Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
44 Cards in this Set
- Front
- Back
Father of White Collar Crime |
Edwin H. Sutherland (1939) |
|
Main reason why white collar criminals always get caught |
Greed |
|
Most common form of corporate violence (via unsafe environmental practices) |
Poisoning the environment |
|
State statute for crime |
939.12--Crime is a conduct which is prohibited by state law punishable by a fine, imprisonment, or both |
|
state statute for party to a crime |
939.05--Whoever is concerned in the commission of a crime is a principal and may be charged with and convicted of the commission of the crime, although the person did not directly commit it and athough the person who directly committe d it has not been convicted |
|
Employee Theft |
The taking away of money or property from the workplace for personal gain |
|
Search Warrant |
Most legal and easiest way to get a ticket into a private zone |
|
Probable cause |
The modicum of evidence that allows a reasonable person to believe that a crime has been or will be committed |
|
Third party consent requirement |
Apparent equal authority over the property or area (must be of age) |
|
Bribery |
Most often associated with political corruption |
|
Malfeasance |
Doing something you are prohibited from doing |
|
Nonfeasance |
Failing to do something you are required to do |
|
Misfeasance |
Performing a permissable act in a proper manner |
|
Financial Crime |
Large-scale illegality that occurs in the world of finance and financial institutions |
|
Money Laundering |
The criminal practice of taking stolen money and moving it through a sequence of bank accounts so it looks like legitimate profits |
|
2008 |
Congress passed a bailout bill in this year |
|
1. Placement, 2. Integration, 3. Re-introduction |
3 necessary items for making money laundering successful |
|
25% |
Amount of computer crime reported to the police |
|
Internet Auction Fraud (ebay) |
The single most reported computer crime |
|
Internet Crimes Against Children |
ICAC |
|
Racketeer Influenced and Corrupt Organizations Act: two or more acts committed from a long list of crimes within 10 years |
Define RICO |
|
Career Criminal |
A professional criminal who engages in criminal activity regularly |
|
Fraud |
Stealing by deception |
|
Mortgage Fraud |
Fastest Growing form of white collar crime in the early 2000's |
|
$845 |
Average amount of $ extracted by telemarketing frauds per victim |
|
943.201 |
Statute for misappropriation of personal identifying information or personal identification documents |
|
Class H Felony |
Fine not to exceed $10,000, or 6 years in prison, or both |
|
Open credit card accounts (42%) |
Thieves most use personal information to? |
|
Investigative issues |
Involve a DA's office early if it's a complicated case |
|
Follow the paper trail/$$$ |
#1 investigative technique in white collar crime |
|
Static and Dynamic |
2 types of IP addresses |
|
Check Kiting |
When a bank account is opened with good funds and a rapport is developed with the bank. The actor then deposits a series of bad checks, but prior to their discovery, withdraws funds from the bank |
|
Home Improvement |
When an actor approaches a home owner with a very low estimate for a repair. Inferior/incomplete work is performed, and actor intimidates the victim to a pay a higher price than the original estimate |
|
Land Fraud |
Actor induces a victim to purchase tracks of land in some type of retirement development which does not exist |
|
Ponzi Scheme |
An investment scheme where the actor solicits investors in a business venture promising extremely high financial returns |
|
Pyramid scheme |
An investment fraud where an individual is offered a distributorship or franchise to market a particular product |
|
Bank Fraud |
To engage in an act or pattern of activity where the purpose is to defraud a bank or funds |
|
Computer Fraud |
Where computer hackers steal information sources contained on computers such as: bank information, credit cards and propriety information |
|
Credit Card fraud |
Unauthorized use of a credit card to obtain goods of value |
|
Embezzlement |
When a person who has been entrusted with money or property appropriates it for his or her own use and benefit |
|
Forgery |
When a person passes a false or worthless instrument, such as a check with the intent to defruad or injure |
|
Insider Trading |
When a person uses inside, confidential, or advance information to trade in shares of publicly held corporations |
|
Securities Fraud |
The act of inflating the price of stocks by brokers so that buyers can purchase a stock on the rise |
|
Welfare Fraud |
To engage in an act or acts where the purpose is to obtain benefits (public assistance, food stams,) from the state or federal government |