| |
| |
List of Exhibits | |
| |
| |
Series Foreword | |
| |
| |
Acknowledgements | |
| |
| |
| |
Today's White-Collar Crime | |
| |
| |
What is mite-Collar Crime? | |
| |
| |
Why Does White-Collar Crime Matter? | |
| |
| |
Challenges for Law Enforcement: Do You Have What It Takes to Answer the Call? | |
| |
| |
What Do We Mean by "Today's White-Collar Crime?" | |
| |
| |
Why Read This Book? | |
| |
| |
Chapter Summary | |
| |
| |
| |
Terrorists' Links to Commercial Fraud in the United States | |
| |
| |
| |
| |
Katrina Fraud Swamps System | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
Information Technology and White-Collar Crime | |
| |
| |
A Brief History of the Role of Information Technology in White-Collar Crimes | |
| |
| |
Computer-Based Crime: A Cause for Alarm? | |
| |
| |
Currency Counterfeiting: From "Raised" Notes to Inkjet Printing | |
| |
| |
Hacking and Cracking | |
| |
| |
Identity Theft: The Future Is Now | |
| |
| |
Chapter Summary | |
| |
| |
| |
A Look at Crime in the Age of Technology | |
| |
| |
| |
| |
The Scam That Will Not Die | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
The Corporate-State Corruption Connection: Can It Be Stopped? | |
| |
| |
The Honorable Thomas E. White: Modern-Day Horatio Alger or Opportunist? | |
| |
| |
If All Politics are Local: Can the Same Can Be Said for Abuse of Office Crimes? | |
| |
| |
Marty Barnes: A Case Study in Egoism and Egregious Behavior | |
| |
| |
Teapot Dome and Enron: Back to the Future? | |
| |
| |
Nepotism: Personal Connections Over Professional Qualifications? | |
| |
| |
Misuse of Government Equipment and Supplies | |
| |
| |
Bribery | |
| |
| |
Chapter Summary | |
| |
| |
| |
Disaster Profiteering: The Flood of Crony Contracting Following Hurricane Katrina | |
| |
| |
| |
| |
Meet the War Profiteers | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
The Origins of Public Corruption Control in the United States, 1883-1969 | |
| |
| |
Democracy and Corruption | |
| |
| |
Corruption Control: A Call to Action | |
| |
| |
Roots of the "Scientific Era" of Corruption Control | |
| |
| |
The Scientific Administration Model: Systematic Evaluation | |
| |
| |
A Scientific Model at Work: The "Beautiful Minds" of Co-Conspirators | |
| |
| |
Challenges of the Scientific Administration Model | |
| |
| |
Chapter Summary | |
| |
| |
| |
FELLOWship of the Ring | |
| |
| |
| |
| |
The Scandal of George Scalise: A Case Study in the Rise of Labor Racketeering in the 1930s | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
The "Modern Era" of Public Corruption Control: The 1970s Through Today | |
| |
| |
Nixon: From Corruption Controller to Investigative Target | |
| |
| |
The All Encompassing Vision of Corruption Control | |
| |
| |
Jimmy Carter: The First All Encompassing President | |
| |
| |
The Inspector General Program | |
| |
| |
The Reagan-Bush I Years: The Doldrums of Corruption Control | |
| |
| |
Clinton, Reinventing Government, and the Future of Corruption Control | |
| |
| |
The G.W. Bush Administration's Strategy for Corruption Control | |
| |
| |
Chapter Summary | |
| |
| |
| |
Mediated Corruption: The Case of the Keating Five | |
| |
| |
| |
| |
How Many More Mike Browns Are Out There? | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
White-Collar Crime Theory: Origins and Early Developments | |
| |
| |
Introduction | |
| |
| |
White-Collar Crimes throughout History | |
| |
| |
