ABU DHABI // Three people were convicted yesterday of stealing about Dh500 million after they failed to reach a settlement with the major financial services company where they had worked.
The three were found guilty at the Court of Appeal of embezzling from Global Gate Financial Services, which, according to prosecutors, damaged the reputation of the securities market and its clients.
Global Gate provides brokerage services for the Abu Dhabi and Dubai securities markets. Two other former workers, accused of the same charges, are outside the country and have never been arrested.
AT, a Palestinian, was sentenced to eight years in prison and fines of Dh9m and Dh30,000, a reduction from his original sentence of 11 years and a fine of Dh9m or an equivalent in assets.
The six-year sentence for AA, a Jordanian, was upheld, as was an eight-year term for the third defendant, SA, also Jordanian.
In a statement after the first verdict, the company said it would file a civil lawsuit after the convictions. The company said it would demand Dh298m for funds belonging to it, Dh77m for funds belonging to shareholders and Dh124m in other, private funds.
AT, who served as the general director of the company, made Dh142m for himself by using company money to buy and sell shares using clients' accounts. He also laundered money in the transfer of Dh9m, obtained from his investment scheme, to a Swiss bank.
The company's head of operations, SA, forged and unlawfully cashed company cheques and illegally accessed the company's computer system, changing data and transferring about Dh60m in profits from one client to another.
AA, a finance chief, took Dh57m from clients using power of attorney he had been given as part of his job. He also laundered money and transferred Dh4m to his wife's account in Jordan.
A client of the company, KA, from Syria, was accused of facilitating the crimes by opening an account there in her name, which AT used for illicit trading. KA was given a suspended one-year prison sentence in February 2009.
IMA, the head of trading, from Lebanon, embezzled Dh1.6m by buying shares in his relatives' names using company money, prosecutors say.
The director's brother, who has not been arrested, was sentenced to three years in prison in absentia.
hhassan@thenational.ae
The specs
Engine: 2-litre or 3-litre 4Motion all-wheel-drive Power: 250Nm (2-litre); 340 (3-litre) Torque: 450Nm Transmission: 8-speed automatic Starting price: From Dh212,000 On sale: Now
If you go
Where to stay: Courtyard by Marriott Titusville Kennedy Space Centre has unparalleled views of the Indian River. Alligators can be spotted from hotel room balconies, as can several rocket launch sites. The hotel also boasts cool space-themed decor.
When to go: Florida is best experienced during the winter months, from November to May, before the humidity kicks in.
How to get there: Emirates currently flies from Dubai to Orlando five times a week.
From Zero
Artist: Linkin Park
Label: Warner Records
Number of tracks: 11
Rating: 4/5
Women & Power: A Manifesto
Mary Beard
Profile Books and London Review of Books
COMPANY PROFILE
Founders: Alhaan Ahmed, Alyina Ahmed and Maximo Tettamanzi
Total funding: Self funded
The%20specs%3A%20Taycan%20Turbo%20GT
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3EDual%20synchronous%20electric%20motors%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E1%2C108hp%0D%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E1%2C340Nm%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3ESingle-speed%20automatic%20(front%20axle)%3B%20two-speed%20transmission%20(rear%20axle)%0D%3Cbr%3E%3Cstrong%3ETouring%20range%3A%20%3C%2Fstrong%3E488-560km%0D%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3EFrom%20Dh928%2C400%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3EOrders%20open%3C%2Fp%3E%0A
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.