SlideShare a Scribd company logo
Chapter 12
Enterprise Crime: White-Collar Crime,
Cyber Crime, and Organized Crime
Enterprise Crime
 Crimes of the marketplace
 White-collar crime: Illegal activities of people and institutions who
profit through legitimate business transactions
 Cyber crime: Involves people using instruments of modern
technology for criminal purposes
 Organized crime: Illegal activities of people and organizations,
which profit through illegitimate business enterprise
Figure 12.1 Enterprise Crime: White Collar, Cyber Crime, and
Organized Crime
White Collar Crime
• Edwin Sutherland coined the phrase “white collar crime” to describe
criminal activities of the rich and powerful
 Contemporary definitions of white collar crime include both
middle-income persons and corporate titans
 Costs of white-collar crime are in the hundreds of billions of
dollars and exceed any other type of crime
 White-collar crimes both kill people and damage property
Components of White-Collar Crime
• Stings and Swindles
 A white collar crime in which people use their institutional or
business position to bilk people out of their money
 Swindlers often target elderly and religious organizations
• Religious swindles
 Use of religion and creation of fake religious organizations to bilk
those out of money (Stelter and Vision Oil Company)
Components of White-Collar Crime
• Chiseling
 Involves cheating an organization, its consumers, or both on a
regular basis
 Bogus auto repairs
 Professional chiseling: Use their position to chisel clients (doctors
and pharmacists)
 Securities fraud: Commodity and stock markets deceptions
• Churning (repeated unnecessary buying/selling)
• front running (placing personal orders ahead of clients)
• bucketing (skimming profits)
• insider trading ( information giving the trader unfair advantage)
Components of White-Collar Crime
• Individual Exploitation of Institutional Position
 Individuals’ exploiting their power or position in organizations to
take advantage of other people who have an interest in how that
power is used.
 Occurs when the victim has a clear right to expect a service and
offender threatens to withhold service unless an additional
payment or bribe is forthcoming.
Components of White-Collar Crime
• Influence Peddling and Bribery
 Taking of “kickbacks” in return for contracts or favors
 Influence peddling in government: acceptance of bribes for favor
(Robin HUD and police examples)
 Influence peddling in business: payoffs for business contracts
(Gulf Oil and Lockheed)
 Congress pas the Foreign Corruption Practices Act in 1977 in
response to such violations
Components of White-Collar Crime
• Embezzlement and Employee Fraud
 Blue-collar fraud: Acts of pilferage
 Management fraud:
• Converting company assets for personal benefit
• fraudulently receiving bonuses
• fraudulently increasing personal holdings of company stock
• manipulating of accounts
• concealing unacceptable performance form stockholders
Components of White-Collar Crime
• Weblink
www.whistleblowers.org/
Components of White-Collar Crime
• Client Fraud
 Health care fraud: Includes ping-ponging, Medicare/Medicaid
frauds, kickbacks and self-referrals
 Bank fraud: Includes check kiting, forgery, and illegal transactions
 Tax evasion: Tax fraud by deliberately underreporting taxes
Components of White-Collar Crime
• Corporate Crime (Organizational Crime)
 Actual authority: Occurs when a corporation knowingly gives authority
for an employee to act
 Apparent authority: Occurs when third party reasonably believes the
agent has the authority to act
 Illegal restraint of trade and price fixing: Involves a scheme to stifle
competition and create a monopoly (Sherman Antitrust Act)
 Tying arrangement: Requiring customers to use other services
connected to corporation
 Group boycotts: Of retail stores not complying with rules or wishes
 Price fixing: Conspiracy to set and control prices
 Deceptive pricing: Occurs when corporations use incomplete or
misleading information to fulfill contracts (defense contractors)
 False claims and advertising: Involves unjustified claims about a
product (telemarketing)
