Investment Swindles and Con Schemes

Total Page:16

File Type:pdf, Size:1020Kb

Investment Swindles and Con Schemes INVESTMENT SWINDLES AND CON SCHEMES GLOBAL HEADQUARTERS • THE GREGOR BUiLDinG 716 WEST AvE • AUSTin, TX 78701-2727 • USA INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Video ...................................................................................................................................................................... 4 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 5 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 9 Bonds ....................................................................................................................................................................... 10 Junk Bonds .......................................................................................................................................................... 10 Zero-Coupon Bonds .......................................................................................................................................... 11 Certificates of Deposit ........................................................................................................................................... 12 Callable CDs........................................................................................................................................................ 14 Equity Indexed Certificates of Deposit .......................................................................................................... 16 Collectibles ............................................................................................................................................................... 16 Art ......................................................................................................................................................................... 16 Precious Stones and Metals .............................................................................................................................. 17 Rare Coins ........................................................................................................................................................... 17 Commodities ........................................................................................................................................................... 18 Exotic Commodities .......................................................................................................................................... 18 Oil and Gas Investment Fraud ......................................................................................................................... 18 Video .................................................................................................................................................................... 19 Crowdfunding.......................................................................................................................................................... 19 Digital Currencies ................................................................................................................................................... 19 Futures ...................................................................................................................................................................... 20 Commodities Futures Contracts ...................................................................................................................... 21 Commodity Trading Systems ........................................................................................................................... 24 Commodity Pools............................................................................................................................................... 24 “IRA-Approved” Investments .............................................................................................................................. 25 Variable Annuities .............................................................................................................................................. 25 Offshore and Overseas Investments ................................................................................................................... 26 Foreign Exchange (FOREX) Investment Fraud ........................................................................................... 26 Prime Bank Guarantees ..................................................................................................................................... 26 Options ..................................................................................................................................................................... 27 Exchange-Traded Options ................................................................................................................................ 27 Relationship of the Underlying Instrument to the Option .......................................................................... 28 Option Values and Premiums .......................................................................................................................... 28 Over-the-Counter (OTC) Options .................................................................................................................. 29 Scalping Schemes ............................................................................................................................................... 29 Investment Swindles and Con Schemes i INVESTMENT SWINDLES AND CON SCHEMES III. INVESTMENT SCHEMES (CONT.) Hedge Funds ....................................................................................................................................................... 29 Promissory Notes ................................................................................................................................................... 30 Real Estate Investment Scams .............................................................................................................................. 31 Real Estate Limited Partnerships ..................................................................................................................... 31 Timeshares .......................................................................................................................................................... 32 Real Estate Options ........................................................................................................................................... 33 Securities ................................................................................................................................................................... 33 Repurchase Agreements .................................................................................................................................... 33 Treasury Securities ............................................................................................................................................. 33 Unregistered and Falsely Represented Securities ........................................................................................... 36 Stock Scams ............................................................................................................................................................. 36 Blind Pools .......................................................................................................................................................... 36 Late-Day Trading ............................................................................................................................................... 36 Micro-Cap Companies ....................................................................................................................................... 36 Online Day Trading ........................................................................................................................................... 38 Penny Stock ......................................................................................................................................................... 38 Worthless Stock .................................................................................................................................................. 39 Viatical Settlements ................................................................................................................................................
