Illegal Smuggling & Trafficking
33 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Michael Kearns
Scoop.it!

HowStuffWorks "High-profile White-collar Crime "

HowStuffWorks "High-profile White-collar Crime " | Illegal Smuggling & Trafficking | Scoop.it
White-collar crime typically involves fraud and other nonviolent crimes. Learn more about white-collar crime.
Michael Kearns's insight:

 

PHASE 3

 

For a basic understanding of what white collar crime is, some of the most basic white collar crimes are listed. below.

 

Insider Trading- Primarily refers to buying or selling a stocks and shares, when those doing it are aware of non-public released information. 

 

 Securites Fraud- involves some sort of deception that misrepresents a company's performance that can change the companies values and can result in people making bad, or high-risk investments.  Usualy accountants are held responsible of Securites Fraud, as they may mark done wrong information, to raise market values.  This is known as "cooking the books" It makes it appear the company is bringing in more profit than it actually is. Insider trading may also fall within this category.

 

Bribery- is a well-known type of white-collar crime. It involves a relationship where someone gives a gift or reward to a powerful person in exchange for a perferred decision or use of power. A common situation is a influential person could agree to take a reward such as money in exchange for recommending a company's bid for a contract. This practice is considered unethicaland highly illegal in many circumstances.  Decisions may not be made on an objectiveness, and it can result in negative effects for the public, particularly in the cases of public officials.

more...
Michael Kearns's comment, March 31, 2014 10:27 AM
Computers are a newer source, being used by white collar criminals to commit crimes. Computer or Internet fraud is one of the most common white collar crimes plaguing the world. It occurs when someone intercepts a transmission or hacks into a computer to obtain one's personal or private information or credit card numbers. The scheme known as phishing, fraudsters may send e-mails that look to be from legitimate businesses with whom you interact with and in which they may try to get you to click on a hyperlink to enter your personal identification number (PIN) or other personal information so that they can gain entry into private banking information.
Michael Kearns's comment, March 31, 2014 10:31 AM
To combat white-collar crime, congress passed a wave of laws and statutes in the 1970s and 80s. The Racketeer Influence and Corrupt Organizations Act (RICO) was originally created to be associtated with mafia-related organized crime, but it was soon applied to white-collar crime. By law, racketeering included things like embezzlement from different union funds, and bribery and mail fraud. RICO made it easier to prosecute and convict corrupt organizations and seize assets related to corruption.
Michael Kearns's comment, March 31, 2014 10:35 AM
As international business becomes easier and more frequent, due to the development of communication technology, certain disparites that may be considered corruption are both more apparent. Corruption has made it difficult for Western companies to perform business in some less developed places. To purify the business ethics of the world, a group known as Transparency International was created to measure the corruption among different countries. The group believes more public awareness and the more that businesses establish and act by a code of conduct, the more pressure will be on governments and corporations to act on these internation communication frauds.<br>
Scooped by Michael Kearns
Scoop.it!

What is IT forensics? | IT & Computer forensics beginner’s guide | Forensic Control

What is IT forensics? | IT & Computer forensics beginner’s guide | Forensic Control | Illegal Smuggling & Trafficking | Scoop.it
Free IT forensics and computer forensics software. Forensic Control - IT forensics and computer forensics investigators in cases of computer misuse or dispute.
Michael Kearns's insight:

PHASE 3..........

     IT forensics is a new way law enforcement is combating white collar crimes.  IT forensics may constitute a scene of a crime, for example with hacking or denial of service attacks.  There may be hidden  evidence in the form of emails, internet history, documents or other files that may be important to crimes such as murder, kidnap, fraud and drug trafficking.

It is not just the content of emails, documents and other files which may be of interest to investigators but also the metadata associated with certain files.  A forensic examination may reveal when certain documents first appeared on a particular computer, when it was last edited or changed, when it was last saved or printed, and which user performed these actions.

 

 

more...
No comment yet.
Scooped by Michael Kearns
Scoop.it!

