1996 Annual Report
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Role of Local Law Enforcement Agencies in Preventing And
CRITICAL ISSUES IN POLICING SERIES The Role of Local Law Enforcement Agencies In Preventing and Investigating Cybercrime Page intentionally blank CRITICAL ISSUES IN POLICING SERIES The Role of Local Law Enforcement Agencies In Preventing and Investigating Cybercrime April 2014 This publication was supported by the Motorola Solutions Foundation. The points of view expressed herein are the authors’ and do not necessarily represent the opinions of the Motorola Solutions Foundation or individual Police Executive Research Forum members. Police Executive Research Forum, Washington, D.C. 20036 Copyright 2014 by Police Executive Research Forum All rights reserved Printed in the United States of America ISBN: 978-1-934485-24-8 Cover and text page design by Dave Williams. Cover photo by Alexskopje, licensed by Pond5.com. Other photos by James McGinty. Contents Acknowledgments ........................................................................................................................................ i Cybercrime: A New Critical Issue, by Chuck Wexler ...................................................... 1 The Nature of the Challenges ........................................................................................... 3 How Criminals Are Committing Cybercrimes ..................................................................................................5 Sidebar: Results of the PERF Cybercrime Survey .................................................................................................6 The Impact of Cybercrime -
Effect of Pyramid Schemes to the Economy of the Country - Case of Tanzania
International Journal of Humanities and Management Sciences (IJHMS) Volume 5, Issue 1 (2017) ISSN 2320–4044 (Online) Effect of pyramid schemes to the Economy of the Country - Case of Tanzania Theobald Francis Kipilimba come up with appropriate laws and mechanisms that will stop Abstract— Pyramid scheme, in their various forms, are not a those unscrupulous people praying on unsuspecting new thing in the world, however, they have reared their ugly individuals. Help supervisory institutions formulate menacing heads‘ in the Tanzanians society only recently. Before the appropriate policies that will require all investment plans to Development entrepreneurship Community Initiative (DECI) debacle be documented, filed and thoroughly scrutinized and come up other schemes such as Women Empowering, woman had already with the ways to recover assets of the culprits and use them to racked havoc in the society.This study intended to evaluate the extent compensate the victims of get rich quick schemes. to which Tanzanians knew about the pyramid schemes operating in the world, their participation in these schemes and their general feelings towards the scammers, our judicial system and the course II. BASIC VIEW OF PYRAMID SCHEME action they are likely to take in the event they are scammed. Results Pyramid scheme is a fraudulent moneymaking scheme in show that most Tanzanians are very naïve when it comes to pyramid which people are recruited to make payments to others above schemes, with very scant knowledge about these schemes. Many do them in a hierocracy while expecting to receive payments not know if they have participated in these schemes but in those instances that they had, they suffered huge financial losses. -
North East Multi-Regional Training Instructors Library
North East Multi-Regional Training Instructors Library 355 Smoke Tree Business Park j North Aurora, IL 60542-1723 (630) 896-8860, x 108 j Fax (630) 896-4422 j WWW.NEMRT.COM j [email protected] The North East Multi-Regional Training Instructors Library In-Service Training Tape collection are available for loan to sworn law enforcement agencies in Illinois. Out-of-state law enforcement agencies may contact the Instructors Library about the possibility of arranging a loan. How to Borrow North East Multi-Regional Training In-Service Training Tapes How to Borrow Tapes: Call, write, or Fax NEMRT's librarian (that's Sarah Cole). Calling is probably the most effective way to contact her, because you can get immediate feedback on what tapes are available. In order to insure that borrowers are authorized through their law enforcement agency to borrow videos, please submit the initial lending request on agency letterhead (not a fax cover sheet or internal memo form). Also provide the name of the department’s training officer. If a requested tape is in the library at the time of the request, it will be sent to the borrower’s agency immediately. If the tape is not in, the borrower's name will be put on the tape's waiting list, and it will be sent as soon as possible. The due date--the date by which the tape must be back at NEMRT--is indicated on the loan receipt included with each loan. Since a lot of the tapes have long waiting lists, prompt return is appreciated not only by the Instructors' Library, but the other departments using the video collection. -
