Abuse of the Civil Asset Forfeiture Law

Related reading: The Myth of Judicial Activism

The Supreme Court struck down less than 1% of the federal laws passed over a 50-year period.

*** Questions must be asked why is the Justice Department re-applying this program and to what end?

Criminal forfeiture is an action brought as a part of the criminal prosecution of a defendant. It is an in personam (against the person) action and requires that the government indict (charge) the property used or derived from the crime along with the defendant. If the jury finds the property forfeitable, the court issues an order of forfeiture.

For forfeitures pursuant to the Controlled Substances Act (CSA), Racketeer Influenced and Corrupt Organizations (RICO), as well as money laundering and obscenity statutes, there is an ancillary hearing for third parties to assert their interest in the property. Once the interests of third parties are addressed, the court issues a final forfeiture order.

Civil judicial forfeiture is an in rem (against the property) action brought in court against the property. The property is the defendant and no criminal charge against the owner is necessary.

Administrative forfeiture is an in rem action that permits the federal seizing agency to forfeit the property without judicial involvement. The authority for a seizing agency to start an administrative forfeiture action is found in the Tariff Act of 1930, 19 U.S.C. § 1607. Property that can be administratively forfeited is: merchandise the importation of which is prohibited; a conveyance used to import, transport, or store a controlled substance; a monetary instrument; or other property that does not exceed $500,000 in value.

Source: A Guide to Equitable Sharing of Federally Forfeited Property for State and Local Law Enforcement Agencies, U.S. Department of Justice, March 1994.

Participants And Roles

The Justice Asset Forfeiture Program includes activity by DOJ components and several components outside the Department. Each component plays an important role in the Program.

Department of Justice Components

Money Laundering and Asset Recovery Section (MLARS) of the Criminal Division holds the responsibility of coordination, direction, and general oversight of the Program. AFMLS handles civil and criminal litigation, provides legal support to the U.S. Attorneys’ Offices, establishes policy and procedure, coordinates multi-district asset seizures, administers equitable sharing of assets, acts on petitions for remission, coordinates international forfeiture and sharing and develops training seminars for all levels of government.

Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) enforces the federal laws and regulations relating to alcohol, tobacco, firearms, explosives and arson by working directly and in cooperation with other federal, state and local law enforcement agencies. ATF has the authority to seize and forfeit firearms, ammunition, explosives, alcohol, tobacco, currency, conveyances and certain real property involved in violation of law.

Drug Enforcement Administration (DEA) implements major investigative strategies against drug networks and cartels. Enforcement operations have resulted in significant seizure and forfeiture activity. A significant portion of DEA cases are adopted from state and local law enforcement agencies.

Federal Bureau of Investigation The FBI investigates a broad range of criminal violations, integrating the use of asset forfeiture into its overall strategy to eliminate targeted criminal enterprises. The FBI has successfully used asset forfeiture in White Collar Crime, Organized Crime, Drug, Violent Crime and Terrorism investigations. See the FBI Investigative Programs Asset Forfeiture Home Page for more information.

United States Marshals Service as the primary custodian of seized property for the Program. USMS manages and disposes of the majority of the property seized for forfeiture. See their Seized Asset Information page and their National Sellers List for more information.

United States Attorneys’ Offices (USAOs) are responsible for the prosecution of both criminal and civil actions against property used or acquired during illegal activity.

Asset Forfeiture Management Staff (AFMS): Has responsibility for management of the Assets Forfeiture Fund, the Consolidated Asset Tracking System (CATS), program-wide contracts, oversight of program internal controls and property management, interpretation of the Assets Forfeiture Fund statute, approval of unusual Fund uses, and legislative liaison on matters affecting the financial integrity of the Program.

Components Outside the Department of Justice

There are several organizations outside the Department of Justice who participate in the DOJ Asset Forfeiture Program. This list may change as additional agencies and offices become part of the DOJ program. These agencies participate in Judicial forfeitures only.

United States Postal Inspection Service (USPIS) makes seizures under their authority to discourage profit-motivated crimes such as mail fraud, money laundering and drug trafficking using the mail.

