Intro Cyber Crime 5 and 6
Traditional money laundering techniques include all of the following except which one. Transformation of hard currency to real property or merchandise "Smurfing" Electronic transfer of "e-cash" Physical transport of cash from one location to another
Electronic transfer of "e-cash"
Which crime is essentially a theft in violation of trust?
Embezzlement
__________________ has its roots as an elementary and basic tradecraft.
Espionage
T/F According to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud, the average time between getting hired and starting fraud is just under 8 months.
False
T/F Bitcoins are not an anonymous form of electronic payment.
False
T/F Espionage as a Service actors are usually better trained and better financed than state actors and typically do not leave forensic traces of their activities.
False
T/F Experts can easily calculate the amount of money laundering that occurs in the United States each year.
False
T/F Historically, embezzlers were persons of high social status.
False
T/F Identify theft complaints are continually rising each year.
False
T/F Identity crimes are easy to prosecute once detected.
False
T/F Many technically elite embezzlers are motivated by financial problems.
False
T/F The Computer Fraud and Abuse Act of 1986 is the first federal act to define and enforce penalties for trade secret theft.
False
T/F The U.S. Treasury Department's Financial Crimes Enforcement Network's (FinCEN) main goal is to prosecute money launderers.
False
T/F The primary avenue of redress for corporations seeking to litigate charges of corporate espionage is the criminal courts.
False
T/F To date, no one has been sentenced under the Economic Espionage Act.
False
Deceptive practices involving the use of capital to create more money is known as:
Investment fraud
Which is the largest organized crime group in the world?
Japanese Yakuza
Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?
The actual prosecution of money-laundering cases
Which of the following is NOT a characteristic of the modern embezzler? The embezzler has a fiduciary relationship with the victim. The embezzler is motivated by a desire for a more affluent lifestyle. The embezzler possesses specialized skills required to use computer systems. The embezzler is limited by the physical nature of the theft act.
The embezzler is limited by the physical nature of the theft act.
T/F The advent of large-scale computerized databases in the financial services field has made embezzlement a more technically oriented crime requiring more sophisticated knowledge than was the case 30 years ago.
True
T/F The first cyber-related attack on the United States occurred in 1870 on the electronic phone system.
True
T/F The most prevalent form of online auction fraud is nondelivery of goods.
True
T/F The profiles of individuals at the higher levels of drug trafficking and cybercrime share common personality traits.
True
Losses from insider fraud are primarily due to:
misappropriation of cash and/or noncash assets by employees.
According to CERT the primary reason for an act of sabotage is:
unmet expectations.
Neutralization techniques" may be defined as: ways that Internet fraud perpetrators overcome shame and guilt associated with fraud schemes. techniques that money launderers use to "smurf" ill-gotten cash. ways that embezzlers overcome lingering shame associated with the crime of embezzlement. enforcement practices associated with stopping acts of corporate espionage.
ways that embezzlers overcome lingering shame associated with the crime of embezzlement.
T/F Opportunities for identity crimes have increased primarily because consumers are increasingly asked to use their social security numbers as a personal identifier.
True
T/F Organized cartels use social media sites to collect intelligence about their targets.
True
T/F Research has shown that corporate insiders engage in most acts of corporate espionage.
True
T/F Technology has made it easier for money launderers to move money in a series of transactions over a short period of time.
True
T/F The Russian Business Network focuses on criminal cyber activities full time.
True
The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?
$10,000
The first documented case of industrial espionage occurred in the:
1700s
During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?
1960s
A recent study by the United Nations estimated that over ________________ percent of all cybercrime worldwide was perpetrated by organized crime associations
80
The U.S. Department of Commerce has estimated that employee theft played a role in ________ of business failures.
95%
Which of the following best describes the Tor Network?
