Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An overview of white-collar crimes, including their definition, legal principles, and examples. Topics covered include antitrust violations, computer and internet fraud, credit card fraud, healthcare fraud, financial fraud, securities fraud, insider trading, bribery, and more. The document also discusses the role of the commerce clause in regulating white-collar crime and the involvement of various federal agencies in enforcement.
Typology: Study notes
1 / 14
CRIMINAL LAW 3250 FALL 2012 MELTON LESSON ELEVEN WHITE-COLLAR AND ORGANIZED CRIME LESSON ORIENTATION: CHAPTER 9 IN THE TEXT OVERVIEW: White-collar crimes are offenses committed in the course of a person’s occupation or profession and frequently include prostitution, gambling, and obscenity (see Chapter 8) and offenses relative to the importation, manufacture, and supply of illegal drugs and alcohol (see Chapter 9). Environmental crimes and violations of the federal food and drug acts (see Chapter 11) are often included in the white-collar crime category, as are obstruction of justice and other offenses against the administration of justice (see Chapter 13). Sometimes violations of civil rights (see Chapter 6) are also categorized as white-collar crimes. In addition, a number of federal statutes (and to a lesser extent various state statutes) proscribe acts uniquely referred to as white-collar crimes. These include antitrust violations, bid rigging, price fixing, money laundering, insider trading, tax fraud, and various other offenses discussed in this chapter. Essentially, these offenses involve the use of deceit and concealment (as opposed to force or violence) to obtain economic benefits or advantages. Organized crime involves offenses committed by persons or groups who conduct their business through illegal enterprises. Organized crime figures often attempt to gain political influence through graft and corruption, and they frequently resort to threats and acts of violence in commission of white-collar offenses. Organized crime gained its greatest foothold during the period when the Eighteenth Amendment to the United States Constitution prohibiting the sale and distribution of alcoholic beverages was extant. By the time Prohibition was repealed in 1933, organized crime had become involved in many phases of our economy, often pursuing its interests through such illegal activities as loan sharking, gambling, prostitution, and drug trafficking. Protection rackets and other forms of racketeering have become the methodology of organized crime as it has infiltrated many legitimate business operations. There is often an overlap between white-collar crime and organized crime. This lesson addresses white-collar and organized crime and the overlap between the two. LEARNING OBJECTIVES: What is white collar crime? Legal Principles Governing White-Collar Crimes Examples of federally prosecuted white-collar crimes Organized crime and RICO Discussion : WHAT IS WHITE-COLLAR CRIME? Those who make a profession of the study of crime, (criminologists) and many in the public at large, think of white collar crime as offenses committed by persons in the upper socioeconomic status of our society. That is to say, those who wear white collars to work as opposed to blue collar workers.
The phrase "white-collar crime" was coined in 1939 during a speech given by Edwin Sutherland to the American Sociological Society. Sutherland defined the term as "crime committed by a person of respectability and high social status in the course of his occupation." Although there has been some debate as to what qualifies as a white-collar crime, the term today generally encompasses a variety of nonviolent crimes usually committed in commercial situations for financial gain. Many white-collar crimes are especially difficult to prosecute because the perpetrators use sophisticated means to conceal their activities through a series of complex transactions. The most common white-collar offenses include: antitrust violations, computer and internet fraud, credit card fraud, phone and telemarketing fraud, bankruptcy fraud, healthcare fraud, environmental law violations, insurance fraud, mail fraud, government fraud, tax evasion, financial fraud, securities fraud, insider trading, bribery, kickbacks, counterfeiting, public corruption, money laundering, embezzlement, economic espionage and trade secret theft. According to the Federal Bureau of Investigation, white-collar crime is estimated to cost the United States more than $300 billion annually. Although typically the government charges individuals for white-collar crimes, the government has the power to sanction corporations as well for these offenses. The penalties for white-collar offenses include fines, home detention, community confinement, paying the cost of prosecution, forfeitures, restitution, supervised release, and imprisonment. However, sanctions can be lessened if the defendant takes responsibility for the crime and assists the authorities in their investigation. Any