Food and Drug Administration FDA’s Office of Criminal Investigations has made seizures involving health care fraud schemes, counterfeit pharmaceuticals, illegal distribution of adulterated foods, and product tampering.

United States Department of Agriculture, Office of the Inspector General USDA’s Office of Inspector General’s (OIG) mission is to promote effectiveness and integrity in the delivery of USDA agricultural programs. Forfeiture is integrated as an important law enforcement tool in combating criminal activity affecting USDA programs.

Department of State, Bureau of Diplomatic Security The Bureau of Diplomatic Security investigates passport and visa fraud and integrates asset forfeiture into our strategy to target the profits made by vendors who provide fraudulent documentation or others who utilize fraudulent visas and/or passports to further their criminal enterprises.

Defense Criminal Investigative Service (DCIS) is the criminal investigative arm of the Inspector General of the Department of Defense. The mission of DCIS is to protect America’s War fighters by conducting investigations and forfeitures in support of crucial National Defense priorities that include homeland security/terrorism, product substitution, contract fraud, public corruption, computer crimes, and illegal technology transfers. ”

The Comprehensive Crime Control Act of 1984 established the Department of Justice Assets Forfeiture Fund to receive the proceeds of forfeiture and to pay the costs associated with such forfeitures, including the costs of managing and disposing of property, satisfying valid liens, mortgages, and other innocent owner claims, and costs associated with accomplishing the legal forfeiture of the property.

The Attorney General is authorized to use the Assets Forfeiture Fund to pay any necessary expenses associated with forfeiture operations such as property seizure, detention, management, forfeiture, and disposal. The Fund may also be used to finance certain general investigative expenses. These authorized uses are enumerated in 28 U.S.C. §524(c). Read more here.

Secret Service has Large Quiet Office in Hoover, Alabama

Primer: The U.S. Secret Service maintains Electronic Crimes Task Forces, which focus on identifying and locating international cyber criminals connected to cyber intrusions, bank fraud, data breaches, and other computer-related crimes. The Secret Service’s Cyber Intelligence Section has directly contributed to the arrest of transnational cyber criminals responsible for the theft of hundreds of millions of credit card numbers and the loss of approximately $600 million to financial and retail institutions. The Secret Service also runs the National Computer Forensic Institute, which provides law enforcement officers, prosecutors, and judges with cyber training and information to combat cyber crime.

HOOVER, Ala. — The classrooms, tucked above a municipal court here in the Birmingham suburbs, are a long way from the White House. But walk through a set of secured doors and into the futuristic-looking work space, and you will find an important wager by the agency best known for protecting presidents, the Secret Service.

Only it has almost nothing to do with earpiece-wearing agents or armored cars.

Though the Secret Service may be better known for keeping government executives safe, it also has a mandate to investigate and fight financial and other cybercrimes. And in an era of overworked protection details and nonstop cybercrime, it could use some help.

So here at the National Computer Forensics Institute, the pupils are hardened police officers, prosecutors and, occasionally, a judge. Instruction mimics what the agency teaches its own special agents. And tuition is not only free, but the Secret Service throws in travel, room, board and, for police officers, tens of thousands of dollars of technology to set up their own forensics labs back home.

Data is extracted from mobile phones for use in a class on prosecution in Hoover. Kevin D. Liles for The New York Times

In exchange, the Secret Service has quietly empowered a network of thousands of law enforcement officers across the country capable of processing digital evidence and indebted to the agency that taught them.

“The threat nature has increased in the world, and the threats are all more and more integrated with the digital world,” said Ben Bass, the special agent in charge of the institute. “So assimilating that into what we do is really important.”

The institute opened in 2008 as a partnership between the Secret Service and the state of Alabama, which contributed space and money for its construction. At the time, few state and local law enforcement agencies had the capability to process digital evidence found on computers and cellphones, even as it was exploding in volume and importance. That left agencies heavily reliant on the Secret Service and the F.B.I. for processing and created a years long backlog in many cases.

The Secret Service reasoned that it would be critical to the future of its mission — not to mention the effectiveness of local and state law enforcement — to try to change that. The program remains the only one of its kind and scale in the country.

