cybercrime Ch. 6
The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?
$10,000
During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?
1960's
Which country has become the most active source of national and industrial espionage?
China
Which law has become the primary vehicle for the prosecution of Internet fraud crimes?
Computer Fraud and Abuse Act (CFAA)
The "Nigerian 419" scheme is primarily what type of computer crime?
Confidence Scheme
Traditional money laundering techniques include all of the following EXCEPT which one?
Electronic transfer of "e-cash"
Which crime is essentially a theft in violation of trust?
Embezzlement
________ is/are the most frequent type of consumer fraud complaint.
Identity Theft
Deceptive practices involving the use of capital to create more money is known as:
Investment Fraud
________ is the act of concealing the source of assets that have been illegally obtained.
Money Laundering
Which country ranks second behind only the United States in losses associated with Internet fraud schemes
Nigeria
________ is/are the most widely reported type of Internet fraud.
Online auction fraud
Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?
Outsiders
________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information.
Phishing schemes
Which of the following is NOT a low-tech means identity thieves use to steal personal information?
Skimming Devices
Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?
The actual prosecution of money-laundering cases
Which of the following is NOT a characteristic of the modern embezzler?
The embezzler is limited by the physical nature of the theft act.
"Neutralization techniques" may be defined as
Ways that embezzlers overcome lingering shame associated with the crime of embezzlement
Which of the following has increased the occurrence of corporate espionage in the last few decades? a. The constant use of e-mail as a means of intra-office communication b. Corporate community's increasing use of information and technology to conduct business c. Global commerce conducted over the Internet d. All of these
d. All of these
Corporate espionage schemes may target which of the following? a. customer lists b. product specifications c. research and development data d. all of these
d. all of these