Summary:
I. Diagnosis of the Legal Punishment for Transactions with Illicit Proceeds (Hereinafter Money Laundering) in Mexico. II. Fundamental Rights and the Test: A Theoretical Framework. III. The proportionality test as a control parameter to request proof from the pre-trial judge. IV. Some of the principal pieces of evidence used to prove money laundering in a trial. V. Conclusions.
I. Diagnosis of the Legal Punishment for Transactions with Illicit Proceeds (Hereinafter Money Laundering) in Mexico
Research has shown that there is a problem in targeting the financial, patrimonial, and economic structures of criminal activity. Only 0.26% of all federal sentences in the last five years were related to Money Laundering (ML).1
This same research puts forward two hypotheses. The first centers on law enforcement agencies’ lack of clarity and effectiveness in Public Policies (hereinafter PPs) on criminal prosecution. The second hypothesis is a lack of training among prosecutors and administrative entities that work together to gather evidence for ML case convictions.
In previous studies and interviews conducted with federal judges between March and September 2021, it was observed that in ML-related cases, authorities sometimes submit illegal evidence, such as documents obtained without judicial authorization,2 evidence gotten from illegal searches that did not adhere to procedure with procedural shortcomings, or interviews with the accused that were conducted without meeting the legal requirements.
With this in mind, one hypothesis explaining why judges tend not to be very effective in prosecuting ML charges is that the evidence they receive does not meet the necessary quality and legal standards to effectively punish this crime, in addition to the limited knowledge and training prosecutors have regarding money laundering.
In this context and within the scope of our article, a prosecutor or defense attorney has to verify how the evidence was obtained, as it forms the basis for an accusation and, consequently, the elements upholding it. Without legally obtained evidence, there are no convictions, so any evidence that affects a fundamental right is unconstitutional and thus taints the process.3
This work aims to provide guidelines to help investigators gather evidence by following the tenets of traceability as found in the framework established in the Código Nacional de Procedimientos Penales [National Code of Criminal Procedure, hereinafter CNPP] while also adhering to the theoretical principles that guide and regulate the collection of evidence, such as fundamental rights and others established in the Constitution and international instruments.4 Additionally, we propose some tests that could help prevent or combat money laundering.
Additionally, we discuss the methods judges use to assess and weigh conflicting rights in difficult cases,5 as well as to determine the legality of evidence in ML cases. One example is the proportionality test, which is a methodological tool used by judges and should not be confused with the principle of proportionality,6 which is a constitutional principle in Western constitutionalism and has been applied in making judicial decisions, especially after World War II.7
II. Fundamental Rights and the Test: A Theoretical Framework
The first aspect a prosecutor or defense attorney must consider in obtaining or objecting to evidence is the rights and principles that may clash because, in a constitutional state, both elements must be in balance.8 Among the rights that may enter into conflict are the presumption of innocence,9 the right of defense, the right to personal and mental integrity, the right to prove innocence,10 the rights of victims, and the right of access to justice,11 along with other rights that might be affected indirectly, such as the right to truth.12
Although the topic addressed herein is centers on criminal law and specifically on criminal procedural law, we cannot lose sight of the central tenets of due process guarantees and rights, which delimit and shape the entire law of evidence within the framework of the Constitution and the paradigm of human rights.13
In this way, no legislation established to govern how evidence is obtained and assessed can contravene the principles of constitutional law in its national or supranational14 context. The first step toward ascertaining whether the evidence is illegal is to refer to what is contained in procedural or criminal procedure codes,15 as they assert state that any evidence obtained by violating any fundamental right is deemed illegal.
It is also necessary to know and apply the proportionality test that constitutional courts and judges use when faced with conflicting rights or principles in given cases.16 Therefore, the legal parties involved cannot disregard or fail to understand constitutional law and, much less, the methods used in its application, such as the aforementioned test, 17 whose sub-principles -necessity, suitability, and proportionality- serve as a roadmap for assessing the legality of prima facie evidence and complying with the standards required by judges.18
In this context, we will have to analyze whether the evidence presented does not go beyond the limits set in procedural codes.19 For example, if evidence is obtained through torture or if the defendant has not been read their rights;20 if the corresponding mandatory judicial authorization for gathering certain types of evidence was secured 21 -as in the case of search warrants, court approval for wiretapping, or authorization to intercept correspondence-; the physical examination or recognition of a person when they refuse to be examined; or lifting bank secrecy.22 If these precepts are violated, evidence may be considered illegal, as will be further discussed in the following section.
