The American Bar Association (ABA) is apparently putting up a fight against proposed legislation that would help to prevent money laundering and a host of other crimes in the USA. At first glance, the story appears to defy logic: why would lawyers be against such meaningful and well-intentioned legislation? The nub of the legislation under…
The UK may see itself as one of the self-appointed global anti-corruption, anti-money laundering aficionados, but to many, especially its own Overseas Territories and Crown Dependencies, it is nothing more than the playground bully and a champion of hypocrisy. The news that the Institute for Economic Affairs (IEA) issued a report in March seeking to…
At the end of 2018, there was much press coverage of the visit of External Relations Minister Ian Gorst to Kenya to sign an asset-sharing agreement for £3 million. The money was confiscated following criminal proceedings in the Royal Court in Jersey in which a Jersey company entered guilty pleas to four counts of money…
Back in February 2018, I wrote an a blog about the UK implementing legislation designed to attack those whose assets are likely borne from crimes such as grand corruption. The legislation, known as the Criminal Finances Act (CFA), introduced ‘Unexplained Wealth Orders’ (UWOs) designed to streamline and improve UK law enforcement’s ability to combat those…
Repetition is to be avoided in most walks of life. But where the offshore world is concerned, it appears to be the fulcrum around which the ill-informed are led by the unknowing. In this instance, it is the European Union’s turn to go on the offensive, with the bloc effectively threatening sanctions and retribution against…
Everyone wants to do a good job – yet regulatory sanction seems more frequent than ever. Why do firms drop their ML/TF guard? The first and most simple concept is that risk can only be managed if one has an idea of where it is likely to come from. Picking up on a completely unexpected…
Dear Colleague, I am delighted to invite you to join me at C5’s Global Customs Compliance Forum on March 27th-28th, 2018, in Brussels. In my 35-year career in Customs, I don’t believe I’ve ever stood before a crossroads such as the one we face in the coming 24 months. From Brexit to the geopolitical situation…
On the 14th of September, the newly reconstituted House of Commons Treasury Committee held their first hearing focused on Customs, bringing in three senior representatives from HMRC to address questions on the UK’s customs and trade strategy post-Brexit. Jon Thompson, HMRC Chief Executive, told the committee that HMRC had been very involved in the production…
Brazil’s Federal Police announced last month that the corruption-fighting Lava Jato (translation: Car Wash) task force would put away its soap and hoses and close its doors. What started with money laundering at a gas station and grew to engulf Petrobras, the national oil company, had become a crusade. The task force worked on an…
New research by the SANS Institute, sponsored by Dtex, Haystax Technology and Rapid7, suggests that while global organisations are beginning to recognise that insider threats are potentially the most damaging cyber threat, their budgets and incident response plans have yet to align with their concerns. Only 18% of respondents said they have developed incident response…
An “insider threat” is a security threat that originates from within the organisation. The term encompasses employee error, manipulation and malicious action. Insider attacks may be increasing in frequency, but they are still frequently overlooked as companies focus their attention on creating barricades to outside cyber attackers. The real concern is not an unknown…
Spain is ranked as the 10th scientific power in the world, and 5th by scientific production in the EU 15. For life sciences companies, Spain offers both Governmental and infrastructure support. The Spanish Government provides low interest credits and incentives for companies during the start-up and growth phase. The region also has a rapidly growing…
Join Our Mailing List
Receive exclusive discounts, offers and agenda updates directly to your inbox.
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.