No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home GRC Vendor News

The FCPA and Fight Against Terrorism

by Thomas Fox
February 21, 2014
in GRC Vendor News
car bomb

This article was republished with permission from Tom Fox’s FCPA Compliance and Ethics Blog.

I admit it took me awhile to finally get it. I have long wondered what could have caused the explosion in Department of Justice (DOJ) and Securities and Exchange Commission (SEC) enforcement of the Foreign Corrupt Practices Act (FCPA). Starting in about 2004, FCPA enforcement has not only been on the increase from the previous 25 years of its existence, but has literally exploded. Of course, I had heard Dick Cassin and Dan Chapman most prominently talk and write about FCPA enforcement as an anti-terrorism security issue post 9/11, but I never quite bought into it because I did not understand the theoretical underpinnings of such an analysis.

I recently finished listening to the Teaching Company’s “Masters of War: History’s Greatest Strategic Thinkers” by Professor Andrew Wilson of the Naval War College. It is a 24-lecture series on the content and historical context of the world’s greatest war strategists. In his lecture on ‘Terrorism as Strategy” Professor Wilson explained that corruption is both a part of the strategy of terrorism and a cause of terrorism. After listening to his lecture and reflecting on some of the world events which invoked both parts of his explanation, it became clear to me why FCPA enforcement exploded and, more importantly, why the U.S. government needs to continue aggressive enforcement of the FCPA and encourage other countries across the globe to enact and enforce strong international and domestic anti-corruption and anti-bribery laws.

Corruption as a Terrorist Strategy

One need look no further than last fall’s massacre of civilians in Kenya at the Westgate Mall to see how terrorists use bribery and corruption. Dick Cassin, who has consistently written about the connection between bribery-corruption and security, did so again after the attack in a post entitled “The Price for Impunity is Higher Than Ever,” in which he pointed to the continued corruption in Kenya and how this corruption led to guns and terrorists being able to cross the border and carry out the attack. Cassin said that the border controls are so porous due to corruption in Kenya that in a prior episode involving the UK Serious Fraud Office (SFO), the UK government had banned certain Kenyan government officials from traveling to the UK, in large part because the country failed to take action against obvious cases of bribery and corruption. He said, “The visa ban followed a criminal investigation by the UK Serious Fraud Office into contracts between the Kenyan government and UK shell businesses. The contracts for passport controls and border security systems went to phantom overseas companies at prices about 10 times the actual cost. Kenya refused to cooperate and in early 2009, the SFO was forced to end its investigation.”

Giles Foden, in an article in The Guardian entitled “Kenya: behind the terror is rampant corruption,” was even more specific about the culture of crime and corruption in Kenya, when he that corruption was one of the signature factors leading to the massacre. He wrote, “In Kenya, crime and terrorism are deeply linked, not least by the failure of successive Kenyan governments to control either. These attacks are part of a spectrum of banditry, with corruption at one end, terrorism at the other and regular robbery in the middle. Money that should have been spent on security and other aspects of national infrastructure has been disappearing for generations.”

He concluded his piece with this warning: “You can gesture at the transnational problem of Islamist terrorism all you like, but it’s just hot air unless you invest in proper security on the ground in your own country, with the right safeguards to civil liberties. For now Kenya must mourn its dead. But unless the corruption stops, and real investment is made in the social fabric, Kenya will once again be faced with systemic shocks it is hardly able to deal with.”

Professor Wilson made it clear that terrorists incorporate these concepts into their overall strategy. If a country has strong border controls and government officials, which I believe is the situation here in the U.S. and in the UK, then the terrorist will seek out a country friendly to the U.S. or UK, where the government officials can be bribed or corrupted and use those as ports of entry. Similarly, they can directly attack civilians in a country like Kenya, where the border is so porous that both terrorist and arms can flow through with impunity.

 Corruption as a Precursor to Terrorism

But not only can corruption be used by terrorists, ironically, it can also be the cause of terrorism. One only need look at the Arab Spring and what started it. It was a lone fruit and vegetable seller, Mohammed Bourazizi, who doused himself in paint thinner and set himself on fire in front of a local municipal office because of the corruption of Tunisian government officials and police officers. Yuri Fedotov, head of the United Nations Office of Drugs and Crimes (UNODC) has said that the Arab Spring’s call for greater democracy was “an emphatic rejection of corruption and a cry for integrity” and that the international community must listen to the millions of people involved. At the center of the Arab Spring movement was a deep-seated anger at the poverty and injustice suffered by entire societies due to systemic corruption. Do you think there was any terrorism associated with the Arab Spring?

If one wants to look back a little further in history, I would submit that China is the most prime example of the 20th century. For all the hand wringing about “Who Lost China,” I think a clear key was the endemic corruption of the Nationalists and their allies. Their corruption helped remove the moral authority of their government and allowed the Communists to take up that mantle in the 1940s. The Nationalists were certainly defeated on the battlefield, but the groundwork was laid in large part due to the corruption of their government. It really did not matter how much money, foreign aid and material the U.S. government provided to Chiang Kai-Shek; his cronies and his government simply stole it, sold it or gave it away for other favors.