Willing to Be Scammed: How Self-Control Impacts Internet Scam Compliance
Running head: Willing to be scammed: how self-control impacts Internet scam compliance Willing to be scammed: How self-control impacts Internet scam compliance Submitted by David Modic to the University of Exeter as a thesis for the degree of Doctor of Philosophy in Psychology In September 2012 This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own work has been identified and that no material has previously been submitted and approved for the award of a degree by this or any other University. Signature: ………………………………………………………….. 2 WILLING TO BE SCAMMED WILLING TO BE SCAMMED 3 Abstract At any given moment in time, there are people complying with fraudulent requests (i.e. scams) on the Internet. While the incidence rates are low (between five and ten percent of the population becoming victims on a yearly basis), the financial and emotional consequences can be high. In this Thesis we composed a unified theory of which factors made individuals more likely to comply with scams and what psychological mechanisms are unwittingly employed by con-men to make their (illegitimate marketing) offers more enticing. The strongest overall predictor of scam compliance (i.e. the extent to which an individual is likely to comply with fraudulent requests) was the level of self-control, regardless of the observed stage of a scam. On the basis of previous research, we postulated and have empirically shown that falling for a scam is a 3-stage process (i.e. -
Telemarketing Fraud Targeting Senior Citizens and What Law Enforcement Is Doing to Crack Down on These Schemes
S. HRG. 104-490 TELESCAMS EXPOSED: HOW TELE MARKETERS TARGET THE ELDERLY HEARING BEFORE THE SPECIAL COMMITTEE ON AGING UNITED STATES SENATE ONE HUNDRED FOURTH CONGRESS SECOND SESSION WASHINGTON, DC MARCH 6, 1996 Serial No. 104-10 Printed for the use of the Special Committee on Aging U.S. GOVERNMENT PRINTING OFFICE 23-236 CC WASHINGTON : 1996 For sale by the U.S. Government Printing Office Superintendent of Documents, Congressional Sales Office, Washington, DC 20402 ISBN 0-16-052833-X SPECIAL COMMITTEE ON AGING WILLIAM S. COHEN, Maine, Chairman LARRY PRESSLER, South Dakota DAVID PRYOR, Arkansas CHARLES E. GRASSLEY, Iowa JOHN GLENN, Ohio ALAN K. SIMPSON, Wyoming BILL BRADLEY, New Jersey JAMES M. JEFFORDS, Vermont J. BENNETT JOHNSTON, Louisiana LARRY CRAIG, Idaho JOHN B. BREAUX, Louisiana CONRAD BURNS, Montana HARRY REID, Nevada RICHARD SHELBY, Alabama HERB KOHL, Wisconsin RICK SANTORUM, Pennsylvania RUSSELL D. FEINGOLD, Wisconsin FRED THOMPSON, Tennessee CAROL MOSELEY-BRAUN, Illinois MARY BERRY GERWIN, Staff Director /Chief Counsel THERESA M. FORSTER, Minority Staff Director (II) CONTENTS Page Opening statement of Senator William S. Cohen 1 Statement of: Senator Harry Reid 7 Senator David Pryor 8 Senator Herb Kohl 11 Senator Charles E. Grassley 54 Prepared statement of: Senator Larry Craig 10 Senator Russ Feingold 10 PANEL I Edward Gould, Las Vegas, NV 11 PANEL II Mary Ann Downs, Raleigh, NC 27 Peder Anderson, Washington, DC 42 PANEL III Kathryn Landreth, United States Attorney, District of Nevada, Las Vegas, NV ;. 55 Jodie Bernstein, director of the Bureau of Consumer Protection, Federal Trade Commission, Washington, DC 62 Chuck Owens, Chief, White Collar Crime Section, Federal Bureau of Inves tigation, Washington, DC 84 PANEL IV Agnes Johnson, American Association of Retired Persons, Biddeford, ME 112 John Barker, director, National Fraud Information Center, Washington, DC . -
Protect Yourself. Don't Be a Victim of Fraud
ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Tips to Protect Yourself ►Don’t Be A Victim! ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Protect Yourself • Don’t Be a Victim of Fraud 1 Table of Contents Con Artists and FlimFlams • 3 Bank Examiner • Broken Bottle Scam • Caller ID or Spoofing • C.O.D. Scam • Diversion Burglary • Door-to-Door Solicitor • Fortune Telling Fraud • Handkerchief Switch • Jury Duty Scam • Latin Lotto • Lottery Scams/Foreign Lottery • Lotteries • Pickpocket Diver- sion • Pigeon Drop • Police Follow-Up Scam • Recovery Rooms • Rock in a Box • Sweet- heart Swindle Con • Three-Card-Monte • Toner Rooms • Truck Stop Three-Card-Monte • Yellow Page Advertising Scheme Business and Investment Fraud • 17 Business Fraud • Telemarketing Fraud • Nigerian Letter or 419 Fraud • Advance Fee Schemes • Fake Check Scam • Redemption/Strawman/Bond Fraud • Letter of Credit Fraud • Prime Bank Note Fraud • Ponzi Schemes • Pyramid Schemes • Market Manipula- tion or Pump and Dump Fraud Identity Theft • 29 Fraud Against Senior Citizens • 30 Counterfeit Prescription Fraud • Funeral and Cemetery Fraud • Fraudulent Anti-Aging Products • Reverse Mortgage Fraud • Long Term Care Insurance Fraud Telemarketing Fraud • 36 Automobile Insurance