Financial Crime Definitions A - L
Explore Investopedia's expert-written library of terms around all types of financial crimes committed by individuals or groups.
:max_bytes(150000):strip_icc()/bernard-madoff.asp_final-2d955af8af754d30ab6c9019f3486a93.png)
Bernie Madoff: Who He Was, How His Ponzi Scheme Worked
:max_bytes(150000):strip_icc()/individual-bags-of-illegal-drugs-on-a-white-background-925443004-5bfd8504c9e77c00266f27c7.jpg)
What Is Black Money? Meaning, Definition, and Criticism
:max_bytes(150000):strip_icc()/GettyImages-1162946945-58d990392cef43d993dd3fc6c682d592.jpg)
What Is Channel Stuffing? How It Works, Purpose, and Legality
:max_bytes(150000):strip_icc()/investing8-5bfc2b8d46e0fb005144dbe3.jpg)
What It Means to 'Cook the Books' Plus Examples
:max_bytes(150000):strip_icc()/GettyImages-801479766-e0d3380462b24386a4bb6a88cc7c1e42.jpg)
Black Market
Explore Definitions A - L
Kiting Definition, How It Works With Checks and Securities
:max_bytes(150000):strip_icc()/Sorrow-Accounting-Ruble-Bribe-Surprise-2896789-842c07399062416c85dfc1692e4501f2.jpg)
Facilitating Payment: Definition, Purpose, Legality, and Example
:max_bytes(150000):strip_icc()/charles-ponzi-mug-shots-514978632-5df79100db7c4cbe9203e3d0311192b9.jpg)
High-Yield Investment Program (HYIP): Definition and Fraudulence
:max_bytes(150000):strip_icc()/investing4-5bfc2b8ec9e77c0026b4f956.jpg)
What Is Embezzlement, and How Does It Happen?
:max_bytes(150000):strip_icc()/GettyImages-80567648-1c78e0838a0a429eaba12239efc19ccf.jpg)
Bait and Switch: Definition, How Strategy Works, and Tips to Avoid
:max_bytes(150000):strip_icc()/GettyImages-726793923-6aaa6f1f4e974940b33766c768d6529a.jpg)
Backdating: Definition, How It Works, Legality, and Examples
:max_bytes(150000):strip_icc()/businessmen-talking-in-secrecy-1054524238-7a4107eb1c6f48939f1cdd10993e7c92.jpg)
What Is Extortion? Examples of Threats, Uses, and Legality
:max_bytes(150000):strip_icc()/GettyImages-1181576432-9a079a02b0684394a4f1fa131ccd1309.jpg)
Corruption: Its Meaning, Type, and Real-World Example
:max_bytes(150000):strip_icc()/GettyImages-173253857-265b6c47a8834627bdd6736b73d8ee96.jpg)
Computer Abuse: Overview, History, Examples
:max_bytes(150000):strip_icc()/GettyImages-1223022384-52598b79ed3047b9b1fa752976bb6d41.jpg)
Corner
:max_bytes(150000):strip_icc()/rbv2_53-5bfc2b8ac9e77c0058770499.jpg)
What Is Corporate Fraud? Definition, Types, and Example
:max_bytes(150000):strip_icc()/GettyImages-1159969537-faeee00d528f40d9bbabbc8fa3ef664d.jpg)
Interpositioning
:max_bytes(150000):strip_icc()/GettyImages-478631934-8ff89c44d39d4a4ca974ac282db9b84a.jpg)
Bid Rigging: Examples and FAQs About the Illegal Practice
:max_bytes(150000):strip_icc()/GettyImages-482828704-586c02ac9a9f43fd9c8354d6a9d7d9d7.jpg)
Copyright Infringement: Definition, Meaning, Example and Criteria
:max_bytes(150000):strip_icc()/investing4-5bfc2b8ec9e77c0026b4f956.jpg)
Double Dipping
:max_bytes(150000):strip_icc()/shutterstock_253136563-5bfc2b98c9e77c00519aa7a8.jpg)
Bidding Ring
:max_bytes(150000):strip_icc()/business-building-956363732-a5d7a38e6a9f44edb1a10e8b3eee32a6.jpg)
Daisy Chain
:max_bytes(150000):strip_icc()/GettyImages-686735761-0f14dde6430f4e2d9f7d783cf9206416.jpg)
Attribution Rules: What They are, How They Work
:max_bytes(150000):strip_icc()/assets-3047a48cef9d4d11bc8ee101112243e4.jpg)
Asset Substitution Problem
:max_bytes(150000):strip_icc()/GettyImages-1176718646-74dfed1ec1b64d76acaf727c772c51f2.jpg)
Bust-Out Credit Card Fraud: Definition and Impact
:max_bytes(150000):strip_icc()/dispatcher_headset-665036244-5a73db780e23d90036d40abe.jpg)
