Wednesday, July 31, 2024

China is slowly joining the economic war against Russia

I recently shared a chart on Twitter showing Chinese exports of ball bearings to Russia. Here it is:


Having accelerated after Putin's invasion of Ukraine to a run-rate of around US$5-7 million per month in 2023, Chinese ball bearing exports to Russia have been ratcheted down to the $2-3 million level in 2024, about where they stood prior to the invasion.

What's going on here? As Russia's closest ally, shouldn't China be sending Putin all the ball bearings he  wants? Russian tanks are being destroyed every day and ball bearings are a crucial component for building replacements.

Before answering this question, we need a bit of background.

We can think of the economic response to Russia's illegal invasion of Ukraine as progressing in two stages. The first stage of the economic war involved a coalition of liberal democracies (U.S., the EU, Canada, Japan, Switzerland, South Korea, Norway, the UK, and more) reducing their own economic linkages to Russia. Europe drastically scaled down its imports of Russian natural gas. Imports of Russian crude oil into Japan and Germany were slashed to bare bone levels. Western corporations like Coke and John Deere decamped. And the U.S. made an effort to cut down on exports of military goods and so-called dual-use items, which have both commercial and military applications. Ball bearings fall into this category, since they are useful not only for civilian vehicles but also artillery and tanks.

The second stage of the economic war has only recently ramped up, and involves the coalition exerting its influence on non-coalition countries like Turkey, United Arab Emirates, China and India in order to get them to cut down on their economic linkages with Russia.

A key component of this next stage are the U.S. secondary sanctions that were introduced in December 2023 by the U.S. Treasury's Office of Foreign Assets Control ("OFAC"). I've written about them here, here and here

In short, if OFAC catches a foreign bank in Shanghai, Delhi, or Dubai facilitating transactions involving Russia's military-industrial complex, including dual-use goods, then that bank risks being cut off from the U.S. banking system. Because the U.S. banking system is so vital, foreign banks prefer to cease all offending Russian trade. This effectively stops Turkish or Chinese ball bearing manufacturers (as well as any other businesses that deals in dual-use goods) from dealing with Russian buyers, since these manufacturers are reliant on their local banks for cross-border payments.

Along with OFAC's introduction of secondary sanctions, there has also been a big step-up in U.S. export controls, which are overseen by a different agency, the U.S. Department of Commerce's Bureau of Industry and Security ("BIS"). The BIS maintains a list of U.S.-produced dual-use items. American and foreign entities are required to get a license from the BIS before exporting, reexporting, or importing certain items on its list.

In March 2024, the BIS broadened the criteria that triggers a licensing requirement. The criteria now includes any involvement of entities listed under fourteen different OFAC sanctions programs, the majority of which are linked to Russia and Ukraine. So for example, if a Hong Kong-based wholesaler intends to re-export a BIS-listed item to a country like Armenia, or transfer that item within Hong Kong, and they fail to realize that the recipient is an actor on one of OFAC's Russia-related sanctions list, then that Hong Kong wholesaler has now violated U.S. export controls. To prevent violations, intermediaries like our Hong Kong wholesale must sharpen their screening requirements.

These new rules, which have been described as a BIS "force multiplier" of OFAC's sanctions program, are intended to assert influence over a broad cross-section of dealers that specialize in indirectly re-exporting goods to Russia. These indirect routes often proceed through a labyrinth of pit-stops in jurisdictions like UAE, Hong Kong, and Kyrgyzstan.

Back to ball bearings. How is the second stage of the economic war progressing? The chart at the top of the page suggests the new measures may be working. Recall too that in February I wrote a post tracking what seemed to be some initial anecdotal indications of success. In the rest of this article I want to use another four or five months of data to provide a more complete picture of how China's interactions with Russia have being affected.

China is crucial to Russia because it has a become a key source of goods destined for the battlefield. According to a report from the KSE Institute, some 44% all Russian parts destined for the Ukraine battlefield were linked to producers in coalition nations, primarily the U.S. These include parts that have been branded by American stalwarts like Intel and Analog Devices. Mainland Chinese producers accounted for 47% of battlefield goods (see chart below). However, progressing further down the value chain to country of dispatch, around 56% of all battlefield partsincluding the U.S.-produced onesget to Russia by way of China, and another 22% via Hong Kong, a special administrative region of China. Together, almost 80% of Russia's battlefield parts are dispatched from these two Chinese sources.

Source: KSE Institute

In other words, not only is China producing its own battlefield goods destined for Russia, but it is also responsible for the final re-routing to Russia of most U.S. produced battlefield goods, at least in the period starting in January 2023 and ending that October.

The items that make up the battlefield goods cited by the KSE Institute are derived from the coalition's Common High Priority List, which includes 50 dual-use items that Russia seeks to procure for its weapons programs, one of which is ball bearings. For the rest of this article I will focus my analysis on the four most important goods on the Common High Priority list: Tier 1 items. Tier 1 items consist of microelectronic circuits (processors, memories, amplifiers, and other circuits) that the BIS says play a "critical role" in the production of advanced Russian precision-guided weapons systems. Russia lacks the ability to produce these items and is reliant on a limited number of global manufacturers, according to the BIS, which only amplifies their importance to Russia.

The chart below shows Chinese exports of Tier 1 items to Russia as reported by China's customs authority. Prior to Russia's invasion of Ukraine, these exports typically came in at around $5 million per month. Post-invasion, they rose to a range of $10 million to $34 million per month, suggesting significant military diversion. 


With the arrival of secondary sanctions in December, monthly Tier 1 exports have fallen below the pre-invasion watermark of $5 million.

The above customs data does not include Hong Kong, which along with mainland China has become a major Chinese source of Tier 1 exports to Russia. To provide a more complete picture, the chart below adds Hong Kong customs data to the mainland customs data. Running between $25-$60 million during most of the war, Tier 1 exports to Russia from the Chinese mainland and Hong Kong have collapsed to sub-$15 million levels this summer, lower than at any point in 2021.


That's quite a big plunge, and certainly suggests that the coalition measures are working with respect to China. Skeptical readers may suggest that China has stopped exporting Tier 1 items directly to Russia only to re-route them via third party nations. According to this theory, the $40-$50 million decline in monthly Chinese exports is being made up by a $40-50 million rise in Chinese exports to, say, Kazakhstan, which eventually make their way to Russia.

Below, I've plotted all Tier 1 exports from the Chinese mainland and Hong Kong to a group of Russian neighbours that includes Armenia, Azerbaijan, Belarus, Georgia, Kazakhstan, Kyrgyzstan, and Uzbekistan.


China's Tier 1 exports to Russia's neighbours rose after the invasion, suggesting significant diversion of exports to Russia, and in March 2024 hit $7 million, their second-highest level over the entire 2021-2024 period. However, over the last three months Tier 1 exports to Russia's neighbours have plunged below even pre-invasion levels.

So no, the theory that third-parties have replaced direct China-Russia trade is not borne out in  the data.

In sum, a variety of U.S. economic tools including secondary sanctions, bolstered export controls, and other types of moral suasion seem to be prying China out of the arms of Russia and into the coalition's effort to economically strangle the Russian war machine.

