The Anticorruption Protocol to the United Nations Convention against Corruption Beneficial Owner Rule
Abstract
:1. Introduction
- It traps front men.
- It triggers a chain of witness cooperation.
- It does not require proof of a predicate crime or the illicit nature of funds.
- It captures offshore behavior by non-state party nationals via a travel rule.
- It fights organized crime using a domino strategy.
- It would be accomplished via a relatively simple change in domestic laws.
- For each transaction, prosecutors would have immediate access to the name of a single natural person who asserts beneficial ownership.
- Prosecutors would have immediate access to a transaction-level record of assertions by front men that can be tested by a prosecutor.
- The strategy eliminates loopholes that allow criminals to escape prosecution in offshore havens.
2. The APUNCAC Beneficial Owner Rule
Each State Party shall give effect to this Protocol and shall adopt such measures as may be necessary: (a) to establish as criminal offenses under its domestic law the offenses established in accordance with this Protocol; (b) to establish its jurisdiction over such offenses, in its territories and outside its territories; and (c) to make those offenses punishable by a maximum term of imprisonment not less than five years.11
2.1. Financial Institutions
Each agent, agency, branch, or office of a financial institution other than a bank: (i) within the jurisdiction of a State Party, or (ii) that handles an international funds transfer in the amount of $3000 or more—(A) on behalf of, or for the benefit of, a national of a State Party, or an entity within the jurisdiction of a State Party or (B) that is transmitted to or from the jurisdiction of a State Party; shall with respect to a transmittal of funds in the amount of $3000 or more… retain and submit to FINCEN an electronic record of the following information relating to the transmittal order…
Certification of the source and beneficial owner of the source funds, and the beneficial owner of the receiving account (or, in the case of a trust, the potential or actual individually identified trust beneficiaries), certification that such funds do not involve the laundering of funds obtained illegally or through criminal activities and do not involve tax evasion, and acknowledgment that criminal penalties apply if false or misleading information is provided…
Alternatively, a beneficial owner of the source funds, or a beneficial owner of the receiving account, or his certified agent, may satisfy the applicable provisions of subparagraph (H) by (i) appearing in person at any time prior to such transmittal of funds pursuant to this paragraph, (ii) presenting his passport, and (iii) certifying beneficial ownership under penalty of perjury of all funds that are received by, or transmitted from, his account. Such one-time alternative certification shall be effective upon electronic submission to FINCEN in a form and manner determined by FINCEN.13
2.2. Banks
2.3. Individuals
With the exception of individuals employed by banks that are exempted from currency transaction reporting requirements pursuant to Article 31, any person (hereinafter “covered person”) doing business, whether or not on a regular basis or as an organized business concern, who provides remittance services, makes or receives currency deposits or currency payments, or converts monetary instruments or virtual assets to currency as a financial service, and handles a transaction (deposit, withdrawal, exchange, or other payment or transfer) involving a monetary instrument or transmittal of funds with a value totaling $3000 or more on a single day on behalf of a single person or entity, that is withdrawn, received, deposited, exchanged, paid, remitted, transmitted, or transferred by a national of a State Party, or is transmitted to, from, through, within, or with the assistance of a person or entity within the jurisdiction of, registered with, or within the territory of, a State Party, or any application or device performing the function of such covered person, shall…
Submit electronic certification to FINCEN of the source and beneficial owner of the source funds, and the beneficial owner of the receiving account (or, in the case of a trust, the potential or actual individually identified trust beneficiaries), certification that such funds do not involve the laundering of funds obtained illegally or through criminal activities and do not involve tax evasion, and acknowledgment that criminal penalties apply if false or misleading information is provided…
Alternatively, a beneficial owner of the source funds, or a beneficial owner of the receiving account, or his certified agent, may satisfy the applicable provisions of subparagraph (b) by (i) appearing in person at any time prior to such transmittal of funds pursuant to this paragraph, (ii) presenting his passport, and (iii) certifying beneficial ownership under penalty of perjury of all funds that are received by, or transmitted from, his account. Such one-time alternative certification shall be effective upon electronic submission to FINCEN in a form and manner determined by FINCEN.15
2.4. Definitions
(i) currency; (ii) travelers’ checks in any form; (iii) all negotiable instruments (including personal checks, business checks, official bank checks, cashier’s checks, third-party checks, promissory notes, and money orders) that are either in bearer form, endorsed without restriction, made out to a fictitious payee (for the purposes of Article 20), or otherwise in such form that title thereto passes upon delivery; (iv) incomplete instruments (including personal checks, business checks, official bank checks, cashier’s checks, third-party checks, promissory notes, and money orders) signed but with the payee’s name omitted; (v) securities or stock in bearer form or otherwise in such form that title thereto passes upon delivery; and (vi) value that substitutes for any monetary instrument described in subparagraph (i), (ii), (iii), (iv), or (v).23
(a) an electronic fund transfer initiated through an electronic terminal, telephone, computer, or magnetic tape, for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account, including point-of-sale transfers, automated teller machine transfers, direct deposits or withdrawals of funds, transfers initiated by telephone, transfers resulting from debit card transactions, whether or not initiated through an electronic terminal, and (b) any other funds transfers that are made through an automated clearinghouse, an automated teller machine, or a point-of-sale system.27
2.5. Addressing a Weakness
2.6. Summary
3. Issues
3.1. Definition of Beneficial Owner
“Beneficial owner” (or “beneficiary”) of funds shall mean the natural person or persons who, directly or indirectly, through any contract, arrangement, understanding, relationship, or otherwise (i) exercises substantial control or (ii) owns or controls not less than 25 percent of the ownership interests of the funds. In the case of legal entities, such as foundations, and legal arrangements, such as trusts, which administer and distribute funds:
- (i)
where the future beneficiaries have already been determined, the natural person(s) who is(are) the beneficiary of 25 percent or more of the property of a legal arrangement or entity;- (ii)
where the individuals that benefit from the legal arrangement or entity have yet to be determined, the class of persons in whose main interest the legal arrangement or entity is set up or operates;- (iii)
the natural person(s) who exercise(s) control over 25 percent or more of the property of a legal arrangement or entity.
In the case of a legal entity customer where no natural person(s) directly or indirectly, through any contract, arrangement, understanding, relationship, or otherwise (i) exercises substantial control or (ii) owns or controls not less than 25 percent of the ownership interests of the funds, the beneficial owner is the legal entity.29
- (i)
Each individual, if any, who owns, directly or indirectly, 25 percent or more of the equity interests of the legal entity customer (e.g., each natural person that owns 25 percent or more of the shares of a corporation); and- (ii)
An individual with significant responsibility for managing the legal entity customer (e.g., a Chief Executive Officer, Chief Financial Officer, Chief Operating Officer, Managing Member, General Partner, President, Vice President, or Treasurer). (FinCEN 2016).
3.2. A Flaw
The form states the information to be provided:This form must be completed by the person opening a new account or maintaining business relationships on behalf of a legal entity with any of the following U.S. financial institutions: (i) a bank or credit union; (ii) a broker or dealer in securities; (iii) a mutual fund; (iv) a futures commission merchant; or (v) an introducing broker in commodities. For the purposes of this form, a legal entity includes a corporation, limited liability company, partnership, and any other similar business entity formed in the United States or a foreign country.
This form requires you to provide the name, address, date of birth and social security number (or passport number or other similar information, in the case of non-U.S. persons) for the following beneficial owners:
(i) Each individual, if any, who owns, directly or indirectly, 25 percent or more of the equity interests of the legal entity customer (e.g., each natural person that owns 25 percent or more of the shares of a corporation); and
The form states that presentation of a photo ID may be required:(ii) An individual with significant responsibility for managing the legal entity customer (e.g., a Chief Executive Officer, Chief Financial Officer, Chief Operating Officer, Managing Member, General Partner, President, Vice President or Treasurer).
The form states, “I, [name of person opening the account], hereby certify, to the best of my knowledge, that the information provided above is complete and correct”. The form provides a space for the named person to sign and date.The financial institution may also ask to see a copy of a driver’s license or other identifying document for each beneficial owner listed on this form.
3.3. Application of the Rule
3.3.1. Case 1: Corporation X Masquerading as a Restaurant
3.3.2. Case 2: Informal Peer-to-Peer Transfers
3.3.3. Case 3: Professional Service Intermediary
3.3.4. Case 4: Manipulation of Accounting Records
3.3.5. Case 5: Cuckoo Smurfing
3.3.6. Case 6: Invoice Manipulation
3.3.7. Case 7: Illicit Flows in Bolivia
3.4. Digital Identification
3.4.1. Norway
3.4.2. India
The assigned Aadhaar number for an individual is connected to all biometric data collected during the enrollment process. A trained enrollment center employee photographs the enrollee, records the iris scans of the eyes, collects demographic information, and takes imprints of all 10 fingers. The demographic information includes the name, address, date of birth, and gender of the individual (Sathe 2011; Sharma 2011). Multiple biometric data are recorded in order to enable the inclusion of all residents in India. Fingerprints, for example, can be worn away by physical labor. Since many of the poor residents of India have occupations that require heavy physical labor, a fingerprints-only identification scheme would continue to disenfranchise many of them.
Each enrollee’s data is then uploaded to the Central Identification Data Repository (CIDR) for de-duplication. The term “de-duplication” refers to the process where the CIDR checks to determine whether or not the biometric data submitted already exists in the database. If no equivalent record exists, then a unique, randomly generated 12-digit number will be mailed to the enrollee (Mathew 2014; Sharma 2011). The unique identification number provides residents with the ability to clearly establish their identity when obtaining goods or services from any public or private organization.
3.4.3. China
3.4.4. Japan
3.4.5. Indonesia
3.4.6. Russia
The Digital Development Ministry and FSB earlier agreed on a similar technology to allow biometric passport owners to obtain Fan IDs entirely in the digital form through the ministry’s app, without applying to a Public Services Center in order to prove one’s identity… The owner’s identity is verified in this case with the help of their photo recorded on a chip in a biometric passport.
3.4.7. Argentina
3.4.8. Brazil
In 2017, the Brazilian government enacted a federal law which established the National Civil Identification System (ICN or Identificação Civil Nacional). The ICN is composed of one centralized database, composed, mainly, of citizens’ biometrics that had been collected by the Superior Electoral Court for electoral purposes. By the end of 2020, more than 120 million Brazilians had already completed their biometric registration, which represents more than half of Brazil’s large population.
3.4.9. European Digital Identity
3.4.10. Africa
AU Member States have the freedom to select how they want to issue this digital credential. It may be stored in a purely digital format on a smartphone application, a cloud-based server, a smartcard, or a link to the digital representation may be established using a one- or two-dimensional barcode on a paper document (printed on paper, plastic card). Member States can also decide to reuse this standard to represent identity data at the national level.
3.4.11. Global Adoption
Developments have been most dramatic in Southeast Asia, where biometrically based, digital forms of ID have reached most of the adult population in Bangladesh, India, Indonesia, and Pakistan. The new systems are gradually being integrated into the delivery of public and private sector goods and services, especially in India and Pakistan.
3.4.12. MOSIP
3.4.13. ID2020
3.4.14. Digital ID Summary
3.5. Identity Proofing
3.5.1. What Is an ePassport?
- The same data visually displayed on the data page of the passport;
- The passport holder’s picture stored in digital form;
- The unique chip identification number;
- A digital signature to detect data alteration and verify signing authority;
- Additional data, as defined by specific issuing governments. (Smart Card Alliance 2009)
3.5.2. How Is an ePassport Obtained?
3.5.3. How Many Countries Use ePassports?
3.5.4. Are ePassports from All Countries the Same?
3.5.5. Are ePassports More Secure than Traditional Passports?
3.5.6. What Security Measures Are Built into an ePassport?
3.5.7. Does Reading an ePassport Compromise the Security of the Information?
3.5.8. How Does a Border Official Determine That an ePassport Is Valid?
- The ePassport held by the traveler was issued by a bona fide authority;
- The biographical and biometric information endorsed in the document at issuance has not subsequently been altered; and
- If active authentication and/or chip authentication is supported by the ePassport chip, the electronic information on the chip is not a copy (i.e., a clone). (ICAO 2023b).
3.6. Dual Paired Certification
3.7. AML
3.8. TBML and IVTS
Hawala is a popular informal system that accomplishes long-distance transfer of money without the movement of physical currency or telegraph or computer network wire transfers between banks. Hawala relies instead on the performance and honor of an enormous worldwide network of money brokers known as hawaladars. Most hawaladars are small businessmen who provide hawala services as a sideline operation.
The hawala system bypasses the formal banking system. A customer gives a local hawala broker a sum of money. The broker contacts a distant hawala broker who agrees to pay the sum to the intended recipient. To receive the sum, the recipient must provide a password that is communicated by the sender to the recipient. Each hawala broker maintains an accounting ledger to keep track of the amounts received from and owed to other brokers. These debts are settled through any form of payment that is acceptable among the hawaladars. Hawala brokers profit from customer commissions and favorable international settlements that are unencumbered by the conventional banking system’s hefty foreign exchange transaction fees.
The unique feature of the system is that no promissory instruments are exchanged between the hawala brokers; the transaction takes place entirely on the honor system. As the system does not depend on the legal enforceability of claims, it can operate even in the absence of a legal and juridical environment. Trust and extensive use of connections are the components that distinguish it from other remittance systems. Hawaladar networks are often based on membership in the same family, village, clan, or ethnic group, and cheating is punished by ex-communication, “loss of honor”, and resulting economic hardship.
How would the proposed Rule be applied to hawala schemes?Hawala is attractive to customers because it provides fast and convenient transfer of funds, typically at a far lower commission than the fees charged by banks. Its advantages are most pronounced when the receiving country applies unprofitable exchange rate regulations or when the receiving country’s banking and legal system permits this type of informal transaction (e.g., Afghanistan, Yemen, Somalia). In some parts of the world, hawala is the most practical option, even for legitimate fund transfers. However, the hawala system can be used for money laundering because it operates outside the traditional banking system’s regulations and legal requirements for collecting and verifying customer identity information.
Regarding hawala-based transactions, the APUNCAC reporting requirement would require each hawaladar to obtain, and submit to FINCEN, certification of beneficial ownership of funds paid to, or paid out by, a hawaladar; in an amount exceeding USD 3000.51 If the beneficial owner is a customer who is physically present, certification would be demanded from the customer. Otherwise, a hawaladar would be required to contact the beneficial owner to obtain a digitally signed certification that the purported beneficial owner is indeed the true beneficial owner.
The APUNCAC reporting requirement also applies to transfers in currency; therefore, the transfer of currency from one hawala client to an end client would have to be reported to FINCEN.52 The sender would have to provide a digitally signed certification that he is the beneficial owner of the source funds. The recipient would have to provide a digitally signed certification that she is the beneficial owner of the funds received from the sender. The certifications would state that the funds do not involve the laundering of funds obtained illegally or through criminal activities and would acknowledge that criminal penalties apply if false or misleading information is provided.
A hawaladar who lacks internet access but wishes to offer hawala services would be limited to transaction amounts under USD 3000 because the APUNCAC reporting requirement would require the use of a broadband-enabled mobile phone, tablet, or computer to report transactions in excess of USD 3000. A hawaladar who wishes to offer hawala services in amounts exceeding USD 3000 would require access to the internet. Typically, however, such hawaladars already have internet access, even in developing countries in Africa, through a mobile broadband network.53 It is unclear whether any hawaladars who currently engage in transactions exceeding USD 3000 lack Internet access and would be forced to curtail their business in response to the implementation of the APUNCAC reporting requirement. In any case, there would be a significant public benefit of implementing the APUNCAC reporting requirement. The requirement would be expected to reduce criminal activity, corruption, and impunity that serves to perpetuate poverty and inequality among the poorest of the poor in developing countries.
APUNCAC addresses the possibility that a criminal might employ front men to transmit illicit funds using mobile payment solutions in combination with hawala, to obscure the origin of illicit funds. The APUNCAC reporting requirement applies to this type of transaction (a) at the point when a customer pays a hawaladar, and (b) at the point when a hawaladar pays the end client, assuming that a hawaladar is within the jurisdiction of a State Party, and assuming a transaction in currency, or involving a bank draft, bearer instrument, negotiable instrument, electronic fund transfer or money order.54
3.9. Front Men
The money launderer instructed nominees to either (i) transfer funds back to the logistics company; or (ii) transfer funds to other business accounts, held by nominees located in Canada, China, Panama and the US. Funds were sent by wire transfer, bank draft or cheque.
3.10. Money Mules
3.11. Bank Clerks
3.12. Cooperation Agreements
3.12.1. Common Law Legal Systems
United States
Promises of immunity are important weapons in the fight against large-scale criminal enterprises; the government often snares big fish with information gained from little fish. In return, the little fish are granted immunity from prosecution based upon the information they provide to the government.57
The cooperator makes a set of promises and assumes potentially onerous and protracted obligations. These will at least include interviews and debriefings and may involve undercover action or observation and reporting back. The cooperator’s obligations will probably continue into more formal stages with grand jury and trial testimony and, perhaps, testimony at retrials years later.
[T]he witness will know that he has no chance to gain immunity or leniency unless the information that he initially furnishes appears weighty enough to aid in convicting a target. At an early stage he almost certainly will testify before a grand jury. If this testimony differs in any significant way from the information he gave the police and the prosecutor, he may lose immediately any expectation of leniency or immunity, since it logically follows that either the information tendered to the police or the grand jury testimony was false. Similarly, if his testimony at trial differs either from the information tendered or from his grand jury testimony, he risks losing the benefits of the bargain and also risks prosecution for perjury. The prosecution thus may bring the strongest pressures to bear without, in the cooperation agreement, explicitly trading leniency or immunity for trial results.
A court may reduce a sentence below the [Sentencing] Guidelines’ lower limit if the government makes a motion stating that the defendant has provided substantial assistance in the investigation or prosecution of another person who has committed an offense.
For these reasons, cooperation agreements are powerful tools for obtaining useful information from insiders who are privy to damning details that can be utilized to prosecute individuals who orchestrate even the most complex, difficult to penetrate criminal schemes. Jurisdictions that do not currently utilize cooperation agreements could incorporate this type of agreement into their domestic legal regimes, with all the safeguards as the American system.The court has discretion to determine the appropriate reduction in these cases, and the Guidelines provide that, in so doing, the court should give “substantial weight” to the government’s evaluation. The cooperator, therefore, will want a government promise to make a favorable sentencing motion included in the cooperation agreement. This promise also strengthens the prosecutor’s hand since her assessment of the truthfulness and impact of the cooperator’s testimony will determine both whether the government makes the sentencing reduction motion at all and how favorable that motion will be.
United Kingdom
Commonwealth Caribbean Jurisdictions
Cyprus
Malta
Australia
India
3.12.2. European Civil Law Systems
Each Member State may take the necessary measures to ensure that the penalties referred to in Article 3 may be reduced or that the offender may be exempted from penalties if he, for example: (a) renounces criminal activity; and (b) provides the administrative or judicial authorities with information which they would not otherwise have been able to obtain, helping them to: (i) prevent, end or mitigate the effects of the offence; (ii) identify or bring to justice the other offenders.67
States parties are encouraged in particular to provide for the possibility of mitigating punishment or granting immunity from prosecution to persons providing substantial co-operation in the investigation or prosecution of a related offence, not only in a domestic, but also in a transnational context.
France
3.12.3. Non-European Civil Law Systems
Brazil
Mexico
Japan
China
Russia
Rather than eliminate the upper third of the sentencing range, the law allows the judge to assign a punishment below the legal limit for the crime, or a suspended sentence, or simply no punishment at all. Moreover, the provisions on cooperation agreements openly invite negotiations over the plea.