 Worker Safety/Environmental crimes: includes unsafe working
conditions and pollution
CNN Clip - Tyco CEO On Trial
Causes of White- Collar Crime
• Greedy or Needy
 Motivations include a need to keep or improve a job, satisfy egos,
or keep up with inflation to support a family
• Corporate Culture Theory
 Involves placing excessive demands on employees
• Self-Control View
 Quick benefits with minimal effort
White-Collar Law Enforcement Systems
• Controlling White-Collar Crime
 Compliance strategies: Involve cooperation and self-policing
among businesses (SEC and FDA)
 Sarbanes-Oxley legislation (SOX) limits nonaudit services that
auditing firms can perform publicly
 Compliance strategies create marketplace incentives to obey the
law and avoid the stigmatization of their crimes
 Deterrence strategies: Involve detection and punishing the
offenders
White-Collar Law Enforcement Systems
• Is the Tide Turning?
 Growing evidence that white-collar crime deterrence strategies
have become normative
 Get-tough approach appears to be affecting all classes of white-
collar criminals
 U.S. Sentencing Commission increased penalties in April 2001
Internet Crime
• Involves the use of computers to illegally take possession of
information, resources, or funds
 Distributing Sexual Material
 Denial of Service Attack
 Illegal Copyright Infringement (I.E. warez)
 Internet Securities Fraud
• Market manipulation: Pump and dump and cyber-smear
• Fraudulent offerings of securities
• Illegal touting
• Identity Theft
 Ponzi/Pyramid Schemes
 Nondelivery of Goods/Services (I.E. Ebay)
Computer Crimes
 Theft of services
 Use of computer data for personal gain
 Unauthorized use for financial processing
 Illegally copying and selling of software
 Use of viruses to destroy data
Computer Crimes
• Common Techniques
 The Trojan horse: reprogramming computers for illicit purposes
 The salami slice: dummy account in company records
 Super-zapping: bypassing antitheft standards
 The logic bomb: secret programs for monitoring a company’s
computer system
 Impersonation: Unauthorized access to computer systems
 Data leakage: Illegally obtaining data in small amounts
 Computer virus: Worms intended to disrupt or destroy programs
Controlling Cyber Crime
• Counterfeit Access Device and Computer Fraud and Abuse Law
(1984) and the National Information Infrastructure Protection Act
(NIIPA) 1996
 Controlling Internet Crime
• Identity Theft and Assumption Act-1998
• Creation of working groups
• Internet Fraud Complaint Center
• Private security companies
Organized Crime
• Characteristics of Organized Crime
 Conspiratorial activity
 Economic gain is the primary goal
 Not limited to illicit services
 Employs predatory tactics
 Effective control of its members
 Mafia is a stereotype for organized crime
 Terrorism is not associated with organized crime
Organized Crime
• Activities of Organized Crime
 Narcotics distribution
 Gambling
 Prostitution
 Loan-sharking
 Pornography
 Theft-rings
Organized Crime
• The Concept of Organized Crime
 Mafia: first organized in Italy/Sicily
 Alien Conspiracy Theory: national syndicate of 25 or so Italian-
dominated crime families called La Cosa Nostra
 Contemporary Organized Crime Groups: include Chicano,
Cuban, and Asian racketeers
 Eastern European Crime Groups: Include Russian and other
groups (i.e. YACS)
Organized Crime
• Controlling Organized Crime
 In 1970 Congress passed the Organized Crime Control Act (Title
IX-RICO)
 Influenced and Corrupt Organization Act (RICO) created new
categories of offenses:
• Deriving income from racketeering
• Acquiring an interest or control over an enterprise engaged in
interstate or foreign commerce
• Conspiring to make income, loans, or conducting business
through racketeering means
 Enterprise theory of investigation (ETI): model used by the FBI as
an investigative tool that focuses on the structure of the criminal
enterprise rather than on the criminal acts
Organized Crime
• The Future of Organized Crime
 Traditional crime syndicates are declining
• Age of reining family heads
• Lack of skill of younger generation
• Active enforcement policies
• Changing values in society

