Beruflich Dokumente
Kultur Dokumente
harmful activity (violations of the Sherman Antitrust Act, OSHA and Environmental Crimes) 8. Computer Crime -- includes Internet fraud, Internet pornography, use of computers for theft, destruction, or harassment SECURITIES LAW VIOLATIONS Now for example I take the American circumstance and the cause there for the White Collar Crime though it is slight devating from the topic but still we would see its relevance in the further presentation. Part 15 U.S.C. Sections 77a-78kk contains the Securities Act (originally passed in 1933 and amended numerous times). It prohibits the use of "manipulative or deceptive devices, mail or wire fraud, making false statements in order to increase market share, conspiracy, and unfair market practices." Some common forms of securities fraud include: churning -- when brokers place repeated, excessive, unnecessary orders for the buying and selling of stock with a customer's money; bucketing -- skimming customer profits by falsifying trade information; front running -- placing orders ahead of a customer's order to profit from market effects of the trade; insider trading -- using confidential, market sensitive information of pending corporate actions to buy stock or give that information to a third party; and illegal arbitrage -using insider information on such deals as merger negotiations to speculate on the difference between current stock prices and the price the acquiring company pays. THE SAVINGS AND LOAN SCANDAL From 1980 to 1990, the savings and loan (S & L) scandal cost taxpayers over $500 billion, the largest single financial disaster in history. It will take about 40 years to recover from it. It started when the government decided to "deregulate" S & Ls, allowing them to do more than just home loans, allowing them to invest in speculative real estate transactions and high-risk commercial lending. In order to compete with the regular commercial banks, the S & Ls offered low-interest loans to just about anybody, and worse yet, restrictions were relaxed on who could own and operate an S & L. Given this green light, they made irresponsible loans to shady businesspeople and risky real estate developers. Sometimes kickbacks accompanied the loans. As most of the banks headed into bankruptcy, many executives, believing that FDIC would cover their customer's losses, "looted" the remaining funds to throw lavish Christmas parties, redecorate their homes, refurbish their offices, purchase airplane fleets, etc. The land bought by the banks was continuously "flipped", or regularly remortgaged, to drive up the assessed valuation, then sold in "reciprocal lending" to another S & L in an illegal industry profit-sharing scheme. The S & Ls also made loans to one another ("linked financing") that were never intended to be paid off. COMPUTER CRIME It can be argued that computer crime is different from cybercrime. Computer crime tends to be traditional crimes of property committed with the use of a computer, and cybercrime tends to refer to new, emerging forms of crime that, as of yet, defy standard criminological classification. Computer crime of the traditional variety tends to fall into one of five categories: 1. Theft of services -- unauthorized user penetrates a system 2. Use of data for personal gain -- blackmail, harassment, etc. 3. Financial gain -- some type of financial processing to obtain assets 4. Theft of property -- extracting money under false pretenses 5. Hacking -- using a virus to disrupt or destroy programs or networks Theft, followed closely by fraud, tend to be the most common types of computer crime: Trojan horse -- using one computer to reprogram another Salami slice -- using a dummy account to extract a few cents Super-zapping -- using diagnostic program to crack system Logic bomb -- using a subroutine that waits for an error to occur Impersonation -- using an authorized identity for unauthorized access Data leakage -- using printouts of small amounts of data Computer Laws are extraordinarily complex. There's the problems of definition, jurisdiction, and evidence. A good primer on cybercrime investigation can be found elsewhere, and then, a whole course could be established in computer forensics. Most offender profiling techniques rely upon the distinction between insiders and outsiders, with insiders (employees or those with legitimate access to their targets) comprising about 75% of all offenders. The FBI is continually surprised, when under the plain view doctrine, they investigate an insider threat and find examples of child pornography, organized crime connections, and even recreational hacking. Employees also often waste a lot of company time using their network access to surf, shop, or engage in other instances of lost productivity.