Though its protective mission occupies the public’s attention, the Secret Service has been investigating crimes since 1865, when President Lincoln saw the need to create a small force of investigators within the Treasury Department to combat counterfeit currency that was undermining American markets. That mandate has changed and widened in the decades since, along with threats to the country’s financial systems, and the agency now investigates bank fraud, credit card fraud, identity theft, child exploitation as well as counterfeiting.

It does so with a reasonably small force. The majority of the Secret Service’s 3,300 agents work out of field offices. The F.B.I., by comparison, has more than 13,000. To amplify its effect, the agency relies on dozens of electronic and financial crimes task forces across the country, where local and state law officers and people in academia and businesses work alongside its own agents.

The help has arrived at the right time for the agency, where in recent years low morale, high attrition and more people to protect in more places have conspired to pinch resources. Because protection is a nonnegotiable task, investigations often take the hit.

The effect can be significant. In the 2016 fiscal year, the agency spent 65 percent of its time on protection and 35 percent on investigative work, according to calculations it shared with members of the House Oversight Committee. That was an election year, when protection demands are highest. But it appears the ratio for this fiscal year — which only included the last month or so of the campaign — has not changed much, with 60 percent of time going to protection through the end of May. Typically it would be about 40 percent for a post-campaign fiscal year.

Robert Novy, the deputy assistant director for investigations, said the task forces help ensure that cases continue to move forward regardless of protection demands. He also said that they have begun to free the Secret Service’s own staff to focus on larger-scale cyberthreats and high-dollar financial crimes.

“By elevating their capacities and capabilities, it allows us to focus on finding ways to counter more significant financial threats,” Mr. Novy said.

Still, building the program has proved challenging. A decade after it first opened its doors, the institute trains about 1,100 people a year. But it is running at between 30 percent and 40 percent of capacity because of a shortage of federal funds. For some programs, would-be enrollees can wait as long as three years.

Its financial outlook remains uncertain. President Trump’s 2018 budget proposal zeroed out the program, though Randolph D. Alles, the agency’s new director, told lawmakers last month that he considered it “critical” to the agency and would move money from elsewhere in his budget to pay for it if need be. At the same time, lawmakers in the House and Senate have introduced legislation that could stabilize its funding.

The institute’s finances appeared to be on few minds on a recent early summer day in Hoover, where a class of two dozen prosecutors sat in neat classroom rows, computers humming beside their feet, as data from the cellphone of a fictitious drug smuggler flashed onto their computer screens. The evidence was all there in ordered folders: call logs, texts, even compromising photographs of a would-be drug dealer, made visible by powerful software and a few patient instructors.

One room away and a few hours later, two dozen police officers packed into a wood-trimmed mock courtroom listened to another instructor hold forth from the witness stand on the ins and outs of being a good forensics witness. The key, he said, is balancing the use of technical details like “master boot records” and “disk partitions” with the bigger picture a less tech-savvy jury can more easily grasp.

“I need to be able to understand it so I can translate it when I go before a panel of 12 people,” said Jennifer Eugene, a prosecutor from New Jersey, describing her experience in front of a jury. “The law has not caught up with where the technology is.”

A five-week course for police on the basics of computer evidence recovery is the most popular, and graduates of the course leave here with $28,000 worth of technology and the ability to search seized computers for evidence of a crime. A similar course on mobile devices is growing in popularity. And more advanced courses cover network intrusion.

Prosecutors and judges can take shorter courses meant to familiarize them with digital evidence, which is still relatively new to many courtrooms.

But the mutual benefits of the program were on display, too. Frank Garibay, a detective with the San Antonio Police Department who had returned to the institute as a proctor after taking coursework himself, said his training here had transformed what his department could do.

It had also meant that when officials from the Texas Rangers and Homeland Security Investigations zeroed in on an illegal gambling ring in Texas, they could turn to the Secret Service’s San Antonio-based electronic crimes task force, including Mr. Garibay, for help.

The Secret Service paid for members of its task force to travel to the small South Texas town of Falfurrias for a weekend to set up a war room to process digital evidence.

The operation ended up taking down about a dozen illegal casinos, recovered almost $6 million, exposed drug and human trafficing rings, and ultimately public corruption.

