• Tools and Resources
  • Customer Services
  • Corrections
  • Crime, Media, and Popular Culture
  • Criminal Behavior
  • Criminological Theory
  • Critical Criminology
  • Geography of Crime
  • International Crime
  • Juvenile Justice
  • Prevention/Public Policy
  • Race, Ethnicity, and Crime
  • Research Methods
  • Victimology/Criminal Victimization
  • White Collar Crime
  • Women, Crime, and Justice
  • Share This Facebook LinkedIn Twitter

Article contents

Finance crime.

  • Arjan Reurink Arjan Reurink Divison of Sociology of Markets, Max Planck Institute for the Study of Societies
  • https://doi.org/10.1093/acrefore/9780190264079.013.272
  • Published online: 20 November 2018

Finance crime, that is, white-collar crime that occurs in the markets for financial goods and services, appears to be pervasive in 21st-century capitalism. Since the outbreak of the global financial crisis of 2007–2008, virtually all established financial institutions have been implicated in finance crime scandals, ranging from the mis-selling of financial products to money laundering and from insider dealing to the rigging of financial benchmarks. The financial stakes involved in such scandals are often significant, and at times have the potential to destabilize entire economies. This makes the phenomenon of finance crime a highly relevant topic for white-collar crime researchers. A major challenge, however, for those studying the phenomenon of finance crime is to engage with the complex mechanics of finance crime schemes. These often involve esoteric financial instruments and are embedded in arcane market practices, making them seem impenetrable for those unfamiliar with the intricacies of financial market practices. A helpful way to make the empirical universe of finance crimes intelligible is to construct a typology. This can be meaningfully done by distinguishing finance crimes by the different rationales that underlie the laws and regulations they violate. Doing so renders five main types of finance crime. These are (i) financial fraud, (ii) misuse of informational advantages, (iii) financial mis-selling, (iv) market price and benchmark manipulation, and (v) the facilitation of illicit financial flows.

White-collar crime scholars have taken various theoretical and analytical approaches to the study of finance crime. Some scholars have studied finance crimes in the light of their macro-institutional contexts. Such approaches are based on the premise that actors find meaning—motivations and rationalizations—and opportunities for their actions in the cultural and institutional environments in which they are situated and that such environments can be criminogenic in the sense that they structurally facilitate or even promote illegal behaviors. Others have studied the organizational dimensions of finance crime, looking at both the social networks through which finance crimes are perpetrated as well as the ways in which these networks are embedded in broader organizational and industry structures. Still others have studied the costs, consequences, and victims of finance crimes. Finally, some white-collar crime scholars have studied the ways in which societies create legal regimes that prohibit certain financial market practices as well as how these prohibitions are subsequently enforced by regulatory agencies, public prosecutors, and the courts.

  • finance crime
  • financial crime
  • financial misconduct
  • financial fraud
  • financial corruption
  • white-collar crime

Defining Finance Crime

The term “finance crime” is used here to refer to white-collar crimes that occur in the markets for financial goods and services—that is, banking, investment, securities, mortgages, pensions, and insurance. In accordance with standing practice in the broader white-collar crime literature, the “crime” label is used here in a broad sense as a characteristic of a course of action that provides sufficient grounds for a regulatory enforcement action, successful private litigation, criminal prosecution, or all of these. Thus understood, the notion of finance crime is not limited to conduct that breaches criminal laws but includes a wide range of regulatory and civil offenses, ranging from the mis-selling of financial products to money laundering and from insider dealing to the rigging of financial benchmarks.

Most white-collar crime researchers make no explicit conceptual distinction between white-collar crime and finance crime. There are, however, good reasons to do so. As Friedrichs ( 2013 ) notes, the financial stakes involved in finance crimes are typically much larger than those involved in other types of white-collar crime and in some cases, finance crimes have the potential to destabilize entire economies. To this could be added that the social context in which most finance crimes take place is a unique one. Criminological and anthropological work has suggested the existence of a distinct finance subculture in which “amorality” is the guiding principle and in which transgression has become an occupational risk that is no longer subject to the discourse of criminality (Luyendijk, 2015 ; Stanley, 1996 ; Tillman, Pontell, & Black, 2018 ). This unique finance culture is both reflected in and facilitated by the physical isolation of financial centers such as Wall Street, Canary Wharf, and the City of London, from surrounding business activities. A third reason to conceptually distinguish finance crime from other forms of white-collar crime has to do with the unique challenges related to the social control of such crimes. Many of these crimes are committed by, or in the context of elite financial institutions that sit at the very heart of the global economy and that maintain close ties with countries’ economic and political elites. As a result, those responsible for policing those institutions are reluctant to use the full force of the law, as they fear this could imperil the stability of entire economies as well as their own career prospects. Moreover, these influential connections go a long way in explaining the lack of regulatory scrutiny that allows financial elites to commit their crimes in the first place.

A Typology of Finance Crimes

Finance crimes come in many forms. Concrete acts of finance crime vary widely in their representation, depending on the market segments in which they are perpetrated, the financial instruments they pertain to, and the actors involved. Not only is the empirical universe of finance crimes a vast one, it also is a highly complex one. This is because finance crimes often involve esoteric financial instruments and are embedded in arcane market practices and institutional arrangements. As a result of this, the empirical universe of finance crimes may seem impenetrable to those who lack the necessary knowledge about the intricacies of financial market practices. To make the empirical universe of finance crimes intelligible and to facilitate future research, this section presents a typology that distinguishes different acts of finance crime by the different rationales that underlie the laws and regulations they violate.

Financial Fraud

A first type of finance crime is that of financial fraud. The term financial fraud is used here to refer to the unlawful falsification, manipulation, or omission of financial information with the aim of inducing other market participants to enter into financial contracts where, given perfect information, they would not have done so. Financial information acts as the linchpin for financial market transactions. Participants in financial markets merely exchange intangible rights and obligations, the present and future value of which depends entirely on the status and future performance of the issuer (Lomnicka, 2008 ). Thus, no financial market participant can make proper decisions with regard to engaging or not engaging in financial contracts without having accurate information about the contract itself, the issuer of the contract, and contextual conditions affecting the contract. To facilitate the provision of information to the market and to safeguard the integrity of such information, financial regulators have imposed disclosure requirements as a central pillar of financial market regulation in all developed financial markets. Disclosure requirements prescribe that issuers of financial instruments and providers of financial services disclose to the market and their counterparties all relevant information and that they do so in a timely manner. By disseminating lies and untrue facts, financial fraudsters corrupt this essential flow of information. Conceptually, it is possible to distinguish between two subtypes of financial fraud.

Financial Statement Fraud

A first subtype of financial fraud is that of financial statement fraud. Financial statement fraud occurs when financial market participants make false statements about the true nature or financial health of an investment outlet—a company, fund, borrower, or investment product. Notwithstanding the deceptive element, misrepresentations that constitute financial statement fraud pertain to otherwise legitimate enterprises, actors, or products. This distinguishes them from investment scams, which make up the second subtype of financial fraud. Financial statement frauds can be observed in a great variety of contexts. For example, a company’s management may issue fraudulent financial statements to mislead investors or regulators about the financial health and future prospects of the company. Such financial statement fraud in the context of publicly listed corporation is also commonly referred to as “accounting fraud.” Alternatively, actors seeking insurance or applicants for mortgage loans may make false statement about their income, assets, or liabilities in an attempt to ensure better terms for a financial contract.

Another context in which financial statement frauds have repeatedly surfaced over the last decades is at the proprietary trading desks of securities firms and investment banks. Securities traders working at these trading desks have repeatedly been found to have manipulated accounts and internal control systems to cover up unauthorized trades or to make their trading activities look more profitable and/or less risky than they were. The “rogue trading” case that is probably most infamous is that of Nick Leeson, a young derivatives trader working at the British investment bank Barings who lost over a $1 billion for the firm in an elaborate scheme that he built up over three years (see Fisher QC, 2015 ; Kane & DeTrask, 1999 ; Krawiec, 2000 ). Leeson began his career at Barings in 1989 , settling trades in the bank’s back office. After being transferred to the Baring’s Singapore office, Leeson was soon promoted to become a speculative trader dealing in futures contracts. From his promotion in 1992 until early 1995 , Leeson reported increasingly large profits on apparently riskless arbitrage trading. The large profits he made for the bank, soon granted him the status of star trader and motivated management to subject him to less stringent trading limits and less oversight. Leeson was even permitted to settle his own trades, a highly unusual and questionable combination of roles. As it later turned out, Leeson in fact started to experience losses not long after he commenced trading for the bank. Hoping that he could trade out of trouble, Leeson speculatively increased his positions in futures contracts in the hope that the market would turn and revert to an upward trend. Meanwhile, he used an error account—superstitiously numbered 88888—to conceal his deteriorating trading positions. Leeson persuaded a back-office programmer to alter the Barings account system so that information about the account would not be reported back to the head office in London. Investigations conducted after the scandals revealed that on multiple occasions management at Barings had received warnings from auditors, competitors and SIMEX, the exchange on which Leeson was trading. However, given the large profits reported by Leeson, management choose not to act upon those warnings, effectively joining Leeson in his gamble that the market would move in favor of his trading positions. Leeson was eventually sentenced to several years in prison.

Investment Scams

The second subtype of financial fraud is that of investment scams. Investment scams are deceptive and fully fraudulent schemes in which fraudsters, often assuming a false identity or exhibiting a misplaced aura of trustworthiness, convince, mislead, or induce people to voluntarily interact with the fraudster and, ultimately, to willingly hand over money or sensitive information related to their personal finances. (Reurink, 2016 , p. 35)

Financial scams are different from financial statement frauds in that, unlike the latter, they are designed from the beginning as con games or larceny schemes.

The investment scam that has in recent years attracted most media coverage and academic scrutiny is the multibillion Ponzi scheme perpetrated by Bernard Madoff. Although exact figures vary from source to source, Madoff allegedly cheated about 4,000 to 10,000 investors in his scheme of somewhere between $15 billion and $65 billion (Geis, 2013 , p. 89). In the scheme, which lasted over an extended period of approximately 40 years, Madoff offered his clients—a truly global clientele that included large and established financial institutions—an unfluctuating return of 10% to 12% per year regardless of market conditions (Nolasco, Vaughn, & Del Carmen, 2013 , p. 376). Madoff explained these returns as the result of a complex “split-strike conversion” investment strategy. In reality, Madoff never made any investments, instead using the money coming in from newly acquired clients to pay returns to existing clients. What in hindsight comes as a surprise is that apparently his clients never exercised any serious due diligence. Madoff had his multibillion enterprise audited by Friehling & Horowitz, a little-known three-person accounting firm with only one certified accountant on its payroll (Geis, 2013 , p. 90). Even more surprising is that not only investors but also regulators took Madoff on trust. Over the years, investigators conducted several investigations into Madoff’s enterprise but never bothered to cross-check trades with supposed counterparties and did not check the stock records against the central securities depository: acts that would almost certainly have revealed the scam Madoff was operating (Lewis, 2012 ). As is often the case with Ponzi schemes, it appears that the lack of due diligence was due to the fact that Madoff enjoyed a high level of credibility, both because of his membership in the Jewish community, which harbored many of his clients, and because of his star status on Wall Street.

Misuse of Informational Advantages

This type of finance crime groups a number of behaviors in which financial market participants illegally misuse privileged information not available to other financial market participants. As emphasized in the previous section on financial fraud, information acts as the linchpin for financial market transactions, and regulators in most jurisdictions impose disclosure requirements on financial market participants. As a corollary to the principle of disclosure, securities laws in most countries prescribe that all investors should have equal access to the disclosed information. The only permissible informational inequalities arise from the various market participants’ abilities to analyze and interpret information. In reality, however, information is not evenly distributed. Some financial market participants have informational advantages over others. This may be due, for instance, to a managerial position in a firm or a work role that in some other way exposes them to undisclosed information. Although having such an informational advantage is not in itself illegal (in fact, the existence of informational advantages cannot realistically be avoided), improper disclosure (tipping others off) or trading upon it prior to disclosing it to the market has been prohibited by law in most countries.

Insider Trading

The classical example of the misuse of informational advantages is “insider trading,” which refers to trading on the basis of undisclosed information in the market for corporate securities. Such undisclosed information may involve confidential knowledge of imminent takeovers, quarterly earnings that are about to be reported, or the public announcement of a successful patent application. Such information is typically obtained through corporate insiders: actors that have privileged access to information about the operations and strategy of a publicly listed firm due to the fact that they hold a managerial or boardroom position in the relevant firm, they serve in an advisory role (think of investment bankers, accountants, lawyers, consultants), or because they are employed in lower-level positions that expose them to sensitive information (think of administrative staff responsible for preparing and printing of a firm’s annual reports). Once disclosed to the market, such information is likely to have significant price effects on the stock of the relevant firm. Market participants engaging in insider trading anticipate these price effects.

A recent high-profile example of insider trading is the case that evolved around the multibillion-dollar hedge fund Galleon and its founder Raj Rajaratnam (Colesanti, 2011 ; Packer, 2011 ). Being a hedge fund, Galleon’s business model was based on voraciously collecting, combining, and analyzing bits and pieces of publicly available information in order to generate unique insights about a company that diverged from the general consensus among investors. By then investing large sums of money in that company’s securities, Galleon hoped to benefit from expected price movements from those securities once the insights became part of the general consensus among investors. Galleon appeared to be highly successful in such information processing. As it later turned out, a considerable part of Galleon’s investment successes were attributable not to enhanced information processing capabilities but to privileged access to confidential inside information obtained illegally through a network of informants. This network included executive managers of large Silicon Valley tech firms, an analyst at credit rating agency Moody’s, as well as people who held prominent positions in the financial sector. Most of the informants held direct or indirect investments in Galleon and thus benefited personally from the unlawful trades they helped it to make. One example of such a trade took place at the height of the financial crisis of 2008 . Goldman Sachs’ board of directors held a conference call in which CEO Lloyd Blankfein announced that Warren Buffet, one of the world’s most respected investors, was about to make a $5 billion investment in Goldman Sachs. Among those participating in the call was Rajat Gupta, CEO of management consulting firm McKinsey, member of the board of directors of Goldman Sachs, and part of Rajaratnam’s network of informants. At a time when investors held a considerable mistrust of banks’ stocks, Buffet’s investment would be an important vote of confidence in the stability of Goldman Sachs. The news was about to be revealed to the wider public that evening after the markets had closed. The conference call had ended at 3:54 pm. One minute after that, Gupta called Rajaratnam to share with him this confidential piece of information. At 3:58 pm, just two minutes before the markets closed, Rajaratnam executed a large buy order, worth $43 million, of Goldman Sachs shares. Later that night, the world would learn about the Buffet investment, causing Goldman Sachs share prices to rise and resulting in considerable profits for the Galleon Group.

Front-Running

Another way in which financial market participants have been found to illegally exploit informational advantages is through a practice that is known as “front-running.” Front-running occurs when a market actor takes advantage of having nonpublic knowledge of a large impending financial market transaction that is likely to significantly influence the price of a given security (Adrian, 2016 ). One group of financial market actors that is traditionally associated with front running is that of broker-dealers (Comerton-Forde & Mei Tang, 2007 ). Broker-dealers simultaneously act as agents, executing orders on behalf of clients, and as principles, trading on their own account. When broker-dealers receive and collect orders from their clients they thus obtain relevant information about upcoming market transactions that are not yet known to other market participants. As these client orders need to be executed by the broker, the broker can easily place his own order prior to that of the client. Such front running enables the broker to profit from the anticipated price movement the client’s transaction is likely to affect. Regulators in most jurisdictions have explicitly prohibited broker-dealers from front running their clients and tipping off others about their client’s orders.

In the 21st century , concerns about front running have also been raised in relation to high-frequency traders (Adrian, 2016 ; Lewis, 2015 ). High-frequency traders are stock market players that make use of cutting-edge technology and complex algorithms to rapidly buy and sell securities, which they only hold for a fraction of a second. High-frequency traders have become an important force in contemporary stock markets. It has been estimated that in the U.S. stock markets today, high-frequency traders are responsible for 50% to 70% of total trading volume (Adrian, 2016 ). Among the many trading strategies adopted by high-frequency traders are some that resemble the broker-dealer front-running practices discussed previously. However, for high-frequency traders to engage in front running requires a little more ingenuity. High-frequency traders exclusively trade on their own account. They thus lack the benefit of having direct access to information about upcoming client orders. Instead, high-frequency traders that engage in front running use a number of techniques that rely on sophisticated algorithms and trading pattern recognition software to “sniff out” impending orders and then use their extraordinary computer and processing power to “run ahead” of these orders as they travel from one exchange to another (see Adrian, 2016 , for a detailed description of these techniques). Such practices have triggered new debates about the effectiveness of existing protections against front running and regulations designed to guarantee equal access to information more generally. A key issue in this debate concerns the meaning of the legal notion of “public information” in a world in which anyone can access pieces of information simultaneously; yet only those with the financial means to make large investments in computer power and data processing infrastructure are capable of combining the pieces of information to see the whole puzzle (Adrian, 2016 ).

Financial Mis-Selling

Financial mis-selling constitutes a third type of finance crime. Financial mis-selling can be defined as “the deceptive and manipulative marketing, selling, or advising of a financial product or service to an end user while knowing that that product or service is unsuitable for that specific end user’s needs” (Reurink, 2016 , p. 53). As has been emphasized before, financial market participants cannot make proper decisions with regard to engaging or not engaging in financial contracts without having accurate information. However, even when financial market participants do have access to adequate information, they still need to be able to interpret and extract meaning from this information with regard to the future performance of a contract. Many financial market participants lack the financial expertise to do so. To protect those financial market participants that are deemed not to have sufficient expertise from being exploited by more sophisticated market players, legal systems impose fiduciary duties or suitability requirement on certain financial market participants. Fiduciary duties and suitability requirement, which are especially pertinent in retail financial markets, prescribe that financial service providers and financial advisers share some of the knowledge and expertise they hold so that clients or customers can make informed decisions about financial transactions. Financial mis-sellers violate these legal stipulations by making misleading and speculative statements about the suitability of a financial product or service for a specific end user.

Mis-Selling in Retail Financial Markets: Predatory Lending

Financial mis-selling practices are widespread in both the retail and the wholesale segments of 21st-century financial markets. In retail financial markets, mis-selling practices manifest themselves typically not as isolated incidents but tend to become institutionalized throughout entire industries. Examples of such industry-wide mis-selling scandals are the life insurance mis-selling scandals in the United Kingdom, India, and the Netherlands (Anagol, Cole, & Sarkar, 2013 ; J. Black & Nobles, 1998 ; Ericson & Doyle, 2006 ), the payment protection insurance scandal in the United Kingdom (Ashton & Hudson, 2013 ; Ferran, 2012 ), and the interest rate swap scandals in the United States, the United Kingdom, Belgium, and the Netherlands (Marshall, 2014 ; Zepeda, 2013 ). The mis-selling scandal that has probably received most attention in recent years is the one that occurred in the U.S. market for subprime mortgage loans. Commonly referred to as “predatory lending,” the mis-selling of mortgage loans involves a wide range of practices that include charging excessive fees, steering borrowers into bad loans that net higher profits, making unaffordable loans based on the borrower’s assets rather than on the borrower’s ability to repay, inducing a borrower to repeatedly refinance a loan in order to charge high points and fees each time the loan is refinanced, or to induce, convince, or mislead a borrower into signing a loan where income, credit, or assets are misrepresented and the loan is unsustainable (Barnett, 2013 , pp. 110–111; Nguyen & Pontell, 2011 , p. 9). Although predatory lending is hard to define, a common trait shared by all of these practices is that they steer borrowers into mortgages or loans that they either cannot afford or that are much worse than other available offers on the market, making them unsuitable for the borrower.

Mis-Selling in Wholesale Financial Markets

In wholesale financial markets, mis-selling scandals typically involve large one-off transactions between investment banks and their clients, institutional investors, and other financial institutions. One especially notorious example of such a transaction is what has become known as the ABACUS case. The ABACUS 2007 -AC1 transaction was a contract between a group of banks and institutional investors that involved a $2 billion synthetic collateralized debt obligation (CDO) that referenced a pool of mortgage-backed securities. Acting as underwriter in the transaction, Goldman Sachs, and especially one of its lead salespeople, Fabrice Tourre, allegedly tricked investors into investing in the synthetic CDO, while knowing it to be a bad investment. Not only did Tourre endorse the viability and soundness of the housing market while fully aware of the impending future of that market, he had also forgone to disclose material information about a significant conflict of interests involved in the construction of the instrument. 1 This conflict of interest consisted in the fact that the reference portfolio had been assembled by hedge fund manager John A. Paulson of Paulson & Co. Inc., whose firm had subsequently taken a short position on that same CDO. Acting accordingly with his short position, Paulson had carefully selected a portfolio of assets that he knew to be of poor quality. The deal was closed on April 26, 2007 , and by October 24 of that same year, about 83% of the loans included in the reference portfolio had been downgraded (Rosoff et al., 2014 , p. 261), resulting in major losses for the investors in the ABACUS CDO—in particular the German bank IKB and Dutch bank ABNA AMRO. Goldman Sachs invoked caveat emptor in its defense and maintained no legal wrongdoing (Fligstein & Roehrkasse, 2013 , p. 28). The case was eventually settled on the grounds that a “mistake” had been made by Goldman Sachs (Dorn, 2011 , p. 162).