III. The Proportionality Test as a Control Parameter to Request Proof from the Pre-Trial Judge
Although it is generally thought that this method is only used in constitutional law, it should be noted that because of its empirical value, it is an extremely helpful tool for prosecutors or, as the case may be, defense lawyers and their teams when initiating legal proceedings with the pre-trial judge. However, in this article, we focus on providing means to prove the crime of ML.
Prosecutors often complain that judges obstruct their investigations, but, at the same time, judges argue that many requests do not give well-founded arguments, some violate fundamental rights, and others do not clearly state the reasons for which the evidence or proof23 is needed.
Hence, prosecutors must closely follow the three steps of the proportionality test, 24 which, in Robert Alexy’s view, should guide them when requesting evidence. (In our country, the Supreme Court establishes four steps to this process to identify a constitutionally legitimate aim.25) The first step is to establish the necessity of the evidence, that it is relevant to the case under investigation and contributes to uncovering the truth of the facts. It must also be demonstrated that there are no other less invasive measures available and that it is necessary to protect the legal interest or fundamental right seeking to be protect. 26
In summary, if the evidence has nothing to do with the facts under investigation, judges can evidently refuse authorization.27 For example, it would be difficult to justify the need for wiretapping or computer data interception to investigate an act of corruption arising from complicity among government suppliers because it would affect the fundamental right to privacy and secrecy of communication. The only way would be to convince the judge that it is genuinely necessary to the case.
This is also because public authorities have access to public and private information, prima facie, to prove this crime without resorting to the aforementioned measures. For example, accessing company records of bank transactions or checks issued that might prove this relationship would be less invasive and more effective.
In this particular case, the prosecutor in charge would have to weigh and justify the need for intercepting communication, as will be pointed out later. Cases of terrorism or those that might seriously affect the public interest, for instance, clearly demonstrate this aspect of a request.
Prosecutors must justify their reasons for investigating and requesting information from other individuals, by means of well-founded arguments supporting the need for such measures in the process and their relevance to the central investigation.28 Therefore, in order to obtain the proper authorization to gain access to certain evidence, prosecutors must defend their need for bank statements from the accused and their spouse, for instance, to prove that the money in question comes from shell companies or accounts linked to previously convicted criminals in other proceedings. Hence, as -allegedly- funds of illicit origin, they are therefore subject to investigation.
Second, prosecutors have to demonstrate that the evidence requested is suitable for proving a crime, by focusing on whom they want to investigate and what they want to obtain from the evidence, as well as the impact achieved by the measure. This is important because if they formulate their request in general terms, it will most probably be rejected, regardless of what they might have hoped to obtain.
They also have to name the specific crime under investigation, whether to prove or prevent, such as terrorism, organized crime, kidnappings, and highlevel corruption, among others. In other words, the State apparatus may be obliged to infringe upon rights like the right to privacy and secrecy of communications in the face of such necessary and suitable exceptions, if they want to demonstrate to the judge beyond a doubt exactly what they want to protect - life, freedom, public security, or national security, for example.
By the same token, prosecutors must justify the need to limit a fundamental right by arguing the suitability of the measure requested. In other words, they must bear out that this is the most appropriate measure to prove the charges being presented, emphasize the magnitude of the offense, and establish that the measure ensures foreseeable success in ensuring the prosecution of the crime. Additionally, the proportionality test means considering the possibility of alternative means of investigation and thus strengthening the case. However, they must convincingly demonstrate why this alternative is the most viable one of all.
The suitability of evidence29 means that this type of evidence is the best one to help establish a specific fact. Furthermore, if a fundamental right needs to be infringed, said infringement must be legally authorized and done in such a way as to avoid affecting the basic core of human rights. Obtaining such evidence takes precedence over other potential evidence that may not better serve the goal of proving ML.
Finally, the third step is when the prosecutor and their team need to argue the proportionality of the measure requested; it must be reasonable considering the intended purposes. Specifically, authorization should not be disproportionately invasive compared to the facts under investigation and what needs to be proven or the legal interest to be protected.
In other words, prosecutors must weigh and demonstrate to the judge the need to limit one right in favor of optimizing or fulfilling another constitutionally valid interest. This may include not distorting the economical market and thus free competition, or safeguarding public assets in cases of high-level corruption.
