures as may be necessary to establish as a criminal
offence, when committed intentionally, illicit enrichment, that is a significant increase in the
assets of a public official that he or she cannot reasonably explain in relation to his or her lawful
income.’
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 26 / Date: 20/7
JOBNAME: Rider PAGE: 27 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
this may in practice be rather more difficult to negotiate. Of course, control and
compliance provisions have long been used in procurement contracts.
44
See B. Rider, ‘The war on terror and crime and the offshore centres: the new perspective’
in D. Masciandaro (ed), Global Financial Crime (2004) Ashgate.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 27 / Date: 20/7
JOBNAME: Rider PAGE: 28 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
However, they do still exist and there are jurisdictions, such as Taiwan, that have very
few procedures for co-operation with other states. Furthermore, it cannot always be
assumed that the government and its agencies are willing to co-operate with those of
other states. They may have some sympathy, where there has been a change in
government, with the former leadership. Or they may have been corrupted. This is not
fanciful. There are examples of governments and their central banks that have been
willing, for a price, to become essentially money launderers for organised crime and
other criminals. In one case involving a Commonwealth country in the Caribbean, the
corruption encompassed the then Prime Minister and Attorney General, and investiga-
tors from the USA were simply murdered. In such cases there is no justice or realistic
prospect of justice.
While governments were apparently reluctant to give up the benefits of providing
bank secrecy and other offshore-related services to suspected criminals simply on the
basis that they might be assisting them in laundering their wealth and allowing them to
re-invest it in further criminal activity, there was a sea change after 9/11. The concern
of President Bush, albeit perhaps in retrospect misguided, to turn the financial weapons
that had been developed to deal with drug dealers on terrorists, meant that countries
were in reality either part of the solution or part of the problem! While even the
Republican Party had been loath to expose itself to the glare of the US Internal
Revenue Service the financial arrangements that numerous leading US corporations had
developed with certain Caribbean jurisdictions and Bermuda, the fear – that turned out
to be more or less groundless – that these jurisdictions were being used to launder
terrorist funds resulted in the near death of financial privacy. As a subsequent
Congressional Committee reported, attempting to identify terrorist funds in the same
way as drugs money was a nonsense and the mechanisms that were adopted were like
trying to ‘drain the ocean to find one kind of fish’. The more so because in practice the
unofficial underground banking systems such as the hawala systems were far more
significant for the terrorists, and in any case, where they did use banks, they were
invariably based in the Pacific or the USA itself!
Now that the ‘crusade’ has moved on from drug lords and terrorists to corruption we
see the same arguments being employed to expose the financial arrangements and
wealth of those who are suspected of corrupt practices or, perhaps rather more
worrying, those who are or who have been politically exposed, their families and their
business associates. A cynic might think that all this has perhaps more to do with
exposing financial records to the tax authorities than actually promoting integrity
worldwide! The financial crisis and the near collapse of western banking have focussed
governments’ attention rather more openly on tax evasion and revenue enhancement.
The recent meetings of the OECD have been concerned with tax havens and the like,
and have increasingly focussed on the facility that many jurisdictions offer for easy
corporate registrations. In almost any conceivable fraud or money laundering operation
there is a need for corporate and trust vehicles. The use of such companies and trusts
enables beneficial ownership to be hidden or at least obscured. Of course, perhaps the
prime offenders in terms of easy incorporation and the ability to hide beneficial
ownership are not in the main small island jurisdictions in the Caribbean and Pacific,
but the UK and USA. The OECD, G8 and G20 have agreed to severely limit the
opportunity that the corporate form affords those who wish to hide or complicate their
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 28 / Date: 20/7
JOBNAME: Rider PAGE: 29 SESS: 4 OUTPUT: Wed Oct 14 15:09:05 2015
financial transactions, and Mr David Cameron, the British Prime Minister, has gone as
far as to announce that legislation will soon be introduced to expose the beneficial
ownership of UK companies.45
While all this is obviously to be welcomed, it remains to be seen whether in practice
it will make much difference for those who are charged with the investigation of
corruption. In the end the transparency of the international financial system is only as
good as its weakest link. Finally in this regard, in the wholesale abandonment of the
virtues of privacy in financial matters, we should perhaps not forget why privacy was
invented, or at least called into aid, by the lawyers and bankers – namely to protect the
weak and legally vulnerable from the unjustified deprivations of governments and
tyrants. In all our deliberations about corruption and its malevolent cousins, it is
necessary to retain a sense of proportion and especially to be aware of unintended
consequences both in the conception of law and in particular in its application.
