Techniques in Building and Linking Complex Evidence in Corruption Cases using the Palermo Convention
1 / 62

Techniques in Building and Linking Complex Evidence in Corruption Cases using the Palermo Convention - PowerPoint PPT Presentation

  • Uploaded on

Techniques in Building and Linking Complex Evidence in Corruption Cases using the Palermo Convention. UNODC. The Problem of Perspective. The tree against the forest:. Types of Corruption. From the perspective of the ACT Single act Repetitive acts Pattern of Corruption.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Techniques in Building and Linking Complex Evidence in Corruption Cases using the Palermo Convention' - jabir

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg

Techniques in Building and Linking Complex Evidence in Corruption Cases using the Palermo Convention


The problem of perspective l.jpg
The Problem of Perspective Corruption Cases using the Palermo Convention

  • The tree against

    the forest:

Types of corruption l.jpg
Types of Corruption Corruption Cases using the Palermo Convention

  • From the perspective of the ACT

    • Single act

    • Repetitive acts

    • Pattern of Corruption

Types of corruption4 l.jpg
Types of Corruption Corruption Cases using the Palermo Convention

  • From the point of view of the PEPETUATOR

    • Single

    • Collective

    • Linked to Organized Crime

Slide5 l.jpg

Collective Offences Corruption Cases using the Palermo ConventionCorruption

Investigation l.jpg
Investigation Corruption Cases using the Palermo Convention

* What is being investigated?

Relationship between a criminal or administrative norm with the reality.

* The rule of evidence is a norm in which the investigation has to be based. Therefore:

- We need strategies

Techniques of investigation forward looking l.jpg
Techniques of Investigation (forward looking) Corruption Cases using the Palermo Convention

  • Criminal activity constituting predicate offences have not yet been committed

    • Electronic Surveillances

    • Controlled Deliveries

    • Undercover Operations

    • Wiretapping

Techniques of investigation backward looking l.jpg
Techniques of Investigation (backward looking) Corruption Cases using the Palermo Convention

  • Investigation of criminal activity is accomplished post facto, by uncovering historical predicate criminal and OC events

  • Collaborating witness

  • Financial investigations

  • Traditional techniques of investigation

Elements of a strategy l.jpg
Elements of a strategy Corruption Cases using the Palermo Convention

* Try to figure out the type of case.

* Determine the technique that you are going to use

* Go to all the elements of the Falcone check list

* Determine the relationship with other international elements

Corruption in the palermo convention l.jpg
Corruption in the Palermo Convention Corruption Cases using the Palermo Convention

Article 8

Criminalization of corruption

1. Each State Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences, when committed intentionally:

(a) The promise, offering or giving to a public official, directly or indirectly, of an undue advantage, for the official himself or herself or another person or entity, in order that the official act or refrain from acting in the exercise of his or her official duties;

(b) The solicitation or acceptance by a public official, directly or indirectly, of an undue advantage, for the official himself or herself or another person or entity, in order that the official act or refrain from acting in the exercise of his or her official duties….

Slide12 l.jpg

Measures against Corruption Corruption Cases using the Palermo Convention

  • Adopt legislative, administrative and other measures to:

    • Promote the integrity of public officials.

    • Prevent, detect and punish .

    • Provide independence to the anticorruption authorities.

Organized crime linked to corruption l.jpg
Organized Crime linked to Corruption Corruption Cases using the Palermo Convention

Organized Crime Group

Group of three or more persons that exists during certain time. It acts by previous agreement, with the objective of commiting one or more serious crimes (4 years of jail). With the aim of obtaining financial or other material benefit

O.C. links with Violence

and Corruption

The O.C. Groups exert their powers

through the threat and use of violence

Organized crime two formulas l.jpg
Organized Crime Corruption Cases using the Palermo ConventionTwo Formulas

  • First (Conspiracy)

    • Agreement between 2 or more people

    • To commit serious crimes

    • With the aim of obtaining financial or other material benefit

  • Second

    • Active participation in the organized group

    • Other activities that contribute to the criminal objectives of and OC group AND with knowledge that participation will contribute to the aim of the organized criminal group

Other related conducts l.jpg
Other Related Conducts Corruption Cases using the Palermo Convention

  • Organizing,

    • Aiding,

    • Abetting,

    • Facilitating or

    • Counselling the commission of serious crime involving an organized criminal group.

