Title: White Collar Crime
1Chapter 20
2(No Transcript)
3Menu
Definition of White Collar Crime
Categories of White Collar Crime
Types of White Collar Crime
Investigating White Collar Crime
Scenario- Early Retirement
4(No Transcript)
5White-Collar
6White-Collar
Crime
7White-Collar
Crime
8White- Collar Crime
A business related crime
Q 1
9White- Collar Crime
A nonviolent crime
A breach of trust, confidence or duty
10White- Collar Crime
A nonviolent crime
Committed by
- An individual
- A corporation
Q 23, 24
11Identifying White- Collar Crime
Categories
- Occupational Crime
- Corporate Crime
12Occupational Crime
The use of ones occupation to illegally obtain
personal gain
Q 2
13Corporate Crime
Any activity that is undertaken by a corporation
for its benefit, but violates the law
14Corporate Crime
Any activity that is undertaken by a corporation
for its benefit, but violates the law
15Corporate Crime
Any activity that is undertaken by a corporation
for its benefit, but violates the law
16Corporate Crime
Any activity that is undertaken by a corporation
for its benefit, but violates the law
17Corporate Crime
Any activity that is undertaken by a corporation
for its benefit, but violates the law
Q 26, 28
18(No Transcript)
19Menu
Definition of White Collar Crime
Categories of White Collar Crime
Types of White Collar Crime
Investigating White Collar Crime
Scenario- Early Retirement
20Categories of White-Collar Crime
- Ad-Hoc Violations
- Collateral Business Crimes
21Categories of White-Collar Crime
- Ad-Hoc Violations
- Collateral Business Crimes
22Categories of White-Collar Crime
- Abuses of Trust
- Con Games
Q 27
23Ad-Hoc Violations
Illegal activities committed by individuals for
personal gain or profit
24Ad-Hoc Violations
Illegal activities committed by individuals for
personal gain or profit
25Collateral Business Crimes
Activities by which organizations further their
business interests by violating the law
Q 8
26Abuses of Trust
Any misuse of authority or malfeasance or public
corruption
Q 3
27Con Games
Confidence or con games involve activities
designed...
28Con Games
Confidence or con games involve activities
designed...
29Con Games
To swindle people out of money or
property
100 Guarantee
30Con Games
To swindle people out of money or
property
Maybe
31Five Basic Elements
- Intent
- Disguise of Purpose
- Reliance on Victims Ignorance
Q 9, 10
32Five Basic Elements
- Voluntary Assistance from Victim
- Concealment
33(No Transcript)
34Menu
Definition of White Collar Crime
Categories of White Collar Crime
Types of White Collar Crime
Investigating White Collar Crime
Scenario- Early Retirement
35Types of White- Collar Crimes
- Embezzlement and employee thefts
- Industrial Espionage
36Types of White- Collar Crimes
- Insider Trading
- Bribery, Kickbacks, Payola
37Types of White- Collar Crimes
- Tax Evasion
- Corporate Crimes
38Embezzlement
Misappropriation or Misapplication of money,
property entrusted to ones care, custody or
control
39Embezzlement
Misappropriation or Misapplication of money,
property entrusted to ones care, custody or
control
40Embezzlement
Misappropriation or Misapplication of money,
property entrusted to ones care, custody or
control
41Embezzlement
Misappropriation or Misapplication of money,
property entrusted to ones care, custody or
control
Q 11
42Industrial Espionage
Espionage work undertaken in corporate and
industrial areas to keep up with or surpass
competitors
Q 25
43Industrial Espionage
Espionage work undertaken in corporate and
industrial areas to keep up with or surpass
competitors
Q 12, 32
44Insider Trading
Employees or managers use of information gained
on the job, not generally available to the
public.
Q 29
45Insider Trading
to benefit from fluctuations in the stock market
.
46Bribe
The payment of cash, goods or services to someone
in exchange for some special service, product or
behavior
47Bribe
The payment of cash, goods or services to someone
in exchange for some special service, product or
behavior
Q 4
48Kickback
Return of a portion of the purchase price to the
buyer or a public official by the seller.
49Kickback
Return of a portion of the purchase price to the
buyer or a public official by the seller.
