SRA211 // Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How the police catch money laundering criminals

- Bank Secrecy Act - Money Laundering Control Act - U.S. Treasury Department's Financial Crimes Enforcement Network (FinCEN).

What is the Internet Fraud Schemes Federal Law?

- Computer Fraud and Abuse Act ("CFAA") - how computer fraud schemes are prosecuted

methods for stealing people's identity

- Dumpster diving - people go through trash to find personal information left on bills, etc. - Direct theft of mail - Shoulder surfing - "eavesdropping" on people to get personal information - Hacking information from corporate databases - Bribing of employees who have internal access to customer identifiers - Skimming devices- can be attached to an ATM and steal information about people

Internet Fraud Schemes

- fraud schemes committed over the internet - also called Confidence schemes - many through email

Money Laundering

- hiding the source of money that has been illegally obtained - try to make the money look like it is legal

Trade Based Money Laundering (TBML)

- money is laundered through the physical movement of goods around the world - organized crime uses this system

Why is it harder to embezzle today?

- more information is online and fewer people have the skills to access the information they need and hide what they are doing

why has corporate espionage increased?

- more valuable information is now on computers and people can access it if they know how - there is more global commerce on the internet also

examples of white collar crime

- public corruption - money laundering - bank fraud and embezzlement - fraud against the government - election law violations - health care fraud - mortgage fraud - financial institution fraud, mass marketing fraud

Money Laundering Control Act

- requires banks and other financial institutions to report any suspicious banking transactions - the amount of money in the transaction does not matter

identity theft

- someone uses someone else's identity illegally - most frequent type of consumer fraud

Corporate Espionage

- stealing business information through spying or deception - using the information stolen to benefit yourself or a competitor of the company

embezzlement

-when someone has access to money, property or something of value that is not theirs and they use it for their own personal use -it is usually a crime that happens on the computer

examples of internet fraud

Financial institution fraud Online auction fraud Nigerian 419 scheme Phishing/Email scams

Online auction fraud

When an item purchased through an online auction is never delivered after payment, or the item is not what the seller says it is - example - EBAY

Phishing/Email scams

people are lured/hooked to visit a fraudulent website where they give their personal information

Nigerian 419 scheme

people send money and are promised to get more money back but they never do


Set pelajaran terkait

chapter 15 - human resource cycle

View Set

Bible Bowl 2017 - Revelation Chapter 17

View Set

4801 Adaptive Quizzing Review (Cardiac)

View Set

Ch 11: State Laws, Rules, and Regulations

View Set

Feminist Art/Postmodern Art&Contemporary Art as Political Weapon/New Technologies in Art

View Set