Laundering of proceeds of crime criminal offences l.jpg
Laundering of proceeds of crime Corruption Cases using the Palermo ConventionCriminal Offences

  • With knowledge by the offender of the illicit origins of assets,

    • conversion or transfer of property

    • concealing or disguising the illicit origin, source, location, disposition, movement, ownership of or rights with respect to property

    • acquisition, possession or use of property.

  • Association with or conspiracy to commit,

    • attempts to commit and abetting,

    • facilitanting and counselling

Investigating corruption cases using the palermo convention l.jpg
Investigating Corruption Cases using the Palermo Convention Corruption Cases using the Palermo Convention

Single act of bribery

The Palermo Convention

against Corruption

Articles 2a, 8, 9

Acts of Corruption

Corruption as an instrument of organized crime

Corruption as an act of organized crime (3 or more persons)

Participation in organized crime is a second level offence l.jpg
Participation in Organized Crime is a second level offence Corruption Cases using the Palermo Convention

  • Logically it presupposes a first level offence, called predicate offence

  • Even though it is an autonomous crime

Organized Crime

Money laundering

Drug Trafficking



Slide19 l.jpg

Only three second Level Offences Corruption Cases using the Palermo Convention

No additional prohibitions l.jpg
No additional prohibitions Corruption Cases using the Palermo Convention

  • All O.C. offences are already prohibited in the predicate offence-prohibitions


without O.C.



with O.C.

Obstruction of justice l.jpg
Obstruction of justice Corruption Cases using the Palermo Convention

The use of physical force, threats or intimidation or the promise, offering or givingof an undue advantage to:

  • Induce false testimony

  • Interference

    • in the offering of testimony

    • in the production of evidence

    • with the exercise of official duties.

Confiscation and seizure l.jpg
Confiscation and seizure Corruption Cases using the Palermo Convention

  • Proceeds of crime

    • Property derived or obtained directly or indirectly from the commission of an offence

  • Property, equipment and instruments of crime

  • Obligation to enable:

    • Identification and tracing

    • Freezing or seizure

    • Disclosure of financial and commercial records

  • International co-operation rules

General elements for the fight against transnational organized crime l.jpg
General elements for the fight against Transnational Organized Crime

General rules for:

  • Extradition

  • Mutual Legal Assistance

  • Transfer of sentenced persons

  • Transfer of criminal proceedings

  • Maintain database of criminal’s and activities

Joint investigations and special investigative techniques l.jpg
Joint investigations Organized Crimeand Special Investigative Techniques

  • Possibility of joint investigations:

    • Joint investigative teams

  • Controlled delivery

  • Undercover operations

  • Electronic surveillance

  • Training and technical assistance

  • Collaborating and protected witnesses and victims l.jpg
    Collaborating and protected witnesses (and victims) Organized Crime

    Measures to:

    • Encourage witness collaboration

      • Reduction of punishment or immunity

    • Effective protection from potential retaliation or intimidation of:

      • WITNESSES or relatives

      • VICTIMS (compensation)

      • Physical protection

      • Prohibition to disclose information concerning

        • Identity and whereabouts of such persons

        • Testimony through video links

    How to investigate corruption and the link to organized crime l.jpg
    How to Investigate Corruption and the link to Organized Crime

    • OC uses a closed and tight-knit structure therefore requiring extraordinary measures to:

      • infiltrate the inner circle


      • extract a member from the OC group

    Techniques l.jpg

    Electronic Surveillance Crime

    Controlled Delivery

    Obstructing Justice




    Collaborating Witness



    Understanding the limit of each instrument l.jpg
    Understanding the Limit of each Instrument: Crime

    • Undercover & Controlled deliveries

    • Electronic Surveillance

    • Collaborating Witnesses

    • Financial Investigations

    • Use every technique of investigation available.

    International cooperation l.jpg
    International Cooperation Crime

    • Police-to-Police

    • Interpol

    • Judicial (International Rogatory)

    • Mutual Legal Assistance

    • F.I.U. to F.I.U.

    The x mistake l.jpg
    The X Mistake Crime

    • Undercover Case

    • Using third parties (no police)

    • Created the most important Marijuana trafficker who never dealt with cocaine

      Mistakes on the conception about the organization and mistakes in the technique used

    The evidence in law l.jpg
    The Evidence in Law Crime

    • In Instantaneous Crimes

      • The fact happens in a moment

      • The evidence consist of proof that these facts happened

      • Murder as an Example:

        Witnesses, ballistic, finger prints, DNA testing, etc...