For instance, requesting a search warrant to investigate money laundering offenses may be disproportionate because this information is typically found in public databases or closed sources in the hands of the National Banking and Securities Commission or the Financial Intelligence Unit. Asking for information from the latter would be more proportional than asking for a search warrant, in terms of its degree of suitability and not having to infringe the rights of domicile and personal privacy. It must be noted that the underlying logic is to optimize rights, i.e., to extend the scope of each right as far as possible up against another conflicting right while balancing both the pursued interest and the protected interest.
This is not to say that such a measure cannot be requested; it simply means that more suitable and proportionate measures to prove the crime must be exhausted before. If a search warrant is required, prosecutors need to demonstrate that the measure to obtain key evidence that may have an impact on the theory of the case aligns with the principles of the test of proportionality.30
Furthermore, prosecutors must explain their reasoning to the pre-trial judge, elaborating on how these measures contribute to obtaining and successfully resolving the specific case. In other words, during the oral trial, they must prove the crime of money laundering, which in many cases involves organized crime or terrorism financing.
Prosecutors need to show that the information from these individuals is indispensable to their investigation. Additionally, they must limit their request to fit within the framework of the ongoing investigation. In other words, prosecutors must document which pieces of evidence they specifically seek so that the evidence, in addition to being necessary and suitable, is also proportional.
For example, this means citing the individuals and telephone numbers to be intercepted, specifying the timing and purpose of these interceptions, as well as the constitutional or legal objective, human right, or legal interest to be protected. More importantly, the legal team must demonstrate the proportionality of each measure and, above all, use the intended goal as a reference point, which may include identifying key financial, patrimonial, and economic networks, as well as proving the level of organization and number of individuals involved, in addition to recurring instances of ML and ML operational patterns.
In summary, evidence must pass the proportionality test in terms of the potential impact or infringement of a fundamental right. In such cases, the best option to prove an offense is usually to resort to the least invasive measure on a fundamental right and optimizing each one effectively.31
Before proceeding, the meaning of the hardcore regarding fundamental rights refers to those inseparable elements of a right that make it recognizable as such.32 Laws cannot affect the hardcore or essential content of a fundamental right.33 For instance, the right to defense cannot be recognized with limited legal assistance during a trial or without the offer of free public defense. Similarly, one cannot grasp the idea of personal liberty if pre-trial detention (in Mexico “arraigo”)34 is mandated or if an individual is placed under house arrest, as it would not just restrict freedom of movement but directly have an impact on the core principle of liberty. Although it may be justified as not being imprisonment, it still affects an individual’s freedom.
In this context, criminal procedure codes often explicitly state that when evidence related to individuals’ private lives (such as wiretaps, correspondence, emails, or messages), assets (bank accounts, investments, insurance, savings, loans), health reports (medical records, blood or urine tests), administration (accounting, tax payments, partial and annual tax declarations, deductions, income, expenses, deposits either received or sent, international transactions), inviolability of their domicile (search warrants), or their location (georeferencing to determine a person’s location) is required, it must be considered, assessed, and authorized by the pre-trial judge.35
This fundamental point should guide prosecutors, but it also applies to those in charge of developing evidence-based strategies for proving crimes -namely, experts and financial or asset intelligence units included in the prosecution team. These units collaborate with the finance or treasury departments of other countries and other units connected to central banks.36
In conclusion, it must be borne in mind that the assessment parameter for authorizing these measures should be the relevance of the evidence and the proportionality of the measure compared to the offense in question. In other words, the proportionality of the measure is linked to the intended purpose and the correlation that must exist between its duration, extent, depth, and outcome.37
Furthermore, it should specify the crimes under investigation, requiring well focused inquiries found in such evidence. Failing to do so could lead to evidence that is disproportionate and violates the right to due process.
Finally, before delving into an examination of some of the evidence used to prove this particular crime, it is necessary to recall the guidelines judges follow in performing a balancing test, which can serve as a tool to point the way for prosecutors or defense attorneys in their investigative and defense strategies.
IV. Some of the Principal Pieces of Evidence Used to Prove Money Laundering in a Trial
In view of the focus of this article, we will examine how ML is typified in the Mexican context.
