■Grand larceny: thefts of property○Burglary- trespassory breaking and entering of property○False Pretenses- Obtaining title to someone else’s property by knowingly or recklessly making a false representation of existing material fact that is intended to and does defraud the victim into parting with his or her property■Unlike larceny- title passes to the thief■Filing false claims with insurance companies, the buying of a VCR with a check the purchaser knows will bounce, and the taking of buyer’s money for goods and services with no intent of delivering such goods or services○Embezzlement (fraudulent conversion of the property of another by one who has lawful possession of it■Overlaps with larceny, but the original possession by the wrongdoer is unlawful
●Attorney who receives funds from a client for payment of a settlement but later decides to spend the money on him or herself instead■State v. Joy●Not debtor-creditor relationship but instead agent and principal therefore needed to pay her●Robbery- stealing from a person or in his or her presence by use of force or threat of force○Removing someone’s earring by stealth would be larceny, ripping it from the victim's ear would be robbery●Forgery- the false making or altering of a legally significant instrument (such as a check, credit card, deed, passport) with the intent to defraud○Writing an insufficient funds check is not forgery but changing the true payee’s name as written on a check to your own and cashing the check is forgery●Arson- Malicious burning of the property of another○The building burned need not be a dwelling house■People who burn their own house for purposes of defrauding an insurance company are violating fraud statutesFederal Crimes Affecting Business●Mail and wire fraud○Use of mails to defraud or use of telephone, telegraph, radio to defraud○Ex: false representation to sell products or securities●Anti-trust●Securities law●Racketeer Influenced and Corrupt Org Act (RICO)○Attack organized crime, especially its infiltration into legitimate business○Contains both criminal and civil penaltiesComputer Crimes*** know stuff at the top●Three types○(1) Unauthorized access○(2) Theft of information○(3) Theft of funds○*** if someone steals data it is theft too●Examples○Stealing a competitor’s computer program○Paying an accomplice to delete adverse information and insert favorable false information into the defendant’s credit file○A bank president’s having his or her account computer coded so that his or her checks would be removed and held rather than posted so he or she could later remove the actual checks without their being debited○A disgruntled ex-employee’s inserting a virus into his former employer’s computerto destroy its records
○Three computer hackers’ foray into the forbidden recesses of computers that ran a large telecommunications company's phone network
You've reached the end of your free preview.
Want to read all 27 pages?