Primer on RICO Offenses (2021)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Money Laundering
Money Laundering Alex Ferguson - Legal Adviser, Caribbean Criminal Asset Recovery Programme Objectives • History and background to money laundering; • The stages of money laundering; • Types of money laundering schemes; • Money Laundering Offences • Prosecutions types; • The predicate offences; • Current trends History The term money laundering is said to have its origins from the mafia’s ownership of Laundromats in the US in the 1920’s and 1930’s. Orgainised criminals were making so much money from extortion, prostitution, gambling and bootlegging, they needed to show a legitimate source of the money. One way in which they could do this was to purchase outwardly legitimate businesses and to mix their illicit earnings with the legitimate earnings from these businesses. Laundromats were chosen because they were cash businesses. Al Capone used this method in Chicago. Journalist Geoffrey Robinson regards the tale that money laundering came from this as a myth. He states: Money Laundering is called what it is because it perfectly describes what takes place – illegal or dirty money is put through a cycle of transactions, or washed, so that it comes out the other end as legal or clean money. In other words, the source of the illegally obtained funds is obscured through a succession of transfers and deals in order that those same funds can eventually be made to appear as legitimate income. Meyer Lansky Lansky was to become known as the Mobster’s accountant. He was determined that the same fate that came of Al Capone would not befall him and he set about finding ways to hide money. Through this determination he discovered the benefits of numbered Swiss bank accounts. -
Money Laundering: an Overview of 18 U.S.C. § 1956 and Related Federal Criminal Law
Money Laundering: An Overview of 18 U.S.C. § 1956 and Related Federal Criminal Law Charles Doyle Senior Specialist in American Public Law November 30, 2017 Congressional Research Service 7-5700 www.crs.gov RL33315 Money Laundering: An Overview of 18 U.S.C. § 1956 and Related Federal Criminal Law Summary This report provides an overview of the elements of federal criminal money laundering statutes and the sanctions imposed for their violation. The most prominent is 18 U.S.C. § 1956. Section 1956 outlaws four kinds of money laundering—promotional, concealment, structuring, and tax evasion laundering of the proceeds generated by designated federal, state, and foreign underlying crimes (predicate offenses)—committed or attempted under one or more of three jurisdictional conditions (i.e., laundering involving certain financial transactions, laundering involving international transfers, and stings). Its companion, 18 U.S.C. § 1957, prohibits depositing or spending more than $10,000 of the proceeds from a predicate offense. Section 1956 violations are punishable by imprisonment for not more than 20 years. Section 1957 carries a maximum penalty of imprisonment for 10 years. Property involved in either case is subject to confiscation. Misconduct that implicates either offense may implicate other federal criminal statutes as well. Federal racketeer influenced and corrupt organization (RICO) provisions outlaw acquiring or conducting the affairs of an enterprise (whose activities affect interstate or foreign commerce) through the patterned commission of a series of underlying federal or state crimes. RICO violations are also 20-year felonies. The Section 1956 predicate offense list automatically includes every RICO predicate offense, including each “federal crime of terrorism.” A second related statute, the Travel Act (18 U.S.C. -
Conspiracy and Attempts Consultation
The Law Commission Consultation Paper No 183 CONSPIRACY AND ATTEMPTS A Consultation Paper The Law Commission was set up by section 1 of the Law Commissions Act 1965 for the purpose of promoting the reform of the law. The Law Commissioners are: The Honourable Mr Justice Etherton, Chairman Mr Stuart Bridge Mr David Hertzell Professor Jeremy Horder Kenneth Parker QC Professor Martin Partington CBE is Special Consultant to the Law Commission responsible for housing law reform. The Chief Executive of the Law Commission is Steve Humphreys and its offices are at Conquest House, 37-38 John Street, Theobalds Road, London WC1N 2BQ. This consultation paper, completed on 17 September 2007, is circulated for comment and criticism only. It does not represent the final views of the Law Commission. The Law Commission would be grateful for comments on its proposals before 31 January 2008. Comments may be sent either – By post to: David Hughes Law Commission Conquest House 37-38 John Street Theobalds Road London WC1N 2BQ Tel: 020-7453-1212 Fax: 020-7453-1297 By email to: [email protected] It would be helpful if, where possible, comments sent by post could also be sent on disk, or by email to the above address, in any commonly used format. We will treat all responses as public documents in accordance with the Freedom of Information Act and we will include a list of all respondents' names in any final report we publish. Those who wish to submit a confidential response should contact the Commission before sending the response. We will disregard automatic confidentiality disclaimers generated by an IT system. -