But there's more to be done. China's exports of high priority goods like circuits and ball bearings have fallen in 2024, but they haven't yet hit zero. That will require more pressure on the Chinese government as well as enforcement against Chinese and Hong Kong companies that violate sanctions and/or exchange controls, as well as against intermediaries in third-party nations like Kazakhstan. To further tighten the screws, the coalition will need to constantly broaden the range of economic activity between China and Russia that it deems off-limits. For now, the coalition says that it is perfectly fine for Chinese companies to export cars and vacuum cleaners to Russia, but there may be a time at which that permissiveness will have to change.

In fact, one of the coalition's biggest escalations in the sanctions war occurred in June, with the U.S. secondary sanctions program being extended to include Russian banks. (I wrote about this here.) In effect, Russian financial institutions are now off-limits for Chinese banks (and banks elsewhere, too), unless these Chinese banks want to lose their access to the U.S. banking system. This blacklisting of Russian banks will make it very difficult for Chinese exporters to continue doing business with their now-unbanked Russian counterparts, further eating into the trade relationship between the two nations.

The trade data in the above charts does not yet include the effects of the extension of sanctions to Russia's banks, but I suspect the effects will be significant.

Welcome to the economic war against Russia, China. We hope you continue to do your part. 

Thursday, July 25, 2024

Bitcoin as a tool of U.S. economic statecraft

Riot Platform's Rockdale, Texas facility, North America’s largest Bitcoin mining farm by developed capacity [source]

Can a network that has been marketed as being resistant to government power be harnessed by the U.S. administrative state in order to attain its foreign policy goals?

Sam Lyman, an executive at Riot Platforms, a bitcoin miner, opens the door to the topic by suggesting that bitcoin can become a tool of U.S. economic statecraft, and the way to do so is by having the U.S. government buy a strategic reserve of the stuff.

I agree that bitcoin can be used as a tool of U.S. economic statecraft, but disagree on how. There's absolutely no need for the U.S. government to buy any bitcoin in order to lever the Bitcoin network for foreign policy purposes. Buying bitcoins would only waste scarce resources, driving up the price to the benefit a select few speculators. No, the U.S. already has the means to lever the bitcoin network, and that's by leaning on the U.S. private sector's dominance of bitcoin mining, of which Lyman's own Riot Platforms is a big player (see photo at top).

The U.S. controls 38% of all bitcoin mining capacity, a big share of that being in Texas. Mining is a word people use in place of "maintaining the network." When a bitcoin transaction is made, miners are the folks who verify and process it, a number of miners often banding together to form pools for that purpose. Without miners, the bitcoin network ceases to function. 

How to lever the Texas bitcoin mining nexus for the purposes of statecraft? In short, the mining nexus must be brought on par with its bigger cousin, the New York banking nexus, which the U.S. government already harnesses to further its foreign policy goals.

Any American banker that deals with a foreign individual or entity that has been designated, or sanctioned, by the U.S. government risks a penalty, either monetary or jail time. Sanctioned individuals are generally folks living overseas who are deemed to be in conflict with the U.S. foreign policy interests. And so U.S. banks, the largest nexus of which is based in New York, try to avoid punishment by cutting sanctioned names off from their banking platforms, thereby exporting American foreign policy to the rest of the world.

By requiring Texas's bitcoin miners (or the pools of which they are members) to abide by the same standard as banks, don't deal with bitcoin users who are deemed detrimental to U.S. foreign policy goals or you will be punished, the Bitcoin network would likewise become a platform for extending American foreign policy goals to the rest of the world. This would oblige Texas miners to comb over sanctions list and offboard blacklisted individuals, just like bankers currently do. With 38% of the world's mining capability in Texas and a few other states, that's a sizable amount of U.S. influence.

But that's only the beginning. There are ways to further upgrade bitcoin's capability as a tool of sanctions-based statecraft. When the U.S. sanctions program was still in its infancy, the punishment for breaking U.S. sanctions was generally limited to Americans individuals and entities. Over the last decade or two the U.S. has been extending punishment extraterritorially to foreigners, by arguing that when a foreigner "causes" an unsuspecting U.S. entity to process sanctioned transactions, then the foreigner is themself criminally liable under U.S. law for sanctions evasion.

An example may help. A decade ago a large Turkish bank called Halkbank processed transactions for sanctioned Iranians. Nothing illegal about that. A Turkish bank isn't under U.S. jurisdiction, and thus it can deal with any customer the Turkish government allows it to, even one that has been blacklisted by the U.S. What got Halkbank in trouble with the Department of Justice is that the transactions it processed passed through, or transited, the bank's correspondent accounts in New York. The fact that it had "caused" its New York banker to provide financial services to sanctioned Iranians (see the language below) was enough for Halkbank to be criminally indicted in New York for sanctions evasion.


The crime of causing others to violate sanctions [source]


The same framework could be extended to Texas bitcoin miners.

For instance, if a Turkish crypto exchange were to send some bitcoins to a sanctioned Russian, and this transfer was processed by a Texas mining farm or pool, say Riot Platform's Rockdale facility, that would now give the U.S. government the hook it needs to charge the Turkish exchange with sanctions violation. By "causing" Riot to process a prohibited transaction, the Turkish exchange is itself criminally liable under U.S. law. To avoid that possibility, the Turkish exchange may choose to proactively adopt the U.S. government's sanctions list, thus acting as a vessel for conveying U.S. policy on Turkish soil.

The threat of punishing foreign actors for "causing" U.S. entities (whether those be miners or bankers) to process sanctioned transactions acts as a force-multiplier of U.S. foreign policy goals. Not only do U.S. financial institutions export policy, as was traditionally the case, but now foreign institutions are nudged into importing it, too.

To sum up, if folks like Lyman were genuinely serious about harnessing bitcoin as a tool of U.S. foreign policy, they'd be calling for the U.S. government to apply to miners the same sanctions standards that currently apply to regular financial entities like banks. That they aren't calling for this, and instead want the U.S. government to buy bitcoin, suggests they are motivated by a higher price for bitcoin and their own corporate profits, not actual statecraft. 

Thursday, July 11, 2024

Your finances are being snooped on. Here's how


We all have a pretty good idea that our finances are being snooped on, but most of us aren't quite able to articulate how. We know that we're being snooped on by two groups, corporations and the government. This post will focus on how the government surveils our transactions, because democratic governments generally (but certainly not always!) tell us ahead of time what information they will gather, and how the data will be used.

Governments snoop on law abiding citizens' financial data for good reasons  they are trying to trace the money in order to catch bad guys. The government has been given the power to collect this information without having to ask a judge for approval, say by requesting a search warrant. 

I think there is a degree of acceptance among citizens that some amount of warrantless financial snooping is okay, because it reduces crime. But as the intensity of surveillance increases it eventually reaches creepy territory, at which point most of us would prefer the brakes be applied.

Where is this line? I'm a committed comparativist. To get a good sense of how one is snooped on, and whether it has passed over the line to being creepy, one needs a reference point. So in this blog post, I'll compare how two groups of citizens  Americans and Canadians are being surveiled by their respective governments, so that both groups can better understand, by reference to each other, where they stand.

The first section focuses on the inflows of personal financial data from citizens to the government. The second section will focus on the outflows of data from the government to law enforcement.

