CRIJ 4365 White-Collar Crime

¡Supera tus tareas y exámenes ahora con Quizwiz!

Commodities fraud:

"Fraudulent sale of commodities investments"

Mortgage fraud:

"intentional misrepresentation to a lender for the purpose of obtaining a loan that would otherwise not be authorized" Mortgage fraud has been steadily increasing. Not all mortgage fraud is classified as white-collar crime (i.e. consumers scamming banks for gain)

10 Top Cybercrimes:

(10.) Royal bank of Scotland WorldPay Heist. In 2008 hackers accessed RBS accounts & increased withdrawal amounts to steal over $9 million. Clone cards were used on 2,100 ATMS across the world in a 12 hour attack (09.) Vitek Boden. Boden hacked Australian sewer systems & dumped 250M tons of waste into rivers. Over two months he destroyed ecosystems in revenge for a rejected job application. (08.) LA Traffic Signal Attack. During a strike two engineers hacked LA's road signal network & adjusted traffic controls. Areas were paralyzed over the 4 days it took officials to regain control. (07.) South Carolina Data Theft. Hackers stole data from 75% of S. Carolina's population from State Dept. Computers. Leaks included 3.3m bank accounts & millions of kid's social security numbers. (06.) Iranian Nuclear Attack. In 2012 hackers targeting an Iranian nuclear plant caused computer networks to close down. It also caused computers to play AC/DC's 'Thunderstruck' at random intervals. (05.) MBA Application hack. In 2006 a hacker broke into college application systems & shared the hack online. Harvard identified & sent rejection letters to the 119 applicants who used the hack. (04.) Conficker. Microsoft offered $250K to identify the writer of this bot that infected 15m computers. The unknown hacker shut down 13,000 U.S. ATMs & grounded French fighter jets. (03.) Max Vision. Max Vision was sentenced to 13 years in prison after hacking 1.8m credit card numbers. He ran a forum selling data to ID thieves which led to $86.4m in fraudulent charges. (02.) The Slammer. 2003's Slammer virus blocked Seattle's 911 services & forced airlines to cancel flights. The virus multiplied in seconds & it took over $1bn to repair damages. (01.) Military Source Code Theft. A hacker accessed U.S. Navy source codes responsible for guiding missiles & satellites. Traced to Germany, their ID remains unknown. They stole 66% of the data.

Pump and Dumb scam

(Increase the price of stock by sharing false information before selling-dumping-the stocks) Manipulation of the market through aggressive buying/selling strategies

Retail crime

(Retail businesses are victims and perpetrators of WCC)

Crimes in the military-

(also known as "khaki-collar crime") instances where individuals enlisted in the military violate the rules governing their behavior.

Double-billing

(both taxpayers and corporations pay the bill)

Prearranged trading:

(collusion between brokers to fix the price)

Bait-and-Switch tactics

(e.g. Sales, Black Friday). Short weighting.

Crimes in the technological system and types of computer crime

(e.g. hacking, cracking, theft, etc.)

'Junketing'

(exotic trips at the expense of taxpayers)

Bucketing:

(take a position opposite of a customer's position)

Front running:

(take advantage of special knowledge to profit)

Overcharging

- employees charge customers more than they should

Power elite controls:

1. Decision-making & 2. Media. Financing of elections (Political action committees-PACs), Legalized bribery, Legislative lobbying

Securities and Commodities fraud:

A broad range of behavior designated to rip off investors. E.g. fraudulent activities related to stocks, bonds, and mutual funds

Slumlord as White-Collar Criminals

A slumlord is a landlord who profits from renting run down properties that they do not properly maintain

Hacking

A term used to describe those who have the skills to access various secure computer databases and programs but do so only out of a desire to experiment to see if they are able to access these programs

Theft

A type of computer crime refers to a variety of computer-related activities that result in the offender stealing something from the business. Items stolen include funds, information, and intellectual property.

Crackling

AKA crackers: individuals who crack into computer systems "with [the intent] to sabotage and cause chaos to [the] corporation" (Wiggins, 2002, p.20)

Rolling Stone magazine article 'The Dirtiest Cops in America' by Josh Eells.

About a Panama Unit that operated one of the most efficient drug-robbery rings in Texas, taking money from some dealers and traffickers while using their weapons and cars to rob others.