CRIMINAL CONSPIRACY: the STATE of MIND CRIME-INTENT, PROVING INTENT, and ANTI-FEDERAL Intentt
College of William & Mary Law School William & Mary Law School Scholarship Repository Faculty Publications Faculty and Deans 1976 Criminal Conspiracy: The tS ate of Mind Crime - Intent, Proving Intent, Anti-Federal Intent Paul Marcus William & Mary Law School, [email protected] Repository Citation Marcus, Paul, "Criminal Conspiracy: The tS ate of Mind Crime - Intent, Proving Intent, Anti-Federal Intent" (1976). Faculty Publications. 557. https://scholarship.law.wm.edu/facpubs/557 Copyright c 1976 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/facpubs CRIMINAL CONSPIRACY: THE STATE OF MIND CRIME-INTENT, PROVING INTENT, AND ANTI-FEDERAL INTENTt Paul Marcus* I. INTRODUCTION The crime of conspiracy, unlike other substantive or inchoate crimes, deals almost exclusively with the state of mind of the defendant. Although a person may simply contemplate committing a crime without violating the law, the contemplation becomes unlawful if the same criminal thought is incorporated in an agreement. The state of mind element of conspiracy, however, is not concerned entirely with this agreement. As Dean Harno properly remarked 35 years ago, "The conspiracy consists not merely in the agreement of two or more but in their intention."1 That is, in their agreement the parties not only must understand that they are uniting to commit a crime, but they also must desire to complete that crime as the result of their combination. Criminal conspiracy, therefore, involves two distinct states of mind. The first state of mind prompts the conspirators to reach an agreement; the second relates to the crime that is the object of the agreement. -
Violent Crimes in Aid of Racketeering 18 U.S.C. § 1959 a Manual for Federal Prosecutors
Violent Crimes in Aid of Racketeering 18 U.S.C. § 1959 A Manual for Federal Prosecutors December 2006 Prepared by the Staff of the Organized Crime and Racketeering Section U.S. Department of Justice, Washington, DC 20005 (202) 514-3594 Frank J. Marine, Consultant Douglas E. Crow, Principal Deputy Chief Amy Chang Lee, Assistant Chief Robert C. Dalton Merv Hamburg Gregory C.J. Lisa Melissa Marquez-Oliver David J. Stander Catherine M. Weinstock Cover Design by Linda M. Baer PREFACE This manual is intended to assist federal prosecutors in the preparation and litigation of cases involving the Violent Crimes in Aid of Racketeering Statute, 18 U.S.C. § 1959. Prosecutors are encouraged to contact the Organized Crime and Racketeering Section (OCRS) early in the preparation of their case for advice and assistance. All pleadings alleging a violation of 18 U.S.C. § 1959 including any indictment, information, or criminal complaint, and a prosecution memorandum must be submitted to OCRS for review and approval before being filed with the court. The submission should be approved by the prosecutor’s office before being submitted to OCRS. Due to the volume of submissions received by OCRS, prosecutors should submit the proposal three weeks prior to the date final approval is needed. Prosecutors should contact OCRS regarding the status of the proposed submission before finally scheduling arrests or other time-sensitive actions relating to the submission. Moreover, prosecutors should refrain from finalizing any guilty plea agreement containing a Section 1959 charge until final approval has been obtained from OCRS. The policies and procedures set forth in this manual and elsewhere relating to 18 U.S.C. -
Money-Laundering Typologies: a Review of Their Fitness for Purpose
1 MONEY-LAUNDERING TYPOLOGIES: A REVIEW OF THEIR FITNESS FOR PURPOSE MICHAEL LEVI, PHD, DSC (ECON.) PROFESSOR OF CRIMINOLOGY, CARDIFF UNIVERSITY, UK. GOVERNMENT OF CANADA CONSULTING AND PROFESSIONAL SERVICES CONTRACT NUMBER: 06002-12-0389 OCTOBER 31 2013 2 CONTENTS PART 1: DEFINING AND CONCEPTUALISING TYPOLOGIES ................................................................... 3 Introduction ................................................................................................................................................. 3 Conceptualising and defining laundering ............................................................................................ 4 The elastic definition of laundering ..................................................................................................... 6 Reference to the predicate crime ...................................................................................................... 9 Seriousness of the predicate crime ................................................................................................. 9 The three-stage model and typologies of money laundering .......................................................... 9 The Use of the Three Stage Typology in Policy and Practice ....................................................... 14 PART 2: LITERATURE REVIEW OF LAUNDERING TYPOLOGIES ............................................................. 16 Introduction .............................................................................................................................................. -