45
See G20 High Principles on Beneficial Ownership (16 November 2014), but see B. Rider,
‘The end of havens?’ 12 Journal of Money Laundering Control (2009) 213. English judges have
also done their bit – see B. Rider, ‘Exposing the modesty of companies’ 34 Company Lawyer
(2013) 263.
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: 60 /Pg. Position: 29 / Date: 20/7
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Name index
755
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 1 / Date: 9/10
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 2 / Date: 9/10
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 3 / Date: 9/10
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 4 / Date: 9/10
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 5 / Date: 9/10
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
O’Brien, J. 227 Rider, B. xxxvii-xl, 3, 14, 15, 16, 19, 20, 27,
Orcharton, E. 467 31, 42, 47, 92, 230, 281, 406, 419,
O’Sullivan, D. 330 726–54
Ottolenghi, S. 104 Roach, K. 539
Overhuls, C. 606 Robb, G. 38
Oyinlola, A. 613 Roberts, J. 251
Roberts, P. 592
Page, F. 22, 25, 26 Robinson, C. 222
Pai, H. 450 Robinson, J. 48
Pallissery, F. 177 Robinson, M. 399
Parker, C. 141, 163 Robinson, P. 668, 669, 670
Parlour, R. 300–312 Rose, F. 104, 105
Partnoy, F. 40 Rose-Ackerman, S. 398, 406
Pearce, F. 51 Rosenberg, H. 691–702
Pearce, R. 741 Rosenfield, B. 18, 19, 21
Peat, R. 390 Ross, D. 437
Pédamon, C. 338–55 Ross, S. 369
Penn, G. 232, 234 Rossbacher, H. 382
Peretti, K. 371 Rothe, D. 174
Persson, A. 400 Rothschild, D. 29
Peterson, R. 174 Roubaud, F. 406
Pettit, P. 222 Russenberger, M. 533
Philp, M. 7, 394 Ryder, N. 223, 381–93, 731
Picciotto, S. 220, 227
Pieth, M. 543 Sacerdoti, G. 386
Piety, T. 536 Saleh, N. 206–16
Platten, K. 180 Salehi, M. 617, 623, 624
Plumper, T. 226 Saleuddin, R. 726
Pogue, C. 543 Samantha, S. 381, 382
Ponemon, L. 622 Sanyal, R. 381, 382
Pong, C. 622, 623 Sathye, M. 529
Pope, T. 382, 387 Saunders, B. 111
Porter, B. 613, 615 Sautonie-Laguionie, L. 338, 339, 343
Posner, R. 157 Schaefer, A. 18, 19, 31
Power, M. 622 Schafer, D. 32
Pratt, M. 621 Scheuerman, W. 602
Prentice, R. 157, 158, 163 Schick, A. 618, 619
Pritchard, A. 605 Schipani, C. 157, 178–90
Schleifer, A. 222
Quillen, J. 527 Schloenhardt, A. 670, 672, 673, 674
Quo, S. 125–43 Schmidt, D. 399
Schneider, S. 47, 48
Rabkin, J. 604, 605 Schott, P. 89, 92, 94
Rafferty, A. 251 Schroeder, R. 622
Ramsay, I. 108, 111 Scott, D. 619
Raphael, M. 386, 563 Sen, A. 231
Rayner, S. 360, 361 Shah, A. 399
Razafindrakoto, M. 406 Sharman, J. xxix 541, 727
Reach, D. 617 Sharpes, D. 140
Reading, J. 658–67 Shavell, S. 17
Recanatini, F. 400 Shaw, M. 410–11, 412
Reuter, P. 528 Shaxson, N. xxix
Rhee, R. 605 Sheikh, S. 386
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 6 / Date: 9/10
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 7 / Date: 9/10
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: NameIndex /Pg. Position: 8 / Date: 9/10
JOBNAME: Rider PAGE: 1 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Subject index
763
Barry Rider - 9781783475780
Downloaded from Elgar Online at 03/27/2017 09:24:47PM
via University of Melbourne
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 1 / Date: 9/10
JOBNAME: Rider PAGE: 2 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 2 / Date: 9/10
JOBNAME: Rider PAGE: 3 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
UK Bribery Act 281, 290, 292–3, 382, 387, whistleblower protection see whistleblower
560–61, 744, 745, 747, 749 protection
UK Bribery Act, extra-territorial jurisdiction see also auditors and fraud detection;
431–2 corporate governance; management
bribery and corruption, legal mechanisms to
control, UK 381–93 Canada
Anti-terrorism, Crime and Security Act anti-money laundering regulation 533–4
(2001) 386 chip and PIN technology effects on
Bribery Act effects 382, 387 computer related fraud 372
bribery extent 382 cybersecurity foreign policy plan 645
civil fines 391–2 police and financial services industry
corporate criminal liability introduction partnerships 49
384–5
Capital Requirements Regulations, EU 295
criminal offence types 383–4
capitalism, Standing Commission on
criminalisation of bribery, and legal reform
382–5 Responsible Capitalism suggestion
enforcement mechanisms 389–93 162–3
Financial Conduct Authority (FCA) capitalism and democracy, Russia 53–4
involvement 388–9, 390, 391–3, 749 capitalist system, inherent instability 225–7
financial sanctions 390–93 ‘carding’ 371
