Interstate Mail Order Land Sales

Total Page:16

File Type:pdf, Size:1020Kb

Interstate Mail Order Land Sales INTERSTATE MAIL ORDER LAND SALES HEARING BEFORE THE St[BCOMMITTEE ON FRAUDS AND MISR]L- RIg3SENTATIONS AFFECTING THE ELDER{LY OF THE SPECIAL COMMITTEE ON AGING UNITED STATES SENATE EIGHTY-EIGHTH CONGRESS SECOND SESSION PART 3 MAY 20, 1964 Printed for the use of the Special Committee on Aging <*. U.S. GOVERNMENT PRINTING OFFICE 34-56 0 WASHINGTON : 1964 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C., 20402 - Price 35 cents SPECIAL COMMITTEE ON AGING GEORGE A. SMATHERS, Florida, Chairman PAT McNAMARA, Michigan EVERETT McKINLEY DIRKSEN, Illinois CLAIR ENGLE, California BARRY GOLDWATER, Arizona HARRISON A. WILLIAMS, li., New Jersey FRANK CARLSON, Kansas MAURINE B. NEUBERGER, Oregon WINSTON L. PROUTY, Vermont WAYNE MORSE, Oregon KENNETH B. KEATING, New York ALAN BIBLE, Nevada HIRAM L. FONG, Hawaii FRANK CHURCH, Idaho E. L. MECHEM, New Mexico JENNINGS RANDOLPH, West Virginia EDMUND S. MUSKIE, Maine EDWARD V. LONG, Missouri FRANK E. MOSS, Utah EDWARD M. KENNEDY, Massachusetts RALPH W. YARBOROUGH, Texas J. WILLIAM NOaMAN, Jr., Staff Director JoHN Guy MILLEa, Minority Staff Director SUBCOMMITTEE ON FRAUDS AND MISREPRESENTATIONS AFFECTING THE ELDERLY HARRISON A. WILLIAMS, Jn., New Jersey, Chairman MAURINE B. NEUBERGER, Oregon KENNETH B. KEATING, New York WAYNE MORSE, Oregon WINSTON L. PROUTY, Vermont FRANK CHURCH, Idaho HIRAM L. FONG, Hawaii EDMUND S. MUSKIE, Maine E. L. MECHEM, New Mexico EDWARD V. LONG, Missouri EDWARD M. KENNEDY, Massachusetts RALPH W. YARBOROUGH, Texas WILLIAM E. ORnOL, Professional Staff Member GERALD P. NYE, Minority Professional Staff Member NoTm.-Hearings on interstate mail-order land sales were held and they are identified as follows: Part 1-Washington, D.C., May 18, 1964. Part 2-Washington, D.C., May 19, 1964. Part 3-Washington, D.C., May 20, 1964. II CONTENTS CHRONOLOGICAL LIST OF WITNESSES Henry B. Montague, chief inspector, Post Office Department; accom- panied by William Callahan, Director, Division, Fraud and Mailability Page Investigations; and Adam G. Wenchel, Associate General Counsel -233 Alton W. Van Horn, Commissioner, New Jersey Real Estate Commission, Newark; accompanied by Robert R. Peacock, Secretary-Director, Livingston, N.J -247 John R. Hoffman, vice president, National Better Business Bureau -282 John C. Williamson, secretary-counsel, Realtors Washington Committee, National Association of Real Estate Boards -288 STATEMENTS Cromwell, James H. R., chairman of the board, American Realty & Petro- leum Corp -338 Shishkin, Boris, secretary, Housing Committee, AFL-CIO -301 Teets, Tom, resident of Sacramento, Calif., statement referred to Sub- committee on Housing for the Elderly - 359 Van Horn, Alton W., in behalf of the New Jersey Real Estate Commission 350 Williamson, John C., director, Department of Governmental Relations, NAREB -298 ADDITIONAL INFORMATION Boom in the Desert-Why It Grows and Grows, U.S. News & World Report, May 25, 1964 - 352 Mail fraud convictions, 13 cases with a listing of particulars -242 National Better Business Bureau, material covering land advertising and selling -302 Pattern act for regulation of subdivided lands, NAREB License Law Committee -292 Promotional sales questionnaire and request for public report, New Jersey Real Estate Commission -258 Realtor's Headlines, clippings from issues of this weekly on land frauds --- 288 Regulating sales of real property located outside the Commonwealth of Massachusetts ---- ----------------------------------------- 312 United Steelworkers of America, Roland M. Sawyer, Housing Consultant, letter dated June 9, 1964 -302 m INTERSTATE MAIL ORDER LAND SALES WEDNESDAY, XAY 20, 1964 U.S. SENATE, SurcoMMmrEE ON FRAUDS AND MISREPRESENTATIONS AFFECTING THE ELDERLY OF THE SPECIAL COMMITTEE ON AGING, Wa8hingto'n, D.C. The subcommittee met at 10:05 a.m., pursuant to recess, in room 4232, New Senate Office Building, Senator Harrison A. Williams, Jr. (chairman of the subcommittee), presiding. Present: Senators Williams and Neuberger. Also present: William E. Oriol, professional staff member; Gerald P. Nye, minority professional staff member; Patricia Slinkard, chief clerk; Mary Keeley, staff assistant; and Marion Keevers, minority chief clerk. Senator WILLiAMs. Our subcommittee deliberations will come to order. Our first witness this morning will be Chief Inspector H. B. Mon- tague, of the Post Office Department, a very