INTELLIGENCE ANALYSIS OF WHITE COLLAR CRIME One of the more prominent theories is that offenders possess an "unshareable financial problem", the result of living beyond their means, piling up gambling debts, etc. (the three Bs: Babes, Booze, Bets), and feel they cannot let anyone know about their situation without ruining their reputation. Other theories stress the "culture at the top" notion, which sets the tone for the ethical climate in the organization. The whole world of business is kept in line by what is called "economism" -- a self-regulating compliance strategy based on the deterrent effects of economic sanctions and civil penalties. This inherently places a lot of trust in the personalities of those who work in business. Regardless of the motivation, the offenders are probably as complex as the laws and regulations in this area. The required mental states, for example, range from "negligently" to "recklessly" to "knowingly", depending upon what type of white collar crime you're talking about. Prosecution, or more specifically, deciding who prosecutes, opens up a cornucopia of agencies, all with joint and/or overlapping responsibilities. In some cases, the level of cooperation is well-known, such as between the FBI (threat of criminal charges) and FTC (civil cease & desist orders), but OSHA inspectors have only recently been equipped with police powers, and the investigative arms of many other agencies are not well known. One of the most important things in investigation of white collar crime is the need for partnership and teamwork. Intelligence work in this area is often disorganized and inefficient, and a team approach can solve this. The Treasury Dept., for example, may have the money laundering analysis expertise, and a local police department may have a proven ability to produce analytical activity charts. The "strike force" model is one of the most common team approaches in law enforcement. This establishes a network of agencies all working on different aspects of the problem. Another thing that should not be overlooked is the corporation itself. Businesses spend millions of dollars a year conducting internal audits. Along these lines, one should not neglect the private security force employed by the corporation. Their employees can be valuable sources of information. In addition, sometimes the employees of the organization itself can be induced to "snitch" or "whistle blow" on other employees. The main piece of evidence that will be viewed most strongly in court is any evidence of disguise or coverup. This will ordinarly be presumed as evidence of intent under most legal standards. Concealment of the violation is therefore the most vital piece of evidence to look for. This necessarily involves unraveling the "paper trail" and pouring over a large roomful of obscure documents. Many agencies have hired college students or recruited interns to temporarily help them with these chores. Records analysis is something that may take years to complete, but then you have to focus on individual offenders eventually. Beside proof of intent (via habit and character evidence) which satisfies the mens rea element of crime, and proof of destruction or coverup (via shredded or duplicate documents) which satisfies the actus reus element of crime, AND the testimony of at least one witness (via an informant or snitch co-worker), the intelligence analyst should be prepared for the court to expect the introduction of charts diagramming the scheme or conspiracy. Such charts require an understanding of conspiracy. TYPICAL SCAMS & SWINDLES Con Game Process: 1. Making the mark (investigating & locating victims) 2. Playing the con (gaining the victim's confidence 3. Roping the mark (steering him to the inside man) 4. Telling the tale (showing him how to make money) 5. Giving the convincer (permitting him to make a profit) 6. Having him invest further 7. Sending him after more money 8. Playing him at the big store 9. Getting him out of the way 10. Cooling the mark out (having him realize he can't turn to the law) 11. Putting in the fix (bribing or influencing the law) MONEY LAUNDERING Money laundering is the process by which cash derived from a criminal enterprise is exchanged, intermingled, or converted with other cash which produces no trace of origin for the original cash. The term goes back to the Al Capone days of Chicago mobsters in the 1920s who used local laundries to cover up their profits from gambling, racketeering, and bootlegging. It is the process of converting funds
derived from illegal activities into spendable or consumable form. "Hiding" dirty money is not the same as "laundering" it. Money laundering is regarded as the world's third largest business, following the legitimate financial sector and manufacturing. The United States, not offshore banks or other places, is responsible for about half of the $750 billion that are laundered every year. Some 60-80% of all federal money laundering prosecutions involve drug-related "kingpins" although terrorists, arms dealers, and international criminal organizations also launder money quite regularly. Thus I conclude that Causes of white Collar Crime is not one but as there are no. of crimes so there are no. of explanations for each of the crime.