Financial Services Association involvement see also computer related fraud
387–8, 390–93 CARIN (Camden Assets Recovery
Financial Services and Markets Act (2000) Interagency Network) 472
387–8, 390, 391 see also confiscation and forfeiture
integrity objective and financial system cartels see under unfair competition and crime
protection 388 Cayman Islands, Criminal Procedure Code
international legislative measures 385–7 and confiscation of funds 681–2
Law Commission Report on bribery reform Chabra jurisdiction (freezing orders against
386–7 third parties) 709
law enforcement and regulatory agencies charismatic leadership influences and
387–9 corruption 436–7
sentencing 389–90 see also corruption and public policy in
Serious Fraud Office (SFO) involvement post-conflict states
387, 389 China
see also corruption Companies Statute and fiduciary
Bribery Ordinance and unexplained wealth accountability 741
identification, Hong Kong 751 Corporations Act and family interests 730
businesses insolvency-related crime 214
‘big business’ presence and crimes of the International Association of Anti-Corruption
powerful 52 Authorities (IAACA) role 411
business judgment rule 178 self-laundering 483–4
company as asset protection device, China, anti-corruption measures 411–12,
vulnerability of 105–6 419–34
continuity planning 301, 305, 311–12 Anti-Money Laundering Law 424, 434
employers as victims 10–11 Bank of China (BOC) investigation into
management disqualification see foreign exchange controls 431
management disqualification in Committees for Discipline Inspection
companies and financial institutions (CDIs) 421, 422, 424–5, 428–30
organisation types, and vulnerability Communist Party effect on 422–3
analysis 302, 303 corrupt officials relying on family and
organisational structure 296, 618 friends to seek payments 427–8
profits derived from criminal activity corruption risk focus 430–31
(undocumented workers) 450–51 death penalties 425, 426, 433
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 3 / Date: 9/10
JOBNAME: Rider PAGE: 4 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 4 / Date: 9/10
JOBNAME: Rider PAGE: 5 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 5 / Date: 9/10
JOBNAME: Rider PAGE: 6 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
UK, Proceeds of Crime Act (2002), victim hacking 370–71, 642, 644
compensation 326–7, 455–7 identity crime 369–71, 374–6
victim 326–7, 455–6 international cooperation 376–7
whistleblower protection, Australia 593–4 investment schemes 368
compensation, executive 160, 229, 232, 236, legal responses 372–6
237, 286 malware 370–71
competition, unfair see unfair competition and online payment mechanisms, misuse of 368
crime phishing 43, 370, 371, 642
Competition Act, Australia 125, 127–8 spam 371–2, 642
compliance, and control liability see control traditional offences, need for adaptation of
liability and compliance in financial legal response 373
institutions
UK Computer Misuse Act (1990) 645
compliance officer issues in financial sector
see also cybercrime; internet; technology
279–87
anti-corruption measures 284 confidence building see financial system,
Basel Committee on Banking Supervision engendering confidence
279 confidentiality rights 509, 532–4
complexity issues of products and services confiscation
282–3 Hong Kong, anti-money laundering regime
cyber security and cyber crime 284 120–21
early red flag indicators, importance of orders, UK, Proceeds of Crime Act 325–6,
285–6 327, 450
ethical conduct and Integrated Risk post-conviction laws 535
Management Committees 286 priorities, UK, Proceeds of Crime Act
financial crisis effects 280–81, 282 448–9
international developments and trends 285 rates of proceeds of crime 746
market misconduct and crime prevention value of property as 455
283–4 see also civil asset recovery
money laundering and terrorist financing confiscation and forfeiture, UK 462–72
measures 283 CARIN (Camden Assets Recovery
monitoring international developments and Interagency Network) 472
trends 285 civil claim, injury suffered by state
product development cycle involvement, enforceable as 464–5, 468–9
need for 282–3 Community Cashback Schemes 470
regulation, current 280–81 confiscation mechanism and Proceeds of
risk management 281–2, 283, 285 Crime Act (2002) 464–5, 469, 470
Securities Industry Financial Markets confiscation rates 746
Association’s White Paper 279–80 criminal lifestyle assumption 464, 466–8