Recommended publications
  • This Booklet Is Published by the South Pasadena Police Department Crime Prevention Unit 1422 Mission Street South Pasadena, CA 91030 626-403-7270
    This booklet is published by the South Pasadena Police Department Crime Prevention Unit 1422 Mission Street South Pasadena, CA 91030 626-403-7270 www.southpasadenaca.gov/police Scams and Cons INTRODUCTION Most people think they are too smart to A Residents Guide to Prevention fall for a scam or a con. However, according to the Federal Trade Commission in 2011, scam and con Table of Contents artists were able to swindle over 25 million US adults. Introduction 1 Defining Scams and Cons 2 Scam and con artists don’t discriminate, regardless of race or age. They History 2 look for the old and young, male and female. Seniors are often targeted because they are usually lonely and compassionate. Scam and con artists Myths 3 use this to their advantage by trying to befriend them. They offer promises Types of Scams and Cons of quick wealth to seniors who are on a fixed income and are out to steal - Home Repair 4 their savings. People in their 20s are more often victims to scams than - Fake Accidents 5 seniors, but lose less money than seniors. - Distraction Thefts - Residential Burglary 6 Unlike other types of crimes, scams and cons are non-violent crimes and - While Shopping 6 involve the suspect being friendly. Because scam and con artists work by - Foreign Lottery 8 deception, they have excellent communication skills to try to gain one’s - Advance Fee (Nigerian Letter) 9 confidence. - Sweepstakes 10 This booklet was developed to help residents know the various types of - Fake Charities 11 scams and cons that are being used today.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Protect Yourself. Don't Be a Victim of Fraud
    ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Tips to Protect Yourself ►Don’t Be A Victim! ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Protect Yourself • Don’t Be a Victim of Fraud 1 Table of Contents Con Artists and FlimFlams • 3 Bank Examiner • Broken Bottle Scam • Caller ID or Spoofing • C.O.D. Scam • Diversion Burglary • Door-to-Door Solicitor • Fortune Telling Fraud • Handkerchief Switch • Jury Duty Scam • Latin Lotto • Lottery Scams/Foreign Lottery • Lotteries • Pickpocket Diver- sion • Pigeon Drop • Police Follow-Up Scam • Recovery Rooms • Rock in a Box • Sweet- heart Swindle Con • Three-Card-Monte • Toner Rooms • Truck Stop Three-Card-Monte • Yellow Page Advertising Scheme Business and Investment Fraud • 17 Business Fraud • Telemarketing Fraud • Nigerian Letter or 419 Fraud • Advance Fee Schemes • Fake Check Scam • Redemption/Strawman/Bond Fraud • Letter of Credit Fraud • Prime Bank Note Fraud • Ponzi Schemes • Pyramid Schemes • Market Manipula- tion or Pump and Dump Fraud Identity Theft • 29 Fraud Against Senior Citizens • 30 Counterfeit Prescription Fraud • Funeral and Cemetery Fraud • Fraudulent Anti-Aging Products • Reverse Mortgage Fraud • Long Term Care Insurance Fraud Telemarketing Fraud • 36 Automobile Insurance Fraud • 42 Medical and Insurance Fraud • 46 Medical Equipment Fraud • Medicare Fraud • Dental • Medical Identity Scams • False Medical Claims • Discount Cards for Medical Insurance • Obamacare Scams • Medicare Scams • Workers Compensation • Stolen Premiums • Crooked Doctors and Lawyers Travel Industry Fraud • 57 Social Media Fraud • 61 Computer Fraud • 63 Internet Fraud • 65 Internet Auction Fraud • Internet Non-Delivery of Merchandise • Credit Card Fraud • Internet Investment Fraud • Preventing Online Fraud Home Improvement Fraud • 71 REGIONAL ORGANIZED CRIME INFORMATION CENTER • A RISS Center Protect Yourself • Don’t Be a Victim of Fraud 2 Sources of Information Many of the narratives for electronic or Internet fraud came from the FBI website at www.fbi.gov.