More Related Content

What's hot

ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
BillyCheuk
 
D4S2 Red Flags.pptx
D4S2 Red Flags.pptxD4S2 Red Flags.pptx
D4S2 Red Flags.pptx
30rustiegmailcom
 
Crimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeCrimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crime
Leen Gultia
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...
The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...
The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...
PECB
 
Best practices in conducting Financial Investigations
Best practices in conducting Financial InvestigationsBest practices in conducting Financial Investigations
Best practices in conducting Financial Investigations
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
BillyCheuk
 
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
BillyCheuk
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from others
Adam Quirk
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
BillyCheuk
 
Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...
Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...
Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...
Levenfeld Pearlstein, LLC
 
Corruption in private Sector- Infosys's example
Corruption in private Sector- Infosys's exampleCorruption in private Sector- Infosys's example
Corruption in private Sector- Infosys's example
Akash Tyagi
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2Kenny Boddye
 
Forensics and Anti-Bribery – the Nigerian perspective
Forensics and Anti-Bribery – the Nigerian perspectiveForensics and Anti-Bribery – the Nigerian perspective
Forensics and Anti-Bribery – the Nigerian perspective
PECB
 
Key Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends ReportKey Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends Report
Clio - Cloud-Based Legal Technology
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
- Mark - Fullbright
 
Corruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethicsCorruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethics
Costy Costantinos
 
Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...
Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...
Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...
Levenfeld Pearlstein, LLC
 

What's hot (20)

ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
D4S2 Red Flags.pptx
D4S2 Red Flags.pptxD4S2 Red Flags.pptx
D4S2 Red Flags.pptx
 
Crimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeCrimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crime
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...
The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...
The Role of Audit in Fighting Corruption, and the Impact of Perceived Securit...
 
Fraud & corruption
Fraud & corruptionFraud & corruption
Fraud & corruption
 
Best practices in conducting Financial Investigations
Best practices in conducting Financial InvestigationsBest practices in conducting Financial Investigations
Best practices in conducting Financial Investigations
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
 
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and DetectionACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
ACC-IIA Singapore Seminar 2015 Part 4 Prevention and Detection
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from others
 
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
 
Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...
Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...
Audited Through the Courts: The Troubling Trend in Flase Claims Act, Class Ac...
 
Corruption in private Sector- Infosys's example
Corruption in private Sector- Infosys's exampleCorruption in private Sector- Infosys's example
Corruption in private Sector- Infosys's example
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
 
Forensics and Anti-Bribery – the Nigerian perspective
Forensics and Anti-Bribery – the Nigerian perspectiveForensics and Anti-Bribery – the Nigerian perspective
Forensics and Anti-Bribery – the Nigerian perspective
 
Ppt by
Ppt by Ppt by
Ppt by
 
Key Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends ReportKey Insights from the 2019 Legal Trends Report
Key Insights from the 2019 Legal Trends Report
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Corruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethicsCorruption, illicit financials flows and governance ethics
Corruption, illicit financials flows and governance ethics
 
Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...
Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...
Whistleblower and Class Action Lawsuits in Sales Tax: Dammed if You Do, Damne...
 

Similar to Attorney Ray Richards White collar Theory Trial Lawyer Application

WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfWHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
sooryasalini
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
waseemkhanpbn
 
KIAR_Module 5- White Collar Crime 8 August 2023.pptx
KIAR_Module 5- White Collar Crime 8 August 2023.pptxKIAR_Module 5- White Collar Crime 8 August 2023.pptx
KIAR_Module 5- White Collar Crime 8 August 2023.pptx
aishabojang15
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
Uttma Shukla
 
Money laundering.pptx
Money laundering.pptxMoney laundering.pptx
Money laundering.pptx
RidwanAhmed40
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
Zeeshan Shahid
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
tomciolkosz
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The FraudRaffa Learning Community
 
White collar crime
White collar crimeWhite collar crime
White collar crime
Asian Paint Bangladesh Ltd
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Sharing Slides Training
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
sharing notes123
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
SBS AND COMPANY LLP, CHARTERED ACCOUNTANTS
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
Mirsazzad
 
Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)
andrewrmarshall
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
ssuser7464571
 
Chapter_5.pptx
Chapter_5.pptxChapter_5.pptx
Chapter_5.pptx
harshadampgdm
 
Fraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common OccurrenceFraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common Occurrence
Christy Davis
 
AML_Draft.pptx
AML_Draft.pptxAML_Draft.pptx
AML_Draft.pptx
Coach Karthik
 

Similar to Attorney Ray Richards White collar Theory Trial Lawyer Application (20)

WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdfWHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
WHITE COLLAR CRIMEWhite-collar crime is nonviolent crime commited.pdf
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
 
KIAR_Module 5- White Collar Crime 8 August 2023.pptx
KIAR_Module 5- White Collar Crime 8 August 2023.pptxKIAR_Module 5- White Collar Crime 8 August 2023.pptx
KIAR_Module 5- White Collar Crime 8 August 2023.pptx
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
Money laundering.pptx
Money laundering.pptxMoney laundering.pptx
Money laundering.pptx
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Chapter_5.pptx
Chapter_5.pptxChapter_5.pptx
Chapter_5.pptx
 
Fraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common OccurrenceFraud, Specifically Corporate Fraud, Is A Common Occurrence
Fraud, Specifically Corporate Fraud, Is A Common Occurrence
 
AML_Draft.pptx
AML_Draft.pptxAML_Draft.pptx
AML_Draft.pptx
 
Conference paper 1 st national forensic conference, yaounde. [compatibility m...
Conference paper 1 st national forensic conference, yaounde. [compatibility m...Conference paper 1 st national forensic conference, yaounde. [compatibility m...
Conference paper 1 st national forensic conference, yaounde. [compatibility m...
 

Recently uploaded

原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
SidharthKashyap5
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
OmGod1
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 

Recently uploaded (20)

原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 

Attorney Ray Richards White collar Theory Trial Lawyer Application

  • 1. Chapter 12 Enterprise Crime: White-Collar Crime, Cyber Crime, and Organized Crime
  • 2. Enterprise Crime  Crimes of the marketplace  White-collar crime: Illegal activities of people and institutions who profit through legitimate business transactions  Cyber crime: Involves people using instruments of modern technology for criminal purposes  Organized crime: Illegal activities of people and organizations, which profit through illegitimate business enterprise
  • 3. Figure 12.1 Enterprise Crime: White Collar, Cyber Crime, and Organized Crime
  • 4. White Collar Crime • Edwin Sutherland coined the phrase “white collar crime” to describe criminal activities of the rich and powerful  Contemporary definitions of white collar crime include both middle-income persons and corporate titans  Costs of white-collar crime are in the hundreds of billions of dollars and exceed any other type of crime  White-collar crimes both kill people and damage property
  • 5. Components of White-Collar Crime • Stings and Swindles  A white collar crime in which people use their institutional or business position to bilk people out of their money  Swindlers often target elderly and religious organizations • Religious swindles  Use of religion and creation of fake religious organizations to bilk those out of money (Stelter and Vision Oil Company)
  • 6. Components of White-Collar Crime • Chiseling  Involves cheating an organization, its consumers, or both on a regular basis  Bogus auto repairs  Professional chiseling: Use their position to chisel clients (doctors and pharmacists)  Securities fraud: Commodity and stock markets deceptions • Churning (repeated unnecessary buying/selling) • front running (placing personal orders ahead of clients) • bucketing (skimming profits) • insider trading ( information giving the trader unfair advantage)
  • 7. Components of White-Collar Crime • Individual Exploitation of Institutional Position  Individuals’ exploiting their power or position in organizations to take advantage of other people who have an interest in how that power is used.  Occurs when the victim has a clear right to expect a service and offender threatens to withhold service unless an additional payment or bribe is forthcoming.
  • 8. Components of White-Collar Crime • Influence Peddling and Bribery  Taking of “kickbacks” in return for contracts or favors  Influence peddling in government: acceptance of bribes for favor (Robin HUD and police examples)  Influence peddling in business: payoffs for business contracts (Gulf Oil and Lockheed)  Congress pas the Foreign Corruption Practices Act in 1977 in response to such violations
  • 9. Components of White-Collar Crime • Embezzlement and Employee Fraud  Blue-collar fraud: Acts of pilferage  Management fraud: • Converting company assets for personal benefit • fraudulently receiving bonuses • fraudulently increasing personal holdings of company stock • manipulating of accounts • concealing unacceptable performance form stockholders
  • 10. Components of White-Collar Crime • Weblink www.whistleblowers.org/
  • 11. Components of White-Collar Crime • Client Fraud  Health care fraud: Includes ping-ponging, Medicare/Medicaid frauds, kickbacks and self-referrals  Bank fraud: Includes check kiting, forgery, and illegal transactions  Tax evasion: Tax fraud by deliberately underreporting taxes