Market Price and Benchmark Manipulation

A fourth type of finance crime is that of market price and benchmark manipulation. Market price and benchmark manipulations are schemes that illegally interfere in the price-forming mechanism of securities markets by creating a misleading impression as to the supply, demand, or the market liquidity of a specific security. To protect the integrity of the market’s price-forming mechanisms and to maintain investors’ confidence in its orderly operation, legislators and regulators have established anti-manipulation rules. Such rules prescribe that it is prohibited to intentionally and without legitimate economic motivation cause prices to deviate from what are deemed to be their economic fundamentals. Market manipulators violate those rules. The price distortion that is at the heart of any market manipulation scheme may be effectuated in various ways, resulting in four subtypes of market price and benchmark manipulations (Ledgerwood & Carpenter, 2012 ; Pirrong, 2010 ).

Market Power–Based Manipulation: Corners and Squeezes

One way in which the price-forming mechanism of the market could be corrupted is through the manipulative use of market power. Market power refers to the ability of a financial market participant or a group of financial market participants to control the supply or demand in a certain market to the extent that they can dictate prices in that market. In market jargon, such schemes are known as “corners” or “squeezes.”

A good example of a market manipulation scheme based on the manipulative use of market power is the Salomon Brothers Treasury bond scandal (Instefjord, Jackson, & Perraudin, 1998 , pp. 610–611; Partnoy, 2002 ). In 1990 , Paul Mozer, chief government bond trader of the investment bank Salomon Brothers, devised a hugely profitable scheme to manipulate the U.S. government bond market. To understand Mozer’s scheme, it is important to get familiar with the way in which the Treasury bond market functioned at the time. When the U.S. government wants to borrow money on the capital market, it issues Treasury bonds. These bonds are not sold in an open market but are auctioned in a “primary dealer system,” in which designated broker-dealers, so-called primary dealers, bid against each other for a share of the issue. The role of the primary dealers is to then distribute the bonds to investors in a secondary market. In reality, however, the primary dealers would find buyers for the Treasury bonds already before the auction actually took place. This they did in the so-called when-issued market. In this market, primary dealers would sell future rights to Treasury bonds that did not yet exist but that would be created shortly “when issued” by the Treasury in its next auction. At the time, the U.S. treasury had designated 40 primary dealers, of which Salomon Brothers was the largest. To prevent these primary dealers from obtaining a share of an issue large enough to control the price of the bonds in that issue, the U.S. Treasury had put in place a rule that no firm could bid for more than 35% of an issue. To get around this rule, Mozer began bidding not just on his own account but also on behalf of some of his clients (without their permission). When these bids were successful, he would then arrange an immediate sale of the bonds from the client’s account to his own account. In this way, Mozer managed to gain control of a significant share of bonds in several issues, effectively creating a monopoly for himself in the when-issued market for those specific issues. At one time, Mozer even ended up controlling $10.6 billion of an $11.3 billion issue. Other dealers, who needed the bonds to fulfill their obligations to sell in the when-issued market, saw no other option than to buy the bonds from Mozer, who, of course, was willing to sell them only against an artificially inflated price.

Trade-Based Manipulation: Banging the Close

Another way in which the price movement that is central to a market price manipulation scheme could be achieved is through manipulative and uneconomic trades. These are trades in which market participants leave legitimate business purposes behind and engage in trades with the sole purpose of distorting prices in the market. Abstracting somewhat from their often mindboggling complexity, trade-based market manipulation schemes typically consist of two parallel activities that together enable the perpetrator to make illegal profits (Ledgerwood & Carpenter, 2012 ). First, the manipulator engages in a price-making trade. This price-making trade (the trigger), which typically represents a money-losing trade on a standalone basis, causes a certain price or benchmark (the nexus) to move either up or down. This artificial price movement is then translated into illegal profits through a parallel activity that consists of the perpetrator(s) occupying a price-taking position (the target) in a market that is in one way or the other affected by the manipulated price or benchmark. In many cases trade-based manipulation schemes involve financial derivatives. These are financial contracts between two or more parties, the value of which is derived from an “underlying” security or index. 2 Manipulators then benefit from the payoff on their derivatives position by manipulating the price of the underlying security or index.

One example of a trade-based manipulation strategy is what is known within the industry as “banging the close.” In this strategy, traders place a large quantity of uneconomic trades in a market from which the settlement price for a certain derivative contract is derived, just before the closing period of that derivative contract (i.e., the period during which the settlement price is determined). By way of illustration, consider the case of Amaranth, an American hedge fund that was highly invested in speculative positions in the market for natural gas. In 2007 , both the U.S. Commodities Futures Trading Commission (CFTC) and the U.S. Federal Energy Regulatory Commission (FERC) leveled enforcement actions against Amaranth and Brian Hunter, a trader working in Amaranth’s energy trading department, accusing them of manipulating the price of natural gas futures contracts traded on the New York Mercantile Exchange (NYMEX) (Markham, 2014 ). On behalf of Amaranth, Hunter had entered into large volumes of derivative contracts on the Intercontinental Exchange (ICE) and elsewhere. The final settlement price of these contracts was based on the price of natural gas future contracts traded on the NYMEX. Specifically, the prices in that market as recorded during the last 30 minutes of trading before the closing of the ICE derivative contracts. Hunter’s derivatives positions on the ICE and elsewhere stood to benefit from a lower settlement price of the NYMEX futures. Rather than letting the fate of his derivatives position be determined by unencumbered market forces, Hunter decided to take fate into his own hands. According to the CFTC allegations, for each of the expiry days at issue, Hunter acquired more than 3,000 NYMEX natural gas futures contracts, which he then sold during the 30-minute settlement period. This massive selloff drove down prices during the settlement period. Ultimately, the artificially lowered prices of the NYMEX futures resulted in large payoffs to Amaranth’s swap positions on the ICE and elsewhere. Although both Amaranth and Hunter never admitted any guilt, Amaranth settled with the CFTC and FERC for a civil penalty of $7.5 million and Hunter agreed to a permanent trading ban and to pay a $750,000 civil penalty to settle the CFTC case.

Information-Based Manipulation: Pump and Dump Schemes

When perpetrators of market manipulation schemes lack the ability to move prices in the market by themselves, they may induce others that are not involved in the scheme to cause the desired price movement. This can be achieved through the manipulative dissemination of information. In such information-based manipulation schemes, which constitute a third subtype of price and benchmark manipulations, perpetrators disseminate false information about the issuer of a security, the security itself, or events that may impact the future prospects of the market for a specific security in order to affect demand and supply—and ultimately the price of the security.

The quintessential information-based manipulation scheme is what is often referred to as a “pump-and-dump” operation. Through online chatrooms, spam e-mails, or cold calls made from so-called boiler rooms, pump-and-dump operators create excitement about a security they have previously invested in only to sell them after their fraudulent promotion of the security has pushed up the price. Typically, this involves low-priced securities traded in small volumes in the over-the-counter market, rather than on an exchange. Such securities are ideal for pump-and-dump operations because they require minimal initial investment by the perpetrator and allow a small amount of investment activity to generate wild swings in price.

An iconic case of a pump-and-dump operation is the one executed in the early 1990s by Jordan Belfort, also known as the “Wolf of Wall Street” (Belfort, 2007 ). Belfort, together with his business partner Daniel Porush, used his brokerage firm Stratton Oakmont to execute numerous aggressive pump-and-dump schemes through which he swindled investors out of some $250 million (Tillman & Indergaard, 2005 , pp. 42–52). Many of these schemes involved initial public offerings (IPOs), in which Belfort and Porush managed to gain control of the majority of a company’s outstanding stock just before their brokerage firm Stratton Oakmont was about to take the firm public in an IPO. One such IPO involved the executive recruiting firm Solomon-Page Group. In June 1993 Belfort and Porush paid $250,000 for 700,000 shares of Solomon-Page. That is about $0.36 per share. A little over a year later, in October 1994 , Stratton Oakmont took the firm public in an IPO on the NASDAQ stock exchange. To soothe NASDAQ concerns triggered by the fact that a large proportion of Solomon-Page shares was owned by executives of the very brokerage firm underwriting the IPO. Belfort and Porush sold all of their shares. But instead of actually distancing themselves from their vested interest in the Solomon-Page stock, they sold their shares to a number of Stratton-connected people, nine of which worked as brokers for Stratton Oakmont. After actively promoting the IPO among its clients, Stratton Oakmont took Solomon-Page public at an opening price of $6.50 a share. Shortly after the IPO, one of the company’s largest customers announced it was taking its business elsewhere, causing the value of the stock to plummet, so that by July 1995 the stock was trading around $2 per share. By this time, of course, insiders to the deal had already sold their shares for substantial profits (Tillman & Indergaard, 2005 , pp. 43–44).

The logic that underpins classical pump-and-dump schemes is, however, not confined to thinly traded securities in over-the-counter markets. It can also be seen at work in the more institutionalized spheres of the public stock markets. As Tillman and Indergaard ( 2005 ) have convincingly argued, during the Internet boom of the 1990s, established investment banks engaged in manipulative practices that resemble in many ways the classical pump-and-dump schemes previously discussed. At the time, highly influential security analysts of respected Wall Street firms would hype the shares of large telecom companies by giving “buy” or “strong buy” recommendations for those firms’ shares, irrespective of their true beliefs about those firms’ financial conditions. When the over-hyped and over-priced shares collapsed, as they inevitably would, ordinary investors were left bewildered with worthless shares, while elite investors had already left the market before the fall.

Benchmark Manipulation

In some cases market manipulation schemes do not target prices per se; they target price indices or benchmark rates. Such benchmark manipulations constitute a fourth subtype of market price and benchmark manipulations. Price indices and benchmarks, such as the S&P 500 or LIBOR, summarize market prices and have become increasingly relevant in contemporary financial markets. They are used by market participants to compute the day-to-day value of their holdings and are often hardwired into financial regulations and private contracts. As a result, manipulating a price index or benchmark rate can be as consequential as manipulating the underlying prices. Moreover, because benchmarks are typically derived from only a small slice of the market, they are often easier to manipulate than prices themselves (Verstein, 2015 ).

The exact techniques that manipulators apply to manipulate a price index or benchmark rate very much depends on the exact way in which that specific rate is set. Each benchmark rate has its own unique rate-setting procedure. However, most of them, in one way or the other, rely on either one or a combination of the following two methods. The first method takes a snapshot of actual trades in the market. For example, WM/Reuters rates, a leading set of benchmark rates that reflect the price of different currencies in the foreign exchange market and used to compute settlement values for a variety of derivative contracts, are derived from trades executed on the Thompson Reuters electronic trading platform, especially those trades taking place during the 60-second window just before 4 pm London time; the so-called London Fix. The second rate setting method relies on quotes submitted by nominated specialists who are considered experts in the relevant market. Exemplary of this method are the so-called London Interbank Overnight Rates (LIBOR), a set of benchmark rates for short-term interest rates widely used as a reference rate in financial contracts. To compute LIBOR rates, a panel of nominated experts drawn from selected banks, so-called submitters, are asked at the start of each trading day to indicate the rate they estimate their bank could borrow funds, were they to do so, from other banks in the London interbank market at various maturities and in various currencies. LIBOR rates for each currency and each maturity are then determined by averaging the rate quotes reported by the rate-setting panel for that term and that specific currency. As these quotes are not based on actual market transactions, they are sometimes referred to as “off-market rate quotes.” As recent scandals have shown, both methods can be susceptible to manipulation when appropriate measures to safeguard the integrity of the rate-setting process are not in place.

As an illustrative example of benchmark manipulation, consider the ISDAfix manipulation scandal that surfaced in 2013 . The ISDAfix is a benchmark rate used around the world to value, among other things, interest rate swaps; a specific kind of derivative contract used by corporations, fund managers, and local governments to manage risks stemming from fluctuations in the interest rates they pay on their debts. The ISDAfix rate, which is set and published daily by the London-based brokerage firm ICAP, affects financial assets totaling around $379 trillion, making any successful manipulation of the rate highly consequential. The rate-setting procedure of ISDAfix at the time combined the two broad approaches mentioned above. In the first stage of the rate-setting process, ICAP would establish a “reference rate,” which captured the average rate at which interest rate swaps were trading on the ICAP trading platform at 11 am each morning. Subsequently, in the second stage, dealers at nominated panel banks would submit their own rate quotes, which were supposed to reflect at which price the dealer would himself be willing to buy and sell an interest swap in a given currency and of a given maturity, were he to do so, in the market. In the third, and final, stage, ICAP would adjust the reference rate on the basis of the rate quotes submitted by the dealers at the panel banks and publish the final ISDAfix benchmark rate for that day.

In 2013 , it was revealed that dealers/submitters at panel banks, in close collaboration with ICAP brokers/rate setters, had attempted to manipulate the ISDAfix rate almost every day during the period between 2007 and 2012 (Taibbi, 2013 ). The reason they did so was to benefit derivatives positions held by those dealers who were linked to the ISDAfix rate. The dealers/submitters used different techniques to achieve their attempted manipulation. In a first stage, panel bank dealers engaged in large quantities of trades in interest rate swaps just prior to the 11 am setting window. Rather than serving legitimate business purposes, and thus reflecting true supply and demand in the market, these were uneconomic trades designed with the sole purpose of affecting the market prices of interest rate swaps that would feed into the reference rate. 3 These manipulative trades could, of course, only be successful if they were coordinated. To do so, panel bank dealers communicated with each other through electronic chat rooms and other forms of private communication to determine whether there was a collective desire to manipulate the ISDAfix rate and, if this was the case, in which direction the rate was to be manipulated. In addition to this, dealers/submitters would make false submissions to the ICAP poll. Instead of submitting quotes that truly reflected the prices at which they were willing to buy and sell in the market, panel bank dealers submitted quotes that were close to or similar to the reference point and thus merely reflected dealers’ desire to manipulate ISDAfix rates. Here again, panel bank dealers seem to have coordinated their manipulative actions. Econometric analysis conducted on behalf of a class action complaint filed by an Alaska pension fund has shown that panel bank dealers regularly submitted quotes that were exactly or almost exactly the same, a pattern that is extremely unlikely to occur without explicit coordination (see Alaska Electrical Pension Fund v. Bank of America Corporation and others , 2014 ).

Facilitation of Illicit Financial Flows

This type of finance crime groups together schemes in which financial institutions provide financial services to illicit actors or to actors that use these financial services to engage in illicit activities. To safeguard the integrity of financial markets and to assist the fight against organized crime, terrorism, and tax evasion, the international community and individual countries have developed rules and regulations aimed at preventing illicit actors from using the formal financial systems. These rules and regulations are often referred to as the anti-money laundering (AML) framework. The AML framework grew out of concerns with drugs-related crime in the 1980s. In the 1990s it was also adopted in the fight against organized crime, and after 9/11 it became a cornerstone in the “War on Terror.” Today, its scope has been extended to issues related to tax evasion, kleptocracy, and grand corruption. The AML framework relies primarily on so-called know-your-customer (KYC) requirements, sometimes also referred to as Customer Identification Programs (CIP). KYC requirements prescribe that financial institutions must identify and verify the identity of those they provide financial services to. As a corollary to KYC rules, regulators require financial institutions to file a so-called suspicious activity report (SAR) to designated law enforcement agencies whenever a customer’s identity or financial activities are in some way suspicious and may indicate money laundering or the financing of illegal activities. Despite heavy penalties attached to violations of AML policies, financial institutions, especially banks, have repeatedly been found to do business with illicit actors. Among other things this involved the accepting of funds that had criminal origins, the administration of bank accounts linked to organized crime or terrorist organizations, the processing of transactions related to financial fraud or corruption, and the knowingly assisting of tax evaders in hiding their assets out of sight of tax authorities.

Facilitation of Money Laundering

Money laundering can be defined as the process by which funds obtained through illegal activities are disguised and cloaked in legitimacy to hide the link between the criminal, the crime, and the funds obtained from it, whereby the criminal nevertheless retains control over those funds. A standard, albeit frequently critiqued (e.g., Platt, 2015 ) description of the money laundering process identifies three stages. In the placement stage illicit funds are put into the formal financial system. When it concerns the proceeds of cash-generative crimes such as drug trafficking placement may involve the depositing of large amounts of cash in bank accounts. Where other types of crime are concerned, such as insider trading or corruption, the placement stage is obsolete because the proceeds of the crime are already in the formal financial system at the moment the crime is committed (Platt, 2015 ). The layering stage then serves the purpose of making it difficult for law enforcement agencies to uncover the trail that links the illicit funds to their source. This is done by moving the funds via electronic transactions through the financial system. Typically, this layering involves nested structures of anonymous shell companies registered in jurisdictions that have weak corporate transparency laws or that only halfheartedly enforce such laws. These shell companies in turn hold bank accounts in yet other jurisdictions that tend to have strong bank secrecy legislation. Finally, in the integration stage, the funds reenter the legitimate economy where criminals use them for their benefit and enjoyment. They may, for example, invest the funds into real estate, business ventures, or choose to purchase luxury items such as yachts or jets. Financial service providers play a crucial role throughout the money laundering process. Attracted by cheap funding and the hefty fees they can charge for services rendered to customers whose financial dealings require “special” treatment, banks have proven time and again willing to turn a blind eye to KYC requirements or to fail to report suspicious transactions in order to do business with criminal actors.

A recent high-profile case that aptly reveals how banks may be involved in the money laundering process is that of Wachovia. In 2010 , Wachovia admitted in a deferred prosecution agreement that it had provided Mexican drug cartels with a gateway through which $110 million of proceeds from the illegal drugs trade could enter the U.S. financial system ( United States of America v. Wachovia Bank, N.A ., 2010 ). This gateway was intermediated by so-called Casas de Cambio (CDCs) in Mexico. CDCs are licensed currency exchange businesses that enable Mexicans to exchange dollars for pesos in cash or to wire transfer the value of a certain amount of cash to bank accounts in the United States. Because the CDCs are not U.S.-licensed banks, they need the support of a U.S. bank to offer these services. CDCs would therefore hold so-called correspondent accounts with Wachovia in the United States. Correspondent accounts essentially are accounts maintained by one financial institution for use by another. They enable foreign financial institutions to receive and transfer funds into them and thereby to offer their customers banking services in the country and in the currency of the country in which the correspondent account is located. This correspondent relationship between the CDCs and Wachovia, combined with the lack of effective money laundering controls on the side of Wachovia, provided drug dealers with the financial infrastructure to launder millions of dollars of proceeds from the illegal narcotics trade. This worked as follows.

First, drug-trafficking organizations would smuggle large amounts of cash dollars obtained through the selling of drugs in the United States over the border into Mexico. They would then bring the dollars to a CDC. At this point, they had several options. One was to convert the dollars into pesos. This enabled the drug dealers to finance their trafficking operations in Mexico or to spend the pesos for personal benefit. The CDCs stood to gain from these transactions as they provided them with a convenient source of discounted dollars. However, it would leave them with a large amount of dollars in cash. To deal with this situation, the CDCs made use of Wachovia’s so-called bulk cash service, a service that provided for the physical transportation of large amounts of U.S. dollars to the United States. The dollar amount would then be credited to the CDCs’ correspondent accounts they held with Wachovia. Under the AML framework in place in the United States, it was Wachovia’s legal obligation to do KYC checks on the origins of the cash and to report to the authorities any transactions or dealings that appeared suspicious. Joint investigations by several U.S. law enforcement agencies found that Wachovia persistently failed to do so. As court documents of the Wachovia case state, the bank had “no written formal AML policy or procedure for the monitoring of bulk cash to ensure that suspicious activity was reported” ( United States of America v. Wachovia Bank, N.A ., 2010 , p. 9). It did not examine or review the source of the bulk cash and did not check whether the monthly total amounts of cash shipped to the United States by each customer matched what could reasonably be expected from that specific customer.

Not all of the dollars smuggled across the border were exchanged for pesos. In fact, most of the cash dollars that arrived at the CDCs were used to execute wire transfers to U.S. accounts. Under the correspondent account arrangement, Wachovia allowed CDCs to conduct wire transfers through Wachovia. Here again, Wachovia’s intermediating role put it under the legal obligation to conduct KYC suspicious activity checks on those wire transfers. According to the U.S. Department of Justice, Wachovia failed to properly conduct those checks on a staggering $373 billion worth of wire transfers made from CDCs. At least $13 million of those transfers involved wire transfers into the accounts of aircraft brokers. Investigation by U.S. law enforcement agencies found that the individuals and the business in whose name those specific transfers had been made had submitted false identities and that the business was a shell entity. The specific aircraft that was acquired with the transfers was eventually seized by U.S. law enforcement agencies with approximately 2,000 kilograms of cocaine on board.

Facilitation of Reverse Money Laundering

Reverse money laundering (Cassella, 2003 ) involves not the proceeds of past crimes but money intended to be used to commit crimes in the future. Like legitimate enterprises, criminal organizations and rogue states need access to the formal financial system to fund and execute their operations. From a law enforcement perspective this dependence on the formal payment system represents the Achilles heel of criminal organizations and thus provides a meaningful point of entry for countermeasures. Governments and their law enforcement agencies thus publish lists that specify parties (i.e., states, organizations, or individuals) that are to be banned from using a country’s financial system. Banks and financial service providers operating in that country are prohibited from providing financial services, such as the processing of wire transfers or foreign exchange transactions, to parties on those lists. The enforcement of sanction regimes relies largely on their implementation by financial institutions, especially banks. Banks are legally obliged to have due diligence systems in place that automatically filter out and block transactions that contain any reference to sanctioned parties. But banks, or subsidiaries of banks that are eager to do business with sanctioned parties, have repeatedly been found to knowingly and willingly circumvent such systems. To disguise the true beneficiaries of specific transactions and to avoid detection by automatic due diligence systems, some banks have been found to use a technique called “stripping.” Stripping involves bank personnel deliberately removing or falsifying material information about customer identities from payment documentation to cover up the involvement of a sanctioned party. Stripping thus enables banks to process payments for which either the bank’s own sanction screening tools or that of other banks would have raised an alert or that may otherwise have been blocked as the payment processes through a country’s official payment system.

