Bank secrecy act
A federal law passed in 1970 to require reporting of large scale case transactions
Bank examiner scheme.
A criminal scheme when con artists pose as FBI agents, bank examiners , police officers , detectives , or bank officials. The victim is then contacted by them pretending to need help in conducting an investigation
Computer crime
A violation of criminal law that requires some knowledge of computers for perpetration
Computer hacking.
A compulsive computer programmer who explored , tests, and pushes the computer to its limits. Regardless of the consequences
Computer virus
A set of illegal computer instructions designed to ruin computer hardware or software while reproducing itself in the computer program when it is executed
Confidence game
The criminal practice of gaining the confidence of a would be victim for the sole purpose of swindling money from them
Corporate crime
White collar crime where a group of executives working within a company mishandle funds or otherwise betray the trust of customers.
Currency exchange
A brokerage house for facilitating movement of illicit money
Cybercrime
The destruction , theft , or Unauthirized use or copying of information , programs , services , equipment , or communication networks.
Cyber extortion
When a computer criminal extorts money from a victim
Data diddling.
Double Invoicing
Flooding.
10
Hardware.
Logic bomb.
Masquerading
Examples of white collar crimes 4
2. What is the oldest confidence game con
2. The pyramid scheme
What are examples of confidence game cons
Who are prime targets for fraud and scams.
The elderly
2. Who will launder money
2. Criminals in all segments of society
20
2. How long does it take to launder money into a legitimate business. “ the wash cycle “
2. As little as 48 hours.
2. What is the biggest problem for traffickers laundering money through banks.
2. The initial deposit of currency into the banks