Tuesday 29 December 2009
Corruption and money laundering - Bolting the door on terrorism
Since 2002, when the Proceeds of Crime Act introduced a whole range of offences involving criminal property and money laundering, things have been getting tougher for those criminals who use corruption to fund their activities. In 2005, the UN Convention against Corruption introduced the first legally binding anti-corruption measure. 2009 started with a 543 million Euro fine on biggest bank, UBS, for aiding tax fraud, while the Swiss financial regulator FINMA swiftly ordered the bank to hand over about 250 customer names to the US Internal Revenue Service. Russia has just ratified a treaty on money laundering and the finance of terrorism (ratified on Christmas day, 2009).
The last decade has seen a clampdown on corruption and fraud involving money laundering. With Swiss banks under scrutiny and world governments keen to get their hands on tax money being laundered in foreign banks, it seems there is no place left to hide the proceeds of corruption. Or is there?
As money laundering laws tighten, criminals become more technologically savvy as well. According to a recent Kroll fraud report on corruption proceeds, "high level corruption usually involves powerful government officials who will have weakened, or allowed corruption to infiltrate many domestic institutions. Although current international arrangements require a high level of evidence before asset freezing and recovery can begin, much of this evidence may still be in the hands of the corrupt officials themselves." It's not just terrorists or criminal gangs who are involved, but high level officials, making detection and asset recovery all the more difficult.
In countries like Nigeria, 2009 saw most of the chief executives and senior management from the top 5 banks being prosecuted for financial misappropriation and money laundering. The reform in the sector also revealed the shady interplay between the major players in the stock market and top bank executives. This illustrates just how far the rot and corruption can go, from government officials to bank executives, stock brokers to heads of state. Even former vice president of the United States was under scrutiny when it was revealed that the company he had formerly headed, Halliburton, was implicated in a bribery consortium in Nigeria.
When corruption runs so deep as to involve lawyers, government officials, bankers, and leaders of multimillion dollar corporations, how can we expect to eradicate it? It is evident that an anti-corruption framework is needed in all countries, with information sharing, and a view that no one is above the law. Prevention is the key, compliance and regulatory scrutiny across all sectors and industries, in all countries. Insufficient anti-corruption enforcement and systemic weaknesses work together to encourage corruption, as do instability and political strife. In order to strengthen nations like Somalia and Afghanistan financially, the countries must be stabilised, and the measures against corruption should be strengthened. We are moving in the right direction, but are still years away from a workable solution for all nations.
Resources:
Transparency International global priorities in corruption
Kroll compliance and integrity services
UN Anti-Corruption Facebook page
Interpol Anti-Corruption Academy
Bindman's Business Crime Unit
Friday 18 December 2009
Computer Forensics: Your Mission should you choose to accept it...
As more and more of what we do is happening online and within our PC’s (when was the last time you wrote significant amounts of data by hand?) companies are turning to computer forensics to help break cases, find data & recreate events. Computer Forensics is about digging out the traces which are left on the web of the conversations and documents that took place.
So when may you find computer forensics important?
- If you’ve got allegations relating to inappropriate emails being circulated around the business
- If you’ve lost key operational data and need to try to recover it
- As part of a legal case, or an investigation which may form part of litigation.
Using computer forensics can help with information both about what data is there, and the trail of how that data has been used and altered. Partly, that’s why it is so important to make sure if you have an issue you think you need help with relating to computer forensics, that it is dealt with by a professional so you don’t run into issues like chain of evidence and reliability of your data. This will definitely be important if you move to a litigation or external audit stage, that you can show you’ve been working with qualified, experienced professionals. It’s all about building confidence both in the data you find, what you do with it and the end outcome.
Resources
Computer Forensics in Fraud Investigations
More about what computer forensics is
Computer Forensic News
Business crime solicitors
Business fraud investigations
Tuesday 15 December 2009
Forensic accounting still key following recession
It is too simple an answer to suggest that the recession has created only increases in financial fraud. A report published by Kroll highlights the fact that partly it depends on where your sector sits, and how it has been affected, by the recession, which relates to how it has been affected by financial fraud in the last year.
· Dissatisfaction is high (high staff redundancies, dissatisfaction with changes to pay structures) and motivation is higher for those concerned about the real effect on their financial position.
· Closeness to the sectors most affected by the recession- financial services and professional services firms
- There has been a drop in available funds/ industry output (think construction and manufacturing)
- There was previously a huge growth and move into new markets.
- If you are reducing internal controls, ensure that they are ones that are not high risk or leave you too vulnerable to loss
- If you’ve made changes to pay structure/ redundancies, reduce opportunities for single sign off for key transactions, and ensure that you have a culture of compliance and spot checks.
Wednesday 9 December 2009
Intellectual property crime growing exponentially
IP crime is the counterfeiting and piracy of trade marked and copyrighted products and services. This includes fake goods, prescription medicines and luxury goods, as well as trademarks and unauthorised downloads. The Rogers Review estimated that criminal gain from IP crime in the UK was £1.3 billion in 2006 with £900 million flowing to organised crime. Many industries are severely affected and attribute high levels of financial loss to IP crime. The European Commission reported that the total number of counterfeit and pirated articles seized by customs officials in Europe was 79 million in 2007.
In a report on intellectual property fraud by leading risk consulting company Kroll, IP fraud has skyrocked over the last ten years, "due to better access to Internet distribution channels and more criminal networks turning to IP fraud to finance operations". The report states there are weaknesses in corporate IP pipelines, poor legal protections in emerging markets, and highly sophisticated outlaws using both electronic and traditional means of obtaining trade secrets.
According to the Intellectual Property Office, you are responsible for enforcing your intellectual property. If you discover an infringement, you need to decide whether to seek an injunction or damages. They recommend seeking legal advice before taking any action, preferably from a law firm who specialise in intellectual property, patents, and trademarks.
An ounce of prevention may well be worth a pound of cure in these cases, and a thorough review of your policies, suppliers, and processes may go a long way in preventing litigation and loss of revenue. A few suggestions in combating IP fraud include:
- conducting a full IP audit and inventory of all archives
- conducting due diligence on suppliers, vendors, and partners
- sharing information with law enforcement officers
- preventing insider leaks through a system of monitors and alerts
- blocking software downloads on company PCs (or have a system where only certain people have administrative rights to download)
- encrypting data to outside sources
- putting security controls in place for high risk data
- protecting trade secrets, especially in employment contracts
- ensuring third party agents sign confidentiality agreements (this includes agencies, and should be in place for both parties)
- keeping up to date with regulatory requirements, and fully complying with new legislation
Resources:
Intellectual property law firm
UK IP crime group
Interpol
Intellectual property management
Intellectual property solicitors London