Offshore A-Z is a digital repository of companies operating across major tax havens. Offshore A-Z exploits the inscrutability of such companies to speculate on their possible nature and intent. Each company listed on here is real, but the information surrounding these consist of both actual records, obtained by dmstfctn, and speculative images and mission statements, generated by algorithms.

Tax havens, or secrecy jurisdictions, employ laws and corporate regulations different from those of most jurisdictions, using secrecy as a prime tool. Furthermore, the agents operating offshore on behalf of clients elsewhere have been observed by dmstfctn to willfully introduce mistakes in the records held on the companies they help forming. (Offshore Investigation Vehicle)

When offshore companies are but a bundle of papers held in private storages, these practices contribute to a number of possible configurations of any given offshore company, whose records are at once factually correct and conveniently flawed.

Offshore A-Z plays with the idea that truth is not one nor static, and that it does not need to be upheld equally at all times or in all fora.

Obtaining the data

The data contained within Offshore A-Z comes from a number of sources. Prior to the Offshore Leaks, the snippets of information available on offshore companies were largely confined to the outdated online registrars kept by tax havens, as an empty gesture towards transparency. Employing data scraping techniques, dmstfctn extracted records on hundreds of thousands of companies appearing in a number of such registrars.

Yielding varying amounts of information, and naturally full of gaps - sometimes full company details and descriptions, sometimes little more than a name - the records were cross referenced with data from the ICIJ’s Offshore Leaks as well as Financial Secrecy Index scores from the Tax Justice Network, and compiled into a single searchable database.

Training the algorithms

Algorithms were then trained to fill in the gaps in information. Using keywords from the company’s records as a trigger, the algorithms associate images with each nondescript company and complete missing fields by guessing possible incorporation dates or by generating corporate mission statement via a simple neural network. The coherency and accuracy of the neural network is directly undermined by the opaque source material, or incomplete input records. Finally, companies previously named in the Offshore Leaks ( for example) are hyperlinked to the relevant entry on the ICIJ database, allowing user to investigate further.

Compiling the template

The resulting information is autonomously built into a Web 2.0 page, employing a visual grammar similar to that used by existing registrars of companies. However, under intense scrutiny, the template mealts away revealing warm hues and floating forms.

This cycle of actions is repeated for each unreleased company found in the database and publicly announced by a Twitter bot.

Zooming in

Among the companies listed on the Offshore A-Z, a few appearing to be embedded in complex offshore vehicles were further investigated, resulting in three stories focusing on the funding behind Leave.EU, the corporate tax-avoidance of Barclays and the colonial origins of HSBC.

Offshore A-Z is a project by dmstfctn.

CPG PRIVATE PROTECTION

Company Name CPG PRIVATE PROTECTION
Date of Registration 12th February 2013
Company Objective 1.     The exercise of a security and surveillance company, as well as an installation also including electricity systems and guard dogs.
2.     The providing services in the field of security and surveillance through, among others, without limitation, the provision of security guards (security guards), both heading in a surveillance scheme, providing concierge services, the providing guidance for cash and heavy transport on the roads, delivering cleaners for rooms where confidential information is stored and valuables.
3     The own account, on behalf or in cooperation with other companies, operating an electronic alarm system.;
4. Install     The, repair or otherwise make, sell and maintain alarm systems.
5.     The wholesale, retail, agenturen-, commissions, import and export trade in other security such as alarm, special door furniture items and other collateral-related items and products.
6.     The providing advice in the field of injury prevention in the broadest sense, including defined below without being limited thereto, burglary, robbery, theft, and fire.
7.     The providing all services related in any way with injury prevention.
8.     The trade of computers, computer systems and software programs, other software, peripherals, electronic or mechanical information and communication, cellular, GPS systems, two way radios, PBX and paging systems, satellite equipments, pereferi units and supplies foregoing, accessories, components and tools, including, leasing and renting, leasing and providing service, installing, maintaining and making repairs of the above equipment.
9.     The organizing, and do provide training and education of all kinds, such as eg, without being limited to seminars, conferences, workshops in the field of security.
10.     The invest its assets in securities such as shares and other securities in respect of bonds and other interest-bearing receivables, by whatever name and in whatever form.
11. Acquire     The, possess, alienate, manage and develop movable and immovable property as well as the acquisition, possession, transfer and management of rights and interests relating to movable and immovable property.
12.     The rent, lease, sublease, providing mortgage or otherwise establish certain of rights to movable and immovable property or related rights and interests.
13.     The setting bail and other guarantees and transferring ownership whether or not in fiduciary or trust or mortgage, pledge or otherwise encumber assets, all this as security for the payment of the debts of the company and the debts of third parties, whether in return contraprestatie.
14.     The full or partial building retirement provisions for employees or former employees of the company and / or their survivors.
15.     The company is authorized to do everything that might be useful or necessary to achieve its purpose in the broadest sense, including participation in other enterprises and companies.
16.     The above will be made to the extent permitted by and subject to the provisions under or pursuant to the relevant legislation.
Country
aruba
Financial Secrecy Index [more info] 68