50Kickback
to induce a purchase or improperly influence
future purchases
51Kickback
to induce a purchase or improperly influence
future purchases
Q 13
52Payola
The offering or receiving of compensation from
one individual to another in exchange for some
favor
53Payola
The offering or receiving of compensation from
one individual to another in exchange for some
favor
54Tax Evasion
- A common form of white- collar crime
- Many Americans cheat on their tax returns by...
55Tax Evasion
- A common form of white- collar crime
- Many Americans cheat on their tax returns by...
56Tax Evasion
- Underreporting their income
- Claiming false deductions
APR15
Q 14
57Tax Evasion
- Inflating amounts of charitable deductions
APR15
58Tax Evasion
Some dishonest business people maintain multiple
bookkeeping records to cheat on their taxes
59Tax Evasion
Some dishonest business people maintain multiple
bookkeeping records to cheat on their taxes
60Tax Evasion
The tax evasion must be shown to have been
intentional
61Tax Evasion
The tax evasion must be shown to have been
intentional
Q 30
62Tax Evasion
Key Concept
63Tax Evasion
Key Concept
Willfulness
Q 5
64Corporate Crime
- Price Fixing
- Bribery, Kickbacks
- Tax evasion, Tax violations
Q 7
65Corporate Crime
- Assorted frauds
- Environmental crimes
Q 6
66(No Transcript)
67Menu
Definition of White Collar Crime
Categories of White Collar Crime
Types of White Collar Crime
Investigating White Collar Crime
Scenario- Early Retirement
68Investigating White-Collar Crimes
- Difficult to prevent
- Difficult to detect
- When detected, may not be reported to police
69Investigating White-Collar Crimes
- Private sector - often handled unofficially by
corporate whim - Public sector - detection left to administrative
or regulatory agency
Q 31
70Investigating White-Collar Crimes
FBI is called in when Department of Justice
receives evidence of criminal activity
71Computer Crime
Increasing because of
- Availability of computers
- Improved technological knowledge
Q 39, 40, 45
72Computer Crime
Many corporate and governmental computers have
been infiltrated by hackers
73Computer Crime
Many corporate and governmental computers have
been infiltrated by hackers
Intruder detected...
74Computer Crime
Many corporate and governmental computers have
been infiltrated by hackers
75Computer Crime
Many corporate and governmental computers have
been infiltrated by hackers
Intruder detected...
Q 33, 34, 42
76Computer Crime
1979 - U.S. Department of Justice defined
computer crime as..
Q 38
77Computer Crime
Any illegal act for which knowledge of computer
technology is essential for its perpetration,
investigation, or prosecution
Q 17
78Types of Computer Crime
- Internal computer crimes
- Telecommunications crimes
- Computer manipulation crimes
Q 41
79Types of Computer Crime
- Support of criminal enterprises
- Hardware or software theft
80Internal Computer Crimes
Any alteration to an existing computer program
that causes it to operate in a manner other that
that for which it was designed
81Internal Computer Crimes
Any alteration to an existing computer program
that causes it to operate in a manner other that
that for which it was designed
Q 15
82Computer Virus
A computer program (hidden within another
computer program) that inserts itself into
programs and applications...
83Computer Virus
A computer program (hidden within another
computer program) that inserts itself into
programs and applications...