important man in the field we have been analyzing for the last 2 days. STATEMENT OF HENRY B. MONTAGUE, CHIEF INSPECTOR, POST OFFICE DEPARTMENT; ACCOMPANIED BY WILLIAM CALLAHAN, DIRECTOR, DIVISION OF FRAUD AND MAILABILITY INVESTIGA- TIONS, BUREAU OF THE CHIEF INSPECTOR; AND ADAM G. WENCH-EL, ASSOCIATE GENERAL COUNSEL Senator WILLIAMS. Mr. Montague, you have Mr. Callahan and Mr. Wenchel with you? Mr. MONTAGUE. Yes, sir. Senator WILLIAMS. These gentlemen are Director and Mr. Wenchel is the Mr. WENCHEL. Associate General Counsel. Senator WILLIAMS. Division of Fraud and Mailability Investiga- tions. Mr. WENCHEL. Mr. Callahan is Director of that Division in the Chief Inspector's Office. Senator WILLIAMS. We welcome you back before this committee. You have been helpful before and I know you will be helpful this morning. You may proceed, Mr. Montague. Mr. MONTAGUE. I have a statement, Senator. Is it all right if I read it? Senator WILLIAMs. Fine. 233 234 INTERSTATE MAIL ORDER LAND SALES Mr. MONTAGuE. The opportunity to again report to this committee concerning the -status of our investigations of alleged fraud in mail order land sales is appreciated. These investigations are made by us under authority of 18 U.S.C. 1341 and 39 U.S.C. 4005, which impose a duty on the Postmaster General to prevent the use of the Postal Establishment in the perpetration of schemes to defraud the public. There are many facets to these land fraud schemes. In most cases, the promoters launch a lavish advertising campaign in media through- out the Nation in which extravagant claims are made depicting nearly worthless land as suitable for homesites or retirement or investment purposes. The principal inducement to buy is usually a seemingly low price. Buyers are seldom near enough to the property to personally inspect it without spending more for transportation than the price of the land warrants. This, coupled with the appeal to the "bargain instinct" present in most people is an integral part of the scheme. A variation of this theme is practiced by some promoters who peddle worthless land at fairs, flower shows, and other similar public events at which the land is disposed of by a so-called free drawing in which practically everyone who registers is a "winner." Such "winners" are then separately notified that each has won a valuable lot which may be obtained simply by paying so-called nominal closing costs which actually represent far more than the land is worth. Based on the great number of victims these closing costs provide a vast profit for the promoters. Another gimmick frequently used in a promotion is the promise of improvements in the form of clubhouses, recreational facilities, roads, sewers, and utilities which are never furnished. Many instances have been found where promoters have skipped without fulfilling such commitments after disposing of the land. In other cases unscrupulous promoters have advertised and accepted pay- ments from victims for land to which they could not convey a clear title. The following statistics dating from July 1, 1962, are indicative of the scope of the land investigative program being conducted by the postal inspection service: Land fraud investigations authorized------------------------------------ 358 Cases closed----------------------------------------------------------- 165 Cases currently under investigation------------------------------------ 193 Cases presented to U.S. attorneys--------------------------------------- 35 Cases in which indictments returned----------------------------------- 22 Number of defendants indicted--______________________________________ 60 Cases in which convictions obtained-------------------------------------- 7 Number of defendants convicted--------------------------------------- 13 Cases wherein indictments are outstanding------------------------------ 15 Prosecutive action in these cases is closely coordinated with the Criminal Division, Department of Justice, and U.S. attorney through- out the Nation. In view of this committee's concern with frauds in general, many of which particularly affect the elderly, we should bring to attention that in the first 10 months of this fiscal year, through April 1964, postal inspectors made 548 arrests for mail fraud violations of all types. This was an increase of 7.2 percent over the same period last year. Also, while it is not within our jurisdiction to cause adjustments to be INTERSTATE MAIL ORDER LAND SALES 235 made, a total of $5,224,340 was restored to victims as a result of mail fraud investigations. Thank you. Senator WILLIAMS. How did these restorations come about? It is not within your jurisdiction. Was it voluntary? Mr. MONTAGUE. Some of them, Senator, were court ordered and others were voluntary. Senator WILLIAMS. You say 35 cases were presented to the U.S. at- torneys, the number of defendants indicted, 60 ? Mr. MONTAGUE. Yes, sir. Senator WILLIAMS. Is this more than 1 individual involved in the 35 cases or how do you account for that.? Mr. MONTAGUE. In some instances there was only one. In other in- stances there were as many as three or four or more. Senator WILLIAMS. I would like
