Term
|
Definition
property is purchased and falsely appraised at a high value and then quickly sold. |
|
|
Term
|
Definition
the buyer of a property borrows the down payment from the seller throught he issuance of a non-disclosed 2nd mortgage. |
|
|
Term
Nominee Loans/ Straw Buyers |
|
Definition
the identity of the borrower is consealed through the use of a nominee who allows the borrower to use his name and credit history to apply |
|
|
Term
Fictitious/ Stolen Identity |
|
Definition
applicant's name, personal info, and credit history can be used without true person's knowledge |
|
|
Term
|
Definition
an appraiser acts in collusion with the borrower and provides a misleading apprasisal report to the lender. |
|
|
Term
|
Definition
Perpetrator identifies homeowners who are at risk of losing their home and misleads them into believing that they can save their homes by transferring the deed and up-front fees. |
|
|
Term
|
Definition
An investor may use a straw buyer, false income docs, and false credit reports to obtain a loan in the straw buyer's name. Subsequent to closing, the straw buyer signs the property over to the investor in a quitclaim deed which relinquishes all rights to the property and provides no guaranty on title. the investor does not make any mortgage payments and rents the property until foreclosure takes plave several months later. |
|
|
Term
|
Definition
the illegalpractce of stealing personal indentifying information such as SSN in order to create a fictional person;
not in true name making it harder to detect |
|
|
Term
|
Definition
The surreptitious stealing of credit and debit info to be used to make illegal purchases on the victim's accounts. |
|
|
Term
|
Definition
method of recording and capturing computer keystrokes in order to obtain passwords or encryption keys to bypass security measures |
|
|
Term
|
Definition
The illegal practice of obtaining personal info through email companies. Sends out valid emails asking for personal info; this info is colected and sold or used directly to access the account info |
|
|
Term
|
Definition
the practice of bypassing the security machanisms of a network or information system to gain unauthorized access to personal info |
|
|
Term
|
Definition
A large scale process of collecting large numbers of a computer's info by poisoning a domain name system. |
|
|
Term
|
Definition
any technology that assists in gathering of personal info about a person without their knowledge
Unknowingly installed in a computer as a software virus or sometimes as a result of installing a new program to secretly gather info about the user. |
|
|
Term
|
Definition
The illegal practice of stealing credit card info off the magnetic strip through the use of a handhelf device that scans, steals, and stores the data. |
|
|
Term
|
Definition
The process if intercepting wireles transmissions of credit card transmissions at te point of sale at retail stores, gas stations, ect |
|
|