South Africa
3.12.4. Islamic Criminal Justice Systems
Pakistan
Indonesia
One of the suspects or defendants whose role is the lightest can be used as a witness in the same case and can be acquitted from criminal prosecution, if the witness helps reveal the involvement of other suspects who deserve to be punished for the said crime.80
The public prosecutor determines the [the status of a] suspect or defendant as a crown witness.81
Malaysia
Nigeria
Ethiopia
Iran
All civil, penal, financial, economic, administrative, cultural, military, political, and other laws and regulations must be based on Islamic criteria. This principle applies absolutely and generally to all articles of the Constitution as well as to all other laws and regulations.91
Turkey
3.12.5. Cooperation Agreements—Summary
The information provided by an immunized witness or cooperating defendant can be a tremendous evidence-gathering tool, both in strengthening the government’s case against known targets, or in initiating new investigations. They may be asked to produce documents, lead investigators to other evidence, and if it is still feasible, they may be directed to make recorded telephone calls or to meet with other targets of the investigation and record those meetings. The cooperation agreement mechanism not only yields valuable evidence, but gives prosecutors critical leverage within the criminal network. Since a participant in a corrupt relationship is usually in a position to provide highly incriminating evidence against other participants, the knowledge that an “insider” is cooperating with the prosecution is often enough on its own to convince other defendants to plead guilty. Because the first person to cooperate in an investigation often provides the most valuable information to investigators, that defendant often gets the largest reduction in sentence. Thus, once an investigation becomes overt and the scope of the investigation becomes known, or after indictment, lesser targets or defendants often “race” to be the first one in the case to cooperate, cracking the corrupt network wide open.
3.12.6. Viability of Cooperation Agreements
3.12.7. Implications
3.13. High-Volume Transactions
3.14. Rural Areas
3.15. No Electricity/No Internet
3.16. Transactions Involving Agents
3.17. Privacy Concerns
3.18. Exempt Transactions
3.19. Anonymous Instructions
3.20. Structuring
3.21. Beneficial Owner Is Not a Natural Person
3.22. Prohibition against Aiding and Abetting
3.23. Penalties
3.24. Enforcement
[UNTOC] criminalizes “the concealment or disguise of the true nature, source, location, disposition, movement or ownership of or rights with respect to property, knowing that such property is the proceeds of crime” as well as “participation in, association with or conspiracy to commit, attempts to commit and aiding, abetting, facilitating” such concealment.103 UNTOC makes these offenses “an extraditable offence in any extradition treaty existing between States Parties”.104 Furthermore, “States Parties undertake to include such offences as extraditable offences in every extradition treaty to be concluded between them”.105 UNTOC requires States Parties to implement requirements for customer identification and record-keeping to deter and detect money laundering:Each State Party: (a) Shall institute a comprehensive domestic regulatory and supervisory regime for banks and non-bank financial institutions and, where appropriate, other bodies particularly susceptible to money-laundering, within its competence, in order to deter and detect all forms of money-laundering, which regime shall emphasize requirements for customer identification, record-keeping and the reporting of suspicious transactions;106
These provisions apply to nationals and residents of all States Parties. They apply to bank clerks in the British Virgin Islands, the Cayman Islands, or Panama who aid, abet and facilitate the concealment of the true ownership of illicit funds, because Panama, the United Kingdom, and its possessions are parties to UNTOC. A bank clerk who is required to perform, but chooses to willfully, intentionally, and knowingly ignore basic steps designed to identify customers and promote transparency in the ownership, disposition and movement of property and permit verification of the legitimacy of such property could be found guilty under UNTOC of aiding, abetting and facilitating the concealment of the true nature, source and ownership of that property.
The beneficial owner identification and recordation provisions of the [APUNCAC Beneficial Owner Rule] are precisely “requirements for customer identification [and] record-keeping” with the exact intention of deterring and detecting money-laundering.107 The beneficial owner identification and recordation provisions would plug holes in existing customer identification requirements by requiring each banking customer to identify the beneficial owner of funds that are deposited in currency, deposited in any form in a high-risk jurisdiction, or transmitted internationally by wire from the territory of a state party.108 The model protocol serves to translate the existing legal commitment of UNTOC parties to identify banking customers for the purpose of revealing the true “ownership of or rights with respect to property” into specific procedures for identifying beneficial owners, for that exact purpose.109 The model protocol seeks to achieve UNTOC’s goal of establishing the identities of true owners by specifying that banking customers must certify the identities of true beneficial owners under penalty of perjury.110 An argument that non-State Party nationals (perhaps bank clerks in the British Virgin Islands, Cayman Islands, or Panama) would not be legally obligated to observe the model protocol’s beneficial owner identification requirement is inconsistent with and contradicts the existing legally binding commitment of UNTOC parties to identify the true identities of banking customers. This argument denies the legally binding commitments that have already been made to require customer identification and record-keeping for the purpose of deterring and detecting money-laundering.
3.25. Extradition
First, the foreign state seeking extradition makes a request directly to the U.S. Department of State (“State Department”). If the State Department determines that the request falls within the operative extradition treaty, a U.S. Attorney files a complaint in federal district court indicating an intent to extradite and seeking a provisional warrant for the person sought. And once the warrant is issued, the district court—which could include a magistrate judge—conducts a hearing. This hearing is to determine whether there is evidence sufficient to sustain the charge under the operative treaty, i.e., “whether there is probable cause”. See Santos, 830 F.3d at 991 (citing 18 U.S.C. § 3184; Vo v. Benov, 447 F.3d 1235, 1237 (9th Cir. 2006)). Of note, the hearing to determine probable cause is “akin to a grand jury investigation or a preliminary hearing under Federal Rule of Criminal Procedure 5.1”. Id. (citations omitted). If the court (including the magistrate judge) determines there is probable cause, the court “is required to certify the individual as extraditable to the Secretary of State”. Vo, 447 F.3d at 1237 (emphases removed) (quoting Blaxland v. Commonwealth Dir. Of Pub. Prosecutions, 323 F.3d 1198, 1208 (9th Cir. 2003)). Upon certification, the Secretary of State decides whether to extradite the individual, the final decision being discretionary. See id. (citations omitted). See generally FJC Manual at iv (“Overview of the Extradition Process”).
3.25.1. Definitions
3.25.2. Extradition Thresholds
Each State Party shall endeavour to ensure that any discretionary legal powers under its domestic law relating to the prosecution of persons for offences covered by this Convention are exercised to maximize the effectiveness of law enforcement measures in respect of those offences and with due regard to the need to deter the commission of such offences.154
3.25.3. False Statements Risk Extradition
3.25.4. Extradite or Prosecute
- (a)
- the establishment of jurisdiction by State B followed by extradition of X from State A to State B; or
- (b)
- the refusal or failure of State A to extradite followed by the establishment of jurisdiction over X and prosecution by State A.
The custodial state has an obligation to take the necessary and reasonable steps to apprehend an alleged offender and to ensure the prosecution and trial of such an individual by a competent jurisdiction. The custodial state has a choice between two alternative courses of action, both of which are intended to result in the prosecution of the alleged offender. The custodial state may fulfil its obligation by granting a request for the extradition of an alleged offender made by any other state, or by prosecuting that individual in its national courts.
The Contracting Party in the territory of which the alleged offender is found shall, if it does not extradite him, be obliged, without exception whatsoever and whether or not the offense was committed in its territory, to submit the case to its competent authorities for the purpose of prosecution. Those authorities shall take their decision in the same manner as in the case of any ordinary offense of a serious nature under the law of the that state.158
If the requested Party does not extradite its national, it shall at the request of the requesting Party submit the case to its competent authorities in order that proceedings may be taken if they are considered appropriate.161
The requested State may deny extradition when it is competent, according to its own legislation, to prosecute the person whose extradition is sought for the offence on which the request is based. If it denies extradition for this reason, the requested State shall submit the case to its competent authorities and inform the requesting state of the result.163
Significantly, this principle is incorporated into UNTOC Article 16:[P]ublic international law dictates that States have the legal obligation to either extradite or prosecute (aut dedere aut judicare) persons who commit serious international crimes. This obligation is predicated on the extraterritorial nature of international crimes and reflects an attempt of the international community to ensure that perpetrators are prosecuted either by the national authorities of that State or by another State which indicates that it is willing to prosecute the case by requesting extradition.
A State Party in whose territory an alleged offender is found, if it does not extradite such person in respect of an offence to which this article applies solely on the ground that he or she is one of its nationals, shall, at the request of the State Party seeking extradition, be obliged to submit the case without undue delay to its competent authorities for the purpose of prosecution. Those authorities shall take their decision and conduct their proceedings in the same manner as in the case of any other offence of a grave nature under the domestic law of that State Party. The States Parties concerned shall cooperate with each other, in particular on procedural and evidentiary aspects, to ensure the efficiency of such prosecution.164
3.25.5. Willingness to Prosecute
3.25.6. Serial Extradition
3.25.7. Reciprocity
3.25.8. A Genuine Threat
3.25.9. Aiding and Abetting
3.25.10. Conspiracy to Commit Money Laundering
The defendant’s conscious participation in the conspiracy may be inferred from circumstantial evidence. The government need not prove the defendant knew all the details of, objectives of, or identity of all the other participants in the conspiracy. Besides acts included in the underlying substantive offense, other acts the defendant committed in furtherance of the objectives of the conspiracy are often sufficient to demonstrate defendant was a knowing participant.
Elements
In order for you to find any defendant guilty of this crime, you must be convinced that the Government has proven each of the following elements beyond a reasonable doubt: First, that two or more persons, in some way or manner, came to a mutual understanding to try to accomplish a common and unlawful plan, as charged in the indictment; and second, that the defendant under consideration knowingly and willfully became a member of such conspiracy.
Agreement
Intent to Promote
The term with the intent to promote the carrying on of specified unlawful activity means that the defendant must have conducted or attempted to conduct the financial transaction for the purpose of promoting (that is, to make easier, facilitate or to help bring about) the carrying on of one of the crimes listed as specified crimes within the statute. By carrying on crime, it may be that the crime to be carried on is one that will be committed in the future.
The financial transaction need not be linked to a specific future offense. The government is required to prove only that in conducting the financial transaction, the defendant intended to promote a specified illegal activity generally. For example, buying beepers or two-way radios for use in the drug business promotes specified unlawful activity because it makes future drug dealing, in general, less difficult.178
Application
3.25.11. Significance
3.26. INTERPOL Red Notice
3.27. Enforcement in Practice
Kenya becomes a party to the model protocol. The governments of all 196 countries in the world are notified of the protocol and the provisions requiring bank clerks to record beneficial ownership information with regard to currency, check, and money order deposits and wire transfers involving Kenyan nationals, entities or funds. Each government notifies its domestic bank and non-bank financial institutions. However, a bank clerk in the British Virgin Islands (BVI) fails to observe the recordation requirement and is debarred. The debarment process includes official notification of debarment and recitation of the recordation requirement. The same bank clerk subsequently handles a $10 million bank wire involving a Kenyan government minister to a BVI corporate account, but again fails to observe the recordation requirement. Kenya files a request with BVI for arrest and extradition under the terms of UNTOC for aiding and abetting concealment of the identity of the person who owns the $10 million.
At this point, BVI authorities must make a decision about whether or not to comply with the request. The decision would hinge on whether, in the view of BVI authorities, the bank clerk’s failure to observe the recordation requirement was proper or improper. If BVI authorities determine that the failure was improper and served to aid and abet the concealment of the identity of the person who owns the $10 million, then extradition would presumably be approved. However, if BVI authorities determine that the failure was not improper, it is unlikely that extradition would be approved.
If BVI authorities approve extradition, a precedent would be set. Consistent application of the law dictates that similar cases be treated in the same way, implying that BVI would be forced to make a decision about whether to incorporate the recordation requirement into its domestic regulatory regime and whether to extradite in cases where bank clerks fail to observe the recordation requirement. The model protocol would, in essence, force jurisdictions around the world to decide whether or not to incorporate the recordation requirement into their domestic regulatory regimes.
Each jurisdiction would make an independent determination about the benefits and costs of incorporating the recordation requirement into its domestic regulatory regime. If the presumed benefits exceed the presumed costs, a jurisdiction would presumably move to incorporate the recordation requirement into its domestic regulatory regime. If the presumed costs exceed the presumed benefits, a jurisdiction would presumably reject the recordation requirement and any request for extradition based on that requirement.
However, the United States, the UK, and the OECD countries are aggressive leaders in the fight against money laundering because money laundering permits terrorists to hide large amounts of monies that are used to fund terrorism. The recordation requirement would permit investigators to pull back the veil that currently hides the identities of persons who use anonymous corporate vehicles in BVI, the Caymans, and Panama for illicit purposes. The recordation requirement would penetrate the anonymity that currently protects terrorists and criminals by protecting their financial assets. If major OECD countries begin incorporating the recordation requirement into their domestic regulatory regimes, it would become a de facto world standard for any nation that is serious about fighting money laundering. It would become a litmus test for any nation that claims to fight money laundering.
Panama is a party to UNTOC. If the recordation requirement becomes a de facto world standard, if Panama is judged on the basis of whether it conforms to world standards in the fight against money laundering, and if foreign investment in Panama depends on whether Panama conforms to world standards in the fight against money laundering, Panamanian leaders may feel that it is in their best interests to incorporate the recordation requirement into their domestic regulatory regime and cooperate with extradition requests when bank clerks handle large multi-million dollar bank wires but fail to observe the recordation requirement. If Panamanian leaders choose to reject the recordation requirement and reject extradition requests when bank clerks handle large multi-million dollar bank wires but fail to observe the recordation requirement, they would not be able to say that they are in compliance with world standards regarding regulations to fight money laundering. If Panama is unable to shake its reputation as a jurisdiction where money laundering and criminal activity are rife, foreign investors will be wary of investing in Panama.
Panama might choose to formally adopt the recordation requirement and incorporate the requirement into its domestic regulatory regime, then fail to cooperate with extradition requests. Formal adoption of the requirement would give Panamanian leaders the cover to say that Panama conforms to world standards in the fight against money laundering. However, this tactic would not protect Panamanian nationals who travel abroad.
Panama is a party to UNTOC and is bound by the terms of UNTOC. Consequently, the act of aiding, abetting, and facilitating the concealment of the identity of persons who acquire illicit funds is a crime under the domestic laws of all UNTOC parties, including Panama. Panama might fail to cooperate with extradition requests, but it would not be in a legal position to protect any of its nationals who travel to another UNTOC party jurisdiction and are arrested for aiding, abetting, and facilitating the concealment of the identity of, for example, a Kenyan government minister who transmits $10 million to a Panamanian bank account.
If a previously debarred Panamanian bank clerk handled the transmission of $10 million from a Kenyan government minister into a Panamanian bank account but failed to observe the recordation requirement and subsequently traveled to a jurisdiction outside of Panama, the clerk would, under the model protocol, be at-risk of arrest and imprisonment for aiding, abetting, and facilitating concealment of the minister’s ownership of the $10 million. Significantly, 190 nations are parties to UNTOC and are legally bound by the terms of UNTOC, including the terms whereby any party can request extradition of a suspect from the jurisdiction of another party (United Nations 2023). The only United Nations Member States that are not parties are Bhutan, Papua New Guinea, the Solomon Islands, Somalia, South Sudan, and Tuvalu. This implies that a Panamanian bank clerk who handled the transmission of $10 million from a Kenyan government minister into a Panamanian bank account but failed to observe the recordation requirement and subsequently traveled to a jurisdiction outside of Panama would be at-risk of arrest and imprisonment whenever he or she traveled outside of Panama because Kenya could request extradition if the clerk traveled to the territory of any of the 190 nations that are parties to UNTOC.
While there may be bank clerks who are content to spend their entire lives within Panama, the risk of traveling to other jurisdictions for business or leisure would be a significant cost of failing to observe the recordation requirement. Many bank clerks would resist employment at a financial institution whose practices and policies are inconsistent with the recordation requirement and place clerks at-risk of arrest and imprisonment whenever they travel abroad.
As a consequence, the model protocol would create a powerful mechanism for controlling money laundering in distant offshore locations that is currently absent from all other existing and proposed strategies for controlling corruption and impunity. Ratification and implementation of the model protocol would fall within the power of potential States Parties. States Parties would not need to wait for distant offshore jurisdictions to implement reforms. States Parties would apply the provisions of the model protocol requiring documentation of the beneficial owner and source of funds transmitted by bank wire, and would apply UNTOC to extradite individuals who violate this rule in distant offshore locations such as the British Virgin Islands, the Cayman Islands, or Panama. This suggests why the model protocol would likely be more effective than the strategy of implementing a global registry of companies, which would require the cooperation of offshore locations such as the British Virgin Islands, the Cayman Islands, and Panama.
3.28. Objective Territorial Principle
3.29. Effects Principle
3.29.1. United States
A state has jurisdiction to prescribe a rule of law attaching legal consequences to conduct that occurs outside its territory and causes an effect within its territory, if… (i) the conduct and its effect are constituent elements of activity to which the rule applies; (ii) the effect within the territory is substantial; (iii) it occurs as a direct and foreseeable result of the conduct outside the territory; and (iv) the rule is not inconsistent with the principles of justice generally recognized by states.184
3.29.2. European Union
3.29.3. Significance
[T] he courts of many countries, even of countries which have given their criminal legislation a strictly territorial character, interpret criminal law in the sense that offences, the authors of which at the moment of commission are in the territory of another State, are nevertheless to be regarded as having been committed in the national territory, if one of the constituent elements of the offence, and more especially its effects, have taken place there… [T]he Court does not know of any cases in which governments have protested against the fact that the criminal law of some country contained a rule to this effect.196
3.30. Extradition, Criminal Prosecution, and Cooperation—Antitrust Model
3.30.1. Acceptance of Effects Principle
Japan
The holding shows that, for the application of relevant provisions, it is not required that any of the activities be conducted or implemented in Japan; the JAMA can apply to anti-competitive conduct carried out outside of Japan if the free competition economic order of Japan is disturbed.
South Korea
The Court held that when the foreign enterprises entered into an agreement to restrain competition, and the subject of the agreement included the Korean market, regardless of whether the collusive behavior took place inside or outside the territory of Korea, the Court has the jurisdiction to apply Korea’s competition law to the extent that the agreement directly affected the Korean market. The Court appears to have accepted the typical effects doctrine.
China
Vietnam
Taiwan
Under Article 35 of the FTL, the FTC may order an enterprise to cease cartel activity, rectify its conduct or take necessary corrective action by a specified deadline. If the enterprise fails to satisfy the order or, after ceasing the cartel activity, commits the same or a similar violation, the criminal sanction for the actor is imprisonment for no more than three years or detention, a fine of not more than NT$100 million, or both.
Australia
Russia
Brazil
The Brazilian Antitrust Act applies to antitrust violations (even if potential) that occur on Brazilian territory and to those that take place outside Brazilian borders, but may have direct or indirect effects in Brazil. In other words, international cartels that result or may result in direct or indirect effects within Brazilian territory are under CADE’s jurisdiction, even if no illegal conduct is carried out in Brazil.220
Argentina
Kenya
Nigeria
South Africa
Section 3 of the Competition Act provides that the Competition Act applies to all economic activity within, or having an effect within, South Africa. Thus, cartel conduct occurring outside South Africa (including cartel conduct relating to indirect sales) may be covered by the prohibition where it can be said to have an effect within South Africa.
