sanctions

Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in _menu_load_objects() (line 579 of /var/www/drupal-7.x/includes/menu.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /var/www/drupal-7.x/includes/common.inc).

Israel bombs Belgium’s offices in Gaza – UK media ignore

Published by Anonymous (not verified) on Sat, 03/02/2024 - 12:48am in

Belgium commits to funding UNRWA and has previously called for sanctions against Israel. Israel bombs Belgium’s representatives and ‘completely destroys’ office

Before and after: Belgium’s representative office in Gaza

Belgium has summoned Israel’s ambassador to give account to Belgium’s prime minister after an Israeli bombing ‘completely destroyed’ the country’s official representative office in Gaza. Despite the attack happening last night – and being freely covered by Israeli papers – the UK’s ‘mainstream’ media appear to have completely ignored the crime and Belgium’s response:

Earlier this week, Belgium committed to continuing to provide funding to UNRWA, the vital UN agency providing desperately-needed aid to Gaza’s two million starving and suffering people. The UK, US and several other nations have cut off funding to UNRWA, despite what appears to be a complete lack of evidence, after Israel claimed twelve of UNRWA’s 13,000 employees participated in the 7 October raid. Israel has for decades wanted an end to the agency because it maintains Palestinians’ hopes of exercising their right of return to land and homes from which they were driven at gunpoint.

Last November, Belgium’s deputy prime minister also called for sanctions against Israel for its war crimes against Palestinians, including frequent and deliberate bombing of refugee camps, hospitals and schools.

Israel has been ordered by the International Court of Justice (ICJ), in a binding legal ruling, to stop and prevent the killing of Gaza’s people. If anything, it has accelerated the slaughter and continues to display its contempt for decency and international law.

If you wish to republish this post for non-commercial use, you are welcome to do so – see here for more.

Parliament to reconvene to approve UK airstrikes on Yemen

As world unites in horror at Israel’s genocide, UK Establishment reaction is to protect Israel and billionaires by attacking country taking action for Palestinians

UDPATE: The UK is bombing Yemen tonight, without bothering to have Parliament approve it – and will recall MPs tomorrow to rubber stamp it. The UK is not at war with Yemen but is acting as a rogue state to protect Israel from the economic impact of the shipping interceptions.

The government is reconvening Parliament to push through a vote to approve airstrikes against Yemen, because of Yemen’s success in intercepting Israel-bound shipping to put pressure on Israel to end its genocide. The disruption to seaborne trade is said to be having a significant impact on the Israeli economy.

Commons Speaker Lindsay Hoyle has been taken to a Whitehall briefing tonight and is expected to recall MPs from their usual Friday activities away from Westminster to vote through the attacks – of course, ‘opposition’ leader and ‘Zionist without qualification’ Keir Starmer is fully expected to vote with the Tories.

With most of the world united in horror at the ICJ evidence of Israel’s genocide and war crimes against Palestinian civilians in Gaza, the UK Establishment reaction, always ready to side with the oppressor against the oppressed, is to protect Israel and billionaires by attacking a country to help Palestinians, regardless of the likely consequences of igniting a regional war.

If you wish to republish this post for non-commercial use, you are welcome to do so – see here for more.

The Gift of Sanctions

Published by Anonymous (not verified) on Tue, 09/01/2024 - 7:02am in

Tags 

Russia, sanctions

Jamie Galbraith presented, at the EPS session at the ASSA Meetings in San Antonio, the paper published by INET. As he said there: "Despite the shock and the costs, the sanctions imposed on the Russian economy were in the nature of a gift." A type of invisible hand effect, by which the unintended effect of the policy that should supposedly benefit US allies (Ukraine) has the unintended effect of helping its alleged enemies (Russia).

From the abstract:

This essay analyzes a few prominent Western assessments, both official
and private, of the effect of sanctions on the Russian economy and war
effort. It seeks to understand the main goals of sanctions, alongside
bases of fact and causal inference that underpin the consensus view that
sanctions have been highly effective so far. Such understanding may
then help to clarify the relationship between claims made by
economist-observers outside Russia and those emerging from sources
inside Russia – notably from economists associated with the Russian
Academy of Sciences (RAS) – which draw sharply different inferences from
the same facts. We conclude that when applied to a large,
resource-rich, technically proficient economy, after a period of shock
and adjustments, sanctions are isomorphic to a strict policy of trade
protection, industrial policy, and capital controls. These are policies
that the Russian government could not plausibly have implemented, even
in 2022, on its own initiative.

Download paper here.

 

It's time to impose Iran-calibre sanctions on Russia

Published by Anonymous (not verified) on Tue, 09/01/2024 - 4:41am in

Tags 

sanctions

Russia is sometimes described as the world's most sanctioned nation. And while that's true, the long list of sanctions that the G7 coalition has placed on Russia in response to its attack on Ukraine are surprisingly light compared to the fewer but far more-draconian sanctions placed on Iran over the last decade or so.