Shariah compliance risk, need for criminal lifestyle assumption, variations in
understanding of 283 calculation 465–6
specialised training 284–5 distinction between (conviction versus
team working, need for 285 non-conviction base) 462–3
see also control liability and compliance in European Convention on Human Rights,
financial institutions; enforcement confiscation as penalty 465, 469, 471
computer related fraud 366–77 fiscal benefits of allowing direct
advance-fee frauds 368–9 incentivisation 471–2
advertising and click-frauds 369 forfeiture without conviction is not
botnets and spam generation 371–2, 642 substitute for conviction 470–71
chip and PIN technology effects 372 forfeiture without conviction and no
credit card skimming and ‘carding’ 371 feasible option to prosecute 471
cybercrimes and computer misuse funding and incentivisation 469–70
provisions 373–4 international consensus on core principles,
fraudulent sales 368 need for 470–72
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 6 / Date: 9/10
JOBNAME: Rider PAGE: 7 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 7 / Date: 9/10
JOBNAME: Rider PAGE: 8 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 8 / Date: 9/10
JOBNAME: Rider PAGE: 9 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
corruption as both economic and political creditors’ rights, fraud against (Paulian
problem 398 action), France 338, 339, 342–4, 346
corruption definitions 394–6 crime control definition xxx
future research 403–4 crime disruption and use of intelligence
ICT-based tools 400 638–46
implementation role and distortion 402–4 bot networks 642
institutionalist approach 400–402 conventional wisdom 639–40
nature and cause of corruption, lack of crime controller categories and effectiveness
agreement on 399–400 640, 641
neoclassical to new institutional economics cybercrime as FBI priority 642–3, 644
change 398–9, 401 cybercrime targeting, US/UK comparison
643
past strategies 396–9, 401
cyberspace effects 638–9, 641–6
principal–agent theory 398, 400
environmental crime theory 639–40, 642
public choice theory as past strategy 396–7, EU Convention on Cybercrime 377, 644–5
398–9, 401 hacking 370–71, 642, 644
public policy design distortion 402–3 intellectual property crime 23, 642
see also strategic tools and future intelligence collection 640, 641, 642–3
development international collaboration, need for 644–6
Corruption Perception Index (CPI) concerns Mutual Legal Assistance Treaties (MLATs),
406 effectiveness concerns 635, 643–4
corruption and public policy in post-conflict phishing website detection 642
states 435–43 Problem Oriented Policing (POP) model
Afghanistan 437–8, 439, 442 639–40, 644
anti-corruption programmes, need for spam 642
development of 442 crime seriousness measurement, insider
authoritarian rule 438–9 trading crimes 253–4
charismatic leadership influences 436–7 crimes of the powerful (CoP) and
ethnic affiliation influences 436–7, 439 legitimisation 51–62
group protection needs 437–8 “big business” presence 52
International Security Assistance Force global financial and economic architecture
(ISAF) involvement 439, 440 effects 53
Iraqi politics and corruption 438, 440–42 inconsistency claims 52
Iraqi politics and corruption, military and offender and offence types 52–3
security needs 441–2 theoretical controversies and categorisation
Iraqi politics and corruption, security 51–3
personnel salaries 441 crimes of the powerful (CoP) and
liberal democratic states, practice legitimisation, Russia 53–62
differences influencing intervention anti-corruption drive 55, 60–61
436 armed forces and corruption-related
licensing foreign security companies 438 offences 60–61
military and aid priorities, competing capitalism and democracy 53–4
439–40 collective offences 58
military and security needs 437 corporate fraud as threat to Russian
patronage and bribery 437–8, 439, 440–41, companies 58–9
442 economic crime statistics 56–7
public salaries, withholding 439 embezzlement 59–60
Western involvement, criticism of 439 fraud offences 57–60
cost factors see funding issues hostile takeovers 61–2
counterfeiting and forgery 9–10, 18, 24, 34, insider information, illegal use of 61
59, 78–9, 373 international conventions against corruption,
credit card skimming and ‘carding’ 371 party to 60
see also computer related fraud legal persons free from criminal liability 58
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 9 / Date: 9/10
JOBNAME: Rider PAGE: 10 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 10 / Date: 9/10