Summary
3.30.2. Extradition of Foreign Nationals
Extradition Is Not Uncommon
DOJ continues to state that it is ‘committed to ensuring the culpable foreign nationals, just like U.S. co-conspirators, serve jail sentences in order to resolve their criminal liability.’ In FY 2011, foreign executives faced average prison sentences of 10 months for antitrust violations. In FY 2012, DOJ continued to obtain long prison sentences for foreign nationals, including a 24-month sentence for two executives of Japan-based Yazaki Corporation, who voluntarily submitted to U.S. jurisdiction, imposed in connection with their involvement in international conspiracies to fix prices for auto parts sold to automobile manufacturers in the United States.
Dual Criminality Is Satisfied
(1) Austria: imprisonment of up to 3 years, (2) Germany: a criminal fine of up to EUR 10.8 million or imprisonment of up to 5 years, (3) Hungary: imprisonment of up to 5 years, (4) Italy: a criminal fine of up to EUR 1032 or imprisonment of up to 5 years and (5) Poland: imprisonment of up to 3 years.226
(1) Czech Republic: a criminal fine depending on the damage or imprisonment of up to 8 years, (2) Denmark: an unspecified criminal fine, (3) Estonia: a criminal fine of up to 500 days’ income or imprisonment of up to 3 years, (4) France: a criminal fine of up to EUR 75,000 or imprisonment of up to 4 years, (5) Greece: a criminal fine of up to EUR 1 million or imprisonment of up to 2 years, (6) Ireland: a criminal fine of up to EUR 4 million or imprisonment of up to 10 years, (7) Romania: a criminal fine of up to RON 150,000 or imprisonment of up to 3 years, (8) Slovakia: imprisonment of up to 6 years, (9) Slovenia: a criminal fine of up to 500 days’ income or imprisonment of up to 5 years and (10) Spain: a criminal fine of up to 2 years’ income or imprisonment of up to 3 years.227
Latin America
Southeast Asia
3.30.3. Enablement of Cooperation Agreements
Japan
South Korea
China
The term ‘material evidence’ refers to evidence which may lead to the launch of an investigation by SAMR or local PMRD or makes an essential contribution to the finding of a cartel agreement, including: the identities of undertakings as parties to monopoly agreements; scope of commodities concerned; content and method of conclusion of the monopoly agreement; and actual implementation of the monopoly agreement.
Vietnam
Taiwan
Australia
Russia
If for any reason a defendant is unable to satisfy all requirements necessary to be released from criminal liability, it is also possible in theory to conclude a pre-judicial agreement in cooperation with the prosecutor after a criminal case has been initiated. In the event all conditions of the pre-judicial agreement on cooperation, surrender, active contribution to resolving and investigating a crime, exposure of other criminal participants and search for property are fulfilled, and provided there are no aggravating circumstances, the scope of punishment cannot exceed half the maximum term or half the amount of the strictest punishment for a respective cartel crime.(Zabrodin and Akimova 2012) (citations omitted)
Brazil
Argentina
[The] programme grants (i) full immunity to the first applicant as long as the applicant provides the authorities with significant evidence, (ii) a reduction of between 20 per cent and 50 per cent of the fine imposed on other applicants, depending on the type of information and evidence provided for the analysis of the case, and (iii) a supplementary benefit, known as leniency plus, consisting of a reduction by one-third of the fine or sanction that would otherwise have been imposed as a result of the petitioner’s participation in the first conduct, if the petitioner reveals a second, different, cartel in the investigation.
Kenya
Nigeria
South Africa
3.30.4. Summary
Our experience in the United States has taught us that criminal sanctions are absolutely essential to effective cartel enforcement. There is no more effective deterrent to cartel behaviour than the knowledge that, if caught, the individuals involved will have to serve jail time. Almost as importantly, there is no other effective way to persuade lower level employees to cooperate in an investigation and to supply evidence that will incriminate their superiors, their employers and their co-conspirators. The ability to offer a participant in a cartel either immunity from prosecution or a reduced sentence in exchange for testimony is the prosecutor’s single strongest weapon in cartel enforcement. Without that weapon, most employees would be unwilling, either for reasons of loyalty or because of fear of retaliation or of being ostracised, to ‘fink’ on their fellow executives and co-conspirators.
The Leniency Program has played a major role in the Antitrust Division’s successful prosecution of criminal cartels. As criminal penalties associated with cartel conduct have increased, companies and individuals have more to lose by not being first in the door. Companies become less willing to risk that their cartel activities will go undiscovered or unreported, and more willing to self-report promptly in the hopes that they get the first mover advantage.
3.31. Extraterritorial Regulation—Examples
A person may incur obligations under EU law not as a result of their own status but as a result of the status of the person or property with whom or with which they transact. In this situation, the person incurring an obligation under EU [law] will have an indirect connection with the EU as a result of the relationship that they have formed with a person or property that has been deemed to be sufficiently closely connected with the EU.
3.31.1. Title 18 Section 1956
3.31.2. FATCA
3.31.3. EMIR
A clearing obligation will attach to third country entities when they enter into a relevant contract with an EU (financial) counterparty. Here, the third country counterparty is viewed as enjoying an indirect connection with the EU, by virtue of its decision to enter into a transaction with a counterparty that is authorized or established within the EU. This indirect connection is treated as sufficient to justify the imposition of obligations under EU law.
3.31.4. MiFIR
3.31.5. Regulation 236/2012
Regulation 236/2012 is apposite to the APUNCAC Rule. The jurisdictional trigger is covered property rather than the presence of a covered party. In both cases, the involvement of regulated property triggers jurisdiction and application of the relevant rule.Reliance on the property principle as a jurisdictional trigger occurs when the EU exercises jurisdiction over transactions on the basis that the property involved in those transactions has a close and specified link with the EU. Where the EU relies on the property principle, the identity of the parties engaging in a transaction is not jurisdictionally salient and nor is the location in which the transaction takes place… [T]he property that forms the basis for the exercise of jurisdiction by the EU [may take] the form of financial instruments including, for example, sovereign debt or shares.
3.31.6. Regulation 596/2014
This measure prohibits insider trading and market manipulation, and imposes additional obligations on a range of actors including issuers of financial instruments, market operators and persons who professionally arrange transactions in financial instruments. The Regulation applies to financial instruments that are admitted to trading on a regulated market in at least one Member State, or for which a request for admission has been made, as well as financial instruments that are traded on a multilateral trading facility or an organized trading facility in at least one EU Member State.254 It also extends to financial instruments whose price or value depends on or has an effect on the price or value of a financial instrument traded on an EU market.255 Significantly, from a territorial point of view, this Regulation applies to all of these EU-connected instruments (property), even when they are being traded outside an EU trading venue, including in relation to transactions that take place abroad.256
3.31.7. Summary of Extraterritorial Regulations
3.32. International Agreements to Exchange Beneficial Ownership Information
3.32.1. IOSCO MMoU
Each State Party: (a) Shall institute a comprehensive domestic regulatory and supervisory regime for banks and non-bank financial institutions… in order to deter and detect all forms of money-laundering, which regime shall emphasize requirements for customer identification, record-keeping and the reporting of suspicious transactions.266
3.32.2. EOIR/AEOI
3.32.3. CARF
3.32.4. 6AMLD
3.32.5. Regulation 2015/847
3.32.6. TFR
3.33. Implications
3.34. Benefits vs. Costs
Flows of illicit money through transfers of funds can damage the integrity, stability and reputation of the financial sector, and threaten the internal market of the Union as well as international development. Money laundering, terrorist financing and organised crime remain significant problems which should be addressed at Union level. The soundness, integrity and stability of the system of transfers of funds and confidence in the financial system as a whole could be seriously jeopardised by the efforts of criminals and their associates to disguise the origin of criminal proceeds or to transfer funds for criminal activities or terrorist purposes.279
[T]he Union should ensure that the International Standards on Combating Money Laundering and the Financing of Terrorism and Proliferation adopted by FATF on 16 February 2012 (the ‘revised FATF Recommendations’)… are implemented uniformly throughout the Union… Uncoordinated action by Member States acting alone in the field of cross-border transfers of funds could have a significant impact on the smooth functioning of payment systems at Union level and could therefore damage the internal market in the field of financial services.280
The full traceability of transfers of funds can be a particularly important and valuable tool in the prevention, detection and investigation of money laundering and terrorist financing.281
3.35. Complicated Ownership Structures
3.36. Database Security
3.37. Political Concerns
3.38. Intercepted Communications
Each Party shall adopt such legislative and other measures as may be necessary, in relation to a range of serious offences to be determined by domestic law, to empower its competent authorities to: (a) collect or record through the application of technical means on the territory of that Party… content data, in real-time, of specified communications in its territory transmitted by means of a computer system.289
4. Discussion
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
5AMLD | 5th Anti-Money Laundering Directive (EU) |
6AMLD | 6th Anti-Money Laundering Directive (EU) |
ACCC | Australian Competition and Consumer Commission |
ACH | Automated Clearing House |
AEOI | Automatic Exchange of Financial Account Information |
AI | Artificial Intelligence |
AL | Antitrust Law No. 27.442 (Argentina) |
AML | Anti-Money Laundering |
AML-China | Anti-Monopoly Law of China |
AMS | ASEAN Member States |
APUNCAC | Anticorruption Protocol to the United Nations Convention against Corruption |
ASEAN | Association of Southeast Asian Nations |
ATM | Automated Teller Machine |
AU | African Union |
AWT | Arrest Warrant Treaty |
BO | Beneficial Owner |
BVI | British Virgin Islands |
CADE | Administrative Council for Economic Defense (Brazil) |
CAK | Competition Authority of Kenya |
CARF | Crypto-Asset Reporting Framework (EU) |
CARICOM | Caribbean Community |
CASP | Crypto-Asset Service Provider |
CCA | Competition and Consumer Act 2010 (Australia) |
CEO | Chief Executive Officer |
CIDR | Central Identification Data Repository (India) |
CLP | Corporate Leniency Policy (South Africa) |
CNDC | National Commission for the Defence of Competition (Argentina) |
COMESA | Common Market for Eastern and Southern Africa |
CRPC | Comparution sur Reconnaissance Préalable de Culpabilité (France) |
CrPC | Code of Criminal Procedure (Pakistan) |
CRS | Common Reporting Standard |
CVC | Convertible Virtual Currency |
DNI | National Identity Document (Argentina) |
DOJ | U.S. Department of Justice (U.S.) |
ECJ | European Court of Justice |
ECOSOC | United Nations Economic and Social Council |
e-KTP | (electronic) Kartu Tanda Penduduk (Indonesian Residential Identity Card) |
EMIR | European Market Infrastructure Regulation |
EOIR | Exchange of Information on Request |
EU | European Union |
Europol | European Union Agency for Law Enforcement Cooperation |
FATCA | Foreign Account Tax Compliance Act (U.S.) |
FATF | Financial Action Task Force |
FBI | Federal Bureau of Investigation (U.S.) |
FCCPA | Federal Competition and Consumer Protection Act (Nigeria) |
FCCPC | Federal Competition and Consumer Protection Commission (Nigeria) |
FFI | Foreign Financial Institution |
FINCEN | Financial Crimes Enforcement Network (proposed) |
FinCEN | Financial Crimes Enforcement Network (U.S.) |
FSB | Federal Security Service (Russian Federation) |
FTC | Fair Trade Commission (Taiwan) |
FTL | Fair Trade Law (Taiwan) |
G20 | Group of 20 (19 nations + European Union) |
Gavi | (formerly) the Global Alliance for Vaccines and Immunization |
GDPR | General Data Protection Regulation (EU) |
ICAO | International Civil Aviation Organization |
ICIJ | International Consortium of Investigative Journalists |
ICN | Identificação Civil Nacional (Brazilian National Identification System) |
ICT | Information and Communications Technology |
IDC-ID | Interoperable Digital Credential for Legal Identity (Africa) |
INTERPOL | International Criminal Police Organization |
IOSCO | International Organization of Securities Commissions |
IRS | Internal Revenue Service (U.S.) |
ITU | International Telecommunication Union |
IVTS | Informal Value Transfer Systems |
JAMA | Japanese Anti-Monopoly Act |
JFTC | Japan Fair Trade Commission |
KFTC | Korea Fair Trade Commission |
KYC | Know Your Customer |
LTDC | Legal Tender Digital Currency |
MiFIR | Markets in Financial Instruments Regulation |
MLAT | Mutual Legal Assistance Treaty |
MMoU | Multilateral Memorandum of Understanding Concerning Consultation and Cooperation and the Exchange of Information (IOSCO) |
MNO | Mobile Network Operator |
MONEYVAL | Committee of Experts on the Evaluation of Anti-Money Laundering Measures and the Financing of Terrorism |
MOSIP | Modular Open Source Identity Platform |
MRFTA | Monopoly Regulation and Fair Trade Act (South Korea) |
MSB | Money Services Business |
NCA | National Crime Agency (UK) |
NCB | National Central Bureau |
NCC | National Competition Commission (Vietnam) |
OCG | Organized Crime Group |
OECD | Organisation for Economic Co-operation and Development |
OFAC | Office of Foreign Assets Control (U.S.) |
OICT | United Nations Office of Information Communications Technology |
PCIJ | Permanent Court of International Justice |
PKD | Public Key Directory |
PMRD | Provincial Market Regulatory Department (China) |
QR | Quick Response (machine readable matrix barcode) |
QTSP | Qualified Trust Service Provider |
RAM | Random Access Memory |
RICO | Racketeer Influenced and Corrupt Organizations Act (U.S.) |
RKUHAP | Draft Code of Criminal Procedure (Indonesia) |
RSA | Rivest-Shamir-Adleman (public key crypto system) |
SACU | Southern African Customs Union |
SADC | Southern African Development Community |
SAMR | State Administration for Market Regulation (China) |
SAR | Suspicious Activity Report |
SATA | SMART Africa Trust Alliance |
SDN | Specially Designated Nationals and Blocked Persons (U.S.) |
SIM | Subscriber Identity Module (mobile device subscriber identity card) |
SRIP | Supervised Remote Identity Proofing |
STR | Suspicious Transaction Report |
TBML | Trade-Based Money Laundering |
TCK | Turkish Penal Code |
TCSP | Trust or Company Service Provider |
TFEU | Treaty on the Functioning of the European Union |
TFR | Transfer of Funds Regulation (EU) |
UIF | Unidad de Investigaciones Financieras (Bolivia) |
UK | United Kingdom |
UN | United Nations |
UNCAC | United Nations Convention against Corruption |
UNHCR | United Nations High Commissioner for Refugees |
UNTOC | United Nations Convention against Transnational Organized Crime |
VASP | Virtual Asset Service Provider |
References
- Ab Aziz, Norjihan, Noor Shuhadawati Mohamad Amin, and Zuraini Ab Hamid. 2017. Enhancing Plea Bargaining Process through Mediation. International E-Journal of Advances in Social Sciences (IJASOS) 3: 306–12. [Google Scholar] [CrossRef]
- al-Alfi, Ahmad Abd al-Aziz. 1982. Punishment in Islamic Criminal Law. In The Islamic Criminal Justice System. Edited by Mahmoud Cherif Bassouni. London: Oceana, pp. 227–36. [Google Scholar]
- Amicelle, Anthony, and Killian Chaudieu. 2022. The Most Denounced, the Least Punished: Ruling Elites, Illegalisms, and Anti-Money Laundering. International Political Sociology 16: olac007. [Google Scholar] [CrossRef]
- ‘Arafa, Mohamed A. 2018. White-Collar Crimes, Corruption and Bribery in Islamic Criminal Law: Lacuna and Conceivable Paths. Rule of Law and Anti-Corruption Center Journal 2018: 3. [Google Scholar] [CrossRef]
- Attorney General’s Office. 2012. Guidance: The Acceptance of Pleas and the Prosecutor’s Role in the Sentencing Exercise. Available online: https://www.gov.uk/guidance/the-acceptance-of-pleas-and-the-prosecutors-role-in-the-sentencing-exercise#b-general-principles (accessed on 22 September 2023).
- AU. 2021. Report of the 4th Ordinary Session of the STC on Communication and ICT (STC-CICT), 25–27 October 2021. Ministerial Session Meeting Report. Addis Ababa: African Union. [Google Scholar]
- Babaji, Bala, and Ibrahim Danjuma. 2015. The Concept of Plea Bargaining in the Muslims’ Countries: The Islamic Position Towards Its Application. Journal of Islamic and Comparative Law 30: 62–73. [Google Scholar]
- Baker, Donald I. 2001. The Use of Criminal Law Remedies to Deter and Punish Cartels and Bid-Rigging. George Washington Law Review 69: 693–714. [Google Scholar]
- Balogun, Anuoluwapo, Jonathan Aluju, and Wonuola Abioye. 2022. Nigeria. In Cartels and Leniency 2023. Edited by Matthew Readings and Elvira Aliende Rodriguez. London: Global Legal Group, pp. 97–102. [Google Scholar]
- BankID. n.d.a. BankID. Available online: https://www.bankid.no/en/about-us/ (accessed on 22 September 2023).
- BankID. n.d.b. BankID COI White Paper. Available online: https://confluence-bankidnorge-no.translate.goog/confluence/kiev-open/bankid-coi-whitepaper/prosess?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp (accessed on 22 September 2023).
- BankID. n.d.c. FAQ. Available online: https://www.bankid.no/en/private/solve-my-bankid-problem/faq/ (accessed on 22 September 2023).
- Barbosa, Alexandre, Celina Carvalho, Claudio Machado, and Janaina Costa. 2020. Good ID in Latin America: Strengthening Appropriate Uses of Digital Identity in the Region. Rio de Janeiro: Instituto de Tecnologia y Sociedade do Rio. [Google Scholar]
- Bassiouni, Mahmoud Cherif. 1974. Theories of Jurisdiction and Their Application in Extradition Law and Practice. California Western International Law Journal 5: 1–61. [Google Scholar]
- Battini, Stefano. 2011. Globalisation and Extraterritorial Regulation: An Unexceptional Exception. In Values in Global Administrative Law. Edited by Gordon Anthony, Jean-Bernard Auby, John Morison and Tom Zwart. New York: Bloomsbury, pp. 61–80. [Google Scholar]
- Batz, Marie T. 2007. Comparative Analysis of United States and European Union Jurisdiction in Extraterritorial Antitrust Law and the Need for International Standards. Duquesne Business Law Journal 9: 65–90. [Google Scholar]
- Bertrand, Olivier, and Marc Ivaldi. 2006. European Competition Policy in International Markets. SSRN Electronic Journal, 1–45. [Google Scholar] [CrossRef]
- Bicek, Rudolf. 2022. Plea Bargaining: A New Trend in European Criminal Proceedings. Available online: https://www.schoenherr.eu/content/plea-bargaining-a-new-trend-in-european-criminal-proceedings/ (accessed on 22 September 2023).
- Bilalli-Zendeli, Arta. 2019. Extradition: It’s Nature and Scope in Criminal Matters. JUSTICIA—International Journal of Legal Sciences 7: 33–43. [Google Scholar]
- BiometricUpdate.com. 2022. EU Says It Can Have a Digital ID Wallet by ‘24 Regardless of Challenges. Available online: https://www.biometricupdate.com/202211/eu-says-it-can-have-a-digital-id-wallet-by-24-regardless-of-challenges (accessed on 22 September 2023).
- Boister, Neil. 2016. The Cooperation Provisions of the UN Convention against Transnational Organised Crime: A ‘Toolbox’ Rarely Used? International Criminal Law Review 16: 39–70. [Google Scholar] [CrossRef]
- Bozkurt, Abdullah. 2022. ISIS Commander Granted Leniency at Trial in Turkey and Receives Reduced Sentence. Available online: https://nordicmonitor.com/2022/01/isis-commander-granted-leniency-in-trial-and-received-a-reduced-sentence-in-turkey/ (accessed on 22 September 2023).
