About this course

NOTE: 

This course is in three parts. There is an examination at the end of each part.

The examination for Part I relates to Part I only. The examination for Part II relates to Parts I and II. The examination for Part III relates to all three parts. 

You may purchase each part individually or purchase a bundle of all three parts together at a discounted price. 

If you purchase a bundle, you will receive automatic access to Parts 2 and 3 as they are released before the end of 2020 or immediately if you subscribe after 1 Jan 2020. 

A bundle may not be purchased retrospectively i.e. after you have already purchased one or two Parts. 


Bundle: ALL THREE MODULES FOR GBP145.00.




Some in clandestine companies combine;
Erect new stocks to trade beyond the line;
With air and empty names beguile the town,
And raise new credits first, then cry ’em down;
Divide the empty nothing into shares,
And set the crowd together by the ears. 

Daniel Defoe.


This course is for all those who work in, manage, own or control companies in all jurisdictions and those that deal with and regulate them. 


Business structures, including corporations and partnerships, are intended to encourage enterprise and to protect honest entrepreneurs. 

Trusts are intended to protect the assets of families from unlawful interference and other problems.

In each case there is also a measure of the modification of the tax position as against if such structures were not to be used: some of those changes benefit the company and its owners and others benefit the state.

However, as with all things, there are those that abuse the privileges that such structures afford them. They are used as vehicles for a wide range of criminal offences of which the most obvious – but far from the only – one is tax evasion.

Also, because these structures have an identity (in some cases they are, in law, a person), they are also the target for criminals. 

In this course, we explain

a) what corporations, partnerships, trusts and other structures are

b) the terminology associated with them

c) the risks they present

d) the risks they face

and we do it all with context and historical perspective. 

You will find out about asset forfeiture in 18th Century England, how capital flight was dealt with in 18th Century France – and see how much of what we imagine is recent has a long history. 

You will learn the origins of trust law and why it is a cross-cultural phænomenon.

Also, you will learn why much of the criticism of certain professionals is unfounded – and where that criticism should be directed. 

This is a three part course. See the curriculum below for the contents of this Part.

At the end of each part, you will take an open book examination. The examinations are cumulative and cover the current and previous parts. If you achieve the pass-mark of 80%, you will receive a certificate and points towards the designation Certificate in Financial Crime Risk and Compliance. 

The entire three-part course is approximately the length of a two-day seminar but it is, of course, on demand. You have unlimited access, including any additions and updates, for 12 months and unlimited attempts at the examination. Your certificate for this course lasts for a year from the date of issue.

About:

Language: English

Jurisdiction: Global

Level : Front Liners to Directors; all financial crime risk and compliance officers and personnel; personnel, etc. officers.

Certificated: Yes, 12 months from completion of examination

Examination: open book; pass mark 80%; validity 12 months, retakes are allowed.

Portable CPD (TM) where recognised: 8 hours

cFCRC points: 45

Price shown includes UK VAT where applicable.

Course curriculum

  • 1

    About Essentials: Corporate vehicles, Trusts and other structures. Part III (prerequisite reading)

  • 2

    9. Financial Crime offences against companies

  • 3

    10. Crimes against companies - computer crime

    • 10.1 Computer crime - surprisingly little evolution and no revolution.

    • 10.2 Computer crime - surprisingly little evolution and no revolution.

    • 10.3 The UK Government’s list of on-line offences.

    • 10.4 Hacking: old term, even older conduct.

    • 10.5 Online theft of money.

    • 10.6 Computer crime - surprisingly little evolution and no revolution.

    • 10.7 Computer crime - surprisingly little evolution and no revolution.

    • 10.8 Computer crime - surprisingly little evolution and no revolution.

    • 10.9 Extortion via the internet.

  • 4

    11. Non-internet crime against companies and other business entities.

    • 11.1 Is all crime against a business a financial crime?

    • 11.2 Is all crime against a business a financial crime?

    • 11.3 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.4 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.5 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.6 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.7 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.8 CASE STUDY – The dangers of face value.

    • 11.9 Before ″identity theft,″ identity fraud was a big thing that just didn’t have a name.

    • 11.10 CASE STUDIES – CV fraud

    • 11.11 Fraudulent orders

    • 11.12 Cheque kiting

    • 11.13 Cheque kiting

  • 5

    12 Financial Crime offences by companies.

    • 12.1 No one ever says ″Trust me, I’m a fraudster.″

    • 12.2 No one ever says ″Trust me, I’m a fraudster.″

  • 6

    13. Liability of directors and other officers.

    • 13.1 How Malaysian law makes directors liable for the actions of companies.

    • 13.2 Who will carry the can?

    • 13.3 The brains of a company

    • 13.4 The convoluted and perforated law in the UK.

    • 13.5 Inconsistency between laws is commonplace.

  • 7

    14. Financial Crime offences using other structures

    • 14.1. Crime by trusts

    • 14.2. Crime by trusts

    • 14.3. Crime by trusts

    • 14.4 A couple of Wyly characters.

  • 8

    15. How companies and their officers avoid criminal convictions.

    • 15.1 The bank that used its customers’ money for its own risky business.

    • 15.2 The Get Out of Jail Free settlement scheme.

    • 15.3 It’s a matter of principle.

  • 9

    16. Two-way-radio Gate.

    • 16.1 About this chapter

      FREE PREVIEW
    • 16.2 The ownership trail in public records.

    • 16.3 How to build a digital radio business with stolen code.

    • 16.4 After judgment, get after the assets.

    • 16.5 Hiding assets.

    • 16.6 Assets in the hands of third parties

    • 16.7 The Court and Company Registers differ as to ownership and control.

    • 16.8 When the court can’t know what the court knows: the ″without prejudice″ rule.

    • 16.9 Limitations on without prejudice

    • 16.10 Limitations on without prejudice

    • 16.11 Limitations on without prejudice

    • 16.12 Limitations on without prejudice

    • 16.13 Limitations on without prejudice

    • 16.14 Pigeons, meet cat.

    • 16.15 Unambiguous impropriety

    • 16.16 Where criminal cases and civil recovery collide.

    • 16.17 Freezing assets overseas in the name of someone other than the judgment debtor.

    • 16.19 ″Concealment″ and ″transfer″.

    • 16.20 Conclusions.

    • 16.21 Footnote.

    • 16.22 Further reading.

  • 10

    Appendix. Kevin's Story

    • About Kevin's Story

    • Kevin's Story - 1

    • Kevin's Story - 2

    • Kevin's Story - 3

    • Kevin's Story - 4

    • Kevin's Story - 5

    • Kevin's Story - 6

    • Final Thoughts

  • 11

    Examination

    • About this examination

    • Examination - Financial crime risks of corporate vehicles and other business structures Parts I, II and III