CHAPTER Q Flashcards
Bank secrecy act
A federal law passed in 1970 to require reporting of large scale case transactions
Computer crime
A violation of criminal law that requires some knowledge of computers for perpetration
Computer hacking.
A compulsive computer programmer who explored , tests, and pushes the computer to its limits. Regardless of the consequences
Computer virus
A set of illegal computer instructions designed to ruin computer hardware or software while reproducing itself in the computer program when it is executed
Confidence game
The criminal practice of gaining the confidence of a would be victim for the sole purpose of swindling money from them
Corporate crime
White collar crime where a group of executives working within a company mishandle funds or otherwise betray the trust of customers.
Currency exchange
A brokerage house for facilitating movement of illicit money
Cybercrime
The destruction , theft , or Unauthirized use or copying of information , programs , services , equipment , or communication networks.
Cyber extortion
When a computer criminal extorts money from a victim
Data diddling.
Double Invoicing
Flooding.
10
- False data entry.
- A company orders merchandise from a foreign subsidiary at an inflated price
- Over saturating entire regions with drug money is one of the more sinister types of drug related crime
Hardware.
Logic bomb.
Masquerading
- The physical computer and anything associated with it.
- A set of instructions inserted into a computer program that looks for specific errors in s computers normal functioning.
- The process of one person assuming the identity of an authorized computer user by acquiring the victims items , knowledge , or characteristics.
- Money laundering
- Pigeon drop.
- Pyramid scheme.
- Salami technique
- Process where illegally earned cash is made to appear legitimate
- A commonly used confidence game. 2 cons find bag of money. And victim puts up money.
- A commonly used confidence game. Pyramid of players give money up the ladder till it collapsed
- An automated form of the Trojan horse method where small amounts of assets (money) are taken from specified accounts or sources and where the whole appears to be unaffected.
- Scammers.
- Scanning.
- Smurfing.
- Criminals who defraud. Attempt to obtain prescriptions for controlled drugs.
- Procedure used in computer crime whereby the criminal presents sequentially changing information to an automated system to identify those items receiving a positive response.
- When money launders go to different banks and purchase cashiers checks for under 10,000$ for the purpose of bypassing the reporting requirements
- Super zapping.
- Trap doors.
- Trojan horse.
- White collar crime
- A macro program used in most IBM mainframe computer centers as a systems tool that enables thrives to tinker with the program so that checks can be issued to their private accounts
- Technique of inserting debugging AIDS that break security codes in the computer and then insert an additional code of their own.
- A criminal computer program that automatically transfers money to an illegal account whenever a legal transaction is made
- A non violent crime committed for financial gain by means of deception
Examples of white collar crimes 4
- Insider trading
- Money laundering.
- Confidence games.
- Computer crimes
- What is the most popular confidence game con
2. What is the oldest confidence game con
- The pigeon drop
2. The pyramid scheme
What are examples of confidence game cons
- The pigeon drop.
- The bank examiner scheme.
- The pyramid scheme.
- Travel scams.
- Home repair scams.
- Contest cons.
- The magazine subscriptions scam.