SEC.gov | "Ponzi" Schemes

SEC.gov | "Ponzi" Schemes | Illegal Smuggling & Trafficking | Scoop.it
Michael Kearns's insight:

Phase 3

more...
Michael Kearns's comment, March 26, 2014 2:22 PM
A Ponzi scheme is a serious white collar crime. It is a type of investment fraud that involves the payment of returns to exsiting investors to funds contributed by new investors. Ponzi scheme perpitraters will solicit newcoming investors by promising to invest their funds in opportunities claimed to create a high returns with little risk. In many Ponzi schemes, the schemers will concentrate their time on attracting new investors, and money sources, to make payments to earlier investors that will create a false appearance that investors are profiting from a legitmate business, but they are really risking sometimes millions of dollars, on unsafe investments.
Scooped by Michael Kearns
Scoop.it!

Money Laundering and Asset Forfeiture

Money Laundering and Asset Forfeiture | Illegal Smuggling & Trafficking | Scoop.it
Money Laundering and Asset Forfeiture
Important laws help enable law enforcement officers to seize criminal profits and deter future crimes.
By Douglas Leff
Michael Kearns's insight:

http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/april-2012/money-laundering-and-asset-forfeiture PHASE 3

more...
Michael Kearns's comment, March 24, 2014 2:24 PM
(Phase 3) Money laundering is an evolving crimes in which criminals are taking profits and moving them in a prohibited manner. Criminals create profits in the form of money or property as a result of committing a crime that is designated as a specified unlawful activity (SUA). Criminals transport the money, often with intent to disguise the nature, location, source, ownership, or control of the funds, which is known as “concealment” money laundering. Fortunately, most profit-based crimes are designated as SUAs. The movement of SUAs proceeds, either to conceal or promote the same or different SUA will provide the foundation for a money laundering charge. Investigators do not need to prove that the launderer knew of the specific SUA from which the funds came from. All that investigators need to prove is that the person laundering the money believed it was unlawful. This usually permits investigators to prove the charge entirely through circumstantial evidence by showing that the launderer handled the money in a way different from an non-illegal transfer.
Scooped by Michael Kearns
Scoop.it!

Strategy to Combat Transnational Organized Crime: Disrupt Drug Trafficking and Its Facilitation of Other Transnational Threats | The White House

Strategy to Combat Transnational Organized Crime: Disrupt Drug Trafficking and Its Facilitation of Other Transnational Threats | The White House | Illegal Smuggling & Trafficking | Scoop.it
Michael Kearns's insight:

Transnational Organized Crime (TOC), has been using different networks, and forms of technological communications to commit there schemes, with more incognito approaches.  This has been possible with the new developments in technological equipments.  Data Transfer Objects (DTO), have developed to become versitile to the criminals needs.  These networks operate worldwide, and the operations run through weak security programs.  The Kingpin Act, which was enabled to help stop the flow of TOCs, have allowed continued efforts to "enhance collaborations among domestic law enforcements agencies, to combat trafficking, and different TOCs." The DEA has developed the Counter-Narco-Terrorism Operations Center (CNTOC)  which coordinated current operations and investigations linked to Narco-Terrorism.  The attempt is to intercept these networks that TOCs are using in hopes of gaining insider information on how crime organizations, are planning their operations.

more...
No comment yet.
Scooped by Michael Kearns
Scoop.it!

Drug Trafficking/Distribution

Drug Trafficking/Distribution | Illegal Smuggling & Trafficking | Scoop.it
Drug trafficking/distribution laws penalize the selling, transportation, and illegal import into the United States of unlawful controlled substances such as
more...
Michael Kearns's comment, February 17, 2014 2:20 PM
Drug Distribution is the selling, transportation, and illegal import of controlled narcotics. Punishments can vary greatly, depending on amounts, substances, and number of times previously charged. Drug possesion is a felony, and is a more serious charge, than just drug possesion. A controlled substances is one that is governed by law enforcement, under different statues. All narcotics are under different Schedules, or classifications. The penalty may vary based on the schedule.
Scooped by Michael Kearns
Scoop.it!