In Mexico, according to the Código Penal Federal (Federal Penal Code, hereinafter FPC),38 the offense of money laundering is committed by whoever acquires, disposes of, manages, safeguards, possesses, exchanges, deposits, withdraws, gives as collateral, invests, transports or transfers within national territory, from national territory abroad or vice versa, resources, rights, or assets of any kind in the knowledge that said resources are or represent proceeds from an unlawful activity or seeks to conceal the nature, origin, location, destination, or ownership of said resources, rights or assets (Art. 400 bis FPC).39
A mechanism to prevent assets from being acquired with illicit proceeds is set forth in Article 22 of the Constitution:
The asset forfeiture process shall be carried out by the Office of the Public Prosecutor by means of jurisdictional civil proceedings independent of the criminal proceedings. The competent authorities from the various levels of government shall assist in fulfilling this task. The law shall establish mechanisms for authorities to administrate the assets subject to asset forfeiture, including their proceeds, yields, revenues, and related charges so that the authorities can carry out the disposal, use, usufruct, transfer, and monetization, in the service of public interest, and define, in a timely manner, the destination and, where appropriate, the destruction thereof.
It shall apply to assets whose legitimate origin cannot be proven and which are related to investigations stemming from corruption, concealment, crimes committed by public officials, organized crime, vehicle theft, proceeds of unlawful activities, crimes against public health, kidnapping, extortion, human trafficking, and offenses related to hydrocarbons, petroleum, and petrochemicals.
It should be noted that in Mexico one of the basic conditions to be proven in ML-related offenses is the illegal origin of the money, which may stem from a predicate offense like drug trafficking, human trafficking, fraud, or even tax evasion.40
A predicate offense is one that generates illicit funds, while the use of that money is what constitutes the offense being analyzed herein. These are two independent offenses, and a conviction for the first is not required to initiate proceedings for the second. Starting judicial proceedings, such as the link to the trial in the first case, is sufficient for the second to be investigated separately or independently.
The Constitution broadens the range of offenses subject to asset forfeiture. In such cases, evidence is crucial for a sui generis civil trial to rule on stripping ownership of assets acquired with illicit resources stemming from the crimes enumerated in Article 22 of the Constitution.
Hence, the prosecutor’s first challenge is to prove that the money comes from a crime, making it unlawful in itself or impossible to confirm its legitimate origin. For example, in the case of cash seized during a search or vehicle inspection, it must be demonstrated that the person does not have the means to earn such an amount of money, and therefore, it belongs to someone else.
In a situation like this, the prosecutor may request, with authorization from the pre-trial judge, financial information from the National Banking and Securities Commission to determine if the person has bank accounts and can account for their income and expenditures.
If the person has bank accounts, their income should be substantiated by electronically issued (and paid) invoices or deposits. If there are invoices, their annual and monthly tax declarations must be checked to see if there is any tax evasion or fraud.41
Additionally, it must be confirmed whether the individual or the company they may be associated with has employees and the necessary infrastructure to provide the service invoiced and paid for. In corruption-related offenses, companies are frequently used as fronts and in no way can provide the declared service as there are no employees enrolled in social security; none of the infrastructure, furnishings, or intellectual capital required to deliver goods and services. For example, a company specializing in information technology tools needs to have partners or employees with the professional skills to provide that service.42
Furthermore, in some cases, digital tax seals issued for individuals or legal entities may show significant irregularities, such as having been canceled and reactivated in situations related to issuing and paying invoices. In summary, demonstrating that a person does not have the transactional profile to have or handle such an amount is essential. The first phase would consist of checking whether the person may be committing a tax offense or misdemeanor in the absence of clear connection to any other offense.
If the person under investigation does not meet any of these requirements, an inquiry must be made into the individual’s profession to determine if they possessed the knowledge that would enable them to exercise due diligence beforehand. A person with academic or empirical training has a higher likelihood of knowing they were engaging in an illegal activity,43 a fact that becomes crucial to the case.
For example, if the person carrying the money is an accountant, a lawyer, or an economist, it will naturally lead to the assumption that they possess sufficient knowledge to understand that it was suspect to simply transport significant amounts of cash without legal justification or proper accounting records. Withdrawing money from a bank with a check that validates the cash outflow, or the cash payment would have been enough to justify the action. While handling cash may be common in livestock or agricultural businesses, they still need to establish their active engagement in such activities.
Cattle ranchers, for instance, are required to maintain records of the health tags on the animals in order to be able to transport or slaughter them. Additionally, all sales of livestock and other agricultural products must have invoices.44 However, the problem lies with the informal economy, where substantial sums of money are involved, making it one of the country’s major challenges in combating ML.45
If a person fails to give proof of their profession or of a legitimate occupation that could generate these resources, is not registered with the Ministry of Finance, does not have a bank account or does not file annual tax returns, ML or, at least, a tax-related offense, is a real possibility.