- Bradford, Anu. 2020. The Brussels Effect: How the European Union Rules the World. New York: Oxford University Press. [Google Scholar]
- Brugger, Fritz, Joschka Proksik, and Felicitas Fischer. 2022. The State and the ‘Legalization’ of Illicit Financial Flows: Trading Gold in Bolivia, WIDER Working Paper 2022/171. WIDER. Available online: https://www.wider.unu.edu/sites/default/files/Publications/Working-paper/PDF/wp2022-171-state-legalization-illicit-financial-flows-trading-gold-Bolivia.pdf (accessed on 22 September 2023).
- Burgess, Rachel. 2023. Chapter 26: Association of Southeast Asian Nations. In Research Handbook on Cartels. Edited by Peter Whelan. Cheltenham: Edward Elgar, pp. 454–75. [Google Scholar]
- Burt, Chris. 2019. ID2020 and Partners Launch Program to Provide Digital ID with Vaccines. Available online: https://www.biometricupdate.com/201909/id2020-and-partners-launch-program-to-provide-digital-id-with-vaccines (accessed on 22 September 2023).
- Burt, Chris. 2021. ID2020 and Bangladesh Government Issue RFP for Biometrics-Linked Healthcare Digital ID. Available online: https://www.biometricupdate.com/202104/id2020-and-bangladesh-government-issue-rfp-for-biometrics-linked-healthcare-digital-id (accessed on 22 September 2023).
- Burt, Chris. 2022. Buenos Aires Planning Ambitious Decentralized Digital Identity System with Biometrics. Available online: https://www.biometricupdate.com/202205/buenos-aires-planning-ambitious-decentralized-digital-identity-system-with-biometrics (accessed on 22 September 2023).
- Businesswire. 2023. Over 95% of Indians and Indonesians Hold Digital IDs Linked to Government Databases, Making Document-Free Onboarding a Promising Reality for Businesses. Available online: https://www.businesswire.com/news/home/20230207005782/en/Over-95-of-Indians-and-Indonesians-hold-digital-IDs-linked-to-government-databases-making-document-free-onboarding-a-promising-reality-for-businesses (accessed on 22 September 2023).
- Caesar, Ed. 2023. Crooks’ Mistaken Bet on Encrypted Phones. Available online: https://www.newyorker.com/magazine/2023/04/24/crooks-mistaken-bet-on-encrypted-phones (accessed on 22 September 2023).
- Cammack, Mark E., and R. Michael Feener. 2012. The Islamic Legal System in Indonesia. Washington International Law Journal 21: 13–42. [Google Scholar]
- Carty, James E. 1951. Habeas Corpus in Extradition Proceedings. Duke Bar Journal 1: 188–206. [Google Scholar] [CrossRef]
- Casey, Eoghan. 2002. Practical Approaches to Recovering Encrypted Digital Evidence. International Journal of Digital Evidence 1: 1–26. [Google Scholar]
- Chen, Christopher. 2017. Extraterritoriality of the Regulations and Interconnections of the Derivatives Market: Legal Implications for East and Southeast Asia. Masaryk University Journal of Law and Technology 11: 323–49. [Google Scholar] [CrossRef]
- Chin, Roger J., Gregory Hennessy, and Toby Madubuko. 2015. India’s Aadhaar Project: The Unprecedented and Unique Partnership for Inclusion. Journal of Administrative Science 12: 1–16. [Google Scholar]
- CIA. 2023. The World Factbook: Turkey. Available online: https://www.cia.gov/the-world-factbook/countries/turkey-turkiye/#people-and-society (accessed on 22 September 2023).
- Clarke, Julie. 2023. Chapter 27: Australia and New Zealand. In Research Handbook on Cartels. Edited by Peter Whelan. Cheltenham: Edward Elgar, pp. 476–99. [Google Scholar]
- Coffee, John C., Jr. 2014. Extraterritorial Financial Regulation: Why E.T. Can’t Come Home. Cornell Law Review 99: 1259–302. [Google Scholar]
- CoolBitX. 2020a. Bridge: Enabling VASPs to Collect and Exchange Compliance-Required Transaction Information. Available online: https://www.sygna.io/bridge/ (accessed on 17 February 2023).
- CoolBitX. 2020b. Sygna Bridge Report: FATF Recommendation 16 Technical Solution for Virtual Asset Transactions. Arcadia: CoolBitX. [Google Scholar]
- Corvalan, Camila, and Mariano Plaza. 2022. Argentina. In Cartels and Leniency 2023. Edited by Matthew Readings and Elvira Aliende Rodriguez. London: Global Legal Group, pp. 6–11. [Google Scholar]
- Council of Europe. 2014. White Paper on Transnational Organised Crime. Strasbourg: Council of Europe. [Google Scholar]
- Council of Europe. 2023. Parties/Observers to the Budapest Convention and Observer Organisations to the T-CY. Available online: https://www.coe.int/en/web/cybercrime/parties-observers (accessed on 22 September 2023).
- Cox, Joseph. 2016. 7 Ways the Cops Will Bust You on the Dark Web. Available online: https://www.vice.com/en/article/vv73pj/7-ways-the-cops-will-bust-you-on-the-dark-web (accessed on 22 September 2023).
- Crijns, Jan H., Marieke J. Dubelaar, and Kelly M. Pitcher. 2017. Collaboration with Justice in the Netherlands, Germany, Italy and Canada. Leiden: Leiden University. [Google Scholar]
- Daijiworld News. 2017. ‘Adhaar’ Most Sophisticated ID Programme in the World: World Bank. Available online: https://www.daijiworld.com/news/newsDisplay.aspx?newsID=442948 (accessed on 22 September 2023).
- Davis, Nicholas. 2021. The FBI’s Operation Trojan Shield: Infiltrating Criminal Groups through Their Phones. Available online: https://www.american.edu/sis/centers/security-technology/operation-trojan-shield.cfm#:~:text=The%20FBI’s%20Operation%20Trojan%20Shield%3A%20Infiltrating%20Criminal%20Groups%20through%20their%20Phones,-By%20Nicholas%20Davis&text=On%208%20June%202021%2C%20the,compromised%20phones%20to%20criminal%20groups (accessed on 22 September 2023).
- de Arruda Sampaio, Onofre Carlos, and Andre Cutait de Arruda Sampaio. 2019. Brazil. In Cartel Regulation 2020. Edited by Neil Campbell. London: Law Business Research, pp. 39–46. [Google Scholar]
- Dictionary.com. 2023. Smartphone. Available online: https://www.dictionary.com/browse/smart—phone (accessed on 22 September 2023).
- Digicert. 2022. Secure, Authenticated Signatures with a Single Click. Available online: https://www.digicert.com/signing/document-signing-certificates (accessed on 22 September 2022).
- Director of Public Prosecutions South Australia. 2014. Statement of Prosecution Policy & Guidelines. Adelaide: Government of South Australia. [Google Scholar]
- DLA Piper. 2022. Cartel Enforcement: Global Review—2022. London: DLA Piper. [Google Scholar]
- DocuSign. 2022. Understanding Digital Signatures. Available online: https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq#:~:text=A%20digital%20certificate%20is%20an,belongs%20to%20the%20specific%20organization (accessed on 22 September 2023).
- Egbegi, Tariere. 2020. The Administration of Criminal Justice Act (ACJA) 2015: Overview and Tools for Protection of the Rights of Women and Children. Abuja: International Federation of Women Lawyers. [Google Scholar]
- Emmenegger, Susan. 2016. Extraterritorial Economic Sanctions and Their Foundation in International Law. Arizona Journal of International and Comparative Law 33: 631–60. [Google Scholar]
- ENISA. 2021. Remote ID Proofing: Analysis of Methods to Carry Out Identity Proofing Remotely. Athens: ENISA. [Google Scholar]
- Entrust. 2023. Digital Signing Document Signing Certificates. Available online: https://www.entrust.com/digital-security/certificate-solutions/products/digital-signing/document-signing-certificates (accessed on 22 September 2023).
- Estlund, Michelle. 2018. Interpol’s Colorful ‘Notices’ Are Potent, Obscure Tools to Combat Financial Crime. Available online: https://www.jdsupra.com/legalnews/interpol-s-colorful-notices-are-potent-78535/ (accessed on 22 September 2023).
- European Commission. 2007. Commission Working Document on the Feasibility of EU Legislation in the Area of Protection of Witnesses and Collaborators with Justice /* COM/2007/0693 Final */. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52007DC0693&from=SK (accessed on 22 September 2023).
- European Commission. 2022. European Digital Identity. Available online: https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en (accessed on 22 September 2023).
- Europol. 2020. Sophisticated Case of Money Laundering Leads to 15 Arrests in Malta. Available online: https://www.europol.europa.eu/media-press/newsroom/news/sophisticated-case-of-money-laundering-leads-to-15-arrests-in-malta (accessed on 22 September 2023).
- Ezrachi, Ariel, and Jiri Kindl. 2011. Cartels as Criminal? The Long Road from Unilateral Enforcement to International Consensus. In Criminalising Cartels: Critical Studies of an International Regulatory Movement. Edited by Caron Beaton-Wells and Ariel Ezrachi. Bloomsbury: Bloomsbury, pp. 419–34. [Google Scholar]
- FATF. 2014. Transparency and Beneficial Ownership. Paris: FATF. [Google Scholar]
- FATF. 2018. Professional Money Laundering. Paris: FATF. [Google Scholar]
- FATF. 2019a. FATF 30 Years—1989–2019. Paris: FATF. [Google Scholar]
- FATF. 2019b. Virtual Assets and Virtual Asset Service Providers. Paris: Financial Action Task Force. [Google Scholar]
- FATF. 2021. Who We Are. Available online: https://www.fatf-gafi.org/en/the-fatf/who-we-are.html (accessed on 22 September 2023).
- FATF. 2023. Guidance on Beneficial Ownership for Legal Persons. Paris: FATF. [Google Scholar]
- FBI. 2021. FBI’s Ability to Legally Access Secure Messaging App Content and Metadata. Available online: https://propertyofthepeople.org/document-detail/?doc-id=21114562 (accessed on 22 September 2023).
- FBI. n.d. Ross William Ulbricht’s Laptop. Available online: https://www.fbi.gov/history/artifacts/ross-william-ulbrichts-laptop (accessed on 22 September 2023).
- FEDPOL. 2014. Jugements Prononcés en Suisse en Matière de Blanchiment d’Argent. Available online: https://www.fedpol.admin.ch/fedpol/en/home/kriminalitaet/geldwaescherei/jb.html (accessed on 22 September 2023).
- FinCEN. 2014. Report of Cash Payments over $10,000 Received in a Trade or Business. Available online: https://www.irs.gov/pub/irs-pdf/f8300.pdf (accessed on 22 September 2023).
- FinCEN. 2016. Customer Due Diligence Requirements for Financial Institutions, Appendix A. Available online: https://www.govinfo.gov/content/pkg/FR-2016-05-11/pdf/2016-10567.pdf (accessed on 22 September 2023).
- Franceschi-Bicchierai, Lorenzo. 2022. This Is the ‘Graykey 2.0,’ the Tool Cops Use to Hack Phones. Available online: https://www.vice.com/en/article/93an8a/this-is-the-graykey-20-the-tool-cops-use-to-hack-phones (accessed on 22 September 2023).
- Freeman, Michelle A., and David A. Hickerson. 2023. Prepare for Extraterritorial Enforcement of U.S. Antitrust Law. Available online: https://www.foley.com/en/insights/publications/2023/03/prepare-extraterritorial-enforcement-us-antitrust (accessed on 22 September 2023).
- Fukami, Aya, Radina Stoykova, and Zeno Geradts. 2021. A New Model for Forensic Data Extraction from Encrypted Mobile Devices. Forensic Science International: Digital Investigation 38: 301169. [Google Scholar] [CrossRef]
- Fyfe, Nicholas, and James Sheptycki. 2005. Facilitating Witness Co-Operation in Organised Crime Cases: An International Review. Online Report No. 27/05. London: UK Home Office. [Google Scholar]
- Fyfe, Nicholas, and James Sheptycki. 2006. International Trends in the Facilitation of Witness Co-Operation in Organized Crime Cases. European Journal of Criminology 3: 319–55. [Google Scholar] [CrossRef]
- Gallant, Kenneth S. 2022. International Criminal Jurisdiction: Whose Law Must We Obey? Oxford: Oxford University Press. [Google Scholar]
- Garrote, Marina, Nathan Paschoalini, and Marina Meira. n.d. Why Should We All Pay Attention to the Brazilian Digital ID System? Available online: https://www.dataprivacybr.org/en/documentos/why-should-we-all-pay-attention-to-the-brazilian-digital-id-system/ (accessed on 22 September 2023).
- Gibson Dunn. 2020. Developments in the Defense of Financial Institutions: The International Reach of the U.S. Money Laundering Statutes. Los Angeles: Gibson Dunn. [Google Scholar]
- GlobalSign. 2023. Gmo Globalsign Unveils New Solution for Secure, Trusted High-Volume Seals. Available online: https://www.globalsign.com/en/company/news-events/news/gmo-globalsign-unveils-new-solution-secure-trusted-high-volume-seals (accessed on 22 September 2023).
- GSMA. 2022. The State of Mobile Internet Connectivity 2022. London: GSMA. [Google Scholar]
- Guliani, Priya. 2022. Identity for Social and Financial Inclusion. In Impact of Women’s Empowerment on SDGs in the Digital Era. Edited by Ingrid Vasiliu-Feltes. Hershey: IGI Global, pp. 79–99. [Google Scholar]
- Gutiérrez, Juan David. 2023. Chapter 28: South America. In Research Handbook on Cartels. Edited by Peter Whelan. Cheltenham: Edward Elgar, pp. 500–20. [Google Scholar]
- Hadjiyianni, Ioanna. 2021. The European Union as a Global Regulatory Power. Oxford Journal of Legal Studies 41: 243–64. [Google Scholar] [CrossRef]
- Hersey, Frank. 2023. World Bank Proposes $250m for Indonesia Digital ID for Public and Private Service Access. Available online: https://www.biometricupdate.com/202301/world-bank-proposes-250m-for-indonesia-digital-id-for-public-and-private-service-access (accessed on 22 September 2023).
- Hodgson, Jacqueline. 2012. Guilty Pleas and the Changing Role of the Prosecutor in French Criminal Justice. In The Prosecutor in Transnational Perspective. Edited by Erik Luna and Marianne Wade. Oxford: Oxford University Press, pp. 116–34. [Google Scholar]
- Hodgson, Jacqueline, and Laurene Soubise. 2016. Understanding the Sentencing Process in France. Crime and Justice: Review of Research 45: 221–66. [Google Scholar] [CrossRef]
- Hodgson, Jacqueline S. 2020. The Metamorphosis of Criminal Justice: A Comparative Account. New York: Oxford University Press. [Google Scholar]
- Hughes, Graham. 1992. Agreements for Cooperation in Criminal Cases. Vanderbilt Law Review 45: 1–70. [Google Scholar]
- IBM. 2023. Digital Certificates for User Authentication. Available online: https://www.ibm.com/docs/en/i/7.3?topic=dcm-digital-certificates-user-authentication (accessed on 22 September 2023).
- ICAO. 2023a. Access to ePassport Chip. Available online: https://www.icao.int/Security/FAL/PKD/BVRT/Pages/Document-readers.aspx (accessed on 22 September 2023).
- ICAO. 2023b. ePassport Validation. Available online: https://www.icao.int/Security/FAL/PKD/Pages/ePassport-Validation.aspx (accessed on 22 September 2023).
- ICIJ. 2020. Global Banks Defy U.S. Crackdowns by Serving Oligarchs, Criminals and Terrorists: The FinCEN Files Show Trillions in Tainted Dollars Flow Freely through Major Banks, Swamping a Broken Enforcement System. Available online: https://www.icij.org/investigations/fincen-files/global-banks-defy-u-s-crackdowns-by-serving-oligarchs-criminals-and-terrorists/ (accessed on 22 September 2023).
- ID2020. 2016. ID2020 Holds Inaugural Summit at the United Nations. Available online: https://medium.com/id2020/id2020-holds-inaugural-summit-at-the-united-nations-7112014add5e#:~:text=In%20May%202016%2C%20at%20the,any%20form%20of%20recognized%20identification. (accessed on 22 September 2023).
- IdenTrust. 2023. Apply Trusted Digital Signatures to Your Documents. Available online: https://www.identrust.com/digital-certificates/document-signing (accessed on 22 September 2023).
- InterFax. 2023. Putin Backs Digital Development Ministry’s Proposal to Introduce Digital IDs on Smartphones. Available online: https://interfax.com/newsroom/top-stories/88011/ (accessed on 22 September 2023).
- INTERPOL. 2023. Member Countries. Available online: https://www.interpol.int/en/Who-we-are/Member-countries#:%7E:text=INTERPOL%20has%20195%20member%20countries,police%20with%20our%20global%20network (accessed on 22 September 2023).
- IOSCO. 2023. Multilateral Memorandum of Understanding Concerning Consultation and Cooperation and the Exchange of Information (MMoU). Available online: https://www.iosco.org/about/?subsection=mmou (accessed on 22 September 2023).
- Iqbal, Saman. 2022. Criminal Justice Reform—Revamping Pakistan’s Colonial Structures. Available online: https://rsilpak.org/2022/criminal-justice-reform-revamping-pakistans-colonial-structures/ (accessed on 22 September 2023).
- Ireland-Piper, Danielle. 2012. Extraterritorial Criminal Jurisdiction: Does the Long Arm of the Law Undermine the Rule of Law. Melbourne Journal of lnternational Law 13: 122–57. [Google Scholar]
- Ismail, Halima Ummi. 2021. Plea Bargaining and the Islamic Criminal Justice System. Available online: https://loyalnigerianlawyer.com/plea-bargaining-and-the-islamic-criminal-justice-system/ (accessed on 22 September 2023).
- Iwasokun, Gabriel Babatunde, Taiwo Gabriel Omomule, and Raphael Olufemi Akinyede. 2018. Encryption and Tokenization-Based System for Credit Card Information Security. International Journal of Cyber-Security and Digital Forensics 7: 283–93. [Google Scholar] [CrossRef]
- Jamieson, Alison. 2000. The Antimafia: Italy’s Fight against Organized Crime. New York: St. Martin’s Press. [Google Scholar]
- Janis, Mark W. 2003. An Introduction to International Law, 4th ed. New York: Aspen. [Google Scholar]
- Joelson, Mark R. 2017. The Application of United States Antitrust Law to International Transactions and Foreign Parties. In An International Antitrust Primer: A Guide to the Operation of United States, European Union and Other Key Competition Laws in the Global Economy. Edited by Mark R. Joelson. Zuid-Holland: Kluwer Law International, pp. 43–66. [Google Scholar]
- Jones Day. 2012. Cartel Leniency in the Asia-Pacific Region. Available online: https://www.jonesday.com/en/insights/2012/05/cartel-leniency-in-the-asia-pacific-region (accessed on 22 September 2023).
- Joshua, Julian M., Peter D. Camesasca, and Youngjin Jung. 2008. Extradition and Mutual Legal Assistance Treaties: Cartel Enforcement’s Global Reach. Antitrust Law Journal 75: 353–98. [Google Scholar]
- Jung, Youngjin. 2005. Korean Competition Law: First Step Towards Globalization. Journal of Korean Law 4: 177–99. [Google Scholar]
- Kageyama, Yuri. 2022. Japan Steps up Push to Get Public Buy-In to Digital IDs. Available online: https://apnews.com/article/technology-health-japan-covid-public-d47817295a647379f69da9bb16160d13 (accessed on 22 September 2023).
