Financial Crime in the Twenty-First Century: the Rise of the Virtual Collar Criminal
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Relationship Between Debt and Crime: a Systematic and Scoping
EJP0010.1177/2066220320964896European Journal of Probationvan Beek et al. 9648962020 Original Article European Journal of Probation 1 –31 The relationship between debt © The Author(s) 2020 Article reuse guidelines: and crime: A systematic and sagepub.com/journals-permissions https://doi.org/10.1177/2066220320964896DOI: 10.1177/2066220320964896 scoping review journals.sagepub.com/home/ejp Gercoline van Beek Vivienne de Vogel University of Applied Sciences of Utrecht, The Netherlands Dike van de Mheen Tranzo, Tilburg University, The Netherlands Abstract Compared to macroeconomic factors, the financial situation of the individual may provide better insight into the relationship between debt and crime. However, the relationship between debt and crime is still unclear and little is known about the causality of this relationship and the factors that influence it. To obtain more insight into this relationship, a systematic and scoping literature review was conducted. Five articles were analyzed in the systematic review, and 24 articles in the scoping review. The results of the systematic review show a strong association between debt and crime whereby debt is a risk factor for crime, especially for recidivism and regardless of the type of crime, and crime is a risk factor for debt. The scoping review provided additional and in-depth insight, and placed the results of the systematic review in a broader perspective. Moreover, it emphasized the prevalence of debt among offenders, regardless of age, and identified the factors that influence the relationship between debt and crime. Keywords Crime, criminal behavior, debt, debts, financial problems Introduction The relationship between socioeconomic factors and crime is a classic theme in crimino- logical literature (Dunaway et al., 2000; Ellis and McDonald, 2000; Tittle et al., 1978). -
Revealing the True Cost of Financial Crime What’S Hiding in the Shadows?
Revealing the true cost of financial crime What’s hiding in the shadows? Focus on Latin America and the Caribbean Refinitiv | Revealing the true cost of financial crime In March 2018, Refinitiv commissioned a global survey to better understand the true cost of financial crime and to raise awareness of its wider impact on business, individuals and society as a whole. In total, over 2,300 senior managers from large organizations across 19 countries participated. We also supplemented the survey findings by conducting in-depth research and holding interviews with leading NGOs (Education Endowment Foundation, Transparency International UK and Walk Free Foundation) and the European Union’s law enforcement agency to gain perspective on the human cost of financial crime. This report specifically examines the findings in Latin America and the Caribbean. 2 Refinitiv | Revealing the true cost of financial crime About the survey For purposes of this report we have based on first-hand experience and used a wide definition of financial knowledge. This report focuses on Latin crime, one that goes beyond the scope America and the Caribbean. with which Refinitiv is traditionally The survey sought feedback from both associated. In order to provide as publicly listed and privately owned complete a picture as possible on the organizations. social and financial impact of financial 2,373RESPONDENTS crime, we have included bribery and A range of industries was consulted, corruption; money laundering; fraud; including agriculture; mining; theft; cybercrime; and slave labor/ construction; retail; manufacturing human trafficking. and financial. that the standard A total of 2,373 C-suite/senior Please note 19COUNTRIES management in large organizations convention of rounding has been across 19 countries1 completed applied and consequently some totals the survey. -
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable Gibson Mba Jeremiah Onaolapo Royal Holloway University College London University of London Gianluca Stringhini Lorenzo Cavallaro University College London Royal Holloway University of London ABSTRACT ans living in Nigeria. While the long history and advanced Most of cyberscam-related studies focus on threats perpe- use of Information and Communication Technology (ICT) trated against the Western society, with a particular atten- in the Western societies justify the large body of literature tion to the USA and Europe. Regrettably, no research has dealing with its misuse, the absence of detailed studies on been done on scams targeting African countries, especially other regions, such as Africa, creates the impression that Nigeria, where the notorious and (in)famous 419 advanced- these societies are immune from cyber attacks. On the con- fee scam, targeted towards other countries, originated. How- trary, there is more happening out there that has not been ever, as we know, cybercrime is a global problem affecting brought to the attention of the concerned public. Our study all parties. In this study, we investigate a form of advance aims at bridging this gap, i.e., the paucity of African unique fee fraud scam unique to Nigeria and targeted at Nigerians, contribution to the global cybercrime, by studying in de- but unknown to the Western world. For the study, we rely tail a form of 419 (advance fee fraud) scam unknown to the substantially on almost two years worth of data harvested West but unique to Africa|Nigeria in particular|targeted from an online discussion forum used by criminals. -
