CIVIL RICO
Advocates gather estate theft information and evidence, vet the information, cross-reference evidence to determine repeating patterns (CRRP) of civil breach, ethic violations, collusion and organized civil or criminal activity. We follow the American Bar Associations standards set for fourth by the “Legal Issues Related to Elder Abuse; A Desk Guide for Law Enforcement”, State & Federal Statutes, Acts And the US Constitution.
Reference: Research material is compiled from the ABA Association – Legal Issues Related to Elder Abuse; A Desk Guide for Law Enforcement.
Washington State civil actions for Criminal Profiteering (RICO)
CRIMINAL PROFITEERING EXAMPLE FOR VET AND CRPR GUIDELINES:
We focus on State Statutes and Federal Acts to guide vet and process estate theft offender profiles.
Washington State civil actions for Criminal Profiteering example: The Criminal Profiteering Act of 1985 is Washington State’s version of the federal RICO law.The act provides that a “pattern of criminal profiteering activity” means engaging in at least three acts of criminal profiteering within a five-year period. To constitute a “pattern,” the three acts must have the same or similar intent, results, accomplices, principals, victims or methods of commission, or be otherwise interrelated by distinguishing characteristics including a nexus to the same enterprise, and must not be isolated events. A “pattern” of profiteering is usually required before any of the special civil remedies apply.3Winchester v. Stein, 135 Wash. 2d 835, 852, 959 P.2d 1077, 1083 (1998). See 16A WAPRAC § 26.51.
The most likely crimes to be alleged in a civil action for Criminal Profiteering are money laundering, proceeds from elder exploitation (estate theft) or securities fraud. Criminal securities fraud requires proof beyond a reasonable doubt that defendants “willfully” violated the securities statutes. 6RCW § 21.20.400. Specific intent regarding fraudulent, misleading, or deceitful conduct is proof of willfulness. State v. Markham, 40 Wash. App. 75, 697 P.2d 263(1985), reconsideration denied, review denied. Money laundering is the conducting of a financial activity using money which the person knows is the proceeds of an unlawful activity (e.g. securities fraud). State v. Casey, 81 Wn.App. 524, 531–32, 915 P.2d 587, 591 (1996).
Fraud and Financial Crimes//criminal.findlaw.com/criminal-charges/fraud-financial-crimes.html Fraud and financial crimes are a form of theft/larceny that occur when a person or entity takes money or property, or uses them in an illicit manner, with the intent to gain a benefit from it. These crimes typically involve some form of deceit, subterfuge or the abuse of a position of trust, which distinguishes them from common theft or robbery. In today’s complex economy, fraud and financial crimes can take many forms. The resources below will introduce you to the more common forms of financial crimes, such as forgery, credit card fraud, embezzlement and money laundering.Show More » |
We gather estate theft information and evidence, vet the information, cross-referance evidence to determine repeating patterns (CRRP) of civil breach, ethic violations, collusion and organized civil or criminal activity. We follow the American Bar Associations standards set for fourth by the “Legal Issues Related to Elder Abuse; A Desk Guide for Law Enforcement”, State & Federal Statutes, Acts And the US Constitution.
Reference: Research material below is compiled from the ABA Association – Legal Issues Related to Elder Abuse; A Desk Guide for Law Enforcement. CRIMINAL PROFITEERING EXAMPLE FOR VET AND CRPR GUIDELINES:We focus on State Statutes and Federal Acts to guide vet and process estate theft offender profiles. Washington State civil actions for Criminal Profiteering example: The Criminal Profiteering Act of 1985 is Washington State’s version of the federal RICO law.The act provides that a “pattern of criminal profiteering activity” means engaging in at least three acts of criminal profiteering within a five-year period. To constitute a “pattern,” the three acts must have the same or similar intent, results, accomplices, principals, victims or methods of commission, or be otherwise interrelated by distinguishing characteristics including a nexus to the same enterprise, and must not be isolated events. A “pattern” of profiteering is usually required before any of the special civil remedies apply.3Winchester v. Stein, 135 Wash. 2d 835, 852, 959 P.2d 1077, 1083 (1998). See 16A WAPRAC § 26.51. The most likely crimes to be alleged in a civil action for Criminal Profiteering are money laundering, proceeds from elder expliotation (estate theft) or securities fraud. Criminal securities fraud requires proof beyond a reasonable doubt that defendants “willfully” violated the securities statutes. 