Fraud • 42 Medical and Insurance Fraud • 46 Medical Equipment Fraud • Medicare Fraud • Dental • Medical Identity Scams • False Medical Claims • Discount Cards for Medical Insurance • Obamacare Scams • Medicare Scams • Workers Compensation • Stolen Premiums • Crooked Doctors and Lawyers Travel Industry Fraud • 57 Social Media Fraud • 61 Computer Fraud • 63 Internet Fraud • 65 Internet Auction Fraud • Internet Non-Delivery of Merchandise • Credit Card Fraud • Internet Investment Fraud • Preventing Online Fraud Home Improvement Fraud • 71 REGIONAL ORGANIZED CRIME INFORMATION CENTER • A RISS Center Protect Yourself • Don’t Be a Victim of Fraud 2 Sources of Information Many of the narratives for electronic or Internet fraud came from the FBI website at www.fbi.gov. -
Mass-Marketing Fraud
Mass-Marketing Fraud A Report to the Attorney General of the United States and the Solicitor General of Canada May 2003 ��� Binational Working Group on Cross-Border Mass-Marketing Fraud Table of Contents Executive Summary ......................................................... ii Introduction ...............................................................viii Section I: Mass-Marketing Fraud Today ........................................1 Section II: The Response to Mass-Marketing Fraud, 1998-2003 .................... 26 Section III: Current Challenges in Cross-Border Fraud - Towards A Binational Action Plan .................................................................56 Appendix - Selected Cross-Border Mass-Marketing Fraud Enforcement Actions ..... 69 i Executive Summary Section I: Mass-Marketing Fraud Today Telemarketing Fraud ! Cross-border telemarketing fraud remains one of the most pervasive forms of white-collar crime in Canada and the United States. The PhoneBusters National Call Centre estimates that on any given day, there are 500 to 1,000 criminal telemarketing boiler rooms, grossing about $1 billion a year, operating in Canada. (3) ! Several types of cross-border telemarketing fraud have increased substantially from 1997 to 2002: fraudulent prize and lottery schemes; fraudulent loan offers; and fraudulent offers of low-interest credit cards or credit-card protection. (3) ! Seven trends in cross-border telemarketing fraud since 1997 are especially noteworthy: • (1) Types of Telemarketing Fraud “Pitches”. The most prevalent among Canadian-based telemarketing fraud operations are fraudulent offers of prizes or lotteries; fraudulent loan offers; and fraudulent offers of low- interest credit cards or credit-card protection. (5) • (2) Methods of Transmitting Funds. Criminal telemarketers generally prefer their victims to use electronic payment services, such as Western Union and Travelers Express MoneyGram, to send funds for the promised goods or services. -
Hang up on Cross-Border Phone Fraud
Hang Up on Cross-Border Phone Fraud It’s like clockwork. You sit down to dinner and the phone rings. You answer it. The caller is trying to sell you something or tell you that you’ve won a fabulous prize. In fact, you may have been targeted by fraudulent telemarketers calling across the border from “boiler rooms” in the U.S. and Canada... ross-border telemarketing C fraud is a serious problem — and it appears to be growing. U.S. and Cana- dian consumers lose billions of dollars a year to telemarketers who pitch bogus products, services and investments. The most common cross-border telemarketing frauds involve: ● phony prize promotions ● foreign lottery schemes ● advance-fee loan rip-offs ● travel offer scams ● unnecessary credit card loss “protection” It’s no wonder that con artists often target citizens of other countries. Some con artists believe they won’t get caught if they target citizens in another country. They assume that their own country’s law enforcement officials aren’t interested in building a case when the victims are in another country. They also believe that officials in the victims’ country won’t have the authority to investigate deceitful calls from outside their borders. But now partnerships among law enforce- ment agencies in the U.S. and Canada are making it tougher for cross-border scam artists to ply their deceitful trade. The organizations cooperate across borders — sharing information, investigators and other resources. All the partners gather consumer complaint information and contribute to the 1 legwork involved in building a case, in- cluding surveillance and interviewing victims. -
Identity Theft and Telemarketing Fraud
