Chapter 17 Flashcards

0
Q

White collar crime is a “non violent crime for financial gain committed by means of deception by persons while occupational status is ________________ and utilizing their social occupational skills and opportunities”

A

entrepreneurial, professional, or semi professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Edwin Sutherland ,”a crime committed by a person of respectability and high social status in the course of his occupation”

A

White collar crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some of the most notable white collar crimes are insider trading money laundering confidence games and _________.

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate crime is a form of white collar crime whereby trusted executives working within a company mishandle funds or otherwise ___________ of customers or other consumers

A

betray the trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Motivations include ___________ or realizing personal wealth through mishandling funds.

A

gaining or increasing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of making illegally obtained funds appear legitimate. By which criminals evade paying taxes on illegal income by concealing the source and amount of profit, tax evasion in progress

A

Money laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Each _____ goes to different banks and purchases cashiers check in denomination of less than 10,000 checks are turned over to second person who facilitate their deposit into domestic or overseas banks

A

smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Company orders merchandise from a foreign subsidiary at an inflated price. The subsidiary deposits the difference between the inflated and actual price in a special off shore account

A

Double invoicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“The destruction, theft or unauthorized use modification or copying of information ,programs services ,equipment or communication networks

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of one person assuming the identity of an authorized computer user by acquiring items, knowledge or characteristics

A

Masquerading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

automated form of Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected

A

Salami techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are crimes that betray the trust of the victim

A

confidence games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In this scam a lot of losers pay few winners. Key is powerful acting between cons, makes victim feel left out unless they abide by conditions of the agreement

A

pigeon drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The treasurey department implemented the ___ requiring banks to export cash transactions of 10,000 or more

A

CTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An entire ________ to transform small denominations of currency to businesses, money market, deposits or real estate may take as little as 48 hours

A

“Wash cycle”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Money laundering techniques include bank methods,smurfing ,currency exchanges ,double invoicing and _______________.

A

acquisition of financial institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Established in 1990 is a multiagency support unit that analyzes intelligence information that develops suspects in money laundering schemes

A

FinCEN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Traffickers take their cash to a bank and conduct several transactions that usually involve trading currency of small denominations for larger ones. Common for cash to be exchanged for treasury bills, bank drafts ,letters of credit ,travelers checks or other monetary instruments

A

Bank methods

18
Q

There is no requirement to report bank method transactions because the BSA reporting requirements don’t pertain to __________.

A

interbank transfers

19
Q

Violations of criminal law that require knowledge of computers for their perpetration

A

Computer crimes

20
Q

Trojan horse ,logic bombs, and trap doors indicate different programming techniques designed to carry out the ___________.

A

unauthorized functions

21
Q

Computer crimes are largely investigative in nature using an estimated 90 percent traditional police work and _____ technical skill

A

10 percent

22
Q

In 1986 Reagan outlawing illegal use of computers. Prohibits eavesdropping on electronic mail conversations on cell video conference calls computer to computer transactions

A

Electronic communications privacy act

23
Q

A compulsive computer programmer who explores tests and pushes the computer to its limits regardless of its consequences

A

Computer hacker

24
Q

It involves changing data before or during their input to computers

A

Data diddling

25
Q

Process of presenting sequentially changing information to an automated system to identify those items receiving a positive response

A

Scanning

26
Q

Set of computer instructions that reproduces itself in computer programs when they are executed within unauthorized programs

A

Computer virus

27
Q

Set of instructions inserted Ina computer program that looks for specific errors Ina computers normal functioning

A

Logic bombs

28
Q

Programmers insert debugging aids that break security codes in the computer and then insert additional code of their own

A

Trap doors

29
Q

Confuses the computer system making it unable to differentiate one job from another

A

Asynchronous attacks

30
Q

This “Get Rich Quick” scheme can continue indefinitely but it actually “bubbles” and soon collapses because of sheer numbers involved

A

Pyramid scheme

31
Q

In October 1986 with the passage of the ___________ organized crime members and many others have been charged and convicted of both tax evasion and money laundering

A

Money Laundering Control Act

32
Q

The us secret service, us postal service, and _____ are among the principal federal enforcement agencies that share jurisdiction for investigation of these crimes

A

FBI

33
Q

Confidence games include: The Pigeon Drop, the Bank examiner Scheme, pyramid scheme, travel scam, home repair scam, contest cons and _________.

A

Magazine subscription scam

34
Q

Part of the problem the US has regarding money laundering activities is that US drug users are primarily ________ rather than producers of drugs

A

consumers

35
Q

Money laundering process can take many forms including 1. Merging illicit money with a legitimate cash source which usually uses a business that generates large amounts of cash and _____________

A

using sophisticated international money laundering techniques

36
Q

Money laundering techniques include bank methods, smurfing, currency exchanges, double invoicing, and _____________

A

Acquisition of financial institutions

37
Q

The most common method for laundering money is called __________.

A

bank methods

38
Q

Masquerading is the __________ activity of computer system intruders and one of the most difficult to prove after the case goes to trial

A

most common

39
Q

False data entry(data diddling) is usually the simplest, ______ and most commonly used method

A

Safest

40
Q

The Trojan horse method is the ___________ of computer instructions so that the computer will tell a second computer how to perform illegal functions

A

secret placement or alteration

41
Q

The Trojan horse technique can be prevented in two ways: send line or block mode types of commands and _________can be placed in the computer to prevent all control character commands from being sent in terminal to terminal messages

A

logic filter

42
Q

Computer crime perpetrators rationalize that they were only harming a computer and not causing any loss to people or organizations

A

Robin Hood syndrome