Bank CEO Arrested for Taking Bribes For Small Business Administration Loans

Bribery
cid:image003.png@01D2B46A.7A0CFBD0

            Geoffrey S. Berman, the United States Attorney for the Southern District of New York, announced today the arrest of EDWARD SHIN, the CEO of a Pennsylvania-based bank (the “Bank”), for taking bribes in connection with the Bank’s issuance of loans that were guaranteed by the United States Small Business Administration (“SBA”).  SHIN was arrested pursuant to a criminal complaint charging him with taking bribes by siphoning off a portion of commissions on SBA-guaranteed loans and causing the Bank to issue SBA-guaranteed loans to companies in which SHIN had a secret interest. 

The charges are the culmination of a joint investigation by the Federal Deposit Insurance Corporation – Office of Inspector General (“FDIC-OIG”), Homeland Security Investigations (“HSI”), the SBA Office of the Inspector General (“SBA-OIG”), the Federal Bureau of Investigation (“FBI”), and the Office of the Special Inspector General for the Troubled Asset Relief Program (“SIGTARP”).  SHIN is expected for presentment this afternoon in Manhattan federal court before U.S. Magistrate Judge James L. Cott.

            U.S. Attorney Geoffrey S. Berman said:  “Edward Shin, the CEO of a Pennsylvania bank, allegedly exploited his position as a bank officer to illegally issue Small Business Administration loans to entities in which he had a financial interest.  Furthermore, Shin allegedly took kickbacks on commissions for those loans from a third party who did no legitimate work in the loan process.  The Small Business Administration exists to provide funding to those pursuing the American dream through owning their own businesses.  Edward Shin is now charged with attempting to corrupt that process for his own personal gain.” 

            According to the allegations in the Criminal Complaint filed in Manhattan federal court today[1]

            The SBA helps Americans start, build, and grow businesses by guaranteeing certain loans made by banks to help those businesses succeed.  Between 2009 and 2012, EDWARD SHIN was the CEO of the Bank.  During that period, the Bank offered a range of financial products, including SBA-guaranteed loans to small businesses in the New York-New Jersey area, which the Bank could extend only on the condition that all aspects of those loans complied with SBA regulations and SBA’s standard operating procedures.  In particular, SBA regulations and procedures prohibited bank officers, including SHIN, from receiving any payments in connection with SBA-backed loans and prohibited banks from extending such loans to any institution in which a bank officer held an interest.

            Notwithstanding these regulations, SHIN secretly solicited and received bribe payments in connection with SBA-guaranteed loans issued by the Bank and caused the Bank to extend SBA-guaranteed loans to companies in which SHIN had secret ownership interests.  Specifically, when the Bank issued a business loan involving a certain broker (the “Broker”), SHIN secretly arranged to receive a portion of the Broker’s fee.  On other occasions, when the Bank issued a business loan that did not involve the use of an actual broker, SHIN arranged to have the Broker inserted unnecessarily into the transaction solely to generate a broker fee that could be shared with SHIN; in fact, the Broker did no actual work to earn a commission on those transactions, but split the “broker’s fee” with SHIN as an illegal kickback.

            SHIN also arranged for the Bank to issue SBA-guaranteed loans to businesses in which he secretly retained an ownership interest, in violation of SBA regulations and procedures.  For example, in or about December 2010, the Bank issued an SBA-guaranteed loan for approximately $950,000 to a business in New York, New York.  Although documents submitted to the Bank for purposes of securing the loan did not mention SHIN’s ownership interest, the business was secretly operated as a 50-50 partnership between SHIN and the Broker.  After the loan was issued in or about October 2014, this loan went into default status, ultimately resulting in a loss to the SBA of approximately $611,491. 

*                      *                      *

            SHIN, 56, of Ambler, Pennsylvania, is charged with one count of conspiracy to commit bank bribery, which carries a maximum potential sentence of five years in prison, and one count each of bank bribery, theft of funds by a bank officer, and conspiracy to commit wire fraud, each of which carries a maximum potential sentence of 30 years in prison.  The maximum potential sentences in this case are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge.

Mr. Berman praised the outstanding investigative work of the FDIC-OIG, HSI, FBI, SBA-OIG, and SIGTARP.

            This case is being handled by the Office’s Money Laundering and Transnational Criminal Enterprises Unit.  Assistant U.S. Attorneys Daniel M. Tracer and Tara M. La Morte are in charge of the prosecution.


Small Law Firms Risk Big Exposure Without Better Cybersecurity Practices

Cybersecurity risk lawfuel

Josh Taylor* Small law firms don’t take cybersecurity seriously enough.

According to an American Bar Association survey, only 42 percent of firms reported taking action to increase their digital security measures in the previous year.

Even more concerning: 27 percent said they did so to better protect client or contract data security. For a group of professionals often entrenched in weighing risks for their clients, why are lawyers so seemingly unconcerned about their own exposure — especially when the consequences can be devastating?