84Computer Virus
and destroys data or halts execution of programs
Q 44
85Computer Virus
and destroys data or halts execution of programs
86Telecommunication Crimes
Involve the illegal access to or use of computer
systems over telephone lines
87Telecommunication Crimes
Involve the illegal access to or use of computer
systems over telephone lines
Q 43
88Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
89Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
90Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
91Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
92Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
93Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
94Telecommunication Crimes
Involve the use of random digit programs to
access codes for a computer system
95Telecommunication Crimes
Involve the misuse of toll-free numbers, calling
card numbers and voice mail systems
Q 35
96Telecommunication Crimes
Involve the misuse of toll-free numbers, calling
card numbers and voice mail systems
Q 16
97Telecommunication Crimes
Involve the Internet or telephone and wire lines
of financial institutions
98Telecommunication Crimes
Involve the Internet or telephone and wire lines
of financial institutions
99Telecommunication Crimes
Involve the Internet or telephone and wire lines
of financial institutions
100Telecommunication Crimes
Involve the Internet or telephone and wire lines
of financial institutions
101Computer Manipulation Crimes
Involve changing data or creating records in a
system to advance some other crime
102Computer Manipulation Crimes
Involve changing data or creating records in a
system to advance some other crime
103Computer Manipulation Crimes
Involve changing data or creating records in a
system to advance some other crime
104Computer Manipulation Crimes
Involve changing data or creating records in a
system to advance some other crime
105Computer Manipulation Crimes
Involve changing data or creating records in a
system to advance some other crime
106Support of Criminal Enterprises
Computers aid legal and illegal businesses
107Support of Criminal Enterprises
Criminals use computerized ledgers for business
dealings
108Hardware and Software Thefts
Hardware thefts of computers, monitors, scanners,
etc- fairly common
109Hardware and Software Thefts
Hardware thefts of computers, monitors, scanners,
etc- fairly common
110Hardware and Software Thefts
Hardware thefts of computers, monitors, scanners,
etc- fairly common
111Hardware and Software Thefts
Hardware thefts of computers, monitors, scanners,
etc- fairly common
112Hardware and Software Thefts
Easy to accomplish and common among people who
make software copies for friends
113Hardware and Software Thefts
Easy to accomplish and common among people who
make software copies for friends
114Hardware and Software Thefts
Easy to accomplish and common among people who
make software copies for friends
115Hardware and Software Thefts
Easy to accomplish and common among people who
make software copies for friends
116Hardware and Software Thefts
Easy to accomplish and common among people who
make software copies for friends
Q 18
117Hardware and Software Thefts
although doing so is a crime!
Q 36
118Hardware and Software Thefts
although doing so is a crime!
Q 37
119Pick Program
A computer program designed to bypass security
measures against duplication of electronic files
120Pick Program
A computer program designed to bypass security
measures against duplication of electronic files
121Investigating Computer Crimes
- Evidence can be easily lost or destroyed
- Investigators must move cautiously
Q 19
122Investigating Computer Crimes
- Need formal department guidelines for
investigation
Q 20
123Investigating Computer Crimes
- Use extreme caution when seizing computers or
computer equipment
Q 21, 22
124(No Transcript)
125Menu
Definition of White Collar Crime
Categories of White Collar Crime
Types of White Collar Crime
Investigating White Collar Crime
Scenario- Early Retirement
126Lets Discuss...
127Early Retirement
Crystal Sparks supervisor was quite surprised at
her sudden decision to leave Sagittarius Systems
128Early Retirement
Crystals team had recently developed a software
program which allows satellites to track stolen
vehicles
129Early Retirement
Crystals team had recently developed a software
program which allows satellites to track stolen
vehicles
130Early Retirement
Crystals team had recently developed a software
program which allows satellites to track stolen
vehicles
131Early Retirement
Crystals team had recently developed a software
program which allows satellites to track stolen
vehicles
132Early Retirement
A month later, a rival, Scorpio Industries,
announced the same breakthrough
133Early Retirement
A month later, a rival, Scorpio Industries,
announced the same breakthrough
Scorpios Sky Spy
134Early Retirement
The announcement was made by Scorpios new design
chief, Crystal Sparks
135Early Retirement
The announcement was made by Scorpios new design
chief, Crystal Sparks
Crystal Does It!
136Early Retirement
Three months later, Crystal left Scorpio for an
indefinite vacation to the British Virgin Islands
137Early Retirement
...a vacation funded by profits from Crystals
investments in Scorpio stock, just before it
skyrocketed in value
138Early Retirement
The CEO of Sagittarius has publicly demanded an
investigation of Scorpios activities
139Early Retirement
The CEO of Sagittarius has publicly demanded an
investigation of Scorpios activities
CEO Cries Foul
140Early Retirement
You are the chief security officer for
Sagittarius Systems
141Early Retirement
You have contacted the local police to assist you
in investigating Scorpios involvement in this
matter
142Early Retirement
Whats Your Next Move?
- What crime or crimes, if any, have been
committed? - What evidence is needed to support a criminal
charge?
143Early Retirement
Whats Your Next Move?
- What agencies, if any, would you contact for
assistance?
144(No Transcript)