Financial corruption in elections

Acts defined in the past as corrupt have become legally accepted somehow Citizens United v. FEC (Federal Election Commission). Allowing corporations/unions to donate unlimited money to political campaigns

Crimes committed by restaurants against consumers:

Adulterating food. Failing to adhere to cleanliness standards . Using false advertising to describe goods and prices. Short weighing (is the use of ice a method to give less in a beverage?)

Bernie Madoff's case study

Bernie Madoff organized the largest Ponzi scheme in U.S. history, $65 billion were invested in Madoff's accounts, Investors would send Madoff money to invest, but he would just deposit the money in a bank account, Madoff's scheme lasted for 17 years, The scheme was able to last for so long because investors received positive returns and Madoff rarely shared information about accounts, Maddoff's ponzi scandal: https://www.youtube.com/watch?v=4xYkQnCUl5E

Auto repair frauds:

Billing for services not provided. Unnecessary auto repairs. Airbag fraud. Auto insurance fraud. Automotive sales fraud

Home repair fraud

Building contractors fraud. Home improvement fraud. Maintenance fraud. Unnecessary repair or overcharging frauds

Ponzi scheme red flags

Complicated trading strategies, Irregular investment paymentsUnique customer statements, Delays in withdraws and transfers, Promises of high returns with little risk, Overly consistent returns, Unregistered investments , Unlicensed sellers, Secretive strategies, Issues with paperwork, Difficulties receiving payments

Common crimes using the Internet:

Consumer fraud, scams, credit card fraud, identity theft, etc. 10 Notorious cybercrime: https://www.youtube.com/watch?v=moiaRn2WwPw 2012 virus "stop net"? Iranian nuclear plant attack.

Police corruption types

Corruption of authority, Kickbacks, Opportunistic theft, Shakedowns, Protection of illegal activities, Fixing cases, Direct Criminal activity, Internal payoffs, Sexual misconduct

Physical

Critical infrastructure vulnerable to cybercrime. Banking, energy services, government, defense industry, IT, etc.

Issues with cyber security:

Data framework Data collected about students, employees, administrators, research projects, etc. All these information is available in databases and it is a target from hackers

Retail Crime As offenders

Deceptive and fraudulent adverting (E.g. Expiration date issues). Adulteration of products

Economic Internal:

Detection, investigation, containment, recovering, etc.

Behavioral framework

Digital and internet piracy by students.

Phishing

Distribution of a large number of e-mails in an effort to scam someone

Phishing:

Distribution of massive email to lure people to reveal personal information Advanced fee frauds, fake reimbursements, fake lottery winnings, fake security warnings, etc.

Ponzi scheme:

Do not have investors recruit other investors Usually high returns are promised on the original investment. Those that scam investors by paying them from future investor's payments into the offender's scheme.

Crimes committed by employees against the restaurant:

Eating food without paying. Giving food or beverages away. Selling goods at a lower price. Removing items from restaurant for personal use. Stealing from cash register

Types of correctional officer misconduct:

Embezzlement , Drug smuggling, Coercion, Sexual misconduct, Transporting contraband

Theft crimes against the consumer

Embezzlement, forgery, and falsifying account information

Retail crime As victims

Employee theft & check/credit card fraud. Shoplifters & burglars

Typical Fraud by officials or institutions

Employees trying to recruit students to their college Traditional offenders organizing fraud rings (e.g. For profit-colleges taking advantage of veterans-GI Bill), Consultants assisting students in college applications for a fee

The NPR podcast 'A closer look at how corporations influence congress'

Eric Lipton, an investigative reporter for The New York Times, has been writing about how corporations work in opaque ways to shape debates. He also explains the revolving door between Congress and lobby groups, and how non-profit think tanks aren't always what they seem.

Cyber gangs

Expertise on IT, Online reputation, Profit and information, no violence. Such as the cyber gang anonymous

Student loan fraud (main patterns)

Federal and state laws provide and regulate student aid such as grants or loans

Conflicts of interests

Finance and corporate industries spend millions lobbying members of Congress Tax breaks, bailouts, deregulation, lax, or no legislation Governor of New Jersey, Christ Christie

Employee theft in the retail system

Financially orientated offenses committed by individuals in the context of a legitimate occupation. Crime in and by small businesses

General prevention strategies

Firewalls and encryption, Employee-based strategies, Involve employees in the fight against computer crime, Reward system for reporting crimes and updating virus software.

