Chapter 13 - Property Crimes Flashcards

(35 cards)

1
Q

Property crimes are committed for the _____ ______ of the perpetrator.

A

personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In most jurisdictions today, conviction for burglary requires only ______ basic essential elements.

A

three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In most jurisdictions today, conviction for burglary requires only three basic or essential elements:
1.
2.
3.

A

entry, of a building, structure, place, thing described by penal code, with intent to steal or commit other felony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

burglary is a crime of ________, easy _________.

A

opportunity, opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Burglary is usually a _____ crime in that the burglar normally tires to avoid contact with victims.

A

passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two general types of burglars?

A

professional and amateur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

______ ______ are defined as those persons who work at burglary as a trade, making their living by burglary and larceny alone and having no other means of income.

A

professional burglars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The _______ ______ includes the burglar who commits crimes primarily to secure money for drugs.

A

amateur burglars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The new typology of burglars describes a burglar as being in one of the following categories:
1.
2.
3.

A

unskilled, semiskilled, professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The five step behavior cycle in burglary is as follows:
1.
2.
3.
4.
5.
A

needs, opportunities, means (skills), satisfaction, choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The burglary scene investigation has three major phases:
1.
2.
3.

A

the means of gaining entry, what the burglar did while on the premises, how the burglar exited the premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Theft cases are difficult to solve because of the ____ of _________.

A

lack of eyewitnesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modus operandi searches are rewarding in theft investigations because thieves are known as ______ ______ ______.

A

single pattern offenders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The key to an early break in property crimes investigation is the ________ ______ _______ search to include the decision making processes exhibited by the criminal in his or her operations.

A

expanded modus operandi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The real success in stealing is not the completion of the crime itself ______ ___ ____ __ ___ ___ ___ __ ____ _____ - without leaving the trace that so often identifies the perpetrators of these crimes.

A

but the disposal of the stolen property at a profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ______ or _______ technique is an investigative technique in property crimes aimed at the wholesale identification and apprehension of thieves.

A

storefront or “sting”

17
Q

_______ usually attack parked cars, taking a variety of parts readily disposed of on the local black market.

18
Q

________ steal a car , tow or drive it to a chop shop, and have it cut up for most of its parts.

19
Q

A parked car can be stripped in place in less than ___ ____, and dismantlers can chop up a car, dispose of the leftover body, and move the parts to be sold to another location within ___ ____ or so.

A

an hour, an hour

20
Q

________ is the armed robbery of a person in possession of an automobile or other motor vehicle.

21
Q
An auto theft investigation has the following stages:
1. 
2.
3.
4.
5.
A

preliminary investigation, alarm, recovery, continuing investigation, case preparation

22
Q

______ is the term businesses use for the loss of inventory from employee theft.

23
Q

Generally, employee theft falls within three categories:
1.
2.
3.

A

incidental, situational and continual

24
Q

Cargo thieves can steal any product, but the most popular targets are shipments of _______, ________, _______ and ________.

A

pharmaceuticals, consumer electronics, clothing and food

25
________ is a nonviolent crime involving elements of intentional deceit, concealment, corruption, misrepresentation, and abuse of trust to gain the property of another, and it is often facilitated by the willing cooperation of unaware or knowing victims.
fraud
26
``` Investigators must seek four common objectives of fraud: 1. 2. 3. 4. ```
criminal intent (mens rea), wrongful objective (deprive the owner of true property), disguise or concealment of objective (wrongful), reliance on the victim's cupidity, carelessness, or compassion
27
Some of the more common con games are: 1. 2. 3.
pigeon drop, payoff, and carnival bunco
28
_______ ______ _____ is an ego-building swindle based on the hidden desire of many people to serve as a secret agent for the police.
bank examiner fraud
29
________ and _______ _______ are marketplace swindles in which the buyer or investor is defrauded by the swindler's misrepresentations
consumer and business frauds
30
Common consumer frauds include these: 1. 2. 3.
bait and switch, repair fraud, misrepresentation
31
The _____ ____ or _____ is the base of all investment frauds.
ponzi scheme or kiting
32
In a _______ ______ the swindler uses money invested by new victims to pay a high interest on the investments of earlier victims - whose money the swindler has appropriated to his or her own use, rather than investing it as claimed in the sales pitch given the victim.
ponzi scheme
33
______ _______ are based on promises to victims of rapid capital growth and a high and quick rate of returns in dividends, as well as special advantages such as tax shelters.
securities frauds
34
Major frauds in the workplace are ______ or _______ frauds
computer or embezzlement
35
________ is the conversion of another's property over which the thief has custody or control.
embezzlement