enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Embezzlement - Wikipedia

    en.wikipedia.org/wiki/Embezzlement

    An example of conversion is when a person logs checks in a check register or transaction log as being used for one specific purpose and then explicitly uses the funds from the checking account for another and completely different purpose. [3] When embezzlement occurs as a form of theft, distinguishing between embezzlement and larceny can be ...

  3. Extortion - Wikipedia

    en.wikipedia.org/wiki/Extortion

    Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence ; the bulk of this article deals with such cases.

  4. Texas Penal Code - Wikipedia

    en.wikipedia.org/wiki/Texas_Penal_Code

    The first codification of Texas criminal law was the Texas Penal Code of 1856. Prior to 1856, criminal law in Texas was governed by the common law, with the exception of a few penal statutes. [3] In 1854, the fifth Legislature passed an act requiring the Governor to appoint a commission to codify the civil and criminal laws of Texas.

  5. Corruption in local government - Wikipedia

    en.wikipedia.org/wiki/Corruption_in_local_government

    Forms of corruption pertaining to money like bribery, extortion, embezzlement, and graft are found in local government systems. Other forms of political corruption are nepotism and patronage systems. One historical example was the Black Horse Cavalry, a group of New York state legislators accused of blackmailing corporations.

  6. Federal prosecution of public corruption in the United States

    en.wikipedia.org/wiki/Federal_prosecution_of...

    The Crimes Act of 1825 added the offenses of extortion under color of office, theft or embezzlement by a Second Bank employee, and coin embezzlement or dilution by a Mint employee. [ 7 ] The mail fraud statute, 18 U.S.C. § 1341, "[t]he oldest statute used to address public corruption," was enacted in 1872 and first used against public ...

  7. Predicate crime - Wikipedia

    en.wikipedia.org/wiki/Predicate_Crime

    For example, to violate the Racketeer Influenced and Corrupt Organization Act (RICO), a person must "engage in a pattern of racketeering activity", and in particular, must have committed at least two predicate crimes within 10 years. [2] These include bribery, blackmail, extortion, fraud, theft, money laundering, counterfeiting, and illegal ...

  8. What is extortion? - AOL

    www.aol.com/news/extortion-210813975.html

    Extortion is the act of threatening someone or using force against that person in order to obtain something.

  9. Economics of corruption - Wikipedia

    en.wikipedia.org/wiki/Economics_of_Corruption

    Additionally, the University of Rochester offers a course related to the history of economic corruption. One of the course outlines is given below. The course is offered by New Economic School, an institution in Russia. [55] The course includes 14 lectures, the themes of which are as follows. 1. Corruption as an economic, social and political ...