***How citizens' personal financial data flows into the government***

Both the U.S and Canadian governments collect large amounts of financial data about their citizens. They do so by requiring banks and other financial institutions to record information about their customers and submit reports to the government about their customers' transactions when certain triggers have been met.

First, let's touch on the total amount of data being hoovered up. On this count, Canada far exceeds the U.S. In the 2022-23 reporting period, Canadian financial institutions submitted a total of 36 million reports to the government containing information about Canadians' financial transactions. That's almost one report per Canadian every year. 

Meanwhile, U.S. institutions sent 27.5 million reports to their government about Americans' financial dealings in 2023, a rate of around 0.1 report for every American, which is ten-times less intensive than in Canada. So based purely on the quantity of data collected, Canada seems to be closer to the "it's getting uncomfortable" level than the U.S. (See table below).

What accounts for this big difference in reporting intensity? In short, it's due entirely to cross-border wire transfers. In Canada, every electronic fund transfer leaving or arriving in Canada must be reported by banks to the government if it sums up to $10,000 or more. So if you've sent an $11,500 wire transfer from your Bank of Montreal account to your son or daughter who lives in London or Paris, congratulations, your name is in a Canadian government database. Or if you run a business and have received a $15,000 digital payment from a U.S. company for services rendered, your corporate data is sitting somewhere in an Ottawa government server.

If you're an American making a foreign wire transfer, your information will not get sent to a government database. The U.S. authorities do not require financial institutions to submit personal information on digital cross-border flows. (Mind you, they have been trying for some time to get the ability to collect this data.)

In the 2022-23 financial year, 27 million of these cross-border wire reports were submitted by Canadian banks, accounting for the lion's share of all 36 million reports submitted to the Canadian government that year.

Apart from cross-border transaction reporting, the nature of Canadian and U.S. eavesdropping is broadly similar.

Let's start with cash transaction reports, or CTRs. When a Canadian goes to their bank and deposits $10,000 or more in cash, the bank will generate a report that it sends to the Canadian government. U.S. banks report deposits and withdrawals of $10,000 in cash to the US government.

So if you're selling a used car and the buyer pays you $12,000 in banknotes, and you deposit that to your bank account, you're now in a government database, whether that be in Canada or the U.S.

Canadian banks generated 8 million CTRs in 2022-23 whereas U.S. banks generated 20.8 million in 2023. Pound for pound, Canadian banks submit more cash transaction reports to their government than U.S. banks, around 0.21 per Canadian compared to 0.06 per American. I'm not sure why. The threshold for reporting a cash transaction in Canada is lower in the U.S. (CAD$10,000 is worth around US$7,300) which may explain some of the difference? Dunno.

With CTRs and cross-border wire transfers, the invasiveness is kept relatively low thanks to the objective criteria that triggers a filing. Exceed the $10,000 threshold and at least you know ahead of time that your information is going to be recorded. A law-abiding citizen who is uncomfortable having their finances being collected by the government can choose to avoid sending cross-border payments or dealing in large amounts of cash. But this objectivity doesn't exist with the next type of report: those related to suspicious activities. 

On both sides of the border, financial institutions must submit reports about transactions deemed suspicious to their respective governments. If you've made a transaction that a bank deems to be suspicious, you'll never know that you've landed in a government database. That's because banks are prohibited from notifying their customers that their activity has been snitched on.  

The determination of what qualifies as suspicious involves a fair amount of subjectivity. Canada requires that financial institutions have a reasonable grounds to suspect that a transactions is linked to terrorism or money laundering before reporting it. That means that mere hunch won't cut it  a Canadian banker must be able to articulate a clear reason for suspicion. Mind you, there's no penalty for banks that fail to attach a specific reason to a report, so the reasonable grounds to suspect standard is often ignored. 

We know that many of these hunch-based reports end up in the government's database. Over the years the Office of the Privacy Commissioner of Canada has collected a list of reports that failed to reach the reasonable grounds to suspect standard, including one case in which some individuals were suspected simply because they had Middle Eastern passports:

From the Office of the Privacy Commissioner's 2017 audit of FINTRAC [source]

My reading of the U.S. requirements for reporting a suspicious transaction suggest a looser standard than in Canada. While U.S. bankers are encouraged to provide a specific red flag in their CTRs, the implementing regulations say they can still file a report if they merely "suspect" a transaction to be associated with money laundering or terrorism, which is a lower standard then the requirement to have a "reason to suspect."

In Canada, there is no size threshold for suspicious activity reporting: even a $50 payment can be reported by a bank. By contrast, the U.S. has set a $5,000 threshold before a suspicious action report must be filed. (When suspicious activity reports were first introduced to the U.S. in 1994, the government floated the idea of not including a threshold at all, as Canada would later do in 2001, but retreated because this would impose a "burden of reporting.")

This difference in thresholds suggests Canada should have a much higher intensity of suspicious transaction reporting than the U.S. Not so. Canadian banks generated 560,858 suspicious transaction reports in 2022-23, around 1.4 reports for every 100 Canadians. Compare this to the 4.6 million reports filed by U.S. banks in 2023, which also comes out to 1.4 reports per 100 Americans. So even though bankers in the U.S. are required to ignore small suspicious transactions below $5,000, they more than make up for it by reporting a larger proportion of transactions than Canadian bankers do. I can only guess why, but this may be due to the looser standard for suspicion, discussed above.

There are several other types of transactions that must be reported to the government, including large virtual currency reports in Canada and foreign bank and financial accounts reports (FBAR) in the U.S., but the volume of this sort of reporting isn't as significant as the other types already discussed, so I won't touch on them.

So to briefly sum up, pound for pound a Canadian is more likely to appear in their government's financial database than an American is. This is because Canadian financial institutions collect personal information linked to cross-border wire transfers the U.S. doesn't. The most privacy-invasive reports are suspicious ones. Compared to Canadian banks, U.S. banks are more trigger-happy when it comes to deeming a given transaction as suspicious, but the US$5,000 floor on reporting suspicious transactions somewhat mitigates this eagerness. 

Having dealt with what sorts of data flow in to the government, let's talk about what happens next with the data.    

***How personal financial data flows from the government to law enforcement***

The personal financial data accumulated by the two governments are managed by each nation's respective financial intelligent unit, or FIU. In Canada, this institution is known as the Financial Transactions and Reports Analysis Centre of Canada, or FINTRAC. In the U.S., the body that collects personal financial data is known as the Financial Crime Enforcement Network, or FinCEN.

It's here with the management of harvested financial data that the policies of the two countries really start to diverge.

To begin with, let's start with the length of time that data can be kept. In the U.S., FinCEN holds data indefinitely, so its database is forever growing. Canada allows FINTRAC to keep data for at least ten years and up to fifteen years, but after that FINTRAC must destroy any identifying information if it was not disclosed to law enforcement. Since most of FINTRAC's data is not disclosed, that means large amounts of data fall out of FINTRAC's database every year, and thus the amount of personal information collected grows at a slower rate than FinCEN's data hoard.

The differences between the two countries grows even wider when it comes to the question of who has access to citizens' financial data. In brief, U.S. law enforcement is granted broad access to the raw data whereas Canadian law enforcement's ability to see the data is strictly limited.

