test 1- white collar crime

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/73

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:21 PM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

74 Terms

1
New cards

White collar crime FBI definition

Synonymous with the full range of fraud committed by business and government professionals

  • these crimes are characterized by deceit, concealment, or violation of trust and are not dependent on the application or threat of physical force or violence

  • Lastly, the motivation behind these crimes is financial— to obtain or avoid losing money, property or services or to secure a personal or business advantage

2
New cards

Definitions of white collar crime-

Hourglass

  • traditional thoughts of white collar crime on top of

  • New areas/contemporary thoughts on the bottom

3
New cards

Definitions of white collar crime-

Sutherlands

  • upper class crime

  • Associated with business

  • Civil and/or criminal

  • Originally excluded from crime stats

4
New cards

Four components of theft

  • opportunity

  • Temptation

  • Justification

  • Motivation

5
New cards

UCR

  • uniform crime report

  • No federal investigations

  • Fraud

  • Embezzlement

  • Forgery/counterfeiting

  • Fraud v. Embezzlement

  • Misrepresentation v. Stealing

6
New cards

NIBRS

  • false pretenses

  • Swindles

  • Confidence games

  • Credit card and atm fraud

  • Wire and welfare fraud

  • Impersonation

  • Bribery

  • Embezzlement

  • Counterfeiting and forgery

  • bad checks

7
New cards

Sutherlands offenses

  • antitrust violations

  • Kickbacks; give something and you get something in return

  • Patents, trademarks, and copyright violations

  • Misrepresentation in advertising

  • Unfair labor practices

  • Financial manipulations

  • Corporate war time violations

  • Miscellaneous (FDA violations)

8
New cards

Difficulties with police and white collar crime

  • definitions

  • Perceptions of working white collar crime

  • Proof/complexity

  • resources

  • Relationship dynamics

  • Time

9
New cards

Loss

  • money

  • Assets

  • Proprietary information

  • Reputation

  • Life

10
New cards

Who gets investigated

  • employers and employees

  • Customers

  • Other businesses

    • Ex. Industrial espionage

  • Bystanders

11
New cards

The ultimate goal

  • protect the brand or company

  • Safety

  • The bottom line (make money)

12
New cards

What is fraud?

  • an intentional deception that causes the victim to suffer an economic loss and/or the perpetrator to realize a gain

13
New cards

Elements of fraud

  • material false statement

  • Knowledge of the falsehood

  • Reliance of the false statement by the victim

  • Damages by the victim due to the falsehood

14
New cards

Larceny

Stealing, taking and carrying, leading, riding, or driving away with another’s personal property (with intent and without permission)

15
New cards

Embezzlement

Willfully taking of property or money which the wrongdoer acquired possession lawfully, by reason of some office, employment, of position of trust

16
New cards

Fiduciaries

Persons in positions of trust (representative)

17
New cards

Invitation to theft CRAVED

  • concealable

  • Removable

  • Available

  • Valuable

  • Enjoyable

  • Disposable

18
New cards

Categories of fraud

  • asset misappropriation

  • Corruption

  • Financial statement fraud

19
New cards

Two main components of financial forensics

  • auditing

  • Fraud examination

20
New cards

Shrinkage/shortage

Difference between what you are supposed to have and what you actually have

21
New cards

Who is in the white collar crime business battle

  • professional services firms—consultants, auditing firms

  • Public and private companies

  • Regulatory agencies—SEC

  • Government and non profits— IRA, school systems

  • Law enforcement agencies

  • Law forms

  • Psychological and criminology— counseling and academics

  • Information technology (IT)— controls, cyber forensics, cybercrimes

22
New cards

Sutherlands four aspects

  • serious problem

  • Recognized illegal activities by upper class

  • Recognize characteristics of opportunity of class

  • Recognize as a criminal activity

23
New cards

Who is a criminal— J.W. Tappan

  • civil and/or criminal activity— too much

  • Focus should be on criminal law

  • Is a person a criminal if not committing a crime

24
New cards

Donald R. Crest

  • student of Sutherland

  • The fraud triangle: perceived opportunity; perceived pressure; rationalization

  • No shareable financial pressures

  • Also found non financial reasons for committing fraud

    • Violations of ascribed obligations (unbecoming behavior)

    • Problems from personal failure (personal bankruptcy; divorce)

    • Business reversals (ponzi schemes

    • Physical isolation (alone and without financial help)

    • Status gaining (materialistic)

    • Employer-employee relationship (disgruntled over pay, overworked)

25
New cards

Hollinger and Clark

  • contemporary criminologists with a niche area in retail/employee theft and white collar crime

  • Multitude of focuses

  • Management’s responsibility (organized controls) in white collar crime

26
New cards

Ethical principles- imperative principle

Directives and rules without exception and are in the best interests of society as a whole

