CHAPTER Q Flashcards

1
Q

Bank secrecy act

A

A federal law passed in 1970 to require reporting of large scale case transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer crime

A

A violation of criminal law that requires some knowledge of computers for perpetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer hacking.

A

A compulsive computer programmer who explored , tests, and pushes the computer to its limits. Regardless of the consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer virus

A

A set of illegal computer instructions designed to ruin computer hardware or software while reproducing itself in the computer program when it is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidence game

A

The criminal practice of gaining the confidence of a would be victim for the sole purpose of swindling money from them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Corporate crime

A

White collar crime where a group of executives working within a company mishandle funds or otherwise betray the trust of customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Currency exchange

A

A brokerage house for facilitating movement of illicit money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybercrime

A

The destruction , theft , or Unauthirized use or copying of information , programs , services , equipment , or communication networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber extortion

A

When a computer criminal extorts money from a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data diddling.

Double Invoicing

Flooding.

10

A
  1. False data entry.
  2. A company orders merchandise from a foreign subsidiary at an inflated price
  3. Over saturating entire regions with drug money is one of the more sinister types of drug related crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware.

Logic bomb.

Masquerading

A
  1. The physical computer and anything associated with it.
  2. A set of instructions inserted into a computer program that looks for specific errors in s computers normal functioning.
  3. The process of one person assuming the identity of an authorized computer user by acquiring the victims items , knowledge , or characteristics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Money laundering
  2. Pigeon drop.
  3. Pyramid scheme.
  4. Salami technique
A
  1. Process where illegally earned cash is made to appear legitimate
  2. A commonly used confidence game. 2 cons find bag of money. And victim puts up money.
  3. A commonly used confidence game. Pyramid of players give money up the ladder till it collapsed
  4. An automated form of the Trojan horse method where small amounts of assets (money) are taken from specified accounts or sources and where the whole appears to be unaffected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Scammers.
  2. Scanning.
  3. Smurfing.
A
  1. Criminals who defraud. Attempt to obtain prescriptions for controlled drugs.
  2. Procedure used in computer crime whereby the criminal presents sequentially changing information to an automated system to identify those items receiving a positive response.
  3. When money launders go to different banks and purchase cashiers checks for under 10,000$ for the purpose of bypassing the reporting requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Super zapping.
  2. Trap doors.
  3. Trojan horse.
  4. White collar crime
A
  1. A macro program used in most IBM mainframe computer centers as a systems tool that enables thrives to tinker with the program so that checks can be issued to their private accounts
  2. Technique of inserting debugging AIDS that break security codes in the computer and then insert an additional code of their own.
  3. A criminal computer program that automatically transfers money to an illegal account whenever a legal transaction is made
  4. A non violent crime committed for financial gain by means of deception
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of white collar crimes 4

A
  1. Insider trading
  2. Money laundering.
  3. Confidence games.
  4. Computer crimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is the most popular confidence game con

2. What is the oldest confidence game con

A
  1. The pigeon drop

2. The pyramid scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are examples of confidence game cons

A
  1. The pigeon drop.
  2. The bank examiner scheme.
  3. The pyramid scheme.
  4. Travel scams.
  5. Home repair scams.
  6. Contest cons.
  7. The magazine subscriptions scam.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who are prime targets for fraud and scams.

A

The elderly

19
Q
  1. What companies are commonly used to launder money

2. Who will launder money

A
  1. Fortune 500 companies.

2. Criminals in all segments of society

20
Q
  1. What is the underlying conduct of money laundering. Which is the crime
  2. What are the two ways to launder money.

20

A
  1. Tax evasion and violation of the bank secrecy act.
  2. Move the money outside the United States and bring it back.
  3. Channel it through various businesses
21
Q
  1. How many different ways to launder money.

2. How long does it take to launder money into a legitimate business. “ the wash cycle “

A
  1. Limited to the traffickers imaginary in and cunningness.

2. As little as 48 hours.

22
Q
  1. Money laundering methods include. 5.
A
  1. Bank methods.
  2. Smurfing.
  3. Currency exchanges.
  4. Double invoicing.
  5. Acquisition of financial institutions.
23
Q
  1. What’s the most common method for laundering money

2. What is the biggest problem for traffickers laundering money through banks.

A
  1. The bank method.

2. The initial deposit of currency into the banks

24
Q
  1. What should be considered when dealing with computer crimes. 2
A
  1. Geographical constraints and boundaries are non existent.
  2. Timing of computer crimes happens in milliseconds
25
Q
  1. 4 ways computer crimes differ from traditional crimes
A
  1. Physical evidence in computer crimes is different
  2. The volume of evidence in computer crimes can be burdensome.
  3. Offenders can commit their crimes with ease
  4. Offenders can destroy evidence with ease
26
Q
  1. What are the 4 main categories or computer crime.
A
  1. The introduction of fraudulent records or data into s computer system
  2. Unauthirized use of computer related facilities
  3. The alteration or destruction of information or files
  4. The stealing of money , property , services or valuable data
27
Q
  1. The 6 typical forms of computer crimes
A
  1. Computer hacking.
  2. Scanning.
  3. Masquerading.
  4. False data entry.
  5. Trojan horses.
  6. Computer viruses.
28
Q

What is computer hacking

  1. Who is your typical computer hacker.
  2. What type of computer does this computer hacker use
  3. What type of crimes does a computer hacker take part in 2
  4. What does computer hacking involve.
A

Compulsive computer programmer who explores and tests a computers limits pushing its limits regardless of consequences

  1. A juvenile.
  2. A home computer with a telephone modem.
  3. Credit card fraud and mail orders.
  4. The destruction of valuable data. Causing massive expenses
29
Q
  1. Scanning.

