CHAPTER Q Flashcards
Bank secrecy act
A federal law passed in 1970 to require reporting of large scale case transactions
Bank examiner scheme.
A criminal scheme when con artists pose as FBI agents, bank examiners , police officers , detectives , or bank officials. The victim is then contacted by them pretending to need help in conducting an investigation
Computer crime
A violation of criminal law that requires some knowledge of computers for perpetration
Computer hacking.
A compulsive computer programmer who explored , tests, and pushes the computer to its limits. Regardless of the consequences
Computer virus
A set of illegal computer instructions designed to ruin computer hardware or software while reproducing itself in the computer program when it is executed
Confidence game
The criminal practice of gaining the confidence of a would be victim for the sole purpose of swindling money from them
Corporate crime
White collar crime where a group of executives working within a company mishandle funds or otherwise betray the trust of customers.
Currency exchange
A brokerage house for facilitating movement of illicit money
Cybercrime
The destruction , theft , or Unauthirized use or copying of information , programs , services , equipment , or communication networks.
Cyber extortion
When a computer criminal extorts money from a victim
Data diddling.
Double Invoicing
Flooding.
10
- False data entry.
- A company orders merchandise from a foreign subsidiary at an inflated price
- Over saturating entire regions with drug money is one of the more sinister types of drug related crime
Hardware.
Logic bomb.
Masquerading
- The physical computer and anything associated with it.
- A set of instructions inserted into a computer program that looks for specific errors in s computers normal functioning.
- The process of one person assuming the identity of an authorized computer user by acquiring the victims items , knowledge , or characteristics.
- Money laundering
- Pigeon drop.
- Pyramid scheme.
- Salami technique
- Process where illegally earned cash is made to appear legitimate
- A commonly used confidence game. 2 cons find bag of money. And victim puts up money.
- A commonly used confidence game. Pyramid of players give money up the ladder till it collapsed
- An automated form of the Trojan horse method where small amounts of assets (money) are taken from specified accounts or sources and where the whole appears to be unaffected.
- Scammers.
- Scanning.
- Smurfing.
- Criminals who defraud. Attempt to obtain prescriptions for controlled drugs.
- Procedure used in computer crime whereby the criminal presents sequentially changing information to an automated system to identify those items receiving a positive response.
- When money launders go to different banks and purchase cashiers checks for under 10,000$ for the purpose of bypassing the reporting requirements
- Super zapping.
- Trap doors.
- Trojan horse.
- White collar crime
- A macro program used in most IBM mainframe computer centers as a systems tool that enables thrives to tinker with the program so that checks can be issued to their private accounts
- Technique of inserting debugging AIDS that break security codes in the computer and then insert an additional code of their own.
- A criminal computer program that automatically transfers money to an illegal account whenever a legal transaction is made
- A non violent crime committed for financial gain by means of deception
Examples of white collar crimes 4
- Insider trading
- Money laundering.
- Confidence games.
- Computer crimes
- What is the most popular confidence game con
2. What is the oldest confidence game con
- The pigeon drop
2. The pyramid scheme
What are examples of confidence game cons
- The pigeon drop.
- The bank examiner scheme.
- The pyramid scheme.
- Travel scams.
- Home repair scams.
- Contest cons.
- The magazine subscriptions scam.
Who are prime targets for fraud and scams.
The elderly
- What companies are commonly used to launder money
2. Who will launder money
- Fortune 500 companies.
2. Criminals in all segments of society
- What is the underlying conduct of money laundering. Which is the crime
- What are the two ways to launder money.
20
- Tax evasion and violation of the bank secrecy act.
- Move the money outside the United States and bring it back.
- Channel it through various businesses
- How many different ways to launder money.
2. How long does it take to launder money into a legitimate business. “ the wash cycle “
- Limited to the traffickers imaginary in and cunningness.
2. As little as 48 hours.
- Money laundering methods include. 5.
- Bank methods.
- Smurfing.
- Currency exchanges.
- Double invoicing.
- Acquisition of financial institutions.
- What’s the most common method for laundering money
2. What is the biggest problem for traffickers laundering money through banks.
- The bank method.
2. The initial deposit of currency into the banks