Posts

Showing posts from January, 2023

Non-Delivery of Merchandise

Image
 Non-Delivery of Merchandise Non-delivery of goods or failure to ship merchandise is  the simplest type of auction fraud . A seller lists an item, the item is purchased, the seller collects the funds, and the seller does not send the item.  The non-delivery scam occurs when the scammer places an item up for sale w h en there is actually no item at all.  EXAMPLE:   references: https://nyccriminallawyer.com/fraud-charge/auction-fraud/non-delivery/#:~:text=Non%2Ddelivery%20of%20goods%20or,does%20not%20send%20the%20item.

Sports Betting

Image
  Sports Betting Anytime two or more individuals wager money on the outcome of a sporting event , they are engaging in sports betting.  Engaging in the business of betting or wagering on any sporting event or contest over the internet.  references: https://www.forbes.com/betting/sports-betting/how-does-sports-betting-work/#:~:text=Sports%20Betting%20Definition,are%20engaging%20in%20sports%20betting.

Blackmail/Extortion

Image
  Blackmail/Extortion Blackmail generally refers to hush money, and extortion refers to certain forms of public official misconduct and to those making threats of physical harm to person or property . Few "blackmail" statutes remain on the books, with most statutes prohibiting such behavior as extortion, theft, or criminal coercion.  It is also a criminal offense of unlawly obtaining money, property or services from a person, entity or institution, through coercion.  EXAMPLE: For example, it is extortion  if a public official threatens to deny a public contract to a bidding contractor who clearly deserves to receive it unless the bidder pays off the official . The official would receive the payoff under a threat to give the contractor worse than fair treatment.  reference: https://www.encyclopedia.com/law/legal-and-political-magazines/blackmail-and-extortion#:~:text=For%20example%2C%20it%20is%20extortion,contractor%20worse%20than%20fair%20treatment.

Accessing Stored Communications

Image
   Accessing Stored Communications Intentionally access, without authorization, a facility through which an electronic communication service is provided ; or (b) intentionally exceed the authorization of such facility; and as a result of this conduct, obtain, alter or prevent authorized access. In other words hacking; a facility through which an electronic communication service is provided.  EXAMPLE :   reference: https://www.justice.gov/archives/jm/criminal-resource-manual-1061-unlawful-access-stored-communications-18-usc-2701

Phishing and Spoofing

Image
  Phishing Phishing is  a type of social engineering attack often used to steal user data, including login credentials and credit card numbers . It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.   It is also the attempt to acquire sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communications. EXAMPLE:       An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. The link in the phishing email takes the victim to a fake PayPal website and the stolen credit card information is used to commit further crimes.     Spoofing A common spoofing scenario happens  when an email is sent from a fake sender address, asking the recipient to provide sensitive data . Typically, the recipient is prompted t