JOBNAME: Rider PAGE: 11 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 11 / Date: 9/10
JOBNAME: Rider PAGE: 12 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
‘dirtier data-processing’ involvement 622, 623 duty to report offences, Hong Kong,
see also auditors and fraud detection anti-money laundering regime 116–17
discharge applications, civil asset recovery
707 economic crime and criminals, characteristics
disclosure 3–14
asset disclosure order 709 corporate criminals 12
control liabilities 630 corruption 7–8, 11
and cultural differences 729–31 counterfeit products 9–10
decisions, white-collar crimes 575–6 cybercrime 9, 13–14
failure, and fraud and restitution 328, 329 economic crime definitions 3–4
fraud cases regime, UK 567–8 employers as victims 10–11
full and frank, civil asset recovery 706–7 and financial crisis see financial crisis,
full and frank disclosure by applicant, civil
economic crime and development links
asset recovery 706–7
fraud 6–7, 13
information sharing decisions 564
insider trading regulation, China 269–70, individual members of public as victims 10
272, 273 market as victim 11, 13, 14
insolvency-related crime, US 210 money laundering 8, 12, 13
leaking and disclosure, difference between organised crime groups 13–14
585 politically exposed persons (PEPs) as
obligations, criminal justice system, UK criminals 7, 13
common law 556–8 rogue insiders as criminals 13
Public Information Disclosures Act, smuggling 6
Australia 587–8, 592, 594, 595, 598 state as victim 11
Public Interest Disclosure Act, Australia victim categorisation 10–11
586–7 white-collar and blue-collar crime, first use
public sector disclosures, importance of of terms 4–5
589–90 see also financial crime headings
share interest 106 economic democracy principle, Indonesia 168
third party 273–4, 704 economic effects
see also non-disclosure China, anti-corruption measures 420–21,
dishonesty 425–6, 431
objective, and criminal liability 328 economic development and corruption
test, and criminal fraud 323 proceeds 407–8
dissipation of assets risk 706, 707 economic success as driver of corporate
dol (deceit) and fraud, interchangeable use, governance 156–7
France 339, 341 financial crisis see financial crisis
double jeopardy rule 578, 648–9 terrorism and corruption 93
double-criminality requirements, offshore electronic surveillance use 560
jurisdictions 686–7 see also monitoring
“dressed-up” fraud, France 348–9 embezzlement 59–60, 447–8
drug trafficking 46–7, 48, 302, 447, 672, employees
676–7 UK Bribery Act amendment suggestion,
dual criminality problems, money laundering inclusion of company employees
offences 478, 479, 484 560–61
due diligence UK Employment Rights Act 609
bank’s undertakings’ failure 515 undocumented workers 450–51
financial crime deterrence practicalities 300, employers as victims 10–11
306–7, 310 enforcement
due process concerns, civil asset recovery agencies and budget cuts 736
502–5 challenges, and terrorism 95
duty of care, directors 721 financial crisis effects 237
duty of loyalty see fiduciary duty of loyalty international cooperation 660, 661–5
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 12 / Date: 9/10
JOBNAME: Rider PAGE: 13 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 13 / Date: 9/10
JOBNAME: Rider PAGE: 14 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
EU Extradition Act (2003), and bars to fiduciary duty of loyalty, corporate executives
extradition 647–51 and conflicts of interest 184–90
European Convention on Human Rights approval grounds of interested transaction
(ECHR) and proportionality 651 186–9
evidence amounting to prima facie case 651 board ratification 188–9
extradition reasons 648 fair price analysis 188
forum bar 650 fair transaction factors 187–8
hostage taking considerations 650 friendliness allegations 186
human rights considerations 651, 652–3 “material interest” factor 186
legal framework 647–8 shareholder ratification 189
passage of time as bar 649–50 transactions lacking good faith 189–90
person’s age as bar 650 valid approval exception 185
persons who can be extradited 648 Financial Action Task Force (FATF)
physical or mental condition considerations on corruption 661, 667
651 diamond smuggling report 283
Proceeds of Crime Act (2002) Restraint money laundering and terrorist financing
Order, breach of 653–7 measures see money laundering, and
racial/sexual/political considerations 649 terrorist financing measures, Financial