One recent example of such stripping practices involves the French bank BNP Paribas (BNPP). In June 2014 , BNPP pled guilty to criminal charges and was fined $8.9 billion for knowingly and willfully processing transactions worth billions of dollars on behalf of Iranian, Cuban, and Sudanese parties that were subject to U.S. economic sanctions ( United States of America v. BNP Paribas, S.A ., 2014 ). The majority of the transactions, which were all processed in the period 2004 to 2012 , were executed by BNPP’s subsidiaries in Geneva and Paris. These subsidiaries received the requests to execute the transaction either directly from some of their own clients that had been put on the U.S. sanction list, or indirectly from U.S.-sanctioned Sudanese and Cuban banks, which in turn requested the transaction on behalf of some of their clients. Because the transactions were denominated in dollars, they had to pass through BNPP’s New York office and thus were subject to the U.S. sanctions regime. To disguise the parties involved in the transactions and to evade detection by U.S. authorities, BNP Paribas employees in Geneva and Paris stripped identifying information from payment messages sent to the New York office. In addition to this, BNPP Geneva helped to re-route certain transactions through unaffiliated non-Sudanese, non-U.S. banks; so-called satellite banks. As a result of this, to the U.S. bank it appeared that the transactions were coming from the satellite bank rather than the Sudanese bank. It appears that these practices were widely known and condoned by BNPP’s senior executives. Internal e-mails that are referred to in court documents showed that from 2005 onward, BNPP compliance staff had repeatedly raised concerns, but time and again these concerns were dismissed by senior executive because of the substantial commercial stakes involved in BNPP’s dealings with the sanctioned entities ( United States of America v. BNP Paribas, S.A ., 2014 ).

Facilitation of Tax Evasion

Tax evasion involves the use of illegal means to minimize one’s tax burden. Tax evasion should not be confused with tax avoidance , which refers to the taking of legal measures to minimize one’s tax burden, a practice that is widespread among multinational corporations. The objective of a successful tax evasion scheme is to keep wealth beyond the reach of the tax authorities in one’s country of residence and to not report any income earned on that wealth. This may involve stashing wealth in bank accounts located in foreign jurisdictions that have strong bank secrecy laws and whose tax authorities are reluctant to proactively exchange information with tax authorities in other countries (which makes it difficult for tax authorities in the country of residence to find out about the existence of the wealth) or owning valuable assets such as real estate or yachts through shell companies registered in jurisdictions that have limited corporate ownership disclosure requirements or that only halfheartedly enforce such requirements (which makes it difficult for tax authorities in the country of residence to find out who the owners and beneficiaries are of the company that owns the assets). Banks, especially the private wealth management departments of banks operating from secrecy jurisdictions, have repeatedly been found to actively facilitate and even promote such schemes.

One example concerns the Swiss bank UBS. In 2007 , Bradley Birkenfeld, a banker who used to work for the private banking and wealth management arm of UBS in Geneva, came forward as a whistleblower, opening up to U.S. law enforcement authorities about what he knew about UBS’s role in assisting U.S. taxpayers to hide assets from the IRS, the U.S. tax authority. Birkenfeld admitted that while working for the bank’s Geneva office he had helped numerous U.S. citizens evade taxes on assets held outside of the United States. One of those clients was the Russian-born American real estate developer and billionaire Igor Olenicoff. In 2007 , Olenicoff pleaded guilty to charges of tax evasion and paid $52 million in back taxes. As his private banker at UBS, Birkenfeld had facilitated Olenicoff’s tax evasion scheme by helping him to conceal his ownership and control of $200 million in assets held in offshore accounts in Switzerland and Lichtenstein. Among other things, this involved Birkenfeld opening a UBS account in the name of a Bahamas corporation, which was controlled and beneficially owned by Olenicoff. Although Birkenfeld was fully aware that Olenicoff, a U.S. resident, was the beneficial owner behind the Bahamas corporation, he failed to indicate this in the account opening documentation. In this way, they ensured the account would not be disclosed to the IRS. Birkenfeld also facilitated Olenicoff’s tax evasion scheme by actively assisting him in seeking legal counsel and forming an offshore structure—involving a Lichtenstein trust and a Denmark corporation—that was specifically designed to circumvent the triggering of certain reporting requirements that were put in place by the IRS to identify American-owned assets held overseas. Birkenfeld was sentenced to 40 months in prison and fined $30,000 for abetting tax evasion; but when he was released from prison Birkenfeld received a $104 million award for his whistleblowing.

It appears that the Birkenfeld-Olenicoff affair was not an isolated incident. As a result of Birkenfeld’s whistleblowing, the U.S. Senate Permanent Subcommittee on Investigations started an investigation into UBS’s overseas dealings with American clients. The investigation resulted in a report finding that in the period 2000 to 2007 UBS maintained Swiss accounts for an estimated 19,000 U.S. clients. None of these accounts, which together held approximately $18 billion in assets, had been disclosed to the IRS (U.S. Senate, 2008 ). The report also stated that, to maintain client confidentiality, UBS private bankers would travel to the United States with encrypted laptops and had received training in counter-surveillance techniques to help them prevent the detection of the identities and offshore assets of their U.S. clients. The U.S. Department of Justice (DoJ) followed up on the Senate report by taking steps to prosecute UBS for facilitating tax evasion. The case, however, never made it to court: in 2009 UBS and the DoJ reached a deferred prosecution agreement, in which the bank agreed to pay $780 million in fines and restitution and to provide the U.S. government with the identities and account information of some of its American clients. For UBS, however, the story did not end with the DPA it reached with the DoJ. In subsequent years, law enforcement authorities in Belgium, France, and Germany would also start campaigns against the bank for its involvement in facilitating tax evasion by citizens resident in those countries.

WCC Approaches to the Study of Finance Crime

White-collar crime scholars have taken various approaches to the study of finance crimes. Each of these approaches highlights different dimensions of the complex and multifaceted phenomenon of finance crime and thus complements rather than competes with the other approaches. This section surveys the most prominent of those approaches. The overview presented here is by no means an exhaustive account of how white-collar crime scholarship contributes to our understanding of the phenomenon of finance crime. Nevertheless, the four approaches discussed here cover the majority of WCC scholarship on finance crime and provide useful points of departure for future research on finance crime.

Macro-Institutional Contexts of Finance Crime

A first strand of WCC research on finance crime studies finance crimes in the light of their macro-institutional contexts. This strand of research is based on the premise that actors find meaning—motivations and rationalizations—and opportunities for their actions in the cultural and institutional environments in which they are situated and that such environments can be criminogenic in the sense that they structurally facilitate or even promote illegal behaviors (Needleman & Needleman, 1979 ). WCC scholars adopting such an approach have proposed a number of theoretical frameworks to make sense of the specific empirical manifestations of the finance crimes they were witnessing.

The New Economy

A first such framework has been proposed by Robert Tillman and Michael Indergaard. In a cluster of writings that appeared in the wake of the corporate-financial scandals of the late 1990s and early 2000s, Tillman and Indergaard proposed to understand these scandals as products of what had come to be referred to as the “New Economy.” For Tillman and Indergaard ( 2005 ) it was the combined effect of changes in economic institutions, business organization, and corporate culture that explained the novel forms of white-collar crime witnessed in the early 2000s. In the New Economy, they explained, firms increasingly adopted a new type of business model. The prerogative for New Economy firms was to boost their share price so that the stock could be used as a currency to acquire talent, capital, and other firms. Managers were thus disciplined to give primacy to the financial markets’ assessment of their firms and to fixate on quarterly financial results. This New Economy “doctrine” was accompanied by new conventions about investment. Investors should “shift from the ‘value’ strategy of holding shares in old established corporations to a ‘growth’ strategy of investing in companies with potential for achieving high rates of growth” (Tillman & Indergaard, 2005 , p. 17).

The New Economy also saw the rise to prominence of new forms of coordination and corporate governance. In the corporate governance system for the New Economy, Tillman and Indergaard ( 2007 ) explain, a crucial role was reserved for so-called reputational intermediaries—mostly financial professionals such as auditors, investment bankers, financial analysts, credit rating agencies but also lawyers and board directors. These reputational intermediaries, or “control agents,” were supposed to safeguard the interests of investors by certifying the soundness of financial information provided by corporate insiders. According to dominant economic theory and the neoliberal version of corporate governance it informs, these “control agents” are kept in line because they are subject to extra-legal sanctions in the form of “reputational penalties,” which in turn decreases the value of their services in the markets in which they operate. In fact, however, “by the late 1990s many of these individuals and organizations had abandoned their roles as independent monitors of corporate behavior to become accomplices, or at least facilitators, of their corporate clients’ schemes to enrich themselves at the expense of shareholders” (Tillman, 2009 , p. 366).

What had emerged were “collusive networks of reputational intermediaries” (Tillman, 2009 ) that operated in the basis of questionable reciprocity. Much of this reciprocity, they explained, involved some sort of business intermediary and linkages to the financial sector: investment bankers allocated “hot” IPOs (Initial Public Offerings) to favored clients in return for future business and subsequently conspired with those clients and financial analysts to artificially drive up the stock prices of these same IPOs. To ensure their participation in deceptive deals and to secure access to cheap credit when needed, corporate executives took intermediaries and bankers to join them on expensive trips to exotic locales. Important for understanding the transgressions of those involved in this questionable reciprocity, Tillman and Indergaard argue, were “instituted rationalities”: norms and routines that helped to organize and “normalize” corruption (Ashforth & Anand, 2003 ) among those integrated in the small circles that controlled access to the deal flows.

Postmodernization

An alternative interpretation of the corporate-financial scandals related to the bursting of the dot-com bubble was suggested by David O. Friedrichs. For Friedrichs, these crimes, and especially the Enron scandal (which for him represented the “paradigmatic white-collar crime case for the new century”) (Friedrichs, 2004 ), were best understood as expressions of white-collar crime in a postmodern world. Borrowing from the work of the French philosopher Baudrillard, Friedrichs singled out two concepts developed in the postmodernist thinking that he believed to be especially helpful in understanding a number of important features of the contemporary manifestation of white-collar crime. The first of these is the concept of “hyperreality,” which, he explained, “holds that reality has collapsed and has been replaced by image, illusion, and simulation” (Friedrichs, 2007a , p. 12). If one, for example, considers the various accounts of the Enron case, Friedrich argued,

one is struck by a fundamental disconnect between the presumed ‘modernist’ assumptions of most ordinary investors—that they are putting their money into something ‘real’, into an appropriately assessed product or service with a good potential for growth—and the apparent postmodernist orientation of some of the central figures in this case, whose primary concern seemed to be the manipulation of assets and numbers in ways that maximized their own short-term gain, with almost complete indifference to the ‘real’ demonstrable value of the ‘product’ or service at the center of their business. (Friedrichs, 2007b , p. 167)

Another concept developed in postmodernist thinking that Friedrich believed to be helpful for understanding the new manifestations of white-collar crime is the concept of “intertextuality,” which for him represented the idea that “there is a complex and infinite set of interwoven relationships . . .; that everything is related to everything else” (Friedrichs, 2007b , pp. 167–168). Again taking the Enron case as an example, he argued that “one is struck by the complexity of the many suspect deals, financial arrangements and instruments (e.g., derivatives), to the point that it seems possible that at a certain juncture none of the key players could any longer fully grasp the scope and character of the financial edifice they constructed” (Friedrichs, 2007b , p. 168). Also, the direct and indirect intertwined involvement of a great number of different parties—that is, corporate executives, corporate boards, auditors, investment bankers, stock analysts, lawyers, credit rating agencies, and the like—in these transactions represented a form of intertextuality for Friedrichs.

Globalization

A third framework that has been adopted by WCC scholars to make sense of the empirical manifestations of white-collar crime is that of globalization . The globalization framework as developed in the WCC literature focuses on the criminogenic dimensions of the internationalization of politics, trade, and production. It emphasizes how white-collar crimes increasingly transcend nation-states and manifest themselves in a global context. A number of themes figure prominently in the globalization framework.

A first of these themes concerns the way in which globalization multiplies and intensifies what have been called “criminogenic asymmetries”—structural problems that result from discrepancies and inequalities in the realms of the economy, politics, the law, and culture (Passas, 1999 , 2000 ). Especially troublesome is the mismatch between, on the one hand, increasingly globally and transnationally organized economic structures and, on the other hand, nationally organized rules and law enforcement bodies (Pakes, 2013 ; Passas, 1999 ; Tillman, 2002 ). This mismatch enables malicious actors to engage in “jurisdiction shopping”: finding the jurisdictions that allow for (or fail to enforce laws against) business conduct that has been criminalized in other jurisdictions (Passas, 2002 ; van Duyne, 2002 , p. 5). As a result of the combined effects of criminogenic asymmetries and the inefficiency, or even absence, of rules and enforcement mechanisms at the international level, one increasingly find cross-border or transnational crimes (Passas, 1999 ) that operate in “the space between laws” (Michalowski & Kramer, 1987 ).

A closely related feature emphasized in the globalization framework concerns the increasingly networked organization of such crimes. To exploit cross-border criminal opportunities, perpetrators of transnational crimes set up strategic alliances that take the form of loosely coupled and fluid networks (Block & Griffin, 2002 ; Grabosky, 2009 , p. 132; Tillman, 2002 , pp. 136–137; Williams, 2001 ). Closely mirroring developments in the corporate world, these networks are said to be “diverse, flexible, and highly mobile, giving them the ability to respond quickly and adapt to rapidly changing environments” (Tillman, 2002 , p. 137).

Moreover—and this is a third feature emphasized by the globalization framework—these transnational crime networks typically involve links between the “underworld” and the “upperworld” —that is, between traditional organized crime groups and otherwise legitimate businesspeople, corporations, or financial institutions (Passas, 2002 ; van Duyne, 2002 ). These alliances provide underworld actors with access to the legal economy and financial system, while upperworld actors benefit from low-cost financing, cheap supplies, or new products to market. Typically, such mutually beneficial operations crystalize in secrecy jurisdictions, where upperworld and underworld can interact behind a veil of secrecy (Block & Griffin, 2002 ; Tillman, 2002 ).

Financialization

A fourth framework is that of financialization. Already in the aftermath of the 1980s U.S. savings and loan crisis, a group of prominent WCC scholars that included Kitty Calavita, Henry Pontell, and Robert Tillman observed that unlike much of the corporate crime of earlier decades, the white-collar crimes of the 1980s “had nothing to do with production or manufacturing but instead entailed the manipulation of money” (Calavita, Tillman, & Pontell, 1997 , p. 20). Calavita and colleagues traced this new form of white-collar crime to the distinctive qualities of an emerging form of finance capitalism in which it was embedded. In doing so, their aim, as they put it, was “to suggest the utility of drawing a distinction in white-collar crime studies between manufacturing and finance capitalism and examining fraud in financial institutions as the product of the unique ‘production’ process of the latter” (Calavita & Pontell, 1991 , p. 97). In finance capitalism, the scholars explained, the “means of production include corporate takeovers, land speculation, currency trading, real estate ventures, futures trading, and land swaps” (Calavita & Pontell, 1991 , p. 96). Moreover, they suggested, the illusory nature of the product in finance capitalism makes it so opportunities for finance crimes can be expanded almost indefinitely: “unlike manufacturing capitalism in which consumers receive products for their money, in finance capitalism the consumer receives only a ‘promise’ that some relatively ephemeral or distant service will be rendered” (Calavita & Pontell, 1991 , p. 103). As a consequence, they argued, finance crimes are unencumbered by the confines of the production process.

More recently, Tillman and colleagues (Tillman, Pontell, & Black, 2018 ) have reemphasized the relevance of the concept of financialization for understanding the prevalence of finance crime in contemporary capitalism. In their 2018 book Financial Crime and Crises in the Era of False Profits Tillman and colleagues suggest that financialization has greatly increased the opportunities and the motives for engaging in finance crime and created a subterranean set of values within the financial industry itself that enables financial market participants that engage in finance crimes to rationalize their actions, rendering them reasonable and legitimate.

Organizational Aspects of Finance Crime

A second strand of WCC scholarship on finance crime has approached the phenomenon by studying its organizational dimensions. These organizational dimensions involve both the social networks through which finance crimes are perpetrated as well as the ways in which these networks are embedded in broader organizational and industry structures.

Finance Crime Networks

Finance crimes tend to be complex organizational phenomena that involve intricate webs of social relationships. On the one hand, social networks have been identified as important channels through which victimization takes place. Baker and Faulkner ( 2003 , 2004 ), Comet ( 2011 ), Blois ( 2013 ), and Nash, Bouchard, and Malm ( 2013 ), for example, all found that perpetrators of investment scams often rely on social networks to reach out to prospective victims and to garner the minimum level of trust necessary to entice investors to participate in the scam. On the other hand, social networks may play an important role in the coordination among the multiple actors involved in the perpetration of finance crimes. Zey ( 1993 ), for example, has shown how such crime networks played a crucial role in enabling the fraudulent leveraged buyout transactions engineered by Michael Milken and his co-conspirators in the 1980s. Similarly, Tillman ( 2009 ) revealed how “collusive networks of intermediaries” were central to the New Economy crimes of the late 1990s and early 2000s.

Structural Embeddedness in Formal Organizations

Another important organizational aspect concerns the way in which finance crimes and finance crime networks are structurally embedded in formal organizations. To better explain the emergence and patterns of finance crimes, WCC scholars have therefore studied the continuously evolving internal structures of financial firms as well as the interorganizational relationships between them. For example, in her previously mentioned examination of the fraud networks through which Michael Milken engineered his fraudulent leveraged buyout transactions, Zey ( 1993 ) found that transformations in the intra- and interorganizational structure of securities firms in the 1980s had greatly facilitated the emergence and sustaining of these networks. Specifically, Zey showed how the transformation of securities firms from multidivisional to multi-subsidiary firms enhanced the formation of finance crime networks as well as the efficiency of information processing, decision making, and resource transactions in such networks. A number of scholars have studied widespread fraud in the U.S. mortgage industry during the years leading up to the financial crisis of 2007–2008 . These studies have shown how fundamental changes in the organization of that industry had created market structures and competitive conditions that imposed perverse incentives toward predatory lending and fraudulent selling and underwriting of mortgage-backed securities (Fligstein & Roehrkasse, 2016 ; Nguyen & Pontell, 2010 ).

Organizations as a Weapon to Defraud

Another organizational aspect studied by WCC scholars concerns the way in which formal organizations may be used as vehicles for the perpetration of finance crimes (Black, 2005b ; Calavita & Pontell, 1991 ). Traditionally, WCC scholarship has made a conceptual distinction between two forms of white-collar crime in business organizations. On the one hand, “occupational crimes” are committed for the benefit of the individual without organizational support. “Organizational crimes,” on the other hand, are those crimes that are committed with organizational support and for the benefit of the organization (Clinard, Quinney, & Wildeman, 1994 ). Although this conceptual distinction has its benefits for the analysis of white-collar crimes in the manufacturing sector, it is less useful for understanding the organizational character of many finance crimes. As both Black ( 2005a ) and Calavita et al. ( 1997 ) found when studying the major frauds related to the U.S. savings and loan industry in the 1980s, the organizational setup of many finance crimes represents a hybrid of the above two forms. In what they refer to as “collective embezzlement,” or “control fraud,” those who are in control of a firm use the firm’s resources to enrich themselves. The organization thus becomes a vehicle for perpetrating crime against itself; “crime by the corporation against the corporation” (Calavita et al., 1997 , p. 63). Many of the finance crimes that were exposed in the aftermath of the global financial crisis of 2007–2008 indeed closely resemble the control frauds perpetrated in the savings and loan industry in the 1980s. For example, in her analysis of the finance crimes perpetrated by insiders in the Icelandic banking sector prior to its collapse, Susan Will (Will, 2015 ) describes how Icelandic banks made numerous improper loans to companies that were linked to the banks’ managers and major shareholders.

Costs, Consequences, and Victims of Finance Crime

A third strand of WCC scholarship on finance crime has approached the phenomenon by studying the costs, consequences, and victims of such crimes. As is the case for white-collar crimes in general, the costs and consequences of finance crimes are often diffuse and indirect and may come in different forms (Friedrichs, 2010 ). Although the types of costs and patterns of victimization are different for different types of finance crime, at a general level, three categories of costs have been identified in the literature.

Monetary and Financial Costs

Monetary and financial costs associated with finance crimes include those borne by individual victims. In some cases, individual victims are easily identified. In most cases, however, the ultimate victims of finance crimes are tied to the actual crime through long and complex chains of victimization. For example, the illegal manipulation of LIBOR rates by traders of large investment banks affected not only the LIBOR-related derivatives positions held by those traders but also millions of homeowners around the world who held mortgages tied to the LIBOR rates.