- Kaira, Thula. 2017. Cartel Enforcement in the Southern African Neighborhood. In Competition Law and Economic Regulation: Addressing Market Power in Southern Africa. Edited by Jonathan Klaaren, Simon Roberts and Imraan Valodia. Johannesburg: Wits University Press, pp. 71–96. [Google Scholar]
- Kianersi, Nima, Mohsen Shekarchizadeh, and Masoud Zamani. 2022. Plea Bargaining in the Criminal Law of the US and Iran and Its Effect on Diversion with a Jurisprudential Approach. Economic Jurisprudence Studies 3: 105–20. [Google Scholar]
- Kiunuhe, Anne, and Njeri Wagacha. 2019. Kenya. In Cartel Regulation 2020. Edited by Neil Campbell. London: Law Business Research, pp. 152–61. [Google Scholar]
- Knott, Ryan Paul. 2010. Extraterritoriality, the Effects Doctrine and Enforcement Cooperation through Bilateral Agreements with Regards to Antitrust Law. L.L.M. thesis, University of Johannesburg, Johannesburg, South Africa. [Google Scholar]
- Kolasky, William. 2004. Criminalising Cartel Activity: Lessons from the U.S. Experience. Competition and Consumer Law Journal 12: 207–23. [Google Scholar]
- Krotoski, Mark. 2015. “Extradition in International Antitrust Enforcement Cases”. The Antitrust Source. Available online: https://www.morganlewis.com/-/media/files/publication/outside-publication/article/antitrust-source-extradition-in-international-antitrust-enforcement-cases-april2015.pdf?rev=dc351fa5d406459899e9f1ef3ed596ce&hash=6EA478111B109163A51061F5F4A35533 (accessed on 22 October 2023).
- Kursun, Eren, Gene Fernandez, Alex Berson, and Brian Goodman. 2018. System and Method for Biometric Authentication-Based Electronic Notary Public. Alexandria: USPTO. [Google Scholar]
- Kyprianou, Despina. 2006. The Role of the Cyprus Attorney General’s Office in Prosecutions: Rhetoric, Ideology and Practice. Ph.D. thesis, University of London, London, UK. [Google Scholar]
- Langer, Máximo. 2021. Plea Bargaining, Conviction without Trial, and the Global Administratization of Criminal Convictions. Annual Review of Criminology 4: 377–411. [Google Scholar] [CrossRef]
- Lee, Belinda S., Meaghan P. Thomas-Kennedy, and Elizabeth C. Gettinger. 2022. Korea. In Cartels: Enforcement, Appeals and Damages Actions 2022. Edited by Euan Burrows and Denis Fosselard. London: Global Legal Group, pp. 192–201. [Google Scholar]
- Lessambo, Felix I. 2020. Extraterritorial Competence of the United States, the EU, and China Competition Laws. In Mergers in the Global Markets: A Comparative Approach to the Competition and National Security Laws among the US, EU, and China. Edited by Felix I. Lessambo. Cham: Springer International Publishing, pp. 133–65. [Google Scholar]
- Liang, Ding. 2019. China. In Cartel Regulation 2020. Edited by Neil Campbell. London: Law Business Research, pp. 59–67. [Google Scholar]
- Library of Congress. 2013. Brazil: New Law Defines “Criminal Organization” and Provides for Investigatory and Other Procedures. Available online: https://www.loc.gov/item/global-legal-monitor/2013-08-12/brazil-new-law-defines-criminal-organization-and-provides-for-investigatory-and-other-procedures/#:~:text=12.850%2C%20de%202%20de%20Agosto,such%20organizations%20(art%201) (accessed on 22 September 2023).
- Liu, Bo Ning. 2020. Observation of Judicial Promise in the System of “Leniency in Confession and Punishment Acceptance”. Legal Science 2020: 50–64. [Google Scholar]
- Macdonald, Ayang. 2022a. China to Introduce Digital ID Cards Nationwide. Available online: https://www.biometricupdate.com/202203/china-to-introduce-digital-id-cards-nationwide (accessed on 22 September 2023).
- Macdonald, Ayang. 2022b. Norway to Replace BankID on Mobile with Biometric Apps for Improved Security. Available online: https://www.biometricupdate.com/202205/norway-to-replace-bankid-on-mobile-with-biometric-apps-for-improved-security (accessed on 22 September 2023).
- Mackarel, Mark, and Susan Nash. 1997. Extradition and the European Union. International and Comparative Law Quarterly 46: 948–57. [Google Scholar]
- Mahlangu, Philile Lomthandazo. 2014. Enforcement against Cartels in South African Competition Law: Advantages and Challenges. Master’s thesis, University of Pretoria, Pretoria, South Africa. [Google Scholar]
- Majozi, Nkosinathi Levion. 2019. Plea Bargaining in South Africa and England. L.L.M. thesis, University of Pretoria, Pretoria, South Africa. [Google Scholar]
- Malik, Hasnaat. 2021. Govt Plans to Insert Chapter of Plea Bargain in CrPC. Available online: https://tribune.com.pk/story/2322720/govt-plans-to-insert-chapter-of-plea-bargain-in-crpc (accessed on 22 September 2023).
- Mark, Gideon. 2018. The Yates Memorandum and Cartel Enforcement. UC Davis Law Review Online 51: 95–119. [Google Scholar]
- Mascellino, Alessandro. 2022. Japan to Integrate Health Insurance Cards into My Number Digital ID in Digitization Push. Available online: https://www.biometricupdate.com/202210/japan-to-integrate-health-insurance-cards-into-my-number-digital-id-in-digitization-push (accessed on 22 September 2023).
- Mathew, Basil B. 2014. Aadhaar Project: A Critical Analysis. International Interdisciplinary Research Journal 4: 476–83. [Google Scholar]
- Meheretu, Alemu. 2016. The Proposed Plea Bargaining in Ethiopia: How It Fares with Fundamental Principles of Criminal Law and Procedure. Mizan Law Review 10: 400–29. [Google Scholar] [CrossRef]
- Melendez, Steven. 2019. How to Open a MoneyGram Account. Available online: https://www.sapling.com/12030173/open-moneygram-account (accessed on 22 September 2023).
- Ministry of Justice. 2003. Federal Democratic Republic of Ethiopia Criminal Justice Policy. Addis Ababa: Ministry of Justice. [Google Scholar]
- Ministry of Justice. 2019. Présentation Des Dispositions Immédiatement Applicables de La Loi N°2019-222 Du 23 Mars 2019 de Programmation 2018–2022 Et de Réforme Pour La Justice Relatives Aux Alternatives Aux Poursuites, Aux Poursuites Et Au Jugement [Presentation of the Immediately Applicable Provisions of Law No. 2019-222 of March 23, 2019 of 2018–2022 Programming and Reform for Justice Relating to Alternatives to Prosecution, Prosecution and Judgment]. Available online: http://www.justice.gouv.fr/bo/2019/20190430/JUSD1910286C.pdf (accessed on 22 September 2023).
- MONEYVAL. 2015. Typologies Report on Laundering the Proceeds of Organised Crime. Strasbourg: Council of Europe. [Google Scholar]
- MOSIP. n.d.a. An Open Source Platform on Which National Foundational IDs Are Built. Available online: https://www.mosip.io/index.php (accessed on 22 September 2023).
- MOSIP. n.d.b. What Is MOSIP? Available online: https://www.mosip.io/about.php (accessed on 22 September 2023).
- Murray, Kenneth. 2016. In the Shadow of the Dark Twin: Proving Criminality in Money Laundering Cases. Journal of Money Laundering Control 19: 447–58. [Google Scholar] [CrossRef]
- Muzata, Tapera, Simon Roberts, and Thando Vilakazi. 2017. Penalties and Settlements for South African Cartels: An Economic Review. In Competition Law and Economic Regulation: Addressing Market Power in Southern Africa. Edited by Jonathan Klaaren, Simon Roberts and Imraan Valodia. Johannesburg: Wits University Press, pp. 13–48. [Google Scholar]
- Nadelmann, Ethan A. 1990. The Role of the United States in the International Enforcement of Criminal Law. Harvard International Law Journal 31: 37–76. [Google Scholar]
- Nagashima Ohno & Tsunematsu. 2020. Court Rules in Japan’s First Plea Bargaining Case. Available online: https://www.lexology.com/commentary/white-collar-crime/japan/nagashima-ohno-tsunematsu/court-rules-in-japans-first-plea-bargaining-case#Plea%20bargaining%20system (accessed on 22 September 2023).
- NCA. 2020. NCA and Police Smash Thousands of Criminal Conspiracies after Infiltration of Encrypted Communication Platform in UK’s Biggest Ever Law Enforcement Operation. Available online: https://nationalcrimeagency.gov.uk/news/operation-venetic?highlight=WyJlbmNyb2NoYXQiLCJlbmNyb2NoYXQncyJd (accessed on 22 September 2023).
- Negash, Alemu Meheretu. 2018. Rethinking Plea Bargaining Policy: The Case of Ethiopia. Mizan Law Review 11: 342–72. [Google Scholar] [CrossRef]
- Nikel, David. 2022. BankID: Norway’s Digital ID System Explained. Available online: https://www.lifeinnorway.net/bankid-norway/ (accessed on 22 September 2023).
- Nishioka, Kazuaki. 2020. International Scope of the Japanese Anti-Monopoly Act in Cross-Border Cartel Cases: A Japanese Approach to ‘Extraterritorial Application’. Journal of Antitrust Enforcement 8: 590–605. [Google Scholar] [CrossRef]
- NIST. n.d.a. Biometrics Collection. Available online: https://pages.nist.gov/800-63-3-Implementation-Resources/63A/biometrics/ (accessed on 22 September 2023).
- NIST. n.d.b. Supervised Remote Identity Proofing. Available online: https://pages.nist.gov/800-63-3-Implementation-Resources/63A/srip/ (accessed on 22 September 2023).
- Oddie, Carolyn, and Felicity McMahon. 2022. Australia. In Cartel Regulation 2023. Edited by Andrew Neil Campbell. London: Law Business Research, pp. 6–15. [Google Scholar]
- OECD. 2016. Exchange of Information on Request: Handbook for Peer Reviews 2016–2020: 2016 Terms of Reference. Paris: OECD. [Google Scholar]
- OECD. 2018. Standard for Automatic Exchange of Financial Account Information in Tax Matters, 2nd ed. Paris: OECD. [Google Scholar]
- OECD. 2021. Building Effective Beneficial Ownership Frameworks: A Joint Global Forum and IDB Toolkit. Paris: OECD. [Google Scholar]
- OECD. 2022. Crypto-Asset Reporting Framework and Amendments to the Common Reporting Standard. Paris: OECD. [Google Scholar]
- OECD. 2023. Automatic Exchange of Information (AEOI): Status of Commitments. Available online: https://www.oecd.org/tax/transparency/AEOI-commitments.pdf (accessed on 22 September 2023).
- OECD. n.d.a. Global Forum on Transparency and Exchange of Information for Tax Purposes: Issuing Ratings. Available online: https://www.oecd.org/tax/transparency/what-we-do/ (accessed on 22 September 2023).
- OECD. n.d.b. Exchange of Information on Request: A Robust and Transparent Review Process. Available online: https://www.oecd.org/tax/transparency/documents/exchange-of-information-on-request-peer-review-process.htm (accessed on 22 September 2023).
- Ohlson, Mark, Anthony Lo, and Fran Wang. 2013. Taiwan. In Cartel Regulation in 46 Jurisdictions Worldwide 2014. Edited by Andrew Neil Campbell. London: Law Business Research, pp. 305–11. [Google Scholar]
- Owens, Jeffrey P., and Rick McDonell. 2018. Creating Mechanisms to Get Good Access to Beneficial Ownership Information in International Context. Vienna: Vienna University of Economics and Business. [Google Scholar]
- Oxenham, John, and Maria Webber. 2013. South Africa. In Cartel Regulation in 46 Jurisdictions Worldwide 2014. Edited by Andrew Neil Campbell. London: Law Business Research, pp. 272–79. [Google Scholar]
- Parnell Law Chambers. 2021. Interpol Red Notice and the International Extradition Law. Available online: https://www.parnellchambers.co.nz/index.php/practice-areas/interpol-red-notice-and-the-international-extradiction-law/ (accessed on 22 September 2023).
- Pascu, Luana. 2020. Argentina Enables Remote Digital ID Processing for Mobile During COVID-19 Crisis. Available online: https://www.biometricupdate.com/202004/argentina-enables-remote-digital-id-processing-for-mobile-during-covid-19-crisis (accessed on 22 September 2023).
- Pathak, Apurva. 2015. Plea Bargaining: A New Chapter in Indian Legal System. International Journal of Research in Humanities & Social Sciences 3: 53–56. [Google Scholar]
- Peters and Peters. n.d. The London Scheme on Extradition within the Commonwealth. Available online: https://extraditionuk.petersandpeters.com/extradition/resources/the-london-scheme-on-extradition-within-the-commonwealth/#:~:text=The%20London%20Scheme%20on%20Extradition%20within%20the%20Commonwealth%20(%E2%80%9Cthe%20London,Scheme%20was%20amended%20in%202000 (accessed on 22 September 2023).
- Pfefferkorn, Riana. 2021. We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps. Available online: https://www.justsecurity.org/79549/we-now-know-what-information-the-fbi-can-obtain-from-encrypted-messaging-apps/ (accessed on 22 September 2023).
- Plachta, Michael. 1999. Aut Dedere Aut Judicare: An Overview of Modes of Implementation and Approaches. Maastricht Journal of European and Comparative Law 6: 331. [Google Scholar] [CrossRef]
- Prete, Luca. 2018. On Implementation and Effects: The Recent Case-Law on the Territorial (or Extraterritorial?) Application of EU Competition Rules. Journal of European Competition Law & Practice 9: 487–95. [Google Scholar] [CrossRef]
- PYMNTS. 2022. OneSpan, BankID Extend Digital Identity Service to All Norwegian Banks. Available online: https://www.pymnts.com/digital-identity/2022/onespan-bankid-extend-digital-identity-service-all-norwegian-banks/ (accessed on 22 September 2023).
- Raza, Muhammad Subtain, Qi Zhan, and Sana Rubab. 2020. Role of Money Mules in Money Laundering and Financial Crimes: A Discussion through Case Studies. Journal of Financial Crime 27: 911–31. [Google Scholar] [CrossRef]
- ReadID. 2023. Which Countries Have ePassports? Available online: https://www.readid.com/blog/countries-epassports (accessed on 22 September 2023).
- Reims, Raphael. 2022. The Criminal Prosecution of Hardcore Cartels in the USA and the EU—A Backdoor Criminalization in the EU by the USA? Competition Policy International 2022: 1–9. [Google Scholar]
- Republic of Ethiopia. 2013. Criminal Law Procedure and Law of Evidence (Draft). Addis Ababa: Republic of Ethiopia. [Google Scholar]
- Reuters. 2021. Italy Judge Convicts 70 People in Major Mafia Trial. Available online: https://www.reuters.com/world/italy-judge-convicts-70-people-major-mafia-trial-2021-11-08/ (accessed on 22 September 2023).
- Said, Mark. 2022. The Plea-Bargain Conundrum. Available online: https://www.independent.com.mt/articles/2022-04-14/newspaper-opinions/The-plea-bargain-conundrum-6736242197 (accessed on 22 September 2023).
- Sathe, Vijay. 2011. The World’s Most Ambitious ID Project. Innovations in Education and Teaching International 6: 39–66. [Google Scholar]
- Schloenhardt, Andreas. 2021. International Cooperation under the United Nations Convention against Transnational Organized Crime: Expectations and Experiences. Brill Research Perspectives in Transnational Crime 3: 3–25. [Google Scholar] [CrossRef]
- Schwartz, Jeffrey. 2016. Fighting for a Secure Digital Identity for All. Available online: https://redmondmag.com/Articles/2016/07/01/Common-Cause.aspx?Page=2&m=1 (accessed on 22 September 2023).
- Scott, Joanne. 2014. The New EU ‘Extraterritoriality’. Common Market Law Review 51: 1343–80. [Google Scholar] [CrossRef]
- Scotti, Benjamin. 2002. Rico vs. 416-bis: A Comparison of US and Italian Anti-Organized Crime Legislation. Loyola of Los Angeles International and Comparative Law Review 25: 143–64. [Google Scholar]
- Seddon, Judith, Eleanor Davison, Christopher J. Morvillo, Michael Bowes QC, Luke Tolaini, Ama A. Adams, and Tara McGrath, eds. 2021. The Practioner’s Guide to Global Investigations, Vol. 1: Global Investigations in the United Kingdom and the United States, 6th ed. London: Global Investigations Review. [Google Scholar]
- Seetahal, Dana S., and Roger Ramgoolam. 2019. Commonwealth Caribbean Criminal Practice and Procedure, 5th ed. London: Routledge. [Google Scholar]
- Sentencing Council. 2023. Sentencing Guidelines for Use in Crown Court. Available online: https://www.sentencingcouncil.org.uk/offences/crown-court/item/fraud/ (accessed on 22 September 2023).
- Shaffer, Gregory C., Nathaniel H. Nesbitt, and Spencer W. Waller. 2015. Criminalizing Cartels: A Global Trend? In Comparative Competition Law. Edited by John Duns, Arlen Duke and Brendan Sweeney. Cheltenham: Edward Elgar, pp. 301–44. [Google Scholar]
- Sharma, Vikas. 2011. Aadhaar—A Unique Identification Number: Opportunities and Challenges Ahead. Research Cell: An International Journal of Engineering Sciences 4: 169–78. [Google Scholar]
- Shi, Jiahui. 2021. Reconsideration of the Role of Prosecutors in the Chinese Plea Bargaining System: A Comparative Perspective. Chinese Studies 10: 88–99. [Google Scholar] [CrossRef]
- Shirk, David A. 2016. Criminal Justice Reform in Mexico: An Overview. Mexican Law Review 3: 189–228. [Google Scholar]
- Sigler, Heather J. 2009. Federal Criminal Conspiracy. American Criminal Law Review 46: 589–620. [Google Scholar]
- SMART Africa Alliance. 2020a. SMART Africa Alliance: Digital Identity: Blueprint. Kigali: SMART Africa Alliance. [Google Scholar]
- SMART Africa Alliance. 2020b. Who We Are. Available online: https://smartafrica.org/who-we-are/ (accessed on 22 September 2023).
- Smart Card Alliance. 2009. ePassport Frequently Asked Questions. Princeton Junction: Smart Card Alliance. [Google Scholar]
- Sogut, Koray. 2019. Significant Amendments to the Code of Criminal Procedure Under the First Package of the Judicial Reform. Available online: https://www.esin.av.tr/2019/10/30/significant-amendments-to-the-code-of-criminal-procedure-under-the-first-package-of-the-judicial-reform/ (accessed on 22 September 2023).
- Solomon, Peter H., Jr. 2012. Plea Bargaining Russian Style. Demokratizatsiya: The Journal of Post-Soviet Democratization 20: 282–99. [Google Scholar]
- SS8 Networks. n.d. The Ready Guide to Intercept Legislation. San Jose: SS8 Networks.
- Sumsub. n.d. Streamlining Identity Verification in Emerging Markets. London: Sumsub.
- Tak, Peter J. P. 1997. Deals with Criminals: Supergrasses, Crown Witnesses and Pentiti. European Journal of Crime, Criminal Law and Criminal Justice 5: 2–26. [Google Scholar] [CrossRef]
- TASS. 2019. Russia to Roll out Digital IDs in 2024. Available online: https://tass.com/science/1044074 (accessed on 22 September 2023).