Recommended publications
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • ONLINE DATING SERVICES. Emerging Consumer Law Issues
    LAURA RODRIGUEZ RENGIFO ONLINE DATING SERVICES. Emerging consumer law issues. LLM RESEARCH PAPER LAWS 532: CONSUMER LAW FACULTY OF LAW 2015 2 Contents I. ABSTRACT. ............................................................................................................................ 3 Word length 3 II. INTRODUCTION. ................................................................................................................... 4 III. AN INSIGHT IN THE ODS CURRENT PARADIGM. ......................................................... 5 IV. THE ROMANCE SCAMS. ................................................................................................... 7 A ODS Users are Vulnerable Consumers: The perfect target for scammers. .............................. 9 IMAGE 1. .................................................................................................................................... 10 1 The concept of “Vulnerable Consumers” and its implications. ................................................ 11 IMAGE 2. .................................................................................................................................... 14 B Recommendations about how to address Romance Scam And ODS user vulnerability: ....... 14 V. ISSUES THAT ARISE FROM THE ODS “TERMS AND CONDITIONS”. ....................... 18 A.ODS Privacy concerns. ............................................................................................................ 19 B Spam and unwanted messages. ...............................................................................................
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Kevin Mitnick and I Were Intensely Curious About the World and Eager to Prove Ourselves
    Scanned by kineticstomp THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources Acknowledgments Foreword We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves.
    [Show full text]
  • INTEGRATOR's JOURNAL by Wayne M
    INTEGRATOR'S JOURNAL by Wayne M. Krakau - Chicago Computer Guide, March 1992 Wayne Krakau welcomes all calls, comments, and questions from basement businesses to corporate MIS. Wayne is a partner in Krakau Business Computer Systems, a systems integration firm and a Novell Gold authorized and Lantastic 5 Star Dealer. He has been working with computers for 15 years. He has an MBA in Marketing and a BS in Information Science and was originally educated in Computer and Information Systems Analysis Engineering. He holds Novell CNE and CNI ratings, and LANDA Certifications in LAN Installation, Architecture, Connectivity, Maintenance, and Program Development. Wayne can be reached for questions, comments, or topic suggestions at (708)298-7695 or through the Computer Guide. This is a new column that will provide information on the products, people, news, and situations, encountered in the life of a systems integrator (yours truly). Since a large part of my work involves "res- cues" of people after they've been victims of botched integration attempts or abuse or abandonment by vendors, the slant of this commentary may sometimes be a bit cynical. As an experienced street cop might tell you, that's a hazard of constant exposure to the seamier side of the beat. Due to popular demand (via faxes to the Computer Guide -- Yes, we do read them!) LANs (Local Area Networks) and other connectivity issues will be prominently, though not exclusively, featured. Upon reading this column, my dedication to defining terminology will soon become apparent. I would rather err on the side of over-explaining and have technically oriented readers skip over the explanations than leave some people in the dark.