Cap. 16 Tanzania Penal Code Chapter 16 of the Laws
CAP. 16 TANZANIA PENAL CODE CHAPTER 16 OF THE LAWS (REVISED) (PRINCIPAL LEGISLATION) [Issued Under Cap. 1, s. 18] 1981 PRINTED AND PUBLISHED BY THE GOVERNMENT PRINTER, DARES SALAAM Penal Code [CAP. 16 CHAPTER 16 PENAL CODE Arrangement of Sections PARTI General Provisions CHAPTER I Preliminary 1. Short title. 2. Its operation in lieu of the Indian Penal Code. 3. Saving of certain laws. CHAPTER II Interpretation 4. General rule of construction. 5. Interpretation. CHAPTER III Territorial Application of Code 6. Extent of jurisdiction of local courts. 7. Offences committed partly within and partly beyond the jurisdiction, CHAPTER IV General Rules as to Criminal Responsibility 8. Ignorance of law. 9. Bona fide claim of right. 10. Intention and motive. 11. Mistake of fact. 12. Presumption of sanity^ 13. Insanity. 14. Intoxication. 15. Immature age. 16. Judicial officers. 17. Compulsion. 18. Defence of person or property. 18A. The right of defence. 18B. Use of force in defence. 18C. When the right of defence extends to causing abath. 19. Use of force in effecting arrest. 20. Compulsion by husband. 21. Persons not to be punished twice for the same offence. 4 CAP. 16] Penal Code CHAPTER V Parties to Offences 22. Principal offenders. 23. Joint offences. 24. Councelling to commit an offence. CHAPTER VI Punishments 25. Different kinds of punishment. 26. Sentence of death. 27: Imprisonment. 28. Corpora] punishment. 29. Fines. 30. Forfeiture. 31. Compensation. 32. Costs. 33. Security for keeping the peace. 34. [Repealed]. 35. General punishment for misdemeanours. 36. Sentences cumulative, unless otherwise ordered. 37. Escaped convicts to serve unexpired sentences when recap- 38. -
CH 11 Conspiracy and Solicitation
CONSPIRACY & SOLICITATION .............................................................. 1 §11-1 Conspiracy ................................................................................................... 1 §11-2 Solicitation .................................................................................................. 4 i CONSPIRACY & SOLICITATION §11-1 Conspiracy United States Supreme Court Smith v. U.S., 568 U.S. 106, 133 S.Ct. 714, 184 L. Ed.2d 570 (2013) Although the prosecution has the burden to prove beyond a reasonable doubt every fact necessary to constitute the crime with which the defendant is charged, the constitution does not require that the prosecution disprove all affirmative defenses raised by the defense. Instead, the burden of proof may be assigned to the defendant if the affirmative defense in question does not negate an element of the crime. Although the legislative branch may choose to assign the burden of proof concerning other affirmative defenses to the prosecution, the constitution does not require it to do so. Where a defendant was charged with conspiracy and claimed that he had withdrawn from the conspiracy at such time that the statute of limitations expired before the prosecution was brought, the constitution did not require that the prosecution bear the burden of disproving the affirmative defense of withdrawal. A withdrawal defense does not negate an element of conspiracy, but merely determines the point at which the defendant is no longer criminally responsible for acts which his co-conspirators took in furtherance of the conspiracy. Because the defense did not negate any elements of conspiracy, the constitution was not violated because Congress followed the common law rule by assigning to the defendant the burden to prove he had withdrawn from the conspiracy. The court also noted the “informational asymmetry” between the defense and the prosecution concerning the defense of withdrawal. -
Mens Rea and Inchoate Crimes Larry Alexander
Journal of Criminal Law and Criminology Volume 87 Article 2 Issue 4 Summer Summer 1997 Mens Rea and Inchoate Crimes Larry Alexander Kimberly D. Kessler Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Larry Alexander, Kimberly D. Kessler, Mens Rea and Inchoate Crimes, 87 J. Crim. L. & Criminology 1138 (1996-1997) This Criminal Law is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/97/8704-1138 THE JouRmAL OF CRIMINAL LAw & CRIMINOLOGY Vol. 87, No. 4 Copyright © 1997 by Northwestern University, School of Law Printed in U.S.A. MENS REA AND INCHOATE CRIMES LARRY ALEX&ND* KIMBERLY D. KESSLER** I. INTRODUCTION When a defendant engages in proscribed conduct or in conduct that brings about a forbidden result, our interest focuses on his state of mind at the time he engages in the proscribed conduct or the con- duct that causes the result. We usually are unconcerned with his state(s) of mind in the period leading up to the conduct. The narra- tive of the crime can begin as late as the moment defendant engages in the conduct (or, in the case of completed attempts,1 believes he is engaging in the conduct). Criminal codes do not restrict themselves to proscribing harmful conduct or results, however, but also criminalize various acts that pre- cede harmful conduct. -