When finance crimes are perpetrated in the context of financial firms, shareholders of those firms may suffer monetary costs as well. Monetary costs to shareholder may result from fines, customer redress, or settlements with law enforcement agencies as well as from share price depreciations; when news of enforcement actions against a firm gets out, this may have a significant impact on that firm’s share price. Moreover, regulatory or criminal enforcement actions against financial firms are often followed by civil litigation and private lawsuits, which can bring significant costs with them as well.

Emotional, Psychological, and Behavioral Consequences

Monetary and financial costs are, however, not the only costs associated with finance crimes. Equally important for WCC criminologists are the emotional, psychological, and behavioral consequences of finance crime for individual victims. Individuals that fall victim to finance crimes may experience feelings of shame, embarrassment, and self-blame as well as intensified levels of stress, anger, and depression (Spalek, 1999 ).

Broader Societal Costs

A third category of costs, and of primary concern to WCC criminologists, consists of the costs that finance crimes may impose on society at large. Societal costs of finance crimes identified by researchers are manifold, but two of them stand out. The first of these concerns the erosion of trust in the financial system. Already 40 years ago when Edwin Sutherland ( 1949 ) introduced the term “white-collar crime” he suggested that far more significant than mere dollar losses is the way in which white-collar crimes erode confidence in private and public institutions (Sutherland, referenced in Moore & Mills, 1990 , p. 413). In contemporary scholarship, the belief that the erosion of trust in financial markets and institutions is at least as significant a harm inflicted by finance crimes as are monetary costs, is still upheld (e.g., Black, 2005a , p. 1).

Another important social cost of finance crime identified by WCC researchers concerns the ways in which such crimes contribute to the formation of financial crises. Contrary to neoclassical economists’ beliefs that markets are self-correcting in the sense that investors and intermediaries will discern fraudulent businesses and drive them out of the market before they can become big enough to cause systemic problems (e.g., Fischel & Easterbrook, 1991 ), WCC scholars have long insisted that finance crimes can, and often do, play an important causal role in the formation of systemic financial crises (Black, 2005b ; Pontell, 2005 ; Ryder, 2014 ). Neoclassical economists, or “fraud minimalists” (Pontell, Black, & Geis, 2014 ), they argue, are mistaken in their belief that markets are self-correcting because they overlook the potential for “control fraud”—crimes in which those in control of large firms use the firm’s resources to optimize the firm for fraud and fool investors into believing that the firm runs a legitimate business (Black, 2005b ). The firm’s resources can, for example, be used to “convince” reputable accounting firms to sign off on their financial statements, create a favorable image of their firm in the news media, or establish political connections that shield them from scrutiny by law enforcement agencies (Black, 2003 ).

Legal and Political Responses to Finance Crime

A fourth strand of WCC scholarship on finance crime studies the legal and political responses to such crimes. This strand of research investigates how societies create legal regimes that prohibit certain financial market practices as well as how these prohibitions are subsequently enforced by regulatory agencies, public prosecutors, and the courts. A common thread running through much of this scholarship is the acute awareness that both the prohibition of certain financial market practices and the enforcement of those prohibitions are processes that cannot be understood separately from the historical, cultural, political, and economic contexts in which they take place.

Lawmaking: Prohibition and Criminalization

Historical events such as financial crises and scandals have the potential to force political and legal debates over the norms and laws regulating financial market conduct. It is in these debates that perceptions of financial misconduct are constructed and appropriate legal responses to it are invented. Eventually, such debates may culminate into new regulations and the adoption of new standards and codes of conduct by industry self-regulatory bodies. But the process that leads from crisis to reregulation is a long and contentious one, and the work done by WCC and financial regulation scholars has emphasized the way in which powerful interests use resources at their disposal to influence this process in an attempt to control the form, shape, and meaning of the laws that set the boundaries of accepted financial market conduct (e.g., Barak, 2012 ; Coffee, 2012 ). To understand how they succeed in doing so, it is important to be aware that the legislative process does not end with the adoption of a certain piece of legislation by the legislator. Once a law has been adopted by Parliament, specialized regulatory agencies examine the law and translate the general principles enshrined in it into concrete rules and regulations that contain specific stipulations and detail how exactly those stipulations will be enforced. This process of administrative implementation is especially susceptible to influencing by powerful and well-organized industry interests that aim to minimize the disruptive effect of new regulations and their enforcement on existing business practices. Good examples of such “administrative softening” can be found in the implementation of the Public Company Accounting Reform and Investor Protection Act of 2002 —also known as the Sarbanes-Oxley Act—and the Wall Street Financial Reform and Consumer Protection Act of 2010 —colloquially known as the Dodd-Frank Act (Coffee, 2012 ).

Of specific interest to WCC criminologists is also the extent to which the prohibition of certain financial practices is encoded in the criminal law as opposed to civil and administrative law. The criminal law is usually reserved only for those behaviors that are deemed harmful to the public interest. In this regard, historians of white-collar crime have suggested that although exploitative and abusive practices had long been commonplace in financial markets, it was only in 19th-century Victorian Britain that certain financial practices came to be perceived as harmful to the public interest and therefore worthy of criminalization (Taylor, 2007 ; Wilson, 2006 , 2014 ). The rise of industrial capitalism at the time required large amounts of savings to be mobilized for investment in capital stock, which was achieved through mass participation in the stock markets. This, however, required a minimum level of confidence among the investing public that financial markets were fair. The stock market collapse of 1845 and the financial abuses that were revealed by it shook this confidence and triggered a panic among investors who had to scramble to get out of investments already made. This panic brought about the realization that financial market conduct needed to be subjected to more stringent rules and morality and that some behaviors should actually attract criminal liability (Wilson, 2006 ).

As financial markets evolved rapidly and continuously throughout the course of the 20th century , debates about what constitutes (im)permissible financial market conduct and how to demarcate the boundaries between civil and criminal liability have resurfaced on several occasions. Major events that triggered such debates were the Wall Street stock market crash of 1929 (Keller & Gehlmann, 1988 ), the savings and loan crisis of the 1980s (Malloy, 1989 ; Pontell, Calavita, & Tillman, 1994 ), and the wave of corporate accounting scandals in the early 2000s (Coates, 2007 ; Cunningham, 2002 ). The most recent debates emerged during the aftermath of the global financial crisis of 2007–2008 . The instances of financial mismanagement and abuse exposed by the crisis triggered debates about the appropriateness of criminal liability for bank managers in relation to “reckless risk-taking” on behalf of their banks (Black & Kershaw, 2013 ; Fisher QC, 2015 ) as well as the meaning of conflicts of interests and the fiduciary duties of broker-dealers as they conduct business with supposedly “sophisticated” investors in a financial marketplace that has gone through a number of structural and transformative changes (Buell, 2011 ; Davidoff Solomon, Morrison, & Wilhelm, 2012 ; Jeffers & Mogielnicki, 2010 ; Scopino, 2014 ).

Law Enforcement: Monitoring, Policing, and Sanctioning

The legal prohibition of certain financial market behaviors is only the first stage in societies’ broader political response to financial abuse. Once certain prohibitions are enshrined in laws and regulations, these then need to be enforced. Enforcement of the laws and regulations that set the boundaries of accepted financial market conduct is a complex process that involves a chain of public and quasi-public agencies. At the beginning of the chain are self-regulatory organizations, such as stock exchanges, clearing houses, and industry associations. These are non-governmental organizations that set legal or ethical industry standards and monitor adherence to these standards by controlling the flow of business operations. When standards are violated, or when suspicions arise that market players may have engaged in conduct that violates formal laws, self-regulatory organizations may notify independent financial regulatory agencies about the misconduct. Financial regulatory agencies are specialized agencies that have been established by governments and accredited with the task to actively monitor and police business operations in specific financial market segments—for example, banking, insurance, the thrifts sector, commodity markets, securities markets, etc. These agencies, examples of which are the U.S. Securities and Exchange Commission (SEC), the European Banking Authority (EBA), and the UK Financial Conduct Authority (FCA), have the authority to impose administrative fines and sanctions or to bring civil cases when laws or regulations are violated. They do not, however, have any prosecutorial power. When it appears that criminal laws have been violated, regulatory agencies may refer cases to public prosecutors, which might then decide to bring criminal charges against alleged offenders. As public prosecutors generally lack the intricate knowledge of financial market operations needed to bring charges for finance crimes, they work closely together with regulatory agencies when building their cases.

Financial regulatory agencies thus take a central position in the law enforcement apparatus. To better understand how exactly regulatory agencies go about in executing their task, WCC scholars have studied their organizational features and operational practices (e.g., Shapiro, 1984 ; Snider, 2009 ; Williams, 2012 ). These studies have shown that financial market policing and regulation are anything but straightforward enterprises. Partly, this is because they are inherently knowledge based (Williams, 2012 ). In their day-to-day activities, regulators face the practical problem of making sense of the chaos of activities, relationships, and transactions that constitute financial markets. To do so, they need to access, process, and interpret large amounts of information, distill from that whatever information might be relevant from an enforcement perspective, and eventually decide whether to develop cases out of the collected information. How they engage with this problem depends to a large extent on the tools and procedures they use to “settle the seeming chaos of market activities into workable frames, according to which transactions can be designated as ‘normal’ or ‘deviant” (Williams, 2012 , p. 181). Put simply, where and how enforcement agencies look for abuses determines what they will find.

That enforcement is not a straightforward enterprise also stems from the fact that the mandate of enforcement agencies is not fixed but ambiguous and contested. Financial regulators face a double mandate of protecting the integrity of the market while being careful not to construct a regulatory regime that is too stringent regarding regimes in other jurisdictions, as this would create the risk of investors abandoning the national market for jurisdictions that have more competitive regulatory regimes (Williams, 2012 ). Regulators have to balance these contradictory objectives while operating in a complex social field in which regulators, financial firms, and the professionals who stand between them (i.e., lawyers, accountants, tax advisors, etc.) all hold and proclaim their own ideas of what it means for financial regulation to be successful and legitimate (Snider, 2009 ; Williams, 2012 ). This negotiation of regulatory terrain is further complicated by the often- overlapping jurisdictions of different regulatory agencies. As these agencies all seek to deliver on their promised mandates, their objectives and organizational interests are not always aligned. At times, such interagency politics may take the form of turf wars (Condon, 2006 ). WCC scholars have pointed out how this continuous renegotiation of the purpose and scope of financial regulation typically follows a cyclical pattern in which crackdown periods, initiated by financial market crises and increased political salience of finance crimes, are followed by periods in which regulatory budgets are slashed and regulators become much more accommodating to industry preferences (Snider, 2007 , 2013 ).

Law Enforcement: Criminal Prosecution

When financial regulators find that market participants have engaged in behaviors that possibly violated a jurisdiction’s criminal laws, they may refer cases to public prosecutors, who may then bring criminal charges against those market participants. Criminal prosecutions can target both individuals and corporations, and the sanctions imposed for criminal liability are harsher than those imposed for civil or administrative sanctions. These may involve the revocation of licenses or corporate charters, debarment from bidding for public contracts, or the imprisonment of individuals responsible for the perpetration of the crime. WCC scholars have been especially interested in the discretionary application and enforcement of the criminal law. Many forms of financial misconduct arguably violate both civil and criminal laws and the ultimate decision to prosecute an offense using civil or criminal law is often determined by extralegal factors (Coleman, 2006 , p. 6).

Of specific concern in much recent WCC scholarship on the legal and political responses to finance crime is the reluctance of governments and public prosecutors to use the criminal justice system to respond to finance crimes related to the financial crisis of 2007–2008 . Despite revelations of serious misconduct in finance markets both before and after the crisis, few financial firms have faced criminal sanctions, and virtually no senior executive has been sent to jail. Instead, many cases have been concluded by way of settlements in the form of deferred prosecution agreements or non-prosecution agreements. Governments and their law enforcement agencies have typically ascribed the absence of criminal prosecutions to the difficulty of collecting the evidence necessary to prove “beyond a reasonable doubt” that there was criminal intent, which is the standard of evidence required to validate a criminal conviction. Although WCC scholarship does recognize the difficulties involved in the prosecution of complex finance crimes (Friedrichs, 2013 ; Pontell et al., 1994 ), it has questioned the credibility of this claim and has instead, or complementary to this, proposed alternative explanations. These alternative explanations are diverse and multidimensional, but two narrative threads figure prominently in most of them.

One of these concerns the way in which powerful financial interests exercise influence over the selective and discretionary application of the law. At one level this is said to happen through revolving doors between government enforcement agencies and the financial industry. Many financial regulators and public prosecutors either worked in the financial sector before they commenced their work as law enforcer or end up working in it afterward (Taibbi, 2014 ). A result of this hat switching is that regulators tend to socially identify with the financial industry and internalize the industry’s objectives, norms, and values (Barak, 2012 ; Veltrop & de Haan, 2014 ). As such, it has been suggested, revolving-door dynamics are instrumental to the promotion in regulatory institutions of a neoliberal ideology that advocates minimal government intervention in markets and a preference for industry self-regulation (Barak, 2012 ; Tomasic, 2011 ). At another level, powerful financial interests are said to curtail the institutional capacity of criminal justice agencies to investigate, prosecute, and sanction finance crime (Barak, 2012 ; Pontell, 1984 ). Financial interests use the political influence they wield through lobbying and campaign financing contributions to limit the resources available to government agencies responsible for the monitoring and prosecution of finance crime. Constrained by scarce resources, but under intense pressure to produce output, enforcement agencies tend to select out less demanding and more winnable cases. As a result, criminal cases are brought against offenders of petty crimes, while more complex offenses and offenses committed by persons with deep pockets are put aside (Barak, 2012 ; Taibbi, 2014 ).

A second narrative thread seeks a more structural explanation and emphasizes how prosecutors are held back by concerns over the fragility of financial firms and, ultimately, the financial system. To understand how this has come to be the case, two developments that have marked the evolution of capitalist economies over the last decades should be considered. The first is that, since the 1980s, advanced capitalist economies have gone through a number of transformative changes such that the importance of the financial sector for these economies has increased dramatically. In a process that is often referred to as “financialization,” the economic fate of firms, governments, and households have become increasingly mediated by relations with financial markets (French, Leyshon, & Wainwright, 2011 ; Van der Zwan, 2014 ). At the same time, the structural composition of the financial industry itself has undergone a radical transformation as well. A continuous process of consolidation has led to a situation in which a small number of large financial conglomerates make up the lion’s share of the financial sector in most advanced economies. The combined result of these two developments is that certain financial institutions have become of such systemic importance that they have effectively become “too-big-to-fail” (Sorkin, 2010 ). The collapse of any such institution would have serious adverse consequences for the financial system. With this in mind, prosecutors have become reluctant to aggressively prosecute finance crimes and have taken a less adversarial approach, resorting to deferred- and non-prosecution agreements instead. Effectively, then, these institutions have become “too-big-to-indict” and their executives “too big to jail” (Barak, 2012 ; Garrett, 2014 ; Tillman, 2013 ).