defenses available to non-white-collar defendants in criminal court are also available to those accused of white-collar crimes. A common refrain of individuals or organizations facing white-collar criminal charges is the defense of entrapment. For instance, in United States v. Williams, 705 F.2d 603 (2nd Cir. 1983), one of the cases arising from "Operation Abscam," Senator Harrison Williams attempted unsuccessfully to argue that the government induced him into accepting a bribe. Both state and federal legislation enumerate the activities that constitute white-collar criminal offenses. The Commerce Clause of the U.S. Constitution gives the federal government the authority to regulate white-collar crime, and a number of federal agencies (see sidebar), including the FBI, the Internal Revenue Service, the Secret Service, U.S. Customs, the Environmental Protection Agency, and the Securities and Exchange Commission, participate in the enforcement of federal white-collar crime legislation. In addition, most states employ their own agencies to enforce white-collar crime laws at the state level. Another definition of white collar crime from Nolo’s Plain-English Law Dictionary: A variety of nonviolent financial crimes, generally committed by businesspeople or public officials,involving commercial fraud, consumer fraud, swindles, insider trading on the stock market, embezzlement, bribery, or other dishonest schemes. So what is white collar crime? Lying, cheating and stealing. That’s it; plain and simple. The term is now synonymous with the full range of frauds committed by individuals, business and government professionals. LEGAL PRINCIPLES GOVERNING WHITE-COLLAR CRIMES:
Constitution of the United States, Art. I, Section 8. “The commerce clause” The Congress shall have power to lay and collect taxes , duties, imposts and excises, to pay the debts and provide for the common defense and general welfare of the United States; but all duties, imposts and excises shall be uniform throughout the United States; To borrow money on the credit of the United States; To regulate commerce with foreign nations, and among the several states , and with the Indian tribes; To establish a uniform rule of naturalization, and uniform laws on the subject of bankruptcies throughout the United States; To coin money, regulate the value thereof, and of foreign coin, and fix the standard of weights and measures; To provide for the punishment of counterfeiting the securities and current coin of the United States; To establish post offices and post roads; To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries; To constitute tribunals inferior to the Supreme Court; To define and punish piracies and felonies committed on the high seas, and offenses against the law of nations; To declare war, grant letters of marque and reprisal, and make rules concerning captures on land and water;….. ;And To make all laws which shall be necessary and proper for carrying into execution the foregoing powers, and all other powers vested by this Constitution in the government of the United States, or in any department or officer thereof. Immediately preceding is a portion of the commerce clause. At the federal level most white collar crimes are prosecuted based on statutes enacted by Congress under the authority of the commerce clause. At the state level, legislatures have broad authority to regulate white collar crimes pursuant to the general police power of the state. Most statutes on white collar crime involve both criminal penalties and civil penalties that can be imposed upon conviction. The civil remedies are designed to compensate victims who have suffered pecuniary loses as the result to the activities. The principles of mens rea, actus reas, the concurrence of these elements and the causation of harm are all elements of white-collar crimes. Typically it must be shown that the accused acted “knowingly and willfully” in the commission of the offense and “for the purpose of……..” The purpose would be for example to defraud, or restrict trade, etc. etc. In our course we have primarily focused on individual responsibility for the commission of crimes. In white collar crimes, corporations may also be held criminally responsible for criminal activities contrary to the traditional common law. In the common law, corporations could not be held criminally responsible for crime because it was not a person who could not form the mental element of intent and a corporation could not go to jail. Corporate responsibility is based upon the concept of agency. In the law, an agent is someone who acts for and on behalf of another person. For example, you may authorize someone to buy or sell on your behalf. In this example, the agent has authority to act for you in the transaction. As such, your agent has the express authority to sell the item in question for you and the agent has implied authority to do other things on your behalf for the purpose of facilitating the sale. That is, he may negotiate, advertize or permit someone to examine the article in question.