Understanding Victims of Financial Crime a Qualitative Study with People Affected by Investment Fraud
Understanding victims of financial crime A qualitative study with people affected by investment fraud Authors: Shannon Harvey, Jane Kerr, Jasmin Keeble and Carol McNaughton Nicholls Date: 03/03/2014 Prepared for: Financial Conduct Authority Summary Financial crime affects thousands of people in Britain every year, yet very little is known about the experiences, behaviours and decision-making of victims of these crimes. This qualitative study involved in-depth, face-to-face interviews with 31 victims of investment fraud, including boiler room share fraud, land banking, and frauds involving the sale of carbon credits, diamonds, wine, rare metals, gold and foreign exchange. Interviewees also included those who had been victims of recovery room fraud. People affected by investment fraud are not simply passive victims. Their accounts highlight their agency, and their attempts to prevent their own victimisation. Victims’ narratives illustrate the numerous ways that they seek to verify the authenticity of the supposed investment opportunity, including challenging the fraudster, conducting independent research, contacting the FCA and other professionals, and talking to family, friends and colleagues. However, victims described experiences where, despite this opportunity for intervention and to disrupt the fraud, the ambiguous information they received in fact further supported the fraud. Fraudsters do not simply mislead victims, they actively groom them into a relationship where they become emotionally attached to the fraud(ster). Fraudsters mislead victims through veneers of professionalism, such as high quality documentation, a professional business set-up and well-presented sales people. This is extended through deliberate deception, circumventing regulatory regimes and obscuring their identity. However, veneers of professionalism and deception tactics alone are insufficient to perpetrate an investment fraud. -
Hacks, Leaks and Disruptions | Russian Cyber Strategies
CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia, -
2016 Wrap-Up Cybercrime Tactics and Techniques
Cybercrime tactics and techniques 2016 wrap-up TABLE OF CONTENTS 01 Executive summary 02 Windows malware 05 Early 2017 Windows malware predictions 06 Mac malware 06 Early 2017 OS X malware predictions 07 Exploit kits 08 Early 2017 exploit kit predictions 09 Phishing and malspam 10 Early 2017 phishing and malspam predictions 11 Potentially Unwanted Programs 11 Early 2017 PUP predictions 12 Tech support scams 13 Early 2017 tech support scam predictions 14 Conclusion Introduction Last year was interesting for malware distribution and development. While we still experienced a flood of ransomware and immense distribution of malware using malspam/phishing/exploit kits, some major players, such as TeslaCrypt and Angler EK, vanished, while some new names dominated. In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, take an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts. Executive summary Ransomware dominated in 2016 and continued to do so However, it’s market share and capabilities are not quite into 2017. We expect to see very little variation in this at par with Angler, though this is likely going to change in early 2017, and if anything, it is getting worse. The as we expect to observe an increase in exploit kit most notable ransomware families of the end of 2016 activity by the middle of 2017. While late 2016 showed were Locky and Cerber, two very similar ransomware a decrease in the amount of malicious spam/phishing families that took the number one slot multiple times attacks targeting users in the wild, we are seeing greater during the last part of the year. -
COVID-19 and Emerging Global Patterns of Financial Crime
