Purchase Order Fraud In Nigeria

Good Essays
charged, it will include Purchase Order Fraud, which is a federal crime (FBI, 2014). The consequences for that in The United States can be incarceration, fines, probation, or a combination of all three (Fichtelberg, 2008). This crime can be charged by the International Criminal Court. There is no jury at the International Criminal Court. A panel, made up of three judges, will decide if the defendant is guilty and what the punishment will be. They also have the ability to sentence them to imprisonment for a specific term up to thirty years. The panel can also order them to make reimbursements to the victims, and impose fines (ICC, 2016).
• International Agencies and Law
• Nigeria passed a law on June 4, 2015, called the Nigeria Cybercrime
…show more content…
The first step for any victims is to notify your local law enforcement agency to let them know what has happened and they will help determine what other agencies need to be notified. The victim or any third party can report the crime online to the Internet Complaint Center 3. The Internet Complaint Center will take all the information about the crime for the FBI. The FBI will conduct the investigation and contact other agencies, such as The Computer Crime and Intellectual Property Section, as needed for additional assistance. The Computer Crime and Intellectual Property Section works with international agencies to detect computer crimes. The Domestic Security Alliance Council, along with The Department of Homeland Security, can only function in The United States to get the word out to other citizens and businesses about cyber crimes to help stop them from becoming victims. The local law enforcement agency is limited by only being able to take a report and forward the information to the proper agency. The Internet Complaint Center 3 is limited to only receiving a report of the offense and storing the information to be retrieved by the FBI. The FBI is limited in jurisdiction within the United States, and then is dependent on the agencies within Nigeria (FBI, 2014). LEA is made up from the local law enforcement agencies in Nigeria. They work with The FBI to help capture cyber crime criminals within Nigeria. Because the crimes were done to companies and citizens of The United States, Nigeria will arrest and detain criminals and allow them to be extradited to The U.S. (Nigeria Government, 2015).
• Any Nigerian who is arrested will be extradited back to The United States where they will be charged with the crime of purchase order fraud, prosecuted, and punished all according

Related Documents

  • Decent Essays

    Crime Technology

    • 1448 Words
    • 6 Pages

    The government needs to develop better methods of surveying the online activities of known criminals. In addition, they should train officers to understand the new technology. The government should have access to the best and newest technology to ensure that it is prepared for the next wave of crime. Criminals are always finding ways to adapt to the new technologies and keep their criminal activities hidden. There should also be communication between the country the product is being purchased in and the country the product is coming from.…

    • 1448 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Forensic Analyst

    • 1169 Words
    • 5 Pages

    Mainly the analyst does the following: “Protect against criminals, strengthen the security and resilience of cyber space, securing federal networks, report data from a variety of sources to produce reports, and threat/ risk assessments” (Cyber Security Education 5). If a Cyber Analyst works for law enforcement, the focus mainly surrounds the investigation of criminal and illegal activity. Detective Gunter explains that when a device is received, it must go through a series of investigative tools to decipher the information it contains. For example, when working on a well known murder case, Detective Gunter was able to obtain text messages that linked the individual to the murder (Gunter). The law enforcement analysts also work on computer hard drives to obtain information as it relates to child abuse and stalking.…

    • 1169 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    If the citizen has lied on the application about past incriminations, the citizen is turned down immediately and the case is given over to the ATF. The ATF is an acronym that stands for the Bureau of Alcohol, Tobacco, Firearms and Explosives. The ATF protects communities from violent criminals, criminal organizations, and the illegal use and trafficking of firearms (Bureau). Once the case is turned over to the ATF, the bureau is supposed to investigate these citizens and prosecute accordingly. The problem with this is the ATF is only prosecuting 1.1 percent of these citizens that are trying to purchase guns illegally (Kertscher).…

    • 1236 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    This information can be shared across local, state and federal levels. We showed how the National Crime Information Center (NCIC) has data input at a local level, but it is a national database that allows any agency to obtain information about a prior criminal, missing persons, stolen property, etc. We then reviewed how the Regional Information Sharing Systems Program (RISS), Financial Crime Enforcement Network (FinCEN), National Drug Pointer Index (NDPIX), and National Tracing Center are all beneficial for sharing data amongst local and federal agencies. Lastly, we determined that the reason for the arrest of Uncle Bob in our mock scenario was due to the fact that he was wanted for a…

    • 1290 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Wilcomic County, Maryland had a law call the Maryland DNA Collection Act. This act authorizes law enforcement officer to collect DNA samples from a person who is arrested, but not yet convicted, for violent crimes or burglary, (2008). Mr. King DNA was unloaded into the database that linked him to a rape case in 2003. Since this were the only evidence that link him he wanted the judge to suppress the evidence. This became the main…

    • 1082 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Stated in the book CJ in the USA: An Introduction to Criminal Justice “The courts are just one component of the overall criminal justice system. The function of the courts is to judge and make proper disposition of crimes, it is in this venue that the guilt or innocence of a defendant is determined”(Byrum,2014). Key players important to the court system are prosecution, defense, judge, and the jury. To start off the prosecutor works with police by reviewing evidence, and preparing a search warrant. They then prepare the arrest warrant based on information gathered by law enforcement.…

    • 1262 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Indradhwaja Case Study

    • 887 Words
    • 4 Pages

    FIR No. 219/1998 was investigated by the State Police of Hansa and chargesheet was filed against 7 persons including Rimpo and Hardo. They were charged with offences under the Arms Act, Explosive Substances Act and IPC for various offences planning, abetting, conspiring and the murder of 3000 innocent persons. The trial court sentenced all to life imprisonment. The High Court disallowed the cross appeals filed by the state and the convicts.…

    • 887 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Rhetorical Analysis: How Do The Elements Work? What elements make a good document or webpage that could get people's attention? It is all about how effectively that piece of writing uses the rhetorical appeals - which are ethos, pathos, and logos. The Federal Bureau of Investigation's (FBI's) webpage about Cyber Crime to see how the rhetorical appeals work within different writings. The webpage comes from the FBI themselves and they wrote this webpage to tell about what is Cyber Crime and how it can affect many people.…

    • 869 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    That is to say to go after gangs and drug dealers. And those selling illegally particular kind of matter; Social media helped the government to catch those who have the ability with the terror act and threats the government and the community, and those who approach to young girls and try to rap them through social media websites. Thanks to GPS (Global Positioning system); it helped the authorities to catch the villains. And trace them through social media .In the mean time the only way to shut down the illegal activities on social media websites are reporting them to the authorities of the website. or reported to the police officers ,and let them handle it .to do so in order to feel safe ( Sharif.M.H and Troshani.I and Davidson,R,2015).As also big companies need to have security and safe from frauds and those who might hack their websites .…

    • 1934 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    As for the conspiracies, law enforcement officers are able to utilized a full range of techniques such as camera surveillance to track down sellers and buyers. Once the buyers and sellers are caught and arrested, the charges made for each will be different as for the sentence. Additionally, they will be charged with criminal drug conspiracy with a 6 years sentence or 3 years after good time and parole. According to the Police Crime Control Strategies, “90 percent of sale cases ended in pleas.” In relation to the Street Corner Conspiracies, the Reverse Narcotics Sale Stings is a technique that police officer utilizes after the seller is arrested. What happens here is that police officer will substitute as the seller for one day in order to catch buyers.…

    • 807 Words
    • 4 Pages
    Decent Essays