You are on page 1of 2

1.

Larceny is defined as an illegal taking and carrying away of personal property belonging to another
with the purpose of depriving the owner of its possessions.
2. Embezzlement occurs when a person who has lawful possession of anothers money or property
fraudulently converts that money or property.
3. The difference between larceny and embezzlement the property is that in instances of embezzlement
the property is in the embezzlers possession and in instances of larceny the property is in anothers
possession.
4. Theft is the illegal taking of another persons property without that persons freely-given consent.
5. Robbery is the crime of seizing property through violence or intimidation.
6. Blackmail is the crime of threatening to reveal substantially true information about a person to the
public, a family member, or associates unless a demand made upon the victim is met.
7. Extortion occurs when a person unlawfully obtains money, property or services from a person, entity,
or institution, through extortion.
8. Exaction refers to extortion.
9. Extortion is commonly practiced by organized crime groups.
10. Ransom is a type of extortion of money or property by holding a prisoner or an item.
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
6.
7.
8.
9.

10.
11.
12.
13.
14.
15.
16.
1.

The two most common law felonies against property are arson and burglary.
The malicious and voluntary burning of the dwelling house of another person.
It means that the arsonist must intentionally or recklessly burn the house. No malice in the literal
sense of ill will is required.
Burglary is breaking and entering the dwelling house of another person in the nighttime with the intent
to commit a felony therein.
A dwelling house includes outbuildings in the area surrounding a house.
Money laundering is the process of transforming the proceeds of crime into ostensibly legitimate
money or other assets.
The most common criminals who launder money are drug traffickers, embezzlers, corrupt politicians
and public officials, mobsters, terrorists and con artists.
Drug traffickers need money laundering because they deal almost exclusively in cash.
The basic money laundering process has three steps: placement, layering and integration.
Placement is the step when the launderer inserts the dirty money into a legitimate financial institution.
Layering involves sending the money through various financial transactions to change its form and
make it difficult to follow.
Integration is the stage when the money re-enters the mainstream economy in legitimate-looking form
and it appears to come from a legal transaction.
There is a finite number of organizations and the number is constantly changing.
The most popular money laundering techniques are: black market Colombian peso exchange,
structuring deposits, overseas banks, underground/alternative banking, shell companies and investing
in legitimate businesses.
Smurfing is the breaking up of large amounts of money into smaller, less-suspicious amounts.
The most popular currency for money laundering is the U.S. dollar.
The effect of successful money laundering is the encouragement of criminals to continue their illicit
schemes because they get to spend their profit with no repercussions.
The economic effects of money laundering are devastating to developing countries because they lack
sufficient regulation for their newly privatized financial sectors.
Terrorisms connection with money laundering developed because the financers and terrorist
organizations wanted to maintain anonymity.
To fight money laundering the FATF issued the 49 Recommendations for banks.
The penalties are incarceration, fines, probation, civil litigation, and much more.

Hacking is the deliberate and unauthorized access, use, disclosure, and/or taking of electronic data on
a computer.
2. The crime is committed when a person willfully, knowingly, and without authorization or without
reasonable grounds that he or she has such authorization, attempts or achieves access,
communication, examination, or modification of data, computer programs, or supporting
documentation residing or existing internal or external to a computer, computer system, or computer
network.
3. Computer crimes are defined by the DOJ as any violations of criminal law that involve knowledge of
computer technology for their perpetration, investigation, or prosecution.
4. The DOJ divides computer crime into three categories.
5. Attacks on computers are made by: viruses, worms, Trojan horses, logic bombs, sniffers and DDoS.
6. Viruses are programs that modify other computer programs so that they carry out functions intended
by the creator of the virus.
7. Trojan horses activate a more destructive program embedded in the code.
8. They are used to monitor and analyze networks.
9. Worms are spread by electronic mail.
10. Logic bombs are used to disable a time-limited software sample after the passage of a predetermined
period of time.

You might also like