    [Show full text]
  • Exploring Online Dating Scams and Identity Fraud
    Aunshul Rege - What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud Copyright © 2009 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2009, Vol 3 (2): 494–512 This is an Open Access article distributed under the terms of the Creative Commons Attribution-Non- Commercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. What’s Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud Aunshul Rege1 Rutgers University, USA Abstract Cyberspace has become an alternative medium for experiencing new and creative romantic endeavors with few spatio-temporal limits. E-love networks have proliferated since the mid-1990s and are expected to generate $1.9 billion by 2012. However, this successful global industry is a frequent venue of cyber crime, which poses serious problems for matchmaking services and daters worldwide. This paper offers an overview of romance scams and identity fraud at dating sites, developing a typology of cyber criminals and analyzing each type along the dimensions of criminal techniques, organizations, and ideologies. The theoretical framework for this paper borrows from criminal organization and network-based theories. Document analysis is conducted on data from dating sites, news and media sites, anti-scam commissions, law enforcement agencies, and government agencies, from 2000 to 2009. Twenty keyword combinations are used to gather 170 documents, which are then sorted around four intersecting themes: online dating, scams and frauds, the organization of cyber criminals, and prevention and regulation.
    [Show full text]
  • Editor in Chief: Nikos Passas
    VOL 67 Issue 1, 2017 ISSN 0925-4994 Editor in Chief: Nikos Passas Table of Contents Assessing the trends, scale and nature of economic cybercrimes: overview and Issues................................................................... 3 A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists................................................................ 21 Origin, growth and criminal capabilities of cyber criminal networks. An international empirical analysis................................................. 39 Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous........................................................................................................... 55 Cyberfraud and the implications for effective risk-based responses: themes from UK research................................................................ 77 Crime Law Soc Change (2017) 67:3–20 DOI 10.1007/s10611-016-9645-3 Assessing the trends, scale and nature of economic cybercrimes: overview and Issues In Cybercrimes, Cybercriminals and Their Policing, in Crime, Law and Social Change Michael Levi1 Published online: 11 October 2016 # Springer Science+Business Media Dordrecht 2016 Abstract Trends in police-recorded and (where they exist) household survey- measured cybercrimes for economic gain are reviewed in a range of developed countries – Australia, Canada, Germany, Hong Kong, the Netherlands, Sweden, the UK and the US - and their implications for criminal policy are considered.
    [Show full text]
  • Organized Crime on Wall Street Hearing Committee on Commerce House of Representatives
    ORGANIZED CRIME ON WALL STREET HEARING BEFORE THE SUBCOMMITTEE ON FINANCE AND HAZARDOUS MATERIALS OF THE COMMITTEE ON COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED SIXTH CONGRESS SECOND SESSION SEPTEMBER 13, 2000 Serial No. 106–156 Printed for the use of the Committee on Commerce ( U.S. GOVERNMENT PRINTING OFFICE 67–115CC WASHINGTON : 2000 VerDate 11-MAY-2000 15:08 Jan 04, 2001 Jkt 068011 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 E:\HEARINGS\67115 pfrm02 PsN: 67115 COMMITTEE ON COMMERCE TOM BLILEY, Virginia, Chairman W.J. ‘‘BILLY’’ TAUZIN, Louisiana JOHN D. DINGELL, Michigan MICHAEL G. OXLEY, Ohio HENRY A. WAXMAN, California MICHAEL BILIRAKIS, Florida EDWARD J. MARKEY, Massachusetts JOE BARTON, Texas RALPH M. HALL, Texas FRED UPTON, Michigan RICK BOUCHER, Virginia CLIFF STEARNS, Florida EDOLPHUS TOWNS, New York PAUL E. GILLMOR, Ohio FRANK PALLONE, Jr., New Jersey Vice Chairman SHERROD BROWN, Ohio JAMES C. GREENWOOD, Pennsylvania BART GORDON, Tennessee CHRISTOPHER COX, California PETER DEUTSCH, Florida NATHAN DEAL, Georgia BOBBY L. RUSH, Illinois STEVE LARGENT, Oklahoma ANNA G. ESHOO, California RICHARD BURR, North Carolina RON KLINK, Pennsylvania BRIAN P. BILBRAY, California BART STUPAK, Michigan ED WHITFIELD, Kentucky ELIOT L. ENGEL, New York GREG GANSKE, Iowa TOM SAWYER, Ohio CHARLIE NORWOOD, Georgia ALBERT R. WYNN, Maryland TOM A. COBURN, Oklahoma GENE GREEN, Texas RICK LAZIO, New York KAREN MCCARTHY, Missouri BARBARA CUBIN, Wyoming TED STRICKLAND, Ohio JAMES E. ROGAN, California DIANA DEGETTE, Colorado JOHN SHIMKUS, Illinois THOMAS M. BARRETT, Wisconsin HEATHER WILSON, New Mexico BILL LUTHER, Minnesota JOHN B. SHADEGG, Arizona LOIS CAPPS, California CHARLES W. ‘‘CHIP’’ PICKERING, Mississippi VITO FOSSELLA, New York ROY BLUNT, Missouri ED BRYANT, Tennessee ROBERT L.
