Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780415996112 | 0415996112
- Cover: Paperback
- Copyright: 2/23/2009
Hank J. Brightman is Associate Research Professor in the War Gaming Department of the United States Naval War College. He served as an Associate Professor and Chair of the Criminal Justice Department at Saint Peter's College from 2000-2008. He also spent 15 years in a variety of law enforcement, investigative, and intelligence analysis positions with the U.S. Department of the Interior, the United States Secret Service and the United States Navy.
List of Exhibits | p. xv |
Series Foreword | p. xix |
Acknowledgements | p. xxi |
Today's White-Collar Crime | p. 1 |
What is mite-Collar Crime? | p. 2 |
Why Does White-Collar Crime Matter? | p. 3 |
Challenges for Law Enforcement: Do You Have What It Takes to Answer the Call? | p. 5 |
What Do We Mean by "Today's White-Collar Crime?" | p. 6 |
Why Read This Book? | p. 8 |
Chapter Summary | p. 10 |
Terrorists' Links to Commercial Fraud in the United States | p. 10 |
Katrina Fraud Swamps System | p. 13 |
Thinking Activities | p. 15 |
Information Technology and White-Collar Crime | p. 17 |
A Brief History of the Role of Information Technology in White-Collar Crimes | p. 18 |
Computer-Based Crime: A Cause for Alarm? | p. 20 |
Currency Counterfeiting: From "Raised" Notes to Inkjet Printing | p. 22 |
Hacking and Cracking | p. 25 |
Identity Theft: The Future Is Now | p. 27 |
Chapter Summary | p. 29 |
A Look at Crime in the Age of Technology | p. 30 |
The Scam That Will Not Die | p. 33 |
Thinking Activities | p. 39 |
The Corporate-State Corruption Connection: Can It Be Stopped? | p. 41 |
The Honorable Thomas E. White: Modern-Day Horatio Alger or Opportunist? | p. 42 |
If All Politics are Local: Can the Same Can Be Said for Abuse of Office Crimes? | p. 46 |
Marty Barnes: A Case Study in Egoism and Egregious Behavior | p. 48 |
Teapot Dome and Enron: Back to the Future? | p. 49 |
Nepotism: Personal Connections Over Professional Qualifications? | p. 52 |
Misuse of Government Equipment and Supplies | p. 54 |
Bribery | p. 56 |
Chapter Summary | p. 58 |
Disaster Profiteering: The Flood of Crony Contracting Following Hurricane Katrina | p. 58 |
Meet the War Profiteers | p. 65 |
Thinking Activities | p. 75 |
The Origins of Public Corruption Control in the United States, 1883-1969 | p. 77 |
Democracy and Corruption | p. 77 |
Corruption Control: A Call to Action | p. 80 |
Roots of the "Scientific Era" of Corruption Control | p. 86 |
The Scientific Administration Model: Systematic Evaluation | p. 88 |
A Scientific Model at Work: The "Beautiful Minds" of Co-Conspirators | p. 89 |
Challenges of the Scientific Administration Model | p. 91 |
Chapter Summary | p. 92 |
FELLOWship of the Ring | p. 92 |
The Scandal of George Scalise: A Case Study in the Rise of Labor Racketeering in the 1930s | p. 98 |
Thinking Activities | p. 124 |
The "Modern Era" of Public Corruption Control: The 1970s Through Today | p. 126 |
Nixon: From Corruption Controller to Investigative Target | p. 127 |
The All Encompassing Vision of Corruption Control | p. 128 |
Jimmy Carter: The First All Encompassing President | p. 131 |
The Inspector General Program | p. 131 |
The Reagan-Bush I Years: The Doldrums of Corruption Control | p. 135 |
Clinton, Reinventing Government, and the Future of Corruption Control | p. 137 |
The G.W. Bush Administration's Strategy for Corruption Control | p. 139 |
Chapter Summary | p. 140 |
Mediated Corruption: The Case of the Keating Five | p. 141 |
How Many More Mike Browns Are Out There? | p. 166 |
Thinking Activities | p. 176 |