 

State Dept to Close War Crimes Division, Bad Decision

  USAToday

Secretary of State Rex Tillerson is shuttering the department’s two-decades-old war crimes office, Foreign Policy reported Monday.

The Office of Global Criminal Justice advises the Secretary of State on issues surrounding war crimes and genocide and helps form policy to address those atrocities.

According to FP, Tillerson’s office has told Todd Buchwald, the special coordinator of the OGCJ, he is being reassigned to the State Department’s office of legal affairs.

Remaining staff might be shifted to the State Department’s Bureau of Democracy, Human Rights, and Labor, FP reported.

According to FP, the closure decision comes at a time when Tillerson has been trying to reorganize the department to concentrate on pursuing economic opportunities for American businesses and strengthening U.S. military prowess.

“There’s no mistaking it — this move will be a huge loss for accountability,” Richard Dicker, the director of Human Rights Watch’s international justice program, told FP. A State Department spokesman told FP in a statement it is “currently undergoing an employee-led redesign initiative, and there are no predetermined outcomes. We are not going to get ahead of any outcomes.” More here.

*** Consider the murderers in countries such as North Korea, Syria, Iran, Yemen, Iraq, Sudan, Nigeria, Afghanistan and more….

Iraq: Execution Site Near Mosul’s Old City

Investigate, Punish Those Responsible for Any War Crimes

Satellite imagery from July 12 showing the building and Tigris riverbank seen in a video posted of soldiers throwing a detainee off a cliff in west Mosul as well as military vehicles in the vicinity.