    [Show full text]
  • Stages of Postmortem Decomposition
    METHODS FOR ESTIMATION OF TIME OF DEATH RATE METHODS (i.e. estimation of tree’s age by height / rate of growth) - Rate of drying or discoloration of blood pools - Rigor Mortis - Livor Mortis - Algor Mortis - Decomposition - Flora (plants) around body - Fauna (insects) around body CONCURRENCE METHODS (i.e. estimation of tree’s age by counting rings) - Bloodstain vs. tire - Time of last know meal - Stopping of watch - Depth of footprint in snow - Depth of rainwater collected EVIDENCE FOR ESTIMATION OF TIME OF DEATH 1. CORPORAL EVIDENCE - In the body 2. ENVIRONMENTAL AND ASSOCIATED EVIDENCE - In the vicinity and general surroundings 3. ANAMNESTIC EVIDENCE - Based on the decedent’s ordinary habits and daily activities Envir. and Assoc. Corporal Evidence Evidence Anamnestic Evidence - stage of decomp of organs - uncollected milk, mail, - usual activities vs. exterior newspapers - soot in airway - lights on / off - walking and sleeping patterns - medical conditions (ASCVD, pre surgery) - alarm clock set - eating habits, times, type of foods - alcohol / drug levels - food on stove / in refrig - appointment - beard, nails, hair - type of clothing day / night indoors / outdoor seasonal (remote deaths) condition of clothing (mold, leached dyes) - sales slips, receipts - animals in house Use a combination of all evidence available to you, giving weight to the more reliable / documentable. Be suspicious when some factors seem to vary considerably from the others. STAGES OF POSTMORTEM DECOMPOSITION 1. Blue-green discoloration of skin RLQ and LLQ abdomen 24 hrs Entire abdomen 36 hrs 2. Marbling (Green-black discoloration in blood vessel distribution- hemolyzed blood reacts with hydrogen sulfide. Extravasation diffusion (leads to generalized dark purple-black skin 3.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • Latin Derivatives Dictionary
    Dedication: 3/15/05 I dedicate this collection to my friends Orville and Evelyn Brynelson and my parents George and Marion Greenwald. I especially thank James Steckel, Barbara Zbikowski, Gustavo Betancourt, and Joshua Ellis, colleagues and computer experts extraordinaire, for their invaluable assistance. Kathy Hart, MUHS librarian, was most helpful in suggesting sources. I further thank Gaylan DuBose, Ed Long, Hugh Himwich, Susan Schearer, Gardy Warren, and Kaye Warren for their encouragement and advice. My former students and now Classics professors Daniel Curley and Anthony Hollingsworth also deserve mention for their advice, assistance, and friendship. My student Michael Kocorowski encouraged and provoked me into beginning this dictionary. Certamen players Michael Fleisch, James Ruel, Jeff Tudor, and Ryan Thom were inspirations. Sue Smith provided advice. James Radtke, James Beaudoin, Richard Hallberg, Sylvester Kreilein, and James Wilkinson assisted with words from modern foreign languages. Without the advice of these and many others this dictionary could not have been compiled. Lastly I thank all my colleagues and students at Marquette University High School who have made my teaching career a joy. Basic sources: American College Dictionary (ACD) American Heritage Dictionary of the English Language (AHD) Oxford Dictionary of English Etymology (ODEE) Oxford English Dictionary (OCD) Webster’s International Dictionary (eds. 2, 3) (W2, W3) Liddell and Scott (LS) Lewis and Short (LS) Oxford Latin Dictionary (OLD) Schaffer: Greek Derivative Dictionary, Latin Derivative Dictionary In addition many other sources were consulted; numerous etymology texts and readers were helpful. Zeno’s Word Frequency guide assisted in determining the relative importance of words. However, all judgments (and errors) are finally mine.
    [Show full text]
  • Css241 Course Title: Basic Security and Security Threats
    CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE :CSS241 COURSE TITLE: BASIC SECURITY AND SECURITY THREATS 1 CSS 241 BASIC SECURITY AND SECURITY THREATS COURSE GUIDE CSS241 BASIC SECURITY AND SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Rasidi Okunola, Ph. D Department of Sociology University of Ibadan Oyo State Course Coordinator Adeniyi T. Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria 2 CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction……………………………………..………....i-ii What You Will Learn in this Course ...................................ii Course Aims…………………………………………..... ..ii-iii Course Objectives……………………………………… …iii-iv Working through this Course ...............................................iv Course Materials……………………………….………. …v 3 CSS 241 BASIC SECURITY AND SECURITY THREATS Study Units…………………………………….………. …v-vi Textbooks and References…………….……….……… ….vi-vii Assignment File ………………………………………. ….vii Assessment ………………………………….………. ……viii Tutor-Marked Assignment……………………………. …..viii Final Examination and Grading…………………..……. …viii Course Marking Scheme ………………………………. …viii Course Overview ………………………………………. …viii-ix Presentation Schedule …………………………………. …x How to Get the Most from this Course ……………………x Reading Section.....................................................................x-xi Facilitators/Tutors and Tutorials ……………………….