    [Show full text]
  • Hacking in a Foreign Language: a Network Security Guide to Russia
    Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSP Briefing Outline 1. Russia as a Threat 2. Russia as a Resource 3. Crossing Borders: Methodology 4. The International Political Scene Russia as a Threat Hacking: A Russian Perspective • Excellent technical education • Understanding of networks, programming • 1980’s: hacked American software in order to make programs work in USSR • Now: many skilled people, too few jobs • Russian police have higher priorities! Financial Incentive • Internet access is expensive – Cheaper to steal access and services • Legit MS Office = 2 months’ salary • CD burner = two weeks’ salary • Russian outdoor markets: – MS Operating System a few dollars • Hacking: more social approval? – Communal sharing culture Cybercrime • Financial crimes: banks, fraud, piracy • Russian citizen Igor Kovalyev: – “Hacking is … one of the few good jobs left.” • Vladimir Levin: – 1994-95 transferred $10 million from Citibank – FBI NYC and Russian Telecoms traced activity to Levin’s St Petersburg employer • Microsoft: Oct 2000: – Traced to IP in St. Petersburg, Russia • Coreflood and Joe Lopez – Keyloggers and Ebay Dmitry Sklyarov • DefCon IX speaker • First Indictment under Digital Millennium Copyright Act (DMCA) – Advanced eBook Processor "AEBPR” – Five Adobe copyright violations • Dmitry: – Computer programmer and cryptanalyst • Long confession on FBI site – Cooperated in prosecuting Elcomsoft – Company acquitted • Victory for the EFF! ZDE = $ • Russian MVD: – Cyber crime doubled in year 2003
    [Show full text]
  • Cyber-Enabled Financial Abuse of Older Americans: A
    Cyber-Enabled Financial Abuse of Older Americans: A Public Policy Problem An interpretative framework investigating the social, economic, and policy characteristics of cyber-enabled older American financial abuse Christine Lyons A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Public Administration College of Public Affairs University of Baltimore Baltimore, Maryland December, 2019 This dissertation is dedicated to those who bravely shared their story with me in confidence. I am truly honored to be entrusted by you with the details of your financial and emotional trauma stemming from a time in your life so vividly painful. ACKNOWLEDGMENTS No one writes a dissertation without significant help from others and this is so very true with this endeavor. I would like to give a special thanks to three strong, admiralty intelligent, and hard-working women, my committee: Dr. Heather Wyatt- Nichol (chair), Dr. Lorenda Naylor, and Dr. Shelly Bumphus. Thank you for not giving up on me and encouraging me to continue to research a much under-studied public administration topic. Without your support, this dissertation would not be finished. I wish to express my thanks to Ms. Nina Helwig; the Adult Protective Services of Montgomery County, MD; and the Fraud Department of the Montgomery County, MD Police. I am also thankful for the time and assistance from Dr. Richard Mestas, as well as two of the best research librarians – Ms. Elizabeth Ventura and Mr. Andrew Wheeler, I am unable to adequately express my gratitude for the unwavering and unconditional support from my life partner of almost forty years, Clint Lyons; our son Clinton, his wife Annie, and our grandchildren CJ, Gabby, Natalie, and Alex; and our daughter Mary-Michael.
