Вы находитесь на странице: 1из 2

1.

Larceny is defined as an illegal taking and carrying away of personal property belonging to another
with the purpose of depriving the owner of its possessions.
2. Embezzlement occurs when a person who has lawful possession of anothers money or property
fraudulently converts that money or property.
3. The difference between larceny and embezzlement the property is that in instances of embezzlement
the property is in the embezzlers possession and in instances of larceny the property is in anothers
possession.
4. Theft is the illegal taking of another persons property without that persons freely-given consent.
5. Robbery is the crime of seizing property through violence or intimidation.
6. Blackmail is the crime of threatening to reveal substantially true information about a person to the
public, a family member, or associates unless a demand made upon the victim is met.
7. Extortion occurs when a person unlawfully obtains money, property or services from a person, entity,
or institution, through extortion.
8. Exaction refers to extortion.
9. Extortion is commonly practiced by organized crime groups.
10. Ransom is a type of extortion of money or property by holding a prisoner or an item.
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
6.
7.
8.
9.

10.
11.
12.
13.
14.
15.
16.
1.

The two most common law felonies against property are arson and burglary.
The malicious and voluntary burning of the dwelling house of another person.
It means that the arsonist must intentionally or recklessly burn the house. No malice in the literal
sense of ill will is required.
Burglary is breaking and entering the dwelling house of another person in the nighttime with the intent
to commit a felony therein.
A dwelling house includes outbuildings in the area surrounding a house.
Money laundering is the process of transforming the proceeds of crime into ostensibly legitimate
money or other assets.
The most common criminals who launder money are drug traffickers, embezzlers, corrupt politicians
and public officials, mobsters, terrorists and con artists.
Drug traffickers need money laundering because they deal almost exclusively in cash.
The basic money laundering process has three steps: placement, layering and integration.
Placement is the step when the launderer inserts the dirty money into a legitimate financial institution.
Layering involves sending the money through various financial transactions to change its form and
make it difficult to follow.
Integration is the stage when the money re-enters the mainstream economy in legitimate-looking form
and it appears to come from a legal transaction.
There is a finite number of organizations and the number is constantly changing.
The most popular money laundering techniques are: black market Colombian peso exchange,
structuring deposits, overseas banks, underground/alternative banking, shell companies and investing
in legitimate businesses.
Smurfing is the breaking up of large amounts of money into smaller, less-suspicious amounts.
The most popular currency for money laundering is the U.S. dollar.
The effect of successful money laundering is the encouragement of criminals to continue their illicit
schemes because they get to spend their profit with no repercussions.
The economic effects of money laundering are devastating to developing countries because they lack
sufficient regulation for their newly privatized financial sectors.
Terrorisms connection with money laundering developed because the financers and terrorist
organizations wanted to maintain anonymity.
To fight money laundering the FATF issued the 49 Recommendations for banks.
The penalties are incarceration, fines, probation, civil litigation, and much more.

Hacking is the deliberate and unauthorized access, use, disclosure, and/or taking of electronic data on
a computer.
2. The crime is committed when a person willfully, knowingly, and without authorization or without
reasonable grounds that he or she has such authorization, attempts or achieves access,
communication, examination, or modification of data, computer programs, or supporting
documentation residing or existing internal or external to a computer, computer system, or computer
network.
3. Computer crimes are defined by the DOJ as any violations of criminal law that involve knowledge of
computer technology for their perpetration, investigation, or prosecution.
4. The DOJ divides computer crime into three categories.
5. Attacks on computers are made by: viruses, worms, Trojan horses, logic bombs, sniffers and DDoS.
6. Viruses are programs that modify other computer programs so that they carry out functions intended
by the creator of the virus.
7. Trojan horses activate a more destructive program embedded in the code.
8. They are used to monitor and analyze networks.
9. Worms are spread by electronic mail.
10. Logic bombs are used to disable a time-limited software sample after the passage of a predetermined
period of time.

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.

13.
14.

Tort law is a body of rights, obligations, and remedies that is applied by courts in civil proceedings to
provide relief for persons who have suffered harm from the wrongful acts of others.
Three elements.
It provides remedies for businesses that are harmed by the unfair and deceptive trade practices of a
competitor.
It protects employees from the intentional or negligent infliction of emotional distress.
By providing remedies against both individuals and businesses that pollute the air, land, and water to
such an extent it amounts to nuisance.
The law of torts serves four objectives.
The term derives from Latin tortum, meaning something twisted, wrung, or crooked.
***********
Torts fall into three general categories: intentional, negligent, and strict liability torts.
Intentional torts are those wrongs which the defendant knew or should have known would occur
through their actions or inactions.
Negligent torts occur when the defendants actions were unreasonably unsafe.
Strict liability torts occurring when the law imposes liability on defendants who are neither negligent
nor guilty of intentional wrongdoing. The activities that are being regulated by strict liability torts
include blasting, transporting hazardous materials, storing dangerous substances, and keeping certain
animals in captivity.
Causation is the "causal relationship between conduct and result". That is to say that causation
provides a means of connecting conduct with a resulting effect, typically an injury.
Trespassing as it relates to real estate law means entering onto land without consent of the landowner.

15. An assault is an act which creates fear of an imminent battery and a battery is the willful or intentional
touching of a person against that persons will by another person, or by an object or substance put in
motion by that other person.

Похожие интересы