Breaking News for Financial Crime Professionals

IE Insights: What is the RICO Statute?

πŸ’₯ In partnership with ComplyAdvantage: The leader in AI-driven fraud and AML risk detection πŸ’₯

Racketeer Influenced and Corrupt Organizations (RICO) Act – An Overview

The Racketeer Influenced and Corrupt Organizations (RICO) Act, codified as Chapter 96 of Title 18 of the United States Code, was signed into law by President Richard Nixon in 1970. Its primary aim was to provide prosecutors with more robust tools to combat organized crime, particularly the Mafia. Over time, its application has been broadened to address various forms of corrupt organizations, beyond just traditional organized crime syndicates.
The need for RICO arose because traditional prosecution methods proved insufficient against the organized crime landscape in the US. Crime syndicates had become adept at insulating their leadership from direct criminal activities, making it challenging to hold higher-ups accountable for the actions taken on their behalf by subordinates. The RICO Act sought to penetrate this shield.
Key Provisions The RICO statute contains several key provisions:
  1. Definition of Racketeering Activity: The law provides a list of 35 crimes, including gambling, bribery, kidnapping, murder, arson, drug dealing, and various types of fraud, which constitute racketeering when committed as part of an ongoing criminal enterprise.
  2. Establishment of a Criminal Enterprise: The statute targets not just individual crimes but the ongoing operation of a criminal organization. To establish a RICO case, the government must prove that the defendant participated in the management of an “enterprise” that regularly performed one or more of the listed racketeering activities.
  3. Pattern of Racketeering: To be prosecuted under RICO, it’s not enough for a person to have committed a single act of racketeering. Instead, the government must demonstrate a “pattern” of such activities, typically defined as at least two acts of racketeering activity within ten years.
  4. Civil Remedies: One of the most powerful aspects of RICO is that it isn’t just a criminal statute. Victims of RICO violations can bring civil suits against the wrongdoers. If successful, plaintiffs can recover treble damages (three times the amount of their actual damages).
Applications and Controversies:
While RICO was initially targeted at the Mafia and organized crime, its applications have since expanded significantly. The statute has been employed against diverse entities, such as:
  • Political figures and corrupt police departments
  • Financial institutions involved in systemic fraud
  • Gangs involved in illegal drug distribution
  • Pro-life activists accused of using violence or threats of violence against abortion providers
This broad application has been a source of controversy. Some legal scholars and commentators argue that RICO has been used too broadly, moving far beyond its initial intent and sometimes stifling legitimate business activities. There’s concern that the threat of RICO’s severe penalties, including hefty financial damages and extended prison terms, may deter individuals and organizations from engaging in legitimate but potentially risky business operations.
Impact and Legacy:
Despite the controversies surrounding its application, the RICO statute has had a profound impact on the American legal landscape. Its provisions have been instrumental in breaking down powerful criminal enterprises, from drug cartels to corrupt organizations.
Furthermore, RICO’s influence extends beyond the United States. Other countries have adopted similar laws to combat organized crime and corruption within their borders. The European Union, for instance, has looked into RICO-inspired legislation to tackle organized crime across member states.
The RICO Statute stands as a testament to the U.S. government’s efforts to evolve and address the complexities of organized crime. While it has been instrumental in dismantling several large criminal operations, it remains a point of contention in legal circles due to its broad application. As with any powerful tool, the challenge lies in ensuring that it’s used judiciously, targeting genuine threats without unduly hampering legitimate enterprise.