    The evidence in organized crime l.jpg
    The Evidence in Organized Crime Crime

    • On drug trafficking or Mafia, the bosses rarely come in contact with the drugs and rarely kill personally

    • The Organized Crime group is continuous in its criminal activity

    • The crimes are continued and continuous

    In organized crime cases it is not necessary to prove l.jpg
    In Organized Crime Cases, it is NOT Necessary to Prove: Crime

    • That the boss ordered the crime

      It is sufficient to proof:

      * that he/she commands or belongs to an organization that traffics in drugs, order murders or blackmailing, or engages in certain predicate offenses

    Evidence integrity just like a gothic cathedral l.jpg
    Evidence Integrity Crime(Just like a Gothic Cathedral)

    • It must be harmonic

    • Trying to build modularly a crime and linking it to other crimes

    • Proving the existence of an organization

    • Every piece supports other pieces

    • Relating one to each other

    Harmonic evidence integration l.jpg
    Harmonic Evidence Integration Crime

    • A collaborating witness’ statement is not enough

      It is also necessary to confirm as far as possible all that he/she says

    • Electronic surveillance is not enough

      It is hard for prosecutors and judges to interpret and juries can misinterpret

    • It’s also necessary to prove a defendants role and membership in the organization

    Falcone check list as an instrument to link investigations of complex cases l.jpg
    Falcone Check List as an Instrument Crimeto Link Investigations of Complex Cases

    Other techniques of traditional investigation l.jpg
    Other Techniques of Traditional Investigation: Crime

    • Use of informants

    • Police and Prosecutorial Interviews and Interrogation

    • Information given by victims.

    • Use of collaborating witnesses

    • Surveillance

    • Use of Pen-Register (Phone Calls)

    Other techniques l.jpg
    Other Techniques: Crime

    • Analysis of documents

    • Ballistic tests to determine related homicides.

    • Victim´s analysis to better understand criminal behavior.

    1 the network and its illegal activities l.jpg
    1 . CrimeThe Network and its Illegal Activities

    • 1.1. The criminal network

      * 1.1.1 Hierarchical or flexible structure

      * 1.1.2 Composition: Describe who is part of the network, and what roles they play.

      * 1.2.3 Handling of Evidence:

      Forwarlooking and backwardlooking

    Slide40 l.jpg

    Typologies of Transnational Organized Criminal Groups Crime

    Centre for International Crime Prevention of the United Nations

    Slide41 l.jpg

    a) Crime Standard Hierarchical Structure

    *This is the most common form of organized criminal group from

    Slide42 l.jpg

    b) Crime Regional Hierarchical Structure

    *Even if they are part of a hierarchical criminal group with several strict lines of command, there is a level of autonomy for the regional organizations under the group´s control.

    Slide43 l.jpg

    c) Crime Hierarchical Association

    Association of organized criminal groups with a governing organ or body.

    Slide44 l.jpg

    d) CrimeCentral Group

    *Generally consists in a limited number of individuals which form a relatively closed central group to do illicit business.

    Slide45 l.jpg

    e) Crime Criminal Network

    *They are defined by the illicit activities of clue individuals which frequently change their alliances. Those individuals may not consider themselves as members of a specific criminal group, nor are they considered like that by external individuals. Nevertheless they have ties with a series of illicit projects.

    1 2 primary activities l.jpg
    1. Crime2 Primary Activities

    • Illicit markets controlled by the criminal network.

    • Types of criminal activity they engage in.

    2 modus operandi l.jpg
    2. Modus operandi Crime

    • 2.1 Logistic roles of the members of organized crime networks

      • 2.1.1 How are the tasks distributed among members of the network?

      • 2.1.2 What are the specific roles and qualities of the prime suspects?

      • 2.1.3 Do the ‘leaders’ of the network have exclusive contacts or exclusive qualities that are crucial to the criminal network?

  • Handling of evidence:

    All the evidence, forward-looking and backward-looking

  • 2 2 procurement logistics preparatory activities of the criminal network l.jpg
    2.2 CrimeProcurement logistics.Preparatory activities of the criminal network.