Firearms Enforcement | ATF

Firearms Enforcement | ATF | Illegal Smuggling & Trafficking | Scoop.it
Michael Kearns's insight:

 

 

To Combat the use of illegal weapons, and arms dealing, the ATF has implemented a new tracing system.  It tracks the movement of recovered firearms by manufacturer or the importer, to the distribution chains, all the way until it is first purchased.  This method is becoming, the routine way of tracing firearms, that are recovered at crime scenes.  The ATF is also using a system called eTrace.  This is a paperless firearm t4racing system, that is accessible throughout the internet

more...
Michael Kearns's comment, February 13, 2014 2:15 PM
The NIBIN (NAtional Integrated Ballistic Information Network) is a program that uses the net to track ballistic information. The program provides reactable information in a short amount of time. It is the only interstate "Automated Ballistic Imaging Network" in the US. Before NIBIN, ballistic information. Examiners use to enter cartridge cases into a image base system, to compared them with other ballistic images in a selct database. The NIBIN is a much faster, reliable, and more efficient way, of ending cases.
Scooped by Michael Kearns
Scoop.it!

Metadata Definition

The definition of Metadata defined and explained in simple language.
Michael Kearns's insight:

PHASE 3.......Metadata is defined as data within your data. It gives information about a certain file(s). For example, an picture may include metadata that describes how large the picture is, the color contrast and depths, the resolution, when the image was created or taken, and other significant information. A text document's metadata may contain information about how long the document is, who wrote it, when it was written, and a summary of the documents content.

Web pages often include metadata in the form of meta tags.  Meta tags are commonly used to describe a Web pages content. Most search engines use this data when adding pages to their search index.  Law enforcement and criminals are both taking advantage for the use of metadata.

 

more...
No comment yet.
Scooped by Michael Kearns
Scoop.it!

Common Fraud Schemes

Common Fraud Schemes | Illegal Smuggling & Trafficking | Scoop.it
Michael Kearns's insight:

Phase 3

 

more...
Michael Kearns's comment, March 27, 2014 2:10 PM
Identity theft happens when someone poses as you to perform a fraud or illegal action. ID thieves usually get the information necessary to steal your identity from a wide-range of sources, which may include stealing your wallet, rifling through trash, or by finding out your credit or bank info. Thieves usually approach you in person, by telephone, or on the Internet and ask you for the necessary information. Sources of info about you are so usuall so vast that you cannot completley, 100% prevent the theft of your identity. The risk however can me minimized
Michael Kearns's comment, March 27, 2014 2:16 PM
Tips for preventing identity theft are as follows: Never throw away receipts, credit statements, credit cards, or bank statements that are in a usable form. Do not give out credit card numbers through the telephone or other long-distance communication device. Check your bank account monthly, and let your bank know of any discrepancies as soon as possible. Keep lists of telephone numbers to call to report the loss or theft of your wallet, credit cards, or other items that may have personal information. Report unauthorized transactions to your bank, credit card company, and police as soon as you become aware of them. Review a copy of your credit report at least once each year.
Scooped by Michael Kearns
Scoop.it!

USDOJ: CRM: About the Criminal Division

USDOJ: CRM: About the Criminal Division | Illegal Smuggling & Trafficking | Scoop.it
Michael Kearns's insight:

Phase 3

more...
Michael Kearns's comment, March 26, 2014 2:11 PM
In a particular, notorious case of identity theft, the identity thief was able to steal more than $100,000 of credit card debt, obtained a federal home loan, and bought homes, motorcycles, and handguns in the victim's name. He also filed for bankruptcy in the victim's name. the victim and his wife spent more than four years and more than $15,000 of their money to rebuild their credit and reputation, the criminal served a brief sentence.
Scooped by Michael Kearns
Scoop.it!

