Ch 17 White Collar Crime Flashcards
Confidence games
Crimes that betray the trust of the victim
The pigeon drop
Most practiced confidence fame of all time, comes in many varieties
Powerful acting between two cons - bickering - where the victim feels they will be left out unless they abide by the conditions of agreement
(Con man 1 and 2, one days they go get their share of the money- victim gets a share of money to be included then they leave with victims money ) page 475
The bank examiner scheme
Con artists pose as FBI, banker examiners , police officers.
Victim contacted saying need help in an investigation. - victim asked to verify balance - one man stays at house the other goes to bank with victim - has them withdrawal account- has victim give money to con man to let them deposit money into account - leave with money
Pyramid “get rich quick “ scheme
Recruitment commissions
Eventually collapses or bubbles
Travel scams
Tel them they win trip and get credit card info
They tell them they have a review period - slow in sending vacation package materials and then when it arrived according to company already expired . “Service fee” fake
Home repair scams
Scammers
Accept money for repair jobs and never finish or honor warranties on projects
* asphalt scam * - lay black paint instead
Elderly people targets
Money laundering and how it works
- making illegally obtained funds appear legit- means by criminals evade paying taxes on illegal income by concealing the source and amount of profit , tax evasion in progress.
- bank methods - trading currency for small denominations for larger ones (treasury bills bank drafts )
- smurfing - giving individuals separate amounts of money from drug sales to deposit less than 10k - then someone puts into oversees banks
Double invoicing
Form of money laundering
Company orders merchandise from foreign subsidiary at an inflated price . Subsidiary deposits the difference between the inflated and actual price in special offshore account
Acquisition of financial institutions (form of money laundering )
Traffickers acquire domestic or international financial institution . By controlling an entire Institution traffickers can go far beyond the immediate aim of conceal lung illicit earnings. They effectively take over part of the local banking system and divert it to their own needs
cybercrime
the destruction, theft or unauthorized use, modification, or copying of info programs services equipment or communication networks.
four main categories of computer crime have been identified as:
the intro of fraudulent records or data into a computer system
Unauthorized use of computer-related facilities
The alteration or destruction of information or files
The stealing of money, financial instruments, property, services or valuable data.
Bank Secrecy Act (BSA)
federal reporting requirements for banks
smurfing
trafficker provides cash to smurfs
smurf buys cashiers checks under 10k
surfs turn check over to intermediary, intermediary deposits check into traffickers domestic or foreign bank account. surfing allows trafficker to deposit 500k in bank and circumvent bank reporting requirements.
scanning
process of presenting sequentially changing information to automated system to id those items to receive a positive response.
masquerading
most common activity of computer system intruders. difficult to prove after case goes to trial. - one person assuming identity of authorized computer use by acquiring items/characteristics/knowledge - anyone possessing correct security code can masquerade as another person ( stealing money from company)