Transnational Crime, International Organization Flashcards

1
Q

Conversion or transfer of property knowing that such property is derived from a criminal offense, for the purpose of concealing or disguising the illicit origin or the property, or assisting any person who is involved in the commission of such offense, or offenses, to evade legal consequences of his action (UN definition).

A

Money Laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Often known as smurfing, this is a method of placement whereby cash is broken into smaller deposits of money, used to defeat suspicion of money laundering and to avoid anti-money laundering reporting requirements.

A

Structuring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This involves physically smuggling cash to another jurisdiction and depositing it in a financial institution, such as an offshore bank, with greater bank secrecy or less rigorous money laundering enforcement.

A

Bulk Cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In this method, a business typically expected to receive a large proportion of its revenue as cash uses its accounts to deposit criminally derived cash. Such enterprises often operate openly and in doing so generate cash revenue from incidental legitimate business in addition to the illicit cash in such cases the business will usually claim all cash received as legitimate earnings.

A

Cash-Intensive Businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This involves under or overvaluing invoices to disguise the movement of money.

A

Trade-based Laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trusts and shell companies disguise the true owner of money. Trusts and corporate vehicles, depending on the jurisdiction, need not disclose their true, beneficial, owner.

A

Shell Companies and Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to a person acting as the fictitious owner rather a business entity.

A

Rathole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Money is deposited in a controlled foreign corporation offshore, preferably in a tax haven where minimal records are kept, and then shipped back as foreign direct investment, exempt from taxation.

A

Round-Tripping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Money launderers or criminals buy a controlling interest in a bank, preferably in a jurisdiction with weak money laundering controls, and then move money through the bank without scrutiny.

A

Bank Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In this method, an individual walks into a casino and buys chips with illicit cash. The individual will then play for a relatively short time. When the person cashes in the chips, they will expect to take payment in a check, or at least get a receipt so they can claim the proceeds as gambling winnings.

A

Casinos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Money is spent on gambling, preferably on higher odds. One way to minimize risk with this method is to bet on every possible outcome of some event where there are many possible outcomes and no outcome(s) have short odds the bettor will lose only the vigorous and will have a “winning” bet(s) that can be shown as they so.

A

Other gambling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Someone purchases real estate with illegal proceeds and then sells the property. To outsiders, the proceeds from the sale look like legitimate income. Alternatively, the price of the property is manipulated: the seller agrees to a contract that under represents the value of the property, and receives criminal proceeds to make up the difference.

A

Real State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company may have unregistered employees without a written contract and pay them cash salaries. Dirty money might be used to pay them.

A

Black Salaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The recruitment, transportation, transfer, harboring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation.”

A

Human Trafficking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device. It is also a cybercrime to sell or elicit the above information online.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users’ computers. The hacker then hacks into the system once the network is down.

A

DDoS Attacks (Distributed Denial of Service Attacks)

17
Q

re networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these. It can also be used to act as malware and perform malicious tasks.

A

Botnets

18
Q

This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud.

A

Identity Theft

19
Q

This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically cyber stalkers use social media, websites and search engines to intimidate a user and instill fear

A

Cyberstalking

20
Q

Involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed.

A

Social Engineering

21
Q

This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.

A

Phishing

22
Q

On 1998 (Aseanapol) was established. The multinational Police force of ASEAN. It was established through the meetings of Chiefs of Police of its members, back in 1981 in Manila, Philippines from October 21 until October 23, 1981. The permanent secretariat was agreed on 2008 and began operations in 2010 in Kuala Lumpur, Malaysia.

A

ASEAN Chiefs of Police

23
Q

Is the European Union’s criminal intelligence agency. It became fully operational on July 1, 1999 and it only acts on request at present.

A

Europol

24
Q

The world’s oldest and largest non- profit membership organization of police executives, with over 20,000 members in over 80 different countries. This organization leadership consists of the operating chief executes of international, federal, state and local agencies of all sizes.

A

IACP (International Association of Chiefs of Police)

25
Q

It began in 1923, and at the same time its name was International Criminal Police Commission. In 1956, its name became International Criminal Police Organization. Slowly, the name of this international organization became famous. Now, is the second biggest international organization; the United Nations is the first.

A

Interpol

26
Q

The League of Nations was the international organization responsible for ensuring peace and cooperation between world nations. It was founded in 1919 “to promote international cooperation and to achieve peace and security”.

A

UN ( United Nations )

27
Q

The term _______ was coined in 1942 Winston Churchill and Franklin Roosevelt.

A

United Nations

28
Q

This is the main decision-making and representative assembly in UN through its policies and recommendations.

A

US General Assembly

29
Q

The most powerful branches in the organization. It has power to authorize the deployment UN member states militaries, can mandate a ceasefire during conflicts, and can enforce penalties on countries if they do not comply with given mandates.

A

UN Security Council

30
Q

Located in The Hague, Netherlands. This branch is responsible for the judicial matters of the UN

A

International Court of Justice

31
Q

Is a branch that assists the General Assembly in promoting economic and social development as well as cooperation of member states.

A

The Economic and Social Council

32
Q

The branch of UN headed by the Secretary General. Its main responsibility is providing studies, information, and other data when needed by other UN for their meetings

A

Secretariat