Further Reading

  • Barak, G. (2012). Theft of a nation: Wall Street looting and federal regulatory colluding . Lanham, MD: Rowman & Littlefield.
  • Black, W. K. (2005a). The best way to rob a bank is to own one: How corporate executives and politicians looted the S&L industry . Austin: University of Texas Press.
  • Masciandaro, D. (Ed.). (2017). Global financial crime: Terrorism, money laundering and offshore centres . Aldershot, UK: Ashgate.
  • Partnoy, F. (2002). Infectious greed: How deceit and risk corrupted the financial markets . New York, NY: Times Books.
  • Platt, S. (2015). Criminal capital: How the finance industry facilitates crime . Basingstoke, UK: Palgrave Macmillan.
  • Ryder, N. (2014). The financial crisis and white collar crime: The perfect storm? Cheltenham, UK: Edward Elgar.
  • Taibbi, M. (2014). The divide: American injustice in the age of the wealth gap . New York, NY: Spiegel & Grau.
  • Tillman, R. , Pontell, H. N. , & Black, W. K. (2018). Financial crime and crises in the era of false profits . New York, NY: Oxford University Press.
  • Will, S. , Handelman, S. , & Brotherton, D. (Eds.). (2012). How they got away with it: White collar criminals and the financial meltdown . New York, NY: Columbia University Press.
  • Williams, J. W. (2012). Policing the markets: Inside the black box of securities enforcement . New York, NY: Routledge.
  • Wilson, S. (2014). The origins of modern financial crime: Historical foundations and current problems in Britain . New York, NY: Routledge.
  • Zey, M. (1993). Banking on fraud: Drexel, junk bonds, and buyouts . New York, NY: Aldine de Gruyter.
  • Adrian, J. (2016). Informational inequality: How high frequency traders use premier access to information to prey on institutional investors. Duke Law & Technology Review , 14 (1), 256–279.
  • Anagol, S. , Cole, S. A. , & Sarkar, S. (2013, March 7). Understanding the advice of commissions-motivated agents: Evidence from the Indian life insurance market. Harvard Business School Working Papers, (Working Paper 12–055). Boston, MA: Harvard Business School.
  • Ashforth, B. E. , & Anand, V. (2003). The normalization of corruption in organizations. Research in Organizational Behavior , 25 , 1–52.
  • Ashton, J. K. , & Hudson, R. S. (2013). The mis-selling of payments protection insurance in mortgage and unsecured lending markets. In J. M. P. Monsálvez & J. F. de Guevara Radoselovics (Eds.), Modern bank behaviour (pp. 8–33). Basingstoke, UK: Palgrave Macmillan.
  • Baker, W. E. , & Faulkner, R. R. (2003). Diffusion of fraud: Intermediate economic crime and investor dynamics. Criminology , 41 (4), 1173–1206.
  • Baker, W. E. , & Faulkner, R. R. (2004). Social networks and loss of capital. Social Networks , 26 (2), 91–111.
  • Barnett, H. C. (2013). And some with a fountain pen: Mortgage fraud, securitization, and the subprime bubble. In S. Will , S. Handelman , & D. C. Brotherton (Eds.), How they got away with it: White collar criminals and the financial meltdown (pp. 104–129). New York, NY: Columbia University Press.
  • Belfort, J. (2007). The wolf of Wall Street . New York, NY: Bantam Books.
  • Black, J. , & Kershaw, D. (2013). Criminalising bank managers . London, UK: London School of Economics.
  • Black, J. , & Nobles, R. (1998). Personal pensions misselling: The causes and lessons of regulatory failure. The Modern Law Review , 61 (6), 789–820.
  • Black, W. K. (2005b). ‘Control frauds’ as financial super-predators: How ‘Pathogens’ make financial markets inefficient. The Journal of Socio-Economics , 34 (6), 734–755.
  • Block, A. A. , & Griffin, S. P. (2002). Transnational financial crime crooked lawyers, tax evasion, and securities fraud. Journal of Contemporary Criminal Justice , 18 (4), 381–393.
  • Blois, K. (2013). Affinity fraud and trust within financial markets. Journal of Financial Crime , 20 (2), 186–202.
  • Buell, S. W. (2011). What is securities fraud? Duke Law Journal , 61 (3), 511–581.
  • Calavita, K. , & Pontell, H. N. (1991). ‘Other’s People’s Money’ revisited: Collective embezzlement in the savings and loan and insurance industries. Social Problems , 38 (1), 94–112.
  • Calavita, K. , Pontell, H. N. , & Tillman, R. (1997). Big money crime: Fraud and politics in the savings and loan crisis . Berkeley: University of California Press.
  • Calavita, K. , Tillman, R. , & Pontell, H. N. (1997). The savings and loan debacle, financial crime, and the state. Annual Review of Sociology , 23 , 19–38.
  • Cassella, S. D. (2003). Reverse money laundering. Journal of Money Laundering Control , 7 (1), 92–94.
  • Clinard, M. R. , Quinney, R. , & Wildeman, J. (1994). Criminal behavior systems: A typology (3rd ed.). Cincinnati, OH: Anderson.
  • Coates, J. C., IV . (2007). The goals and promise of the Sarbanes-Oxley Act . Journal of Economic Perspectives , 21 (1), 91–116.
  • Coffee, J. C., Jr . (2012). The political economy of Dodd-Frank: Why financial reform tends to be frustrated and systemic risk perpetuated. Cornell Law Review , 97 , 1019–1082.
  • Coleman, J. W. (2006). The criminal elite: Understanding white-collar crime . New York, NY: Worth.
  • Colesanti, J. S. (2011). Wall Street as Yossarian: The other effects of the Rajaratnam insider trading conviction. Hofstra Law Review , 40 , 411–435.
  • Comerton-Forde, C. , & Mei Tang, K. (2007). Anonymity, frontrunning and market integrity. The Journal of Trading , 2 (4), 101–118.
  • Comet, C. (2011). Anatomy of a fraud: Trust and social networks. Bulletin de Méthodologie Sociologique , 110 (1), 45–57.
  • Condon, M. (2006). Rethinking enforcement and litigation in Ontario securities regulation. Queen’s Law Journal , 32 , 1–44.
  • Cunningham, L. A. (2002). The Sarbanes-Oxley yawn: Heavy rhetoric, light reform (and it just might work). Connecticut Law Review , 35 , 915–988.
  • Davidoff Solomon, S. M. , Morrison, A. D. , & Wilhelm, W. J., Jr . (2012). The SEC v. Goldman Sachs: Reputation, trust, and fiduciary duties in investment banking. The Journal of Corporate Law , 37 (3), 529–553.
  • Dorn, N. (2011). Reconstructing ‘conflict of interest’ in financial markets: Private management, public challenges, future prospects. International Journal of Law, Crime and Justice , 39 (3), 161–173.
  • Ericson, R. V. , & Doyle, A. (2006). The institutionalization of deceptive sales in life insurance: Five sources of moral risk. British Journal of Criminology , 46 (6), 993–1010.
  • Ferran, E. (2012). Regulatory lessons from the payment protection insurance mis-selling scandal in the UK. European Business Organization Law Review , 13 (02), 247–270.
  • Fischel, D. R. , & Easterbrook, F. (1991). The economic structure of corporate law . Cambridge, MA: Harvard University Press.
  • Fisher QC , J. (2015). Risk, recklesness, and policing the financial markets. In N. Ryder , U. Turksen , & S. Hassler (Eds.), Fighting financial crime in the global economic crisis . New York, NY: Routledge.
  • Fligstein, N. , & Roehrkasse, A. (2013). All the incentives were wrong: Opportunism and the financial crisis. Paper presented at the American Sociological Association Annual Meeting, Hilton New York and Sheraton New York, New York, NY, August 9, 2013.
  • Fligstein, N. , & Roehrkasse, A. F. (2016). The causes of fraud in the financial crisis of 2007 to 2009: Evidence from the mortgage-backed securities industry. American Sociological Review , 81 (4), 617–643.
  • French, S. , Leyshon, A. , & Wainwright, T. (2011). Financializing space, spacing financialization. Progress in Human Geography , 35 (6), 798–819.
  • Friedrichs, D. O. (2004). Enron et al.: Paradigmatic white collar crime cases for the new century. Critical Criminology , 12 (2), 113–132.
  • Friedrichs, D. O. (2007a). Transnational crime and global criminology: Definitional, typological, and contextual conundrums. Social Justice , 34 (2), 4–18.
  • Friedrichs, D. O. (2007b). White-collar crime in a postmodern, globalized world. In H. N. Pontell & G. Geis (Eds.), International handbook of white-collar and corporate crime (pp. 163–184). New York, NY: Springer.
  • Friedrichs, D. O. (2010). Trusted criminals: White collar crime in contemporary society . Belmont, CA: Wadsworth.
  • Friedrichs, D. O. (2013). Wall Street: Crime never sleeps. In S. Will , S. Handelman , & D. C. Brotherton (Eds.), How they got away with it (pp. 3–25). New York, NY: Columbia University Press.
  • Garrett, B. (2014). Too big to jail: How prosecutors compromise with corporations . Cambridge, MA: Harvard University Press.
  • Geis, G. (2013). Unaccountable external auditors and their role in the economic meltdown. In S. Will , S. Handelman , & D. C. Brotherton (Eds.), How they got away with it: White Collar criminals and the financial meltdown (pp. 85–103). New York, NY: Columbia University Press.
  • Grabosky, P. (2009). Globalization and white-collar crime. In S. S. Simpson & D. Weisburd (Eds.), The criminology of white-collar crime (pp. 129–151). New York, NY: Springer.
  • Instefjord, N. , Jackson, P. , & Perraudin, W. (1998). Securities fraud: It is a matter of incentives from bottom to top. Economic Policy , 13 (27), 585–623.
  • Jeffers, A. E. , & Mogielnicki, M. S. (2010). The line between illegality and unethical behavior in the Goldman Sachs subprime mortgage securities case. Journal of Business Research , 10 (4), 159–169.
  • Kane, E. J. , & DeTrask, K. (1999). Breakdown of accounting controls at Barings and Daiwa: Benefits of using opportunity-cost measures for trading activity. Pacific-Basin Finance Journal , 7 (3), 203–228.
  • Keller, E. , & Gehlmann, G. A. (1988). Introductory comment: A historical introduction to the sSecurities Act of 1933 and the Securities Exchange Act of 1934. Ohio State Law Journal , 49 , 329–352.
  • Krawiec, K. D. (2000). Accounting for greed: Unraveling the rogue trader mystery. Oregon Law Review , 79 , 301–338.
  • Ledgerwood, S. D. , & Carpenter, P. R. (2012). A framework for the analysis of market manipulation. Review of Law & Economics , 8 (1), 253–295.
  • Lewis, M. (2015). Flash boys: A Wall Street revolt . New York, NY: W.W. Norton.
  • Lewis, M. K. (2012). New dogs, old tricks. Why do Ponzi schemes succeed? Accounting Forum , 36 (4), 294–309.
  • Lomnicka, E. (2008). Investors protection in securities markets . In P. Cane & J. Conaghan (Eds.), The New Oxford Companion on Law . Online edition. Oxford, UK: Oxford University Press.
  • Luyendijk, J. (2015). Swimming with sharks: My journey into the world of the bankers . London, UK: Guardian Books.
  • Malloy, M. P. (1989). Nothing to fear but FIRREA itself: Revising and reshaping the enforcement process of federal bank regulation. Ohio State Law Journal , 50 , 1117–1157.
  • Markham, J. W. (2014). Law enforcement and the history of financial market manipulation . New York, NY: M. E. Sharpe.
  • Marshall, P. (2014). Interest rate swaps and the sale of the unknown: Blind alleys, an enfeebled equity and the triumph of certainty over fairness. Butterworths Journal of International Banking and Financial Law , 29 (1), 9–15.
  • Michalowski, R. J. , & Kramer, R. C. (1987). The space between laws: The problem of corporate crime in a transnational context. Social Problems , 34 (1), 34–53.
  • Moore, E. , & Mills, M. (1990). The neglected victims and unexamined costs of white-collar crime. Crime & Delinquency , 36 (3), 408–418.
  • Nash, R. , Bouchard, M. , & Malm, A. (2013). Investing in people: The role of social networks in the diffusion of a large-scale fraud. Social Networks , 35 (4), 686–698.
  • Needleman, M. L. , & Needleman, C. (1979). Organizational crime: Two models of criminogenesis. The Sociological Quarterly , 20 (4), 517–528.
  • Nguyen, T. H. , & Pontell, H. N. (2010). Mortgage origination fraud and the global economic crisis. Criminology & Public Policy , 9 (3), 591–612.
  • Nguyen, T. H. , & Pontell, H. N. (2011). Fraud and inequality in the subprime mortgage crisis. In M. Deflem (Ed.), Economic crisis and crime (Vol. 16, pp. 3–24). Bingley, UK: Emerald Group.
  • Nolasco, C. A. R. I. , Vaughn, M. S. , & Del Carmen, R. V. (2013). Revisiting the choice model of Ponzi and Pyramid schemes: Analysis of case law. Crime, Law, and Social Change , 60 (4), 375–400.
  • Packer, G. (2011). A dirty business. New Yorker , June 27.
  • Pakes, F. (2013). Globalisation and the challenge to criminology . New York, NY: Routledge.
  • Passas, N. (1999). Globalization, criminogenic asymmetries and economic crime. European Journal of Law Reform , 1 (4), 399–423.
  • Passas, N. (2000). Global anomie, dysnomie, and economic crime: Hidden consequences of neoliberalism and globalization in Russia and around the world. Social Justice , 27 (2), 16–44.
  • Passas, N. (2002). Cross-border crime and the interface between legal and illegal actors. In P. C. van Duyne , K. von Lampe , & N. Passas (Eds.), Upperworld and underworld in cross-border crime (pp. 11–41). Nijmegen, The Netherlands: Wolf Legal Publishers.
  • Pirrong, C. (2010). Energy market manipulation: Definition, diagnosis, and deterrence. Energy Law Journal , 31 , 1–20.
  • Pontell, H. N. (1984). The capacity to punish: The ecology of crime and punishment . Bloomington: Indiana University Press.
  • Pontell, H. N. (2005). Control fraud, gambling for resurrection, and moral hazard: Accounting for white-collar crime in the savings and loan crisis. The Journal of Socio-Economics , 34 (6), 756–770.
  • Pontell, H. N. , Black, W. K. , & Geis, G. (2014). Too big to fail, too powerful to jail? On the absence of criminal prosecutions after the 2008 financial meltdown. Crime, Law and Social Change , 61 (1), 1–13.
  • Pontell, H. N. , Calavita, K. , & Tillman, R. (1994). Corporate crime and criminal justice system capacity: Government response to financial institution fraud. Justice Quarterly , 11 (3), 383–410.
  • Reurink, A. (2016). Financial fraud: A literature review . MPIfG discussion paper 16/5. Cologne, Germany: Max Planck Institute for the Study of Societies.
  • Rosoff, S. , Pontell, H. , & Tillman, R. (2014). Profit without honor: White-collar crime and the looting of America . Upper Saddle River, NJ: Pearson Education.
  • Scannel, K. (2012, April 3). CFTC sues RBC over alleged ‘wash trades’ . Financial Times .
  • Scopino, G. (2014). Regulating fairness: The Dodd-Frank Act’s fair dealing requirement for swap dealers and major swap participants. Nebraska Law Review , 93 (1), 31–88.
  • Shapiro, S. (1984). Wayward capitalists: Target of the securities and exchange commission . New Haven, CT: Yale University Press.
  • Snider, L. (2007). This time we really mean it! In H. Pontell & G. Geis (Eds.), International handbook of white-collar and corporate crime (pp. 627–647). New York, NY: Springer.
  • Snider, L. (2009). Accommodating power: The ‘common sense’ of regulators. Social & Legal Studies , 18 (2), 179–197.
  • Snider, L. (2013). The technological advantages of stock market traders. In S. Will , S. Handelman , & D. C. Brotherton (Eds.), How they got away with it: White Collar criminals and the financial meltdown (pp. 151–170). New York, NY: Columbia University Press.
  • Sorkin, A. R. (2010). Too big to fail: The inside story of how Wall Street and Washington fought to save the financial system—and themselves . London, UK: Penguin Books.
  • Spalek, B. (1999). Exploring the Impact of financial crime: A study looking into the effects of the Maxwell scandal upon the Maxwell pensioners. International Review of Victimology , 6 (3), 213–230.
  • Stanley, C. (1996). Speculations on the conflict of discourses: Finance, crime and regulation. Journal of Financial Regulation and Compliance , 4 (3), 239–254.
  • Sutherland, E. H. (1949). White collar crime . New York, NY: Dryden Press.
  • Taibbi, M. (2013, April 25). Everything is rigged: The biggest price-fixing scandal ever. Rolling Stone .
  • Taylor, J. (2007). Company fraud in Victorian Britain: The Royal British bank scandal of 1856. The English Historical Review , 122 (497), 700–724.
  • Tillman, R. (2002). Global pirates: Fraud in the offshore insurance industry . Boston, MA: Northeastern University Press.
  • Tillman, R. (2009). Reputations and corporate malfeasance: Collusive networks in financial statement fraud. Crime, Law and Social Change , 51 (3–4), 365–382.
  • Tillman, R. (2013). Too big to jail. Western Criminology Review , 14 (2), 31–37.
  • Tillman, R. , & Indergaard, M. (2005). Pump and dump: The rancid rules of the new economy . Piscataway, NJ: Rutgers University Press.
  • Tillman, R. , & Indergaard, M. (2007). Corporate corruption in the new economy. In International handbook of white-collar and corporate crime (pp. 474–489). New York, NY: Springer.
  • Tomasic, R. (2011). The financial crisis and the haphazard pursuit of financial crime. Journal of Financial Crime , 18 (1), 7–31.
  • U.S. Senate Permanent Subcommittee on Investigations. Committee on Homeland Security and Governmental Affairs . (2008). Tax haven banks and U.S. tax compliance . Staff Report Permanent Subcommittee on Investigations, July 17, 2008 Hearing. Washington, DC: United States Senate.
  • Van der Zwan, N. (2014). Making sense of financialization. Socio-Economic Review , 12 (1), 99–129.
  • van Duyne, P. C. (2002). Introduction: Upper- and underworld cross-border crime economy. In P. C. van Duyne , K. von Lampe , & N. Passas (Eds.), Upperworld and underworld in cross-border crime (pp. 1–9). Nijmegen, The Netherlands: Wolf Legal Publishers.
  • Vande Walle, Gudrun (Ed.). (2015). The Routledge handbook of white-collar and corporate crime in Europe (pp. 276–291). New York, NY: Routledge.
  • Veltrop, D. , & de Haan, J. (2014). I just cannot get you out of my head: Regulatory capture of financial sector supervisors . DNB Working Papers (Working Paper No. 410). Amsterdam, The Netherlands: De Nederlandsche Bank.
  • Verstein, A. (2015). Benchmark manipulation. Boston College Law Review , 56 , 215–272.
  • Will, S. (2015). The Icelandic approach to the 2008 banking crisis. In J. H. van Erp , W. Huisman , & G. Vande Walle (Eds.), The Routledge Handbook of White-Collar and Corporate Crime in Europe (pp. 276–291). New York, NY: Routledge.
  • Williams, P. (2001). Transnational criminal networks. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy . Santa Monica, CA: RAND Corporation.
  • Wilson, S. (2006). Law, morality and regulation Victorian experiences of financial crime. British Journal of Criminology , 46 (6), 1073–1090.
  • Zepeda, R. (2013). Derivatives mis-selling by British banks and the failed legacy of the FSA. Journal of International Banking Law and Regulation , 28 (6), 209–220.

Court Documents

  • Complaint at p. 24–38. Alaska Electrical Pension Fund v. Bank of America Corporation and others (United States District Court, Southern District of New York, 2014).
  • Deferred Prosecution Agreement. United States of America v. Wachovia Bank, N.A . (United States District Court, Southern District of Florida, 2010).
  • Plea Agreement, Exhibit Statement of Facts. United States of America v. BNP Paribas, S.A . (United States District Court, Southern District of New York, 2014).

1. The most incriminating evidence for Tourre was an e-mail that had surfaced in the SEC investigation that read: “more and more leverage in the system, the whole building is about to collapse anytime now . . . Only potential survivor, the fabulous Fab . . . standing in the middle of all these complex, highly leveraged, exotic trades he created without necessarily understanding all of the implications of those monstrosities!!!” (cited in Rosoff, Pontell, & Tillman, 2014 , p. 261).

2. Examples of financial derivatives contracts are options, futures, swaps, and collateralized debt obligations (CDOs).

3. Note that this manipulation strategy is equivalent to the trade-based strategy discussed earlier that is known as “banging the close.”

Related Articles

  • Legal and Political Reponses to White-Collar Crime
  • Statistical Analysis of White-Collar Crime
  • White-Collar Delinquency
  • Public Knowledge About White-Collar Crime
  • Corporate Crime and the State
  • Economic Crises, Common Crime, and Penality
  • The Characteristics of Illegal Markets
  • Women and White-Collar Crime
  • Theoretical Perspectives on White-Collar Crime
  • White-Collar Crimes Beyond the Nation-State
  • Money Laundering: History, Regulations, and Techniques

Printed from Oxford Research Encyclopedias, Criminology and Criminal Justice. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 13 May 2024

  • Cookie Policy
  • Privacy Policy
  • Legal Notice
  • Accessibility
  • [66.249.64.20|195.158.225.244]
  • 195.158.225.244

Character limit 500 /500

Financial Technologies and Financial Crime: Key Developments and Areas for Future Research

  • First Online: 04 February 2022

Cite this chapter

financial crime research topics

  • Louis de Koker 5 &
  • Doron Goldbarsht 6  

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 47))

1246 Accesses

2 Citations

Financial technologies, the ways in which they can be abused by criminals, and the responses by regulators, industry and law enforcement are changing fast. This is a dynamic area. It is, furthermore, important to bear in mind that we are witnessing the early stages of the development and implementation of key technologies and the pace of change and disruption is therefore set to increase. This chapter considers key developments that are important emerging areas for future research in financial crime. The following overlapping and mutual reinforcing developments are identified as important for researcher engagement: Stablecoins and central bank digital currencies (CBDCs); expanding identification programs; FATF's virtual asset service provider (VASP) framework; structural changes in the financial landscape; technologies supporting supervision (suptech) and compliance (regtech); and open banking broadening to open finance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Eyers ( 2021 ).

Eyers ( 2019 ); Massad ( 2020 ).

Baydokova ( 2021 ).

Cœuré ( 2020 ).

Auer and Böhme ( 2021 ).

Jones ( 2021 ).

Boar et al. ( 2020 ), p. 3.

Bank for International Settlement ( 2021 ), p. 72.

European Central Bank ( 2020 ), para 5.1.2.

Pocher ( 2020 ), p. 6.

European Central Bank ( 2020 ), para 5.1.2; STELLA ( 2020 ).

De Koker ( 2013 ).

STELLA ( 2020 ).

Casanovas ( 2015 ).

Lyon ( 2009 ), p. 607.

Lyman et al. ( 2019 ), p. 10.

Desai et al. ( 2018 ).

Jenik et al. ( 2020 ).

Capgemini and BNP Paribas ( 2018 ), p. 10.

FATF ( 2020a ).

Federal Reserve ( 2020 ), p. 2.

FATF ( 2020a ), para 118.

Federal Reserve ( 2019 ), p. 9.

Federal Reserve ( 2019 ); Engler ( 2020 ); Federal Reserve ( 2020 ), p. 2.

FATF ( 2012–21 ), Recommendation 24; FATF ( 2019a ).

FATF ( 2012–21 ), Recommendation 25.

Knobel ( 2020 ).

Financial Stability Board ( 2018 ).

Global Legal Entity Identifier Foundation ( 2021 ).

Mehar et al. ( 2019 ).

FATF ( 2019b ), para 32; Paesano ( 2019 ).

FATF ( 2020b ), para 24.

FATF ( 2020b ), para 28.

FATF ( 2021b ), para 27.

Goldbarsht ( 2020 ).

Soni ( 2021 ).

FATF ( 2021b ), para 26; Coelho et al. ( 2021 ).

FATF ( 2021b ), para 4.

De Koker et al. ( 2021 ).

FATF ( 2021b ), paras 54–58.

FATF ( 2021b ), para 74.

FATF ( 2021b ), para 75.

FATF ( 2021b ), para 80.

FATF ( 2021b ), para 87.

FATF ( 2021b ), para 85.

FATF ( 2021b ), para 90.

FATF ( 2021a ), para 35.

FATF ( 2021a ), paras 35–36.

Pol ( 2018 ).

Casanovas et al. ( 2017 ).

Carstens et al. ( 2021 ).

Carstens ( 2019 ); Carstens et al. ( 2021 ).

Financial Stability Board ( 2020a ), p. 5.

Financial Stability Board ( 2020a ), p. 4.

Lyman et al. ( 2019 ), p. 3. See also p. 9 for a typology of collaborative customer due diligence models that includes centralised KYC (cKYC) and sovereign identity models.

Nederlandse Vereniging van Banken ( 2021 ); FATF ( 2021c ), para 43.

Association of Banks in Singapore ( 2018 ).

Maxwell and Artingstall ( 2017 ).

UK Home Office ( 2015 ).

Chadderton and Norton ( 2019 ).

Maxwell ( 2020a ).

Di Castri et al. ( 2018a ); De Koker et al. ( 2019 ); Momberg and De Koker ( 2020 ); Financial Stability Board ( 2020b ); Coelho et al. ( 2021 ).

Casanovas et al. ( 2020 ); Waddington ( 2020 ).

FATF ( 2021c ).

Maxwell ( 2020b ), p. 34.

FATF ( 2021c ), para 38.

Di Castri et al. ( 2018b ), p. 6: ‘Transactional data is sent in plain text or spreadsheets via email or CDs from supervised institutions.’

Momberg and De Koker ( 2020 ).

Directive EU/2015/2366 on payment services in the internal market.

Zetzsche et al. ( 2020 ), p. 46.

Zetzsche et al. ( 2020 ).

Chen and Bellavitis ( 2019 ).

FATF ( 2021a ), para 93; FATF ( 2021b ) para 114.

Weeks ( 2021 ).