INSIGHTi COVID-19 and Emerging Global Patterns of Financial Crime September 4, 2020 Criminal groups around the world are exploiting opportunities for illicit profit during the COVID-19 pandemic. As criminal behaviors shift, so, too, have the illicit financial footprints left behind. As Congress considers U.S. and international responses to the pandemic, it may also examine the emerging risks and financial patterns associated with COVID-19-related criminal activity, including cybercrime. Risk Context According to the Financial Action Task Force (FATF), an intergovernmental standards-setting body on anti-money laundering (AML) and counter-financing of terrorism (CFT), as well as other reporting, the pandemic has contributed to significant changes in the financial behavior of governments, businesses, and people in many parts of the world. These changes have also introduced new money laundering and financial fraud risks. For example: Economic uncertainty, characterized by high unemployment, business insolvency, and disruptions in global trade patterns, has mobilized governments around the world to introduce large-scale emergency financial assistance and stimulus programs. Increased availability of government funds may challenge authorities to identify fraudulent claims, as well as misappropriated and misdirected funds due to corruption. Voluntary and government-mandated quarantines and stay-at-home orders have reduced in-person banking activity and increased online banking and remote transactions. This increase in remote banking has challenged financial institutions to comply with AML/CFT requirements related to customer identity verification and due diligence. Financial volatility has driven investors to redistribute assets, resulting in liquidated portfolios, large funds transfers, and increases in physical cash holdings, safe haven assets (e.g., gold), real estate purchases, and virtual currencies. -
Organising the Monies of Corporate Financial Crimes Via Organisational Structures: Ostensible Legitimacy, Effective Anonymity, and Third-Party Facilitation
administrative sciences Article Organising the Monies of Corporate Financial Crimes via Organisational Structures: Ostensible Legitimacy, Effective Anonymity, and Third-Party Facilitation Nicholas Lord 1,* ID , Karin van Wingerde 2 and Liz Campbell 3 1 Centre for Criminology and Criminal Justice, University of Manchester, Manchester M13 9PL, UK 2 Erasmus School of Law, Erasmus University Rotterdam, 3000 DR Rotterdam, The Netherlands; [email protected] 3 School of Law, Durham University, Durham DH1 3LE, UK; [email protected] * Correspondence: [email protected] Received: 9 April 2018; Accepted: 17 May 2018; Published: 19 May 2018 Abstract: This article analyses how the monies generated for, and from, corporate financial crimes are controlled, concealed, and converted through the use of organisational structures in the form of otherwise legitimate corporate entities and arrangements that serve as vehicles for the management of illicit finances. Unlike the illicit markets and associated ‘organised crime groups’ and ‘criminal enterprises’ that are the normal focus of money laundering studies, corporate financial crimes involve ostensibly legitimate businesses operating within licit, transnational markets. Within these scenarios, we see corporations as primary offenders, as agents, and as facilitators of the administration of illicit finances. In all cases, organisational structures provide opportunities for managing illicit finances that individuals alone cannot access, but which require some element of third-party collaboration. In this article, we draw on data generated from our Partnership for Conflict, Crime, and Security Research (PaCCS)-funded project on the misuse of corporate structures and entities to manage illicit finances to make a methodological and substantive addition to the literature in this area. -
White-Collar Crime: Should You Be Afraid? Logan Smalley [email protected]
The University of Akron IdeaExchange@UAkron The Dr. Gary B. and Pamela S. Williams Honors Honors Research Projects College Fall 2017 White-Collar Crime: Should You be Afraid? Logan Smalley [email protected] Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/honors_research_projects Part of the Criminology Commons Recommended Citation Smalley, Logan, "White-Collar Crime: Should You be Afraid?" (2017). Honors Research Projects. 584. http://ideaexchange.uakron.edu/honors_research_projects/584 This Honors Research Project is brought to you for free and open access by The Dr. Gary B. and Pamela S. Williams Honors College at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Honors Research Projects by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Smalley 1 White-Collar Crime: Should You be Afraid? Logan Smalley Department of Sociology Honors Research Project Submitted to The Williams Honors College Smalley 2 While walking down the street, you peer into a newsstand and a single headline among hundreds of papers catches your eye. It reads “What Bernie Made Off With.” The reason that this resonated with you is because the broker of your retirement fund is named Bernie Madoff. You rush over to the newsstand and practically tear it in half trying to get to the article so quickly. Upon reading the article, it becomes clear that all of his clients are now broke (including yourself). -