Satellite imagery from July 12 showing the building and Tigris riverbank seen in a video posted of soldiers throwing a detainee off a cliff in west Mosul as well as military vehicles in the vicinity.  © 2017 DigitalGlobe
(Beirut) – International observers have discovered an execution site in west Mosul, Human Rights Watch said today. That report, combined with new statements about executions in and around Mosul’s Old City and persistent documentation about Iraqi forces extrajudicially killing men fleeing Mosul in the final phase of the battle against the Islamic State (also known as ISIS), are an urgent call to action by the Iraqi government.
Despite repeated promises to investigate wrongdoing by security forces, Prime Minister Haider al-Abadi has yet to demonstrate that Iraqi authorities have held a single soldier accountable for murdering, torturing, and abusing Iraqis in this conflict.
“As Prime Minister Abadi enjoys victory in Mosul, he is ignoring the flood of evidence of his soldiers committing vicious war crimes in the very city he’s promised to liberate,” said Sarah Leah Whitson, Middle East director at Human Rights Watch. “Abadi’s victory will collapse unless he takes concrete steps to end the grotesque abuses by his own security forces.”
International observers, whose evidence has proven reliable in the past, told Human Rights Watch that on July 17, 2017, at about 3:30 p.m., a shopkeeper in a neighborhood directly west of the Old City that was retaken in April from ISIS took them into an empty building and showed them a row of 17 male corpses, barefoot but in civilian dress, surrounded by pools of blood. They said many appeared to have been blindfolded and with their hands tied behind their back.
They said the shopkeeper told them that he had seen the Iraqi Security Forces’ 16th Division, identifiable by their badges and vehicles, in the neighborhood four nights earlier, and that night had heard multiple gunshots coming from the area of the empty building. The next morning, when armed forces had left the area, he told them, he went into the building and saw the bodies lying in positions that suggested they were shot there and had not been moved. He said he did not recognize any of those killed.
The international observers also saw soldiers from the elite Counter Terrorism Service (CTS) in the area. They contacted Human Rights Watch by phone from the site and later shared five photos they took of the bodies.
On July 17, another international observer told Human Rights Watch they spoke to a senior government official in Mosul who told them he was comfortable with the execution of suspected ISIS-affiliates “as long as there was no torture.” The observer said a commander showed their group a video taken a few days earlier of a group of CTS soldiers holding two detainees in the Old City. They said the commander told them that the forces had executed the men right after the video was taken.
Salah al-Imara, an Iraqi citizen who regularly publishes information regarding security and military activities in and around Mosul, published four videos allegedly filmed in west Mosul on Facebook on July 11 and 12. One video, posted on July 11, appears to show Iraqi soldiers beating a detainee, then throwing him off a cliff and shooting at him and at the body of another man already lying at the bottom of the cliff. Human Rights Watch had verified the location of the first video based on satellite imagery. Other videos showed Iraqi soldiers kicking and beating a bleeding man, federal police forces beating at least three men, and Iraqi soldiers kicking a man on the ground in their custody.
A third international observer told Human Rights Watch on July 18 that they witnessed CTS soldiers bring an ISIS suspect to their base in a neighborhood southwest of the Old City on July 11. The observer did not see what happened to the suspect next, but said that a soldier later showed them a video of himself and a group of other soldiers brutally beating the man, and a second video of the man dead, with a bullet to his head.
“Some Iraqi soldiers seem to have so little fear that they will face any consequence for murdering and torturing suspects in Mosul that they are freely sharing evidence of what look like very cruel exploits in videos and photographs,” Whitson said. “Excusing such celebratory revenge killings will haunt Iraq for generations to come.”
A fourth international observer told Human Rights Watch on July 11 that the day before they had witnessed a group of CTS soldiers push a man whose hands were tied behind his back into a destroyed shop near the main road in the west to the Old City. They said they heard several gunshots, went into the shop after the soldiers had left, and found the man’s body with several bullet holes in the back of his head. They shared the photo of the body.
On July 10, the same observer said they saw Iraqi Security Forces just outside the Old City holding about 12 men with their hands tied behind their backs. They said an officer told them that the military’s 9th Division had detained these men inside the Old City on suspicion of ISIS affiliation. They said they saw the soldiers lead the detained men just out of sight, then heard shots ring out from their direction. The observer was unable to verify what happened.
On July 7, two additional international observers told Human Rights Watch that on different occasions in late June, they witnessed soldiers bring at least five suspected ISIS affiliates out of the Old City to the west, strapped to the hoods of Humvees, when temperatures in the city often reached 48 degrees Celsius, or 118 degrees Fahrenheit.
The nongovernmental organization Mosul Eye has been documenting abuses by all sides in Mosul since 2014, and has posted numerous videos and witness statements about executions on its Twitter feed since July 14, with one reading: “Mass Executions ‘Speicher Style’ [a reference to an ISIS massacre in 2014] for the last survivors of the old city. ISF is killing and throwing bodies of everyone it finds to the river.”
As of July 10, the Iraqi military has prevented access to west Mosul for most journalists, limiting coverage of recent events inside the Old City. Iraqi forces should allow journalists access to west Mosul to report on the conflict and any alleged abuses, Human Rights Watch said.
Throughout the operation to retake Mosul, Human Rights Watch has documented Iraqi forces detaining and holding at least 1,200 men and boys in inhumane conditions without charge, and in some cases torturing and executing them, under the guise of screening them for ISIS-affiliation. In the final weeks of the Mosul operation, Human Rights Watch has reported on executions of suspected ISIS-affiliates in and around Mosul’s Old City.
An Iraqi Ministry of Foreign Affairs representative told Human Rights Watch on July 19 that he would request a government investigation into the allegations. Human Rights Watch has repeatedly raised concerns about allegations of ill-treatment, torture, and executions in meetings with Iraqi officials in Baghdad as well as with representatives from United States-led coalition member countries. Human Rights Watch does not know of a single transparent investigation into abuses by Iraqi armed forces, any instances of commanders being held accountable for abuse, or any victims of abuse receiving compensation.
Iraqi criminal justice authorities should investigate all alleged crimes, including unlawful killings and mutilation of corpses, by any party in the conflict in a prompt, transparent, and effective manner, up to the highest levels of responsibility. Those found criminally responsible should be appropriately prosecuted. Extrajudicial executions and torture during an armed conflict are war crimes.
“Relentless reports, videos, and photographs of unlawful executions and beatings by Iraqi soldiers should be enough to raise serious concerns among the highest ranks in Baghdad and the international coalition combatting ISIS,” Whitson said. “As we well know in Iraq, if the government doesn’t provide an accounting for these murders, the Iraqi people may take matters into their own hands.”