Association of Banks in Singapore (2018) Industry banking KYC utility project after-action report: knowledge sharing. ABS, Singapore < https://abs.org.sg/docs/library/kyc-aar_15-nov-2018.pdf >

Auer R, Böhme R (2021) Central bank digital currency: the quest for minimally invasive technology, BIS Working Papers No 948 < https://www.bis.org/publ/work948.pdf >

Bank for International Settlement (2021) Annual economic report 2021. BIS, Basel. https://www.bis.org/publ/arpdf/ar2021e3.pdf

Google Scholar  

Baydokova A (2021) Diem co-creator says original plan for stablecoin was ‘naive’. Coindesk, 27 May < https://www.coindesk.com/diem-co-creator-says-original-plan-for-stablecoin-was-naive >

Boar C et al (2020) Impending arrival – a sequel to the survey on central bank digital currency, BIS Papers No 107. < https://www.bis.org/publ/bppdf/bispap107.pdf >

Capgemini, BNP Paribas (2018) World payments report 2018 < https://worldpaymentsreport.com/wp-content/uploads/sites/5/2018/10/World-Payments-Report-2018.pdf >

Carstens A (2019) Big tech in finance and new challenges for public policy: Speech to FT Banking Summit 2108. SUERF Policy Note Issue No 54. < https://www.suerf.org/docx/f_ccb421d5f36c5a412816d494b15ca9f6_4287_suerf.pdf >

Carstens A, Claessens S, Restoy F, Shin HS (2021) Regulating big techs in finance. BIS Bulletin 45. BIS, Basel, 2 August 2021. < https://www.bis.org/publ/bisbull45.pdf >

Casanovas P (2015) Conceptualisation of rights and meta-rule of law for the web of data. Democracia Digital e Governo Eletrônico 30(12):18–41

Casanovas P et al (2017) Legal compliance by design (LCbD) and through design (LCtD): preliminary survey, CEUR Workshop Proceedings 2049, pp 33–49

Casanovas P et al (2020) Comments on cracking the code: rulemaking for humans and machines (August 2020 draft). Zenodo < https://doi.org/10.5281/zenodo.4166115 >

Chadderton P, Norton S (2019) Public–private partnerships to disrupt financial crime: an exploratory study of Australia’s Fintel Alliance, SWIFT Institute Working Paper No 2017-003. < https://swiftinstitute.org/research/public-private-partnerships-to-disrupt-financial-crime-an-exploratory-study-of-australias-fintel-alliance/?utm_source=dotmailer&utm_medium=email&utm_campaign=fintelalliance >

Chen Y, Bellavitis C (2019) Decentralized finance: blockchain technology and the quest for an open financial system, Stevens Institute of Technology School of Business Research Paper. < https://ssrn.com/abstract=3418557 >

Coelho R et al (2021) Supervising cryptoassets for anti-money laundering, FSI Insights on Policy Implementation No 31 < https://www.bis.org/fsi/publ/insights31.pdf >

Cœuré B (2020) CBDCs mean evolution, not revolution. Coindesk, 21 October < https://www.bis.org/speeches/sp201021a.htm >

De Koker L (2013) The 2012 revised FATF Recommendations: assessing and mitigating mobile money integrity risks within the new standards framework. Washington J Law Technol Arts 8(3):165–196

De Koker L et al (2019) Regulating financial services in an era of technological disruption. Law Context 36(2):90–112

De Koker L et al (2021) Where’s Wally? FATF, virtual asset service providers, and the regulatory jurisdictional challenge. In: Goldbarsht D, De Koker L (eds) Financial technology and the law: combating financial crime. Springer, Wiesbaden (forthcoming)

Desai V et al (2018) The global identification challenge: who are the 1 billion people without proof of identity? World Bank Blogs, 25 April. < https://blogs.worldbank.org/voices/global-identification-challenge-who-are-1-billion-people-without-proof-identity >

Di Castri S et al (2018a) The suptech generations, FSI Insights on Policy Implementation No 19 < https://www.bis.org/fsi/publ/insights19.pdf >

Di Castri S et al (2018b) An AML suptech solution for the Mexican National Banking and Securities Commission (CNBV): R2A project retrospective and lessons learned. R2A, Boston < https://static1.squarespace.com/static/583ddaade4fcb5082fec58f4/t/5bbf9a520d929792c05866e1/1539283556587/R2A+CNBV+Case+Study.pdf >

Engler E (2020) Synthetic identity fraud worrying U.S. regulators. Thomson Reuters Blog, 24 November < https://legal.thomsonreuters.com/blog/synthetic-identity-fraud-worrying-u-s-regulators/ >

European Central Bank (2020) Report on a digital euro. ECB, Frankfurt am Main < https://www.ecb.europa.eu/pub/pdf/other/Report_on_a_digital_euro~4d7268b458.en.pdf >

Eyers J (2019) Regulators struggling with Facebook’s Libra: RBA, Australian Financial Review, 10 December < https://www.afr.com/companies/financial-services/regulators-struggling-with-facebook-s-libra-rba-20191210-p53if5 >

Eyers J (2021) Facebook’s crypto launch is just months away. Aust Financ Rev, 16 June. < https://www.afr.com/companies/financial-services/facebook-s-crypto-launch-is-just-months-away-20210616-p581ex >

Federal Reserve (2019) Synthetic identity fraud in the U.S. payment system: a review of causes and contributing factors. Payments Fraud Insights, July < http://www.fedpaymentsimprovement.org/wp-content/uploads/frs-synthetic-identity-payments-fraud-white-paper-july-2020.pdf >

Federal Reserve (2020) Mitigating synthetic identity fraud in the U.S. payment system. Payments Fraud Insights, July < http://www.fedpaymentsimprovement.org/wp-content/uploads/frs-synthetic-identity-payments-fraud-white-paper-july-2020.pdf >

Financial Action Task Force (FATF) (2012–21) International standards on combating money laundering and the financing of terrorism and proliferation: Forty Recommendations. FATF, Paris < https://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html >

Financial Action Task Force (FATF) (2019a) Best practices on beneficial ownership for legal persons. FATF, Paris. https://www.fatf-gafi.org/media/fatf/documents/Best-Practices-Beneficial-Ownership-Legal-Persons.pdf

Financial Action Task Force (FATF) (2019b) Guidance for a risk-based approach: virtual assets and virtual asset service providers. FATF, Paris. https://www.fatf-gafi.org/media/fatf/documents/recommendations/RBA-VA-VASPs.pdf

Financial Action Task Force (FATF) (2020a) Digital identity. FATF, Paris. https://www.fatf-gafi.org/publications/fatfrecommendations/documents/digital-identity-guidance.html

Financial Action Task Force (FATF) (2020b) 12-month review of the revised FATF standards on virtual assets and virtual asset service providers. FATF, Paris. < http://www.fatf-gafi.org/media/fatf/documents/recommendations/12-Month-Review-Revised-FATF-Standards-Virtual-Assets-VASPS.pdf >

Financial Action Task Force (FATF) (2021a) Draft updated guidance for a risk-based approach to virtual assets and VASPs (for consultation). FATF, Paris < https://www.fatf-gafi.org/media/fatf/documents/recommendations/12-Month-Review-Revised-FATF-Standards-Virtual-Assets-VASPS.pdf >

Financial Action Task Force (FATF) (2021b) Second 12-month review of the revised FATF standards on virtual assets and virtual asset service providers. FATF, Paris. https://www.fatf-gafi.org/media/fatf/documents/recommendations/March%202021%20-%20VA%20Guidance%20update%20-%20Sixth%20draft%20-%20Public%20consultation.pdf

Financial Action Task Force (FATF) (2021c) Stocktake on data pooling, collaborative analytics and data protection. FATF, Paris. https://www.fatf-gafi.org/media/fatf/documents/Stocktake-Datapooling-Collaborative-Analytics.pdf

Financial Stability Board (2018) Thematic peer review on implementation of the legal entity identifier. FSB, Basel. https://www.fsb.org/wp-content/uploads/P160818.pdf

Financial Stability Board (2020a) Enhancing cross-border payments: stage 3 roadmap. FSB, Basel. https://www.fsb.org/wp-content/uploads/P131020-1.pdf

Financial Stability Board (2020b) The use of supervisory and regulatory technology by authorities and regulated institutions: market developments and financial stability implications. FSB, Basel. https://www.fsb.org/wp-content/uploads/P091020.pdf

Global Legal Entity Identifier Foundation (2021) LEI Statistics < https://www.gleif.org/en/lei-data/global-lei-index/lei-statistics >

Goldbarsht G (2020) Global counter-terrorist financing and soft law. Edward Elgar, Cheltenham

Book   Google Scholar  

Jenik I et al (2020) Rapid account opening in a pandemic, CGAP COVID-19 Briefing. < https://www.cgap.org/research/publication/rapid-account-opening-pandemic >

Jones M (2021) Central bank digital currencies get full BIS backing. Reuters, 23 June < https://www.reuters.com/business/central-bank-digital-currencies-get-full-bis-backing-2021-06-23/ >

Knobel A (2020) From outrage to action: how to prevent another 11 years of inaction after the FinCen files. Tax Justice Network Blog, 5 November < https://taxjustice.net/2020/11/05/from-outrage-to-action-how-to-prevent-another-11-years-of-inaction-after-the-fincen-files/ >

Lyman T et al (2019) Beyond KYC utilities: collaborative customer due diligence for financial inclusion, CGAP Working Paper. < https://www.cgap.org/sites/default/files/publications/2019_08_28_Working_Paper_Beyond_KYC_Utilities_0.pdf >

Lyon D (2009) National IDs in a global world: surveillance, security, and citizenship. Case West Reserve J Int Law 42(3):607–623

Massad TG (2020) Facebook’s Libra 2.0: why you might like it even if we can’t trust Facebook. Brookings Institute, Washington DC < https://www.brookings.edu/wp-content/uploads/2020/06/ES-6.22.20-Massad-1.pdf >

Maxwell N (2020a) Five years of growth in public–private financial information-sharing partnerships to tackle crime. Royal United Services Institute, FFIS Program, London. < https://www.future-fis.com/uploads/3/7/9/4/3794525/five_years_of_growth_of_public-private_partnerships_to_fight_financial_crime_-_18_aug_2020.pdf >

Maxwell N (2020b) Innovation and discussion paper: case studies of the use of privacy preserving analysis to tackle financial crime. Royal United Services Institute, FFIS Program, London. < https://www.gcffc.org/wp-content/uploads/2020/06/FFIS-Innovation-and-discussion-paper-Case-studies-of-the-use-of-privacy-preserving-analysis.pdf >

Maxwell N, Artingstall D (2017) The role of financial information-sharing partnerships in the disruption of crime. Royal United Services Institute, FFIS Program, London. < https://www.future-fis.com/uploads/3/7/9/4/3794525/ffis_report_-_oct_2017_web.pdf >

Mehar MI et al (2019) Understanding a revolutionary and flawed grand experiment in blockchain: the DAO attack. J Cases Inf Technol 21(1):19–32

Article   Google Scholar  

Momberg R, De Koker L (2020) Adopting suptech for anti-money laundering: a diagnostic toolkit. BFA Global, Boston. < https://bfaglobal.com/wp-content/uploads/2020/06/R2A-AML-SupTech-Toolkit-04June2020-1.pdf >

Nederlandse Vereniging van Banken (2021) Transaction Monitoring Netherlands: a unique step in the fight against money laundering and the financing of terrorism. < https://www.nvb.nl/english/transaction-monitoring-netherlands-a-unique-step-in-the-fight-against-money-laundering-and-the-financing-of-terrorism/ >

Paesano F (2019) Regulating cryptocurrencies: challenges and considerations, Basel Institute of Governance Working Paper 28. < http://www.baselgovernance.org/publications/working-paper-28-regulating-cryptocurrencies-challenges-and-considerations >

Pocher N (2020) The open legal challenges of pursuing AML/CFT accountability within privacy-enhanced IoM ecosystems. In: Chiaraluce F, Mostarda L (eds) Distributed Ledger Technology. Proceedings of the 3rd Distributed Ledger Technology Workshop co-located with ITASEC 2020. CEUR Workshop Proceedings Vol 2580. < http://ceur-ws.org/Vol-2580/DLT_2020_paper_2.pdf >

Pol R (2018) Anti-money laundering effectiveness: assessing outcomes or ticking boxes? J Money Launder Control 21(2):215–230

Soni S (2021) Crypto market cap doubles to eye-popping $2.3 trillion in 3 months as mainstream adoption gets nearer. Financial Express, 3 May. < https://www.financialexpress.com/market/crypto-market-cap-doubles-to-eye-popping-2-3-trillion-in-3-months-as-mainstream-adoption-gets-nearer/2245246/ >

STELLA (2020) Balancing confidentiality and auditability in a distributed ledger environment. ECB, Frankfurt am Main. https://www.ecb.europa.eu/paym/intro/publications/pdf/ecb.miptopical200212.en.pdf

UK Home Office (2015) Anti-money laundering taskforce unveiled. Media release, 25 February < https://www.gov.uk/government/news/anti-money-laundering-taskforce-unveiled >

Waddington M (2020) Rules as code. Law Context 37(1):1–8

Weeks R (2021) Crypto lobbyists put DeFi proposals to FATF in open letter. The Block, 5 July. < https://www.theblockcrypto.com/post/110506/crypto-lobbyists-put-defi-proposals-to-fatf-in-open-letter >

Zetzsche DA et al (2020) Decentralized finance (DeFi), IIEL Issue Brief 02/2020. < https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3539194 >

Download references

Author information

Authors and affiliations.

La Trobe Law School, Bundoora, VIC, Australia

Louis de Koker

Macquarie Law School, Sydney, NSW, Australia

Doron Goldbarsht

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Louis de Koker .

Editor information

Editors and affiliations, rights and permissions.

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

de Koker, L., Goldbarsht, D. (2022). Financial Technologies and Financial Crime: Key Developments and Areas for Future Research. In: Goldbarsht, D., de Koker, L. (eds) Financial Technology and the Law . Law, Governance and Technology Series, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-88036-1_13

Download citation

DOI : https://doi.org/10.1007/978-3-030-88036-1_13

Published : 04 February 2022

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-88035-4

Online ISBN : 978-3-030-88036-1

eBook Packages : Law and Criminology Law and Criminology (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

To read this content please select one of the options below:

Please note you do not have access to teaching notes, financial crime: a review of literature.

Contemporary Issues in Audit Management and Forensic Accounting

ISBN : 978-1-83867-636-0 , eISBN : 978-1-83867-635-3

Publication date: 10 February 2020

Financial crimes involve several offenses without violence with some people obtaining financial benefit and causing financial loss to some others. The globalization of financial systems, the growing volume of trading transactions, and the acceleration of information technologies have brought many conveniences to the financial world; but unfortunately, financial crime has spread and diversified. Therefore, the fight against financial crimes, which are often complex and organized in a way which is nonviolent but causes significant financial damage to people and organizations, is gaining importance. In this sense, the struggle against this type of crime, which has become a serious threat, must be resolved by applying a comprehensive policy that should include all segments of the society.

In this chapter, we aim to give a general framework of financial crimes and carry out a literature review on the subject. Moreover, we outline the different types of financial crime (such as money laundering, insider dealing, fraud, market abuse, bribery, corruption, terrorist financing, white collar crimes, tax evasion, embezzlement, forgery, counterfeiting, identity theft, etc.) and their impact. As a result, this study has the purpose of providing awareness by drawing attention to the concept of financial crime, which is an important threat nowadays that an ordinary person may suffer at any time in daily life.

  • Financial crime
  • Money laundering
  • Insider dealing
  • Market abuse

Ünvan, Y.A. (2020), "Financial Crime: A Review of Literature", Grima, S. , Boztepe, E. and Baldacchino, P.J. (Ed.) Contemporary Issues in Audit Management and Forensic Accounting ( Contemporary Studies in Economic and Financial Analysis, Vol. 102 ), Emerald Publishing Limited, Leeds, pp. 265-272. https://doi.org/10.1108/S1569-375920200000102019

Emerald Publishing Limited

Copyright © 2020 Emerald Publishing Limited

We’re listening — tell us what you think

Something didn’t work….

Report bugs here

All feedback is valuable

Please share your general feedback

Join us on our journey

Platform update page.

Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

Questions & More Information

Answers to the most commonly asked questions here

Keep in touch!

The financial crime research center (fcrc) combines both practitioner and academic perspectives, with the goal of educating the public with the latest trend on financial crime and identifying the most effective methods for combating it., latest articles, addressing the lack of enthusiasm in indonesia`s stock market.

In recent years, the investment climate in Indonesia has significantly improved. The presence of inf ...

How Terrorist Financing Plays an Important Role in Indonesian Terrorist Groups

When discussing terrorism, most people tend to focus on the attack – how severe were the casualtie ...

The High-Risk for Trade-Based Money Laundering and Red Flag Indicators: Case Studies in Indonesia

Money laundering and terrorist financing continue to strive to find a preferred method to hide or di ...

Actor`s Role in Terrorist Financing: Revisiting the FATF Terrorist Financing Typology Model from An Investigative Perspective

The FATF model is essentially a framework designed to assist FATF and its member countries in compre ...

Illegal Online Loans: A Rising Crime

The digital revolution has provided advancements in financial services. On the other hand, it brough ...

Technology and the Terrible Era of Terrorist Financing

The world is now dealing with varieties of cybercrime, including money laundering, online gambling, ...

Subscribe With Email

Articles on Financial crime

Displaying all articles.

financial crime research topics

Food fraud is a growing economic and health issue – but AI and blockchain technology can help combat it

Adrian Gepp , Bangor University and Milind Tiwari , Charles Sturt University

financial crime research topics

Universities and their students are vulnerable to money laundering – new research

Nicholas Ryder , Cardiff University ; Henry Hillman , University of Reading , and Sam Bourton , University of the West of England

financial crime research topics

AI threatens to add to the growing wave of fraud but is also helping tackle it

Laurence Jones , Bangor University and Adrian Gepp , Bangor University

financial crime research topics

Terrorists are using fraud to fund their activities – the UK government needs to act urgently

Nicholas Ryder , Cardiff University

financial crime research topics

Debt ceiling negotiators reach a deal: 5 essential reads about the tentative accord, brinkmanship and the danger of default

Bryan Keogh , The Conversation and Matt Williams , The Conversation

financial crime research topics

Speaker McCarthy lays out initial cards in debt ceiling debate: 5 essential reads on why it’s a high-stakes  game

financial crime research topics

FTX’s collapse mirrors an infamous 18th century British financial scandal

Amy Froide , University of Maryland, Baltimore County

financial crime research topics

€55 billion cum-ex trading scandal has scary parallels with Enron

Adam Nix , De Montfort University and Stephanie Decker , University of Bristol

financial crime research topics

Why New Zealand courts should take poverty into account in sentencing decisions

Lisa Marriott , Te Herenga Waka — Victoria University of Wellington

financial crime research topics

There’s a wider scandal suggested by the Trump investigations

Ofer Raban , University of Oregon

financial crime research topics

Danske Bank: the story of Europe’s biggest money laundering scandal

Sean Curley , Staffordshire University

Related Topics

  • Financial Fraud
  • Kevin McCarthy
  • Machine learning
  • Money laundering
  • National debt
  • US Debt Ceiling
  • US House of Representatives

Top contributors

financial crime research topics

Professor of Data Analytics, Bangor University

financial crime research topics

Part-Time Professor of Economics, The New School

financial crime research topics

Professor of Law, Cardiff University

financial crime research topics

Professor of Constitutional Law, University of Oregon

financial crime research topics

Professor of Taxation, Te Herenga Waka — Victoria University of Wellington

financial crime research topics

Professor of History, University of Maryland, Baltimore County

financial crime research topics

Dean, Law Policing and Forensics, Staffordshire University

financial crime research topics

Professor of Public Policy (retired), University of Virginia

financial crime research topics

Lecturer in Fraud and Financial Crime Studies, Charles Sturt University

financial crime research topics

Lecturer in Responsible Business, University of Birmingham

financial crime research topics

Deputy Chair of Business Administration, Touro University

financial crime research topics

Assistant Professor of Business Economics and Public Policy, University of Michigan

financial crime research topics

Ph.D. Student in Public Policy, Harvard Kennedy School

financial crime research topics

Associate Professor of Political Science, Northwestern University

financial crime research topics

Lecturer in Finance, Bangor University

  • X (Twitter)
  • Unfollow topic Follow topic

FATF logo

  • FATF Presidency
  • Mandate of the FATF
  • Outcomes of meetings
  • Ministerial Declarations
  • History of the FATF
  • FATF Secretariat
  • Job opportunities

Find out about the world, a region, or a country

FATF Member Countries

  • Hong Kong, China
  • Netherlands
  • New Zealand
  • Russian Federation *
  • Saudi Arabia
  • South Africa
  • Switzerland
  • United Kingdom
  • United States

* membership suspended on 24 February 2023 

FATF Global Network 

  • Asia/Pacific Group on Money Laundering (APG)
  • Caribbean Financial Action Task Force (CFATF)
  • Eurasian Group (EAG)
  • Eastern and Southern Africa Anti-Money Laundering Group (ESAAMLG)
  • Financial Action Task Force of Latin America (GAFILAT)
  • Inter Governmental Action Group against Money Laundering in West Africa (GIABA)
  • Middle East and North Africa Financial Action Task Force (MENAFATF)
  • Committee of Experts on the Evaluation of Anti-Money Laundering Measures (MONEYVAL)
  • FATF Global Network

High-Risk and Other Monitored Jurisdictions 

  • Jurisdictions under Increased Monitoring - 23 February 2024
  • High-Risk Jurisdictions subject to a Call for Action - February 2024

Browse our publications, including reports, guidance and statements  

  • Publications Publications on FATF's areas of work, from Standard Setting, methods and trends, guidance and best practices. to assessments conducted by the FATF and the FATF-Style Regional Bodies.

Recent statements

Current or recent public consultations

  • Public Consultation on Recommendation 16 on Payment Transparency
  • Public Consultation on the FATF Best Practice Paper to Combat the Abuse of Non Profit Organisations
  • Public Consultation on the Revision of Recommendation 8 and its Interpretive Note

Key documents

  • The FATF Recommendations
  • FATF Methodology for assessing compliance with the FATF Recommendations and the effectiveness of AML/CFT systems
  • Consolidated assessment ratings

Explore the FATF's areas of work:

Methods and Trends

  • FATF Recommendations
  • Mutual Evaluations
  • High-risk and other monitored jurisdictions
  • Financial inclusion and NPO issues
  • Terrorist Financing
  • Proliferation financing
  • Beneficial Ownership
  • Asset recovery
  • Digitalisation
  • Virtual Assets

Environmental Crime

  • Assessments

The methods used to launder the proceeds of criminal activities and to finance illicit activities are in constant evolution. As the international financial sector implements the FATF standards, criminals must find alternative ways to launder their dirty money.

The FATF carries out research into evolving methods and trends to assist countries in identifying, assessing and understanding their money laundering and terrorist financing risks. Once these risks are properly understood, countries will be able to implement more effective measures to mitigate the risks. 