This ordering of sanctions precedence is a mistake. With its all-out invasion of Ukraine, Russia has moved past Iran into top slot at world's most dangerous nation. Vladimir Putin merits a sanctions program that is at least as onerous as Iran, if not more so, yet for some reason he is getting off lightly. It's time to apply Iran-calibre sanctions to Russia.

What makes a draconian sanctions program draconian?

What makes the Iranian sanctions program so draconian is that many of the sanctions are so-called secondary sanctions, a feature that has been mostly absent in the Russian sanctions program.

When the U.S. or EU levy primary sanctions on an entity, they are saying that American individuals, banks, and businesses (and European ones, too) can't continue to interact with the designated party. This hurts the target, but it leaves foreign individuals, banks, and businesses with free reign to fill the void left by departing American and European actors, thus undoing part of the damage.

Secondary sanctions prevent this vacuum from being occupied. The U.S. government tells individuals or businesses in other nations that they, too, cannot deal with a sanctioned entity, on pain of losing access to U.S. economy. It's either us, or them.

When applied to foreign financial institutions (i.e. banks) secondary sanctions are particularly potent. The U.S. tells foreign banks that if they continue to provide banking services to sanctioned Iranians, the banks' access to the all-important U.S. financial system will end. Since the U.S. financial system is so crucial, foreign banks quickly offboard all sanctioned Iranian individuals and businesses. The sanctioned Iranian entity finds that it has now been completely removed them from the global financial system. This financial shunning effect is much more powerful than the effects created by primary sanctions or secondary sanctions on non-banks.

Notice that I've limited my commentary on secondary sanctions to the U.S. Since it first began to use secondary sanctions in 1996, the U.S. Treasury has become a master of the art, whereas as far as I know they are a tool the EU has long resisted adopting.

The bank-focused secondary sanction placed on Iran over the last decade-and-a-half have been particularly devastating because they target a broad sector of Iranian society, most crucially the Iranian oil sector, the life blood of Iran's economy. Secondary sanctions prevent foreign banks from processing Iranian oil trades on pain of losing access to the U.S., and so most foreign banks have chosen to cease interacting with the Iranian oil companies.

The chart below illustrates the effectiveness of this approach. When President Obama placed the first round of bank-focused secondary sanctions on Iran's oil industry in 2012, the nation's oil exports immediately cratered from around 2 million barrels per day to 1 million barrels. When he removed them in 2016, they quickly rose back up. And when Trump reapplied the same secondary sanctions in 2018, they collapsed once again, almost to zero.

Source: CRS [pdf]

In short, U.S. secondary sanctions imposed huge body blows on the Iranian oil industry. These same forces have not been brought to bear on Russia's oil industry.

A dovish Russian sanctions program

While the Russian sanctions program is often portrayed as being strict, it is far lighter than other sanctions programs, including the one placed on Iran, because it is comprised almost entirely of primary sanctions. (For a good take on this, see Esfandyar Batmanghelidj here). While a small list of secondary sanctions have been placed on Russia, for the most part they have not been of the banking type.*

The second reason why the Russian sanctions program is dovish is that the oil component of the EU and U.S. sanctions campaign has been particularly lenient. Take a look at the above chart of Iran oil exports and you can see very real evidence of damage from sanctions. Scan the chart of Russian oil exports below, however, and it suggests business as usual.

Source: CREA

Sure, the EU and other coalition partners have cut Russian oil imports to almost nil, and that's great. But overall, this effort hasn't done much harm to Putin, since over time the coalition's respective share of Iranian oil exports has simply been taken up by nations like India and China. Both before and after the 2022 invasion of Ukraine, Russia reliably shipped around 1,000 kt/day of crude oil and crude oil products.

Underlying this leniency, G7 businesses are still allowed to engage in the Russian oil trade, as long as this doesn't involve bringing the stuff back to the EU. For instance, foreign buyers of Russian oil (say like Indian refiners) are allowed to hire European insurers and shipping companies to import Russian oil.

There is a limitation on this. European insurers and shippers can only be used by an Indian refiner, or some other foreign buyer, if the purchase price of Russian oil is set at $60 or below. This is what is known as the G7 oil price cap.

Because the insurance and shipping industries of the UK, EU, and U.S. have a large share of the market, Russia has had little choice but to rely on coalition intermediaries for selling at least some of its oil at $60. This has come at a cost to Russia; it must sell at below-market prices. And that certainly makes Russia worse off than a world in which there was no oil price cap.

But the very fact that these purchases are occurring at all, compared to a world in which Iran-calibre sanctions would prevent them from ever taking place, illustrates how weak the oil price cap is. 

Russia's oil export income is the life-blood of Putin's war economy. These funds gets funneled directly to the front-line in the form of weapons and supplies. It's time to get serious about Russian sanctions, remove the dovish oil price cap, and apply to Russia the same calibre of secondary sanctions that so effectively crimped Iranian oil exports.