White-Collar Crime Theory: Origins and Early Developments | p. 177 |
Introduction | p. 177 |
White-Collar Crimes throughout History | p. 177 |
Should We Simply Call It "Greedy" Crime? A Look at Conspicuous Consumption and Strain Theory | p. 179 |
Sutherland, Differential Association and White-Collar Crime | p. 181 |
Tappan's Response to Sutherland | p. 183 |
White-Collar Criminality: Motivations and Offender Rationalization | p. 184 |
Blacklisting and the Doldrums of White-Collar Crime Research | p. 186 |
Feminist Theory and the Role of Women in White-Collar Crime | p. 186 |
Chapter Summary | p. 187 |
The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association | p. 188 |
Running after the Joneses | p. 204 |
Thinking Activities | p. 207 |
Organizational Crime and Corporate Criminal Liabilities | p. 209 |
The "Democracy" of White-Collar Crime | p. 210 |
Corporate Crime and Changes in the Research Agenda | p. 211 |
The Shift Towards Organizational Crime Research | p. 212 |
CSI and Organizational Crime | p. 213 |
Ten Steps to Reduce Organizational Crime | p. 216 |
Elite Organizational Deviance and Corporate America: Environmental Examples | p. 217 |
Curtailing Corporate Crime: A Self-Regulating Approach | p. 220 |
Sarbanes-Oxley: Antidote or Catalyst to Corporate Criminal Liability? | p. 222 |
The Case of Big Pharma: Should We Consider a Sarbanes-Oxley Approach? | p. 225 |
White-Collar Crime: Other Perspectives | p. 227 |
Chapter Summary | p. 230 |
The Dialectics of White-Collar Crime: The Anatomy of the Savings and Loan Crisis and the Case of Silverado Banking, Savings and Loan Association | p. 231 |
Corporations, Workers, and the Public Interest | p. 251 |
Thinking Activities | p. 261 |
White-Collar Crime: A Legalistic Perspective | p. 263 |
The Development of White-Collar Criminal Law | p. 263 |
Differing Burdens of Proof: White-Collar Criminal and Civil Cases | p. 265 |
Underpinnings of the American Legal System: The Need for Training and Education | p. 265 |
Search and Arrest Warrants: The Workhorses of White-Collar Crime Investigations | p. 267 |
Exceptions to the Search/Seizure Warrant Requirement | p. 271 |
Arrest Warrants | p. 273 |
Other Important Paperwork for the White-Collar Crime Investigator | p. 274 |
White-Collar Criminal Statutes: A Primer | p. 276 |
The Challenge of Proving Money Laundering | p. 284 |
Asset Forfeiture: Boon to Law Enforcement or Fourth Amendment Nightmare? | p. 285 |
Chapter Summary | p. 290 |
Terrorism's Money Trail | p. 291 |
An Unholy Trinity: The Three Ways Employees Embezzle Cash | p. 304 |
Thinking Activities | p. 309 |
White-Collar Crime Analysis and Trends | p. 310 |
Intelligence Analysts; Who Are They? | p. 311 |
The Integrity of the Analyst | p. 313 |
Types of Law Enforcement Intelligence | p. 314 |
Using Intelligence Analysis for Threat Assessment | p. 321 |
Chapter Summary | p. 328 |
How to Make a Spy | p. 328 |
Applying Heuer's Analysis of Competing Hypotheses (ACH) in the Law Enforcement Intelligence Environment | p. 332 |
Thinking Activities | p. 344 |
Where Do We Go From Here? The Future of White-Collar Crime | p. 346 |
Trends and Patterns in White-Collar Crime | p. 347 |
Recommendations for Social Change | p. 352 |
Chapter Summary | p. 355 |
Illicit Cigarette Trafficking and the Funding of Terrorism | p. 355 |
Corporate Crime after 2000: A New Law Enforcement Challenge or Déjà Yu? | p. 363 |
Thinking Activities | p. 387 |
Notes | p. 389 |
Credits | p. 397 |
Bibliography | p. 399 |
Index | p. 413 |
Table of Contents provided by Ingram. All Rights Reserved. |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.