In the prosecution of a corporation, the corporation may be held criminally liable for the acts of its agents, committed within the scope of the agent’s authority. As noted in the paragraph above, the scope of the agent’s authority is both actual and implied or “apparent.” For this discussion I am using apparent and implied synonymously. Therefore, if the agent, acting within the scope of his authority violates the law, the corporation may be held liable because the knowledge and actions of the agent are imputed to the corporation. This is a type of vicarious liability that we discussed in a previous class. EXAMPLES OF FEDERALLY PROSECUTED WHITE-COLLAR CRIMES:
1. ANTI-TRUST VIOLATIONS: Trusts and monopolies are concentrations of economic power in the hands of a few. Economists believe that such control injures both individuals and the public because it leads to anticompetitive practices in an effort to obtain or maintain total control. Anticompetitive practices then lead to price controls and diminished individual initiative. These results in turn cause markets to stagnate and depress economic growth. Because of fears during the late 1800s that monopolies dominated America's free market economy, Congress passed the Sherman Antitrust Act in 1890 to combat anticompetitive practices, reduce market domination by individual corporations, and preserve unfettered competition as the rule of trade. The Sherman Antitrust Act forms the foundation and the basis for most federal antitrust litigation. As for the states, many have adopted antitrust laws that parallel the Sherman Antitrust Act to prevent anticompetitive behavior within local intrastate commerce. Since Congressional jurisdiction does not reach purely intrastate commerce, states needed to pass their own legislation to avoid having anticompetitive behavior depress their own local economies. See, for example, the Tennessee Antitrust Act. There are various Federal Antitrust Acts that are summarized below. The Sherman Antitrust Act: Congress derived its power to pass the Sherman Act through its constitutional authority to regulate commerce. Therefore, the Sherman Act can only be used when the conduct in question restrains or substantially affects either interstate commerce or trade within the District of Columbia. To satisfy this jurisdictional requirement, the plaintiff must show that the conduct in question occurs during the flow of interstate commerce or has an appreciable effect on some activity that occurs during interstate commerce. The Sherman Act is divided into three sections. Section 1 delineates and prohibits specific means of anticompetitive conduct, and Section 2 deals with end results that are anticompetitive in nature. Sections 1 and 2 supplement each other in an effort to outlaw all types of anticompetitive conduct. Congress designed the supplementary relationship to prevent businesses from violating the spirit of the Act, while technically remaining within the letter of the law. Section 3 simply extends the provisions of Section 1 to U.S. territories and the District of Columbia. The Clayton Antitrust Act of 1914: Because the courts found certain activities to fall outside the scope of the Sherman Antitrust Act, Congress passed the Clayton Antitrust Act of 1914 to further widen its scope. For example, the Clayton Act added the following practices to the list of impermissible activities: price discrimination between different purchasers, if such discrimination tends to create a monopoly; exclusive dealing agreements; tying arrangements; and mergers and acquisitions that substantially reduce market competition.
The Robinson-Patman Act of 1936 amended the Clayton Act. The amendment aimed to outlaw certain practices in which manufacturers discriminated in price between equally-situated distributers to decrease competition. The Per se Rule vs. the Rule of Reason Violations under the Sherman Act take one of two forms - either as a per se violation or as a violation of the rule of reason. Section 1 of the Sherman Act characterizes certain business practices as a per se violation. A per se violation requires no further inquiry into the practice's actual effect on the market or the intentions of those individuals who engaged in the practice. Some business practices, however, at times constitute anticompetitive behavior and at other times encourage competition within the market. For these cases the court applies a totality of the circumstances test and asks whether the challenged practice promotes or suppresses market competition. Courts often find intent and motive relevant in predicting future consequences during a rule of reason analysis. A presumption exists in favor of the rule of reason for ambiguous cases. Types of Prohibited Anticompetitive Schemes Congress designed these federal antitrust laws to eradicate certain frequently used anticompetitive practices of which the following are a few. Section 2 of the Sherman Act prohibits monopolization, attempts to monopolize, and conspiring to monopolize. Any such act constitutes a felony. A monopoly conviction requires proof of the individual having intent to monopolize with the power to monopolize, regardless of whether the individual actually exercised the power. Price-fixing occurs when a company or companies within a given market artificially set or maintain the price of goods or services at a certain level, contrary to the workings of the free market. Section 1 provides that price-fixing is an illegal restraint on trade, regardless of whether a vertical or horizontal scheme. A vertical scheme is a scheme among parties in the same chain of distribution. A horizontal scheme occurs among competitors on the same level. In 1911 vertical price-fixing schemes became a per se violation of Section 1 when the Supreme Court interpreted the statute in Dr. Miles Medical Co. v. John D. Park & Sons Co., 220 U.S. 373. However, in the landmark case of Leegin Creative Leather Products, Inc. v. PSKS, Inc., 551 U.S. __ (2007), the Supreme Court overturned the 96-year-old Dr. Miles precedent and held that courts should apply the rule of reason when analyzing vertical price-fixing schemes. The ruling renders all vertical limitation schemes subject only to the rule of reason. Collusive bidding occurs when two or more competitors agree to change the bids they otherwise would offer absent the agreement. Under Section 1, collusive bidding is per se illegal. A tying arrangement is an agreement by a party to sell one product only on the condition that the buyer agrees either to buy different products from the seller or not to buy those different products from another seller. Tying arrangements are subject to the rule of reason unless the arrangement shuts out a substantial quantity of commerce in which case the scheme is per se illegal. Section 2 makes illegal a firm's refusal to deal with another firm if the refusing firm refuses for the purpose of trying to monopolize the market. Meanwhile, section 1 prohibits a group from refusing to deal with a particular firm. A group refusal to deal is known as a group boycott. Because of seemingly contradictory Supreme Court decisions over the years, the question of whether group boycotts are subject to the rule of reason or a per se rule has been left murky.