We may have to deescalate sanctions on Iran in order to escalate them on Russia

What has prevented the U.S. and its allies from applying draconian Iran-style sanctions to Russia? One of their main worries is that taking a major oil exporter out of the market will have major macroeconomic impact. 

Russia currently exports around 4 million barrels of crude oil per day, as well as a large amount of refined products such as gasoline. Assuming that half of this were to be removed by secondary sanctions, world oil prices would probably rise. Voters in the EU and US would get angry. Neutral countries dependent on oil imports – China, India, Brazil – would push back against the colation, because they'd have to scramble to replace a major supplier. Secondary sanctions aren't just a nuisance for these neutral parties. Due to their extraterritorial  nature, secondary sanctions impinge on the sovereignty of neutral nations. This creates hostility, understandably so, the negative blowback eventually flowing back to the U.S.

So if the EU, U.S. and the rest of the coalition are going to get serious about sanctioning the Russia's oil industry, and thus removing a few million barrels of oil per day from the world market, they may need to counterbalance that in order to soften the blow. One way to do so would be to free up more Iranian oil exports, which means softening the sanctions on Iran.

That doesn't mean not applying sanctions to Iran. A version of the $60 price cap on Iranian oil probably makes a lot of sense. However, a fully armed financial battleship – i.e. bank-focused secondary sanctions directed at a major crude oil exporter's oil industry – may be something that has to be reserved for one country only: Russia.

Now, I could be wrong about the world being unable to bear draconian sanctions on two major oil exporters. Maybe I'm creating a false dichotomy, and in actuality the choice is less stark and the coalition can actually apply draconian oil sanctions on both Iran and Russia. If so, I stand corrected.

Either way, Russia's oil industry has skated through the invasion and resulting sanctions remarkably unscathed, as the Iranian counterexample illustrates. It's time to cut off Russia's main source of revenues by putting the same set of secondary sanctions that Iran has faced on Russia's oil patch. 

* There are a few bank-focused secondary sanctions placed on Russia. Notably, Section 226 of CAATSA (2017) requires foreign financial institutions, or FFIs, to avoid certain sanctioned Russians or sectors on pain of losing access to the U.S. banking system. (See here, for example.) However, the U.S. must not be enforcing Section 226 very tightly because I haven't found a single case of a bank being punished under 226.

This December, another round of secondary sanctions was imposed on FFIs. Any foreign bank that facilitates transactions involving Russia’s military-industrial base may be cut off from the U.S. financial system. Additionally, any bank that conducts transactions for specially designated nationals who operate in Russia's technology, defense and related materiel, construction, aerospace or manufacturing sectors may face punishment. Note that both rounds of secondary sanctions leave the Russian oil industry untouched.

Government funding pro-Israel ‘charity’ to fight support for Palestinians in schools

‘Solutions not Sides’ literally ‘both-sidesing’ Israel’s occupation and ethnic cleansing – but has been linked to pro-Israel lobby and receives most funding from UK government and lobby groups

The UK government and pro-Israel lobby groups are funding a UK-registered charity to indoctrinate schoolchildren against recognition of Israel’s occupation and ethnic cleansing of Palestine.

‘Solutions not Sides’ (SNS) has received increasing amounts of cash to carry out literal ‘bothsidesing’ of the grossly asymmetrical situation in Palestine, treating Israel’s occupation, apartheid, oppression and now mass-murder of Palestinians as equivalent to Palestinian resistance.

The charity’s website claims to run a ‘non-partisan programme’ to ‘prepare students to make a positive, solutions-focused contribution to debates on Israel-Palestine’. However, its ‘Mission & Values’ page states that it opposes ‘advocacy’ and ‘partisan solidarity'(!) a value that rules out support for the Boycott Divestment and sanctions campaign, rejects ‘blame culture’ and believes that:

both sides bear responsibility for bringing about a resolution to the conflict.

Israel is currently engaged in mass slaughter of Palestinian civilians and is making plans for the deportation of Gazan Palestinians to Egypt, the Congo and other African destinations. It faces allegations brought before the International Court of Justice (ICJ) by South Africa of what experts consider to be a ‘textbook case’ of genocide. The victims of war crimes clearly do not ‘bear responsibility’ for ending the crimes – and minimising Israel’s guilt for its illegal actions and Palestinian suffering while treating Palestinians’ acts of resistance as equivalent is inherently partisan. In this context, the group’s claim to be fighting Islamophobia as well as antisemitism looks like mere window dressing.

According to Palestine is still the issue and 5Pillars, SNS has its origins in – and receives around thirty percent of its funding from – ‘One Voice’, a billionaire-funded pro-Israel lobby group. SNS has been backed by pro-Israel groups, as well as figures well-known from their eager participation in smears of the left.

An attempt by Palestine Declassified to visit the SNS office to obtain comment on analysis of SNS’s activities found that no one was based at the charity’s registered address. It did not respond to the programme’s requests for comment.

Campaigners are asking teachers and parents to complain to schools urgently if this group is brought in.