Trafficking Drugs

Trafficking Drugs | Illegal Smuggling & Trafficking | Scoop.it
Trafficking Drugs - The illegal selling and trafficking of drugs online is one of many computer crimes currently being committed. Everyone has received spam e-mail regarding prescription drugs online. This is an example of the illegal sale of narcotics online and it falls into the category of serious computer crimes. But where do the drugs which are available as drugs online come from?
Michael Kearns's insight:

Illegal Drug Trafficking has extended beyond the normal side, of sneaking it under the police's noses.  The United Nations of Drug and Crime (UNDC), has reported the use of illegal online pharmacies is becoming prevelant in many parts of the world.  The drugs are bought online, and shipped overseas through couriers.  According to http://criminal.laws.com, drug sales account for 8% of the world's trade profit.  The rise in recent technologies, is making the practice of online trafficking extremely prevelant. 

more...
No comment yet.
Scooped by Michael Kearns
Scoop.it!

Traffickers using hackers to import drugs into major Europe ports - Telegraph

Traffickers using hackers to import drugs into major Europe ports - Telegraph | Illegal Smuggling & Trafficking | Scoop.it
Europol disclose that drug traffickers have recruited hackers to help them smuggle shipments of contraband into major ports including Antwerp
Michael Kearns's insight:

Drug Smugglers are beginning to hack into computers at ports to enable them the smuggle shipments of illegal goods.  Smugglers have recruited hackers to break IT systems.  This allowed smugglers to find where the exact shipments were coming from, allowing primarily South American Accomplices to plant the drugs in the containers, which are suppose to contain legal goods.  Drivers where then hired to steal the shipments before the legitmate owners arrived to pick them up.

more...
Michael Kearns's comment, February 19, 2014 10:22 AM
Complaints came to light after the owners began to complain of the stolen shipments, which were missing. After security was heightened on the softwares, the smugglers began to sneak hackers into the docks, and they fitted special logging devices onto the terminals. This allowed them to remotely see all the information that was typed into the specific computers. It also gave them access to passwords necessary to view information. As a result cyber crimes, are now being used to help with the illegal smuggling of narcotics.
Scooped by Michael Kearns
Scoop.it!

DEA / Intelligence

DEA / Intelligence | Illegal Smuggling & Trafficking | Scoop.it
Inside the DEA, DEA Programs, Intelligence
Michael Kearns's insight:

The DEA, in coordination, with state, federal, and local governments, to combat drug and illegal narcotic crimes.  The DEA intelligence program, helps to initiate drug-related investigations.  As taken from  www.justice.org, the general procedures of the DEA intelligence follow:

Collect and produce intelligence in support of the Administrator and other federal, state, and local agencies;Establish and maintain close working relationships with all agencies that produce or use narcotics intelligence;Increase the efficiency in the reporting, analysis, storage, retrieval, and exchange of such information; and, undertake a continuing review of the narcotics intelligence effort to identify and correct deficiencies

more...
Michael Kearns's comment, February 12, 2014 2:25 PM
The DEA has started training other levels of law enforcement into using new intelligence tactics. With analytical support from the Intelligence Program, other levels of law enforcement are beginning to put a stop to major traffickers, and drug dealing organizations. The application of applying the procedures has been beneficial to many law enforcers looking to cut down on drug related crimes.
Scooped by Michael Kearns
Scoop.it!

DEA /Federal Trafficking Penalties

DEA /Federal Trafficking Penalties | Illegal Smuggling & Trafficking | Scoop.it
Inside the DEA, DEA Programs, Federal Trafficking Penalties
Michael Kearns's insight:

The US DEA's chart that was published to show the penalties for Illegal Drug Smuggling.  The chart lists the schedule of the drug (I-V), and the offense that goes with being caught trafficking the particular drug.  Starting with the most minor of offenses to the most extreme of offenses.  It also lists the amount that one must be caught with in order to receive the particular penalties.

more...
No comment yet.