2. Background
Crime
Yield
• Illegal disbursement or
dissemination of
business/corporate private
or confidential information
through MBA programs
• Pilfered Ideas
• Cheaper and easier means
to gain access to
competitor POC
• Provides vantage point to
competitor aspirants
3. Modus Operandi
Mechanics
Tools and Technologies
• Criminals and accessories to the crime use
MBA networks as means on collecting
internal private or confidential
information
• Perpetrators collect papers, reports,
assignments from MBA programs
• Often these papers or reports contain
confidential or private information that
should not be released to the public (but
students don't bother to get NDA thinking
that this is only for classroom activity)
• Perpetrators build a network of contacts
and use or sell the information
underground
• Internet (as headquarters and channel for
the activity)
• Email (public/free)
• Websites (underground/public/free)
• MBA classroom or online programs
• Term Papers, Assignments, etc
• Database of information
4. Appendix (other nominated crimes)
Centavo Heist
Big Value Zero
Description
• Cashiers, due to lack of pennies, etc, does
not give the exact change; when
transactions are amassed, the heist turns
into thousands or millions in amount
Description
• Employee pads a blank OR, or adds digits
to the OR amount and reimburses the
bogus amount to the company
Modus Operandi
• Companies encourage cashiers not to give
exact change by not providing sufficient
centavo coins
• Buyers forgo obtaining the exact change,
and the transactions get done
• Companies earn from the accumulated
centavo coins
• In financial reports, the heist is not
reflected, and taxes are not paid
Modus Operandi
• The crime is done in cahoots with teller or
cashiers, or the like
• This crime is effective with maximum
benefit and lower risks when done in small
amounts, and in multi-transactions that
unsuspecting employers hardly notice