Bill Clinton, Trumps’ and Renaissance Capital

Primer: The 8th person at the Trump Jr. meeting was Ike Kaveladze. He currently serves as Vice President of the Crocus Group in Moscow. Mr Balber, the lawyer for Kaveladze, said he revealed the identity of the eighth participant after receiving a call from a representative of special counsel Robert Mueller – the first indication that the Justice Department investigator is looking into the meeting. Previously, Federal investigators say Kaveladze immediately began laundering money for Russians.

Kaveladze was the president of International Business Creations, a Delaware corporation. Between 1991 and 2000, IBC and sister corporation Euro-American moved $1.4 billion from Eastern Europe through U.S. banks and back to Europe, the Government Accountability Office found in 2000.

But let’s go back to Bill and Hillary shall we? We may determine just why President Trump backed off his campaign pledge and decided not to prosecute Hillary

THE CLINTON FAMILY BUSINESS There may be no Clinton Foundation office in Moscow or St. Petersburg, but it is not for lack of trying. Bill Clinton received half a million dollars in 2010 for a speech he gave in Moscow, paid by a Russian firm, Renaissance Capital, that has ties to Russian intelligence. The Clinton Foundation took money from Russian officials and oligarchs, including Victor Kekselberg, a Putin confidant. The Foundation also received millions of dollars from Uranium One, which was sold to the Russian government in 2010, giving Russia control of 20% of the uranium deposits in the U.S. —  the sale required approval from Hillary Clinton’s State Department. What’s more, at least some of these donations weren’t disclosed. “Ian Telfer, the head of the Russian government’s uranium company, Uranium One, made four foreign donations totaling $2.35 million to the Clinton Foundation. Those contributions were not publicly disclosed by the Clintons, despite an agreement Mrs. Clinton had struck with the Obama White House to publicly identify all such donors,” the Times has reported.

Stephen Jennings is the co-founder and CEO of Renaissance Capital and in 2010 he resided over the launch of Tatu City, a planned community for 60,000 northeast of Nairobi.

Before that Vladimir Dzhabarov was a member of the FSB’s Department “K,” or its financial counter-intelligence division . From 2006-09, he was also the First Vice President at Renaissance Capital, a Moscow-based investment firm, which the 36 year-old Magnitsky claimed was involved in a six-long-year long conspiracy by an organized crime syndicate and Russian government officials to defraud the nation’s taxpayers. Renaissance Capital denies it had any part in any tax frauds; in 2009, the bank’s deputy chief executive Hans Jochum Horn told the New York Times that any illegal transactions involving Renaissance subsidiary companies took place after those companies had been sold off to new owners.

Magnitsky claimed in 2008 that criminals tied to Renaissance Capital, who were allegedly working in lockstep with tax and law enforcement agents, stole some $470 million by orchestrating illegal and complex tax refund schemes. As part of his sweeping investigation, Magnitsky claimed that in 2001-2002, Igor Sagiryan, the former president of Renaissance Capital, had supposedly commissioned named a fellow named Dmitry Klyuev to arrange a series of tax refunds through the corrupt Russian court system. This seconding of a known mobster to a seemingly legitimate financial institution was confirmed by Yuri Sagaidak, a former KGB general who was at the time the vice president of Renaissance Capital, in Russian court testimony.

The Klyuev Group, which U.S. Senator John McCain in 2012 urged President Obama to use an executive order to sanction wholesale as a “dangerous transnational criminal organization,”concocted its first nine-figure refund scheme in 2006, according to Magnitsky and others. The conspirators allegedly included the heads of Moscow Tax Offices 28 and 25, Olga Stepanova and Elena Khimina, respectively; Klyuev’s own attorney, Andrey Pavlov; and an Interior Ministry official, Major Pavel Karpov, who had previously investigated Klyuev for attempting to steal $1.6 billion worth of shares of a profitable Russian iron ore company. (Klyuev received a two-year suspended sentence in that case.)Read more here.

It has now emerged that the US Department of Justice has traced proceeds of the fraud to a bank account in Bournemouth held by Renaissance Capital Investment Management Ltd.

A chart produced by the US Department of Justice shows funds flowing through a series of foreign companies before being channelled into three main firms, including Prevezon, against which the DoJ is taking legal action to seize assets allegedly linked to the money, and the Bournemouth Renaissance account.