472 different U.S. law enforcement agencies at the Federal, state, and local levels have the ability to directly query FinCEN's database of CTRs, suspicious activity reports, and more. This amounts to around 14,000 law enforcement officers who can search through the personal financial data of American citizens. In 2023, these 14,000 users conducted 2.3 million searches using FinCEN's query tool.

FinCEN's data can also be downloaded in bulk form to the in-house servers of eleven different federal agencies, including the FBI, ICE, and the IRS. Bulk access (also known as Agency Integrated Access) means that the FBI, ICE, IRS, and eight other agencies don't need to use FinCEN's query tool. This bulk data can be access by another 35,000 agents. Alas, FinCEN doesn't track how many in-house searches were conducted by these agents in 2023, but I'd guess it's in the tens if not hundreds of millions.

By contrast, Canadian law enforcement agencies do not get direct access to FINTRAC's financial data trove. Instead, FINTRAC employs an internal force of a few hundred data analysts to parse the database for clues that suggest participation in money laundering or terrorist financing. Only when FINTRAC employees have attained a reasonable grounds to suspect that a pattern of transactions has crossed the line can they pass a report on to a Canadian law enforcement body, such as the RCMP or municipal police. This report is known as a financial intelligence disclosure and includes information like the name of the transactor, their address, telephone number, criminal record, and more.

FINTRAC submitted 2,085 of these disclosures to law enforcement in 2022-2023.

So to step back for a moment, tens of thousands of U.S. law enforcement officials conduct tens of millions of searches through Americans' personal financial data to get leads. In Canada, this same database can only be accessed a small number of FinCEN FINTRAC analysts, who selectively push a few thousand reports out to Canadian law enforcement each year. 

That's quite the contrast. Put differently, unlike their U.S. equivalents the RCMP, Sûreté du Québec, Ontario Police Police, and other policy agencies do not have the power to pull personal financial data willy-nilly from the government's database. This means far fewer eyeballs on Canadian financial records. As far as protecting the financial privacy of citizens, the Canadian access model does a better job. The U.S. access model is friendlier to law enforcement and stopping crime.

A disadvantage (or advantage, depending on your tolerance for being watched) of the American system is it allows the 11 agencies with bulk access to create "data cocktails"  personal financial data downloaded from FinCEN spiked with their own data sources  in order to better investigate suspects. For instance, according to a 2009 report from the Government Accountability Office, the FBI incorporates bulk FinCEN suspicious activity reports into its Investigative Data Warehouse along with 50 other data sets from different sources. The IRS's Reveal System, portrayed below, ingests FinCEN reports along with tax data to conduct more complex investigations.

The IRS's Reveal System, which ingests FinCEN CTRs along with other non-FinCEN data [source]

I don't know if the FBI and IRS data cocktails still exist, and in what form, but they certainly give a flavor of what sorts of broad access law enforcement can get to personal financial records in the U.S.

By contrast, Canadian law doesn't allow for U.S.-style data cocktails. An agency like the RCMP can't mix FINTRAC's store of personal financial data with their own bespoke data sources because the RCMP is prohibited from pulling raw CTRs, cross-border wire transfer reports, and suspicious transaction reports out of FINTRAC. Only FINTRAC gets to determine what information gets pushed out to the RCMP.

This firewall isn't accidental. As Horst Intscher, a former director of FINTRAC explains, a degree of privacy protection was purposefully built into FINTRAC's original design: "Because of the very broad range of information that the [Proceeds of Crime (Money Laundering) and Terrorist Financing Act] makes it possible for us to receive from reporting entities, it was determined at the original passage of the legislation that protections had to be built, so it would not be construed that there was a flow-through of massive amounts of personal information directed to law enforcement agencies."

In other words, FINTRAC was designed to prevent the likes of the RCMP from creating an FBI-style Investigative Data Warehouse. 

However, the wall imposed between Canadian law enforcement and FINTRAC does have a degree of porosity, enough to provide law enforcement with an indirect way for pulling data out of FINTRAC. If the RCMP is investigating a suspected money launderer, it can submit information about the suspect to FINTRAC in the form of a voluntary information record. For example, it might say that "Joe Blow and his sister-in-law Martha are the subjects of an investigation for drug trafficking and money laundering, and we just thought you should know that." This new data becomes part of FINTRAC's database, against which FINTRAC's agents will check all other data. If the agents spot a match, and it meets the bar for a "reasonable grounds for suspicion", then they must send the RCMP a disclosure containing the relevant personal financial information.  

In 2022-23 FINTRAC received 2,550 voluntary information records from Canada’s law enforcement and national security agencies (including from members of the public), a large number of these eventually boomeranging back to law enforcement in the form of a disclosure. How many? The head of FINTRAC once claimed that "65% to 70%" of FINTRAC's ultimate disclosures to law enforcement are triggered by voluntary information submitted by law enforcement, which hints at how porous the wall is.

----

That sums up my comparison of the inflows and outflows of personal financial data to the U.S. and Canadian governments. This is just a cursory analysis. There are all sorts of other vectors across which to compare the scope of the two nations' data collection efforts that I haven't explored. I've focused on the factors that I think are the most important.

Readers from other countries may be curious to find out about their own FIUs to determine where they stand relative to Canada and the U.S. If so, leave your findings in the comments. My Australian readers, for instance, may be interested to note that their government collects far more private information than the U.S. and Canada combined. AUSTRAC, the Australian FIU, collected 192 million transaction reports in 2023, an astonishing 7 reports per Australian!  This is because AUSTRAC receives information on all cross-border wires, with no lower threshold.

At the outset of this article I suggested that many of us would tolerate some loss of privacy in order to make it easier for the police to catch criminals. A few of us will accept a large loss. Others will not tolerate even the smallest infringement on privacy. An individual's line in the sand is very much a personal matter. I'm going to leave it to the reader to decide which country (if either) approaches the right balance. Is Canada too lax relative to the U.S.? Does the firewall we've erected between the cops and the trove of financial information give criminals free rein? Or does the U.S. not sufficiently respect privacy? Should the FBI and its sister agencies lose some of their unfettered access to Americans' personal financial data?

Monday, June 17, 2024

The intensifying effort to isolate Russia's banks


Last week the U.S. government expanded the coverage of its Russian secondary sanctions program to encompass most of Russia's banks. It's a very big step, one that has been long-awaited by sanctions watchers, and will likely have significant repercussions for Russia and its trading partners. Here's a quick explainer.

Stepping back, we can think about the U.S.'s sanctions war on the Putin regime as an effort proceeding in two acts. The first involved a "casual" round of primary sanctions beginning as far back as 2014 when the Russians invaded Crimean. Then the heavy round began in December 2023, almost nine years later, with the arrival of secondary sanctions.

Pound for pound, U.S. secondary sanctions are far more impactful than primary sanctions. Primary sanctions cut off American entities from dealing with designated Russian targets but allow non-American actors to step into the breach and take their place. This merely shifts or displaces trade routes, creating a nuisance rather than reducing trade outright.

Secondary sanctions like those introduced last December aim to curb this displacement effect by extending prohibitions on dealing with Russia to non-U.S. actors, in particular foreign banks. The gist of secondary sanctions is: "If we can't deal with them, then neither can you!"