27
New cards

Ethical principles- utilitarian principle

Problem should be solved by weighing good vs. bad consequences

28
New cards

Ethical principles- the generalization principle

Ethical norms as guidance

29
New cards

What is organized crime

  • a continuing enterprise that rationally works to make a profit through illicit activities, and that it ensures its existence through the use of threats or force and through corruption of public officials to maintain a degree of immunity from law enforcement

  • Tends to be restricted to illegal goods and services that are in great public demand through monopoly control of an illicit market

  • Criminals have a career pattern

  • Hierarchy structure— “bosses”

30
New cards

Five characteristics of organized crime investigations

  • conspiracy: planning and profiting of crime

  • Illicit goods: good such as drugs and stolen property; possession and distribution of

  • Illicit services: services such as gambling, loansharking, prostitution and pornography, marketing and distribution

  • Extortion: threat of future harm; also called blackmail

  • Racketeering: the organizing to commit crime; most commonly a business structure

31
New cards

Three organized crime models

  • hierarchical

  • Local/ethnic

  • Enterprise

32
New cards

Hierarchical model

  • also known as bureaucratic, conspiracy, or corporate model

  • Structure consists mainly of of: families, bosses, underboss, lieutenants, soldiers

  • Military like structure

  • Respect with organization among family rank and other families

  • Model used mostly with organized crime in New York and other New England states

  • Very traditional structure

33
New cards

Local/ethnic model

  • first studied by sociologist Joseph Albini in 1970s

  • Crime based on geography and heritage

  • No structure— loose relationships

  • Not national

  • MS 13

  • Bloods and crips

  • Individuals control own activities

  • Align with cultural partners as needed

34
New cards

Enterprise model

  • entrepreneur/business like

  • Smaller organizations

  • Competitive, not monopolistic

  • Focus on market for illicit services or goods

  • Always concerned with suppliers, customers, and competitors

  • May become very violent to grow profits

  • Model growing due to the internet

35
New cards

Tools and las for prosecution in organized crime

  • title III omnibus crime control and safe streets act of 1968

  • Organized crime control act of 1970

    • Provides

      • Use immunity

      • Witness protection program (WITSEC)

      • Special grand jury

      • RICO act

  • continuing criminal enterprise (CCE) law

    • Used mainly for drug trafficking

  • Bank secrecy act

    • Deals with money laundering

36
New cards

Cybercrime

Any criminal activity which has been committed through the use of the internet

37
New cards

Comprehensive crime control act

The secret service became responsible for credit card fraud and computer crime

38
New cards

Computer fraud and abuse act (CFAA)

Expanded cybercrimes to federal jurisdiction (when intrusion were made between states)

39
New cards

Monetary/economic losses to business

  • cost to respond to the damage from the perpetrator

  • Damage assessments

  • Restoration of data and programs

  • Wages, of employees conducting tasks

  • Lost sales

  • Last advertising revenue on websites

  • Harm to reputation

40
New cards

Three types of hackers

  • white hat hackers

  • Black hat hackers

  • Gray hat hackers

41
New cards

Contemporary motivations for hacking

  • boredom (least destructive)— gray hat

  • Intellectual challenge (true hacker)

  • Revenge (including insiders)

  • Sexual gratification (stalking and harassment)

  • Economic

  • Political/religious

42
New cards

Hierarchy of cybercriminals

  • script kiddies

    • Lowest form of cybercriminals

    • Usually do not understand programming and coding but use programs used by others

    • Usually do not now their own criminal result

  • Cyberpunks

    • Employ general mischief, vandalism, and destructive programs on systems

    • The term has been thrown around quite a bit in pop culture

    • Mid level cybercriminals with low level criminal infractions

  • Cybercriminals organizations

    • Criminally minded individuals who use the internet for cybercrime

    • Usually politically and economically motivated

    • The groups can range from ignorance of basic to complex knowledge of technology

  • Crackers

    • Hackers who use their expertise for personal gain which may be used for further criminal activity

    • Cracking the security code

43
New cards

Malware

Malicious programming code that causes damage to computer systems

44
New cards

Trap doors/back doors

Codes that allow users to enter computer systems without authorization

45
New cards

Trojan horse

A program that is perceived as legitimate but houses/trap back doors or hidden programs

46
New cards

Virus

A rouge computer which is designed to disperse copies of itself to other computers for destructive uprises by attacking itself to other programs

47
New cards

Worms

Similar to viruses other than it does not need programs to spread

48
New cards

Eras of the virus and worm

  • classical era (1960s-1970s)

    • Hard drives to hard drives

  • Floppy era (1980s-1990s)

    • Used floppy discs

  • Macro era (1990s-2000s)

  • Internet era (2000s-present)

49
New cards

Computer forensics

The acquisition, authenticiation, recovery, and analysis of digital crime

50
New cards

Data mining

A comprehensive analysis of large data sets designed to uncover patterns and relationships

  • analysis includes: statistical models, math algorithms, and A.I.