If you wish to republish this post for non-commercial use, you are welcome to do so – see here for more.

The long arm of OFAC and its reach into the Ethereum network

Published by Anonymous (not verified) on Sun, 17/12/2023 - 12:51am in

Coinbase, the U.S.'s largest crypto exchange, is openly processing Ethereum transactions involving Tornado Cash, a piece of blockchain infrastructure that was sanctioned by the U.S. government last year for providing mixing services to North Korea. 

Over the last two weeks Coinbase has validated 686 Tornado-linked transactions, according to Tornado Warnings. I've screenshotted the table below:

This table shows how many blocks each validator has proposed that includes a transaction that has interacted (either depositing or withdrawing)
with Tornado Cash contracts in
all denominations, or with TORN tokens. Source: Tornado Warnings by Toni Wahrstätter

This is awkward for everyone involved.

First, it's embarrassing for the agency that administers U.S. sanctions, the U.S. Treasury's Office of Foreign Assets Control, or OFAC. OFAC clearly states that U.S. based persons are not to transact with sanctioned entities unless they have a license. Yet here is America's largest crypto exchange interacting with a sanctioned entity, Tornado Cash, without a license.

OFAC can look away and pretend that nothing unusual is happening, which is pretty much what it has done so far. But since these financial interactions are clearly displayed on the blockchain, everyone can see the infraction occurring. Eventually, OFAC will have to confront the problem and make some tough decisions, a few of which may end up damaging companies like Coinbase and the Ethereum network.

The whole affair is also awkward for the crypto industry. After a 2022 in which much of the ecosystem went bankrupt or succumbed to fraud, crypto currently finds itself in the damaging crosshairs of the culture war and the pervasive threat of being banned. It is desperate for social license, yet here is crypto's leading company choosing to operate in contravention of one of the key pillars of U.S. national defence.

Meanwhile, Coinbase's main U.S. competitor, Kraken, has taken a very different approach to dealing with Tornado Cash. As the table above shows, Kraken has processed zero Tornado Cash transactions over the last two weeks compared to Coinbase's 686. These diverging approaches to handling sanctioned transactions only highlight the awkward nature of crypto's "compliance" with sanctions law.

Before I dive deeper, we need to fill in the basics. For folks who are confused about crypto, what follows is a quick explanation why Coinbase is interacting with Tornado Cash, whereas Kraken isn't.

What is validation?

To begin with, Coinbase and Kraken operate in many different businesses. Their most well known business line is to provide a trading venue where people can deposit funds in order to buy and sell crypto tokens.

I suspect that both companies are being very careful to ensure that their trading venues avoid any dealings with Tornado Cash. If someone were to try to deposit Tornado-linked funds to Coinbase's exchange, for instance, I'm sure Coinbase would quickly freeze those transactions, which is precisely what OFAC obliges it to do. Crypto trading venues have gotten in trouble before for dealing with sanctioned entities: last year Kraken was fined by OFAC for processing 826 transactions on behalf of Iranian individuals.

But the issue here isn't these companies' trading platforms. Coinbase's interactions with Tornado Cash are occurring in an adjacent line of business. Let's take a look at how Coinbase and Kraken's validation services business operate.

Say that Sunil lives in India and wants to make a transaction on the Ethereum network, perhaps a deposit of some ether to Tornado Cash. He begins by inputting the instructions into his Metamask wallet. This order gets broadcast to the Ethereum network for validation, along with a small fee, or tip. A validator is responsible for taking big batches of uncompleted transactions, one of which is Sunil's Tornado Cash deposit , and proposing them in the form of "blocks" to the Ethereum network for confirmation. As a reward, the validator collect the tips left by transactors.

The biggest validators are the ones that own large amounts of ether, the Ethereum network's native token. Since Kraken and Coinbase have millions of customers who hold ether on their platforms, they have become two of the most important providers of Ethereum validation services. Coinbase accounts for 14% of global validation while Kraken stands at 3%, according to the Ethereum Staking dashboard. So even though Sunil is not actually depositing any crypto to Coinbase's trading venue, he may end up interfacing with Coinbase via its block proposal and validation business.  

Validators can choose what transactions to include in their blocks. This explains the difference between the two exchanges. Whereas Kraken chooses to exclude transactions like Sunil's Tornado Cash deposit, Coinbase includes all transactions linked to Tornado Cash in the blocks that it proposes, in the process earning transaction fees linked to Tornado Cash.

To sum up, Coinbase operates its trading venue in a way that complies with OFAC regulations, but it doesn't run its validation service in the same manner, whereas Kraken does. Next, we need to fill in another important part of the story. What does OFAC do?

OFAC around and find out

For folks who don't know how U.S. sanctions work, a big part of OFAC's job is to blacklist foreign individuals and organizations who are deemed to undermine U.S. national security or foreign policy objectives. These blacklisted entities are known as SDNs, or specially designated nationals. U.S. citizens and companies cannot deal with SDNs without getting a license.