- Thales. 2023. Biometrics: Definition, Use Cases, Latest News. Available online: https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/inspired/biometrics (accessed on 22 September 2023).
- Theodorou, Yiannis. 2022. On the Road to Digital-ID Success in Africa: Leveraging Global Trends. Available online: https://institute.global/policy/road-digital-id-success-africa-leveraging-global-trends#:~:text=A%20recent%20report%20forecasts%20that,to%20present%20online%20and%20offline (accessed on 22 September 2023).
- Thomas, Christopher, and Gianni De Stefano. 2016. “Extradition and Antitrust: Cautionary Tales for Global Cartel Compliance”. AB Extra. Available online: https://www.hoganlovells.com/~/media/hogan-lovells/pdf/publication/hogan_lovells_ab_extra_30_09_16.pdf (accessed on 22 October 2023).
- Tinsley, Alex. 2021. Specialty: Arresting an Elusive ‘Right’ in European Extradition Law. New Journal of European Criminal Law 12: 23–35. [Google Scholar] [CrossRef]
- Tristanto, Yunizar Wahu. 2018. Juridical Review of Implementation of Plea Bargaining for Improving Justice Efficiency in Indonesia. AHKAM 6: 411–36. [Google Scholar]
- Tuan, Nguyen Anh, Tran Hai Thinh, and Tran Hoang My. 2019. Vietnam. In Cartel Regulation 2020. Edited by Neil Campbell. London: Law Business Research, pp. 298–305. [Google Scholar]
- U.S. Department of Justice. 2020a. 18 U.S.C. § 371—Conspiracy to Defraud the United States. Available online: https://www.justice.gov/archives/jm/criminal-resource-manual-923-18-usc-371-conspiracy-defraud-us (accessed on 22 September 2023).
- U.S. Department of Justice. 2020b. 2161. Jury Instruction: Intent to Promote the Carrying on of the Specified Unlawful Activity. Available online: https://www.justice.gov/archives/jm/criminal-resource-manual-2161-jury-instruction-intent-promote-carrying-specified-unlawful#:~:text=The%20term%20with%20the%20intent,of%20the%20crimes%20listed%20as (accessed on 22 September 2023).
- U.S. Department of Justice. 2020c. 2166. Jury Instruction: Conspiracy to Commit Money Laundering. Available online: https://www.justice.gov/archives/jm/criminal-resource-manual-2166-jury-instruction-conspiracy-commit-money-laundering (accessed on 22 September 2023).
- U.S. Department of the Treasury. 2023. Specially Designated Nationals and Blocked Persons List (SDN) Human Readable Lists. Available online: https://www.treasury.gov/resource-center/sanctions/SDN-List/Pages/default.aspx (accessed on 22 September 2023).
- U.S. Mission Panama. 2022. Panama Intermediaries Each Sentenced to 36 Months in Prison for International Bribery and Money Laundering. Available online: https://pa.usembassy.gov/panama-intermediaries-each-sentenced-to-36-months-in-prison-for-international-bribery-and-money-laundering-scheme/ (accessed on 22 September 2023).
- UN. 2023. Vienna Convention on the Law of Treaties: Status. Available online: https://treaties.un.org/Pages/ViewDetailsIII.aspx?src=TREATY&mtdsg_no=XXIII-1&chapter=23&Temp=mtdsg3&clang=_en (accessed on 22 September 2023).
- UNHCR. 2018. Announcing the 2018 ID2020 Summit—Towards “Good” Digital Identity. Available online: https://www.unhcr.org/blogs/announcing-the-2018-id2020-summit-towards-good-digital-identity/ (accessed on 22 September 2023).
- United Nations. 2023. United Nations Convention against Transnational Organized Crime: Status. Available online: https://treaties.un.org/pages/ViewDetails.aspx?src=TREATY&mtdsg_no=XVIII-12&chapter=18&clang=_en (accessed on 22 September 2023).
- University of Oxford. 2023. Our World in Data. Available online: https://ourworldindata.org/grapher/median-daily-per-capita-expenditure-vs-gdp-per-capita?tab=table (accessed on 22 September 2023).
- UNODC. 2006. Legislative Guide for the Implementation of the United Nations Convention against Corruption. U.N. Sales No. E.06.IV.16. Vienna: UNODC. [Google Scholar]
- UNODC. 2019. Extradition. Available online: https://www.unodc.org/e4j/zh/organized-crime/module-11/key-issues/extradition.html (accessed on 22 September 2023).
- UNODC. 2021. Digest of Cases of International Cooperation in Criminal Matters Involving the United Nations Convention against Transnational Organized Crime as a Legal Basis. Vienna: UNODC. [Google Scholar]
- USDOJ. 2020. Two Alleged Criminals—A Hezbollah Associated Narco-Money Launderer and a Computer Hacker—Extradited from Cyprus to the United States. Available online: https://www.justice.gov/opa/pr/two-alleged-criminals-hezbollah-associated-narco-money-launderer-and-computer-hacker (accessed on 22 September 2023).
- van der Does de Willebois, Emile, Emily M. Halter, Robert A. Harrison, Park Ji Won, and Jason C. Sharman. 2011. The Puppet Masters: How the Corrupt Use Legal Structures to Hide Stolen Assets and What to Do About It. Washington, DC: The International Bank for Reconstruction and Development. [Google Scholar]
- van der Wilt, Harmen. 2022. The Law and Practice of Extradition. Abingdon: Routledge. [Google Scholar]
- Ventura, Manuel J. 2019. Aiding and Abetting. In Modes of Liability in International Criminal Law. Edited by Jérôme de Hemptinne, Robert Roth, Elies van Sliedregt, Marjolein Cupido, Manuel J. Ventura and Lachezar Yanev. Cambridge: Cambridge University Press, pp. 173–256. [Google Scholar]
- Wagner, Benjamin B., and Leslie Gielow Jacobs. 2008. Retooling Law Enforcement to Investigate and Prosecute Entrenched Corruption: Key Criminal Procedure Reforms for Indonesia and Other Nations. University of Pennsylvania Journal of International Law 30: 183–265. [Google Scholar]
- Warin, F. Joseph. 2013. The Global Reach of American Criminal Law. Available online: https://www.gibsondunn.com/wp-content/uploads/documents/publications/Warin-TheGlobalReachofAmericanCriminalLaw-0213.pdf (accessed on 22 September 2023).
- Watanabe, Eriko, and Koki Yanagisawa. 2019. Japan. In Cartel Regulation 2020. Edited by Neil Campbell. London: Law Business Research, pp. 143–51. [Google Scholar]
- Wells Fargo. 2021. Certification Regarding Beneficial Owners of Legal Entity Customers. Available online: https://www08.wellsfargomedia.com/assets/pdf/small-business/beneficial-owner.pdf (accessed on 22 September 2023).
- West, David. 2019. Extradition. In Commonwealth Caribbean Criminal Practice and Procedure. Edited by Roger Ramgoolam. London: Routledge, pp. 394–412. [Google Scholar]
- Won-cheol, Kim. 2006. Extraterritorial Application of Antitrust Law to International Cartels. Corporate Law Research 20: 385–409. [Google Scholar]
- World Bank. 2017. The State of Identification Systems in Africa. Washington: World Bank. [Google Scholar]
- Wydra, Elizabeth B. 2004. Is an Overt Act an Element of the Crime of Conspiracy to Commit Money Laundering (03-1293) (03-1294). Preview of United States Supreme Court Cases 2004: 146–50. [Google Scholar]
- Yeh, Stuart S. 2020a. An International Law Approach to End Money Laundering. Journal of International Banking Law and Regulation 35: 148–63. [Google Scholar]
- Yeh, Stuart S. 2020b. An International Treaty to Fight Money Laundering. Journal of International Banking Law and Regulation 35: 190–207. [Google Scholar]
- Yeh, Stuart S. 2020c. Application of a Model International Treaty to Money Laundering. Journal of International Banking Law and Regulation 35: 443–62. [Google Scholar]
- Yeh, Stuart S. 2021. APUNCAC: An International Convention to Fight Corruption, Money Laundering, and Terrorist Financing. Law and Development Review 14: 633–64. [Google Scholar] [CrossRef]
- Yeh, Stuart S. 2022a. New Financial Action Task Force Recommendations to Fight Corruption and Money Laundering. Laws 11: 8. [Google Scholar] [CrossRef]
- Yeh, Stuart S. 2022b. The End of Corruption and Impunity. New York: Lexington. [Google Scholar]
- Yoon, Hoil, Sinsung Yun, and Kenneth T. Kim. 2016. Korea. In Cartel Regulation. Edited by Andrew Neil Campbell. London: Law Business Research, pp. 136–43. [Google Scholar]
- Zabrodin, Vladislav, and Irina Akimova. 2012. Cartel Regulation—2013: The Application of Competition Regulation in 48 Jurisdictions Worldwide—Russia. Available online: https://www.cls.ru/press-centr/publications/cartel-regulation—-2013/ (accessed on 22 September 2023).
- Zanotti, Isidoro. 2006. Extradition in Multilateral Treaties and Conventions. Vol. 3, Studies on the Law of Treaties. Leiden: Martinus Nijhoff. [Google Scholar]
- Zerk, Jennifer A. 2010. Extraterritorial Jurisdiction: Lessons for the Business and Human Rights Sphere from Six Regulatory Areas. Cambridge: Harvard University. [Google Scholar]
- Zhou, Qiang. 2017. Middle-Term Report of the Supreme Court and Supreme People’s Procuratorate on the Experiment of Plea Bargaining in Certain Regions. Beijing: People’s Court Post. [Google Scholar]
Type of Transaction | Territorial Application | |
---|---|---|
State Party a | Extraterritorial b | |
Wire transfer, crypto transfer, peer-to-peer transfer, or hawala transfer via domestic State Party bank or financial institution. | X | |
Wire transfer, crypto transfer, peer-to-peer transfer, or hawala transfer via extraterritorial bank or financial institution (A) for national of (or entity in) State Party or (B) to or from State Party. | X | |
Transaction involving a monetary instrument or transmittal of funds (A) by national of State Party, or (B) transmitted to, from, or with assistance of person/entity within jurisdiction of State Party. c | X | X |
1 | Anticorruption Protocol to the United Nations Convention against Corruption, arts. 21(2)(a)(H), 21(3)(a)(viii), 21(3)(b)(viii), 22(1)(a)(G), 30(b), available at https://tinyurl.com/y6bkpott, accessed on 22 September 2023 [hereinafter APUNCAC]. The term “true beneficial owner” means the ultimate beneficial owner who controls the transaction for their benefit. |
2 | “Front man” is a term of art that refers to an individual whose name is substituted for the name of the true beneficial owner in an effort to mislead authorities regarding the name of the true beneficial owner. I retain the term for clarity. |
3 | Text messages may include SMS text messages, email, or encoded Proton Mail or WhatsApp messages and may be obtained by prosecutors from electronic records, seized devices, or intercepted communications. See Section 3.38. |
4 | The APUNCAC strategy would require jurisdictions that currently do not utilize cooperation agreements to implement changes in law or practice that would permit such agreements. Each jurisdiction would make an independent judgment about the suitability of this strategy and would act accordingly. In the U.S., the U.S. Constitution protects the right of an accused person to remain silent, but this does not prevent prosecutors from obtaining independent evidence of culpability that may then be utilized to negotiate voluntary cooperation agreements in exchange for lesser charges. There is, in principle, no reason why voluntary cooperation agreements could not be utilized in other jurisdictions (See Section 3.12). The implementation of witness protection programs is discussed elsewhere (See Yeh 2022a, p. 40). |
5 | Al Capone, the famous gangster, was prosecuted for and convicted of tax evasion. Order, United States v. Capone, Nos. 22852, 23232 (N.D. Ill. 24 October 1931), https://catalog.archives.gov/id/55311738 (accessed 21 October 2023); aff’d, 56 F.2d 927 (7th Cir. 1932); appeal dismissed, 93 F.2d 840 (7th Cir. 1937). While he had committed serious crimes, including murder, prosecutors chose to pursue charges that could be proven. The result was that Al Capone was imprisoned, sending the message that criminals cannot escape. By analogy, money laundering is a more serious crime than making a false statement regarding beneficial ownership. However, it may be easier to prove that a criminal has made a false statement. If the result is that the criminal is convicted and imprisoned, the deterrent effect is the same. It sends the message that criminals cannot escape. |
6 | Hawala is a popular informal system that accomplishes long-distance transfer of money without the movement of physical currency or telegraph or computer network wire transfers between banks. Hawala relies instead on the performance and honor of an enormous worldwide network of money brokers known as hawaladars. Most hawaladars are small businessmen who provide hawala services as a sideline operation. |
7 | United States v. Pisciotti, SD Fla. (24 April 2014). |
8 | Sherman Act (1890), 26 Stat. 209, 15 USC §§ 1–7; 18 USC § 1956. |
9 | United Nations Convention Against Transnational Organized Crime, opened for signature 12 December 2000, 2225 UNTS 277 [hereinafter UNTOC]. |
10 | APUNCAC, available at https://tinyurl.com/y6bkpott, accessed on 22 September 2023. |
11 | APUNCAC art. 74. |
12 | To the extent that ATM daily cash withdrawal limits typically fall below the USD 3000 APUNCAC Rule threshold, the exemption for ATM withdrawals would not have a material effect. |
13 | APUNCAC art. 21(2)(a)(H). |
14 | Id. art. 22(1)(a)(G). |
15 | Id. art. 30. |
16 | Id. arts. 70(1)(kkk), 70(1)(iiii), 70(1)(qq). |
17 | Id. arts. 70(1)(iiii), 70(1)(llll), 70(1)(kkkk). |
18 | Id. art. 70(1)(pp). |
19 | Id. art. 70(1)(kkkkkkk). |
20 | Id. art. 70(1)(ll). |
21 | Id. art. 70(1)(dddd). |
22 | Id. art. 70(1)(jjjjjjj). |
23 | Id. art. 70(1)(ffff). |
24 | Id. art. 21(2). |
25 | Id. art. 22(1). |
26 | Id. art. 70(1)(hhhh). |
27 | Id. arts. 70(1)(qqq), 70(1)(xxxxxx). |
28 | A jurisdiction may, as needed, remedy gaps in domestic law and regulation. |
29 | Id. art. 70(1)(p). |
30 | Scenario posed by Louis de Koker (personal communication, 15 September 2022). |
31 | APUNCAC arts. 21(2)(a)(H)(2), 21(3)(a)(viii)(B), 21(3)(b)(viii)(B), 22(1)(a)(G)(2), 30(b)(2). |
32 | Smurfing involves structuring the funds into amounts below standard reporting thresholds. |
33 | Id. art. 19(6). |
34 | Id. arts. 40(2), 40(3). |
35 | Unidad de Investigaciones Financieras (UIF) is Bolivia’s financial intelligence unit, responsible for investigations of money laundering and financial crime. |
36 | Bolivia is a member of the Financial Action Task Force on Money Laundering in South America [Grupo de Acción Financiera de Sudamérica (GAFISUD)], the South American FATF-style regional body. If the Financial Action Task Force (FATF) were to adopt the APUNCAC Rule, it is not unlikely that GAFISUD member states, including Bolivia, would also adopt the Rule. GAFISUD is modeled on FATF and has adopted the Forty Recommendations and the Special Recommendations against terrorism financing issued by FATF, the most widely recognized international standard for countering money laundering. |
37 | A thumb-sized device that is used to generate unique single-use passcodes for identity verification could be omitted with the adoption of biometric verification. |
38 | The Federal Security Service of the Russian Federation (FSB) is the principal security agency of Russia. |
39 | Issuance of digital IDs since 2009 exceeds the current population of 46.4 million because the latter figure does not include individuals who received digital IDs but are now deceased or have emigrated and are no longer nationals of Argentina. |
40 | Commission Proposal for a Council Regulation Amending Regulation 910/2014 as regards Establishing a Framework For a European Digital Identity, art. 1(7)(1), 2021/0136 (COD) [hereinafter eIDAS 2]. |
41 | eIDAS 2, art. 1(7)(3). |
42 | Id. art. 1(7)(4)(e). |
43 | Id. art. 1(12)(2). |
44 | The income and asset threshold would be tailored by each nation; high-income countries would set higher thresholds than low-income countries. Note that each State Party to APUNCAC may tailor the identity-proofing process to align with existing national identity systems. However, best practice would involve biometric identity proofing and ePassports. The inconvenience of obtaining an ePassport would be no different than the inconvenience of obtaining a European Digital Identity or an African digital ID. The requirement would mainly apply to individuals who have the wealth and propensity to travel abroad and, therefore, are likely to apply for an ePassport regardless of the Rule. An alternative procedure to obtain a digital ID, using biometric information, may be implemented for individuals who are unable to obtain an ePassport. In addition, an exception to the ePassport requirement could be granted for persons who certify that they will not engage in covered transactions. This certification would be entered into the FINCEN database and would flag any covered transaction involving the named person. If that person’s identity was stolen by a criminal for the purpose of conducting illicit transactions, the flag would halt the transaction and trigger an investigation. |
45 | A Qualified Trust Service Provider (QTSP) must comply with strict requirements under the EU’s eIDAS regulation that ensure the validity and security of the certificates, keys and signatures that are the foundation of identity proofing and the creation of digital identity certificates bound to applicant identities. QTSPs undergo an independent assessment and regular audits to ensure that they continue to adhere to the QTSP requirements as defined by eIDAS. |
46 | Council Regulation 910/2014 on Electronic Identification, 2014 O. J. L 257/73. |
47 | Id. art. 24(1)(d). The National Institute of Standards and Technology (NIST) standard SP 800-63A § 5.3.3.2 provides for supervised remote identity proofing. The standard seeks to promote, for identity-proofing processes that are performed remotely, a level of confidence and security comparable to the level for in-person identity-proofing processes. SP 800-63A is treated as an international standard. |
48 | Council Directive 2018/843 of the European Parliament and of the Council of 30 May 2018 Amending Directive 2015/849 on the Prevention of the Use of the Financial System for the Purposes of Money Laundering or Terrorist Financing, and Amending Directives 2009/138/EC and 2013/36/EU, art. 1(8)(a) [amending art. 13(1)(a)], 2018 O. J. L 156/43 [hereinafter 5AMLD]. |
49 | Council Regulation 2016/679 of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), arts. 6(1)(c) and 6(1)(e), 2016 O. J. L 119/1 [hereinafter GDPR]. |
50 | APUNCAC arts. 21(2)(a)(H), 21(3)(a)(viii), 21(3)(b)(viii), 22(1)(a)(G), 30(b). |
51 | Assuming that the beneficial owner was a national of a State Party to APUNCAC and assuming a transaction in currency or involving a bank draft or bearer instrument. APUNCAC, art. 30(i). Alternatively, assuming that a hawaladar is within the jurisdiction of a State Party and assuming a transaction in currency or involving a bank draft, bearer instrument, negotiable instrument, wire transfer or money order. Id. art. 30(iii). |
52 | Id. art. 30(i). |