refusal, reasons for 648 Action Task Force (FATF)
right to a fair trial 653 non-conviction based confiscation 535
right to liberty and security 653 Recommendations, money laundering
specialty arrangements 650, 653–7 offences 473–7, 479–80, 481, 483–4,
torture or inhuman treatment prohibition 486–8, 494
652 suspicious activity reporting 486–8, 494
financial control and facilitator liability 748–9
facilitator liability and financial control 748–9 financial crime
fair trial right 577–8, 653, 719 definitions xxviii-xxxii 628
Fair Work Act, Australia 592 see also banking; economic crime and
fairness principle, Indonesia 172 criminals, characteristics
false representation 6, 24, 27, 316, 322, 328, financial crime deterrence practicalities
330 300–312
FATF see Financial Action Task Force (FATF) business continuity planning 301, 305,
fiduciary duties 311–12
accountability breaches 741–2 client identification and due diligence 300,
bank’s due diligence undertakings’ failure 306–7, 310
515 commercial espionage and recruitment
breach, and reparation for loss 331–2 policy checks 303
China, Companies Statute and fiduciary cybercrime and cybersecurity 311
accountability 741 deterrence model 300, 305–6, 308–9
financial crisis effects 219–20, 223–5, 226, drug trafficking routes and threat analysis
228–9 302
management disqualification in companies due diligence 300, 306–7, 310
and financial institutions 720–21 Indonesia 173–7
third parties dishonestly assisting in breach money laundering suspicion and reporting
333–4 307
fiduciary duty of loyalty 178–90 organisation types and vulnerability analysis
agency law 181–2 302, 303
Ancient Roman inheritance law 179–80 product delivery services and remoteness
business judgment rule 178 from customers 303
extension to partnerships 182–3 record keeping 301, 303, 305, 308–9
inheritance taxes 180–81 reporting 300–301, 307–8
law of trusts history 179–83 risk management 300, 301–2, 303–4, 305
profit restrictions 182 and social media 301, 310–11, 312
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 14 / Date: 9/10
JOBNAME: Rider PAGE: 15 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 15 / Date: 9/10
JOBNAME: Rider PAGE: 16 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
theory of mistake (erreur) 339 Serious Fraud Office (SFO) powers 563,
traditional dualist classification 341–9 570–71
transfer of immovable rights, and fraudulent telecoms or internet providers, acquiring
collusion 344–5 records from 567
unitary notion of fraud 349–54 third party, evidence requisitioned from 566
fraud fraud in civil law, UK 316–21
as abuse of position 6, 27 asset recovery 317
computer related see computer related fraud civil recovery under Proceeds of Crime Act
crime and criminals, characteristics 6–7, 13 (2002) 320–21
crimes of the powerful (CoP), Russia 57–60 deceit 316–17
as deception 553–4 dishonest assistance and liability to account
for breach of trust 319
detection see auditors and fraud detection
freezing orders 321
evidence of, civil asset recovery 704, 707
knowing receipt and liability to account for
fraudulent bankruptcy 211 breach of trust 318–19
fraudulent trading, and insolvency 207–8 liability in constructive trust 318–20
hedge fund regulation development 147 liability in constructive trust, tracing
and Islamic law see Islamic law and 319–20
concept of fraud liability to account for breach of trust
theory see France, fraud theory 318–19
trial process problems and judicial decisions misrepresentation 316, 317
556–7 non-disclosure 316
triangle model, auditors and fraud detection fraud concept 15–31
617–18 commercial and consumer fraud distinction
UK Fraud Act (2006) 26–7, 208, 322–3, 29–30
558, 745 debt and insolvency 28
whistleblower protection and disclosure definition problems 15–16
types 590 early history 20–22
fraud cases, management of complex, UK in Islam 19–20
563–72 Jewish and Roman concept comparison
alternative case resolution 571 21–2
asset recovery and Proceeds of Crime Act in Judeo-Christian religion 18–19
(2002) 569–70 money laundering 28
case management strategy 564–5 and morality 16–18
Crown Prosecution Service (CPS) 563, Roman law and common law fraud and
570–71 actio doli 27–8
Deferred Prosecution Agreements (DPAs) social security fraud and human rights 28–9
571 and technology 31
disclosure regime 567–8 fraud concept, English law history 22–7
encoded digital media, dealing with 567 action in deceit 24, 25
evidence assessment and management 564, breach of warranty 24