Money Laundering and Terrorism Financing
��������� ����������-����������� �������� �� ���������� ��� �������� �� ����� ���������� ��� ��������� ��������� �� ����� ���� ����� ����� �� ����� ������� CICTE Inter-American Committee against Terrorism 1 OAS Cataloging-in-Publication Data Inter-American Committee against Terrorism. Technical Assessment - Comparative Analysis of typologies and patterns of money laundering and terrorism financing in three free trade zones in Latin America / [Prepared by the Inter-American Committee against Terrorism, Secretariat for Multidimensional Security, Organization of American States]. v. ; cm. (OAS. Official documents ; OEA/Ser.L/X.6.1). ISBN 978-0-8270-6652-6 1. Money laundering--Latin America--Case studies. 2. Terrorism--Finance--Latin America--Case studies. I. Title. II. Organization of American States. Secretariat for Multidimensional Security. III. Series. OEA/Ser.L/X.6.1 2 Technical Assessment-Comparative Analysis of Typologies and Patterns of Money Laundering and Terrorism Financing in Three Free Trade Zones in Latin America 3 4 The CICTE Secretariat would like to express its gratitude for the valuable support provided by the experts and participants who contributed to the development of this project. 5 6 Table of contents CHAPTER I. PRELIMINARY MATTERS Introduction Background Objectives Methodology CHAPTER II. GENERAL CONCEPTS AND LEGAL FRAMEWORK Money laundering and terrorism financing The crime of terrorism financing. International legislative history The 40 FATF Recommendations and the financing of terrorism Criminalization of terrorism financing Model definitions of the crime of money laundering and terrorism financing in the region CHAPTER III. FREE TRADE ZONES What is a free trade zone? Free trade zones in Latin America Most commonly-used types of transactions in TBML Threats Threats, by region I.NORTH AMERICAN, CENTRAL AMERICAN AND CARIBBEAN SUB-REGION II.SOUTHERN CONE SUB-REGION III.ANDEAN SUB-REGION Vulnerabilities of free trade zones Vulnerabilities detected in the region CHAPTER IV. -
Cybercrime: an Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law October 15, 2014 Congressional Research Service 7-5700 www.crs.gov 97-1025 Cybercrime: An Overview of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008). In their present form, the seven paragraphs of subsection 1030(a) outlaw • computer trespassing (e.g., hacking) in a government computer, 18 U.S.C. 1030(a)(3); • computer trespassing (e.g., hacking) resulting in exposure to certain governmental, credit, financial, or computer-housed information, 18 U.S.C. 1030(a)(2); • damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce (e.g., a worm, computer virus, Trojan horse, time bomb, a denial of service attack, and other forms of cyber attack, cyber crime, or cyber terrorism), 18 U.S.C. -
Statute of Limitation in Federal Criminal Cases: an Overview
Statute of Limitation in Federal Criminal Cases: An Overview Charles Doyle Senior Specialist in American Public Law November 14, 2017 Congressional Research Service 7-5700 www.crs.gov RL31253 Statute of Limitation in Federal Criminal Cases: An Overview Summary A statute of limitations dictates the time period within which a legal proceeding must begin. The purpose of a statute of limitations in a criminal case is to ensure the prompt prosecution of criminal charges and thereby spare the accused of the burden of having to defend against stale charges after memories may have faded or evidence is lost. There is no statute of limitations for federal crimes punishable by death, nor for certain federal crimes of terrorism, nor for certain federal sex offenses. Prosecution for most other federal crimes must begin within five years of the commitment of the offense. There are exceptions. Some types of crimes are subject to a longer period of limitation; some circumstances suspend or extend the otherwise applicable period of limitation. Arson, art theft, certain crimes against financial institutions, and various immigration offenses all carry statutes of limitation longer than the five-year standard. Regardless of the applicable statute of limitations, the period may be extended or the running of the period suspended or tolled under a number of circumstances, such as when the accused is a fugitive or when the case involves charges of child abuse, bankruptcy, wartime fraud against the government, or DNA evidence. Ordinarily, the statute of limitations begins to run as soon as the crime has been completed. Although the federal crime of conspiracy is complete when one of the plotters commits an affirmative act in its name, the period for conspiracies begins with the last affirmative act committed in furtherance of the scheme.