Why do non-American actors in third-party nations like China and Turkey bother complying with U.S. secondary sanctions on Russia? The U.S. wields an incredible amount of influence by threatening to cut third-parties off from the U.S. economy should their ties to Russia be maintained. The importance of accessing the U.S., in particular its financial system, far outweighs lost Russian business, prompting quick compliance.

So what exactly happened last week? Let's first re-explore what occurred in December 2023.

If you recall from my previous article, the December secondary sanctions targeted foreign banks. Their aim was to prevent bankers in places like India, Turkey, China and everywhere else from interacting with Russia, but only with respect to a narrow range of transaction types  those linked to the Russia's military-industrial complex.

More specifically, a Chinese or Turkish bank could continue to deal with Russian customers as long as the transaction in question involved goods like cars or dishwashers. The novelty is that they were now prohibited from conducting any transactions with Russia that involved weapons, military equipment, and dual-use goods, on pain of losing access to the crucial U.S. financial system.

In addition to a flat-out prohibition on military-industrial goods, the U.S. Treasury also compiled a blacklist of around 1,200 or so Russian individuals and entities that support Russia's military-industrial complex by working in allied sectors such technology, construction, aerospace or the manufacturing sectors. The December order stipulated that if caught dealing with any of these 1,200 or so names, a foreign bank could be cut off from the U.S. banking system. Russian individuals and businesses who were not on said military-industrial complex list, however, could still be served by foreign banks, even if they had been otherwise sanctioned. (Remember, primary sanctions only apply to U.S. actors.)

As I wrote back in February, anecdotal data from the first two months of secondary sanctions suggest that they are having an effect. Below I've updated the chart from an earlier tweet showing Turkish exports to Russia, which continues to trend downwards (note the 12-month moving average.)


In a recent article, The Bell assessed customs statistics and found that since the start of 2024, imports from some countries are down a third in some countries compared to 2023, notably Turkey (-33.8%) and Kazakhstan (-24.5%).

Source: The Bell


Which finally gets us to last week's announcement.

The scope of the secondary sanctions has been dramatically widened by adding around 3,000 or so additional names to the original 1,200 or so individuals and entities involved in Russia's military-industrial complex, for a total list that is now 4,500 long, according to FT. The reasoning for this extension is that now that Russian is a war economy, pretty much everyone is contributing to the war effort. 

The most important of the additions to the list are Russia's banks. The Treasury's press release drove home this point by specifically drawing attention to the branches of Russian bank in New Delhi, Beijing and Shanghai that are now are off limits.

Going forward, any bank in China or India that interacts with a Russian bank, say Sberbank, now risks losing its crucial connection to the U.S. This is huge! The majority of global trade is conducted by banks in one country interacting with banks in another on behalf of their respective customers. If Russian banks are cut off from this global network, that's tantamount to severing the entire Russian economy from the international economy. With their bankers now isolated, Russian firms won't be able to buy or sell stuff overseas, nor repatriate funds to pay their local employees.

I'm still trying to get my mind around the enormity of this. Russia has become the top destination for Chinese auto exports, for instance, and those purchases require getting a Russian bank and a Chinese bank to interact with each other. How on earth will Russia import Chinese cars without the intermediation of Russian banks? Or appliances, or smartphones?

There are two significant exemptions to the secondary sanctions coverage: agricultural products and  crude oil. What this means is that while a bank in India can no longer deal with a Russian bank like Sberbank, that prohibition ends if they want to conduct transactions with Sberbank that involve grain or oil. Since Russia's economy is so reliant on its oil exports, this exemption is a gaping hole in the sanctions wall that Ukraine's allies are trying to build.

How will Russia and its trading partners react?

A few sacrificial banks

To keep trade flowing between Russia and trading partners like China, it may be necessary for China to serve up a sacrificial bank or two to the U.S. sanctions regime. Who to sacrifice? A small bank with little to no U.S. business is a prime candidate. Such a bank may be able to afford being cut-off from the U.S. financial system in order to ensure that its mostly Russian-linked clientele can keep making bank-to-bank payments.

An example of a willing-to-be-sanctioned financial institution is the Bank of Kunlun, a small Chinese bank which continued to facilitate Iranian transactions even after secondary sanctions were levied on Iran in late 2011. The U.S. government reacted the following year as it had threatened that it would: it cut the Bank of Kunlun off from the U.S. financial system, a state of affairs that continues to this day. Kunlun remains the only bank in the world on the U.S.'s CAPTA (Correspondent Account or Payable-Through Account) list; a register of financial institutions which cannot get a U.S. bank connection.

An appearance on the CAPTA list hasn't stopped the Bank of Kunlun from doing business, however. According to the Atlantic Council, Kunlun has become one of the main connection for so-called Chinese "teapots" small independent refineries  to buy oil from Iran. Apparently, one of its flagship products is "Yi Lu Tong," which means "Iran Connect." Of course, the Bank of Kunlun can't do a shred of U.S. business, which severely limits its clientele.

In any case, the Bank of Kunlun, or something like it, could end up being the linchpin of Russian sanctions avoidance.

AML-dodging stablecoins

Another alternative option for Russian trade will be to turn to U.S. dollar stablecoins like USDC and Tether. Stablecoins are blockchain-based payments platforms that offer balances pegged to national currencies, usually the U.S. dollar. Unlike banks, which do due diligence on their customers, stablecoin issuers will allow anyone to use their platforms, no questions asked. This feature offers Russian firms a reliable non-bank payments option for settling purchases of Chinese or Turkish products.

Stablecoins are not a new route for Russians keen to evade the long-arm of U.S. sanctions. I wrote last year about how intermediaries linked to a sanctioned Russian oligarch purchased oil from Venezuela's sanctioned state-owned oil company using Tether stablecoins, or USDT. "No worries, no stress," says the Russian to his Venezuelan contact. "USDT works quick like SMS."

"...quick like SMS" [link]

More recently, a Russian sanctions evader describes how he uses Tether to "break up the connection" between buyers like Kalashnikov and sellers in Hong Kong, making it harder for US authorities to trace the transactions. "USDT is a key step in the chain." 

Turning to the U.S., what might its next steps be in the sanctions war?

Extend the secondary sanctions to oil

Sanctions are a cat and mouse game. As Russia inevitably finds ways to adapt to last week's actions, the U.S. will have to find alternatives to keep up the pressure on the Putin regime. A prime candidate for the next ratcheting up of secondary sanctions will be to extend their reach to Russia's oil industry.

The U.S., EU, and other coalition countries are currently trying to cap Russian oil prices at $60 in order to reduce Russia's revenue base, with mixed success. One option would be bring the rest of the world into the price cap effort in order to make it more effective. A simple upgrade to the secondary sanctions regime would allow for this. Foreign banks would still be able to conduct transactions with Russian banks that involve oil, but only if these banks have verified that those purchases have been made at a price of $60 or lower. Any international bank caught breaking the price cap would risk losing its financial connection to the U.S.

Locked up in escrow

Another way to tighten the noose on Russia would be to modify the secondary sanctions program to impede the ability of Russian oil exporters to repatriate or easily utilize the funds they receive for oil sold abroad. 

