Financial Crime Definitions A - L
Explore Investopedia's expert-written library of terms around all types of financial crimes committed by individuals or groups.
:max_bytes(150000):strip_icc()/bernard-madoff.asp_final-2d955af8af754d30ab6c9019f3486a93.png)
Bernie Madoff: Who He Was ๊and How His Ponzi Scheme Worked
:max_bytes(150000):strip_icc()/black-money.asp-FINAL-1-8bc0d9ee1f4f40c08da92910dbd5b478.png)
What Is Bl🉐ack Money✨? Meaning, Definition, and Criticism
:max_bytes(150000):strip_icc()/GettyImages-1162946945-58d990392cef43d993dd3fc6c682d592.jpg)
Wꦬhat Is Channel Stuffing? How It Works, Purpose, and Legality
:max_bytes(150000):strip_icc()/investing8-5bfc2b8d46e0fb005144dbe3.jpg)
What It Means to 'Cook the Books' Plus Examples
:max_bytes(150000):strip_icc()/blackmarket.asp-FINAL-2-86c97cf4e3284ef78260ad59a3f2d682.png)
What Is the Black Market? Exam꧟ples of Products and Services
Kiting Definition, How It Works With Checks a🤡nd Securiti🐟es
:max_bytes(150000):strip_icc()/Sorrow-Accounting-Ruble-Bribe-Surprise-2896789-842c07399062416c85dfc1692e4501f2.jpg)
Facilitating Payment: Definition🔯, Purpose, Legality, and Example
:max_bytes(150000):strip_icc()/charles-ponzi-mug-shots-514978632-5df79100db7c4cbe9203e3d0311192b9.jpg)
High-Yield⭕ Investment Program (HYIP): Definition and Fraudulence
:max_bytes(150000):strip_icc()/embezzlement.asp-final-f02f04bcb6834ef6ac832ea20a1abdc2.png)
What Is Embezzlement, and How Does It Happen?
:max_bytes(150000):strip_icc()/GettyImages-80567648-1c78e0838a0a429eaba12239efc19ccf.jpg)
Bait aꦬnd Switch:ﷺ Definition, How Strategy Works, and Tips to Avoid
:max_bytes(150000):strip_icc()/GettyImages-726793923-6aaa6f1f4e974940b33766c768d6529a.jpg)
Backdating: Definition, H♊ow It Works, Legality, and Examples
:max_bytes(150000):strip_icc()/businessmen-talking-in-secrecy-1054524238-7a4107eb1c6f48939f1cdd10993e7c92.jpg)
What Is Extortion? Exampleꦆs of Threats, Uses, and Leg𝓀ality
:max_bytes(150000):strip_icc()/corruption.asp-final-2a40b4f26fe84ebe9684313827ce7817.png)
Corruptio🎃n: Its Meaning, Type, 🍬and Real-World Example
:max_bytes(150000):strip_icc()/GettyImages-173253857-265b6c47a8834627bdd6736b73d8ee96.jpg)
Computer Abuse: Overview, History, Examples
:max_bytes(150000):strip_icc()/GettyImages-1223022384-52598b79ed3047b9b1fa752976bb6d41.jpg)
Corner: What It is, Regulations, Examples
:max_bytes(150000):strip_icc()/rbv2_53-5bfc2b8ac9e77c0058770499.jpg)
What Is Corporate Fraud? Definition,🌳 Types,♍ and Example
:max_bytes(150000):strip_icc()/GettyImages-1159969537-faeee00d528f40d9bbabbc8fa3ef664d.jpg)
Interpositioning in Securities Transactions♕ Definition and Rules
:max_bytes(150000):strip_icc()/GettyImages-478631934-8ff89c44d39d4a4ca974ac282db9b84a.jpg)
Bid Rigging: Examples and FAQs About th♔e Illegal Practice
:max_bytes(150000):strip_icc()/copyright-infringement.asp-final-3197b4d6e6d14d97a52c152da4a56c53.jpg)
Copyright 🦂Infringement: Definition, Meaning, Example, and Criteria
:max_bytes(150000):strip_icc()/investing4-5bfc2b8ec9e77c0026b4f956.jpg)
Double Dipping: What it Means, How it Works
:max_bytes(150000):strip_icc()/shutterstock_253136563-5bfc2b98c9e77c00519aa7a8.jpg)
Bidding Ring: What It Means, How It Works
:max_bytes(150000):strip_icc()/business-building-956363732-a5d7a38e6a9f44edb1a10e8b3eee32a6.jpg)
Daisy Chain: Meaning, Punishments, Example
:max_bytes(150000):strip_icc()/GettyImages-686735761-0f14dde6430f4e2d9f7d783cf9206416.jpg)
Attribution Rules: What They are, How They Work
:max_bytes(150000):strip_icc()/assets-3047a48cef9d4d11bc8ee101112243e4.jpg)
Asset Substitution Problem: What it i🍸👍s, How it Works, Example
:max_bytes(150000):strip_icc()/GettyImages-1176718646-74dfed1ec1b64d76acaf727c772c51f2.jpg)
Bust-Out Credit Card Fraud: Definition and Impact
:max_bytes(150000):strip_icc()/dispatcher_headset-665036244-5a73db780e23d90036d40abe.jpg)
Boiler Room Definition, How It Operates, C𒁏ommon Scaꩲms
:max_bytes(150000):strip_icc()/investing6-5bfc2b8ec9e77c005143f13b.jpg)