565–7 civil law 27
health issue considerations 564 common law 22, 24–5, 27–8
information sharing decisions 564 constructive taking doctrine 26
interviewing techniques, importance of Criminal Justice Act (1987) 26
skilled 568–9 criminal law 25–7
judicial management 572 Criminal Law Act (1977) 26
privileged material identification 567 dishonesty as concept 26, 27
probative material sources 564 in equity 22–3, 28, 31
prosecution decisions 570–71 estoppel doctrine 25
Restraint Orders 569–70 exercise of discretion 24–5
Roskill report 563 false pretences, obtaining by 26
search warrant applications 565–6 Fraud Act (2006) 26–7
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 16 / Date: 9/10
JOBNAME: Rider PAGE: 17 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 17 / Date: 9/10
JOBNAME: Rider PAGE: 18 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 18 / Date: 9/10
JOBNAME: Rider PAGE: 19 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 19 / Date: 9/10
JOBNAME: Rider PAGE: 20 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 20 / Date: 9/10
JOBNAME: Rider PAGE: 21 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
strategic tools and future development Ireland, Criminal Assets Bureau (CAB) and
752–3 conviction based confiscation 468–9
UN Convention against Transnational Islamic law and concept of fraud 19–20,
Organized Crime, participating states’ 356–65
role 659–60 burden of proof 360–61
International Criminal Court 668–78 condemnation of fraud 362–3
aiding and abetting as criminal financial crimes, prohibition of 364–5
responsibility mode 675–6 fiqh (jurisprudence) 357–8
bribery and corruption as possible future insider trading 364–5
inclusion 672–3 Islamic law sources 356–9
budget and caseload concerns 673 misrepresentation 360
crimes occurring in the territory of a State money laundering 365
Party 676 non-disclosure of material price-sensitive
financial aspects of underlying offences information 364–5
674–8 public interest 358
forfeiture and reparations scheme 677–8 Qur’an 357, 359, 362–3, 364, 365
future inclusion possibilities 671–4, 676–7 rescinding a contract 360–61
gravity of crime issue 673 rule of law validity 359
liability mode, determining relevant 675 Shari’ah law 283, 356, 359
mens rea test 675 Sunnah 357, 359, 362–3, 364, 365
origins 668–9 Italy
pillage as possible underlying crime 676–7 insolvency-related crime 211–12
Rome Statute exclusion 668–71 organised crime groups 13
terrorism and drug trafficking, resistance to
inclusion 669–71 Jamaica
international development assistance see crime and tourism links 98
corruption and international development money laundering 87, 89–91
assistance Proceeds of Crime Act 89–91, 95
International Organization of Securities reporting of corrupt activity 95
Commissions (IOSCO) 239–40, 285 tax evasion 97
International Security Assistance Force (ISAF) Terrorism Prevention Act (TPA) 98
439, 440 Japan
International Standards on Auditing (ISAs) FATF Mutual Evaluation Report 476–7
615–16 money laundering 481, 483
internet Punishment of Organized Crimes and
development effects 44 Control of Crime Proceeds Act 478,
online reporting, China 429–30 482
providers, acquiring records from 567 Jewish fraud concept 18–19, 21–2
see also computer related fraud; judicial approaches
cybercrime; technology criminal procedural norms, judicial
interviewing techniques, importance of skilled resistance to 719
568–9 fraud cases, management of complex, UK
investigation efficacy and secrecy, strategic 572
tools and future development 752–4 fraud trial process problems and judicial
investigative agencies, pressure to get results decisions 556–7
736–8 insider trading crimes, sentencing, US
investment schemes 368 255–61
EU Alternative Investment Fund Managers trial before a judge alone or with
Directive 152–3, 153–4 professional assessors, call for 561–2
see also computer related fraud see also criminal justice system; criminal
investors, hedge fund risks 146–8 penalties; sentencing
Iraq, corruption and public policy 438, just price doctrine 34
440–42 see also history of financial crime
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 21 / Date: 9/10
JOBNAME: Rider PAGE: 22 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 22 / Date: 9/10
JOBNAME: Rider PAGE: 23 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 23 / Date: 9/10
JOBNAME: Rider PAGE: 24 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 24 / Date: 9/10