Exclusive dealing agreements require a retailer or distributor to purchase exclusively from the manufacturer. These arrangements make it difficult for new sellers to enter the market and find prospective buyers, thus depressing competition. However, because companies widely-use requirements contracts, which essentially are exclusive dealing agreements, for purposes that promote competition, exclusive dealing arrangements only face rule of reason scrutiny. Below-cost pricing intended to eliminate specific competitors and reduce overall competition is known as predatory pricing. Section 2 disallows this conduct. In Brooke Group Ltd. v. Brown & Williamson Tobacco, 509 U.S. 209 (1993), the U.S. Supreme Court devised a two-part test to determine if predatory pricing had occurred. First, the plaintiff must establish that the defendant's production costs surpass the market price charged for the item. Second, the plaintiff must establish that a "dangerous probability" exists that the defendant will recover the investment in above-cost inputs. In Weyerhaeuser Co. v. Ross-Simmons Hardwood Lumber Co., Inc. (05-381) (2007), the Supreme Court said that this test also applies when determining if a predatory bidding scheme exists. Exemptions from anti-trust laws: Certain practices and organizations have received exemption from the federal antitrust laws. First , patent owners received an exemption in the Sherman Act because federal policy favors incentivizing innovation. Of course, the exemption does not go beyond the granted patent monopoly. Second , the Clayton Act exempted labor unions and agricultural organizations from the Sherman Act's reach. Third , the Securities Exchange Act of 1934 (SEA) heavily regulates securities trading; thus, certain activities that fall within the scope of the SEA are exempt from antitrust law. The U.S. Supreme Court took up this very issue in 2007 in Credit Suisse Securities (USA) v. Billing (05-1157). The Court decided that if securities regulation and antitrust law are incompatible, then the securities regulation prevails and individuals who would otherwise violate antitrust law receive antitrust immunity. Determining incompatibility requires the presence of the following four criteria: 1) behavior squarely within securities regulation; 2) clear and adequate SEC authority to regulate; 3) active and ongoing SEC regulation; and 4) a serious conflict between regulatory and antitrust regimes. Federal Trade Commission The Federal Trade Commission Act of 1914 (FTCA) bolstered the Sherman Act and Clayton Act by providing that the Federal Trade Commission (FTC) could proactively and directly protect consumers rather than only offer indirect protection by protecting business competitors. Congress endowed the FTC with the power to fill gaps remaining in antitrust law or to stop new business practices not yet invented at the time of the Clayton Act's enactment but contrary to public policy. Section 5 of the FTCA gives the FTC broad powers to cope with new threats to the competitive free market. RACKETERRING Set of illegal activities aimed at commercial profit that may be disguised as legitimate business deals. Common examples include fraud, extortion, bribery, and actual or threatened violence. Definition from Nolo’s Plain-English Law Dictionary:
Certain illegal activities, such as bribery, money laundering, prostitution, or extortion, committed as part of an ongoing criminal enterprise. COMPUTER AND INTERNET CRIMES Criminal activity involving the perpetration of a fraud through the use of the computer or the internet can take many different forms. One common form includes “hacking,” in which a perpetrator uses sophisticated technological tools to remotely access a secure computer or internet location. A second common criminal activity involves illegally intercepting an electronic transmission not intended for the interceptor. This may result in the interception of private information such as passwords, credit card information, or other types of so-called identity theft. Federal law defines computer fraud as the use of a computer to create a dishonest misrepresentation of fact as an attempt to induce another to do or refrain from doing something which causes loss. Criminals create fraudulent misrepresentation in a number of ways. First, they can alter computer input in an unauthorized way. Employees may embezzle company funds by altering input data. Second, criminals can alter or delete stored data. Third, sophisticated criminals can rewrite software codes and upload them into a bank’s mainframe so that the bank will provide its users’ identities to the thieves. The thieves can then use this information to make unauthorized credit card purchases. Violators may be prosecuted under: 18 U.S.C. § 506 No Electronic Theft Act 18 U.S.C. § 1028 Identity Theft and Assumption Deterrence Act of 1998 18 U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices 18 