    [Show full text]
  • Preventing Elder Financial Exploitation
    PREVENTING ELDER FINANCIAL EXPLOITATION EMPLOYEE TRAINING MANUAL FOR FINANCIAL INSTITUTIONS AN INITIATIVE OF: Office of Consumer Affairs & Business Regulation Executive Office of Elder Affairs Division of Banks 2017 IN COLLABORATION WITH: Office of the Attorney General Massachusetts Bankers Association Cooperative Credit Union Association The Commonwealth of Massachusetts Charles D. Baker, Governor Karyn E. Polito, Lieutenant Governor CONTENTS SECTION I: OVERVIEW 3 o History of Preventing Elder Financial Exploitation Program 3 o Defining Elder Financial Exploitation 3 o Protecting Elders from Financial Exploitation 4 o Benefits to Financial Institutions 5 o Reporting and Investigation Protocol 6 o Commitment to Prevention through Education 6 o How the Project Works 7 SECTION II: HOW TO RECOGNIZE FINANCIAL EXPLOITATION 8 o Defining Financial Exploitation 8 o Types of Financial Exploitation 10 o Wrongdoer Is Known 11 o Wrongdoer Is Unknown 14 o Warning Signs 19 SECTION III: HOW TO RESPOND TO FINANCIAL EXPLOITATION 22 o Importance of the Perpetrator-Victim Relationship 23 o Internal Response – Eight Action Steps 23 o Talking with Older Customers 26 SECTION IV: HOW TO REPORT FINANCIAL EXPLOITATION 28 o Process for Reporting 28 o Legality of Reporting 36 o Investigation by Protective Services Agency 38 o Reporting Scam Artist Exploitation 40 SECTION V: HOW TO PREVENT FINANCIAL EXPLOITATION 42 o Financial Institution Participation in Preventing Exploitation 43 o Training as Part of Prevention 47 o Preventative Measures for All Older Persons
    [Show full text]
  • The Scope of the Problem an Overview of Fraud Prevalence Measurement
    THE SCOPE OF THE PROBLEM AN OVERVIEW OF FRAUD PREVALENCE MEASUREMENT Martha Deevy Michaela Beals 2013 fraudresearchcenter.org LETTER FROM THE DIRECTOR Dear Colleagues, Launched in 2011, the Financial Fraud Research Center (FFRC) is a collaboration between the Stanford Center on Longevity and the FINRA Investor Education Foundation. This initiative grew out of a meeting of experts who gathered at the Stanford Center on Longevity to discuss the devastating impact of financial fraud. Acknowledging that the field could benefit from greater collaboration, the group was interdisciplinary – with representation from academia, regulatory agencies, practitioners, and policymakers. The Financial Fraud Research Center uses a three-pronged approach to advance the fight against financial fraud: • We consolidate research and information in accessible language. • We connect research to practice through events, publications, and other initiatives. • We catalyze further research through seed funding. The focus of the FFRC is individual consumer victimization. Measuring and preventing fraud that targets organizations or governments (such as embezzlement, corruption, and tax evasion) is the express purpose of several other organizations. Our resources are dedicated to understanding, detecting, and preventing consumer-targeted scams: what we term “consumer financial fraud,” defined below. a misrepresentation or concealment of some fact material to a transaction of Fraud goods, services, or other benefits that is made with knowledge of its falsity, non- existence, or misrepresentation and with the intent to deceive another and that is reasonably relied upon by the other who is injured thereby (Titus et al., 1995). for Monetary gain Non-monetary gain Voting fraud Marriage fraud Immigration fraud inflicted upon Individuals Groups Government Insurance fraud Tax fraud Consumer Fraud Employee fraud Welfare fraud Stamp fraud Medicare fraud In 2012 we released the Center’s initial survey document, Scams, Schemes, and Swindles: A Review of Consumer Financial Fraud Research.