A secretive online world that where real-time illegal transactions take place
Corporate espionage schemes may target which of the following? Customer lists All of the above Research and development data Product specifications
All of the above
When insiders conspire with or are recruited by outside organized crime groups, the fraud is typically related to: Financial gains resulting from data manipulation Financial gains resulting from system manipulation Bulk exfiltration of data to the outsiders All of the above
All of the above
Which of the following has increased the occurrence of corporate espionage in the last few decades? The constant use of e-mail as a means of intra-office communication Global commerce conducted over the Internet All of the above Corporate community's increasing use of information and technology to conduct business
All of the above
Which of the following is NOT a milestone of fraud cases according to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud? Applying for a job at the target company Getting hired by the target company The target company detecting fraud The target company reporting the fraud
Applying for a job at the target company
According to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud, what is the average time between beginning fraud and the company detecting the fraud?
Approximately 32 months
Which organized crime enterprises have traditional clan structures?
Balkan criminal enterprises
Which of the following is an example of sabotage? Yonggang's misappropriation of Dupont's trade secrets Hitachi's acquisition of the IBM Adironack Workbooks Cecere's removing, modifying, and mistranslation of numerous documents concerning organized crime investigations All of the above
Cecere's removing, modifying, and mistranslation of numerous documents concerning organized crime investigations
Which country has become the most active source of national and industrial espionage?
China
Which law has become the primary vehicle for the prosecution of Internet fraud crimes?
Computer Fraud and Abuse Act (CFAA)
The "Nigerian 419" scheme is primarily what type of computer crime?
Confidence scheme
_______________________ is the misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent.
Economic espionage
___________ is/are the most frequent type of consumer fraud complaint.
Identity theft
__________________ is the misappropriation of trade secrets related to or included in a product that is produced for or placed in interstate or foreign commerce to the economic benefit of anyone other than the owner.
Industrial espionage
_________________________ is the act of concealing the source of assets that have been illegally obtained.
Money laundering
Which country ranks second behind only the United States in losses associated with Internet fraud schemes?
Nigeria
___________________ is/are the most widely reported type of Internet fraud.
Online auction fraud
Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?
Outsiders
_____________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information.
Phishing schemes
Which of the following is NOT a characteristic of the cybercriminal profile as described by the Cyberpunk Project? Limited use of alcohol and/or drugs College or self-educated Reserved in public Primarily female
Primarily female
Which of the following is NOT an example of an early cybercriminal activity? Russian hacker Vladimir Levin's $10 million theft from CitiGroup Ross Ulbricht's underground website Silk Road Theft of classified information on the U.S. military by Dark Dante Kevin Mitnick's attack on the U.S. phone system
Ross Ulbricht's underground website Silk Road
Which of the following is NOT a country associated with Balkan criminal enterprises? Albania Russia Croatia Bulgaria
Russia
Which of the following is NOT an inherent weakness early cybercriminals exploited in computer systems and networks? Poorly coded applications accessible through the Internet Library access controls on systems attached to the globally connected Internet Salami slicing Poor process controls that did not consider reviewing application or system error logs
Salami slicing
The _________________ is an underground website named after a great East-to-West trade route.
Silk Road
Which of the following is NOT a low-tech means identity thieves use to steal personal information? Direct theft of mail Skimming devices Shoulder surfing Dumpster diving
Skimming devices
T/F According to the U.S. Department of Commerce, employee theft costs U.S. businesses almost a billion dollars per week.
True
T/F Cybercrime is an evolved state of traditional crime.
True
T/F Espionage as a Service is not like traditional corporate espionage where one company targets a competitor.
True
T/F Experts believe that the establishment of consumer awareness and monitoring programs is the most viable avenue toward thwarting the growth of identity theft.
True
T/F Fraudsters primarily use company data to commit identity theft, insurance fraud, and embezzlement when working alone or with other internal co-conspirators.
True
T/F In fraud crime involving management-level employees, average losses are higher than in lower-level employee crimes.
True
T/F Many fraud schemes committed over the Internet are simply new takes on old schemes.
True
T/F Most U.S.-based Middle Eastern criminal enterprises are found in Illinois, Ohio, New Jersey, and New York.
True
T/F Nigerian fraud schemes cost the United States an estimated $1 billion to $2 billion each year.
True