OFAC also administers comprehensive sanctions. These prevent U.S. individuals or businesses from interacting with entire nations, like Iran.

With each of the individuals or entities that it designates, OFAC discloses an array of useful information including the SDN's name, their aliases, address, nationality, passport, tax ID, place of birth, and/or date of birth. U.S. individuals and firms are supposed to take a risk-based approach to cross-checking this information against each of the counterparties they transact with so as to ensure that they aren't dealing with an SDN. They must also be aware of U.S. comprehensive sanctions so they don't accidentally interact with an entire class of sanctioned individuals, say all Iranians. Failure to comply can result in a monetary penalty or jail time.

Whereas Coinbase appears to have chosen to ignore OFAC's requirements when it comes to validation, Kraken hasn't, and has incorporated the SDN list into the internal logic of the validation services that it provides. But Kraken has only done so in a limited way, as I'll show below.

Five years ago OFAC began to include an SDN's known cryptocurrency addresses in its array of SDN data. To date, OFAC has published around 600 crypto addresses, including around 150 Ethereum addresses, of which a large chunk are related to Tornado Cash. Kraken is using this list of 150 addresses as the basis for excluding certain transaction from the blocks that it is proposing to the Ethereum network.

Data source: OFAC and Github

Among members of the crypto community, this sort of editing out of OFAC-listed addresses is sometimes described as creating "OFAC-compliant blocks." Hard core crypto ideologues believe that it compromises Ethereum's core values of openness and resistance to censorship.

While Kraken's approach may appear to be the compliant approach to proposing blocks, it's not. It's half-compliance, or compliance theatre. 

OFAC-compliant blocks as compliance theatre 

Right now, Kraken's block validation process merely weeds out transactions involving the 150 or so Ethereum wallets that OFAC has explicitly mentioned, which includes Tornado Cash addresses. But many of the SDNs linked to these 150 wallets have probably long since adapted by getting new wallets. Kraken isn't taking any steps to determine what these new wallets are, and is therefore almost certainly processing these SDN's transactions in its blocks. This would put it in violation of OFAC policy.

Of the 12,000 or so SDNs on OFAC's SDN list, most are not explicitly linked by OFAC to a specific Ethereum wallet. But that doesn't mean that these entities don't have such wallets. To be compliant, Kraken needs to scan the entire list of 12,000 SDNs and verify that none of them are being included in Kraken blocks. Again, it doesn't appear to be doing that.

Complying with OFAC isn't just about crosschecking the SDN list. Remember, OFAC has also levied comprehensive sanctions on nations such as Iran, which prohibit any U.S. entity from dealing with Iranians-in-general. Because Kraken limits its block editing to the 150 or so Ethereum addresses mentioned by OFAC, it is almost certainly letting Iranian transactions into the blocks that it is proposing. Which is ironic, since the very infraction that Kraken was punished for last year was allowing Iranians to use its trading platform. Apparently Kraken has one Iran policy for its trading venue, and another policy for its block proposal service.

Coinbase's decision to ignore OFAC altogether now makes more sense. Perhaps it's better to not comply at all and thereby retain the ability to claim the non-applicability of sanctions law to validation, than to comply insufficiently but in the process tacitly admit that OFAC has jurisdiction over validation. As part of this strategy, Coinbase may try to fall back on arguments that validation isn't a financial service, but qualifies as the "transmission of informational materials," which is exempt from sanctions law.

Having started down the path to compliance, the only way for Kraken's validation business to be even close to fully compliant with sanctions law is to adopt the very same exhaustive process that its own crypto trading venue abides by. That means painstakingly collecting and verifying the IDs of all potential transactors, cross-checking them against OFAC's requirements, and henceforth only proposing blocks that are made up of transactions sourced from its internal list of approved addresses.  

By adopting this complete approach to verifying transactions, Kraken would now be closer to compliance. As for OFAC, it would be relieved of its awkward situation.

There is no easy policy decision for OFAC

However, this approach has its drawbacks. A requirement that IDs be verified for the purposes of block inclusion would be expensive for Kraken to implement. I suspect that the company would react by ceasing to offer validation services. Even if Kraken and Coinbase were to roll out an OFAC-compliant know-your-customer (KYC) process for assembling blocks, most Ethereum transactions would probably flow to no-hassle offshore validators, which don't check ID because they are under no obligation to comply with OFAC.

So in the end, the very transactions that OFAC wants to discourage would end up happening anyway.

Compounding matters, by pushing validation away from U.S. soil, the U.S. national security apparatus would have destroyed a nascent "U.S. Ethereum nexus," one they might have otherwise levered as a tool for projecting U.S. power extraterritorially. If you're curious what this entails, consider how the New York correspondent banking nexus is currently harnessed by the state to exert U.S. policy overseas. A San Francisco-based Ethereum nexus would be the crypto-version of that. But not if it gets chased away.