Fraud during closing/settlement:

Fraudulent activities that occur at the conclusion of a real estate business deal. Fraudulent activities: Kickbacks, failure to reveal settlement costs, overstating settlement costs and pocketing the difference . Increasing fees above promised amount

Hedge fund fraud:

Fraudulent acts occurring within hedge fund systems "Private investment partnership with high net worth clients" Hedge funds are not regulated by the SEC Money can be invested in any kind of securities Hedge funds managers receive a percentage of the returns instead of a fee Example: Hedge fund managers overstate the assets in a fund to trick their investors

These schemes rip-off investors by paying them from future investors' payments into the offender's scheme

Fraudulent investment strategy

Tax breaks, bailouts, deregulation, lax, or no legislation

Governor of New Jersey, Christ Christie. Squeezing off the judge from the orange.

Consequences of slumlord behavior include:

Health consequences, Financial consequences, Dehumanization, Emotional consequences, Decreased property values, social disorganization, Crime, Legislative consequences and grassroots effects.

Theft as computer crime:

Includes a number of computer-related activities where the offender steals something from a business Offenders can steal funds, information, and intellectual property

Economic External

Information loss, business disruption, damaged equipment, revenue loss

There are more rules to break in the military than in any other occupation

Insubordination, Desertion, Mutiny, Malingering, Foreign Enlistment, Treason

Police strategies

Law enforcement agencies become more involved in the response to computer crime. The creation of specialized units within agencies

There is a need for interdisciplinary collaboration in responding to cybercrime.

Law enforcement working with each other to succeed.

Role in the offense of cybercriminals

Lone wolf, Associations, Cyber mercenaries

Crimes by agents against the company

Lying about a client's income/assets in order to obtain coverage

Typical frauds by students:

Lying about intent to take classes, Obtaining loans with no intent to pay them back, Schemes or false strategies to enroll students in colleges, Providing false information to enhance qualifications, Dishonest strategies to charge students with fee for financial aid seminar.

Prevention Strategies for Mortgage Fraud

Mandatory reporting requirements, Better communication between the mortgage industry and law enforcement, A database of censored or debarred mortgage officials , Increased funding for preventing offenses , Assigning law enforcement responsibility to one specific Department of Justice office, Enhancing intergovernmental collaborations

Documentary: The Untouchables

Martin Smith investigates why the U.S. Department of Justice (DOJ) has failed to act on credible evidence that Wall Street knowingly packaged and sold toxic mortgage loans to investors, loans that brought the U.S. and world economies to the brink of collapse.

Fraud:

Misleading behavior in order to illegally obtain money from federal or state student loan programs

Legislative strategies

New laws to criminalize cyber criminals. The computer Fraud and Abuse Act of 1984. Prevention through education and information (e.g. detention, response, recovering)

Prevention strategies for Crimes in the insurance system:

Obtaining references. Using local businesses. Verifying multiple estimates. Using written contracts

Conspiracy appraisal

Occur when appraisers work with other offenders as part of broader mortgage schemes. Collaboration with other offenders as part of a larger scheme

Windshield appraisal

Occurs when appraisers fail to even go into the home to determine its value; the home's value is determined by appraisers looking through the windshield of their automobile.

Foreign Exchange fraud:

Occurs when brokers or other officials induce "victims to invest in the foreign currency exchange market" by using fraudulent methods

Builder initiated fraud:

Occurs when builders engage in behaviors that are intended to defraud the lender or buyer

Unauthorized access:

Occurs when individuals break into various computer databases that they do not have legitimate access to (Hacking by Hackers)

Problems responding to computer crimes

Offenses happen quickly (hit and run offenses), Computer crimes are often international in scope, which makes it hard to determine where the crime originated, Victims often do not know they have been victimized right away, Signs of crime are constantly changing, Offenders go to great lengths to cover crimes, Many criminal justice officials are not trained to respond to this type of offense, It is hard to identify potential victims.