Moving to today’s news, the government of Thailand is currently under siege by its own citizens. While economic issues are certainly a part of the problem, so is the corruption of the government. The corruption is so bad that even China has scrapped a deal to purchase some 1.2 million tons of rice from Thailand. Michael Peel, writing in the Financial Times in an article entitled “China ditches Thai rice deal over concern on corruption,” pointed out that this “is about 14 percent of [Thailand’s] annual exports.” He said “Beijing was spooked by the Thai national anti-graft agency’s probe into the rice support program.” One Thai government official said that the Chinese pulled out of the deal because they “lacked confidence to do business with us.” Peel also wrote that this program is “soaking up $4 billion a year officially, and much more by other estimates.” What does it say about a country’s government that the Chinese will not do business with because they are too corrupt?

Now I understand how terrorists use corruption both as a strategy and a tool.  Moreover, when you begin to understand these interrelated theoretical underpinnings of corruption and terrorism, you can see why aggressive enforcement of anti-corruption laws such as the FCPA and UK Bribery Act is so important and is here to stay. In another blog post entitled “9/11 and the FCPA,” Cassin said, “What happened that day a decade ago changed the way the world looks at corruption. The tracks of the 9/11 perpetrators and those who helped them led back to corrupt third-world countries — Afghanistan, Sudan, Somalia, Yemen and others. Those regimes had leaky borders, weak passport control, unreliable law enforcement agencies, poor anti-money laundering programs — just what the bad guys needed.”

I do not have any insight into the discussions of the Bush Administration after 9/11 about ways to fight terrorism. But just as governments have a role to play by being part of the solution, so do private businesses. Fedotov said that preventive action was needed by Chief Executive Officers (CEOs) in their boardrooms as much as by police on the streets or civil servants in their departments: “All of us must contribute to a culture of integrity. The eyes previously closed to corruption must become the open eyes of justice and equality.” For the DOJ and the SEC, this means continued enforcement of the FCPA so that companies subject to the Act will move forward to do business in a way that does not start down the slippery slope to terrorism. Simply because the FCPA was passed in the post-Watergate era does not mean that it cannot be used for today’s problems.

This publication contains general information only and is based on the experiences and research of the author. The author is not, by means of this publication, rendering business advice, legal advice or other professional advice or services. This publication is not a substitute for such legal advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified legal advisor. The author, his affiliates and related entities shall not be responsible for any loss sustained by any person or entity that relies on this publication. The author gives his permission to link, post, distribute or reference this article for any lawful purpose, provided attribution is made to the author. The author can be reached at tfox@tfoxlaw.com.


Tags: Tone at the Top
Previous Post

Has Russia’s New Procurement Law Hit the Target? An Analysis of Procurement Policy and Lessons Learned from the Sochi Olympics (Part Two)

Next Post

Target Lessons – Another Reminder on Responding to Employee Concerns

Thomas Fox

Thomas Fox

Thomas Fox has practiced law in Houston for 25 years. He is now assisting companies with FCPA compliance, risk management and international transactions. He was most recently the General Counsel at Drilling Controls, Inc., a worldwide oilfield manufacturing and service company. He was previously Division Counsel with Halliburton Energy Services, Inc. where he supported Halliburton’s software division and its downhole division, which included the logging, directional drilling and drill bit business units. Tom attended undergraduate school at the University of Texas, graduate school at Michigan State University and law school at the University of Michigan. Tom writes and speaks nationally and internationally on a wide variety of topics, ranging from FCPA compliance, indemnities and other forms of risk management for a worldwide energy practice, tax issues faced by multi-national US companies, insurance coverage issues and protection of trade secrets. Thomas Fox can be contacted via email at tfox@tfoxlaw.com or through his website www.tfoxlaw.com. Follow this link to see all of his articles.

Related Posts

farm silos

Siloed Thinking, Scattered Compliance: The Leadership Challenge in GRC

by Anna Muzalska
April 7, 2025

Strong leadership and integrated communication prove as critical to compliance success as policies and procedures alone

chess pieces

10 Questions That Separate Strategic Leaders From Spectators

by Jim DeLoach
February 19, 2025

From pattern recognition to emotional intelligence, key indicators reveal true boardroom influence

3d rendering representing inaccessible door

Why Your ‘Open Door’ Policy Could Be Nailing the Door Shut

by Roxanne Petraeus
November 6, 2024

When compliance training looks like it came from 1995, employees get the real message

hero as leader concept

UK Brewer’s Cultural Hangover Highlights the Perils of Hero Leadership

by Steve Hearsum
June 12, 2024

What do hotshot startups and cults often have in common? A charismatic leader. But what happens when the public face...

Next Post
Target brand logo

Target Lessons – Another Reminder on Responding to Employee Concerns

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights