1/67
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
White Collar Criminals
THESE TYPES OF CRIMINALS DO NOT FIT INTO THE MOLD OF TRADITIONAL DEFINITIONS OF "CRIMINALS"
Embezzlement
THIS IS THE UNLAWFUL MISAPPROPRIATE FOR PERSON USE OF MONEY, PROPERTY, OR SOME OTHER THING OF VALUE THAT HAS BEEN ENTRUSTED TO AN OFFENDER'S CARE, CUSTODY, OR CONTROL
15th century English common law
EMBEZZLEMENT HAS BEEN RECOGNIZED SINCE...?
Not a high social status, usually committed by those engaged in managing financial affairs of societal elites
EMBEZZLEMENT IS COMMITTED BY WHAT CLASS OF PEOPLE?
Knowledge related to manipulation of large-scale computerized financial databases
THIS HAS BECOME THE PRIMARY TOOL OF THE MODERN EMBEZZLER.
Internal Perpetrator
AN EMBEZZLER IS ALMOST ALWAYS AN INSIDER, ALSO KNOWN AS A...?
•Traditional was often limited by physical nature; limit to how much cash could be stolen
•Modern may not require physical theft of anything
•Advent of technologically driven financial management techniques may have narrowed the pool of potential embezzlers to those individuals who possess the specialized skills required to use computer information systems
NAME A DIFFERENCE BETWEEN TRADITIONAL AND MODERN EMBEZZLEMENT.
Corporate Espionage
THIS IS ANY THEFT OF PROPRIETARY BUSINESS INFORMATION THROUGH SPYING OR DECEPTION, PARTICULARLY THE THEFT OF "TRADE SECRETS"
Embezzlement
THIS IS KNOWN AS THE "THEFT IN THE VIOLATION OF TRUST"
Computer-assisted crime
IS EMBEZZLEMENT A COMPUTER-ASSISTED OR COMPUTER-FOCUSED CRIME?
False. Oftentimes, modern embezzlers do not have financial issues, but simply wish to live a more affluent lifestyle.
TRUE OR FALSE: MODERN EMBEZZLERS TEND TO HAVE FINANCIAL ISSUES, WHICH IS THE REASON FOR THEIR CRIMES.
Trade Secrets
THESE MAY INCLUDE CUSTOMER LISTS, PRODUCT SPECIFICATIONS, R&D DATA, COMPUTERIZED SOURCE CODES, MEMORANDA DETAILING CORPORATE STRATEGIES, PRICING LISTS, ETC.
"insiders" in corporate espionage
have legitimate access to a company's computer networks, such as employees, IT personnel, or corporate executives
"outsiders" in corporate espionage
crack into a corporation's computer networks without any form of legitimate access rights.
insiders
85% OF ALL CORPORATE ESPIONAGE SCHEMES
ARE CARRIED OUT BY?
Domestic spies hired by corporate competitors
Foreign nationals hired by adversarial governments that wish to gain a competitive advantage over American firms
GIVE AN EXAMPLE OF AN "OUTSIDER" FOR CORPORATE ESPIONAGE.
Hired to perform specific, limited jobs, like database management or product introductions
Resemble temporary workers more than full-time employees, called "kites"
Lack of loyalty, or competitors may hire them based on their recent work history
PROBLEMS THAT HAVE COME FROM THE GROWTH OF INDEPENDENT CONTRACTORS.
Corporate community's increasing use of computer technologies to conduct business provides spies easier access to valuable proprietary information.
WHY HAS CORPORATE ESPIONAGE BEEN INCREASING?
Small businesses
WHAT ARE INCREASINGLY THE TARGET OF CORPORATE ESPIONAGE?
Manufacturing (24% of all attacks) Finance (19%) Services (17%) Government (12%)
THE MOST FREQUENTLY ATTACKED INDUSTRIES IN CORPORATE ESPIONAGE.
Economic Espionage Act of 1996
THIS OUTLINES THE SEPARATE OFFENSES FOR CORPORATE SPYING BETWEEN FOREIGN NATIONALS AND DOMESTIC SPIES.
Money Laundering
THIS IS THE ACT OF CONCEALING THE SOURCE OF ASSETS THAT HAVE BEEN ILLEGALLY OBTAINED.
to hide the source of ownership of all such funds through the creation of a seemingly legitimate history or paper trail.
THE PRIMARY OBJECTIVE OF MONEY LAUNDERING IS...
Embezzlement and money laundering
NAME THE TWO "OLD" TYPES OF WHITE COLLAR CRIMES THAT FOUND RENEWED LIFE WITH TECHNOLOGY.
Identity Theft
THE MOST FREQUENT CONSUMER FRAUD COMPLAINT IS...?
Smurfing.
THIS IS THE DIVISION OF LARGE AMOUNTS OF CASH INTO SMALLER DENOMINATIONS SO AS TO CONCEAL ITS COMMON ORIGIN.
THE PRIMARY MEANS OF LAUNDERING.
1. Cash that was illegally obtained could be physically transported from its place of origin to a jurisdiction that had less stringent banking and reporting requirements.
2. Launderer could quickly transform hard currency into legitimate real property, such as real estate, commercial interests, or personal luxuries.
3. Launderers turn to smurfing.
The sudden large-scale purchasing of property may
cause notice by authorities.
NAME THE MAJOR ISSUE ASSOCIATED WITH LAUNDERING MONEY BY TRANSFORMING HARD CURRENCY INTO LEGITIMATE REAL PROPERTY.
The creation of opportunities that are directly linked to technological and commercial advances.
LARGELY ATTRIBUTED TO THE EXPONENTIAL GROWTH IN THE INCIDENCE OF IDENTITY THEFT
Social Security Numbers
IDENTITY THEFT IS OFTEN TIED TO THE INCREASED USE OF AS PERSONAL IDENTIFIERS.