Prevention of Financial Crime Policy
Prevention of Financial Crime Policy 1. Aim of policy We are committed to preventing, detecting and guarding against the impacts of financial crimes and reporting about these appropriately. This policy outlines how we do this and applies to the whole VIVID group, except Bargate who maintain their own policy. We have a zero-tolerance approach to all forms of financial crime committed by staff, board members, formally involved customers, volunteers and other organisations or individuals we work with or who act on our behalf. We expect all these individuals and organisations to follow this policy. We aim to uphold legislation and regulation relating to financial crime, including: • Bribery Act 2010; • Computer Misuse Act 1990; • Criminal Finances Act 2017; • The Money Laundering, Terrorist Financing & Transfer of Funds (Information on the Payer) Regulations 2017 (MLR); • Fraud Act 2006; • Prevention of Social Housing Fraud Act 2013; • Proceeds of Crime Act 2002 (PoCA); • Serious Crime Act 2015; • Terrorism Act 2000. 2. Definitions of financial crimes Bribery is offering, giving or accepting money or something of value for influence or action in return. Corruption is dishonesty or fraud by people in authority, typically involving bribery. Financial cybercrime is a criminal activity carried out by means of computers and/or internet. It includes unauthorised access, sabotage or use of computer systems with the intention to cause financial gain to the perpetrator or financial loss to the victim. Fraud is wrongful or criminal deception for personal or financial gain. Money laundering is the process by which money or other assets obtained through crime is exchanged for clean money or assets without an obvious link to the money’s criminal origins. -
Cyber Frauds, Scams and Their Victims
4 ‘NOT A VICTIMLESS CRIME’ The impact of fraud upon victims Distribution Introduction1 for It is surprising to note that despite extensive research on crime victimisation there has only been a very small amount of research on fraud victims (Croall, 2001; Fraud Advisory Panel, 2006; Ganzini et al., 1990; Levi, 2001; Levi, 1999; Not Levi and Pithouse, 1992; Spalek, 1999). This literature highlights some of the devastating consequences and impacts of fraud on the victim. For some, such is the severity of the harm they experience, it has been likened to that of violent crime (Marsh, 2004). Further to this, there is evidence from some victims who express feelings in the aftermath of online fraud that they have been ‘mentally raped’ (Whitty and Buchanan, 2016: 180; see also Deem, 2000: 37). While the Francis: most obvious consequence is financial harm, it is important to recognise that the impacts of fraud go far beyond that of pure monetary losses. However, the & financial loss can be significant. For some victims, such is the loss that they are re- quired to sell assets (often their home), go back to work (if they were retired), or are unable to secure credit or sometimes in the worst case scenario they may even become bankrupt. This chapter will explore the impact of fraud on the victims, examining both the financial and non-financial harms experienced by these vic- Taylor tims, and in doing so it will draw upon some of the latest research from around the world. The chapter will start with an examination of the impact of crime in general, before exploring some of the specific impacts of fraud, which have been noted in the research. -
Secureworks State of Cybercrime Report 2017
REPORT State2017 of Cybercrime Exposing the threats, techniques and markets that fuel the economy of cybercriminals Contents Foreword 3 Introduction 4 Key Findings 5 Cybercrime 1. Business Email Compromise 7 2. Ransomware 9 3. Banking Malware 12 4. Mobile Malware 20 Criminal Landscape 5. Organized Cybercrime 22 6. Diverse Roles 23 7. Gap Between Criminality and Nation-States 25 8. Money Muling 27 Online Crime — A Market Economy 9. Commodities 30 10. Spam Botnet Usage 34 11. Exploit Kit Activity Decline 37 Conclusion 39 Glossary of Terms 40 About Secureworks 41 2 © 2017 Secureworks, Inc. All rights reserved. Foreword Foreword Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016. The unique and valuable intelligence shared in this report stems from the visibility gained from our thousands of clients, the machine learning and automation from our industry-leading Counter Threat Platform™, and the actionable insights from our team of elite Counter Threat Unit™ (CTU) researchers, analysts and consultants. We call this the Network Effect, and it is the unparalleled power and protection of this Network Effect which enables us to prevent security breaches, detect malicious activity in real time, respond rapidly and predict emerging threats. Secureworks’ goal in publicly sharing this report’s findings is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become Collectively Smarter.