2025-10-31
How do criminals trust each other?
And why does it matter for policy?
Every illegal transaction has the same problem:
Agreements cannot be enforced in court.
A drug supplier who is cheated cannot sue.
A bribed official who doesn’t deliver cannot be held liable.
A wealth manager who absconds with hidden assets cannot be reported.
So how do they solve this? → The organizational form is shaped by which trust technologies are available.
Gambetta (1993) for the Mafia · Lambsdorff (2002, 2007) for corruption · Dixit (2004) for lawless exchange · Harrington (2016) for tax evasion
Odebrecht (Brazil, 2001–2016)
Latin America’s largest construction firm paid $788M in bribes across 12 countries.
Created a formal corporate department — the Structured Operations Division — with encrypted IT systems, codenames for every politician, and a CEO-maintained spreadsheet tracking who was owed what.
UBS (Switzerland, 2000–2007)
Switzerland’s largest bank helped ~20,000 US clients hide $20 billion from the IRS.
Bankers traveled to the US under false pretenses, trained in counter-surveillance, carried encrypted laptops, and smuggled diamonds in toothpaste tubes.
Same trust problem. Opposite solutions.
All trust in illegal exchange comes from three sources of cost for defection:
| Primitive | If I defect… | Dominates in… |
|---|---|---|
| Relationship | …I lose a valuable ongoing interaction | Drug trafficking (84%), corruption (65%) |
| Community standing | …third parties learn and I lose access | Tax evasion (89%), organized crime (29%) |
| Formal contract | …counterparty invokes the legal system | Corruption (19%), tax evasion (19%) |
Building on: Kandori (1992), Gambetta (1993, 2009), Lambsdorff (2002), Dixit (2004)
Plus modifiers (kompromat intensifies relationships), architecture (intermediaries chain trust links), and configurations (hierarchy = relationship + contract + power asymmetry)
| Relationship | Community standing | Contract | |
|---|---|---|---|
| Drug trafficking | ✓✓ kinship, repeated | punishment | ✗ |
| Organized crime | ✓✓ clan-based | punishment | ✗ |
| Corruption | ✓ repeated deals | ✗ hidden | ✓ insider |
| Money laundering | ✓ professional | reliability | ✓ |
| Tax evasion | weak | reliability | ✓ |
Social position → which primitives are accessible → organizational form


16 sources · 173 countries · 6 crime types · LLM-extracted trust mechanisms
Delação Fernando Migliaccio, Termo 05 (Lava Jato plea bargain)
[…] The Structured Operations Division maintained offshore accounts in Portugal, Switzerland, Austria, Antigua […] payment orders via phone, email, and the DROUSYS encrypted system […] each collaborator controlled distinct account sets […] fabricated contracts to justify repatriation of funds […] doleiros and lawyers as compartmentalized intermediaries.
| Field | Extracted |
|---|---|
| Trust mechanisms | Relational ✓ Intermediary ✓ Contractual ✓ Kompromat ✓ Hierarchy ✓ |
| Key insight | Corruption bureaucratized — a formal department with IT systems, codenames, and gatekeepers |
System prompt (excerpt):
Corrupt deals cannot be enforced in court. This creates trust problems: will the bribed official deliver? Will the firm actually pay the kickback? Will either party inform on the other? Will one side use evidence to extort the other? How did the parties even find each other safely? We want to understand how these problems were solved in each case.
Extraction fields (excerpt):
trust_problems: “free-form: who needed to trust whom, and why was trust difficult? E.g. ‘the firm needed to trust that the official would steer the contract after receiving payment; the official needed assurance the firm would not inform prosecutors.’”
trust_solutions: “free-form: how were the trust problems actually solved? What relationships, arrangements, threats, intermediaries, recording of evidence, repeated dealings, family ties, or other mechanisms enabled the corrupt parties to trust each other?”