How would this work? As before, foreign banks in, say, India would still be allowed to conduct oil transactions with Russian banks at prices not exceeding $60, subject to a new sanctions feature stipulating that all oil proceeds must be confined to escrow accounts in the buying nation, in this case India. If Putin does wish to use the funds in Indian escrow accounts to make purchases, they can only be used to buy Indian products. If an Indian bank fails to keep oil proceeds "locked up" in India, and lets them escape by wiring them back to Russia or a third party like Dubai, then it could face the threat of losing its U.S. banking access.

If implemented, this locking restriction would dramatically reduce Putin's ability to repurpose oil revenues. Stuck in foreign banks with only a limited menu of local goods to buy (and likely earning sub-market interest rates), Russian resources would languish, illiquid and uncompensated.

This sort of restriction isn't a new idea. It was successfully tried out on Iran beginning in 2013 in the form of the notorious Section 504 of the Iran Threat Reduction and Syria Human Rights Act (TRA), once described as a bit of sanctions warfare that was "so well constructed and creative that in some respects it can be considered… beautiful." I wrote about it eleven years ago. It's time to dust it off.

Monday, June 10, 2024

"I didn't launder the cash, your honor. The robot did."

Crypto enthusiasts protest the trial of Alexey Pertsev

As the multiple Tornado Cash legal cases wend their way through courts in the Netherlands and the U.S., we continue to learn how society's money laundering laws will be applied to some of the more unique financial entities being created on the new technological medium of blockchains.

Last month Alexey Pertsev, a co-creator and co-administrator of privacy platform Tornado Cash, was found guilty of money laundering by a Dutch court. (The full decision translated into English is here). Meanwhile, Roman Storm and Roman Semenov, Pertsev's colleagues, are under indictment in the U.S. for engaging in money laundering, among other charges. Separately, Tornado Cash continues to be sanctioned by the U.S. Treasury.

In general, I think a guilty verdict is the right decision. It would have been dangerous to find Pertsev innocent, since to do so would have given all sorts of hardened money launderers  the mob, drug lords, and terrorist networks  the perfect techno-legal loophole for avoiding future money laundering charge. Shifts in the underlying technology used for disguising dirty money should not be enough to turn a crime into a non-crime.

Before I get into my reasoning, here's some context for people who are new to the issue of Tornado Cash.

Tornado Cash was introduced by Pertsev, Storm, and Semenov in 2019 as a means for crypto users to enjoy privacy, but it wasn't long before thieves and hackers began to regularly deposit large amounts of stolen crypto into the utility to be obfuscated. This was plain as day to anyone who was watching. Blockchains are radically transparent (that's why privacy tools like Tornado are needed) which meant that everyone could watch in real-time as criminal trails converged on Tornado Cash. 

Court cases in both the U.S. and the Netherlands reveal that Pertsev and his colleagues were well-aware that illicit activity passing through Tornado, yet they continued to work on the utility anyways. This is important because possessing a "knowing" state-of-mind is a key ingredient to being found guilty of money laundering. If he had had no idea that the money being disguised was dirty, Pertsev could not have been charged in the first place.

Criminals were not the only users of Tornado. Licit actors who wanted privacy also deposited funds into the entity, including Ethereum co-creator Vitalik Buterin. But the presence of good transactions amongst the bad ones doesn't dilute the seriousness of the alleged crime. All it takes to trigger a money laundering charge is a few dirty transactions. "C'mon! 82% of the money was licit!" is no alibi.

Tornado Cash is by no means the crypto economy's first privacy platform. The original generation of privacy tools, so called "mixers" or "tumblers," began to emerge in the early 2010s with the likes of ChipMixer, Helix, Bitcoin Fog, Sinbad, and Blender. Anyone who required anonymity could send their bitcoins to the platform owner, who would proceed to commingle, or "mix," all incoming bitcoins in a single address under their control, thus rendering them untraceable. After some time had passed, the platform owner manually re-sent the now obfuscated bitcoins to their original sender, less a fee.

Like Tornado Cash, the first generation of privacy utilities was used by both criminals and regular folks seeking privacy. None of these original mixers have had happy endings. The owners of Bitcoin Fog and Helix, Roman Sterlingov and Larry Harmon, were both found guilty of money laundering and are currently serving jail sentences. Minh Nguyen, the administrator of ChipMixer, has been indicted for money laundering and is on the FBI's most wanted cyber list. Blender and Sinbad have both been sanctioned by the U.S. government.

Source

By any legal standard, these bad endings were well-deserved. They may have been technological novelties, but ChipMixer, Helix, Bitcoin Fog, Sinbad, and Blender were very much text-book examples of money laundering. The owners of these entities knew that some of the transactions they were participating in involved proceeds derived from criminal sources, yet despite this knowledge they proceeded to disguise them anyways. The only thing new about Helix and the other first generation mixers was the medium they were disguising  bitcoin instead of cash or deposits.

And so professional mixers like Harmon and Nguyen join a long line of traditional money launderers  dirty bankers, drug cash couriers, crooked remittance shop owners, and hawala operators. The law shouldn't be fooled by technological novelty, and in the case of the first generation of mixers, it wasn't.

That these were textbook cases of money laundering isn't disputed by the crypto community. Crypto advocates are a vocal bunch, and while they have loudly voiced their complaints about the legal action taken against Tornado Cash, they have for the most part quietly accepted the punishments meted out to the first generation privacy platforms. A legal fundraiser to support the Tornado Cash accused, for instance, has raised hundreds of thousands of dollars; there have been no equivalent efforts to raise a legal defence for Harmon, Sterlingov, or Nguyen. Crypto lobbyists have gone to war for Tornado Cash by launching court appeals and filing amicus briefs in its support. But when it comes to defending the Bitcoin Fog or Helix operators, or challenging the government's sanctioning of Sinbad and Blender  crickets.

The Tornado Cash legal cases have been more controversial than those of the first generation mixers thanks to a technical innovation in Tornado's construction. Most of us would consider this to be a relatively obscure change, but crypto enthusiasts see it as a defining one.

Harmon and his counterparts controlled their platforms outright, taking possession of the dirty crypto before manually sending it back to criminals in disguised form. Not so Tornado Cash. When it was built, a layer of automation was inserted between Tornado Cash's users and Pertsev and his colleagues.

Instead of sending their crypto to wallets controlled by the trio, as users did with Helix, crypto was now deposited by users into a set of automated pools. These pools were not managed on an ongoing basis by Pertsev and his colleagues. Rather, they were built using fully automated code on the Ethereum blockchain. Originally co-created by Pertsev in 2019, this code was frozen in time by the designers in early 2020, at which point it could no longer be upgraded or changed by anyone, even Pertsev. To this day the pools continue to operate, even though the Tornado Cash creators are either jailed or under indictment.
 
Other parts of the Tornado Cash platform are not so set-in-stone and remained under the control of Pertsev and his colleagues throughout. This includes the main website by which users accessed the automated pools, which was regularly upgraded over time, as well as the relayer service. (A relayer is a way to guarantee the privacy of Tornado Cash users). Pertsev and his colleagues profited from their ongoing control over the website and relayers.

The lawyers for Pertsev, Storm, and Semenov have argued that this layer of automated code exonerates the trio of money laundering. After all, if they no longer control what the utility is doing, then how can they be said to be operating a money laundering enterprise? The lawyers also argue that as writers of code, Pertsev, Storm, and Semenov are protected by speech laws, much like an author who has written a book. It is the code-is-speech claim that has particularity riled up the crypto community.