53 | By 2022, 3G mobile broadband network coverage reached 95 percent of the world’s population (ITU 2022, p. 19). ITU, 2022, Measuring Digital Development: Facts and Figures 2022, Geneva: ITU. By 2021, 3G network coverage exceeded 80% of the sub-Saharan African population (GSMA 2022, Figure 14). GSMA, 2022, The State of Mobile Internet Connectivity 2022, London: GSMA. In 2016, more than 80% of citizens in Kenya and Nigeria had a mobile phone subscription (Hasbi 2020, p. 3). Hasbi, Maude, and Antoine Dubus, 2020, “Determinants of Mobile Broadband Use in Developing Economies: Evidence from Sub-Saharan Africa”, Telecommunications Policy 44: 1–28, https://doi.org/10.1016/j.telpol.2020.101944. In Tanzania, 77% of citizens below the poverty level owned a mobile phone (Hasbi 2020, Table 2). In Nigeria, the comparable figure was 73% (Hasbi 2020, Table 2). The figures underestimate mobile phone use because it is not unusual for multiple individuals to own SIM cards but share a single phone (Hasbi 2020, p. 3). The rapid adoption of mobile phone technology is driven by the adoption of mobile payments. The adoption of this technology is rapidly transforming the hawala and money services industry. In Somalia, for example, mobile money is the primary access point to financial services (Elmi and Ngwenyama 2019, p. 119). Elmi, Mohamed and Ojelanki Ngwenyama, 2019, “The Role of Mobile Money in Somalia’s Remittance System”, in HCI in Business, Government and Organizations, edited by F.H. Nah and K. Siau, Basel: Springer Nature, pp. 119–36. In 2017, the World Bank estimated that 73% of the Somali population over the age of 16 used mobile money services (Elmi and Ngwenyama 2019, p. 119). |
54 | APUNCAC arts. 30(iii), 70. |
55 | United Nations Convention against Corruption, opened for signature 31 October 2003 2349 UNTS 41 (entered into force December 14, 2005) [hereinafter UNCAC]. Of 196 nations, 189 are States Parties to UNCAC. |
56 | Id. arts. 37(2)–(3). |
57 | United States v. Palumbo, 897 F.2d 245, 246 (7th Cir. 1990). |
58 | Serious Organised Crime and Police Act 2005 §§ 71–73. These sections do not apply to Scotland. See Serious Organised Crime and Police Act 2005, https://www.legislation.gov.uk/ukpga/2005/15/section/179, accessed 22 September 2023. |
59 | Sentencing Act 2020 § 74(1)(c). |
60 | Malt. Crim. Code art. 453A(1). |
61 | Id. art. 453A(2). |
62 | Id. art. 453A(3). |
63 | Code Crim. Proc. §§ 265A–265H. |
64 | Id. § 265A. |
65 | Id. § 265C(a). |
66 | Id. § 265E. |
67 | Council Framework Decision No. 2008/841/JHA art. 4, 2008 O.J. L 300/42. |
68 | C. PR. PÉN. §§ 495-7, 495-8. |
69 | The CRPC procedure may be applied to economic crimes punishable by imprisonment of up to ten years. For this type of serious crime, a trial judge may be reluctant to accept a sentence recommendation of one year imprisonment but may be amenable to a sentence recommendation of three years imprisonment. The change in law effectively extends the applicability of the CRPC procedure to a greater range of crimes. |
70 | C. PÉN. arts. 450-1, 450-2 (trans. J. R. Spencer) (“Any person who has participated in the group or the conspiracy defined by article 450-1 is exempted from punishment if, before any prosecution is instituted, he discloses the existence of the group or conspiracy to the competent authorities and enables the other participants to be identified”). |
71 | Law 12,850/2013 art. 4 (Brazil, trans. Court of Justice of the Federal District and Territories—TJDFT). |
72 | Keiji Soshoho (Code of Criminal Procedure), Law No. 131 of 1948 art. 350-2 (Japan, trans. Ministry of Justice) [hereinafter KEISOHŌ]. |
73 | Id. art. 350-2. |
74 | Criminal Procedure Act 1977 § 105A (South Africa). |
75 | Pak. Const. art. 31(1). |
76 | National Accountability Bureau Ordinance 1999 § 25. |
77 | Pak. Code Crim. Proc. ch. XXIIB (Proposed Official Draft 2021). |
78 | Indon. Code Crim. Proc. (draft) [hereinafter RKUHAP]. |
79 | Id. art. 199. |
80 | Id. art. 200(1). |
81 | Id. art. 200(3). |
82 | Criminal Procedure Code (Amendment) Act 2012 of Malaysia (codified at Malay. Crim. Proc. Code § 172C). |
83 | Malay. Code Crim. Proc. § 172(D)(1)(c)(ii). |
84 | Administration of Criminal Justice Act 2015 (Nigeria) § 494. |
85 | Administration of Criminal Justice Law of Lagos State 2007 § 75. |
86 | Eth. Code Crim. Proc. (draft) arts. 219, 221, 230 [hereinafter FDRE Draft Code]. |
87 | The Federal Anti-Corruption Special Procedure and Rules of Evidence (Amendment) Proclamation, Proclamation No. 239/2001 art. 43(1). |
88 | The Anti-Terrorism Proclamation No. 652/2009 art. 33. |
89 | Protection of Witnesses and Whistle-blowers of Criminal Offences Proclamation No. 699/2010 art. 3. |
90 | Iran Const. art. 1, preamble. |
91 | Id. art. 4. |
92 | Turk. Crim. Code art. 221 [hereinafter TCK]. |
93 | APUNCAC arts. 21(2)(a)(H)(7), 21(3)(a)(viii)(G), 21(3)(b)(viii)(G), 22(1)(a)(G)(7), 30(b)(7). |
94 | Id. |
95 | Id.e |
96 | Id. arts. 21(2)(a)(H)(3), 21(2)(a)(H)(4), 21(3)(a)(viii)(C), 21(3)(a)(viii)(D), 21(3)(b)(viii)(C), 21(3)(b)(viii)(D), 22(1)(a)(G)(3), 22(1)(a)(G)(4), 30(b)(3), 30(b)(4). |
97 | Id. art. 31. |
98 | Id. art. 19(6). |
99 | Id. art. 32. |
100 | Id. arts. 21(2)(a)(H)(2), 21(3)(a)(viii)(B), 21(3)(b)(viii)(B), 22(1)(a)(G)(2), 30(b)(2). |
101 | Id. art. 19(6). |
102 | Id. arts. 39, 40. |
103 | Id. art. 6(1). |
104 | Id. art. 16(3). Significantly, 190 nations are parties to UNTOC. The only United Nations Member States that are not parties are Bhutan, Papua New Guinea, the Solomon Islands, Somalia, South Sudan, and Tuvalu. This implies that extradition for offenses covered by UNTOC is available to all nations except these six states. |
105 | Id. art. 16(3). |
106 | Id. art. 7(1). |
107 | Id. art. 7(1). |
108 | APUNCAC arts. 21(2), 22(1), 30. |
109 | UNTOC art. 6(1). |
110 | APUNCAC arts. 21(2), 22(1), 30. |
111 | Conference of the Parties to the UNTOC, “The Notion of Serious Crime in the United Nations Convention against Transnational Organized Crime”, CTOC/COP/2012/CRP.4 (20 September 2012), para. 30. |
112 | Id. |
113 | Conference of the Parties to the UNTOC, “Catalogue of Cases Involving Extradition, Mutual Legal Assistance and Other Forms of International Legal Cooperation Requested on the Basis of the United Nations Convention against Transnational Organized Crime”, para. 73, CTOC/COP/2010/CRP.5 (22 September 2010). |
114 | Id. para. 50. |
115 | UNTOC art. 2(b). |
116 | Id. art. 3(1)(b) (“This Convention shall apply, except as otherwise stated herein, to the prevention, investigation and prosecution of serious crime as defined in article 2 of this Convention; where the offence is transnational in nature and involves an organized criminal group”.). |
117 | Id. art. 15(2)(c)(i). |
118 | CARICOM Arrest Warrant Treaty, opened for signature 5 July 2017 (entered into force 20 July 2018) [hereinafter CARICOM AWT]. Parties include the Bahamas, Barbados, Dominica, Grenada, Guyana, Jamaica, St. Kitts and Nevis, Saint Lucia, and Trinidad and Tobago. |
119 | Id. art. 3(3), Annex II, A(11), A(22), A(24), B. |
120 | Id. art. 4(a). |
121 | Id. art. 10(1). |
122 | The Extradition Act 2003 (Overseas Territories) Order 2016, scheds. 1–2, S.I. 2016, No. 990 [hereinafter Extradition (Overseas Territories) Order 2016]. |
123 | Id. § 70(4)(b). |
124 | Id. § 83C(3) [“the responsible prosecutor has decided that there are one or more such offences that correspond to the extradition offence (the ‘corresponding offences’)”]. |
125 | Id. § 78(4), as modified at 75 (“The judge must decide whether the offense specified in the request is an extradition offense”). |
126 | Id. § 83A(1). |
127 | Id. § 83A(3). |
128 | The London Scheme for Extradition within the Commonwealth (amended) [hereinafter London Scheme]. |
129 | Bowman v. Stafford, No. 20-cv-2250-GPC-MSB, 2022 WL 118227, at *1 (SD Cal. 12 January 2022). |
130 | 18 USC § 3184. |
131 | Sandhu v. Bransom, 932 F. Supp. 822, 827 (ND Tex. 1996). See generally Roberto Iraola, “Contradictions, Explanations, and the Probable Cause Determination at a Foreign Extradition Hearing”, Syracuse Law Review 60: 95–124 (2009), p. 95 (discussing the “Rule of Non-Contradiction” which governs foreign extradition hearings). |
132 | See Collins v. Loisel, 259 US 309, 317 (1922) (“[U]nsworn statements of absent witnesses may be acted upon by the committing magistrate, although they could not have been received by him under the law of the State on a preliminary examination”.); Artukovic v. Rison, 784 F.2d 1354, 1356 (9th Cir. 1986) (“[U]nsworn hearsay statements contained in properly authenticated documents can constitute competent evidence to support a certificate of extradition”.). See also In re Extradition of Luna-Ruiz, No. CV 13-5059 VAP AJW, 2014 WL 1089134, at *4 (C.D. Cal. 19 March 2014) (collecting cases), aff’d sub nom. Luna-Ruiz v. Barr, 753 F. App’x 472 (9th Cir. 2019). |
133 | See, e.g., Mironescu v. Costner, 480 F.3d 664, 665 (4th Cir. 2007) (identifying factors). |
134 | See 18 USC § 3184 (Judicial officer “shall certify the same … to the Secretary of State, that a warrant may issue… for the surrender of such person”.); § 3186 (“The Secretary of State may order the person committed under section 3184… to be delivered to any authorized agent of such foreign government”.). |
135 | Mironescu, 480 F.3d at 666; see also Lo Duca v. United States, 93 F.3d 1100, 1103–4 (2d Cir. 1996) (“[T]he Secretary of State has final authority to extradite the fugitive, but is not required to do so. Pursuant to its authority to conduct foreign affairs, the Executive Branch retains plenary discretion to refuse extradition”.). |
136 | UNTOC art. 3(2)(d). |
137 | The Notion of Serious Crime at 4. |
138 | Id. para. 12. |
139 | Id. |
140 | Id. para. 14. |
141 | UNTOC art. 2(a). |
142 | Id. art. 2(c). |
143 | Id. art. 16(1) (“This article [regarding extradition] shall apply to the offences covered by this Convention… provided that the offence for which extradition is sought is punishable under the domestic law of both the requesting State Party and the requested State Party”). |
144 | For an international comparative analysis of dual criminality in international extradition law, see Blaas, Fey-Constanze, 2003, Double Criminality in International Extradition Law, LLM thesis, Stellenbosch, South Africa: University of Stellenbosch. |
145 | In re Nielsen [1984] 2 WLR 737, 748–749. |
146 | In the absence of an agreement, e.g., a status of forces agreement (SOFA). |
147 | Id. art. 5(1)(b) (“Each State Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences, when committed intentionally: Organizing, directing, aiding, abetting, facilitating or counselling the commission of serious crime involving an organized criminal group”.) |
148 | Note that the text of Article 3(1)(b) focuses attention on serious crime where the offense is transnational in nature but includes a clause such that aiding and abetting is covered regardless of whether it meets the definition of a serious crime or a transnational crime (“This Convention shall apply, except as otherwise stated herein, to the prevention, investigation and prosecution of serious crime as defined in article 2 of this Convention; where the offence is transnational in nature and involves an organized criminal group”) (emphasis added). Article 5(1)(b) indicates that UNTOC applies to the offense of aiding and abetting serious crime regardless of whether aiding and abetting is classified as a serious crime or a transnational crime. Article 16(1) states that UNTOC’s extradition provisions apply to any offence covered by UNTOC (“This article [regarding extradition] shall apply to the offences covered by this Convention…“). Together, these provisions imply that UNTOC’s extradition provisions apply to the offense of aiding and abetting serious crime regardless of whether it meets the definition of a serious crime or a transnational crime. In principle, UNTOC may be used, together with existing extradition treaties, to extradite an accused person who is charged with the offense of aiding and abetting a serious crime. |
149 | Id. art. 2. |
150 | Id. art. 16(3). |
151 | Id. art. 16(6). |
152 | UNTOC art. 7(1)(a). |
153 | Id. art. 11(1). |
154 | Id. art. 11(2). |
155 | “Aiding and abetting” would satisfy UNTOC’s extradition provisions regardless of how is treated in domestic law. |
156 | 18 USC § 371. |
157 | See United States v. Puerto, 730 F.2d 627 (11th Cir.), cert. denied, 469 U.S. 847 (1984); United States v. Tuohey, 867 F.2d 534 (9th Cir. 1989); United States v. Sprecher, 783 F. Supp. 133, 156 (S.D.N.Y. 1992) (“[I]t is sufficient that the defendant engaged in acts that interfered with or obstructed a lawful governmental function by deceit, craft, trickery or by means that were dishonest”), modified on other grounds, 988 F.2d 318 (2d Cir. 1993). |
158 | Convention for the Suppression of Unlawful Seizure of Aircraft art. 7, December 16, 1970, 860 UNTS 105. |
159 | Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation, 1971, 974 UNTS 177 (the Montreal Convention); Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, 1973, 1035 UNTS 167 (the New York Convention); International Convention Against the Taking of Hostages, 1979, 18 ILM 1456 (1979). |
160 | Report of the International Law Commission on the work of its 48th session, UNGA Official Records, 51st session (A/51/10), 14. See also Timothy L. H. McCormack and Gerry J. Simpson, “The International Law Commission’s Draft Code of Crimes against the Peace and Security of Mankind: An Appraisal of the Substantive Provisions”, Criminal Law Forum 5: 1–55, (1994), p. 1. |
161 | European Convention on Extradition art. 6(2), opened for signature December 13, 1957, ETS No. 24. See also Explanatory Report on the European Convention on Extradition, Council of Europe 1969 at 17. |
162 | United Nations Model Treaty on Extradition, GA Res. 45/116, UN Doc. A/Res/45/116 (1991). |
163 | Inter-American Convention on Extradition art. 2, opened for signature 25 February 1981 OAS Treaty Series No. 60 (entered into force 28 March 1992). Signatories are: Antigua and Barbuda, Argentina, Bolivia, Chile, Costa Rica, Dominican Republic, Ecuador, El Salvador, Guatemala, Haiti, Nicaragua, Panama, Paraguay, St. Lucia, Uruguay, and Venezuela. |
164 | UNTOC art. 16(10). |
165 | Vienna Convention on the Law of Treaties, opened for signature 23 May 1969, 1155 UNTS 331. |
166 | In Bozano v. France [1986] 9 EHRR 297, the applicant was convicted in absentia in Italy of serious crimes. Following his arrest in France, the Italian authorities sought his extradition. The French court refused to extradite him on the basis that French law did not allow extradition following a conviction in absentia. However, the French authorities deported him to Switzerland, and the Swiss extradited him to Italy. There was no apparent irregularity in the extradition process between Switzerland and Italy. Provided there has been no collusion between the trial State and the State of refuge, this method of returning a fugitive offender does not offend provisions under the 1957 European Convention on Extradition. |
167 | Adoption of an EU regulation is equivalent to each EU member state adopting the regulation individually. It is analogous to adoption of the APUNCAC Rule by a set of individual States Parties. Enforcement necessarily involves a prosecutor from one State Party pursuing prosecution of the accused. In either case, it involves cooperation and mutual legal assistance among the applicable police and criminal justice systems. In the EU, authorities may utilize the European Arrest Warrant Treaty to obtain custody of the accused. An APUNCAC State Party prosecutor would utilize UNTOC extradition provisions and existing extradition treaties to obtain custody of the accused. |
168 | In theory, an accused person might be pursued by multiple states, creating conflicts. Currently, however, there is a dearth of prosecution. Regardless, states may resolve jurisdictional conflicts via deference to the state with the greatest interest in exercising jurisdiction, according to the principle of comity. |
169 | CARICOM AWT art. 11 “Rule of Specialty” [“A requested person who has been surrendered pursuant to Article X shall not be prosecuted or sentenced for an offence committed prior to his surrender other than that for which he was surrendered unless: (a) he consents to such prosecution or sentence; (b) he is being prosecuted or sentenced for a lesser offence disclosed by the facts upon which the request for surrender had been made; ( c) the executing judicial authority consents to his being so dealt with for another applicable offence; or ( d) the requested person having had an opportunity to leave the territory of the Participating Member to which he has been surrendered has not done so within forty-five (45) days of his final discharge, or has returned to that territory after leaving it”.] |
170 | Id. art. 11; Council Framework Decision 2002/584/JHA on the European arrest warrant, art. 27(1), O.J. L 190 [hereinafter EAW FD]. |
171 | The French Court of Cassation has interpreted an ‘offence… other than that for which he was extradited’ as prohibiting prosecution for new (alleged) facts distinct from those in respect of which extradition was sought (Tinsley 2021, p. 28). Tinsley, Alex, 2021, “Specialty: Arresting an Elusive ‘Right’ in European Extradition Law”, New Journal of European Criminal Law 12: 23–35. The Court of Justice of the European Union (CJEU) adopted a nearly identical position, focusing on the degree of correspondence of the ‘constituent elements’ for which a person was surrendered (Tinsley 2021, p. 29). The U.S. Ninth Circuit Court adopted the same position, focusing on whether “the essential character of the acts criminalized is the same”, not whether the elements of the offense are identical or whether the scope of the liability is coextensive/same. United States v. Knotek, 925 F.3d 1118, 1131–32 (9th Cir. 2019). |
172 | UNTOC art. 6(1)(b)(ii). |
173 | Section 3.25.10 illustrates one of several paths a prosecutor might pursue to obtain extradition and prosecution. Discussion of variation in the treatment of conspiracy across international jurisdictions is beyond the scope of the present article. |
174 | Whitfield v. United States, 543 US 209 (2005). |
175 | See States v. Lopez-Medina, 461 F.3d 724, 750 (6th Cir. 2006) (stating that a plan may be inferred from defendant’s conduct); United States v. Weidner, 437 F.3d 1023, 1033 (10th Cir. 2006) (holding a conspiracy can be inferred from defendants’ conduct); United States v. Nelson, 383 F.3d 1227, 1229 (10th Cir. 2004) (finding that an agreement constituting a conspiracy may be inferred from the acts of the parties and any other circumstantial evidence indicating concert of action for the accomplishment of a common purpose). |
176 | See, e.g., United States v. Rogers, 788 F.2d 1472, 1476 (11th Cir. 1986); United States v. Jenkins, 943 F.2d 167, (2d Cir. 1991). |
177 | United States v. Corona, 885 F.2d 766, 773 (11th Cir. 1989) (the defendant himself does not have to be involved in the offense being facilitated). |
178 | United States v. Jackson, 935 F.2d 832 (7th Cir. 1991). |
179 | In customary international law, opinio juris is the second element necessary to establish a legally binding custom. Opinio juris denotes a subjective obligation, a sense on behalf of a state that it is bound to the law in question. The International Court of Justice reflects this standard in ICJ Statute, Article 38(1)(b) by reflecting that the custom to be applied must be “accepted as law”. |
