Glossary of Terms

  • Asset Recovery: The process of reclaiming assets that have been stolen or misappropriated, typically through legal means.
  • Blockchain Tracing: A method used in crypto scam recovery that involves tracking transactions recorded on the blockchain to locate lost or stolen digital assets.
  • Business Email Compromise (BEC): A type of scam where an attacker gains access to a corporate email account and impersonates the owner to defraud the company, its employees, customers, or partners.
  • Crypto Scam: A fraudulent scheme involving cryptocurrencies, such as fake ICOs, Ponzi schemes disguised as crypto investments, or phishing attacks targeting digital wallets.
  • Due Diligence: An investigation or exercise of care that a reasonable business or person is expected to take before entering into an agreement or transaction with another party.
  • Forensic Analysis: The application of scientific methods and techniques to investigate financial fraud and gather evidence that can be used in court.
  • ICO (Initial Coin Offering): A fundraising mechanism in which new projects sell their underlying crypto tokens in exchange for bitcoin and ether.
  • Identity Theft: A type of fraud that involves using someone else’s identity to gain a financial advantage or obtain credit and other benefits in that person’s name.
  • Investment Scam: A fraudulent scheme that promises significant returns on investments with little or no risk.
  • Phishing: A type of fraud that involves tricking individuals into giving sensitive information like usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • Ponzi Scheme: An investment fraud that pays existing investors with funds collected from new investors, often promising high rates of return with little risk.
  • Real Estate Wire Fraud: A scam in which a fraudster poses as a real estate professional or title company representative to divert mortgage closing funds into a different account.
  • Romance Scam: A type of fraud where the perpetrator adopts a fake online identity to gain a victim’s affection and trust, with the aim of using the feeling of affection to extort money from the victim.
  • Wire Fraud: A type of fraud that involves using electronic communications or transactions to deceive and defraud victims, often involving the transfer of funds.
  • Advance Fee Fraud: A scam where victims are persuaded to advance sums of money in the hope of realizing a significantly larger gain.
  •  
  • Asset Tracing: The process of identifying, locating, and recovering assets that have been stolen or improperly disposed of.
  • Cyber Fraud: Deceptive and illegal activities perpetrated using the internet, computers, or digital data.
  • Debt Recovery: The process of pursuing payments of debts owed by individuals or businesses.
  • Digital Forensics: The recovery and investigation of material found in digital devices, often used in the context of cybercrimes.
  • Due Diligence Report: A comprehensive appraisal of a business undertaken by a prospective buyer, particularly to establish its assets and liabilities and evaluate its commercial potential.
  • Encryption: The process of converting information or data into a code, especially to prevent unauthorized access.
  • Financial Forensics: The use of forensic accounting techniques to investigate financial fraud or to trace funds for asset recovery.
  • Foreclosure Scams: Fraudulent schemes targeting homeowners struggling with mortgage payments, often promising to prevent foreclosure for a fee.
  • Fraud Analysis: The process of examining financial transactions and records to detect instances of fraud.
  • HUMINT (Human Intelligence): Intelligence gathered by means of interpersonal contact, as opposed to the more technical intelligence gathering disciplines.
  • Identity Verification: The process of ensuring that a person is who they claim to be, often used in financial transactions to prevent fraud.
  • Intellectual Property Fraud: Illegal activities involving the theft or misuse of patents, copyrights, trademarks, or other forms of intellectual property.
  • Investigation: The act of conducting an official inquiry or systematic examination to discover and examine facts so as to establish the truth.
  • Money Laundering: The process of concealing the origins of money obtained illegally by passing it through a complex sequence of banking transfers or commercial transactions.
  • OSINT (Open Source Intelligence): Intelligence collected from publicly available sources.
  • Recovery Agent: A professional skilled in the retrieval of assets that have been misappropriated or stolen.
  • Risk Assessment: The identification and analysis of relevant risks to achieving objectives, forming a basis for determining how the risks should be managed.
  • Social Engineering: Psychological manipulation of people into performing actions or divulging confidential information, often used in phishing scams.

Spoofing: The act of disguising communication from an unknown source as being from a known, trusted source, often used in email scams.