Should We Simply Call It "Greedy" Crime? A Look at Conspicuous Consumption and Strain Theory | |
| |
| |
Sutherland, Differential Association and White-Collar Crime | |
| |
| |
Tappan's Response to Sutherland | |
| |
| |
White-Collar Criminality: Motivations and Offender Rationalization | |
| |
| |
Blacklisting and the Doldrums of White-Collar Crime Research | |
| |
| |
Feminist Theory and the Role of Women in White-Collar Crime | |
| |
| |
Chapter Summary | |
| |
| |
| |
The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association | |
| |
| |
| |
| |
Running after the Joneses | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
Organizational Crime and Corporate Criminal Liabilities | |
| |
| |
The "Democracy" of White-Collar Crime | |
| |
| |
Corporate Crime and Changes in the Research Agenda | |
| |
| |
The Shift Towards Organizational Crime Research | |
| |
| |
CSI and Organizational Crime | |
| |
| |
Ten Steps to Reduce Organizational Crime | |
| |
| |
Elite Organizational Deviance and Corporate America: Environmental Examples | |
| |
| |
Curtailing Corporate Crime: A Self-Regulating Approach | |
| |
| |
Sarbanes-Oxley: Antidote or Catalyst to Corporate Criminal Liability? | |
| |
| |
The Case of Big Pharma: Should We Consider a Sarbanes-Oxley Approach? | |
| |
| |
White-Collar Crime: Other Perspectives | |
| |
| |
Chapter Summary | |
| |
| |
| |
The Dialectics of White-Collar Crime: The Anatomy of the Savings and Loan Crisis and the Case of Silverado Banking, Savings and Loan Association | |
| |
| |
| |
| |
Corporations, Workers, and the Public Interest | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
White-Collar Crime: A Legalistic Perspective | |
| |
| |
The Development of White-Collar Criminal Law | |
| |
| |
Differing Burdens of Proof: White-Collar Criminal and Civil Cases | |
| |
| |
Underpinnings of the American Legal System: The Need for Training and Education | |
| |
| |
Search and Arrest Warrants: The Workhorses of White-Collar Crime Investigations | |
| |
| |
Exceptions to the Search/Seizure Warrant Requirement | |
| |
| |
Arrest Warrants | |
| |
| |
Other Important Paperwork for the White-Collar Crime Investigator | |
| |
| |
White-Collar Criminal Statutes: A Primer | |
| |
| |
The Challenge of Proving Money Laundering | |
| |
| |
Asset Forfeiture: Boon to Law Enforcement or Fourth Amendment Nightmare? | |
| |
| |
Chapter Summary | |
| |
| |
| |
Terrorism's Money Trail | |
| |
| |
| |
| |
An Unholy Trinity: The Three Ways Employees Embezzle Cash | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
White-Collar Crime Analysis and Trends | |
| |
| |
Intelligence Analysts; Who Are They? | |
| |
| |
The Integrity of the Analyst | |
| |
| |
Types of Law Enforcement Intelligence | |
| |
| |
Using Intelligence Analysis for Threat Assessment | |
| |
| |
Chapter Summary | |
| |
| |
| |
How to Make a Spy | |
| |
| |
| |
| |
Applying Heuer's Analysis of Competing Hypotheses (ACH) in the Law Enforcement Intelligence Environment | |
| |
| |
| |
Thinking Activities | |
| |
| |
| |
Where Do We Go From Here? The Future of White-Collar Crime | |
| |
| |
Trends and Patterns in White-Collar Crime | |
| |
| |
Recommendations for Social Change | |
| |
| |
Chapter Summary | |
| |
| |
| |
Illicit Cigarette Trafficking and the Funding of Terrorism | |
| |
| |
| |
| |
Corporate Crime after 2000: A New Law Enforcement Challenge or D�j� Yu? | |
| |
| |
| |
Thinking Activities | |
| |
| |
Notes | |
| |
| |
Credits | |
| |
| |
Bibliography | |
| |
| |
Index | |