U.S.C. § 1030 Fraud and Related Activity in Connection with Computers 18 U.S.C. § 1343 Wire Fraud 18 U.S.C. § 1362 Communication Lines, Stations, or Systems 18 U.S.C. § 2511 Interception and Disclosure of Wire, Oral, or Electronic Communications Prohibited 18 U.S.C. § 2701 Unlawful Access to Stored Communications 18 U.S.C. § 2702 Disclosure of Contents 18 U.S.C. § 2703 Requirements for Governmental Access CREDIT CARD FRAUD Credit card fraud is a form of identity theft that involves an unauthorized taking of another’s credit card information for the purpose of charging purchases to the account or removing funds from it. Federal law limits cardholders’ liability to $50 in the event of credit card theft, but most banks will waive this amount if the cardholder signs an affidavit explaining the theft. Credit card fraud schemes generally fall into one of two categories of fraud: application fraud and account takeover. Application fraud refers to the unauthorized opening of credit card accounts in another person's name. This may occur if a perpetrator can obtain enough personal information about the victim to completely fill out the credit card application, or is able to create convincing counterfeit documents. Application fraud schemes are serious because a victim may learn about the fraud too late, if ever. Account takeovers typically involve the criminal hijacking of an existing credit card account, a practice by which a perpetrator obtains enough personal information about a victim to
change the account's billing address. The perpetrator then subsequently reports the card lost or stolen in order to obtain a new card and make fraudulent purchases with it. Another common method used to achieve an account takeover is called “skimming.” Skimming schemes occur when businesses' employees illicitly access to customers’ credit card information. These employees then either sell the information to identity thieves or hijack the ictim's identities themselves. Technological advances have also created avenues for credit card fraud. With online purchasing now common, perpetrators need no physical card to make an unauthorized purchase. Additionally, electronic databases containing credit card data may be hacked or crash on their own, releasing customers' credit card information, putting the security of many accounts at risk at once. HEALTHCARE FRAUD Health care fraud is a type of white-collar crime that involves the filing of dishonest health care claims in order to turn a profit. Fraudulent health care schemes come in many forms. Practitioner schemes include: individuals obtaining subsidized or fully-covered prescription pills that are actually unneeded and then selling them on the black market for a profit; billing by practitioners for care that they never rendered; filing duplicate claims for the same service rendered; altering the dates, description of services, or identities of members or providers; billing for a non-covered service as a covered service; modifying medical records; intentional incorrect reporting of diagnoses or procedures to maximize payment; use of unlicensed staff; accepting or giving kickbacks for member referrals; waiving member co-pays; and prescribing additional or unnecessary treatment. Members can commit health care fraud by providing false information when applying for programs or services, forging or selling prescription drugs, using transportation benefits for non-medical related purposes, and loaning or using another’s insurance card. When a health care fraud is perpetrated, the health care provider passes the costs along to its customers. Because of the pervasiveness of health care fraud, statistics now show that 10 cents of every dollar spent on health care goes toward paying for fraudulent health care claims. Congressional legislation requires that health care insurance pay a legitimate claim within 30 days. The Federal Bureau of Investigation, the U.S. Postal Service, and the Office of the Inspector General all are charged with the responsibility of investigating healthcare fraud. However, because of the 30-day rule, these agencies rarely have enough time to perform an adequate investigation before an insurer has to pay. A successful prosecution of a health care provider that ends in a conviction can have serious consequences. The health care provider faces incarceration, fines, and possibly losing the right to practice in the medical industry. Violators may be prosecuted under: 18 U.S.C. 1347 Health Care Fraud PUBLIC CORRUPTION: Public corruption involves a breach of public trust and/or abuse of position by federal, state, or local officials and their private sector accomplices. By broad definition, a government official, whether elected, appointed or hired, may violate federal law when he/she asks, demands, solicits, accepts, or agrees to receive anything of value in return for being influenced in the performance of their official duties.
Financial Institution Fraud (FIF) involves fraud or embezzlement occurring within or against financial institutions that are insured or regulated by the U.S. Government. Financial institutions are threatened by a wide array of frauds, including commercial loan fraud, check fraud, counterfeit negotiable instruments, mortgage fraud, check kiting, false applications, and a variety of traditional and non-traditional FIF scams. Securities fraud includes theft from manipulation of the market, theft from securities accounts, and wire fraud. Insider trading refers to the trading of a company’s stocks or other securities by individuals with access to confidential or non-public information. Taking advantage of this privileged access is considered a breach of the individual’s fiduciary duty. The United States requires that a company report trading by corporate officers, directors, or other company members with significant access to privileged information to the Securities and Exchange Commission or be publicly disclosed. United States federal law defines an “insider” as a company’s officers, directors, or someone in control of at least 10% of a company’s equity securities. Congress has criminalized these insiders’ use of non-public information under the theory that the use fraudulently violates a fiduciary duty with which the company has charged the insider. From an economic public policy perspective, scholars consider insider trading socially undesirable because it increases the cost of capital for securities traders and therefore depresses economic growth. The Insider Trading Sanction Act of 1984 and the Insider Trading and Securities Exchange Act of 1988 provide for insider trading penalties to surpass three times the profits gained from the trade. Problems also exist with regard to insiders “tipping” friends about non-public information that may influence the company’s publicly-traded stock price. Because the friends do meet the definition of an insider, a problem arose regarding how to prosecute these individuals. Today, a friend who receives such a tip becomes imputed with the same duty as the insider – that is not to make a trade based upon that privileged information. Failure to abide by the duty constitutes insider trading and creates grounds for a prosecution. The person receiving the tip, however, must have known or should have known that the information was company property to be convicted. Dirks v. SEC proved a pivotal U.S. Supreme Court decision regarding this type of insider trading. In Dirks the Court held that a prosecutor could charge tip recipients with insider trading liability if the recipient had reason to believe that the information’s disclosure violated another’s fiduciary duty and if the recipient personally gained from acting upon the information. 463 U.S. 646 (1983). Dirks also created the constructive insider rule, which treats individuals working with a corporation on a professional basis as insiders if they come into contact with non-public information. Id. The recent emergence of the misappropriation theory of insider trading has paved the way for passage of §10(b)-5, which permits criminal liability for an individual who trades on any stock based upon the misappropriated information. Previously, the prosecutor could only charge the insider if the stock of the insider’s company had been traded. While proof of insider trading can be difficult, the Securities and Exchange Commission actively monitors trading, looking for suspicious activity. See United States v. O’Hagan , 521 U.S. 642 (1997). Under §10(b)-5, however, a defendant can assert an affirmative preplanned trade defense.
