Ch 17 White Collar Crime Flashcards

1
Q

Confidence games

A

Crimes that betray the trust of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The pigeon drop

A

Most practiced confidence fame of all time, comes in many varieties
Powerful acting between two cons - bickering - where the victim feels they will be left out unless they abide by the conditions of agreement
(Con man 1 and 2, one days they go get their share of the money- victim gets a share of money to be included then they leave with victims money ) page 475

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The bank examiner scheme

A

Con artists pose as FBI, banker examiners , police officers.
Victim contacted saying need help in an investigation. - victim asked to verify balance - one man stays at house the other goes to bank with victim - has them withdrawal account- has victim give money to con man to let them deposit money into account - leave with money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pyramid “get rich quick “ scheme

A

Recruitment commissions

Eventually collapses or bubbles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Travel scams

A

Tel them they win trip and get credit card info
They tell them they have a review period - slow in sending vacation package materials and then when it arrived according to company already expired . “Service fee” fake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Home repair scams

Scammers

A

Accept money for repair jobs and never finish or honor warranties on projects
* asphalt scam * - lay black paint instead
Elderly people targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Money laundering and how it works

A
  • making illegally obtained funds appear legit- means by criminals evade paying taxes on illegal income by concealing the source and amount of profit , tax evasion in progress.
  • bank methods - trading currency for small denominations for larger ones (treasury bills bank drafts )
  • smurfing - giving individuals separate amounts of money from drug sales to deposit less than 10k - then someone puts into oversees banks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Double invoicing

Form of money laundering

A

Company orders merchandise from foreign subsidiary at an inflated price . Subsidiary deposits the difference between the inflated and actual price in special offshore account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acquisition of financial institutions (form of money laundering )

A

Traffickers acquire domestic or international financial institution . By controlling an entire Institution traffickers can go far beyond the immediate aim of conceal lung illicit earnings. They effectively take over part of the local banking system and divert it to their own needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cybercrime

A

the destruction, theft or unauthorized use, modification, or copying of info programs services equipment or communication networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

four main categories of computer crime have been identified as:

A

the intro of fraudulent records or data into a computer system
Unauthorized use of computer-related facilities
The alteration or destruction of information or files
The stealing of money, financial instruments, property, services or valuable data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bank Secrecy Act (BSA)

A

federal reporting requirements for banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

smurfing

A

trafficker provides cash to smurfs
smurf buys cashiers checks under 10k
surfs turn check over to intermediary, intermediary deposits check into traffickers domestic or foreign bank account. surfing allows trafficker to deposit 500k in bank and circumvent bank reporting requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

scanning

A

process of presenting sequentially changing information to automated system to id those items to receive a positive response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

masquerading

A

most common activity of computer system intruders. difficult to prove after case goes to trial. - one person assuming identity of authorized computer use by acquiring items/characteristics/knowledge - anyone possessing correct security code can masquerade as another person ( stealing money from company)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data diddling

A

false data entry. - most commonly used computer crime, safest and simplest. changing data before or during their input to computers - (example - payroll )

17
Q

Trojan horse

A

secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions. Trojan horse is primary method used for inserting instructions for other abusive acts like logic bombs, salami attacks and viruses.

18
Q

computer virus

A

set of computer instructions that produce itself in computer programs when they are executed within unauthorized programs. sometimes through use of trojan horse. (can lie dormant in system for weeks or months, before infecting entire computer networks)

19
Q

salami technique

A

automated form of trojan horse, method where small amounts of assets taken from specified accounts or sources where the whole appears to be unaffected. over time substantial amount of money is taken.

20
Q

most common type of computer evidence

A

magnetic tape and disks
printed computer listings
computer
additional computer hardware

21
Q

profile of computer criminal

A
Age - usually young and educated
Skilled and knowledgeable
positions of trust
assistance
Differential association 
robin hood syndrome _ rationalize that they are only harming a computer and not causing any loss to people or organizations - harming ppl vs organizations.