Financial Crime Definitions M - Z
Explore Investopedia's expert-written library of terms around all types of financial crimes committed by individuals or groups.
:max_bytes(150000):strip_icc()/money-laudering-3b56cb6c1671442fb4a7e97ce2225f1e.png)
Money Laundering: What It Is and How to Prevent It
:max_bytes(150000):strip_icc()/investing17-5bfc2b8fc9e77c00519aa64c.jpg)
Pump-and-Dump: Definition, How the Scheme is Illegal, and Types
:max_bytes(150000):strip_icc()/businessman-in-handcuffs-103060159-d911248c0ec04c13a33bbc16d3d36375.jpg)
Racketeering Meaning, Types, and Examples
:max_bytes(150000):strip_icc()/GettyImages-1133007677-09b77b018b3c4e4f8fa347a424a5c691.jpg)
What Does Pro Bono Really Mean?
:max_bytes(150000):strip_icc()/GettyImages-876018768-24f7cc88f8684990849c889b46a56aa2.jpg)
Underground Economy: Definition, Statistics, Trends, and Examples
Explore Definitions M - Z
:max_bytes(150000):strip_icc()/crossing-sign---fraud-ahead-697219150-4a560f15506942cb864a0c66432e4191.jpg)
Wire Fraud
:max_bytes(150000):strip_icc()/smurfs2-smurf-photo-56b2eac03df78cdfa0045b30.jpg)
What Is a Smurf and How Does Smurfing Work?
:max_bytes(150000):strip_icc()/InsiderTrading-56ae797d5f9b58b7d0108a83-2e730f24db0845528641a41bfa2af748.jpg)
What Is White-Collar Crime? Meaning, Types, and Examples
:max_bytes(150000):strip_icc()/GettyImages-881879106-aa07d4824acc40adaece64531b347875.jpg)
Painting the Tape: Definition, Legality, Example
:max_bytes(150000):strip_icc()/void-contract.asp-final-860a18855490430ea2b7e3f54a7db47d.png)
Void Contract Definition and What Happens
:max_bytes(150000):strip_icc()/GettyImages-89291842-25ec75e2ac784b44a9fd405410184011.jpg)
Unlawful Loan: Meaning, History, and Examples
:max_bytes(150000):strip_icc()/InsiderTrading-56ae797d5f9b58b7d0108a83-2e730f24db0845528641a41bfa2af748.jpg)
What Was ZZZZ Best? How the Ponzi Scheme Creator Was Caught
:max_bytes(150000):strip_icc()/banking-78ffea1c8dee41d79d5d465658786200.jpg)
What Is a Suspicious Activity Report (SAR)? Triggers and Filing
:max_bytes(150000):strip_icc()/customer-signing-paperwork-with-bank-manager-114854593-d4f973b959144a6c9d346cd4311ad39f.jpg)
What Is Redlining? Definition, Legality, and Effects
:max_bytes(150000):strip_icc()/chelsea-manning-appears-before-second-grand-jury-in-wikileaks-investigation-1149598244-91eda2ac2bdb4d078779381bfb79c2af.jpg)
What Is a Whistleblower? Protections, Law, Importance, and Example
:max_bytes(150000):strip_icc()/cropped-image-of-man-checking-stock-market-on-mobile-phone-1051266664-168092c0f87245f0aa68033257f401b1.jpg)
STOCK Act: Meaning, Overview, Criticisms
:max_bytes(150000):strip_icc()/opis.asp-final-8a6a38ceb2034d2cb5658d888f01aca3.png)
Offshore Portfolio Investment Strategy (OPIS)
:max_bytes(150000):strip_icc()/investing8-5bfc2b8d46e0fb005144dbe3.jpg)
Ultra Vires Acts: Legal Definition and Examples
:max_bytes(150000):strip_icc()/investing8-5bfc2b8d46e0fb005144dbe3.jpg)
Tied Selling
:max_bytes(150000):strip_icc()/GettyImages-950722746-375beec0213344c380fd0c49732c2dcd.jpg)
What Is Undue Influence? Definition, How It Works, and Examples
:max_bytes(150000):strip_icc()/GettyImages-1068572802-1aab1e14def847e49fb1faec9b934059.jpg)
What Is Misrepresentation? Types and How It Works
:max_bytes(150000):strip_icc()/GettyImages-185000712-ab5748722af94575b6678eb27ebbeded.jpg)
What an Ombudsman Does, Types, Pros & Cons