Key work concluded under the Singapore Presidency of the FATF includes:

Crowdfunding for Terrorism Financing

31 Oct 2023

financial crime research topics

Countering Ransomware Financing

14 Mar 2023

financial crime research topics

Money Laundering and Terrorist Financing in the Art and Antiquities Market

27 Feb 2023

financial crime research topics

Other recent work:

Ethnically or racially motivated terrorism financing.

financial crime research topics

Environmental crime is one of the most profitable criminal enterprises, generating around USD 110 to 281 billion in criminal gains each year.  It covers a wide range of unlawful activities such as illegal logging, illegal wildlife trade and waste trafficking.

These activities can have far-reaching implications for the environment, economy, public health and safety. The FATF is focussing on the link between environmental crime and money laundering.  This work aims to raise awareness about the financial flows that fuel environmental crime and how they are laundered.

The FATF's work on environmental crime builds on earlier work by the FATF on how countries can combat money laundering from the illegal wildlife trade. The illegal wildlife trade is a major transnational organised crime, which generates billions of criminal proceeds each year. One of the most effective ways to identify the broader criminal networks, and take the profit out of this crime, is to follow the financial trails of wildlife traffickers.  The FATF’s 2020 report highlighted the need for every country to assess their money laundering risks related to the illegal wildlife trade and to ensure that there is a robust legal framework to go after the finances of wildlife traffickers, and to pursue financial investigations.

FATF's work on money laundering from environmental crimes aims to raise awareness about the financial flows that fuel crimes such as illegal logging, illegal wildlife trade and waste trafficking and will also inform possible future policy development.

financial crime research topics

Publications about methods and trends in money laundering, terrorist financing and the financing of proliferation

Filter results.

  • Publications
  • Private Sector
  • Information for students and academia
  • Fraud Warning
  • Frequently Asked Questions
  • FATF Glossary
  • FATF Training and Support Activities

Restricted access for FATF delegates only

Twitter

Terms & conditions | Privacy Policy |  Sitemap  

© fatf-gafi 2024. All rights reserved

Business development

  • Billing management software
  • Court management software
  • Legal calendaring solutions

Practice management & growth

  • Project & knowledge management
  • Workflow automation software

Corporate & business organization

  • Business practice & procedure

Legal forms

  • Legal form-building software

Legal data & document management

  • Data management
  • Data-driven insights
  • Document management
  • Document storage & retrieval

Drafting software, service & guidance

  • Contract services
  • Drafting software
  • Electronic evidence

Financial management

  • Outside counsel spend

Law firm marketing

  • Attracting & retaining clients
  • Custom legal marketing services

Legal research & guidance

  • Anywhere access to reference books
  • Due diligence
  • Legal research technology

Trial readiness, process & case guidance

  • Case management software
  • Matter management

Recommended Products

Conduct legal research efficiently and confidently using trusted content, proprietary editorial enhancements, and advanced technology.

Fast track case onboarding and practice with confidence. Tap into a team of experts who create and maintain timely, reliable, and accurate resources so you can jumpstart your work.

A business management tool for legal professionals that automates workflow. Simplify project management, increase profits, and improve client satisfaction.

  • All products

Tax & Accounting

Audit & accounting.

  • Accounting & financial management
  • Audit workflow
  • Engagement compilation & review
  • Guidance & standards
  • Internal audit & controls
  • Quality control

Data & document management

  • Certificate management
  • Data management & mining
  • Document storage & organization

Estate planning

  • Estate planning & taxation
  • Wealth management

Financial planning & analysis

  • Financial reporting

Payroll, compensation, pension & benefits

  • Payroll & workforce management services
  • Healthcare plans
  • Billing management
  • Client management
  • Cost management
  • Practice management
  • Workflow management

Professional development & education

  • Product training & education
  • Professional development

Tax planning & preparation

  • Financial close
  • Income tax compliance
  • Tax automation
  • Tax compliance
  • Tax planning
  • Tax preparation
  • Sales & use tax
  • Transfer pricing
  • Fixed asset depreciation

Tax research & guidance

  • Federal tax
  • State & local tax
  • International tax
  • Tax laws & regulations
  • Partnership taxation
  • Research powered by AI
  • Specialized industry taxation
  • Credits & incentives
  • Uncertain tax positions

A powerful tax and accounting research tool. Get more accurate and efficient results with the power of AI, cognitive computing, and machine learning.

Provides a full line of federal, state, and local programs. Save time with tax planning, preparation, and compliance.

Automate workpaper preparation and eliminate data entry

Trade & Supply

Customs & duties management.

  • Customs law compliance & administration

Global trade compliance & management

  • Global export compliance & management
  • Global trade analysis
  • Denied party screening

Product & service classification

  • Harmonized Tariff System classification

Supply chain & procurement technology

  • Foreign-trade zone (FTZ) management
  • Supply chain compliance

Software that keeps supply chain data in one central location. Optimize operations, connect with external partners, create reports and keep inventory accurate.

Automate sales and use tax, GST, and VAT compliance. Consolidate multiple country-specific spreadsheets into a single, customizable solution and improve tax filing and return accuracy.

Risk & Fraud

Risk & compliance management.

  • Regulatory compliance management

Fraud prevention, detection & investigations

  • Fraud prevention technology

Risk management & investigations

  • Investigation technology
  • Document retrieval & due diligence services

Search volumes of data with intuitive navigation and simple filtering parameters. Prevent, detect, and investigate crime.

Identify patterns of potentially fraudulent behavior with actionable analytics and protect resources and program integrity.

Analyze data to detect, prevent, and mitigate fraud. Focus investigation resources on the highest risks and protect programs by reducing improper payments.

News & Media

Who we serve.

  • Broadcasters
  • Governments
  • Marketers & Advertisers
  • Professionals
  • Sports Media
  • Corporate Communications
  • Health & Pharma
  • Machine Learning & AI

Content Types

  • All Content Types
  • Human Interest
  • Business & Finance
  • Entertainment & Lifestyle
  • Reuters Community
  • Reuters Plus - Content Studio
  • Advertising Solutions
  • Sponsorship
  • Verification Services
  • Action Images
  • Reuters Connect
  • World News Express
  • Reuters Pictures Platform
  • API & Feeds
  • Reuters.com Platform

Media Solutions

  • User Generated Content
  • Reuters Ready
  • Ready-to-Publish
  • Case studies
  • Reuters Partners
  • Standards & values
  • Leadership team
  • Reuters Best
  • Webinars & online events

Around the globe, with unmatched speed and scale, Reuters Connect gives you the power to serve your audiences in a whole new way.

Reuters Plus, the commercial content studio at the heart of Reuters, builds campaign content that helps you to connect with your audiences in meaningful and hyper-targeted ways.

Reuters.com provides readers with a rich, immersive multimedia experience when accessing the latest fast-moving global news and in-depth reporting.

  • Reuters Media Center
  • Jurisdiction
  • Practice area
  • View all legal
  • Organization
  • View all tax

Featured Products

  • Blacks Law Dictionary
  • Thomson Reuters ProView
  • Recently updated products
  • New products

Shop our latest titles

ProView Quickfinder favorite libraries

  • Visit legal store
  • Visit tax store

APIs by industry

  • Risk & Fraud APIs
  • Tax & Accounting APIs
  • Trade & Supply APIs

Use case library

  • Legal API use cases
  • Risk & Fraud API use cases
  • Tax & Accounting API use cases
  • Trade & Supply API use cases

Related sites

United states support.

  • Account help & support
  • Communities
  • Product help & support
  • Product training

International support

  • Legal UK, Ireland & Europe support

New releases

  • Westlaw Precision
  • 1040 Quickfinder Handbook

Join a TR community

  • ONESOURCE community login
  • Checkpoint community login
  • CS community login
  • TR Community

Free trials & demos

  • Westlaw Edge
  • Practical Law
  • Checkpoint Edge
  • Onvio Firm Management
  • Proview eReader

financial crime research topics

5 Emerging New Fraud and Financial Crime Trends – Stories from the Front Lines

Fraud has a way of always staying one step ahead. Fraudsters are essentially the ultimate “early adopters”: not buying the newest tech but always willing to test out a new type of fraud or financial crime.

What are some of the newer frauds being played out in the due diligence and KYC spaces? As a public records industry expert who has spent the last 10 years working directly with customers using Thomson Reuters CLEAR, I’ve seen my share of fraud and suspicious activity. Below are a few examples that stand out.

1. Impersonating a company and the motivation behind it

Why would someone fraudulently claim to be the owner of a company? Answers can include setting up fraudulent accounts with merchant sites, payment software platforms, websites, or bank loans — to name a few. And of course, wanting to get government funds through the Paycheck Protection Program (PPP) or Economic Income Disaster Loans (EIDL).

I encountered a recent form of fraud involving a merchant attempting to set up accounts with fintechs and payment providers to be approved merchants. The person claiming to own the business does not verify having any connection to the business. Ironically, in each of the frauds encountered here, companies vetting the new “merchant” were adamant they provided tech solutions verifying the subject was legitimate and tied to the business.

2. Front business owners

Another type of fraud is when a company presents a “front” owner — someone who looks clean — and “hides” the true owner of the company; an egregious example comes to mind. A business owner running an online merchant site was vetted for Know Your Customer (KYC) by a payment provider.

CLEAR immediately flagged an unknown connection to a convicted narco-trafficker in the form of six shared addresses (including a current shared address) as well as two phones over a 15-year period. The hidden narco-trafficker found a front person for his business — one who would appear “clean” to businesses without technology.

3. Account takeover via duplicate card request and additional signors to accounts

Requesting a duplicate card or setting up another signor on a fraudulent account is an example of an “account takeover.” The fraudster has stolen all the subject’s data and has legitimate data to verify the account. However, the one piece the fraudster can’t verify is having the subject’s device. Both device and phone checks can verify the subject doesn’t match up to the personally identifiable information (PII) being presented.

Another way to stop similar types of fraud is to require a scan and verification of a state driver’s license; the scan confirms the document is tied to the subject. These types of step-up authentications make sense when riskier financial events are taking place.

4. Car loan bust outs

And of course, there’s the still-rampant synthetic identity fraud. For those unfamiliar with the term, synthetic identity is the process by which fraudsters create a fictitious identity using real and contrived personal information to defraud banks, retailers, government services, or individual consumers.

Unlike traditional identity theft, fraudsters do not assume the identity of an existing individual and run up debt on their behalf. Instead, they leverage gaps in various critical financial systems — such as the credit reporting system — or exploit lax KYC verification processes that enable the creation of synthetic identities. The fraudster will cultivate these identities by establishing and paying on small credit lines with the aim of eventually cashing out, which is also known as “ busting out. ”

Anecdotally, this fraud has played out in the car loan space — especially smaller car dealerships providing their in-house financing that lack the software to detect synthetics. I’ve encountered some creative fraudsters in this space. I recall a subject processed in CLEAR having 10 unique social security numbers (SSNs) and profiles. Another person had five SSNs and various addresses.

Software exists today to show the likelihood that PII will be manipulated; that software should be leveraged. At a minimum, it will provide insight on how to handle an account that looks synthetic.

5. Real estate money laundering

Money laundering finds many avenues and one of the easiest methods is purchasing real estate. In a recent study , $2.3 billion had been laundered in the last five years through real estate in the U.S.

This sum is tied to previously reported or adjudicated cases, meaning it doesn’t address the undetected amount. The biggest reason money laundering can go undetected stems from cash purchases made by shell companies with no insight into the “true” person(s) behind the transaction.

The Biden administration urges the Treasury Department to revoke regulatory exemptions for agents mandated to identify their “ultimate clients” or report suspicious activity, as required of banks and broker/dealers. Anonymous shell companies and complex corporate structures remain the most popular way to structure real estate — avoiding detection of the true owner.

We are still several years away from the Corporate Transparency Act , “set to take effect no later than January 1, 2023,” according to Carl A. Valenstein and Jose T. Robles, JR of Morgan Lewis and Bockius LLP. Its main goal is to expose the “true owners” behind shell corporations. Although we now have Geographic Targeting Orders (GTO) requiring title insurance companies to identify “true persons” behind shell companies, most markets in the U.S. have no such requirements.

These shell companies buy residential real estate for $300,000 or more with cash or virtual currency in certain big markets such as NYC, LA, Las Vegas, Miami, Dallas, Chicago, and Boston. Purchases made without title insurance — such as all-cash transactions — evade detection completely. Finally, brokers have no requirements to identify “true owners” of properties. Reviewing who is tied to recent, large real estate transactions reveals there are criminals who can be found.

The takeaway from these emerging trends is that fraudsters will always adapt to exploit the gaps in processes. The million-dollar question is, are you adapting your AML and KYC protocols at the same rate, or faster?

Related insights

financial crime research topics

Cryptocurrency: Risks to your institution and the regulatory landscape

financial crime research topics

PPP loans and fraud: Red flags that could have been spotted

financial crime research topics

What You Need to Know about Synthetic Identity Fraud

financial crime research topics

Discover how to protect your organization from risk and increase the accuracy of your AML/KYC investigations while saving time and money

  • Account details
  • Follow topics
  • Saved articles
  • Newsletters
  • Help Centre
  • Subscriber rewards

You are currently accessing Central Banking via your Enterprise account.

If you already have an account please use the link below to sign in .

If you have any problems with your access or would like to request an individual access account please contact our customer service team.

Phone: 1+44 (0)870 240 8859

Email: [email protected]

Financial crime

Follow Financial crime

Maltese prosecutor charges central bank governor with fraud

Scicluna previously denied all wrongdoing while serving as finance minister.

  • 09 May 2024

financial crime research topics

  • Crypto Assets

Binance founder sentenced to four months in prison

  • 02 May 2024

financial crime research topics

US requests three-year prison sentence for Binance founder

  • 25 Apr 2024

financial crime research topics

Vietnamese court jails former central bank officials for bribery

  • 12 Apr 2024

financial crime research topics

Nigerian prosecutors bring new charges against Emefiele

Authorities allege that ex-governor illegally allocated $2.1 billion in FX

  • 08 Apr 2024

financial crime research topics

  • Financial Stability

MAS launches AML data-sharing platform

Banks can share data on suspicious activities by customers, Singapore’s central bank says

  • 03 Apr 2024

financial crime research topics

Debt-related driving bans create instability – Fed research

Punishments disproportionately affect low-income and minority communities

  • 27 Mar 2024

financial crime research topics

Fight against money laundering must continue, Somali official says

Somali central bank aims to enhance transparency over financial flows, says deputy governor

  • 06 Mar 2024

Nigerian authorities accuse ex-governor of $6m theft

Emefiele has denied all charges but prosecutors say cheque to president was forged

  • 15 Feb 2024

financial crime research topics

Riksbank HR system restored 17 days after ransomware attack

Other incidents using Akira software reported across the world since 2023

  • 09 Feb 2024

financial crime research topics

Head of Romania’s central bank ‘deepfaked’ by scammers

NBR says fraudsters’ use of AI-generated video points to increasing risks from manipulated imagery

  • 06 Feb 2024

financial crime research topics

HKMA proposes easing data-sharing rules between banks

Hong Kong authorities cite need to tackle digital fraud and money laundering more effectively

  • 24 Jan 2024

financial crime research topics

Venezuela shuts down state cryptocurrency

Petro overseer had been embroiled in scandals, including over $21.2 billion of missing oil payments

  • 23 Jan 2024

Singapore moves to expand MAS’s supervisory powers

Central bank would oversee currently unregulated activities and have greater investigative remit

  • 12 Jan 2024

financial crime research topics

Former PBoC official jailed for 16 years for corruption

Court finds Sun Guofeng took $2.94 million in bribes and conducted inside trading

  • 02 Jan 2024

financial crime research topics

Jamaica ‘twin peaks’ law coming in 2025, official says

Central bank will oversee non-bank sector after scandal at securities firm

  • 15 Dec 2023

financial crime research topics

BoJ’s CBDC designed to hold ‘minimum’ amount of user data

Offline solutions deemed to pose too great a risk of double spending and counterfeiting

  • 14 Dec 2023

financial crime research topics

Crypto, trade and environmental crime among AML/CFT risks – IMF

Staff propose increasing country assessments to twice per year

  • 06 Dec 2023

financial crime research topics

Cyprus central bank defends supervision after sanctions-busting claims

Prime minister pledges report after media investigation says Russians used local firms to dodge sanctions

  • 27 Nov 2023

financial crime research topics

Former Nigerian central bank governor granted bail on fraud charges

Emefiele pleads not guilty to new $2 million fraud indictment, trial starts November 28

  • 24 Nov 2023

financial crime research topics

ECB prioritises IT outsourcing and cyber resilience supervision

Institutions lost $161 million due to poor-quality outsourced services in 2022

  • 23 Nov 2023

financial crime research topics

Data sharing as a policy intervention

Increasing access to data represents another policy lever regulators can pull to achieve their objectives, writes David Bholat

  • 06 Nov 2023

financial crime research topics

Sam Bankman-Fried takes the stand in wire fraud trial

FTX head says he doesn’t know how $9 billion in funds disappeared

  • 31 Oct 2023

financial crime research topics

US Treasury division proposes crypto mixer regulation

Proposals target terrorism financing after Office of Foreign Assets Control sanctions Hamas

  • 24 Oct 2023

You need to sign in to use this feature. If you don’t have a Central Banking account, please register for a trial.

You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Alternatively you can request an individual account

Financial Crime and Cyber Crime Research Network

Details about the Financial Crime and Cyber Crime Research Network at UWE Bristol

The Financial Crime and Cyber Crime Research Network comprises members of the Global Crime, Justice and Security Research Group , the Computer Science Research Centre  at UWE Bristol, and external scholars.

View the profiles of the Network members who lead research into financial and cyber crime.

Dr Mary Young , Senior Lecturer, UWE Bristol Mary is a recognised subject expert in financial crime in offshore financial centres and transnational organised crime. She is a subject expert for the Global Initiative Against Transnational Organised Crime, and a contributing intelligence analyst with Open Briefing. She has been researching the complex relationship between financial secrecy, criminal proceeds and offshore financial centres since 2003, when she undertook the LLM International Business Law at Aberystwyth University – she later focused on the subject for her PhD (Aberystwyth University, 2011).

Mary’s main research interests surround the concept of confiscation law and its interaction with financial secrecy laws. She is also interested in transnational crime at the wider level, particularly drug trafficking and its interaction with drug trafficking. In October 2012, Mary gave a training workshop on offshore financial centres and money laundering for members of the Abu Dhabi Police force, held at the (former) Serious Organised Crime Agency (SOCA) headquarters. In 2013, Mary was interviewed on the subjects of money laundering and offshore banking for international publications including the  LA Times . She was interviewed in 2014 by the Eastern Europe desk of  Deutsche Welle  (the German news broadcaster), the  Financial Times , and was invited to speak by Dods Parliamentary Communications.  With recent and forthcoming projects, she has concentrated on empirical research to uncover the truths behind wildlife trafficking and money laundering in Vietnam. Mary was a Visiting Research Fellow of the Lauterpacht Centre for International Law, Cambridge University (2015 and 2017).

Samantha Bourton ,  Lecturer in Law, UWE Bristol Sam has been an Assistant Support Lecturer in the College of Business and Law at UWE Bristol since November 2014. Her research interests focus on tax evasion, money laundering and fraud. She has published on the areas of money laundering and tax evasion, including the implications of the Fourth European Money Laundering Directive and the response by the UK authorities to the recent HSBC bank tax evasion scandal. Sam is currently working on a book chapter evaluating the responses in the UK and USA to mortgage fraud since the financial crisis of 2007 to 2008. 

Dr Phil Legg , Associate Professor in Cyber Security, UWE Bristol

Phil is an Associate Professor in Cyber Security and Programme Leader for MSc Cyber Security at UWE Bristol. His research interests address the intersections of cyber security, machine learning, visual analytics, and human-computer interaction. He has led externally-funded research projects and works closely with industry partners on PhD research studentships in the areas of cyber, defence and national security, and on industrial consultancy projects. 

Phil is the Programme Leader for MSc Cyber Security course at UWE Bristol, which has been provisionally certified by the NCSC. He teaches Information Risk Management on  MSc Cyber Security , and Security Data Analytics and Visualisation on  BSc Cyber Security and Digital Forensics . Phil supervises PhD students as well as a number of  undergraduate and postgraduate dissertations each year.

He is  also co-founder of the  Colloquium for Information Systems Security Education UK (CISSEUK) , supported by the NCSC, which aims to promote sharing and collaboration to improve cyber security education across the UK.  

Ian Johnson , Associate Head of Department of Information Science, UWE Bristol

Ian is currently Associate Head of Department/Cluster Leader for Cyber Security and Business Computing) in the College of Arts, Technology and Environment at UWE Bristol, where he is responsible for managing roughly a third of the department's staff. Prior to this, he was Programme Leader for the BSc Forensic Computing and Security programme (now renamed Cyber Security and Digital Forensics). He is a highly experienced teacher and academic with a history of programme and module design. He has designed and led modules for nearly 30 years in a number of programmes from the MSc Parallel Computer Systems (1989) through the MSc Systems Administration and Security, to the current undergraduate Forensic Computing and Security programme, for which he led the redesign in 2016. 

Ian's main interests are networks and network security, operating systems and embedded systems. He also has interests covering a wide gamut of cyber security issues, from embedded systems security, through network forensics to the traceability of digital currency transactions.