The recent Exactis data leak is a classic case study in what happens when a small business doesn’t take security seriously enough. While the breach transpired due to a combination of technical errors and pure accident, the company still exposed the personal information of more than 230 million people and 110 million businesses.

The moral of the story: Small businesses can expose just as much sensitive data as the biggest enterprises; and in an age where smaller operations handle far more data than ever, the risks keep growing.

For law firms, these risks can be even higher. Not only are firms handling clients’ personal details, but they also store sensitive business information, including proprietary data, financial details and confidential deals. A leak or breach can lead to an exodus of clients, an IT nightmare, financial stress and regulatory fines.

To avoid these consequences, law firms need to be more proactive about their security, and doing so doesn’t have to be a complicated process. There are simple changes and low-hanging fruit small firms can tackle in order to increase data security. Firms looking to make these changes should follow the following principles:

Security is people-first.

People can often prove to be the biggest data security risk for small businesses. While larger firms are more likely targets of sophisticated hacking operations, smaller firms can fall prey to ransomware and phishing scams that rely on human error.

Regular training is essential to avoid employees ending up as the source of a data breach. Keep staff up-to-date on the latest ways to protect themselves against email schemes and malicious apps that can compromise data. Prepare a mechanism to distribute information in the case of a major vulnerability so all employees can take action early. While small firms may be wary of the time and cost to offer training, doing so pays dividends if even one breach is prevented.

technology threat to law firms
Americanbar.org

Weak tech is weak protection.

Law has a reputation as being slow to adapt to digital transformation. Small law offices might contain machines running inconsistent operating systems, software that needs updates and even unsecured Wi-Fi networks. Fortunately, these major vulnerabilities also are a simple fix. Getting employees on a regular schedule of hardware and software updates is an easy way to patch weaknesses, as is frequently changing Wi-Fi credentials.

Smaller firms should also be particular about passwords. As elementary as it may seem,  one weak password can be the key to your entire database of client information. Keep access credentials for the most sensitive data limited to essential personnel, change passwords frequently and consider deploying a password manager for all employees.

Don’t overlook physical security.

Digital data security can be a nebulous concept. Where is the data exactly? Where are attacks coming from? These security questions aren’t nearly as difficult in the physical world, yet firms often fail to protect their physical assets.

For one, it is a misconception that on-premise servers make data safer. Yes, you can touch and see your infrastructure, but this doesn’t mean it is more secure. Think of it this way — a pair of burglars can do a lot of damage to tech assets when breaking into a small law office. But if firm data is instead housed and backed up in the cloud, the risk is much lower.

Small firms should consider cloud migration if they have not already, and if they have reservations about the cloud, they should get over them fast. The cloud is not some ethereal insecure storage place; it is quite literally the most security money can buy (and cloud companies like Amazon have plenty of that to ensure it stays secure).

Additionally, while digital documents are increasingly pervasive, small law firms know a lot of legal work still is completed on paper. Carelessness with paper documents is a major security red flag for any law firm, including items left in plain view, or even accidentally in the background of social media photos. Paper may be rapidly disappearing in business, but it doesn’t mean it can’t expose just as much information as an Excel sheet.

Data breaches at small firms can still have a big impact. In order to protect themselves, firms must commit to basic changes and improvements to technology processes and ensuring everyone within the firm is on board with better security best practices.

Author Bio –


Josh Taylor is a former attorney and lead content strategist at Smokeball. For years he has helped lawyers become more organized, productive, and profitable. A trained litigator, Josh came to Smokeball from a large east-coast law firm where his practice focused on franchise, insurance, marine, and general litigation. His work with Smokeball, and his continued passion for what he does each day, is driven by a desire to help lawyers and their staff do better in every way. Knowing well the stress and strain put on today’s legal professional, he regularly focuses on improving work and life in the law. In addition to his work at Smokeball, Josh serves on the Writing Resource Center staff at The John Marshall Law School. Besides legal technology, his research interests include judicial decision-making, jury decision-making and psychology, and legal writing. Additionally, Josh sits on the Board of Directors of Chicago-based Community Activism Law Alliance and on the Board of Directors of Chicago Fringe Opera Company. Josh holds his J.D., cum laude, from Washington University in St. Louis, where he served as a Senior Editor of the Wash. U. Law Review, held the prestigious Thompson Coburn Research Fellowship, served as Research Assistant to then-Vice-Dean (now Chancellor) Andrew D. Martin, and clerked at the U.S. District Court for the Eastern District of Missouri. He holds a B.A. in Political Science and a B.M. in Music Performance with Honors Scholar distinction from the University of Connecticut, making him a Huskies basketball fan through and through. Follow Josh’s activity on LinkedIn, and keep up with new articles on the Smokeball Blog.


Get Your Power Law News

Get the top law news weekly that's fun to read
Powered by Kit

About The Author