  • 12. Components of White-Collar Crime • Corporate Crime (Organizational Crime)  Actual authority: Occurs when a corporation knowingly gives authority for an employee to act  Apparent authority: Occurs when third party reasonably believes the agent has the authority to act  Illegal restraint of trade and price fixing: Involves a scheme to stifle competition and create a monopoly (Sherman Antitrust Act)  Tying arrangement: Requiring customers to use other services connected to corporation  Group boycotts: Of retail stores not complying with rules or wishes  Price fixing: Conspiracy to set and control prices  Deceptive pricing: Occurs when corporations use incomplete or misleading information to fulfill contracts (defense contractors)  False claims and advertising: Involves unjustified claims about a product (telemarketing)  Worker Safety/Environmental crimes: includes unsafe working conditions and pollution
  • 13. CNN Clip - Tyco CEO On Trial
  • 14. Causes of White- Collar Crime • Greedy or Needy  Motivations include a need to keep or improve a job, satisfy egos, or keep up with inflation to support a family • Corporate Culture Theory  Involves placing excessive demands on employees • Self-Control View  Quick benefits with minimal effort
  • 15. White-Collar Law Enforcement Systems • Controlling White-Collar Crime  Compliance strategies: Involve cooperation and self-policing among businesses (SEC and FDA)  Sarbanes-Oxley legislation (SOX) limits nonaudit services that auditing firms can perform publicly  Compliance strategies create marketplace incentives to obey the law and avoid the stigmatization of their crimes  Deterrence strategies: Involve detection and punishing the offenders
  • 16. White-Collar Law Enforcement Systems • Is the Tide Turning?  Growing evidence that white-collar crime deterrence strategies have become normative  Get-tough approach appears to be affecting all classes of white- collar criminals  U.S. Sentencing Commission increased penalties in April 2001
  • 17. Internet Crime • Involves the use of computers to illegally take possession of information, resources, or funds  Distributing Sexual Material  Denial of Service Attack  Illegal Copyright Infringement (I.E. warez)  Internet Securities Fraud • Market manipulation: Pump and dump and cyber-smear • Fraudulent offerings of securities • Illegal touting • Identity Theft  Ponzi/Pyramid Schemes  Nondelivery of Goods/Services (I.E. Ebay)
  • 18. Computer Crimes  Theft of services  Use of computer data for personal gain  Unauthorized use for financial processing  Illegally copying and selling of software  Use of viruses to destroy data
  • 19. Computer Crimes • Common Techniques  The Trojan horse: reprogramming computers for illicit purposes  The salami slice: dummy account in company records  Super-zapping: bypassing antitheft standards  The logic bomb: secret programs for monitoring a company’s computer system  Impersonation: Unauthorized access to computer systems  Data leakage: Illegally obtaining data in small amounts  Computer virus: Worms intended to disrupt or destroy programs
  • 20. Controlling Cyber Crime • Counterfeit Access Device and Computer Fraud and Abuse Law (1984) and the National Information Infrastructure Protection Act (NIIPA) 1996  Controlling Internet Crime • Identity Theft and Assumption Act-1998 • Creation of working groups • Internet Fraud Complaint Center • Private security companies
  • 21. Organized Crime • Characteristics of Organized Crime  Conspiratorial activity  Economic gain is the primary goal  Not limited to illicit services  Employs predatory tactics  Effective control of its members  Mafia is a stereotype for organized crime  Terrorism is not associated with organized crime
  • 22. Organized Crime • Activities of Organized Crime  Narcotics distribution  Gambling  Prostitution  Loan-sharking  Pornography  Theft-rings
  • 23. Organized Crime • The Concept of Organized Crime  Mafia: first organized in Italy/Sicily  Alien Conspiracy Theory: national syndicate of 25 or so Italian- dominated crime families called La Cosa Nostra  Contemporary Organized Crime Groups: include Chicano, Cuban, and Asian racketeers  Eastern European Crime Groups: Include Russian and other groups (i.e. YACS)
  • 24. Organized Crime • Controlling Organized Crime  In 1970 Congress passed the Organized Crime Control Act (Title IX-RICO)  Influenced and Corrupt Organization Act (RICO) created new categories of offenses: • Deriving income from racketeering • Acquiring an interest or control over an enterprise engaged in interstate or foreign commerce • Conspiring to make income, loans, or conducting business through racketeering means  Enterprise theory of investigation (ETI): model used by the FBI as an investigative tool that focuses on the structure of the criminal enterprise rather than on the criminal acts
  • 25. Organized Crime • The Future of Organized Crime  Traditional crime syndicates are declining • Age of reining family heads • Lack of skill of younger generation • Active enforcement policies • Changing values in society