    • 2.3Production logistics.

      The production phases

      Handling of evidence:

      All the evidence, forwardlooking and backwardlooking:

      Looking for proceeds of the criminal activity and how they are transformed

    2 4 marketing logistics l.jpg
    2.4 CrimeMarketing logistics

    • How does the criminal network make sure there is a demand for their illegal goods or services?

  • Means of analysis

  • Analysis of the market situation from the information gathered in the investigation.

  • Synthesis of the important elements l.jpg
    Synthesis of the important elements Crime

    • Understand that Organized Criminal Groups look for a financial gain or profit.

    • Develop the investigation trying to understand the market.

    • What, how and how much does the organization sell?

    • Who is it sold to? And Who buys it?

    • How is it produced?

    2 5 financial logistics l.jpg
    2.5 CrimeFinancial logistics

    2.5.1 Describe the network’s profit estimates (selling prices minus costs)

    2.5.2 Describe how the network spends the proceeds of crime

    2.5.3 Describe the network’s investments

    2.5.4 Describe any money laundering activities of the network

    2.5.5 Describe the network’s use of underground banking

    Investigative techniques l.jpg
    Investigative Techniques Crime

    • It is always easier to start from the criminal organization finishing with the financial analysis.

    • It is also possible to start from the financial analysis, however, it is more difficult.

    • After determining the profits:

      • Analysis of the suspects assets.

      • Analysis of his family assets

      • Know his contacts with the illicit world and other organizations

      • Understand other elements of the network with forward-looking and backwadlooking techniques.

    Other elements l.jpg
    Other Elements Crime

    • Relations with their social environment

    • Gathering information from collaborating witnesses.

    • Developing financial analysis of enterprises

    3 contacts with the illicit environment l.jpg
    3. CrimeContacts with the illicit environment

    • 3.1 Contacts with other networks/criminal groups

    • 3.2 Interaction with criminal partners

    • 3.2.1. The Role of facilitators

    • 3.2.2. Cooperation or Competition

      • How the network competes or cooperates with other groups.

    Slide55 l.jpg

    3.2.3 CrimeMethods of concealment- Describe if the network tries to hide its activities from other criminal partners.3.2.4. Territorial deals or disputes- Is the network involved in disputes with other groups.

    Violence l.jpg
    Violence Crime

    • 3.2.5. The use of violence

      - Describe what types of violence are used against other criminals/ criminal groups.

    • Means of analysis and evidence

    • All the violent acts to determine behavior patrons.

    • Comparative analysis of different modus operandi

    • Comparison of ballistic tests and victim-offender analysis.

    • Knowledge of the executional codes of the organizations

    Slide57 l.jpg

    • 3.3 CrimeInteractions with terrorists or separatists groups

      • Does the network have contacts with terrorist groups or separatist movements?

    4 illicit protection l.jpg
    4. Illicit Protection Crime

    • 4.1.Shielding against investigation and prosecution

    • 4.2. Corruption

    • 4.3. Contacts with external experts/specialists

    Analysis and evidence l.jpg
    Analysis and Evidence Crime

    • Determine operative infiltrations

    • Outline of protection

    • Intents of corruption

    • Means of evidence

    • Financial investigation of the civil servant

    • Monitoring of the civil servant

    • Wire Taping

    • Collaborating witnesses

    • Undercover Agents

    4 4 interactions with legitimate businesses l.jpg
    4.4. Interactions with legitimate businesses Crime

    • The existing relationship between the criminal group and legitimate businesses.

      • By agreement

      • By infiltrating the different administrative levels

      • Lack of anti-criminal controls in the business.

      • Sporadic use of services

    5 opportunities for prevention l.jpg
    5. Opportunities for Prevention Crime

    • 5.1 Opportunities in the underworld

      • Circumstances or events that make it easy or difficult for the network to perform their illegal ativities.

      • Barriers that can be put against the network‘s activities.

  • 5.2 Opportunities in the legitimate environment

    • Circumstances or lack of rules and regulations that make it particularly easy/attractive for the network to involve its licit environment in its criminal activities.

  • Barriers l.jpg
    Barriers Crime

    • Why does the network need to involve legitimate businesses, or why does it need to involve persons having a certain job or expertise?

    • What barriers can be put up against the networks interactions with the legitimate world.