Financial crime is crime committed against property, involving the unlawful conversion of the ownership of property (belonging to one person) to one's own personal use and benefit. Financial crimes may involve fraud (cheque fraud, credit card fraud, mortgage fraud, medical fraud, corporate fraud, securities fraud (including insider trading), bank fraud, insurance fraud, market manipulation, payment (point of sale) fraud, health care fraud); theft; scams or confidence tricks; tax evasion; bribery; sedition; embezzlement; identity theft; money laundering; and forgery and counterfeiting, including the production of counterfeit money and consumer goods.
Financial crimes may involve additional criminal acts, such as computer crime and elder abuse and even violent crimes such as robbery, armed robbery or murder. Financial crimes may be carried out by individuals, corporations, or by organized crime groups. Victims may include individuals, corporations, governments, and entire economies.
Law enforcement often classifies larger forms of financial collusion as criminal syndicates.
The U.S. introduced the Foreign Corrupt Practices Act in 1977 to address bribery of foreign officials. This legislation dominated international anti-corruption enforcement until around 2010 when other countries began introducing broader and more robust legislation, notably the United Kingdom Bribery Act 2010. The International Organization for Standardization introduced an international anti-bribery management system standard in 2016. In recent years, cooperation in enforcement action between countries has increased.
Money laundering
For most countries, money laundering and terrorist financing raise significant issues with regard to prevention, detection and prosecution. Sophisticated techniques used to launder money and finance terrorism add to the complexity of these issues.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
We will focus on ethical dilemmas facing professionals in the financial industry. Cases based on real events will illustrate various kinds of transgressions. We will then study what regulators and fir
A black market, underground economy, or shadow economy is a clandestine market or series of transactions that has some aspect of illegality or is characterized by noncompliance with an institutional set of rules. If the rule defines the set of goods and services whose production and distribution is prohibited or restricted by law, non-compliance with the rule constitutes a black market trade since the transaction itself is illegal. Parties engaging in the production or distribution of prohibited goods and services are members of the .
Terrorism financing is the provision of funds or providing financial support to individual terrorists or non-state actors. Most countries have implemented measures to counter terrorism financing (CTF) often as part of their money laundering laws. Some countries and multinational organisations have created a list of organisations that they regard as terrorist organisations, though there is no consistency as to which organisations are designated as being terrorist by each country.
Counterfeit money is currency produced without the legal sanction of a state or government, usually in a deliberate attempt to imitate that currency and so as to deceive its recipient. Producing or using counterfeit money is a form of fraud or forgery, and is illegal. The business of counterfeiting money is nearly as old as money itself: plated copies (known as Fourrées) have been found of Lydian coins, which are thought to be among the first Western coins.
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. The main challenge when designing such protocols is maintaining their inexpensive cryptographic nature, whilst being able to protect again ...
Quite recently, distance-bounding protocols received a lot of attention as they offer a good solution to thwart relay attacks. Their security models at still unstable, especially when considering terrorist fraud. This considers the case where a malicious p ...
Various forms of real-world data, such as social, financial, and biological networks, can berepresented using graphs. An efficient method of analysing this type of data is to extractsubgraph patterns, such as cliques, cycles, and motifs, from graphs. For i ...