Free text first → classify second. Avoids catch-all categories.
| Mechanism | Prompt definition (condensed) |
|---|---|
| Relational | Ongoing relationship whose value deters cheating. Subtypes: repeated interaction, kinship, friendship, ethnic/clan ties |
| Reputation | Community-level enforcement: third parties observe and gossip, so cheating is punished by the broader community, not just the dyad |
| Kompromat | Deliberate creation of mutual vulnerability. Compromising evidence, mutual blackmail potential, down payments as commitment devices |
| Intermediary | Third-party brokers, fixers, go-betweens who connect, guarantee, or enforce. They solve the search problem and can provide performance guarantees |
| Hierarchy | One party can directly punish the other through organizational authority, violence, or threats. Compliance is compelled |
| Contractual | Parties use formally legal contracts (consultancy agreements, agent commissions, subcontracts, contingency fees) to enforce informally illegal arrangements. The contract is real and legally enforceable — what is corrupt is the underlying purpose |
Input: free-text trust_solutions from Stage 1 → Output: 6 binary flags per case

57% vs 26%
intermediary prevalence: cross-border vs domestic
The problem:
Building trust takes years.
How do you transact illegally with someone you’ve never met?
The solution:
Hire a broker via a legal contract.
Consultancy agreement, agent commission, wealth management contract
66% of intermediary cases involve formal commercial arrangements
Intermediary × contractual co-occurrence: \(\chi^2\) = 59, p < 10-14 · cf. Drugov, Hamman & Serra (2014); Harrington (2016)

N = 6,204 classified cases across 5 crime types
The paradox: reputation for violence requires attribution — but attribution is incriminating. How do criminals build it?
| Mechanism | How attribution stays out of court |
|---|---|
| Organizational branding | Narco-messages credit the cartel, not the individual operative |
| Witness deterrence | The reputation for violence prevents witnesses from testifying |
| Initiation rituals | Violence witnessed only by fellow gang members (Skarbek 2011) |
| Pattern signatures | Killing methods readable by community, not legal evidence |
Corruption can’t do any of this. Officials have legitimate positions where any attribution — community or legal — is catastrophic. No brand to absorb it, no violence to deter witnesses.
Hypothesis: intermediaries hold funds until the official delivers (escrow).
Reality (772 FCPA cases): firm pays first in 93% of intermediary cases.
| Intermediary role | % of cases | Function |
|---|---|---|
| Conduit | 40% | Pass money through, create paper trail |
| Buffer | 17% | Distance + deniability for the firm |
| Relational guarantor | 7% | Use relationship with official to ensure delivery |
Not escrow — the intermediary provides access + concealment + relational guarantee.
Contrast: in tax evasion, the enabler IS a true escrow agent (holds the assets).
If intermediaries solve the trust problem for a fee, the commission should reflect the cost of providing trust.
| Setting | Median commission | Why |
|---|---|---|
| Iraq Oil-for-Food | 10%, zero variance | Standardized tariff, no trust needed |
| Mexico (CFE, repeated) | 5% | Repeated dealings compress premium |
| Extractives (long-term) | 3% | Concessions over decades |
| Gabon (one-shot, cross-border) | 20% | Intermediary must provide access + concealment + relational guarantee |
| Defense (one-shot, high-value) | 20% | Trust must be purchased, not accumulated |
With repeated interaction: mean 10%. Without: mean 16.8% (p = 0.0002)
→ Relational trust and intermediary services are substitutes with observable prices
If reputation works, firms with track records of paying bribes should be trusted to pay after receiving the contract. Officials should deliver first.
What we find (772 FCPA cases):
Even JPMorgan, Siemens, Credit Suisse — firms with extensive bribery records — pay first.
Reputation does not function in corruption. Contrast: enablers deliver first in tax evasion (89% reputation).
Odebrecht’s encrypted system (Drousys) solved three trust problems:
| Function | Trust problem | How |
|---|---|---|
| Secrecy | Denunciation | Encrypted, separate from corporate IT |
| Coordination | Performance | Real-time tracking across 12 countries |
| Kompromat | Hold-up | Records = mutual hostage |
But the records that enabled trust became the prosecution evidence.
→ 77 executives signed plea bargains in a cascade — hierarchical trust collapses from the top down
→ Compare: Putin network (kinship) → zero defections. UBS (institutional) → bank pays fine, system continues.