Gun-Jumping: What it is, How it Works, Prevention
:max_bytes(150000):strip_icc()/GettyImages-767986903-fbab09889833441ea339a37f8533aec0.jpg)
Financial Action Task Force (FATF): What it is,🍌 How it Works
:max_bytes(150000):strip_icc()/Lapping-33ab4d6c1d27438185892b4efc2c2804.jpg)
Lapping Scheme: How to Detect and Prevent
:max_bytes(150000):strip_icc()/investing9-5bfc2b8d46e0fb0051bddfee.jpg)
Disgorgement: What it is and how it Works
:max_bytes(150000):strip_icc()/GettyImages-501951293-2ec9f2f64fcb4de98d44c61b971cde2e.jpg)
Loophole
:max_bytes(150000):strip_icc()/businessman-in-handcuffs-103060159-54730dc90b40417e8d85a547e2f14ab6.jpg)
Financial Crimes Enforcement 💯Network (FinCEN) Overview
:max_bytes(150000):strip_icc()/GettyImages-56187602-2b2489150b3f4e2ba5a4f734256c2bdd.jpg)
Financial🐻 Foren💜sics: Meaning, Certification, Examples
:max_bytes(150000):strip_icc()/investing8-5bfc2b8d46e0fb005144dbe3.jpg)
Bribe: Meaning, Overview and Tax Treatment
:max_bytes(150000):strip_icc()/GettyImages-1487839236-15f9ca6e2d154f09b5a39d8e9fbb8369.jpg)
Caveat: What It Means, Types, and What It Means for 💦Investors
:max_bytes(150000):strip_icc()/aa014176-5bfc2b8bc9e77c002630643b.jpg)
Association of Certified Fraud Examiners: Overvi𒅌ew
:max_bytes(150000):strip_icc()/GettyImages-807266036-bb50732a471349598f46e5b3ba502c5c.jpg)
Accountant's Liability: What it Means, How it Works
:max_bytes(150000):strip_icc()/business-building-956363732-c01a3c5e0b034f9da56b1e9d20b89966.jpg)
Fraudulent Conveyance: What it is, How it Works
:max_bytes(150000):strip_icc()/104270020-5bfc396cc9e77c002634334e.jpg)
Financial Shenanigans: Wh🎐at It Means, How It Works
:max_bytes(150000):strip_icc()/computer-hacker-1081349274-f0cc3e1baa1d4047865b76b1a0062a7a.jpg)
Circular Trading: What it Means, How it Works
:max_bytes(150000):strip_icc()/GettyImages-1184142404-5409daf75d4742539d77b80cce3cf862.jpg)
Allen S🉐tanford: Who he𒊎 is, Backstory, Financial Impact
:max_bytes(150000):strip_icc()/Android-Malware-56a0191d5f9b58eba4aeee14.jpg)
Banker Trojan: What it Means, How it Works
:max_bytes(150000):strip_icc()/139085474-5bfc2b8d46e0fb0026016ee7.jpg)
Intermarket Su🌺rveillance Group: What It Me🐻ans, How It Works
:max_bytes(150000):strip_icc()/snake_oil_salesman-5856e4dd5f9b586e023c2a60.jpg)
Cheapjack: What It is, How It Works, History
:max_bytes(150000):strip_icc()/HalloweenGhost_Thinkstock_78022308-2--56a44d7a3df78cf77281a657.jpg)
Ghosting
:max_bytes(150000):strip_icc()/the-legend-of-leprechauns-leprechaun-drinking-beer-st-patrick-39-s-day-cartoon-245-16b9-5b3a691ac9e77c0037d36ef9.jpg)
Leprechaun Leader: What It Is, How I♏t Works, Examples
:max_bytes(150000):strip_icc()/gavel_court-56a9aa585f9b58b7d0fdc8d6.jpg)
Injunction Definition, Types, How to Obt🦋ain One, Example
:max_bytes(150000):strip_icc()/Enronomics_v2-7349f5b8245a410bb397e024a4674457.jpg)
Enronomics: What It Means and how It Works
:max_bytes(150000):strip_icc()/ginzytrading.asp-final-a5d9a7d8f0924ba6844faac3347afe79.jpg)
Ginzy Trading
:max_bytes(150000):strip_icc()/investing16-5bfc2b8fc9e77c00519aa657.jpg)
Expunge
:max_bytes(150000):strip_icc()/GettyImages-929912106-a6f0ee41e7f24abbb79b5df76a2bf0f3.jpg)
Click Fraud: Me♏aning, Identifying it, Elimi🌠nating it
:max_bytes(150000):strip_icc()/GettyImages-923167626-50f08026620d4428a6ee2a3d7faf98c5.jpg)
Affinity Fraud: What It is, How It Works, Example
:max_bytes(150000):strip_icc()/Corporatekleptocracy_final-8507f8c0a86244bf9d437bdf4211ff4f.png)
Corporate Kleptocracy
:max_bytes(150000):strip_icc()/debt-restructuring-fraud.asp-final-7d815e455c1c40a09c0a26161da6371c.png)
Debt Restructuring Fraud
:max_bytes(150000):strip_icc()/GettyImages-922359280-20d48711b9d6434083a5601d84a7e7de.jpg)
Global Recovery Rate: What It is, How It Works
:max_bytes(150000):strip_icc()/courthouse-courtroom-56a1654c3df78cf7726a69ab.jpg)
Barratry: What It Is, How It Works, Examples
:max_bytes(150000):strip_icc()/investing3-5bfc2b8e46e0fb0026016f32.jpg)
First To File Rule: What It Is, How It Works