Boiler Room Definition, How It Operates, Common Scams
:max_bytes(150000):strip_icc()/investing6-5bfc2b8ec9e77c005143f13b.jpg)
Gun-Jumping
:max_bytes(150000):strip_icc()/GettyImages-767986903-fbab09889833441ea339a37f8533aec0.jpg)
Financial Action Task Force (FATF): What it is, How it Works
:max_bytes(150000):strip_icc()/Lapping-33ab4d6c1d27438185892b4efc2c2804.jpg)
Lapping Scheme: How to Detect and Prevent
:max_bytes(150000):strip_icc()/investing9-5bfc2b8d46e0fb0051bddfee.jpg)
Disgorgement
:max_bytes(150000):strip_icc()/GettyImages-501951293-2ec9f2f64fcb4de98d44c61b971cde2e.jpg)
Loophole
:max_bytes(150000):strip_icc()/businessman-in-handcuffs-103060159-54730dc90b40417e8d85a547e2f14ab6.jpg)
Financial Crimes Enforcement Network (FinCEN)
:max_bytes(150000):strip_icc()/GettyImages-56187602-2b2489150b3f4e2ba5a4f734256c2bdd.jpg)
Financial Forensics
:max_bytes(150000):strip_icc()/investing8-5bfc2b8d46e0fb005144dbe3.jpg)
Bribe: Meaning, Overview and Tax Treatment
:max_bytes(150000):strip_icc()/investing7-5bfc2b8d46e0fb0051bddff8.jpg)
Caveat
:max_bytes(150000):strip_icc()/aa014176-5bfc2b8bc9e77c002630643b.jpg)
Association of Certified Fraud Examiners
:max_bytes(150000):strip_icc()/GettyImages-807266036-bb50732a471349598f46e5b3ba502c5c.jpg)
Accountant's Liability: What it Means, How it Works
:max_bytes(150000):strip_icc()/business-building-956363732-c01a3c5e0b034f9da56b1e9d20b89966.jpg)
Fraudulent Conveyance: What it is, How it Works
:max_bytes(150000):strip_icc()/104270020-5bfc396cc9e77c002634334e.jpg)
Financial Shenanigans
:max_bytes(150000):strip_icc()/computer-hacker-1081349274-f0cc3e1baa1d4047865b76b1a0062a7a.jpg)
Circular Trading
:max_bytes(150000):strip_icc()/GettyImages-1184142404-5409daf75d4742539d77b80cce3cf862.jpg)
Allen Stanford
:max_bytes(150000):strip_icc()/Android-Malware-56a0191d5f9b58eba4aeee14.jpg)
Banker Trojan
:max_bytes(150000):strip_icc()/139085474-5bfc2b8d46e0fb0026016ee7.jpg)
Intermarket Surveillance Group (ISG)
:max_bytes(150000):strip_icc()/snake_oil_salesman-5856e4dd5f9b586e023c2a60.jpg)
Cheapjack
:max_bytes(150000):strip_icc()/HalloweenGhost_Thinkstock_78022308-2--56a44d7a3df78cf77281a657.jpg)
Ghosting
:max_bytes(150000):strip_icc()/the-legend-of-leprechauns-leprechaun-drinking-beer-st-patrick-39-s-day-cartoon-245-16b9-5b3a691ac9e77c0037d36ef9.jpg)
Leprechaun Leader
:max_bytes(150000):strip_icc()/gavel_court-56a9aa585f9b58b7d0fdc8d6.jpg)
Injunction
:max_bytes(150000):strip_icc()/Enronomics_v2-7349f5b8245a410bb397e024a4674457.jpg)
Enronomics
:max_bytes(150000):strip_icc()/ginzytrading.asp-final-a5d9a7d8f0924ba6844faac3347afe79.jpg)
Ginzy Trading
:max_bytes(150000):strip_icc()/investing16-5bfc2b8fc9e77c00519aa657.jpg)
Expunge
:max_bytes(150000):strip_icc()/GettyImages-929912106-a6f0ee41e7f24abbb79b5df76a2bf0f3.jpg)
Click Fraud
:max_bytes(150000):strip_icc()/GettyImages-923167626-50f08026620d4428a6ee2a3d7faf98c5.jpg)
Affinity Fraud
:max_bytes(150000):strip_icc()/investing2-5bfc2b8fc9e77c005143f176.jpg)
What Is Duress? Definition, What Qualifies, and Types
:max_bytes(150000):strip_icc()/Corporatekleptocracy_final-8507f8c0a86244bf9d437bdf4211ff4f.png)
Corporate Kleptocracy
:max_bytes(150000):strip_icc()/debt-restructuring-fraud.asp-final-7d815e455c1c40a09c0a26161da6371c.png)
Debt Restructuring Fraud
:max_bytes(150000):strip_icc()/GettyImages-922359280-20d48711b9d6434083a5601d84a7e7de.jpg)
Global Recovery Rate
:max_bytes(150000):strip_icc()/courthouse-courtroom-56a1654c3df78cf7726a69ab.jpg)
Barratry
:max_bytes(150000):strip_icc()/investing3-5bfc2b8e46e0fb0026016f32.jpg)
First to File Rule