The U.S. Supreme Court recently expounded on 10(b) in a pair of cases. In 2007 Tellabs, Inc. v. Makor Issues & Rights, LTD (06-484) determined the requisite specificity when alleging fraud. With Congress requiring enough facts from which "to draw a strong inference that the defendant acted with the required state of mind," the Supreme Court determined that a "strong inference" means a showing of "cogent and compelling evidence." In the 2007-2008 term, the Supreme Court determined that 10(b) does not provide non-government plaintiffs with a private cause of action against aiders and abettors in securities fraud cases, either explicitly or implicitly. See Stoneridge v. Scientific-Atlanta (06-43) (2008). BANKRUPTCY FRAUD Bankruptcy fraud is a white-collar crime that takes four general forms. First , debtors conceal assets to avoid having to forfeit them. Second , individuals intentionally file false or incomplete forms. Third , individuals sometimes file multiple times using either false information or real information in several states. The fourth kind of bankruptcy fraud involves bribing a court-appointed trustee. Commonly, the criminal will couple one of these forms of fraud with another crime, such as identity theft, mortgage fraud, money laundering, and public corruption. Nearly 70% of all bankruptcy fraud involves the concealment of assets. Creditors can only liquidate those assets listed by the debtor; thus, if the debtor fails to reveal certain assets, the debtor can keep the assets despite having an outstanding debt. To further conceal the assets, businesses or individuals may transfer these unrevealed assets to friends, relatives, or an associate so that the asset cannot be located. This type of fraud raises the risk and costs associated with lending and becomes passed on to others who wish to borrow money. Petition mills are one type of bankruptcy fraud scheme on the rise in the United States. Petition mills purport to keep financially-strapped tenants from becoming evicted by passing themselves off as a consulting service. While the tenant believes to be receiving help in avoiding eviction, the petition mill actually files the tenant for bankruptcy and drags out the case. Meanwhile, the “service” charges exorbitant fees, empties the tenant’s savings account, and ruins the tenant’s credit score. Multiple filing fraud consists of filing for bankruptcy in multiple states, using the same name and information, using aliases and fake information, or some combination thereof. Multiple filings slow down the court systems’ ability to process a bankruptcy filing and liquidate the assets. Often, multiple filings provide more cover for a debtor trying to engage in the concealment of assets. A proceeding in which suspects are charged with bankruptcy fraud is criminal in nature. Federal prosecutors can bring charges for suspected bankruptcy fraud under 18 U.S.C. § 151. Proof of fraud requires showing that the defendant knowingly and fraudulently made a misrepresentation of material fact. Bankruptcy fraud carries a sentence of up to five years in prison, or a fine of up to $250,000, or both. See 18 U.S.C. § 152. MAIL FRAUD Mail fraud occurs when the U.S. Mail is used in furtherance of a criminal act. In order for a defendant to be convicted under 18 U.S.C. 1341for committing mail fraud, the follow elements must be satisified: (1) the defendant must have been engaged in a scheme to defraud; (2) the scheme must have involved material misstatements or omissions; (3) the scheme resulted, or would have resulted upon completion, in the loss of money, property, or honest services; (4) the
defendant must have used of U.S. mail in furtherance of scheme to defraud; and (5) the defendant used or caused the use of U.S.mail. See 18 U.S.C. 1341 - Mail Fraud MONEY LAUNDERING Money laundering refers to a financial transaction scheme that aims to conceal the identity, source, and destination of illicitly-obtained money. The money laundering process can be broken down into three stages. First, the illegal activity that garners the money places it in the launderer’s hands. Second, the launderer passes the money through a complex scheme of transactions to obscure who initially received the money from the criminal enterprise. Third, the scheme returns the money to the launderer in an obscure and indirect way. Tax evasion and false accounting practices constitute common types of money laundering. Often, criminals achieve these objectives through the use of shell companies, holding companies, and offshore accounts. A shell company is an incorporated company that possesses no significant assets and does not perform any significant operations. To launder money, the shell company purports to perform some service that would reasonably require its customers to often pay with cash. Cash transactions increase the anonymity of customers and therefore decrease the government’s ability to trace the initial recipient of the dirty money. Money launderers commonly select beauty salons and plumbing services as shell companies. The launderer then deposits the money with the shell company, which deposits it into its accounts. The company then creates fake invoices and receipts to account for the cash. Such transactions create the appearance of propriety and clean money. The shell company can then make withdrawals and either return the money to the initial criminal or pass the money on to further shell companies before returning it to further cloud who first deposited the money. Criminals