Renaissance Capital is a Moscow-based investment bank now controlled by billionaire oligarch Mikhail Prokhorov. Igor Sushchin, until recently the organisation’s head of IT security, was one of two FSB operatives accused by the FBI last month of hacking 500 million Yahoo email accounts. An indictment said it was “unknown” whether the firm “knew of his FSB affiliation”. Read more here for details and to help with the confusion.

*** In case you are wondering what Robert Mueller, the special investigator is looking at with this team, hold on this is going to get worse.

Magnitsky tracked money and found it all over the globe before he was murdered in a Russian prison, where the FSB arrested him for whistle-blowing.

According to records obtained by OCCRP, between Moscow and Geneva the money traveled all over the world in a veritable chain of shell companies set up by GT Group — a company that was connected to the sale of arms from N. Korea to Iran as well as laundering money for the Mexican Sinaloa Cartel.
The couple used the same Credit Suisse accounts to purchase two apartments valued at US$2 million each at Dubai’s Kempinksi resort for tax office deputies Elena Anisimova and Olga Tsareva. According to bank records, the apartments were purchased using the same bank account Stepanova used.
US$3 million arrived in the accounts on January 3, 2008 via Bristoll Export, a company which had been registered by GT Group in New Zealand. In February, companies incorporated in Cyprus, Moldova, and the United Kingdom sent US$9 million to the Credit Suisse accounts. See detailed information on one of the companies, NOMIREX, which processed US$8 million in its accounts while filing as “inactive” in a separate story.
In May and June 2008, the accounts held by Stepanov and Stepanova sent US$10 million to a shell company called Arivust holding. Records obtained by OCCRP show that through a series of agreements, Stepanov is named as the beneficial owner of the company.
The records also show that Stepanov is the beneficial owner of another company, Aikate Properties, which sent US$2 million to his Swiss account.
Hermitage acquired copies of the Credit Suisse transactions and used them to file a complaint with the bank and the Swiss federal attorney general this spring.
Stepanova remains employed by the Russian government. She resigned from the tax ministry but now works for a new defense agency established by Medvedev that oversees procurement and allocation of police and military equipment to the country’s law enforcement and military agencies.
So do Lieutenant Colonel Artyom Kuznetsov, whose assets were estimated at US$3 million although his official annual salary is about US$10,000; and Russian Interior Ministry Pavel Karpov, whose assets were estimated at US$1.5 million while his yearly pay was only US$10,000. Transparency International ranks Russia as the most corrupt large nation on earth, and the large country most likely to bribe abroad. They also estimate that bribery alone costs Russia US$300 billion annually, the total GDP of Denmark.  Bribery “is not even half of the problem,” according to a US House of Representatives Staffer who did not want to be identified because of his frequent work with Russian officials on policy issues including the Magnitsky case. Yep…more here.

Donald Trump Jr. had a meeting with 8 people in the room at Trump Tower in June of 2016. The meeting included Natalia Vesealnitskaya who was hired by and worked closely with Petr Katsyv who is/was the legal owner of Prevezon Holdings. The U.S. Justice Department for the Southern District of New York was prosecuting a money laundering case against Prevezon Holdings and it was settled too quickly directly after Jeff Sessions fired Phreet Bharara. Katsyv is also the vice president of Russian Railways, a state run rail operation run by Vladimir Yakunin and a close confidant of Vladimir Putin. Still confused and overwhelmed? Well there is more here.

Sorry there is yet another name, Sergei Roldugin. This particular Sergei is hardly a money launderer of the garden variety, in fact he is a cellist. But..he is at the center of a global scheme that moved $2.0 billion through Russian state banks, Swiss and Panamanian law firms all tied to Vladimir Putin via the investigation and release of the Panama Papers. Kinda wonder how a cellist is worth $100 million, right? Good question but money mess began at the Bank Rossiya, a top go-to bank for Putin and his inner circle. Oh yeah, Sergei Roldugin the the godfather to Putin’s oldest daughter, Maria.

In September of 2016, Roldugin announced before reporters at the Kremlin that Donadl Trump will be the next U.S. president.