180 | Cartels involve domestic effects of conduct that may take place wholly or in part outside the regulating territory; this activity has the ‘object or effect’ of restricting competition and would be difficult to prosecute without application of the effects principle. Application of the effects principle to extraterritorial conduct is documented in Section 3.30 regarding Japan, South Korea, China, Vietnam, Taiwan, Australia, Russia, Brazil, Argentina, Kenya, Nigeria, South Africa, the U.S., and EU. These jurisdictions apply their domestic laws in ways that capture extraterritorial conduct by foreign nationals outside the regulating territory if that conduct has the object or effect of restricting competition within the territory of the regulating state. The ‘object or effect’ language is codified, for example, in Article 101(1) of the Treaty on the Functioning of the European Union (TFEU). Nishioka (2020, p. 599) (“In the EU, Article 101(1) of the TFEU prohibits concerted practices or agreements that have the ‘object or effect’ of restricting competition”). Article 2(2) of the Swiss Cartel Act (SCA) explicitly provides that “[t]his Act applies to practices that have an effect in Switzerland, even if they originate in another country”. An English translation provided by the federal council is available at https://www.admin.ch/opc/en/classified-compilation/19950278/index.html accessed 22 September 2023. In law and practice, criminalization of cartel-related offenses involves application of the effects principle. “The SCA explicitly adopts the effects doctrine” (Nishioka 2020, p. 600). The Swiss Federal Administrative Court ruled that “the effects principle is intended to be leveraged to apply the cartel law even in cases in which the infringement of competition law was committed abroad”. BVGer, 19 December 2013—Gaba, 2013/4 RPW 760, s 3.3.14.1. The Swiss Federal Supreme Court “concluded that its approach based on an effects test was not contrary to the limitation of public international law” (Nishioka 2020, p. 601). While regulatory frameworks differ across countries, what “the countries all have in common” “when they define the international or geographical scope of their competition law” is a focus on “whether conduct violates relevant legal provisions”—i.e., whether the conduct in question has a domestic anticompetitive effect. See Nishioka (2020, p. 602). If there is a domestic effect, anticompetitive conduct is illegal, regardless of the geographical location of the actors. Criminalization of cartel-related offenses implies endorsement, acceptance, and application of the effects principle. |
181 | United States v. Aluminum Co. of America, 148 F.2d 416, 442–48 (2d Cir. 1945). |
182 | Id. |
183 | Id. at 443. |
184 | American Law Institute, Restatement (Second) of the Foreign Relations Law of the United States §17 (1965). |
185 | American Law Institute, Restatement (Third) of the Foreign Relations Law of the United States §402(1)(c) (1987). |
186 | Hartford Fire Insurance Co v. California, 509 US 764 (1993). In 2010, the U.S. Supreme Court, in Morrison v. National Australia Bank, applied a strict presumption against extraterritoriality when the ‘focus’ of the relevant statute occurred outside the territory of the United States (Rotman 2021, p. 49). Rotman, Edgardo, 2021, “Extraterritorial Application of United States Law”, in Regulating Fraud across Borders: Internationalised Criminal Law Protection of Capital Markets, edited by Edgardo Rotman, Oxford, UK: Hart, pp. 41–72. This reversed 40 years of federal court decisions and threatened to upend Hartford. However, the U.S. Congress quickly passed legislation clarifying its intent, reversing Morrison, and restoring the ‘conduct’ and ‘effects’ tests that existed prior to Morrison (Rotman 2021, p. 51). Congress intended to sanction willful conduct that poses a social threat to the vital values and interests of the American people, including conduct that occurs extraterritorially outside U.S. borders (Rotman 2021, pp. 66–67). |
187 | Hartford Fire Insurance Co. v. California at 796. |
188 | Id. at 799. |
189 | RJR Nabisco, Inc. v. European Cmty, 136 S. Ct. 2090, 2102, 2104, 2105 (2016). |
190 | Id. |
191 | ECJ, Joined Cases 89, 104, 114, 116, 117 and 125 to 129/85, A. Ahlström Osakeytiö and others v. Commission, ECR 1988, at 5193. |
192 | ECJ, ECR 1988, at 5244. |
193 | Id. |
194 | Case C-413/14 P, Intel v Commission, EU:C:2017:632. |
195 | Id., paras. 40–47. |
196 | SS Lotus (France v Turkey), PCIJ, Ser A, No 10 (1927) 23. |
197 | Id. at 16–32. |
198 | See, e.g., Convention on Combating the Bribery of Foreign Public Officials in International Business Transactions, opened for signature 17 December 1997, [1999] ATS 21 (entered into force 15 February 1999); United Nations Convention against Corruption, opened for signature 31 October 2003, 2349 UNTS 41 (entered into force 14 December 2005); Inter-American Convention against Corruption, Organization of American States, opened for signature 29 March 1996, [2000] CTS 21 (entered into force 6 March 1997); Criminal Law Convention on Corruption, opened for signature 27 January 1999, ETS No 173 (entered into force 1 July 2002); Additional Protocol to the Criminal Law Convention on Corruption, opened for signature 15 May 2003, ETS No 191 (entered into force 1 February 2005). |
199 | UNTOC art. 15(2)(c)(i). |
200 | In the EU, where data protection concerns predominate, reporting of beneficial owner information is lawful where there is a legal obligation. See Council Regulation 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), art. 6(1)(c), 2016 O. J. L 119/1 [hereinafter GDPR] (“Processing shall be lawful [if] processing is necessary for compliance with a legal obligation to which the controller is subject”.). |
201 | 74 Fed. Reg. 57593, 57594 (2009). |
202 | APUNCAC arts. 19(10–11), 39(1), 40(1). |
203 | Id. art. 40(7). |
204 | Id. arts. 30, 40 (3, 7). |
205 | 31 CFR §§ 595.204, 595.701(a)(2). |
206 | Santos v. Thomas, 830 F.3d 987, 1001 (2016) (citing Vo v. Benov, 447 F.3d 1235, 1240 (9th Cir. 2006)); Fernandez v. Phillips, 268 U.S. 311, 312 (1925)); see also United States v. Knotek, 925 F.3d 1118, 1124 (9th Cir. 2019). |
207 | See Jhirad v. Ferrandina, 536 F.2d 478, 482 (2d Cir. 1976); accord Valencia v. Limbs, 655 F.2d 195, 198 (9th Cir. 1981). |
208 | Santos, (quoting Quinn v. Robinson, 783 F.2d 776, 791 (9th Cir. 1986)). |
209 | Id. (quoting Quinn, 783 F.2d, at 791). |
210 | Artukovic v. Rison, 784 F.2d 1354, 1356 (9th Cir. 1986). |
211 | Pierce v. Creecy, 210 US 387. |
212 | Strassheim v. Daily, 221 US 280, 285 (1911). |
213 | Id. at 280. |
214 | It does not matter because there is not a conflict of laws. No law prohibits a beneficial owner from certifying beneficial ownership. No law prohibits a bank clerk from submitting a certification required by law. |
215 | Criminalization may be inferred in countries where penalties include imprisonment. |
216 | If, for example, a bank clerk stated that he was directed by a bank manager ‘not to worry’ about compliance with the APUNCAC Rule, the bank manager would be implicated in a conspiracy to violate the Rule. The criminal penalties attached to violations of the Rule would create strong incentives for bank managers to enforce adherence to the Rule. |
217 | MRFTA art. 3. |
218 | Anti-Monopoly Law of China (AML-China), art. 2. |
219 | Vladislav Zabrodin and Irina Akimova, 2013. Russia. In Cartel Regulation in 46 Jurisdictions Worldwide 2014. Edited by A. Neil Campbell. London: Law Business Research, pp. 245–50. |
220 | The Administrative Council for Economic Defence (CADE) is the Brazilian antitrust agency responsible for prosecuting and adjudicating cartel cases in the administrative sphere. de Arruda Sampaio and de Arruda Sampaio (2019, p. 39). |
221 | The Common Market for Eastern and Southern Africa (COMESA) Competition Commission Regulations, the Competition Act 2010, and the East African Community Competition Act 2006 govern economic conduct that has an effect in Kenya. Kiunuhe and Wagacha (2019, p. 152). |
222 | The Southern African Customs Union (SACU) comprises five Member States: Botswana, Lesotho, Namibia, South Africa and Swaziland. The Southern African Development Community (SADC) comprises 16 Member States: Angola, Botswana, Comoros, Democratic Republic of Congo, Eswatini, Lesotho, Madagascar, Malawi, Mauritius, Mozambique, Namibia, Seychelles, South Africa, United Republic of Tanzania, Zambia and Zimbabwe. |
223 | Competition Act No. 89 of 1998 (South Africa), as amended, §74(a). |
224 | United States v. Pisciotti, SD Fla. (April 24, 2014). |
225 | 15 USC §§ 1–3 (2022). |
226 | An overview of all states with a cartel criminal offense and brief explanations can be found in Shaffer, Gregory C., Nathaniel H. Nesbitt, and Spencer W. Waller, 2015, “Criminalizing Cartels: A Global Trend?”, in Comparative Competition Law, edited by John Duns, Arlen Duke, and Brendan Sweeney, pp. 301–44. |
227 | Id. |
228 | The Japan Fair Trade Commission (JFTC) is the investigator and prosecutor regarding offenses established by the Antimonopoly Law. Watanabe and Yanagisawa (2019, p. 143). |
229 | The Korea Fair Trade Commission (KFTC) investigates, prosecutes, and adjudicates MRFTA offenses. Yoon et al. (2019, p. 162). |
230 | The State Administration for Market Regulation (SAMR) and the market regulatory departments of people’s governments of all provinces, autonomous regions and municipalities directly under the Central Government Provincial Market Regulatory Department (PMRD) investigate cartel matters. Liang (2019, p. 59). Under the AML-China, SAMR renders decisions independently without relying on the court. Id. |
231 | The National Competition Commission (NCC) investigates and adjudicates administrative competition violations. |
232 | The Australian Competition and Consumer Commission (ACCC) is the nation’s independent government agency tasked with enforcement of the CCA. |
233 | The Administrative Council for Economic Defence (CADE) is responsible for prosecuting and adjudicating cartel cases in the administrative sphere. de Arruda Sampaio and de Arruda Sampaio (2019, p. 39). |
234 | The Competition Authority of Kenya (CAK) investigates and prosecutes cartel offenses and imposes pecuniary penalties. Kiunuhe and Wagacha (2019, p. 152). |
235 | The Federal Competition and Consumer Protection Commission (FCCPC) is Nigeria’s regulatory and enforcement authority regarding all anti-competitive and consumer protection matters. Corvalan and Plaza (2022, p. 97). |
236 | United States v. Prevezon Holdings Ltd., 251 F. Supp. 3d 684, 692 (SDNY 2017); Decision & Order Denying Motions to Dismiss at 14, United States v. Boustani, No. 1:18-cr-00681 (EDNY October 3, 2019), ECF No. 231. |
237 | A bank clerk who willfully violated the APUNCAC Rule would necessarily intend to promote a violation of a legal requirement. |
238 | Prevezon, 251 F. Supp. 3rd, at 693. The sender and recipient of the funds involved in the transactions were foreign parties whose activities were conducted outside U.S. territory and had no connection to the U.S. except that the funds were channeled through correspondent banks located in the United States. See also Decision & Order Denying Motions to Dismiss at 14, United States v. Boustani. The court held that correspondent banking transactions occurring in the United States are sufficient to satisfy the jurisdictional requirements of 18 USC § 1956(f). |
239 | Foreign Account Tax Compliance Act, Pub. L. No. 111–147, 124 Stat. 71, 97–117 (2010) (codified at 26 USC §§ 1471–1474, § 6038D (2016)). |
240 | Council Regulation 648/2012 (European Market Infrastructure Regulation), 2012 O. J. L 201/1 [hereinafter EMIR]. |
241 | Id. arts. 2(1), 2(8). |
242 | Id. art. 9(1). |
243 | Id. art. 26(8). |
244 | Id. art. 29(3). |
245 | Id. arts. 11(2), 11(3), 11(4). |
246 | Id. art. 4(1)(a)(v). |
247 | Id. art. 12(1). |
248 | Id. art. 12(1). |
249 | Council Regulation 600/2014 (Markets in Financial Instruments Regulation), 2014 O. J. L 173/84 [hereinafter MiFIR]. |
250 | Id. art. 28(2). |
251 | Council Regulation 236/2012 (Short Selling Regulation), 2012 O. J. L 86/1. |
252 | Id. arts. 5, 6, 12. |
253 | Council Regulation 596/2014 (Market Abuse Regulation), 2014 O.J. L 173/1. |
254 | Id. art. 2(1)(a–c). |
255 | Id. art. 2(1)(d). |
256 | Id. art. 2(1)(c). |
257 | Multilateral Memorandum of Understanding Concerning Consultation and Cooperation and the Exchange of Information, opened for signature May, 2002 (revised May 2012) [hereinafter MMoU]. |
258 | A notable signatory is France’s Autorité des marchés financiers (AMF), indicating broad international acceptance even in jurisdictions with strong blocking statutes. |
259 | MMoU at 2. |
260 | Id. at 3. |
261 | Id. at 3. |
262 | Id. at 4. |
263 | Id. at 4. |
264 | Id. at 5. |
265 | Id. at 5. |
266 | UNTOC art. 7(1)(a). |
267 | In total, 165 jurisdictions have committed to EOIR; 121 jurisdictions have committed to AEOI. |
268 | The term “controlling person” has the same meaning as “beneficial owner” under the FATF Recommendations. Therefore, financial institutions are required to identify the controlling persons/beneficial owners of the account holder in accordance with the FATF Recommendations. |
269 | Commission Proposal for a Council Regulation on the Prevention of the Use of the Financial System for the Purposes of Money Laundering or Terrorist Financing, arts. 15(2), 16(1)(b), 16a(1), 17(1), 2021/0239 (COD) [hereinafter 6AMLD]. |
270 | Id. art. 18(4). |
271 | Council Regulation 2015/847 on Information Accompanying Transfers of Funds and Repealing Regulation 1781/2006, arts. 4(4), 4(5), 4(6), 2015 O.J. L 141/1. |
272 | Id. art. 2(1). |
273 | Id. art. 2(3). |
274 | Id. art. 2(3). |
275 | Id. art. 2(5). |
276 | Id. at 3. |
277 | Commission Proposal for a Council Regulation on Information Accompanying Transfers of Funds and Certain Crypto-Assets (Recast), 2021/0241 (COD) [hereinafter TFR]. |
278 | Id. arts. 4(4), 4(5), 4(6). Regarding the identity of the payer, art. 4(5a) cites 6AMLD art. 16, which requires obliged entities to “identify the beneficial owner”, and art. 18(3), which requires obliged entities to establish the identity of the beneficiary at the time of payout. |
279 | Reg. 2015/847 at 1. |
280 | Id. at 1–2. |
281 | Id. at 2. |
282 | APUNCAC art. 19(2). |
283 | For example, a competitor might utilize publicly available registry information to compile a list of ASML suppliers. From this list, a competitor might deduce a list of proprietary industrial ingredients and processes used by ASML in its lithography process, enabling the competitor to replicate the ASML process. |
284 | The U.S. Supreme Court has ruled that authorities must obtain, via a court order, a search warrant to access cell phone data and text messages. A court will not issue a search warrant in the absence of probable cause that a crime was committed. A court can issue a remote access search warrant if the location of the device or data is in an unknown location and its location has been concealed via technological means. In situations in which a device is known to be located extraterritorially, the territorial limits on the U.S. warrant authority continue to apply, and U.S. courts lack the authority to issue a warrant to search. Rather, law enforcement is, as a general matter, told to instead employ the mutual legal assistance process and seek the assistance of the government where the data or device is located, irrespective of the foreign government’s willingness to cooperate. In the absence of foreign government permission, a search cannot be performed on a device that is known to be outside U.S. territory. |
285 | While front men and money mules may be supplied with burner phones to foil authorities, this tactic would fail to protect the users if they are in possession of the phones when arrested. In addition, 160 jurisdictions now require mandatory SIM card registration, i.e., users must supply their real names and personal details to activate phone service. While front men and money mules may be instructed to use coded language to foil authorities, this tactic would not protect users if they choose to cooperate with authorities to match specific coded instructions to specific actions, i.e., sending funds in response to the coded instructions. |
286 | Jurisdictions included Australia, Austria, Argentina, Belgium, Brazil, Finland, France, Germany, India, Ireland, Israel, Italy, Japan, Republic of Korea, Netherlands, New Zealand, Norway, Philippines, Poland, Romania, South Africa, Sweden, United Kingdom, and the United States. |
287 | Convention on Cybercrime, opened for signature 23 November 2001 ETS 185 (entered into force 1 July 2004). States Parties include Albania, Andorra, Argentina, Armenia, Australia, Austria, Azerbaijan, Belgium, Bosnia and Herzegovina, Bulgaria, Cabo Verde, Canada, Chile, Colombia, Costa Rica, Croatia, Cyprus, Czech Republic, Denmark, Dominican Republic, Estonia, Finland, France, Georgia, Germany, Ghana, Greece, Hungary, Iceland, Israel, Italy, Japan, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Mauritius, Moldova, Monaco, Montenegro, Morocco, Netherlands, Nigeria, North Macedonia, Norway, Panama, Paraguay, Peru, Philippines, Poland, Portugal, Romania, San Marino, Senegal, Serbia, Slovakia, Slovenia, Spain, Sri Lanka, Sweden, Switzerland, Tonga, Turkey, Ukraine, United Kingdom, and the United States. |
288 | Id. art. 21. |
289 | Id. art. 21. |
290 | Second Protocol to the Convention on Cybercrime, opened for signature 12 May 2022, art. 9, ETS 224. |
291 | Id. art. 14(1)(b). |
292 | Id. art. 14(1)(c). |
293 | Id. art. 14(1)(d). |
294 | The FINCEN database is the database established by APUNCAC for the purpose of collecting and centralizing beneficial ownership information and making the information accessible to financial crime investigators. FINCEN is the Financial Crime Enforcement Network established by APUNCAC and modeled on the US Treasury Department’s FinCEN financial intelligence unit. FINCEN is intended to be an international version of FinCEN. |
295 | 31 CFR § 1010.230 (2017). FinCEN considered and rejected a suggestion that certification be made under penalty of perjury. 81 Fed. Reg. 29398, 29405–6 (2016). |
296 | Hadjiyianni notes that “Non-divisibility of standards favours standardisation over customisation. Bradford usefully uses the example of catering to dinner guests’ dietary requirements. Accommodating the most limiting requirement for all guests is much easier than tailoring each guest’s meal to their own distinct preferences” (p. 253). |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yeh, S.S. The Anticorruption Protocol to the United Nations Convention against Corruption Beneficial Owner Rule. Laws 2023, 12, 86. https://doi.org/10.3390/laws12060086
Yeh SS. The Anticorruption Protocol to the United Nations Convention against Corruption Beneficial Owner Rule. Laws. 2023; 12(6):86. https://doi.org/10.3390/laws12060086
Chicago/Turabian StyleYeh, Stuart S. 2023. "The Anticorruption Protocol to the United Nations Convention against Corruption Beneficial Owner Rule" Laws 12, no. 6: 86. https://doi.org/10.3390/laws12060086
APA StyleYeh, S. S. (2023). The Anticorruption Protocol to the United Nations Convention against Corruption Beneficial Owner Rule. Laws, 12(6), 86. https://doi.org/10.3390/laws12060086