often use offshore accounts to hide money because they offer greater privacy, less regulation, and reduced taxation. Because the U.S. government has no authority to require foreign banks to report the interest earned by U.S. citizens with foreign bank accounts, the criminal can keep the account abroad, fail to report the account’s existence, and receive the interest without paying personal income taxes on it in the U.S. To combat this criminal activity, Congress passed the Bank Secrecy Act of 1970, which requires banks to report any financial transactions of $10,000.01 or more. Congress followed up this Act sixteen years later with the Money Laundering Control Act of 1986, which rendered money laundering a federal crime. In 2001, Congress passed the USA Patriot Act, which expanded the scope of reporting responsibilities and included more types of financial institutions in an effort to combat the financing of terrorist activities. In a pair of 2008 decisions, the U.S. Supreme Court clarified the federal statute criminalizing money laundering. Cuellar v. United States (06-1456) determined that to prove money laundering, prosecutors must show that concealment of money must be for the purpose of concealing ownership, source, or control rather than for some other purpose. In United States v. Santos (06-1005), the Court held that the word “proceeds” in the federal laundering statute referred only to criminal profits and excluded criminal receipts. Thus, the Court reversed a pair of convictions based on money laundering involving the pay out of winnings in an illegal gambling ring. See 18 U.S.C. 1956 Money Laundering ECONOMIC ESPIONAGE
In general terms, economic espionage is the unlawful or clandestine targeting or acquisition of sensitive financial, trade or economic policy information; proprietary economic information; or technological information. The Economic Espionage Act of 1996 (EEA), 18 U.S.C. §§ 1831-1839, defines the term "economic espionage" as the theft or misappropriation of a trade secret with the intent or knowledge that the offense will benefit any foreign government, foreign instrumentality, or foreign agent. See 18 U.S.C. § 1831. The act of receiving, purchasing, or possessing a trade secret known to have been stolen or misappropriated, as well as any attempt or conspiracy to commit economic espionage are punishable as a federal crime under the EEA. See Id. COUNTERFEITING Counterfeiting occurs when someone copies or imitates an item without having been authorized to do so and passes the copy off for the genuine or original item. While counterfeiting is most often associated with money it can also be applied to designer clothing, handbags and watches and other consumer goods. 18 U.S.C. 470-514 Counterfeiting and Forgery ORGANIZED CRIME AND RICO: During prohibition organized gangs trafficked in liquor, became involved in gambling, in prostitution and other vices. After prohibition, they expanded into narcotics, and other activities. Among other things, they infiltrated legitimate businesses and developed complex and secretive organizational structures of their own. In the 1960s and 1970s, congress passed several laws designed to combat organized crime. Among the most significant of these was title IX of the Organized Crime Control Act of
Those charged under the RICO statute face the penalty of fines, imprisonment, or both as well as the mandate to surrender to the federal government any enterprise and assets acquired by means of racketeering activity. Under this set of penalties, the federal government is not only able to prosecute crime syndicate bosses, but to prosecute criminal associates as well as seize the actual operations beneath them. This enables the RICO statute to deal a considerable blow to the entirety of a corrupt organization. Over time, the RICO statute has been used not only to target the Mafia’s crooked dealings, but any organization—legitimate or otherwise—engaged in a pattern of racketeering activity. This is particularly useful with organized crime syndicates who smokescreen themselves behind a wall of legitimate business structures. After the World Trade Center attacks on September 11, 2001, in the United States, the RICO statute has also seen increased use in targeting terrorist enterprises. The RICO statute was also designed for civil cases, with the intent to function as a restorative tool for victims of racketeering. The law stipulates that individuals who have sustained injury to property or business due to racketeering activity may sue and are entitled to threefold the amount of their losses. The extent to which the act can be interpreted by plaintiffs in civil RICO claims has led to some amount of fear and controversy, with critics leveling accusations that the RICO statute’s wording is too broad, particularly in the areas of mail and wire fraud, and can be used to unfairly seek damages from non-criminal enterprises. KEY TERMS: white-collar crimes commerce clause organized crime racketeering corporate defendants vicarious liability agent scope of an agent’s authority Sherman Antitrust Act antitrust violations Clayton Antitrust Act The Per se Rule vs. the Rule of Reason in antitrust price fixing bid rigging collusive bidding predatory pricing anti-trust exceptions credit card fraud health care fraud public corruption bankruptcy fraud USA PATRIOT Act bankruptcy fraud mail fraud money laundering
insider trading counterfeiting Securities and Exchange Act Racketeer Influenced and Corrupt Organizations (RICO) Act