Skip to Main Content

CRJU: Criminal Law Online

A course guide of open education resources for faculty teaching Criminal Law.

Overview and Objectives

Module Overview

In this module, we examine state and federal criminal law statutes that punish various white collar crimes, which typically do not involve violence or force.

Learning Objectives

In this module, we will cover white collar crimes such as:

  1. Environment Crimes (Clean Water/Air Statutes)
  2. Fraud (Mail, Wire Securities, Computer/Internet, Healthcare/Insurance)
  3. Money Laundering
  4. Identity Theft
  5. Tax Evasion

Readings and Lectures

White Collar Crime (click on each offense in the list)

White Collar Crime - FBI

Antitrust Laws

Lecture: White Collar Crimes and Criminal Liability (11:14)

Lecture: White Collar Crime (This link provides a good overview of white collar crime. Please watch all 5 modules (1 - Fraud, 2 - Money Laundering, 3 - False Statements, Perjury, 4 - Obstruction of Justice, Witness Tampering, Bribery, 5 - RICO Statutes)

Case Examples

The Man Who Stole $65 Billion (Bernie Madoff). Bernie Madoff, once one of the greatest financial minds and chairman of the Nasdaq, to the biggest ponzi scheme the world had ever seen. It's a wild ride.

Films on Demand - Getting Off Easy: White Collar Crime (40:29) 
(Available free via library subscription. Login with campus ID and password.

RICO Statute Used in APS Cheating Scandal 
When the state brought racketeering charges against Atlanta Public Schools employees in the test-cheating scandal, criminal defense attorneys called it overkill. Teachers, principals … racketeers?


Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC. Mikhail Sosonkin, who works for cybersecurity start-up Synack, showed CNBC firsthand how easy it is to break into a computer.

Real Future: What Happens When You Dare Expert Hackers To Hack You. Last year, after reporting on the hacks of Sony Pictures, JPMorgan Chase, Ashley Madison, and other major companies, REAL FUTURE's Kevin Roose got curious about what it felt like to be on the victim’s side of a giant data breach. So he decided to stage an experiment: he invited two expert hackers (neither of whom he’d ever met) to spend two weeks hacking him as deeply and thoroughly as they could, using all of the tools at their disposal.