1
Structuring the Capture of the State
The nexus between the constitutional and shadow states depends on the integration of a range of skills similar to those present in most international corporations. The composition of the Zuma-centred power elite is, in many respects, highly organised, following the structure of what, in academic terms, is called a āwar economyā.1 In a war economy the āshadow stateā establishes a number of informal structures which produce systems of āprofit, power and protectionā2 that, in turn, serve to further their operations, making possible continued preferential access to resources and power through an exploitative economic system. The cycle can, therefore, continue.
One of the key requirements in establishing these shadow structures is the ability to secure a system of command and control over the way the resources are accessed, moved and distributed. At the outset, control must be established over the sources of extraction, including the ability to respond flexibly to any changes in the operating environment.3 Once access to the source of extraction is secured, networks of middlemen or brokers must be established that can move resources externally, usually transnationally, to sustain loyalty (this is critical to ensuring the survival of the network). The ability to transact within this network is facilitated by establishing political marketplaces where support is traded through the provision of access to resources.
The skills of this patronage network are localised within a number of groups. The networks consist of three elements: the controllers, the elites and the entrepreneurs (also known as brokers), as shown in Figure 1.1.
The controllers, or patrons, of resources sit at the apex and are usually the strongmen directly responsible for predation and exploitation. Their function is to secure access to and maintain control over resources.4 A patron or controller typically favours one group over another (or others), resulting in the exclusion of those who are out of favour. This sets up a competitive set of nodes around the patron or controller, which has the ultimate effect of rendering elites (the next layer down) unable to cooperate effectively as they fear being ousted by their partners, or falling out of favour with the patron. Jacob Zuma and the Guptas have been controllers.
Figure 1.1. Generalised model of a patronage network that extracts and administers rents
The elites are responsible for establishing and maintaining patronage networks, which facilitate the distribution of benefits. In the South African context the elites would be such players as Free State premier Ace Magashule, ministers Faith Muthambi, Malusi Gigaba and Mosebenzi Zwane, Eskomās Anoj Singh and the ubiquitous Brian Molefe.
The entrepreneurs, who are also known as brokers, are middlemen who facilitate the movement of funds, information and/or goods both domestically and across transnational networks, using ārecruitment networks, lending networks, remittance transfers and smuggling networksā.5 Examples are Transnetās Iqbal Sharma; Eric Wood, CEO of Gupta company Trillian Partners; Gupta associate Salim Essa, a former partner of Sharma; and Ashok Narayan, former managing director of the Guptasā Sahara Computers.
Networks of brokers secure domestic and cross-border operations through which resources can be moved to international clearing hubs and enter legitimate trade activities. Brokers are often of a different nationality or ethnicity from the controller or patron ā usually a minority group ā so that they cannot mount a significant challenge. They have commercial ties to different clusters of communities through which they are able to achieve networked competence, and they have access to ports of entry. Brokers and ports are āchoke pointsā for intervention in patronage networks.6 If brokers are identified and their ability to operate is significantly reduced, the patronage network is weakened and may collapse.
Dealers are groups that are able to move the money transnationally (for example, the professional money-laundering syndicates in Hong Kong, the United Arab Emirates and elsewhere).7
An essential requirement is to secure and establish cross-border networks to move illicit proceeds into international clearing hubs where they enter the legitimate trade and accrue value to the members of the network.8 In many instances the networks use clandestine methods to mask the origins of resources in order to protect their members from external scrutiny.9 From an operational perspective, these networks of brokers and dealers must perform a number of functions.
They collude with customs or corrupt officials to create false records pertaining to the types of goods traded, quantities and the identities of parties involved in the transactions.
They provide licences for others to obtain illicit goods in violation of the law.
They launder cash generated from illicit activities in collusion with formal financial institutions in order to establish legitimate business entities that can generate funds.
They use shell companies in order to hide ownership details and move assets offshore (for example, the Gupta entities Homix, Regiments Asia, Morningstar International, and so on).
They exchange one potentially traceable commodity, such as oil or timber, for another less traceable one, in a process also known as trade misinvoicing.
They purchase legitimate goods outside the country with the proceeds of illicit activities, then import the legitimate goods back into the country to generate āclean revenuesā.
10 The R200 million temple the Guptas are building in India and their R448 million villa in Dubai, reportedly the most expensive house in the United Arab Emirates, may fall into this category.
Ultimately, the key to realising the full potential of control over resources is the ability to strip assets and convert them into monetary resources ā typically through money laundering ā that can fund the patronage operations.11
The conversion of such assets also requires the existence of an appropriate infrastructure for handling and moving them. Such infrastructure includes banking and āalternative remittance systems ⦠import-export firms that participate in false invoicing schemes, precious metal markets, and the use of trusts, international business companies, and non-transparent jurisdictions as mechanisms to hide fundsā.12
Money-laundering procedures
Money laundering is the process of transforming illicit money into ostensibly legitimate assets. It typically follows a three-stage process: placement, layering and integration. Placement involves moving funds into activities or accounts from which they can be legitimised through layering (blending illegitimate with legitimate funds, recycling them through cash-based operations, moving them into ālegitimate companiesā or moving them around in complex transactions, and so on). These funds are then integrated back into the revenue stream of the money launderer (often by purchasing property and other goods).
The laundering process usually requires a financial system with lax regulations and controls. Rents are also often distributed in cash and, indeed, this may be preferable in many instances, but there are limits t...