:max_bytes(150000):strip_icc()/ponzi-mania.asp_final-fbd15054354c4f2091c5cd64ae4b977b.png)
Ponzi Mania
:max_bytes(150000):strip_icc()/midsection-of-businessman-putting-money-into-pocket-1134635600-c14d53f7ee154db9bd9fddff38a83855.jpg)
Market Surveillance
:max_bytes(150000):strip_icc()/147323400-5bfc2b8c4cedfd0026c11901.jpg)
What Is Securities Fraud? Definition, Main Elements, and Examples
:max_bytes(150000):strip_icc()/midsection-businessmen-analyzing-charts-on-laptop-in-office-1128046391-93934dcc448148c0b7aa90427078604a.jpg)
Rogue Trader: What it is, How it Works, Examples
:max_bytes(150000):strip_icc()/investing18-5bfc2b8fc9e77c005143f183.jpg)
Price Rigging
:max_bytes(150000):strip_icc()/GettyImages-182877930_1800-e1c89615434a4b2cbde88fc1a1ff2611.png)
What Is Fraud? Definition, Types, and Consequences
:max_bytes(150000):strip_icc()/investor-analyzing-stock-market-investments-with-financial-dashboard--business-intelligence--bi---and-key-performance-indicators--kpi--on-smartphone-and-computer-screens-956752490-5a4e3615b3e44864b4186257a5f5af27.jpg)
Stock Parking
:max_bytes(150000):strip_icc()/GettyImages-1030744578-0c536488560e445ca77582735f562189.jpg)
Self-Dealing: What it Means, Why it's Illegal, Examples
:max_bytes(150000):strip_icc()/scam-3933004_1280-1f71f9c3d34845e59d9917b45f82b473.jpg)
Nigerian Letter Scam Definition and How to Avoid It
:max_bytes(150000):strip_icc()/court-settlement-185062827-829e9c3aaa9c46dda1678adefc76c0a3.jpg)
Misselling
:max_bytes(150000):strip_icc()/200270955-001-5bfc2b8bc9e77c00517fd20f.jpg)
Occupancy Fraud: Definition, Rules, and Penalties
:max_bytes(150000):strip_icc()/nick-leeson_final-e23e5e05a640492ca9b721c8decc5f9d.png)
Who Is Nick Leeson?
:max_bytes(150000):strip_icc()/tapingrule.asp_final-97fe6946c0de4f1cac06c0fb641e7a3e.png)
Taping Rule
:max_bytes(150000):strip_icc()/judge-gavel-with-money-and-handcuf-1461288234foy-691a6a5bfc924e169910f4f69ee45db6.jpg)
Tunneling
:max_bytes(150000):strip_icc()/200393273-001-5bfc2b8bc9e77c0026b4f8ce.jpg)
Marketing Fraud
:max_bytes(150000):strip_icc()/tipping-3ec0de5986184bc097b2873e3221d537.jpg)
Tipping
:max_bytes(150000):strip_icc()/GettyImages-648822869-63239127661f41a699803233a421dbe9.jpg)
Questioned Document Investigation
:max_bytes(150000):strip_icc()/ivan-boesky-ADD-Final-V6-20ffa15fa53f423eb84333916f77c226.jpg)
Ivan Boesky
:max_bytes(150000):strip_icc()/GettyImages-1081349274-3a9e468c70bc4cb89785021f1fb279b8.jpg)
Misappropriation Theory
:max_bytes(150000):strip_icc()/investing5-5bfc2b8e46e0fb0026016f0e.jpg)
Short and Distort
:max_bytes(150000):strip_icc()/TermDefinitions_Ponzimonium_colorv1-33f95fc6002d452786c8df2caf113559.png)
Ponzimonium
:max_bytes(150000):strip_icc()/GettyImages-834865570-ae379c54012d454db59333a7f05f2e44.jpg)
Watered Stock: What it is and How it Works
:max_bytes(150000):strip_icc()/investing10-5bfc2b90c9e77c00517fd2ef.jpg)
Rio Trade
:max_bytes(150000):strip_icc()/investing18-5bfc2b8fc9e77c005143f183.jpg)
Malfeasance
:max_bytes(150000):strip_icc()/voodooaccounting.asp-final-d740ef77553740a1b8275a3d2e975c25.png)
Voodoo Accounting
:max_bytes(150000):strip_icc()/wall_street_179681980-5bfc2b9746e0fb0083c07d29.jpg)
Social Engineering: Types, Tactics, and FAQ
:max_bytes(150000):strip_icc()/investing14-5bfc2b8f46e0fb00265beb22.jpg)
Treble Damages: What it is, How it Works, Examples
:max_bytes(150000):strip_icc()/sequestered-account.asp-final-3a6d7b683bf2402ba678203e2d3dcf79.png)
Sequestered Account