One common pattern of behavior in cases involving shell companies or socalled “invoices” is observed when one of their members is arrested, or the cash they were to deliver to the person who bought the invoice is stolen. If a common thief or organized crime is involved in one such incident, no criminal complaint is usually filed as they cannot prove the legitimacy of the origin of the stolen money, in addition to the potential consequences of the authorities giving it a closer inspection.
People transporting the money are typically the lowest link in the ML chain. Hence, offering them a plea bargain is often a strategic move to reach higherlevel structures.46 As previously mentioned, this is a little-utilized tool in hunting down the higher-level structures of a criminal organization47 in Mexico.
Moreover, the higher-level echelons are usually better protected, so it is a good approach to explore alternatives to get closer to their operations. This point is particularly important for entrepreneurs who become partners in crime with perpetrators of illegal activities with the greatest impact on society, such as human trafficking.
Another challenge is to identify the predicate offense of the activity. At the very least, the prosecution will get an opportunity to seize this money and declare it abandoned, and thus see if anyone comes forward to prove its legitimate origin. If no one shows up, it becomes part of the national or state treasury after a hearing before the pre-trial judge.
The above describes how ML cases are typically initiated in Mexico. It can therefore be said that, according to the data, a significant amount of the money seized by the police is caught in flagrante.48 However, not all ML cases originate in this way. Some are the result of investigations into predicate offenses like organized crime, fuel theft, drug trafficking, corruption, human trafficking, arms trafficking, undocumented immigration, and organ trafficking, among others.
For example, the National Asset Forfeiture Law requires prosecutors to notify the Asset Forfeiture Unit when they suspect potential ML. Most cases of ML are discovered by prosecutors through a predicate offense. For instance, investigations into fuel theft inevitably entail an economic component, as is the case with most offenses.
The important and interesting aspect is how a prosecutor or investigator can discover a money laundering offense based on evidence from the predicate offense or vice versa by identifying the predicate offense based on the money trail. The latter has been a weakness in public policies and criminal prosecution strategies, both at government and prosecution office levels.
As previously stated, in the past five years, only 0.26% of federal sentences correspond to money laundering, which amounts to 654 sentences in federal courts out of the 245,502 sentences nationwide for other offenses.49 This leads to the conclusion that there is a lack of decisiveness and effectiveness in punishing the offense in itself, as most penalties pertain to the predicate offense, thus failing to undermine criminal economic structures.50
However, for the purposes of this article, it is essential not to lose sight of what happens after a prosecutor receives a criminal report of a potential money laundering offense. The question is, “What to do?” It should also be clear that evidence must be evaluated freely and logically.51 Therefore, innovation and the use of other disciplines will be beneficial within this paradigm.
The first step is to take apart the individual, group of individuals or companies involved in the money laundering process. It should be noted that anyone who disposes of, acquires, manages, possesses, changes, converts, or deposits can be held liable for ML, in addition to the transportation of money.52
Therefore, prosecutors must examine the familial, patrimonial, commercial, and social networks of the person who committed the predicate offense. In this context, civil registry data are crucial for identifying immediate family members, such as spouses, children, parents, grandparents, siblings, aunts, uncles, cousins, or any other relatives that may be allegedly involved in illegal money exchanges.
With just a person’s name and date of birth, a Federal Taxpayer Registry (RFC for its initials in Spanish) or a Unique Population Registry Code (CURP for its initials in Spanish)53 can be procured to cross-reference and verify the information with other databases with details about the number and characteristics of properties owned by the suspect or their potential associates.
In the case of this type of evidence, prosecutors must ensure that certificates and records are certified by a registrar or another authorized public entity. The evidence should include accounting reports; economic, financial, and equity network data; tax returns; main clients and suppliers; asset statements; bank account information; and national and international transfers.54
Once the family network has been established, prosecutors cannot disregard the business network side, namely, the companies in which the suspect holds shares or interests. For this, it is essential to check the public registry of commerce to find out if the individual is a legal representative and to examine all transactions conducted by these companies, such as increases and decreases in capital and any changes in business partner or legal representatives.55
This information can also help identify possible collaborators who might be interested in cooperating if they act as accomplices or need to regularize their tax or administrative situation. In the latter case, it is possible to find notaries, public brokers, customs agents, or the like, even if they are not directly involved in the crimes.56
This makes it possible to identify with whom the person has formal business relationships. Furthermore, this evidence is irrefutable proof since these records are found in public registers and notarial records, where it is assumed that the signatures, biometric records, and identity documents were verified to set up the companies.57
This category of crimes, in terms of the evidence required, may be easier to substantiate and have a higher success rate in court than, for example, proving intent, which involves a certain degree of subjectivity, or recidivism. This is because notarial, commercial, patrimonial, and financial records are factual; they either exist or do not exist, and economic or patrimonial activities typically leave traces, which provide a judge with a higher degree of certainty when issuing a guilty verdict.