6RCW § 21.20.400. Specific intent regarding fraudulent, misleading, or deceitful conduct is proof of willfulness. State v. Markham, 40 Wash. App. 75, 697 P.2d 263(1985), reconsideration denied, review denied. Money laundering is the conducting of a financial activity using money which the person knows is the proceeds of an unlawful activity (e.g. securities fraud). State v. Casey, 81 Wn.App. 524, 531–32, 915 P.2d 587, 591 (1996). Defined Criteria of Vet and CRPC Process Viarables From the ABA Association – Legal Issues Related to Elder Abuse; A Desk Guide for Law Enforcement. Practitioners’ experiences and recent research show that most elder abuse victims experience more than one type of abuse (polyvictimization). For example, perpetrators may use physical abuse or threaten nursing home placement to financially exploit the victim. Consent, Decision-Making Capacity, and Undue Influence The legal concepts of consent, decision-making capacity, or undue influence—or some combination of them—are a critical issue in many cases of elder abuse. As a result, these concepts are mentioned in every section of this report and require a stand-alone explanation. Consent: Key Definitions and Facts Decision-Making Capacity: Key Definitions and Facts Undue Influence: Key Definitions and Facts Actions to Consider • Consider whether the alleged victim had capacity to make the decisions in question. |
SUBMIT ESTATE THEFT EVIDENCE AND OFFENDER PROFILE
· I. WE ARE ACTIVELY SEEKING ESTATE THEFT INFORMATION AND EVIDENCE IN THE NORTH WESTERN US. PLEASE REVIEW THE FOLLOWING STEPS TO REGISTER AND START SUBMITTING EVIDENCE. CURRENTLY ALL SERVICES ARE COMPLIMENTARY AS WE BUILD OUR ESTATE THEFT OFFENDER DATABASE.
· OUR PRIMARY OBJECTIVE IS TO ESTABLISH PATTERNS OF WHITE COLLAR PROFESSIONAL’S BREACH OF TRUST, ETHICAL VIOLATIONS, CIVIL TORTS, ORGANIZED COLLUSION AND CRIMINAL CONDUCT.
To begin the estate theft Vet and CRPR process (refer to the section of this web site which explains the vet process, the CRPR criteria and repeat offender risk analysis) :
- Send us an email to register and correspond with to an Estate Theft Consultant (ETC): Email Contact
- Submit your priority 1, 2, 3, or 4 evidence to our organization. We will assist you with this,
- Once your information is received by an ETC it will go through an evidence submission Vet process,
- The Vet process consists of both a manual and automatic cross-reference pattern recognition (CRPR) system to identify and correlate organized civil tort and criminal patterns,
- Also a risk analysis to quantify the future for additional tort or criminal violations will be calculated based on established patterns,
- After the first Vet process and the initial phase 1 CRPR analysis is complete a consultant from our organization will become you assistant and help you with the following phases.
- Please note we are not attorneys and our commentary services are not recommended as any substitute fro professional legal advice. We ar an educational support group of victims whom help provide guidance to estate theft and vulnerable adult abuse victims. Our primary mission is to track offenders. gather evidence, establish profiles of offender tort and criminal evaluations and when necessary pass that to the proper authorities. We also provide contact resources, educational information, support forms and other services which are explained after completion of the initial Vet process.
· II. WE ARE ALSO LOOKING FOR ESTATE THEFT INFORMATION IN ALL US STATES AND CROSS BORDER ESTATES WITH ASSETS IN CANADA. PLEASE REVIEW THE FOLLOWING STEPS TO REGISTER AND START SUBMITTING EVIDENCE:
- In order for us to provide you with assistance in States other than the Northwest US states we require at least two offenders whom have developed an estate theft vet and CRPR match
- Send us an email to register and correspond with to an Estate Theft Consultant (ETC): Email Contact
- Submit your priority 1, 2, 3, or 4 evidence to our organization. We will assist you with this,
- Once your information is received by an ETC it will go through an evidence submission Vet process,
- The Vet process consists of both a manual and automatic cross references pattern recognition (CRPR) system to identify and correlate organized civil tort and criminal patterns,
- Also a risk analysis to quantify the future for additional tort or criminal violations will be calculated based on established patterns,
- After the first Vet process and the initial phase 1 CRPR analysis is complete a consultant from our organization will become you assistant and help you with the following phases.
- Reference: Research material is compiled from the ABA Association – Legal Issues Related to Elder Abuse; A Desk Guide for Law Enforcement.
Practitioners’ experiences and recent research show that most elder abuse victims experience more than one type of abuse (polyvictimization). For example, perpetrators may use physical abuse or threaten nursing home placement to financially exploit the victim.