46% of Indian MPs face criminal charges; 31% face murder, kidnapping, assault (ADR 2024)
| Pattern | Mechanism | Example |
|---|---|---|
| Bahubali (strongman) | Violence IS the trust technology | Atiq Ahmad: 195+ cases, ran empire from jail |
| Resource mafia | Violence enforces corrupt monopoly | Sand/mining mafias kill journalists, RTI activists |
| Vertical integration | Criminal becomes politician to eliminate trust problem | Vaishnav (2017): “when crime pays” |
Chemin (2012): criminal politicians reduce bribes by 34% but increase violent crime by 25%
→ Violence and market corruption are substitutes, not complements
What they measure
What we add
Harrington (2016) · Findley, Nielson & Sharman (2014) · Seabrooke & Wigan (2017)
| Trust mechanism | How UBS solved it |
|---|---|
| Institutional | Swiss banking secrecy law — criminal penalties for disclosure (Art. 47) |
| Reputation | 150-year brand; “your fear is unjustified… protection cannot be compromised” (2002 client letter) |
| Contractual | Wealth management agreements, QI agreement with IRS, nominee shell companies |
| Relational | Art Basel, yacht races, concierge services — quarterly personal visits |
| Kompromat | Mutual criminal exposure: neither side can report without self-incrimination |
| Intermediary | NY referral desk → Swiss bankers; external lawyers → Liechtenstein trust managers |
Every trust mechanism in our taxonomy — in a single case.
Anders Jahre (1891–1982) — Sandefjord shipping magnate
After Jahre’s death: Monsen transfers assets to Aall Trust and Banking Co. — his own bank on the Cayman Islands. Creates new foundations for himself and his family. The straw man ran away.
The opacity that hides assets from the tax authorities also hides them from the beneficial owner’s heirs.
How does a client trust a nominee who officially “owns” their assets?
| Document | Function | Trust problem solved |
|---|---|---|
| Nominee director declaration | Nominee commits to follow owner’s instructions | Performance risk |
| Power of attorney | Transfers operational control back to real owner | Hold-up risk |
| Undated resignation letter | Owner can remove nominee at will | Denunciation risk |
Contractual formalization as a trust technology — the core product of the enabler industry
US client (e.g. Olenicoff, $200M)
│
Wealth management agreement ←── contractual
│
UBS private banker (Switzerland)
│
Referral to external counsel ←── intermediary
│
Lawyer / consultant
│
Shell company formation ←── contractual + nominee
│
BVI / Liechtenstein / Panama entity
│
Numbered account (UBS Geneva)
Each layer: a trust problem solved by a legal contract (Seabrooke & Wigan 2017)
| Case | What happened | Trust failure |
|---|---|---|
| Cordish family (US) | Financial planner managing Cook Islands trusts diverted $12M to personal real estate | Enabler exploited information asymmetry |
| BVI shell operator | Ran a $33.5M Ponzi scheme against 132 investors using their own shell structures | Nominee turned predator |
| Trust protector | Redirected assets to his own relatives by misrepresenting beneficiaries’ wishes to Swiss trustees | Intermediary captured the chain |
“Once your money is offshore, you have no legal standing to go get it.”
Odebrecht (corruption)
2015: Migliaccio discovers he is being set up as fall guy
Plea bargain cascade: 77 executives cooperate
Why? Asymmetric exposure — the company could blame “rogue employees” while individuals faced decades in prison
The Italiano spreadsheet — meant to enforce trust — became the prosecution’s key evidence
UBS (tax evasion)
2005: Birkenfeld discovers internal CYA memo preparing to scapegoat front-line bankers
Cooperation cascade: 54,000 taxpayers come forward; $16B recovered
Why? Asymmetric exposure — the bank could blame “rogue bankers” while individuals bore all risk
The 2006 whistleblower law ($104M award) provided a credible outside option
Both collapsed the same way: the institution tried to shift blame downward, and an insider defected.
Target the mechanism, not just the jurisdiction
| Policy | Disrupts | Effect |
|---|---|---|
| Beneficial ownership registries | Intermediary opacity | Enablers become identifiable |
| Gatekeeper liability | Enabler supply | Fewer professionals willing to facilitate |
| CRS / AEOI | Cross-border trust chains | Restructuring, not repatriation |
| Whistleblower incentives | Asymmetric trust | Insiders defect when outside option > loyalty |
Birkenfeld’s $104M award triggered 54,000 voluntary disclosures and $16B in recoveries.
But: enforcement is regressive — wealthiest maintain redundant enabler networks (Johannesen et al. 2020)
Paper: “How Is Illegal Activity Organized?” (6,486 cases, 6 crime types)
Thank you
6,486 cases · 6 crime types · 173 countries
Odebrecht needed codenames and encrypted systems. UBS needed Swiss law and a 150-year brand. Same problem — opposite solutions.
Skatteforsk seminar · NMBU, Ås