I don't like the idea of someone being sent to jail, but I think it's a good thing that the Dutch court chose not to accept these arguments.

Using go-betweens is a time-tested criminal strategy for distancing oneself from the crime. In more conventional money laundering operations, this strategy might involve separating the leader of a cash laundering operation from the actual dirty cash with a layer of underlings. In the age of crypto, no need to use living human underlings; just insert a buffer of unliving code.  

But the law shouldn't be fooled by artificial distances between a launderer and dirty money, whether those intervening layers be living people or code.

Allowing a buffer of automated code to absolve folks like Pertsev of money laundering would make it much easier to be a professional money launderer. Bad actors like Harmon and Sterlingov who have already been deemed by the courts to be criminals would suddenly have the perfect techno-legal loophole at their disposal if they decide to reengage in crypto laundering once their jail terms are up. Instead of manually running their operations as before, Harmon an Sterlingov could insert a mute layer of automated code between them and their illicit clients, their criminal mixing no longer being a crime.

But this would be an absurd state of affairs. A simple technological change to the way a criminal mixer administers their back office shouldn't convert them into a non-criminal.

The danger of the "it was the code that did it" defence extends beyond the crypto economy. In the much-larger traditional economy, laundering physical cash is a relatively common criminal profession. Take the fictional example of Marty Byrde, the star of Ozark. If the Tornado Cash defence were to be accepted in a court of law, then Byrde need only program a set of self-operating cash-handling robots to do most of his tasks for him, and he can get away scot-free. "I don't exercise any control over the packages of cash, your honor. The robots did!"

Or take the example of drug cash couriers, who run the risk of being convicted for money laundering when they move cash across the U.S.-Mexico border. Taking a cue from Tornado Cash, if a courier were to deploy an autonomous fleet of AI-powered drones instead, then when charged with a money laundering offence he or she need only invoke the now-standard defence: "it was the drones who controlled the cash, not me."

Taken to an extreme, the Tornado Cash defence means that money laundering effectively ceases to exist as a crime. All the culpability shifts onto the undead intermediaries, which can't be punished. This eclipsing of money laundering laws would be unfortunate. Professional money laundering is a key sector within the broader criminal economy, greasing the wheels for the entire enterprise. Without any legal defences against launderers, we are all much more vulnerable to crime-in-general.

In what follows, I want to provide a historical example of how the law should act when confronted with the changing tactics and technologies of money launderers.

Money laundering is a relatively new crime, but it has a much older predecessor in the crime of fencing, also known as receiving. The laws against fencing and money laundering are similar, the idea being to punish not the original criminals but the third-parties who knowingly participate in the crime by accepting dirty proceeds.

Any thief runs a big risk of being caught with stolen goods. At some point in the middle ages, specialized intermediaries, or fences, emerged to absorb this risk by accepting stolen property from professional thieves and redistributing it. Thieves could now offload their goods much quicker, thereby achieving a degree of safe harbor. For their part the fences themselves were safe from prosecution. After all, they hadn't committed the original theft, and accepting stolen property was not a crime.

The addition of specialized wholesalers to the thievery production process helped drive a rise in the incidence of theft, according to historian Rictor Norton. To close this loophole, fencing was criminalized in England in 1692. For the first time, a third-party who knowingly accepted stolen goods could be punished as an accessory to the original theft. The business of reselling hot property, risk-free until then, suddenly became much more dangerous.

The illegal fencing market quickly evolved new tactics. Enter Jonathan Wild, an incredibly successful launderer of stolen goods who, by the mid 1710s, is said to have been the "undisputed leader in the fencing business of London," according to marketing professor Ronald Hill. Wild evaded the 1692 anti-fencing law by never himself handling stolen property. Instead, he acted as an early version of Craigslist, but for stolen objects. He arm-twisted all of London's thieves to secretly report any robbery immediately to him, asking them to retain possession until he contacted them. At the same time, the unfortunate victims of those thefts were encouraged to approach Wild with requests to help locate their missing property.

Once Wild knew who was at both ends of a theft, he would pay the thief and tell him to return the goods to the victim using an anonymous porter. The happy victim got their stolen goods back, paying Wild a large reward for his troubles.

With Wild running circles around the law, Parliament passed an additional anti-fencing law in 1718 that punished anyone who took a reward under the pretence of helping a victim of theft, without actually prosecuting the original felon. In 1725, Wild was apprehended, tried, and condemned to death on the basis of this statute. 

A gallows ticket to view the hanging of Jonathan Wild (Wikipedia)

Now, a death sentence is extreme. But this is a good example of the law staying hip to both the changing technology of theft and its evolving division of labour. As the profession began to be subdivided into specialist thieves and an emerging class of allied wholesalers of stolen goods, lawmakers recognized that wholesaling was really just an appendage of theft, and thus fencing was criminalized. Later on, when fences like Wild adapted with new methods, the law kept up by finding additional means to reach fencing operations.

With Tornado Cash, we are at a "Jonathan Wild" stage of the modern money laundering profession's development. Control of dirty proceeds is being shifted to autonomous intermediaries so that the perpetrators can avoid prosecution. Much like how the law adapted in the 1700s to encompass Wild's tactics of distancing himself from dirty property, it will have to do the same with money launderers who use crypto code, autonomous robots, or AI drones to dissociate themselves. While I don't enjoy the idea of anyone spending time in jail, finding Pertsev guilty is part of that process.

Unlike Jonathan Wild, who was a criminal mastermind, Alexey Pertsev and colleagues seem to have bungled into the crime partly out of an ideological commitment to crypto ethics, the wider community unhelpfully egging him on. That doesn't mean he's not guilty, but it does suggest a lighter sentence than the 64-month one he received might be appropriate.

I've been arguing throughout this article that money laundering law should extend to innovative financial entities created on blockchains, such as Tornado Cash. I want to close by pushing back on this a bit.

A guilty verdict for Pertsev and his colleagues should not be tantamount to a ban the creation of autonomous financial institutions, particularly those focused on privacy. If a coder wants to create an open privacy mechanism for crypto, promote it, and financially profit from it, I think that he or she should have the right to do so, subject to the following condition. The code needs to include a component that screens out dirty crypto  and this filter shouldn't be a sham attempt, it has to be a genuine effort.  

While I think the law got it right in this instance, shame on lawmakers and law enforcement if they don't accommodate future generations of code-based entities (and their creators) that actually do make good faith efforts to freeze out dirty money.

Tuesday, May 28, 2024

Monetagium

An English penny minted by William the Conqueror, who brought monetagium to England. Source: History in Coins

The way that a modern mafia protection racket works is the mafia starts doing very bad things to regular folks, say you and your business. To stop the damage, you pay them a regular fee. Both sides come out ahead. The mafia earns a tidy stream of income. Your suffering comes to an end.

In feudal Europe, a monetary practice called monetagium worked along the same principles as a mafia protection racket. It began with the feudal lord threatening to do very bad things to the coinage. To prevent these very bad things from happening, the public would pay a fee  monetagium to the lord. Both sides came out ahead. The lord earned revenue. His vassals avoided a worsening of the coinage.