Dumpster Diving, Direct theft of mail Change of address forms, Shoulder-surfing
EXAMPLES OF A LOW-TECH FORM OF ID THEFT.
VPN
Virtual Private Network
The Deep Web
ANY WEBSITE, INFORMATION, ETC. THAT IS NOT INDEXED BY SEARCH ENGINES IS CONSIDERED A PART OF THIS
Tor/Onion Browser
YOU CAN ONLY ACCESS THE DARK NET WITH THIS
The US Navy
TOR WAS CREATED BY THIS GOVERNMENT AGENCY.
Nodes
IN TOR, INFORMATION TRAVELS THROUGH THESE
Exit Node
THIS IS THE WEAKEST LINK IN THE TOR CONNECTION
Encryption
TOR OFFERS A HIGH LEVEL OF THIS
HTTPS (Hypertext transfer protocol secure)
TOR USES THIS INSTEAD OF HYPERTEXT TRANSPORT PROTOCOL
Censorship
PEOPLE USE TOR TO CIRCUMVENT THIS
2006
TOR STARTED TO GAIN A GREATER AMOUNT OF MAINSTREAM PROMINENCE IN THIS YEAR
Child Abuse Sites
WHEN RESEARCHED, ALMOST 75% OF TOR TRAFFIC ENDED UP AT THESE
Anonymized Access, Bitcoin Payment with Escrow, Vendor Feed-back
THE THREE KEY CHARACTERISTICS DARK NET MARKETS HAVE
ARPANET
STANFORD AND MIT STUDENTS USED THIS TO PURCHASE CANNABIS IN THE 1970S
Ross Ulbricht, aka "Dread Pirate Roberts"
THE FOUNDER OF THE SILK ROAD
General Purpose Robot
BAXTER CAN BE DEFINED AS A ..... ROBOT
Self Check-Out Cashiers, Barista Robot
GIVE AN EXAMPLE OF A COMMON TYPE OF ROBOT SEEN IN OUR EVERYDAY LIVES.
Cheaper and faster
WE THINK OF TECHNOLOGICAL CHANGE AS THE FANCY, NEW EXPENSIVE STUFF, BUT THE REAL CHANGE COMES FROM LAST DECADE'S STUFF GETTING ..... AND .....
Humans being replaced by mechanical minds in the job market
WHAT IS IN DANGER AS A RESULT OF THE FAST RATE AT WHICH TECHNOLOGY IS ADVANCING
Autos
SELF-DRIVING CARS ARE PLACED UNDER THE TECHNOLOGICAL CATEGORY OF ...?
Because they write bots to replace human jobs. These bots teach themselves how to perform your job. Demand for human mental labor in terms of paperwork, decision making, and writing are on the decline.
WHY ARE AUTOMATION ENGINEERS SO THREATENING TO THE JOB MARKET?
Watson
WHAT IS THE NAME OF THE BOT DESIGNED BY IBM THAT DESTROYED KEN JENNINGS IN JEOPARDY?
Financial (huge profits associated with sale of online pornography)
THE DRIVING FORCE BEHIND MANY OF THESE VICTIMIZATION CRIMES ARE...?
Commercial Gain
PEOPLE ENTICE AND EXPLOIT WOMEN AND CHILDREN FOR SEXUAL TOURISM, PERSONAL GRATIFICATION, AND THIS
Children
THE ESTIMATED NUMBER OF THIS GROUP PROSTITUTED IN THE US IS BETWEEN 100,000 AND 3 MILLION
Professional Dating Service Websites
SINGLE PEOPLE ARE SOMETIMES VICTIMIZED ON THESE TYPES OF WEBSITES
Youth Internet Safety Survey
THIS WAS CONDUCTED IN 2000 AND 2005
Unwanted Exposure
IN THE 2005 YOUTH INTERNET SAFETY SURVEY 1 IN 3 YOUTHS EXPERIENCED THIS
14 or Older
81% OF TARGETED YOUTH WERE THIS AGE OR OLDER
CyberBullying
WHEN THE INTERNET, CELL PHONES OR OTHER DEVICES ARE USED TO SEND OR POST TEXT OR IMAGES INTENDED TO HURT OR EMBARRASS ANOTHER PERSON?
50%
AS MANY AS THIS PERCENT OF YOUTH HAVE EXPERIENCED BULLYING
Cyberstalking
THIS IS THE WILLFUL OR INTENTIONAL COMMISSION OF A SERIES OF ACTS THAT WOULD CAUSE A REASONABLE PERSON TO FEAR DEATH OR SERIOUS BODILY INJURY AND THAT, IN FACT, PLACE THE VICTIM IN FEAR OF DEATH OR SERIOUS BODILY INJURY
California
WHAT WAS THE FIRST STATE TO ADDRESS SPECIFIC LAWS ON CYBERSTALKING?
Maintaining a Relationship
STALKERS ARE PRIMARILY CONCERNED ABOUT THIS
Erotomaniacs
THIS TYPE OF CYBERSTALKER IS RELATIVELY UNCOMMON - THEY MAKE UP LESS THAN 10% OF ALL STALKERS
Community Protection and Freedom of Speech
THE DEBATE OF OBSCENITY IS A DEBATE BETWEEN THIS AND THIS
Cybercriminal
THIS TYPE OF CRIMINAL IS MORE ELUSIVE, LARGELY ANONYMOUS, AND MORE LIKELY TO BE OPERATING OUTSIDE THE US
1. Trafficking child pornography
2. Locating children to molest
3. Engaging in inappropriate sexual communication
with children
4. Communicating with other pedophiles
FOUR PRIMARY PURPOSES FOR PEDOPHILES' USE OF THE INTERNET.