    [Show full text]
  • E-Crime & Cybersecurity Benelux 2018
    6th December 2018 Amsterdam, The Netherlands Transparency plus transformation: the cybersecurity rubicon Welcome to e-Crime th 6 December 2018 & Cybersecurity Novotel Amsterdam City Benelux 2018 s business moves increasingly to digital 3 Security resilience in the face of evolving channels across Europe, fraud attempts and attacker tradecraft Aother cyber-enabled economic crime are rising Stories from the cyber battlefield. sharply. And recent research has shown that as well CrowdStrike as increasing volumes, there has been an evolution from short, isolated peaks of fraud attacks to more 5 Weighing your threat intelligence options sustained, high-volume attacks across a number of If your organisation is looking to make an days or even weeks. investment in threat intelligence, you’ll need to evaluate what different vendors deliver, how In addition, digital transformation is moving they align with your objectives, and the increasingly to mobile, rather than desktop online, advantage they’ll bring to your security strategy. channels. In Europe, 58% of all transactions now Recorded Future come from mobile devices and growth is accelerating. 7 To understand phishing, look at crimes of These trends pose a huge challenge for business and the past for cybersecurity professionals. Businesses need to Phishing is a modern problem but its roots go go digital and to make digital channels as seamless back hundreds of years. as possible for their customers. But they also need to Cofense keep those transactions, and their customers’ personal data, secure. Cybersecurity is therefore a 11 Voice and the future of personal identification strategic business imperative. Despite the more general upward trend of data breaches and sophisticated cross-channel attacks, It is these topics, and more, that we will be discussing businesses have mostly remained stagnant when th at our 8 annual e-Crime & Cybersecurity Benelux as approaching phone channel security.
    [Show full text]
  • CRIMINAL JUSTICE in AMERICA FIFTH EDITION Cja Unit1a:Layout 1 7/10/2012 2:10 PM Page 1
    CRIMINAL JUSTICE IN AMERICA FIFTH EDITION cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 1 CRIMINAL JUSTICE IN AMERICA FIFTH EDITION Developed by Marshall Croddy Bill Hayes cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 2 601 South Kingsley Drive T. Warren Jackson, Chair Los Angeles, California 90005 Marshall P. Horowitz, Chair, (213) 487- 5590 Publications Committee www.crf-usa.org Jonathan Estrin, President Marshall Croddy, Vice President Developed by Subject Matter Consultants Marshall Croddy and Bill Hayes (Various Editions) Richard Chrystie, Deputy District Attorney, Board Reviewers Los Angeles County Marshall P. Horowitz, Lisa Rockwell, Val Cole, Deputy District Attorney, Patrick Rogan, K. Eugene Shutler, Los Angeles County Douglas Thompson, Lois Thompson Star French, Deputy Probation Officer, Editor Los Angeles County Bill Hayes John Hud, Criminal Defense Attorney, Bozeman, Montana Contributing Writers (Various Editions) Daniel E. Lewis, Attorney, Los Angeles Bill Hayes, Marshall Croddy, Todd Clark, Julia Rider, Luce, Forward, Hill, Jeffer & Teri Engler, Lucy Eisenberg, Damon Huss, Mangels Sandy Kanengiser, Carlton Martz, Betsy Devallis Rutledge, Special Counsel to the Salzman, Eden Kusmiersky, Coral Suter, District Attorney, Los Angeles County Charles Tremper, Michelle Ng, Roy Kim, Richard Simonian, Superintendent, C.K. Shruti Modi, Anjelica Sarmiento, Sophia Khan, Wakefield School, Fresno County Probation Marianna Muratova Department Researchers Captain Robert Taylor, Commanding Officer, (Various Editions) Juvenile Division, Los Angeles Police Rick Bhasin, Luke Delgado, and Michael Sokolson Department Kerry White, Head Deputy District Attorney, Production Juvenile Division, Los Angeles County Andrew Costly, Designer Library of Congress Cataloging-in-Publication Data Criminal justice in America / developed by Marshall Croddy and Bill Hayes ; edited by Bill Hayes ; written by Bill Hayes ..
    [Show full text]