To better understand the intricacies of monetagium, or monetary blackmail, we need to start off by exploring how the monetary system worked back in the 11th and 12th centuries, in particular the idea of debasement.
 
A feudal lord had a number of ways to earn revenue. These included gabelle, a tax on salt; heriot, a death duty that was paid to the lord upon the death of a tenant; merchet, fee paid on marriage, and the Saladin tithe, a tax paid by all those who did not go on Crusades. Another common revenues source was the prince's monopoly over the coinage. Anyone could bring their personal silver to the royal mints and have it be converted into coins, for a fee. This revenue source was known as seigniorage. The lord of the realm, or seigneur, often outsourced the running of their mints to professional third-parties, or moneyers, who collected the fee and remitted it to the seigneur after subtracting what was needed to pay their own costs and earn a profit.

Seigniorage provided a steady stream of revenue to the lord. But if he really wanted to turbocharge his revenues, a debasement of the coinage could be introduced.

A debasement means a reduction in the silver content of new coins. Post-debasement, a canny merchant could bring a chest full of old silver coins to the mint and get those converted into even more new ones. So for example, if he had 1,000 old coins on hand, and a 20% debasement had been introduced, a merchant would be able to have his 1,000 coins reminted into 1,200 new coins. He might have to pay 50 of those to the lord, leaving 1,150 coins. The extra 150 coins now in his possession provided him with the opportunity to buy more goods & services than before (at least until prices adjusted) and settle more debts.

To take advantage of the opportunity provided by the debasement, a wave of customers would arrive at the mint to convert their silver into new coins, the result being a temporary boost to the seigneur's minting profits. If a single debasement provided a one-time boost to the lord's revenues, a series of such debasements could repetitively turbocharge those revenues. (Henry VIII notoriously used this technique to fund his expensive French wars.)

Patient readers will now begin to understand the idea of monetagium. Debasements may have boosted feudal revenues, but they were generally unpopular with the public, a fact that many writers from that period have commented on. And you can understand why. Debasing the coinage caused inflation, or a rise in the price level, and in no age has inflation ever been popular. Furthermore, the penny was the unit of account, or the means by which people reckoned and computed their financial lives. As the penny was mutated, its ability to serve as a measuring tool was compromised.

By the 11th century, Normandy's dukes had been resorting to regular debasements as a revenue device for some time. But they soon had an epiphany. They realized that they needn't enact an actual debasement to earn a profit. Instead, they could just threaten to enact one, and then extort the public for a ransom to prevent it from going through.

This tax, or extortion payment, was referred to as monetagium. By the late 11th century, monetagium was being levied on Norman citizens every three years in return for the Duke's promise not to reduce the silver content of the coinage. The tax worked out to 12 pennies per household, or hearth, which according to historian Thomas Bisson amounted to the wages of "a day's field work per year." Knights and the clergy were exempt. In scope, monetagium was an "important but unspectacular financial resource," says Bisson, raising a fraction of the much larger land tax on farms.

In other parts of France, including Orléans and Paris, the monetagium was known as the "tallage on bread and wine," writes Bisson. Calculated based on the amount of provisions that subjects had on hand, including measures of winter wheat and spring oats, the bread and wine tax was justified to the population as the king's generous substitute for debasement.

From the perspective of the king or feudal lord, monetagium must have been a superior tax policy to debasing the coinage. Gone was the need to force the population to trudge each few years with their silver coins to the mint for recoinage every three years. And the coinage at least stayed constant, removing the difficulties and uncertainties imposed by inflation on the feudal economy. But while monetagium was less capricious, it was still abusive  in the same way that the mafia's protection payments are abusive. This was especially apparent to the inhabitants of England.

There is evidence that the Normans exported the practice of monetagium to England after William the Conqueror's successful invasion of the island in 1066. The English version of monetagium appears to have operated on slightly different principles than the Norman one, however.

Whereas Normandy had a long history of debasement, England's coinage up till 1066 had remained relatively consistent in weight and purity, a tradition that the English expected the Norman invaders  to uphold, which they did. Unable to credibly use the threat of a debasement to extract monetagium, England's new Norman lords came up with another excuse.

For almost a century prior to the Norman invasion, the English coinage had been regularly renewed each three years. That is, a new version of the penny was regularly issued, the imagery being updated but the silver content staying the same. This was not debasement, but rather akin to the modern practice of periodically issuing new versions of dollar bills. In feudal England, the older versions of the penny were generally allowed to stay in circulation, although from time-to-time the most dated coins would be declared void, says W.J. Andrew, a numismatist. Once they ceased to be legal tender, citizens were required to bring in these discontinued coins to be reminted into new ones, for a fee. The fees earned from demonetization were one of the ways the English kings earned income.

According to Andrew, this English tradition of recurring triennial renewals, or renovatio monetae, gave the Norman kings the missing hook they needed to extract monetagium from the English population. By declaring all coin types to be void each three years (instead of just some of the oldest ones), as was his right, England's new Norman kings could place a costly burden on the population. English-folk would have to regularly haul all their coins to the local mint for costly conversion. To avoid this burden they were proffered an alternative: pay the monetagium every three years instead, and in return the king would let old pennies remain as legal tender.
 
This was not a popular practice with the English. When Henry I came to power in 1100 he would officially end it, proclaiming the following: "The common monetagium... which was collected through the cities and through the counties, which did not exist in Kind Edward's time, this I utterly abolish from now on."

The phenomenon of monetagium also pops up in Denmark in the 13th century in the form of a "plough tax," as recounted by historian Sture Bolin. Like many parts of Europe, Denmark's coinage was subject to renovatio monetae whereby it was routinely recalled and cancelled. The conversion rate was costly; for every three demonetized coins submitted, a Dane might receive only two in return. The policy of renovatio monetae was brought to an end in 1234 by King Valdemar II. In its place, a new tax was levied such that for every plough owned, Danes had to pay one öre in coin. Valdemar justified the plough tax to his Danish subjects as the price they had to pay to enjoy permanent coinage.

Notably, the coins that Valdemar issued in 1234 have the distinction of being the first European coins in the Christian era to have a date stamped on them. In the image below, they are dated MCCXXXIIII, although I must confess that I can't quite make it out. (This source may help you pick out the numerals.)

A penny from Roskilde, Denmark dated 1234 holds the honor of being the earliest Anno Domini dated coin in the history of European coinage Source: Reddit


Bolin suggests that the novelty of coin dating was intended to commemorate both the permanent nature of Danish coinage and the simultaneous introduction of the plough tax, or monetagium.

---

So what are we to make of all this today? Modern democracies are not feudal mafioso, yet they often face the similar dilemma of what mix of revenue sources to rely on, one of those sources being monetary debasement. A literal debasement of the coinage is no longer a policy that can be pursued  our currencies are no longer metallic. The modern equivalent would be for a democratic government to lean on the central bank to fund government spending, too much of this resulting in inflation.

In general, democracies have not resorted to modern version of debasement as a revenue source due to the unpopularity of rising prices. Instead, contemporary policymakers tend to rely on income taxes, consumption taxes, and property taxes. I suppose we can think of these obligations as our modern version of monetagium. They are the "better taxes," akin to the Danish plough tax or the Parisian bread and wine tax, that we subject ourselves to instead of the not-so-good taxes that get levied via the monetary system.