To prevent validation from being performed everywhere but the U.S., the government could twin a requirement that domestic block validators implement KYC with a second requirement that all U.S. individuals and companies submit all Ethereum transactions to sanctions-compliant validators. This would pull U.S. Ethereum transactions back onto U.S. soil and into the laps of Coinbase and Kraken.

But this is a complicated chess game to play, and you can see why OFAC has been hesitating.  

On the other hand, OFAC can't prevaricate forever. Sure, crypto is still small. But OFAC is an agency with a democratic mandate to administer law, and law is clearly being broken. It cannot "not govern." To boot, sanctions are a matter of national security, which adds to the urgency of the issue.

One option would be for OFAC to offer an explicit sanctions law exception to U.S. blockchain validators in the form of a special license. But that invokes questions of technological neutrality and equal treatment before the law. Why should Coinbase and Kraken be allowed to maintain financial networks that admit sanctioned actors whereas other network operators, like Visa or American Express, do not enjoy this same exemption?

This isn't just about fairness. By providing a blockchain carve-out, OFAC may unintentionally spur the financial industry to switch over to blockchain-based validation, because that has become the least-regulated and therefore cheapest technological solution for deploying various financial services. At that point, OFAC will find itself with far less to govern, because a big chunk of finance now lies in the zone that OFAC has carved-out.

I don't envy the mandarins at OFAC. They've got a tough decision to make. In the meantime, Coinbase continues to process Tornado Cash transactions every hour.

Outrage builds over Unite’s use of Israel-linked firms as protesters occupy Axa Dublin office

Union management’s choice of firms is ‘huge embarrassment’, say insiders

A row has broken out in Unite over the union’s choice of insurer and hotel chain, after a group linked to the union occupied the European HQ of Axa insurance in Dublin.

Community Action Tenants’ Union (CATU) and the Dublin for Gaza group took over Axa’s offices and called for boycott of the company, according to Irish paper The Journal, because of the business being one of “725 European financial institutions that have subsidised apartheid Israel’s colonial settlements“. Axa told the paper that it “has no proprietary investments in any of the banks cited in recent calls for boycott”.

The action prompted growing anger among supporters of Palestinian human rights in Unite Ireland that the UK and Irish union’s official, democratic position is firm support of Palestinian freedom and right of return to lands taken from them by the Israeli settler-colonial project – and opposition to Israeli occupation, apartheid and oppression.

In fact, at its annual conference earlier this year, Unite delegates voted to formally support the ‘Boycott, Divestment and Sanctions’ (BDS) movement that represents Palestinians’ peaceful resistance to the occupation by encouraging businesses to refuse to buy from or do business with illegally-occupied territories, in a resolution saying that Unite:

[recognises that] Israel is practicing the crime of apartheid, calls for an end to the UK Government’s proposed free trade agreement with Israel, and for support for BDS campaigns against companies complicit in supporting Israel’s illegal occupation of Palestinian land.

Yet according to union insiders, Axa is Unite’s insurer in Ireland – and Unite’s designated provider of hotel accommodation is the Leonardo hotel group, which is part-owned by the Israeli Fattal group. One outraged insider told Skwawkbox:

It’s a huge embarrassment to Unite and one that is causing a lot of anger – even more so as our Irish exec meeting next month is taking place in the Belfast Leonardo’s.

What’s worse is that this has been going on for months and the union still hasn’t done anything to change it. Businesses linked to Israel should never have been selected in the first place, let alone still be used now with everything that’s going on in Gaza.

Unite general secretary Sharon Graham has already infuriated supporters of Palestinian rights by remaining silent for many weeks at the start of Israel’s latest genocidal assault on Gaza – then making a grossly asymmetrical statement appearing to treat Israeli deaths more seriously than Palestinian; and ultimately allegedly having the exec railroaded into accepting only her preferred wording when a statement was eventually issued.

Graham was also exposed using proxies to order the cancellation of showings of the film ‘Oh Jeremy Corbyn/The Big Lie’, which exposes the political abuse of antisemitism accusations against left-wingers in the Labour party, and discussion of Asa Winstanley’s forensic book Weaponising Antisemitism: How the Israel Lobby Brought Down Jeremy Corbyn. Proxies were similarly despatched to try, unsuccessfully, to cancel a Unite ‘fringe’ event at Labour’s conference earlier this month in support of Palestinians.

Her popularity in Ireland is already low. Irish union legend Brendan Ogle is also suing her, her ally Tony Woodhouse and the union for defamation; he also alleges that he was abused by the union after his return from treatment for serious cancer – and after he made ‘protected disclosures’ to the union about its failures to adhere to covid protocols during the pandemic. Graham and her representatives have been accused of ‘disgusting’ behaviour toward Ogle – and anger in Ireland at the situation became so great that an entire sector branch threatened to disaffiliate entirely from Unite, the well-known ‘Right2Water’ campaign said it will no longer work with Unite, Unite’s Community section in Ireland condemned the ‘injustice inflicted’ on him and members picketed general secretary Sharon Graham’s long-delayed visit to Dublin.