 

Rick Perry: Corporate Espionage going by Russia and China

Rick Perry: Russian, Chinese Corporate Espionage ‘Shouldn’t Surprise Anybody’

Russia and China are engaging in underhanded business practices involving American oil and gas companies, according to Energy Secretary Rick Perry.

During an appearance on Fox Business Tuesday morning, Perry said it “shouldn’t surprise anybody that there is corporate espionage going on” in Russia and China, particularly with U.S. companies that are involved in hydraulic fracturing or fracking.

The secretary also addressed a recent column from Fox Business contributor James Freeman, which detailed a congressional investigation into allegations of a Russian effort to undermine and “suppress our domestic oil and gas industry, specifically hydraulic fracking,” according to a statement from House Science Committee Chairman Lamar Smith.

“When you think about Russia and China a lot of the businesses there have direct links back to their government,” Perry said. “So the idea that there are people trying to manipulate, to put propaganda out on a particular type of fuel, that doesn’t surprise me.”

He added that his case highlights the importance of cybersecurity.

“We need to be sophisticated when it comes to how we deal with Russia, how we deal with China,” he said. “Those are our competitors out there and we know that they may play with a different set of rules and we just need to be smart enough to identify.”

***

Rick Perry is more than right.

Primer 2013:

U.S. military operations, the security and the well being of U.S. military personnel, the effectiveness of
equipment, and readiness. China apparently uses these intrusions to fill gaps in its own research
programs, map future targets, gather intelligence on U.S. strategies and plans, enable future military
operations, shorten research and development (R&D) timelines for military technologies, and identify
vulnerabilities in U.S. systems and develop countermeasures.
China’s cyber espionage against U.S. commercial firms poses a significant threat to U.S. business
interests and competiveness in key industries.
General Keith Alexander, Director of the National Security Agency and commander of U.S. Cyber Command, assessed that the financial value of these losses is about $338 billion a year, including intellectual property losses and the down time to respond to penetrations, although not all those losses are to Chinese activity. Chinese entities engaging in cyber and other forms of economic espionage likely conclude that stealing intellectual property and proprietary information is much more cost
effective than investing in lengthy R&D programs.
***

Example/2015: WASHINGTON—Six Chinese citizens, including two professors who trained together at the University of Southern California, stole sensitive wireless technology from U.S. companies and spirited it back to China, the Justice Department charged.

Example/2014: In one of the most notable actions, Dongfan “Greg” Chung, a naturalized American citizen who worked on NASA’s space shuttle program, was convicted in 2009 after investigators found hundreds of thousands of sensitive papers under his California home. Prosecutors said he gave some of the documents to Chinese officials, revealing details of military and space-related technology. Chung, a former Boeing employee, was sentenced to more than 15 years in prison.

***

Chinese Industrial Espionage: Technology Acquisition and Military Modernization provides the most thorough and insightful review to date of the covert and overt mechanisms China uses to acquire foreign technology. Delving into China’s “elaborate, comprehensive system for spotting foreign technologies, acquiring them by every means imaginable and converting them into weapons and competitive goods,” the book concludes that “there is nothing like it in the world.” (2-3) The People’s Republic of China (PRC)  is implementing  “a deliberate, state-sponsored project to circumvent the costs of research, overcome cultural disadvantages and ‘leapfrog’ to the forefront by leveraging the creativity of other nations,” thereby achieving  “the greatest transfer of wealth in history.” (78, 216)

Although PRC espionage is global in scope, the most important target is the United States. Relying primarily on Chinese-language government and non-government sources, the coauthors intend to raise awareness of the threat nationally and alert decisionmakers to the gravity of the problem. Trained as Chinese linguists, with considerable experience dealing with Chinese affairs, they are uniquely qualified for the task. William C. Hannas has a Ph.D. in Asian languages, published two books on Asian orthography and served in various US government posts, including at the Joint Special Operations Command. James Mulvenon is a leading expert on Chinese cyber issues and has published widely on China’s military affairs and communist party-army relations. Senior analyst Anna B. Puglisi studied in Beijing and subsequently was a visiting scholar at Nankai University, where she studied China’s science and technology (S&T) policies and infrastructure development.

Download PDF for complete review. [PDF 264.1KB*]