Diana Johnson , Programme Leader LLB

Diana is a programme leader on the LLB and is a solicitor with several years of practice experience. Before working at UWE Bristol, Diana worked in the European Commission’s Directorate for Competition, then in an international law firm in Brussels and law firms in Bristol. Her research interests focus on the role competition law plays in the enforcement and regulation of financial crime, specifically that of benchmark rate manipulation. Diana has written several articles and a book chapter for an edited collection by Routledge. Diana is undertaking a PhD in financial crime and competition law.

Dr Ester Herlin-Karnell ,  Associate Professor of EU Constitutional Law and Justice, VU University of Amsterdam

Ester is a Professor of EU Constitutional Law and Justice and the Co-Director of the VU Centre for European Legal Studies. Her publications include a monograph on the constitutional dimension of European criminal law (Hart publishing, 2012) and numerous articles on the EU security regulation, EU criminal law, constitutional aspects of EU law and on regulatory market-based challenges in the EU’s fight against financial crimes and terrorism. She is also the co-author (with Nicholas Ryder) of  Market manipulation and the financial crisis: Regulatory challenges and responses in United States of America, the European Union and the United Kingdom , (forthcoming Hart Publishing 2018), as well as the co-editor (with M Fletcher and C Matera) of  The European Union as an Area of  
 Freedom, Security and Justice .

Dr Umut Turksen , Professor in Law, Coventry University

Umut has 15 years of international experience in designing, managing and delivering legal education, research and high impact consultancy projects in prestigious organisation.  Umut is the Head of Commercial Law Research Unit. He is a business facing academic who is currently researching the risks, challenges and opportunities that the digital assets and property pose for society. He has published extensively in the area of financial crime and brings a wide range of expertise and experience in areas including international trade and economic law, energy law, counter-terrorism law, financial crime and banking regulations, commercial law and European Union law.

Saamir Nizam , Solicitor at DWF, Editor-in-Chief, Scottish Parliamentary Review and The British Journal of White Collar Crime

Saamir is chief editor of  The British Journal of White Collar Crime  and the  Scottish Parliamentary Review . Saamir has over 25 years of experience in researching and drafting legislation, committee reports, and investigative materials relating to financial and budgetary matters. In the past, Saamir participated in the BCCI investigation (and legislative/regulatory responses), the savings and loan crisis (and resulting legislation), financial failures by municipalities and public bodies, and more recently, the mortgage loan crises. His legal practice will entail EU/UK/US competition/antitrust law, cartel offences, corporate investigations, and white collar criminal defence. Saamir holds a BA (George Washington), LLB (Edinburgh Napier), MSc and Dip LP (Edinburgh) degrees and is currently a visiting scholar and tutor at the University of St Andrews.

Andrew Baker , Senior Lecture, Liverpool John Moores University

Andrew is a senior lecturer at Liverpool John Moores University. His research interests are in the regulation of banks and financial crime. A specific focus of his interests is in the links between regulation and market abuse, and whether an alternative to the current regulatory reforms could be found in an enhanced sanctions-based regime. Other research interests include the confiscation of criminally obtained assets and the difficulties posed by law enforcement in denying criminal enterprises the fruits of the illegal activities.  Andrew is a doctoral candidate at UWE Bristol researching the current developments in regulatory reform, with a focus on the complexity of regulatory regimes and what alternative mechanisms are available. Andrew has written articles on corporate social responsibility in banks and on the UK market abuse regime. He is course leader for Bank and Financial Services Regulation and Law Relating to Financial Crime on the LLB and LJMU and course leader for Financial Crime on the LLM.

Paul Keenan , Keenan Regulatory Consulting Limited

A senior financial markets professional with extensive and diverse knowledge, skills and experience gained in both on-shore and off-shore investment environments at board and CEO level. Paul has in-depth knowledge of the complex products, the required systems and controls, and regulatory supervision and enforcement in those investment environments that he built on a career in inter-governmental projects and financing, investment banking, regulation and education over 40 years. He also has broad experience of working at committee level with the finance industry's Trade Associations.

The breadth and depth of this combination of professional experiences has uniquely qualified Paul to contribute at a high level to all aspects of the regulatory risk management function. He has a good reputation for the ability to communicate complex ideas to non-expert groups, and for training and coaching others in the intricacies and requirements of compliance policy, from the trading floor up to Board level. He is a highly regarded speaker on regulatory risk and financial crime (AML) issues at Chartered Institute for Securities & Investment Chartered Institute for Securities & Investment (CISI), Complinet and academic seminars.

Professor Jackie Harvey, Professor of Financial Management, Newcastle Business School, Northumbria University

Jackie Harvey is Professor of Financial Management and Director of Business Research at Newcastle Business School. Her research is focused in the area of criminal financial management, in particular money laundering.  Early outputs considered costs and benefits of regulatory compliance before moving on to evaluate the effectiveness of the Anti-Money Laundering Framework.  Jackie has been invited to speak at a number of very high profile academic and practitioner conferences in both the UK and Europe. She is on the Editorial Board for the European Cross-Border Crime Colloquium that brings together researchers from across Europe. Her main teaching interests focus on risk and investment management together with financial market regulation.  Prior to becoming an academic, Jackie, whose PhD is in Taxation Policy, spent 10 years working for a major merchant bank, followed by a three year posting as fiscal policy adviser (under the auspices of the British Government) to the Ministry of Finance in Belize.

Dr Colin King , Reader in Law, The Institute of Advanced Legal Studies

Colin King has joined the Institute as Reader in Law from 1 October 2019. Colin previously worked at the School of Law, University of Sussex, where he co-founded the Sussex Crime Research Centre. Prior to joining Sussex in 2015, Dr King taught at the Universities of Manchester and Leeds. He received his LLB in Law and European Studies, as well as his PhD, from the University of Limerick. Colin has recently published two books,  The Handbook of Criminal and Terrorism Financing Law  (2018) and  Negotiated Justice and Corporate Crime: The Legitimacy of Civil Recovery and Deferred Prosecution Agreements  (2018). In March 2016, Colin gave oral evidence at the Home Affairs Select Committee Inquiry into the Proceeds of Crime Act. He is a member of the AHRC Peer Review College (2015-), on the editorial board of Lloyds Law Reports: Financial Crime (2015-), and an Academic Fellow at the Honourable Society of the Inner Temple (2014-). His teaching is in the areas of Criminal Law; Criminal Evidence; Transnational Offending; Financial Crime; and Banking Law. His research focuses on civil recovery (NCB forfeiture), particularly in Ireland, the UK, the EU, and with reference to the ECHR. Colin is co-editor of  Dirty Assets: Emerging Issues in the Regulation of Criminal and Terrorist Assets  (King and Walker, Ashgate, 2014).

Dr Alison Lui,  Reader in Corporate and Financial Law at Liverpool John Moores University (LJMU)

Alison is a Reader in Corporate and Financial Law. She is the Associate Dean (Global Engagement) for the Faculty of Business and Law at LJMU.  Alison obtained her LLB (European Legal Studies) from the University of Bristol. She spent a year in Germany as part of her undergraduate degree. She then studied a LLM (Corporate and Commercial Law) at the London School of Economics. She obtained her PhD from the University of Liverpool. She qualified as a Solicitor and practised commercial law before joining LJMU. She is a joint module leader for Bank and Financial Services Regulation on the LL.B programme.  Alison’s research interests are predominantly in financial regulation and corporate governance. She has published articles and book chapters. Her monograph  Financial stability and prudential regulation: A comparison between the regulators and central banks of the United Kingdom, the United States, Canada, Australia and Germany  was published in 2016 with Routledge. She has also appeared in radio programmes. Alison has won a number of awards to date. In 2010, she was runner-up in the British Federation of Women Graduates Travel Bursary Competition. In 2011, she was awarded a Winston Churchill Fellowship. A year later, she was a joint winner of a Higher Education Authority grant for employability and social media. In 2013, she was awarded an LJMU Early Career Researcher Fellowship. Alison won a Max Planck Society Scholarship in 2015, which enabled her to spend three months at the Max Planck Institute of Comparative and International Private Law, Hamburg to conduct research into financial regulation. Alison is an Academic Fellow of the Honorary Society of the Inner Temple. She is a reviewer of the Journal of Financial Regulation and Compliance.

Dr Steven Cairns , Lecturer in Banking and Corporate Law, University of Leeds

Steven is a specialist in the role of corporate governance in preventing financial crime within multinational financial groups. His doctoral thesis, entitled  Changing the Culture of Financial Regulation: A Corporate Governance Approach , analysed the roles and responsibilities of the director (both executive and non-executive) within large corporate groups. His research used the global financial crisis as a lens for wider critique. Dr Cairns’ subsequent research has focused on the liability of directors for decision making within the corporate structure. His wider research interests focus on the roles and responsibilities of formal regulators and the board of directors. He currently delivers lectures on banking regulation and financial crime to both undergraduate and postgraduate students.

Dr Lorenzo Pasculli , Associate Head of School at Coventry University

Lorenzo is Assistant Professor of Law at Coventry Law School and Associate of the Centre for Financial and Corporate Integrity at Coventry University. He is the founding Director of the Global Integrity Research Network and Sessional Lecturer in Conflict, Crime and Justice and Law and Professional Ethics for Science and Technology at Imperial College London. Prior to my appointment in Coventry, he was Senior Lecturer in Law at Kingston University London. He has been a visiting researcher at many institutions in the UK and overseas, including Oxford University, Queen's University Belfast, Columbia University, Fordham University, University of Adelaide, Florida International University and Bahcesehir Universitesi Istanbul. Lorenzo's main research interest concern on the prevention of global crimes, such as transnational corruption, corporate crimes, organised crime and terrorism.  His first book on the Measures of Prevention of International Terrorism and Criminal Trafficking (2012) was awarded the international prize "Opera Selezionata G. Falcone - P. Borsellino" in 2015.

You may also be interested in

Upward angle shot of the Lady of Justice statue, holding a sword on her right hand and a pair of weighing scales on her left hand, at the top of the Old Bailey dome against a blue cloudy sky.

Global Crime, Justice and Security Research Group (GCJS)

A forum for research activity in the field of financial crime, criminal justice and procedure, serious organised crime and cyber security.

Computer circuitry in neon blue colours against a dark board.

Computer Science Research Centre (CSRC)

Undertaking fundamental and applied research in computer science.

  • Become a member
  • Account details
  • Follow topics
  • Saved articles
  • Newsletters
  • Contact support
  • Subscriber rewards
  • Latest articles Topics
  • Financial Crime

Follow Financial Crime

  • Custom Insights

Model Risk in Anti-Money Laundering Programs

How the principles of sr 11-7 can help banks strengthen bsa/aml compliance.

  • 13 May 2024

financial crime research topics

Vendor Exposé: Fenergo - Financial Crime and Compliance50 2024

  • 08 May 2024

financial crime research topics

Vendor Exposé: IMTF - Financial Crime and Compliance50 2024

  • 07 May 2024

financial crime research topics

Watchlist and Adverse Media Monitoring Solutions, 2024: Market Update and Vendor Landscape

financial crime research topics

FRAML and beyond – fighting crime, the integrated way

A collaborative article by Chartis and NICE Actimize.

  • 30 Apr 2024

financial crime research topics

Vendor Exposé: KYC360 - Financial Crime and Compliance50 2024

  • 29 Apr 2024

financial crime research topics

  • Watchlist monitoring

Out now: Watchlist Monitoring Solutions, 2024: Market Update and Vendor Landscape

  • 10 Apr 2024

financial crime research topics

Vendor Spotlight: Dixtior - AML Transaction Monitoring Solutions

  • 28 Mar 2024
  • Points of View

Navigating the New Era of Financial Crime Management with Nick Vitchev

financial crime research topics

Financial Crime and Compliance50 2024: Results

  • 14 Mar 2024

Financial Crime and Compliance50 2024

  • 13 Mar 2024

financial crime research topics

  • Client Lifecycle Management

CLM Solutions for Corporate and Investment Banking, 2024: Market Update and Vendor Landscape

You need to sign in to use this feature. If you don’t have a Chartis account, please register for an account.

You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Alternatively you can request an individual account here.

Enable JavaScript in your browser to view this website correctly.

Close panel

financial crime research topics

  • Publications
  • Reading lists
  • Add to "Read later"
  • Eliminar de "Leer más tarde"
  • Add to "My library"
  • Eliminar de "Mi biblioteca"
  • Share on Facebook
  • Share on X (Twitter)
  • Share on LinkedIn
  • Share on WhatsApp
  • Share on Telegram

Global | Financial Regulation: Weekly Update. May 10, 2024

See social media to share

  • X (Twitter)

Close social media to share

See tools to share

Close tools to share

Published on Friday, May 10, 2024

In this publication you will find, on a weekly basis, our selection of the most relevant news regarding financial regulation.

  • Key points:
  • EBA publishes final draft technical standards under the MiCAR
  • ESMA consults on asset eligibility for UCITS
  • SRB extends Minimum Bail-in Data Template consultation deadline
  • EBA issues first part of 2023 annual report
  • US Agencies issue guide on third-party risk management

Documents to download

Glossary (pdf), report (pdf).

  • Matías Daniel Cabrera BBVA Regulation - Regulation Manager
  • Salvador Portillo Bustillo BBVA Regulation - Regulation Manager

Geographies

  • Geography Tags
  • Financial Regulation
  • Banking and Financial Systems

Was this information useful?

  • I found it useful
  • I did not find it useful

New comment

Be the first to add a comment.

You may also be interested in

Post your comment.

IMAGES

  1. Trending Research Topics in Financial Crime Detection

    financial crime research topics

  2. Investigating Financial Crime: Characteristics of White-Collar

    financial crime research topics

  3. Financial Crime & Intelligence Analysis

    financial crime research topics

  4. Financial Crimes

    financial crime research topics

  5. Financial Crime during COVID-19: Tackling fraud, scams and

    financial crime research topics

  6. What Is Financial Crime? AML Terms Explained

    financial crime research topics

VIDEO

  1. Mysterious Gruesome Murder Leaves Investigators In A Deadlock

  2. Financial Crimes Commission Bill : suivez les débats

  3. Financial Crimes Agency Suggests Banks Close Accounts of Conservative "Hate Groups"

  4. New initiative in the works to help Memphis study crime and help prevent it

COMMENTS

  1. Finance Crime

    Defining Finance Crime. The term "finance crime" is used here to refer to white-collar crimes that occur in the markets for financial goods and services—that is, banking, investment, securities, mortgages, pensions, and insurance. In accordance with standing practice in the broader white-collar crime literature, the "crime" label is ...

  2. Full article: The Changing Face of Financial Crime: New Technologies

    The articles included in this issue examine a wide range of topics related to financial crime commission, victimization, prevention, and control. Authors address timely issues and questions such as: How has technology hastened the growth of financial crime both nationally and internationally? ... Data are presented to examine the extent to ...

  3. Intelligent financial fraud detection practices in post-pandemic era

    Introduction. Over the past decades, financial fraud has brought shocking losses to the global economy, threatening the efficiency and stability of capital markets. 1, 2 Making things worse, the coronavirus pandemic (COVID-19) outbreak in early 2020 disrupted the international financial markets in unprecedented ways, heightening the risk of being vulnerable to financial fraud. 3 For example ...

  4. Prevention and Control of Financial Fraud: a Scoping Review

    A scoping review is a particular type of a literature review and aims to "(…) map the literature on a particular topic or research area and ... Journal of Financial Crime, 22(2), 170-183 ... & Silke, A. (2019). Is drawing from the state 'state of the art'?: A review of organised crime research data collection and analysis, 2004-2018

  5. Financial Technologies and Financial Crime: Key Developments ...

    This is a dynamic area. It is, furthermore, important to bear in mind that we are witnessing the early stages of the development and implementation of key technologies and the pace of change and disruption is therefore set to increase. This chapter considers key developments that are important emerging areas for future research in financial crime.

  6. Financial Crime: A Review of Literature

    In this chapter, we aim to give a general framework of financial crimes and carry out a literature review on the subject. Moreover, we outline the different types of financial crime (such as money laundering, insider dealing, fraud, market abuse, bribery, corruption, terrorist financing, white collar crimes, tax evasion, embezzlement, forgery ...

  7. Risks

    Despite all the efforts made to combat economic and financial crime, it remains a long-standing problem. With this Special Issue, we cordially invite researchers to share their results to reflect new directions regarding economic and financial crimes, such as fraud, corruption, the shadow economy, tax evasion, cybercrimes, money laundering. We ...

  8. Centre for Finance and Security

    Banking experts told ICIJ that accounts involving the pornography industry are considered high risk and warrant additional scrutiny. "These transactions should have definitely raised a red flag and the account treated as higher risk with enhanced monitoring," said Kathryn Westmore, a senior research fellow at the Centre for Financial Crime and Security at RUSI, a think tank in London.

  9. AML and Financial crimes investigation

    Over the past ten years, the level of activity in financial-crimes compliance in financial services has expanded significantly, with regulators around the globe taking scores of enforcement actions and levying $36 billion in fines. Many financial institutions have scrambled to implement remediation efforts. Financial-crimes compliance (FCC) was elevated as a function, often reporting to the ...

  10. Fcrc

    The Financial Crime Research Center (FCRC) combines both practitioner and academic perspectives, with the goal of educating the public with the latest trend on financial crime and identifying the most effective methods for combating it.

  11. Financial Crime

    Financial crime threatens the safety and soundness of financial systems world-wide. In some cases, these crimes threaten the security and safety of the nation. These crimes range from fairly simple operations carried out by individuals or small groups to highly sophisticated rings seeking funding for criminal enterprises or terrorism. Although financial criminals are often well-organized and ...

  12. Financial crime News, Research and Analysis

    Denmark's biggest financial institution has admitted that around €200 billion of questionable money flowed through its Estonian branch from 2007-15. Related Topics Educate me

  13. Journal of Financial Crime

    The Journal of Financial Crime (JFC) publishes authoritative, practical and detailed insight in the most serious and topical issues relating to the control and prevention of financial crime and related abuse. ISSN: 1359-0790.

  14. Financial, Cyber & Organised Crime

    Our cutting-edge global research on environmental crime focuses on environmental security, wildlife crime, illegal fishing, corruption and illicit finance. Our research focuses on the threat of fraud as it relates to money laundering, cybercrime and international security. Global illicit flows take diverse forms that are frequently interlinked ...

  15. Methods and Trends

    The methods used to launder proceeds of criminal activities and finance illicit activities are in constant evolution: as the international financial sector implements the FATF standards, criminals must find alternative channels. FATF research will assist countries in identifying, assessing and understanding the money laundering and terrorist financing risks that they are exposed to.

  16. Cryptocurrencies and future financial crime

    Financial crime and compliance: Anecdotal evidence: N/A: Blockvest, BtCrush, Bitcoin, Etherum, Ringgold: Identity theft, phishing, romance scams, ICO scams: Fully reported: Ngai : ... while the existence of a publication on a particular topic is evidence of research effort, this does not necessarily imply that the problem is severe or important

  17. PDF Financial crime and fraud in the age of cybersecurity

    October 2019. In 2018, the World Economic Forum noted that fraud and financial crime was a trillion-dollar industry, reporting that private companies spent approximately $8.2 billion on anti-money laundering (AML) controls alone in 2017. The crimes themselves, detected and undetected, have become more numerous and costly than ever.

  18. Financial Crime and Security

    Financial Crime and Security. Topics in this category provide a deep dive exploration of money-laundering, fraud, illicit trade and trafficking and illicit financial flows. Topics in this category provide a deep dive exploration of money-laundering, fraud, illicit trade and trafficking and illicit financial flows.

  19. 5 Emerging New Fraud and Financial Crime Trends

    Money laundering finds many avenues and one of the easiest methods is purchasing real estate. In a recent study, $2.3 billion had been laundered in the last five years through real estate in the U.S. This sum is tied to previously reported or adjudicated cases, meaning it doesn't address the undetected amount.

  20. Financial crime news and analysis articles

    US Treasury division proposes crypto mixer regulation. Proposals target terrorism financing after Office of Foreign Assets Control sanctions Hamas. Latest Financial crime articles on Central Banks Policy, Regulation, Markets & Institutions.

  21. Financial Crime and Cyber Crime Research Network

    Lorenzo's main research interest concern on the prevention of global crimes, such as transnational corruption, corporate crimes, organised crime and terrorism. His first book on the Measures of Prevention of International Terrorism and Criminal Trafficking (2012) was awarded the international prize "Opera Selezionata G. Falcone - P. Borsellino ...

  22. Financial Crime

    A History of (Non)violence. Marius-Christian Frunza, in Introduction to the Theories and Varieties of Modern Crime in Financial Markets, 2016. 1 Background. The term financial crime covers a broad range of actions that are currently classified as offenses across various jurisdictions. Its sense and scope have evolved throughout history depending of the regulations and the increasing ...

  23. Financial Crime news and analysis articles

    Financial Crime Watchlist and Adverse Media Monitoring Solutions, 2024: Market Update and Vendor Landscape. 07 May 2024; Custom Insights; FRAML and beyond - fighting crime, the integrated way. 30 Apr 2024; Custom Insights Vendor Exposé: KYC360 - Financial Crime and Compliance50 2024. 29 Apr 2024

  24. Global

    Who we are. Big Data. Forecasts. Published on Friday, May 10, 2024. Global | Financial Regulation: Weekly Update. May 10, 2024. In this publication you will find, on a weekly basis, our selection of the most relevant news regarding financial regulation.