In addition to the family network, prosecutors can inform the judge of the commercial network. Knowing the history of a person’s business behavior can provide insights into stages of capital growth or decline and political affiliations to generate timelines. It can also help identify criminals and even politically exposed individuals who may have had connections with these companies when investigating corruption or influence trafficking cases. The social network cannot be overlooked either, as it can provide information on the person’s lifestyle, relationships, and consumption patterns, including those of their family, partners, and friends.
Access to information from the Financial Intelligence Unit is also of great value. The reports issued by banks, SOFOMEs,58 savings and loan institutions, and all members of the financial system contain information on deposits, account holders, and individuals authorized to use these accounts, as well as links to politically exposed persons.59
It is also possible to identify if the accused has loans, savings, cash deposits, expenses on credit or service cards, and cryptocurrencies, as well as to track national and international transactions, whether these come from tax havens, and the end use of the money.
Evidently, information from tax authorities regarding income and expenses declarations, suppliers, clients, tax payments, billing movements, and whether their tax seals are active or have been canceled for any reason is pivotal. Institutions like the Mexican Social Security Institute can provide data on whether the individual or their company has employees, and if so, how many, their positions in the company, and their base salary for social security contributions.
When a public servant is involved in ML, the public sector has the means to identify whether the person in question has been sanctioned, the types of penalties imposed, their asset declarations at the beginning and at the end of their term, their current salary, conflicts of interest, changes in assets, their positions, and who their direct and indirect supervisors have been. Finally, it is crucial to verify whether the official is a politically exposed person. As mentioned earlier, tax information is decisive, especially in discovering potential discrepancies between income and expenses.
V. Conclusions
For prosecutors, it is imperative to trace the evidence based on the data provided, while ensuring that it is not tainted by illegal actions. In other words, obtaining evidence through legitimate channels, as is the case in the examples discussed herein, requires the authorization of a pre-trial judge. In addition, when prosecutors request the aforementioned evidence, they must also justify their reasons, as discussed above, as any evidence requested from the pre-trial judge must pass the proportionality test.
The path we have analyzed in this article is the mainstay of the evidence that can be obtained to prove the unlawful use and origins of money and the factors that ultimately define this crime. Money laundering prepares the groundwork for building up and sustaining the criminal networks involved in offenses that have a strong impact on the population and, in the long run, weaken the rule of law and public institutions.
As seen, successful ML convictions are still a challenge for authorities, as the number of actual convictions is still relatively low compared to the overall number of criminal convictions.
It is also important to note that prosecuting this crime is not solely a matter for legal experts; rather, it requires multidisciplinary teams that are responsible not only for contributing to the case theory but, above all, for producing intelligence products that serve as evidence to prove the commission of this offense beyond a reasonable doubt. Multidisciplinary collaboration among accountants, economists, lawyers, and asset analysts, among others, is the key to changing the way we address this phenomenon.
In this way, teamwork is essential to ensure that investigative and financial intelligence units do not taint evidence by obtaining it illegally or accessing the accused’s information without authorization from a pre-trial judge. Therefore, the prosecutors should continually monitor the process.
Additionally, the intelligence products arising from information analysis units, which include accounting reports, tax discrepancies, networks of financial connections, and specific evidence like bank transfers, form the basis of the prosecution’s case and must have a logical and rational basis within the case theory.
To achieve this, the importance of the balancing test is critical when considering what evidence requires the authorization of a pre-trial judge for its arrest. It is essential to justify the request in light of the legal reasoning presented to reach the ultimate goal, which is undoubtedly to protect human rights and safeguard constitutional legal interests to the extent possible.
These interests can range from preventing terrorism financing, maintaining a balanced market, targeting criminal instruments to debilitate criminal organizations, bribing authorities, or preventing illicit funds from being funneled into political campaigns. This directly weakens the institutional structures of the State and, in many cases, challenges the constitutional rule of law, posing a threat to the State and affecting the social and political stability of the country.










nova página do texto(beta)