2. What is scanning used for

A
  1. Process of presenting sequentially changing information to an automated system to identity items receiving a positive response.
  2. Obtaining passwords to computers and information , obtaining telephone numbers , credit card numbers
30
Q
  1. What is masquerading
  2. What is the most common computer crime.
  3. What is the most difficult computer crime to prove.

30

A
  1. Process of one person assuming the identity of an authorized user.
  2. Masquerading
  3. Masquerading
31
Q
  1. What is data didling
A
  1. False data entry
32
Q
  1. What is the Trojan horse

2. The Trojan horse is the primary method for inserting instructions for other viruses such as

A
  1. Method of secret placement of computer instructions so that a computer will tell a second computer how to perform illegal functions.
  2. Logic bombs , salami attacks , and viruses.
33
Q
  1. How can the Trojan horse virus be prevented 2 ways

2. How can a Trojan horse be detected.

A
  1. Using send -line or block-mode commands. Or placing a logic filter in the computer
  2. By comparing a copy of the operational program under SUSPISCION with the master copy
34
Q
  1. What is a computer virus
A
  1. A set of computer instructions that reproduces itself in computer programs when they are executed. May lay dormant for months
35
Q
  1. Computer program piracy.
A
  1. Piracy is the Unauthirized copying and use of computer programs in violation of copyright and trade secret laws
36
Q
  1. WHAT SHOULD BE CONSIDERED WHEN INVESTIGATING COMPUTER CRIMES. 4
A
  1. COMPUTER LANGUAGE MAY NOT BE UNDERSTOOD BY VICTIM.
  2. VICTIMS DEGREE OF COOPERATION.
  3. MIDWAY THROUGH THE INVET. THE VICTIM WILL SETTLE FOR RESTITUTION AND NOT PURSUE PROSECUTION.
  4. JURISDICTION.
37
Q
  1. WHAT IS THE MOST TYPICAL DEFENSE PLOY IN A COMPUTER CRIME CASE.
A
  1. THE ADMISSIBILITY OF EVIDENCE SEIZED.
38
Q
  1. WHAT SOURCES CAN PROVIDE EXPERT ADVISE FOR COMPUTER CRIME EVIDENCE. 5
A
  1. SYSTEMS ANALYSTS
  2. PROGRAMMERS WHO WROTE THE PROGRAMS
  3. STAFF WHO PREPARED THE DATA IN COMPUTER READABLE FORM
  4. TAPE LIBRARIANS
  5. ELECTRONIC MAINTENANCE ENGINEERS WHO MAINTAIN THE HARDWARE.
39
Q
  1. FACTORS TO CONSIDER WHEN DESCRIBING A PERSON COMMITING A COMPUTER CRIME. 6
A
  1. AGE
  2. SKILLS AND KNOWLEDGE
  3. POSITIONS OF TRUST
  4. ASSISTANCE
  5. DIFFERENTIAL ASSOCIATION
  6. ROBIN HOOD SYNDROME.
40
Q
  1. WHAT IS THE COMMON AGE OF COMPUTER CRIMINAL
  2. WHAT TYPE OF SKILL AND KNOWLEDGE.
  3. POSITIONS AT WORK
  4. ASSISTANCE.
  5. DIFFERENTIAL ASSOCIATION.
  6. ROBIIN HOOD SYSNDROME

40

A
  1. YOUNG AND COLLEGE EDUCATED, WENT TO UNIVERSITY WERE COMPUTER ATTACKS WERE CONSIDERED EDUCATIONAL.
  2. MOST AND HIGHLY SKILLED. HAVE JOB THEY ARE OVERQUALLIFIED FOR.
  3. MOST PERFORM CRIME WHILE AT WORK.
  4. USUALLY NEED ASSISTANCE, CAUSE MORE KNOWLEDGE IS REQUIRED.
  5. PEOPLE WORKING TOGETHER MAY ENCOURAGE EACH OTHER TO ESCALATE CRIME.
  6. RATIONALIZE BY SAYING WE ARENT HURTING PEOPLE ONLY COMPUTERS.
41
Q
  1. WHEN A PERSON HAS BECOME A SUSPECT FOR COMPUTER CRIME, WHAT SHOULD BE DONE NEXT.
  2. WHY, WHAT MIGHT THEY RELEASE.
  3. WHY WILL COMPUTER CRIMINALS TALK TO POLICE.
A
  1. THEIR ACCESS TO WORK COMPUTER SHOULD BE RESTRICTED.
  2. THEY MAY RELEASE LOGIC BOMBS AND DESTROY EVIDENCE.
  3. BECAUSE THEY DONT BELIEVE THE ACT IS CRIMINAL.
42
Q

VICE

A

GENERALLY ASSOCIATED WITH ORGANIZED CRIME. VICE CRIMES SUPPLY ILLEGAL GOODS AND SERVICES

43
Q

Bank examiner scheme.

A

A criminal scheme when con artists pose as FBI agents, bank examiners , police officers , detectives , or bank officials. The victim is then contacted by them pretending to need help in conducting an investigation