    [Show full text]
  • False Claims Reform Act
    S. HRG.99-452 FALSE CLAIMS REFORM ACT Legislative Office MAIN LIBRARY HEARING U.S. Dept. of Justice BEFORE THE SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE OF THE COMMITTEE ONTHE JUDICIARY UNITED STATES SENATE NINETY-NINTH CONGRESS FIRST SESSION ON S. 1562 A BILL TO AMEND THE FALSE CLAIMS ACT, AND TITLE 18 OF THE UNITED STATES CODE REGARDING PENALTIES FOR FALSE CLAIMS, AND FOR OTHER PURPOSES SEPTEMBER 17, 1985 Serial No. J-99-52 Printed for the use of the Committee on the Judiciary U.8. GOVERNMENT PRINTING OFFICE 56-637 O WASHINGTON : 1986 SENATE COMMITTEE ON THE JUDICIARY STROM THURMOND, South Carolina, Chairman CHARLES McC. MATHIAS, JR., Maryland JOSEPH R. BIDEN, JR., Delaware PAUL LAXALT, Nevada EDWARD M. KENNEDY, Massachusetts ORRIN G. HATCH, Utah ROBERT C. BYRD, West Virginia ALAN K. SIMPSON, Wyoming HOWARD M. METZENBAUM, Ohio JOHN P. EAST, North Carolina DENNIS DECONCINI, Arizona CHARLES E. GRASSLEY, Iowa PATRICK J. LEAHY, Vermont JEREMIAH DENTON, Alabama HOWELL HEFLIN, Alabama ARLEN SPECTER, Pennsylvania PAUL SIMON, Illinois MITCH McCONNELL, Kentucky DENNIS W. SHEDD, Chief Counsel and Staff Director DIANA L. WATERMAN, General Counsel DEBORAH G. BERNSTEIN, Chief Clerk MARK H. GITENSTEIN, Minority Chief Counsel SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE CHARLES E. GRASSLEY, Iowa, Chairman ARLEN SPECTER, Pennsylvania HOWARD M. METZENBAUM, Ohio JOHN P. EAST, North Carolina HOWELL HEFLIN, Alabama ALICE R. MILDER, Chief Counsel and Staff Director (II) CONTENTS STATEMENTS OF MEMBERS Page Grassley, Hon. Charles E., a U.S. Senator from the State of Iowa 1 Metzenbaum, Hon. Howard M., a U.S. Senator from the State of Ohio 13 DeConcini, Hon.
    [Show full text]
  • Landlocked 2.2
    LandLocked 2.2 i LandLocked Cultural Boundaries by Rachel Berkowitz Faculty Advisor Kij Johnson LandLocked, Issue 2.2, Summer 2020. Copyright © 2020 the contributors. No part of LandLocked may be reproduced without permission from the contributor. LandLocked is published by the graduate students in the Department of English at the University of Kansas. Unsolicited manuscripts are welcome through Submittable. Guidelines for submission are available online. LandLocked Wescoe Hall, Rm. 3001 1445 Jayhawk Blvd. Lawrence, KS 66045 http://www.landlockedmagazine.com [email protected] Contents Poetry Haley Lasché Abort 1 Abort 2 Abort 3 Devolver 4 Ashley Cline to tend the garden that is my throat, 16 suddenly in bloom knuckle teeth, with lines from Carly 17 Rae Jepsen MICHAEL CHANG you're out of touch i'm out of time 39 狮子山隧道 //////: lion rock tunnel 41 María DeGuzmán Memory of the Dance 47 Dani Putney Angeligender 54 Michelangelo 55 Technological Dismemberment 56 Madison Zehmer Unearthly 68 Preston Smith In Which You're A Spineless Monolith 80 To Earn Garden Merit 81 Riley Morsman Only Bones 86 Of Prairie 87 Charlotte Newbury Weeping Madonna // Anatomical 96 Venus Mycelium 98 Lauren Annette Boulton Takotsubo 105 Foundation, Summer 2002 107 Randi Clemens The American Daughter in the 121 Diorama Rapunzel Birthing 122 Hysterectomy 123 Nonfiction Maggie Argiro Highway Song 5 Mikala Stubley Postcard from the places I 33 haven't been Vilune Sestokaite Steps of Service 99 Anannya Uberoi To Shimla, from Madrid 111 Harrison Pyros The Question
    [Show full text]