This type of fraud involves creating counterfeit checks to withdrawal funds from an account illegally.
What is check fraud
This type of fraud occurs when a criminal uses someone else's bank account and routing numbers to initiate an unauthorized electronic payment through the Automated Clearing House (ACH) network, essentially stealing money from the victim's account without their consent.
What is ACH fraud?
The act of splitting a large cash transaction into smaller ones to avoid detection by regulators and law enforcement is known as_____
What is structuring
Frequent changes in account information can be a warning sign of this type of fraud.
What is account takeover?
What type of fraud have I performed if I frequently wire money quickly from one account to another, often to a foreign country, through a bank or credit union, Western Union, MoneyGram, or similar business.
What is a Wire Fraud?
Placement, Layering and Integration
What is the three stages of Money Laundering?
This scheme, a perpetrator creates fake accounts or identities to steal money or information from unsuspecting victims. Also known as true name fraud.
What is identify theft?
This is a type of credit card fraud where a person or group of people establish a credit history and then max out their credit line without paying it back. It's also known as hit-and-run fraud.
What is bust-out fraud?
_____ is a person or entity that has the ultimate control or ownership of an asset or legal entity. This can Be through direct ownership, or by controlling the voting rights or other aspects of the entity.
What is a beneficial owner?
This exploitation occurs when a family member, friend, or caregiver misuses an elders financial resources for their own benefit.
What is elder financial exploitation?
This type of financial crime is where a cybercriminal steals a person's or business's online banking information to access their accounts in order to make fraudulent transfers or withdrawals.
What is online banking fraud via account takeover fraud.
_____ are restrictions that prohibit most interactions with a country or region. These restrictions include trade, financial transactions, and services.
What are comprehensive sanctions?
This tactic involves a fraudster posing as a company executive to manipulate employees/vendors into transferring funds.
What is business email compromise?
This occurs when individuals or groups misrepresent themselves or manipulates their own accounts for financial gain.
They might do so by creating false identities, inflating income on loan applications, or deliberately not reporting a change in financial status to continue receiving credit or benefits.
What is first party fraud?
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act is more commonly known by what acronym
What is The USA Patriot Act?