51
New cards

Categories of online crime

  • interference with lawful use of computers

  • Theft of information and copyright infringement

  • Dissemination of contraband or offensive material

  • Threatening information

  • Fraud

  • Ancillary crime

52
New cards

DOS attacks

To disable large systems without necessarily gaining access to it

  • ex. Mail bombing

53
New cards

Bot or zombie

  • compromised computers attached to the internet which are often used to remotely perform malicious or criminal tasks

  • Most owners do not know they have infected computer

54
New cards

Ransomware

  • malware program which encrypts or otherwise renders computer or digital resources inoperable

55
New cards

Theft of information

  • phone/internet scams

  • Shoulder surfing

  • Jump drives/ optical drives

  • Network defaults???

56
New cards

Dissemination of contraband or offensive materials

  • child pornography

  • Child enticement/exploitation

  • Online pharmacies

  • Online gambling

57
New cards

Money laundering

An enterprise or practice of engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income

58
New cards

Why is online laundering increasing?

  • less overhead

  • Less paperwork

  • Ease of transaction

  • Lack of physical interaction

  • Reduction of risk

  • Harder to identify

  • Harder to prosecute

59
New cards

Identity theft

Any use of stolen personal information

60
New cards

Identity fraud

The use of a vast array of activities based on the fraudulent use of identifying information of a real or fictitious person

61
New cards

Breeder document

  • birth certificate

  • Drivers license

  • Social security number

  • Birthday

  • Pay stub

  • Tax documents

  • Check

62
New cards

Types of sensitive information

  • names

  • Addresses

  • date of birth

  • Social security number

  • Taxpayer ID number

  • Alien registration numbers

  • Passport number

63
New cards

5 types of identity theft/fraud

  • assumptions of identity theft

  • Theft for employment and/or border entry

  • Criminal record identity theft/fraud types

  • Virtual identity theft/fraud

  • Credit or financial theft

64
New cards

Assumption of identity theft

An individual simply assumes the identity of his or her victim including all aspects of the victim’s lives

65
New cards

Reverse criminal record identity theft

When a criminal uses a victim’s identity not to engage in criminal activity but to seek gainful employment

66
New cards

Virtual identity theft

The use of personal, professional, or other dimensions of identity toward the development of a fraudulent virtual identity

67
New cards

Credit identity fraud/theft

  • most common and most feared

  • The use of stolen personal and financial information to facilitate the creation of fraudulent accounts

68
New cards

Issues concerning identity theft/fraud

  • lack of reporting/knowledge of theft

  • Lack of reporting by the police to federal agencies

  • Jurisdictional discrepancies in crime measurement

  • Selective enforcement

69
New cards

Physical methods of identity theft

  • mail theft

  • Dumpster diving

  • Theft of computers

  • Bag operations

  • Child identity theft

  • Insiders

  • Fraudulent or fictitious companies

  • Card skimming, ATM manipulators, and fraudulent machines

70
New cards

Types of non criminal loss

  • administrative errors

  • Merchandise issues

  • Insurance

  • Civil lawsuits/settlements

  • Safety/risk management

  • Loss of information

  • Business continuity

  • Depreciation

71
New cards

How can white collar crime become known

  • victims/complaints

  • Witness

  • Surveillance (random)

  • Audits/shortage

  • Metrics/measurements/analysis

  • Information collection

  • Police

  • Internal investigation

  • Tips/informants

  • Perpetrator

  • Red flags

72
New cards

Red flags

  • behavioral

  • Trends

  • Unusual activities

73
New cards

Collaboration

  • speaking with department heads or employees with a high risk department

  • Rapport building

74
New cards

Explore top notes

Explore top flashcards

flashcards
apush - ch. 14
61
Updated 1224d ago
0.0(0)
flashcards
ap gov unit 2 vocab
57
Updated 1269d ago
0.0(0)
flashcards
Sadlier Level A Unit 12
20
Updated 1049d ago
0.0(0)
flashcards
Muscle Practical 65-82
82
Updated 1113d ago
0.0(0)
flashcards
How is the earth changing?
36
Updated 48d ago
0.0(0)
flashcards
Period 5 Vocab
136
Updated 343d ago
0.0(0)
flashcards
Econ Section 6
40
Updated 838d ago
0.0(0)
flashcards
apush - ch. 14
61
Updated 1224d ago
0.0(0)
flashcards
ap gov unit 2 vocab
57
Updated 1269d ago
0.0(0)
flashcards
Sadlier Level A Unit 12
20
Updated 1049d ago
0.0(0)
flashcards
Muscle Practical 65-82
82
Updated 1113d ago
0.0(0)
flashcards
How is the earth changing?
36
Updated 48d ago
0.0(0)
flashcards
Period 5 Vocab
136
Updated 343d ago
0.0(0)
flashcards
Econ Section 6
40
Updated 838d ago
0.0(0)