Patterns of mortgage fraud

Offenses involve huge dollar losses, Mortgage Fraud cases often occur over long periods of time. Mortgage fraud is distributed differently across the country. Top states for concern are Florida, New York, California, Arizona, and Michigan as well as major urban setting such as Miami, LA, NYC. Very few criminological studies have focused on mortgage fraud

Factors that contribute to judicial misconduct:

Office authority, Heavy caseloads, Interactions with others in judicial process

Inflated appraisal

Overestimate the value of a home in order to allow it to be sold at an inflated price.

Networks used to commit the cybercrime

Perps work together with other cybercriminals, Familiarly with networks, Interconnection with multiple networks

Stacking

Persuading persons to buy more insurance polices than are needed

Rolling over

Persuading the customer to cancel an old insurance police and replace it with a more expensive "better" policy

Government officials engaging in illegal or improper activities for personal benefits

Political extortion, Bribery, Illegal gratuities, Illinois case (Rod Blagojevich)

Patterns surrounding investment fraud

Press attention, Greed, Increasing punitiveness, "White Collar gangs", Multiple offenses, Regulatory changes, Negative consequences

Judicial misconduct trends

Pressuring jury for verdict, Private communication with jurors, Improper influence, Comment on pending case, Failure to ensure rights, Receiving gifts, Improper courtroom decorum, Illegal activities on/off bench, Abuse of sanctions, Bias/appearance of bias, Misuse of court resources, Abuse of authority, Allegations of judicial misconduct rose during the early 1990's

Organized crime

Prostitution, gambling, money laundering, etc.

Is Herbalife an American dream or a pyramid scheme

Pyramid Scheme. See definition for Pyramid Scheme.

Factors involving these crimes in sales-related crimes:

Rationalization to explain illegal behavior. E.g. 'I've been exploited by the company, it's to compensated low wages'. Young employees more likely to commit these crimes. Dissatisfaction with employment conditions or about to leave the job soon

Futures trading fraud:

Refers to fraud occurring in the trading of futures contracts and options on the futures trading market

The Guardian article; 'Ferguson judge accused of misconduct due to aggressive fine'

Ronald J Brockmeyer, who is accused of fixing traffic tickets for himself and associates, was a driving force behind using fines and fees to generate revenue

Chunking:

Situations where investors buy multiple properties without informing the bank about the other properties

Market manipulation:

Situations where officials do things to artificially raise trading volume.

Broker Fraud:

Situations where stockbrokers do not meet their legal obligations to investors Omitting key information to investors Broker embezzlement

High yield investment schemes:

Strategies that promise investors low risk or even no risk, when the funds are not invested or backed.

Video: Crimes against the elderly

Talked about contractors taking advantage of the elderly by overcharging them or making them believe they need repairs when they don't.

The role of computers in crime:

Target of the offense, Tool for the crime, Incidental to the crime

Social

Taxpayer's money wasted; disruption of everyday life, fear of victimization, damage to city infrastructure (water system, airports, traffic system, hospitals, and crucial database).

Addressing employee crime through the use of

Technology (e.g. cameras, surveillance, policing between competing companies)

Documentary: Inside Job

The global financial meltdown that took place in Fall 2008 caused millions of job and home losses and plunged the United States into a deep economic recession. Matt Damon narrates a documentary that provides a detailed examination of the elements that led to the collapse and identifies keys financial and political players. Director Charles Ferguson conducts a wide range of interviews and traces the story from the United States to China to Iceland to several other global financial hot spots.

Understand and explain the line/differences between a 'bribe' and a campaign contribution

The line between bribery and illegal gratuities has to do with intent. In bribery cases, authorities must prove that the official intended to provide political favors in exchange for some item, good, or service. In illegal gratuity cases, the official simply received something that they were not supposed to receive.

Crime in the hotel industry:

Theft of food. Theft of hotel items. Theft of guest's items

Investment focus crimes

To get consumers to buy/invest in insurance products. E.g. Promissory note fraud

Awareness strategies:

To increase employee awareness about issues surrounding employee theft. Anonymous tip lines, new hire orientations, and loss prevention programs

Organizational culture strategies:

To promote a sense of attachment and commitment to the workplace (build loyalty and encourage honesty)

Deflated appraisal

Underestimate the value of the home in order to force the seller to lower the home price.

