Feeds

Customs loses VAT weapon

Legal decision goes against 'em...

  • alert
  • submit to reddit

High performance access to file storage

Customs and Excise's ability to counter missing-trader or carousel fraud suffered a blow late last week with an adverse decision from the Advocate General of the European Court of Justice.

In October 2003 Bond House Systems, a large computer component wholesaler, lost a case against Customs which led Customs to withhold the firm's VAT rebate.

Bond House was driven out of business by the decision and laid off all but two staff. It was forced to cease trading after losing a tribunal case in May 2003. Customs accepted the firm did not knowingly break the law but was an unwitting part of the fraud. Customs withheld £13m in Vat rebates from the firm, which continues its legal fight against Customs.

Customs also withheld payments for two other firms. in 2003-2004 Customs withheld £201m in VAT rebates due to traders, mostly computer component brokers and mobile phone distributors, in a clampdown on missing trader fraud.

Last week The European Court of Justice's Advocate General said that these actions are unfair to legitimate businesses. His opinion is not binding but is likely to be accepted by the court later this year.

Customs is waiting for the final judgment, but in the meantime it says it has several other tools to fight the fraudsters. In April 2003 it introduced "joint and several" liability and tougher guidelines on making repayments in cases without valid invoices.


A spokesman for Customs told The Reg: "This is just one of the tools we use against Vat fraudsters. And overall we are reducing levels of fraud." He said "joint and several liability", which makes brokers responsible for VAT payments throughout their buying chain was particularly useful.

Carousel frauds, or missing trader fraud, involve importing VAT-free goods from another EC country, selling them on with VAT added and then disappearing before paying Customs the VAT.®

Related stories

VAT man claims five fraud scalps
Dealers win High Court VAT action against Customs
Customs swoop on £25m chips-to-gold VAT gang
Chip VAT fraud gang sentenced to 31 years

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.