If I get the caller ID information it should What can I do to protect myself from be able to track them, right? phone fraud? Wrong. Unfortunately, the technology is readily Identity Theft and available for criminals to mask the numbers they Telemarketing Fraud Register for the National DNC are calling from, thwarting enforcement efforts to Program by calling toll free: 1-888-382-1222 identify them. Remember, the good guys have to go through every LEGAL means to catch these Your personal information is valuable. You can limit the number of legitimate telemar- criminals, the crooks go through every means Protect it! Guard your: keting calls you receive at your residence by reg- available to evade detection. That’s why it is im- istering your home phone number on the LPSC portant that you understand that educating yourself, Social Security number DNC Program and/or National DNC Program. and your friends and family, to the dangers of iden- Putting your number on these programs will stop tify theft is your best protection against this type of Bank and credit card numbers most normal telemarketing calls - but not all. You crime. Do Not Call was never designed to stop Driver's license number still may get calls from businesses with which you fraud, but we can help you get your complaint to normally do business, and a few other possible the appropriate authority. exemptions, but calls from sales people from un- Some criminals lie on the telephone to familiar businesses may be the sign of a scam. Be- What should I do if I suspect fraud? get your personal information. -
A New Look at Noir
HEROICS OF THE FALSE: A NEW LOOK AT NOIR JENNIFER S. BREUKELAAR A Creative Work and Thesis submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy. School of English, Media and Performing Arts, University of New South Wales. July 2007. ACKNOWLEDGMENTS Thanks are due to my supervisors Lisa Trahair and Anne Brewster. I would also like to thank Paul Dawson for overseeing the practical aspects of the thesis at the final stage. Thank-you also to Dan Edwards for discussions about film making software. I am grateful to Renu Rajpal for help with the Hindi. I would also like to thank Bob Stern for copy-editing the dissertation. Thanks to my agent Sandy Wagner for multiple readings of Viper, for her helpful comments and good faith. Among other things I am ever grateful to my parents, Margaret Reichenberger and Bob Stern for taking me to India. Thank-you to John Breukelaar for paving the way. Thank-you for reading and discussing this project ad nauseam, and most of all for your insights into how to complete it and why. For support that infinitely exceeded the call of duty, I would also like to thank my children, Isabella and Jack. CONTENTS ABSTRACT 4 PART I: THE NOVEL VIPER 5 PART II: THE DISSERTATION I: INTRODUCTION 232 II: A CRISIS OF CONFIDENCE 249 III: “IF THIS BE ART’S LIE” 296 IV: NOIR’S CHASMS 332 V: CONCLUSION 372 BIBLIOGRAPHY 377 4 THESIS ABSTRACT In this thesis I investigate the nature of noir subjectivity, and the degree to which it can be described as heroic. -
A Comparative Study of Financial Crimes and Criminal Networks in the United States
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Where Political Extremists and Greedy Criminals Meet: A Comparative Study of Financial Crimes and Criminal Networks in the United States Author: Roberta Belli, LL.M., Ph.D. Document No.: 234524 Date Received: June 2011 Award Number: 2009-IJ-CX-0006 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. WHERE POLITICAL EXTREMISTS AND GREEDY CRIMINALS MEET: A COMPARATIVE STUDY OF FINANCIAL CRIMES AND CRIMINAL NETWORKS IN THE UNITED STATES by Roberta Belli A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2011 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. -
Florida Strategic Plan on Human Trafficking
FFLLOORRIIDDAA SSTTRRAATTEEGGIICC PPLLAANN OONN HHUUMMAANN TTRRAAFFFFIICCKKIINNGG FLORIDA STATE UNIVERSITY CENTER FOR THE ADVANCEMENT OF HUMAN RIGHTS WWW.CAHR.FSU.EDU Funded with support from the Florida Bar Foundation Table of Contents Acronyms ............................................................................................................................ i-ii Acknowledgements .............................................................................................................. iii Executive Summary .......................................................................................................... iv-ix Introduction .................................................................................................................... x-xiii GOAL 1: To have useful data that reflections and is used to evaluate the prevention of human trafficking, protection and support for victims and success in prosecuting traffickers..........................................................................................................1-42 1) Current Trafficking Trends.............................................................................................1-12 2) Florida Trafficking Prosecutions, 2004-2010...............................................................13-37 3) Survey of Florida Trafficking Numbers........................................................................38-42 GOAL 2: To have a resource directory of all service programs that is user-friendly and current.............................................................................................................43-75