Tax Evasion:

Underreporting income. Keeping two sets of books. Claiming false deductions. Overstating deductions & wage theft (e.g. Restaurants)

Students and computer crimes (major patterns) *not too sure about this one*

Universities are not excluded from cybercrime

Pyramid:

Unsustainable business scheme

Judicial misconduct

When a judge violates the rules of impartiality or engages in unethical behavior

Sliding

When agents include insurance coverage that was not requested by the customer

Sales-directed crimes

When brokers or agents steal through fraudulent sales tactics (p.58)

Investment fraud:

When consumer investments are managed or handled fraudulently by stock brokers or other officials in the economic system

Insider trading:

When individuals share or steal information that "is material in nature" for future investments. Information must be significant enough to affect the company's stock price

Flipping:

When offenders buy and resell properties at inflated prices

Apolitical white-collar crime-

When politicians get into trouble for actions outside the scope of politics (i.e. sex scandals)

Qualifications fraud:

When professionals lie about a buyers qualifications in order to obtain a loan to buy a home. Income, collateral, property value. Assets, employment status, length of employment . Professionals often misrepresent a client's income, employment, and/or occupancy intentions.

Factors that contribute to theft in restaurants:

Workers tend to be younger. Workers are paid low wages. Workers are mainly part-time employees. Irregular hours provide more opportunities for deviance/crime

Extortion

a criminal act that occurs when a person obtains money, goods, or a desired behavior from another person through violence or threats.

Computer crime refers to

a variety computer-related behaviors that are illegal or otherwise harmful Hacking, cracking, phishing, extortion, Child pornography, fraud, identity theft, cyber bulling, etc.

Extortion can be considered

a white-collar crime if performed non-violently through a business or professional setting.

Builder bailout schemes:

builders offer excessive incentives to buyers, but conceal these offers from the lender to create the appearance that the property is worth more than it actually is

Structural changes:

businesses and society have dramatically increased their reliance on computers, which provides more opportunities for computer crime

Foreign friendly civilian crimes:

committed against civilians of another country (i.e. property or personal crimes)

Enemy Civilian social system crime:

committed against residents of countries the military is currently at war with (i.e. looting)

Extra-occupational crimes:

committed against the American civilian social system (i.e. property of personal crimes)

Inter-occupational crimes:

committed against the enemy military system (i.e. torture)

Entertainment/services system is the setting where

consumers purchase various services designed to entertainment. Major industries: The restaurant and hotel industry

Virus introduction:

crackers typically introduce viruses for recreational reasons, pride, profit, protection, or cyber-terrorism reasons

Intra-occupational crimes:

crimes committed against the American military system (i.e. theft of military property)

Peer associations:

crimes occur because the offender is associated with peers who may be more likely to commit computer offenses

Consequences of Police Corruption:

diminished effectiveness, demoralization in department, and barriers between officers and communities.

It is estimated that approximately 90% of allegations of judicial misconduct are

dismissed

Soft money

donations (to promote issues, not candidates). The line between a 'bribe' and a contribution has become blurred in many cases

Estimations suggest that 90% of crime in hotels is a result of

employee theft

Shortchanging-

employees do not give the customer all of the change they are due and keep the difference

Sweetheart deals-

employees provide friends and family members unauthorized discounts

Coupon stuffing-

employees steal coupons and use them later on

Theft of goods:

employees steal items from the retail system

Theft of production supplies and raw materials-

employees steal materials used to produce the goods for sale in the retail store

Embezzlement-

employees steal money from an account they have access to

Theft of money from the cash register-

employees steal money out of the cash register

Churning:

excessive selling of the same property in an effort to gain from the fees and commissions associated with the repeated sale of the property.

Individual victims:

financial ruin and emotional stress

Businesses as victims:

financial ruin, business failure, morale problems, and loss of jobs

Opportunity explanations:

focus on how easy computer crimes are committed Offenses are easy to commit for those who are familiar with technology and an offense can target many victims simultaneously

Officials must decide whether or not to

force tenants out of homes and possibly become homeless or do nothing and allow slumlord activities to continue.

Pump-and-pay schemes:

fraudulently increasing a property's value and then collecting money from the equity.

These crimes, sales related, go beyond the low ranks to include

high-level executives in companies. Reluctance to report crime due to bad publicity, long term trials, and potential lawsuits.