JOBNAME: Rider PAGE: 25 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 25 / Date: 9/10
JOBNAME: Rider PAGE: 26 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 26 / Date: 9/10
JOBNAME: Rider PAGE: 27 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
see also offshore issues in policing financial see also corruption and public policy in
crime post-conflict states
sanctions self-incrimination 504–5
bribery and corruption 390–93 see also civil asset recovery, US
corporate fraud participation, Russia 58 self-laundering 483–4
and financial crisis 237 see also money laundering
insider trading regulation, China 274–5, 277 self-regulatory traditions 36, 37–9
insolvency-related crime, China 214 sentencing
management disqualification as civil bribery and corruption 389–90
sanction 718–19 conviction rate concerns 736–7
see also criminal justice system; criminal criminal fraud 323, 324–5
penalties; enforcement; punishment; criminal justice system, UK 560
sentencing insider trading crimes see insider trading
Scottish asset forfeiture agency 465–6, 471 crimes, sentencing
search warrant applications 565–6 money laundering cases 124, 478–9, 513
secret profits rule 731, 741 prison sentences as deterrent 447, 448
see also profits US Sentencing Reform Act 252, 253
securities see also criminal justice system; criminal
‘effect on the price’ approach, China 271 penalties; judicial approaches;
regulation 35–6, 37 punishment; sanctions
Securities Industry Financial Markets shadow banking system 145
Association’s White Paper 279–80 see also hedge fund regulation development
Securities Law, China 267 shadow directors 207, 208, 212
securities and banking industries, civil see also directors
enforcement, US 691–702 shareholders
Exchange Act (1934) 691–2, 694, 696 “company burials” and share sales,
Federal Reserve System 693 Germany 211
Financial Crimes Enforcement Network insolvency and takeover cases 110–11
(FinCEN) 693, 701 ratification, corporate executives and
Financial Industry Regulatory Authority conflicts of interest 189
(FINRA) 691, 692–4, 697–8 responsibilities 243
Foreign Corrupt Practices Act (FCPA) 696 share interest disclosure 106
insider trading and tipping 695–6 shareholder primacy and shareholder value
Office of the Comptroller of the Currency maximisation 155–6, 157–8, 159–60,
(OCC) 693, 701 164, 165
private individuals 693–4 Shari’ah law 283, 356, 359
Securities Act (1933) 691 see also Islamic law and concept of fraud
Securities and Exchange Commission short-termism problems, and corporate
(SEC) 606–8, 691, 692, 694–6, 715, governance 157, 160
739–40 silence, right to 121–3, 557, 581–2
securities fraud 694–5 Singapore
securities regulation 691–2 corporate financial assistance rule 108
unregistered broker-dealers 694 disguised forms of capital return 107
securities and banking industries, civil insolvency-related crime 109, 215
enforcement, US, anti-money laundering real estate investment trusts (REITs) 103
laws 698–701 social costs, anti-money laundering and
Bank Secrecy Act (1970) 699 terrorist financing measures 529–30
criminal and civil enforcement 699 social fabric, corruption effects 93–4
Deferred Prosecution Agreement 700–701 social media 45–6, 301, 310–11, 312
Financial Industry Regulatory Authority social security fraud and human rights 28–9
(FINRA) Rule 3310 699, 701 South Africa
PATRIOT Act 699 civil forfeiture restrictions 537
security companies, licensing foreign 438 Prevention of Organized Crime Act 535
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 27 / Date: 9/10
JOBNAME: Rider PAGE: 28 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 28 / Date: 9/10
JOBNAME: Rider PAGE: 29 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 29 / Date: 9/10
JOBNAME: Rider PAGE: 30 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 30 / Date: 9/10
JOBNAME: Rider PAGE: 31 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 31 / Date: 9/10
JOBNAME: Rider PAGE: 32 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 32 / Date: 9/10
JOBNAME: Rider PAGE: 33 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 33 / Date: 9/10
JOBNAME: Rider PAGE: 34 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 34 / Date: 9/10
JOBNAME: Rider PAGE: 35 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 35 / Date: 9/10
JOBNAME: Rider PAGE: 36 SESS: 3 OUTPUT: Wed Oct 14 15:09:05 2015
Columns Design XML Ltd / Job: Rider-Research_Handbook_International_Financial_Crime / Division: SubjectIndex /Pg. Position: 36 / Date: 9/10