Chapter 17 Flashcards

(43 cards)

0
Q

White collar crime is a “non violent crime for financial gain committed by means of deception by persons while occupational status is ________________ and utilizing their social occupational skills and opportunities”

A

entrepreneurial, professional, or semi professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Edwin Sutherland ,”a crime committed by a person of respectability and high social status in the course of his occupation”

A

White collar crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some of the most notable white collar crimes are insider trading money laundering confidence games and _________.

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corporate crime is a form of white collar crime whereby trusted executives working within a company mishandle funds or otherwise ___________ of customers or other consumers

A

betray the trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Motivations include ___________ or realizing personal wealth through mishandling funds.

A

gaining or increasing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of making illegally obtained funds appear legitimate. By which criminals evade paying taxes on illegal income by concealing the source and amount of profit, tax evasion in progress

A

Money laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Each _____ goes to different banks and purchases cashiers check in denomination of less than 10,000 checks are turned over to second person who facilitate their deposit into domestic or overseas banks

A

smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Company orders merchandise from a foreign subsidiary at an inflated price. The subsidiary deposits the difference between the inflated and actual price in a special off shore account

A

Double invoicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“The destruction, theft or unauthorized use modification or copying of information ,programs services ,equipment or communication networks

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of one person assuming the identity of an authorized computer user by acquiring items, knowledge or characteristics

A

Masquerading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

automated form of Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected

A

Salami techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are crimes that betray the trust of the victim

A

confidence games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In this scam a lot of losers pay few winners. Key is powerful acting between cons, makes victim feel left out unless they abide by conditions of the agreement

A

pigeon drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The treasurey department implemented the ___ requiring banks to export cash transactions of 10,000 or more

A

CTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An entire ________ to transform small denominations of currency to businesses, money market, deposits or real estate may take as little as 48 hours

A

“Wash cycle”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Money laundering techniques include bank methods,smurfing ,currency exchanges ,double invoicing and _______________.

A

acquisition of financial institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Established in 1990 is a multiagency support unit that analyzes intelligence information that develops suspects in money laundering schemes

A

FinCEN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Traffickers take their cash to a bank and conduct several transactions that usually involve trading currency of small denominations for larger ones. Common for cash to be exchanged for treasury bills, bank drafts ,letters of credit ,travelers checks or other monetary instruments

18
Q

There is no requirement to report bank method transactions because the BSA reporting requirements don’t pertain to __________.

A

interbank transfers

19
Q

Violations of criminal law that require knowledge of computers for their perpetration

A

Computer crimes

20
Q

Trojan horse ,logic bombs, and trap doors indicate different programming techniques designed to carry out the ___________.

A

unauthorized functions

21
Q

Computer crimes are largely investigative in nature using an estimated 90 percent traditional police work and _____ technical skill

22
Q

In 1986 Reagan outlawing illegal use of computers. Prohibits eavesdropping on electronic mail conversations on cell video conference calls computer to computer transactions

A

Electronic communications privacy act

23
Q

A compulsive computer programmer who explores tests and pushes the computer to its limits regardless of its consequences

A

Computer hacker

24
It involves changing data before or during their input to computers
Data diddling
25
Process of presenting sequentially changing information to an automated system to identify those items receiving a positive response
Scanning
26
Set of computer instructions that reproduces itself in computer programs when they are executed within unauthorized programs
Computer virus
27
Set of instructions inserted Ina computer program that looks for specific errors Ina computers normal functioning
Logic bombs
28
Programmers insert debugging aids that break security codes in the computer and then insert additional code of their own
Trap doors
29
Confuses the computer system making it unable to differentiate one job from another
Asynchronous attacks
30
This "Get Rich Quick" scheme can continue indefinitely but it actually "bubbles" and soon collapses because of sheer numbers involved
Pyramid scheme
31
In October 1986 with the passage of the ___________ organized crime members and many others have been charged and convicted of both tax evasion and money laundering
Money Laundering Control Act
32
The us secret service, us postal service, and _____ are among the principal federal enforcement agencies that share jurisdiction for investigation of these crimes
FBI
33
Confidence games include: The Pigeon Drop, the Bank examiner Scheme, pyramid scheme, travel scam, home repair scam, contest cons and _________.
Magazine subscription scam
34
Part of the problem the US has regarding money laundering activities is that US drug users are primarily ________ rather than producers of drugs
consumers
35
Money laundering process can take many forms including 1. Merging illicit money with a legitimate cash source which usually uses a business that generates large amounts of cash and _____________
using sophisticated international money laundering techniques
36
Money laundering techniques include bank methods, smurfing, currency exchanges, double invoicing, and _____________
Acquisition of financial institutions
37
The most common method for laundering money is called __________.
bank methods
38
Masquerading is the __________ activity of computer system intruders and one of the most difficult to prove after the case goes to trial
most common
39
False data entry(data diddling) is usually the simplest, ______ and most commonly used method
Safest
40
The Trojan horse method is the ___________ of computer instructions so that the computer will tell a second computer how to perform illegal functions
secret placement or alteration
41
The Trojan horse technique can be prevented in two ways: send line or block mode types of commands and _________can be placed in the computer to prevent all control character commands from being sent in terminal to terminal messages
logic filter
42
Computer crime perpetrators rationalize that they were only harming a computer and not causing any loss to people or organizations
Robin Hood syndrome