Herbalife, American Dream for sale?:

http://abcnews.go.com/Nightline/video/herbalife-investigation-part-american-dream-sale-23449013

The Herbalife case study

http://abcnews.go.com/Nightline/video/herbalife-investigation-part-american-dream-sale-23449013

Mortgage fraud exposed:

https://www.youtube.com/watch?v=RJjmnAlkl6g

Not all the "computer wrongdoing" is

illegal (e.g. Face-booking while working). Legal changes are being made to better respond to computer crimes.

Foreclosure rescue scams:

illegal activities designed to use future foreclosures as a component of offense. Illegal activities include: arson, unknown bankruptcy fillings, advanced fee frauds, and stimulus fraud.

Internet crimes:

include a variety of crimes that are committed by offenders through the internet

Real estate market as a victim:

increased rates/fees and difficulties determining home values

Crackers:

individuals that "crack" into computer systems in order to sabotage and create chaos within a particular corporation or business

Fine line between mistake and

misconduct

Consumer fraud victimizes the

most vulnerable sector in society: Poor, illiterate, needy people, students, women, immigrants, undocumented workers, elderly.

The insurance system encompasses the

numerous agencies and institutions responsible for providing insurance coverage.

Reverse mortgage fraud:

occurs when homeowners over the age of 62 sell their home back to the bank, but are allowed to continue to live in it until they pass away. Fraudulent activities include: Charging for free information, misrepresenting re-loan counseling. Forgery, posing as government officials, and bundling unnecessary services

Fraud-for-profit:

occurs when offenders commit fraud for financial gains. Industry insider fraud. Multiple participants who commit a series of fraud over time. E.g. Appraisers, real estate professionals, financial advisors, closing attorneys, etc.

Fraudulent loan origination:

occurs when professionals help buyers falsely qualify for a loan

Luxuries trips

paid by wealthy donors disguised as fund-raising events

Commodities are

raw materials such as gas, oil, and other tangible products

Pyramid schemes:

recruit investors by promising them profits in exchange for recruiting other individuals into the scheme

Software crime:

refers to situations when computer software is a key component of the offense Types include: theft of software, counterfeiting software, copyright violations, and piracy

Fraud in the sales system include cheating customers through

repair service businesses

Insurance fraud is

seldom studied because it is difficult to understand and identify. People frequently do not realize they have been a victim of insurance crime

Advanced fee fraud:

situations where investors are promised certain actions/services in exchange for an upfront fee and those actions/services are not provided.

States have passed criminal laws to

target home repair fraud. These laws provide clear guidance for how cases should be processed

The Uniform Residential Landlord and Tenant Act requires

that homes must be inhabitable, up to code, safe, and capable of providing necessary utilities.

Two types of crackers exist:

those inside the company and those outside the company.

Some members of congress engage in behavior that could be defined as

unethical or nearly criminal. Use their official status for personal privileges

Communities as victims:

vandalism of abandoned properties, increased disorganization in community, increase in conventional crime rates, and raised property taxes

Appraisal fraud:

when appraisers lie about a home's value

Faulty credit enhancements:

when builders make it appear that the buyer has better credit than they actually do.

Straw buyer fraud:

when individuals purchase a home they do not plan on living in and then deed the home over to another person.

Equity skimming/equity fraud:

when investors convince homeowners to use the equity in their home to hire the investor to buy the home. Fraud has occurred when the investor defaults on the mortgage

Liar Loans:

when investors lie about loans they currently have or are attempting to obtain

Fraud-for-housing:

when offenders commit fraud in order to secure a loan to buy a house

Police corruption-

when officers violate social trust and abuse their authority

Short sale fraud:

when parties involved in a short sale manipulate the process in order to convince the bank to allow the short sale to occur.

Retail system is

where consumers purchase an assortment of products. it relies on employees to perform successfully. Retail workers guide the direction of the retail system

Home Improvement scams:

where real estate agents or investors hide issues with a home


Conjuntos de estudio relacionados

OBHR 3330 Exam 3- Quiz's & Notes Ch. 8-10.

View Set

ma maison presentation questions

View Set

rn 400 week 5 hw: generalized anxiety disorder

View Set

intermediate accounting 2- final exam

View Set