Ms Graham is using Denton’s one of the world’s most profitable law firms to defend the defamation suit and Ogle’s the tribunal case. Denton’s was lambasted after its initial social media statement on Israel/Gaza failed even to mention the many Palestinian deaths. The statement was subsequently deleted and replaced.

Her tenure as Unite boss has been marked by a string of other allegations – which neither she nor the union has denied – including alleged destruction of evidence against her husband in misogyny and bullying complaints.

The Euro Med Monitor group reports that some 24,000 civilians in Gaza have been killed so far in just nine weeks by Israel’s bombing, shelling and invasion, around half of them children. Israel is also continuing to kill Palestinians in the occupied West Bank. Politicians around the world have called on the International Criminal Court to investigate and prosecute Israeli government ministers for genocide and other war crimes.

If you wish to republish this post for non-commercial use, you are welcome to do so – see here for more.

Why do sanctioned entities use Tether?

Published by Anonymous (not verified) on Wed, 06/12/2023 - 4:29am in

Tags 

sanctions

Tether, a stablecoin, has been in the news for offering sanctioned actors such as Hamas a means to participate in the global payments ecosystem.

In this post I want to explore in more depth how Tether is being used to dodge sanctions. I'm going to avoid drawing on the Hamas example, which has been controversial, and will instead dissect the U.S. Department of Justice's recent indictment of group of business people who brokered oil purchases from PDVSA, Venezuela's sanctioned state-owned oil company.

Let's get right into things. In this particular case, the buyers – who indirectly represented a sanctioned Russian aluminum company – seem to have used two methods for settling payments with Venezuela: bank wires and cash. (Tether makes an appearance in the second.)  

Before we get to Tether, we need to understand how the bank wires worked.

The Russian buyers operated through a network of shell companies, or fronts, set up in places like Dubai. "Because of [sanctions] we are using 'fronting'" the Russians admit. The Russians' Dubai-based shell companies had accounts at an Egyptian bank with a branch in Dubai. In a lovely line, one of the Russians, Orekhov, describes this bank as the "shittiest bank in the Emirates ... They have no issues, they pay to everything."

...the shittiest bank in the Emirates [link]

The more reputable Dubai banks probably didn't want to risk enabling the potentially sanctioned transactions of a Russian shell company, but here was a bank that had no qualms.

The Russian front companies couldn't wire U.S. dollars directly to the PDVSA; it was sanctioned. Instead, the payments were sent via the Egyptian bank to a number of foreign shell companies owned by the PDVSA, located in places like Australia, Hong Kong, and the UK. With the payments sent, the Russian's boats could be loaded with Venezuelan oil.

The second payment method was U.S. banknotes. In fact, the PDVSA seemed to have preferred cash. In the excerpt below, the Venezuelan contact, Serrano, says that the Russian middleman, Orekhov, lost out on a previous oil shipment because a competing buyer offered to pay 100% in U.S. banknotes. "The key is cash," says Serrano. Venezuela is mostly dollarized, and with the PDVSA cut off from U.S. banks, you can understand why U.S. paper money would be quite valuable to the PDVSA.

"The key is cash" [source]

In response, the Russians suggest two cash-based payments options. In the first, they will send a bank wire to a Panamanian bank, and the Panamanian bank will pay the PDVSA cash in Venezuela. "This is simply a service that they do," says Orekhov. The second option that he suggests is to bring paper money to Evrofinance in Moscow. Evrofinance is a bank that is controlled by the PDVSA and has been sanctioned by the U.S.

The indictment doesn't detail whether either of these two solutions was chosen, but instead focuses on a third cash-based solution, one that involves using Tether, or USDt, as a switch.

The indictment documents this transaction particularly well. It's November 2021 and the Russians' ship is about to berth in Venezuela for loading. The Venezuelan contact, Serrano, notifies the Russian, Orekhov, that he needs to get ready to pay for 500,000 barrels of PDVSA oil. Orekhov responds by sending $17 million worth of USDt to a broker in Venezuela, who converts the USDt to cash. "No worries, no stress," says the Russian to his Venezuelan contact. "USDT works quick like SMS."

"...quick like SMS" [link]

Once the broker receives the $17 million USDt, the cash is placed in a bank where PDVSA officials can collect it. Now the boat can be loaded.

So in this case Tether is being used as third-party rail for buying cash in Venezuela. It is serving as an alternative to a set of bank wires made through shell companies, a notably speedier one. "It's quicker than telegraphic transfer," says Orekhov. "That why everyone does it now. It's convenient, it's quick."

Going the Tether route also has the benefit of not requiring a single know-your-customer (KYC) check. Orekhov could have bought $17 million USDt, and sent it to the Venezuelan broker, and neither of the two would have had to show the owner of the platform, Tether, their ID or fill out any forms. It's like using the "shittiest bank in the Emirates," except with even fewer hassles.

Delving further into the indictment, we learn that another key benefit of Tether is that it provides a degree of protection from the legal hazards of a traditional bank wire transfer. If you scroll down to the part of the indictment where charges are being laid, particularly Count Two, it is the bank wires that are at the root of Orekhov and Serrano's legal woes, not the Tether transactions.

Among many other crimes, Orekhov and his Venezuelan counterpart, Serrano, are accused of sanctions evasion, more specifically conspiring to violate the International Emergency Economic Powers Act (IEEPA). The IEEPA is the bit of legislation that contains U.S. sanctions law.

What specific actions incriminated them? This is a good question, because on first glance the defendants seem to be beyond the pale of U.S. jurisdiction. Both men were foreign nationals operating outside of the U.S. They connected a non-US buyer to a non-US seller. The product is not made in the America. Without a U.S. nexus, it would appear that Serrano and Orekhov are safe from the long reach of U.S. law enforcement.

The ultimate hook that catches Orekhov and Serrano is that part of their dealings were deemed to have occurred on U.S. soil. They made wire transfers using the "shittiest bank in the Emirates," and those wire transfers were ultimately processed through correspondent banks based in the New York metropolitan area.

To understand how New York-based banks touched the transaction, you need to know a little bit about how wire transfers work. To be capable of making a U.S. dollar wire transfer, the "shittiest bank in the Emirates" needed to have an account with a large U.S.-based correspondent bank, like JP Morgan. Likewise, the bank that the PDVSA shell companies were using would have also had accounts at a U.S. correspondent bank in order to accept U.S. dollar wires. A correspondent bank is a bank that, in addition to conducting regular banking business, specializes in serving foreign financial institutions.

So long story short, when U.S dollar funds moved from the Egyptian bank to the PDVSA shell accounts, much of the underlying activity to support this fund transfer occurred back in the U.S. the on the books of a bank such as JP Morgan.

That's the Department of Justice's smoking gun. Serrano and Orekhov are accused of having "caused" a U.S.-based financial institution to process tens of millions in U.S. dollar-denominated payments in violation of the IEEPA.

The Tether transactions, by contrast, do not provide the Department of Justice with anything incriminating. USDt transfer occurs on the books of Tether (which is registered in the British Virgin Islands), completely bypassing the New York correspondent banking system. So when they paid with USDt, Serrano and Orekhov didn't "cause" a U.S-based actor to do anything wrong.

Put differently, if the Russians and Venezuelans had conducted all their transactions with Tether and cash, and avoided bank wires altogether, it would have been impossible for the U.S. to indict them for violating the IEEPA. Thus, not only is Tether "quick like SMS," it also provides a degree of safe harbour from sanctions law.

But not for long?

In a recent letter to Congress, the U.S. Treasury says that stablecoins such as Tether pose a sanctions risk, and requests legislation to close this loophole. The Treasury notes that while it already has jurisdiction over offshore wires transfers because they "transit intermediary U.S. financial institutions," or correspondent banks, it does not have the same authority over "equivalent-value stablecoin transactions, because certain stablecoin transactions involve no U.S. touchpoints." (That's the core of what we were talking about in the previous paragraphs.)

"...stablecoin transactions involve no U.S. touchpoints"

To remedy this, the Treasury wants Congress to update its sanctions toolbox to give it "extraterritorial jurisdiction" over U.S. dollar-pegged stablecoin transactions. In brackets, it also adds "other U.S dollar-denominated transactions" to its wish list. What this appears to be conveying, and I could be wrong, is that the Treasury wants the ability to leverage the U.S. dollar symbol, more specifically the dollar's role as the dominant unit-of-account, as a new nexus for controlling transactions made by foreigners. 

If such a law were to pass, folks like Serrano and Orekhov could now be indicted not only for the traditional crime of making offshore U.S. dollar wire transfers that "cause" New York banks to violate sanctions law, but also for paying with Tether, because the latter invokes the U.S. dollar trademark. 

Leveraging the unit-of-account role of the U.S. dollar to get authority over foreign transactions is a huge step to take, certainly much broader than relying on correspondent banking as authority. Doing so would extend U.S. sanctioning power to a much wider set of foreign economic activity, not just U.S. dollar stablecoin-based transactions, but also potentially to U.S. cash payments, since those too make use of the U.S. dollar accounting unit. Congress will have to think hard before it grants the Treasury's request.

Sanctions: The Blowback

Published by Anonymous (not verified) on Sat, 19/03/2022 - 10:48pm in

Whatever the outcome in Ukraine, one thing is for sure the economic reverberations will be felt by everyone for years to come as the world divides between the West and a rapidly reshaping Eurasia.

The post Sanctions: The Blowback appeared first on Renegade Inc.

Weaponising Our Rights

Published by Anonymous (not verified) on Fri, 18/03/2022 - 5:01pm in

Former UN independent expert on international order, Alfred de Zayas, outlines why we need to build a just world order.

The post Weaponising Our Rights appeared first on Renegade Inc.

Pages