Chapter 14 Flashcards

(89 cards)

0
Q

As a rule after the burglar is inside the structure __________need be committed for the legal elements of the crime to be met.

A

no additional felony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

The UCR uses three classifications of burglary forcible entry, ______________ and attempted forcible entry.

A

unlawful entry or no force used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some burglaries occur at night typically between __________.

A

7pm and 12pm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Although burglaries of multi family homes are the most numerous, _____________ are at a higher risk.

A

single family houses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Burglary rates are the highest in _______ and the lowest in February.

A

August

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Burglaries most often strike on weekdays from 10am-11am and from _______.

A

1-3pm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Burglars select targets based on a number of key factors:

A
  1. familiarity w/target and convenience of location
  2. Occupancy
  3. Visibility and surveillability
  4. Accessibility
  5. Vulnerability or security
  6. Potential rewards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Few burglars keep the goods they steal, they typically dispose of stolen property within _____usually after stashing it in a semi public location.

A

24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Might travel a broad geographical area in search for stealing. Many such persons resort to more personal contact with victims such as purse snatching muggings or even robbery. Is sometimes armed and can pose a serious threat to communities in which he/she operates

A

Amateur burglar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Burglary is when a person knowingly _________ in a building or structure belonging to another for the purpose of committing a crime therein.

A

breaks or remains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Commonly relies on the expert use of tools, typically drive trucks or vans which conceal and transport their tools. Great deal of time in planning to avoid detection

A

Professional burglar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As a rule on burglary calls the first officer to receive the call will assume responsibility for ________ of assisting officers

A

placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a person who buys and sells stolen property with criminal intent

A

Fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

May operate from an otherwise legitimate business such as a pawnshop or used furniture store

A

Professional fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A category of untraceable goods, such as tools, liquor, and clothing that are indistinguishable from others like them

A

Fungible goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anything stolen valued under $200

A

simple larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Takes and carries away the personal property of another without consent and with intent to steal

A

Larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Frauds lasted an average of _____ before being detected

A

18 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The schemes themselves violate Nigerian criminal code

A

Nigerian letter or “419” fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The use of fictitious checks drawn on a nonexistent firm or person consists of drawing cash in accounts made up of uncollected funds.

A

Check kiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Low profile crime that typically consists of employees of organizations stealing large amounts of money over a long period of time. It can be described as a fraudulent appropriation of property by a person to whom that property has been entrusted.

A

Embezzlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The element of _____ is critical in establishing the crime of embezzlement

A

trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Embezzlers usually prefer to steal _____ because it is both difficult to trace and easy to conceal

A

cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Stealing of merchandise by a company’s employees. Many companies consider this shrinkage, an unexplained loss

A

Pilferage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
__________ have experience with stolen credit cards are careful to purchase items under the designated limit typically $50-100
Plastic workers
25
An ___________steals merchandise for his or her own use
Amateur shoplifter
26
The professional often works in groups of _______ and often victimizes several shopping areas at a time.
three or four
27
Sometimes called _________ professional shoplifters resell stolen merchandise to pawnshops or fences.
Boosters or heels
28
Most shoplifters are amateur pilferers called ______ usually do not perceive themselves as thieves are systematic shoplifters who steak merchandise for their own use
Snitches
29
Shoplifting can be investigated in two ways:
1. Reactive-interview of witnesses | 2. Proactive-shoplifter caught in the act by in house security
30
Retailers are concerned about gangs that have established supply chains that make organized theft know as ________.
"Boosting"
31
Is a special kind of larceny which involves obtaining credit, merchandise, or services by fraudulent personal representation.
Identity theft
32
Identity theft became a federal crime in 1998 with the passage of the ______________. Under this act the FTC is empowered to act as a nationwide clearinghouse for information related to ID theft crimes
Identity theft and Assumption Deterrence Act
33
The law makes identity theft a crime whenever anyone _______________ without lawful authority a means of identification of another person with the intent to commit aid or abet any unlawful activity that constitutes a violation of federal law or felony under any applicable state or local law
knowingly transfers or uses
34
As the use of technology to store and transmit information ________ so too will identity theft
increases
35
The average age of identity theft victims was ______ and the most commonly reported age was 33 years.
42 years
36
The greatest number of identity theft complaints came from California, New York, Texas and ________.
Florida
37
The ______ mandate is to prohibit unfair or deceptive acts or practices and to promote vigorous competition in the marketplace. The act also gives jurisdiction over cross border consumer transactions (central database)
FTC
38
Those who commit identity theft are generally after __________ information that can be used for monetary gain.
Personal and confidential
39
A practice whereby the thief positions himself near a victim to obtain personal information by overhearing the victim or seeing the victims actions. (May listen to telephone conversation)
Shoulder surfing
40
Electronic lifting of data encoded on a valid credit or ATM card and transferring that data to a counterfeit card
Skimming
41
A proper investigative response to ID theft will include:
1. Develop a standardized procedure for taking reports 2. Initiate criminal investigations of ID reports 3. Prosecute violators 4. Cooperate with other agencies 5. Assist victims by providing helpful info
42
UCR defines motor vehicle as a ___________ vehicle that runs on the ground and not on rails, includes automobiles motorcycles bicycles trucks motor scooters buses and snowmobiles
self propelled
43
A non profit insurance organization committing to combating vehicle theft and insurance fraud
National insurance crime bureau (NICB)
44
2010 national top 10 vehicles stolen:
1. Honda Accord (94) 2. Honda civic (95) 3. Toyota Camry (91) 4. Chevrolet pickup full size (99) 5. Ford f150 (97) 6. Dodge ram (04) 7. Dodge caravan (00) 8. Acura integra (94) 9. Ford explorer (02) 10. Ford Taurus (99)
45
Individual car components in high demand are _____________ which are often stolen for illegal export to central and South America or Europe
"Tuners" or "street racers"
46
Top 10 metro areas w/ highest auto theft rates:
1. Modesto California 2. Bakersfield-Delano California 3. Spokane Washington 4. Vallejo-Fairfield California 5. Sacramento/Arden-arcade/Roseville California 6. Stockton California 7. Visalia porter California 8. San Francisco/Oakland/Fremont California 9. Yakima Washington
47
Motivations for auto theft:
1. Joyriding- premier motivation for auto theft, primarily juv offenders 2. Theft for resale 3. Transportation for other crimes 4. Stripping and chop shop operations
48
Where stolen vehicles are disposed off, typically a private garage in an unpopulated residential area of town
Stripping operations
49
Involve larger garages and deal in larger quantities of goods. Can house both stolen vehicle and the tin truck inside building. Remove any identifying numbers from the remains of vehicles left behind after the valued parts have been removed
Chop shops
50
The auto parts transport vehicle
Tin truck
51
Vehicle owner lies about the theft of his vehicle and orchestrates its destruction to collect insurance money
Owner give ups
52
Owners who's vehicle need extensive repair will report vehicle stolen and hide it for 30 days, long enough for insurance company to settle claim
30 day specials
53
Owner obtains an insurance policy then reports it stolen, after it is legally shipped overseas to be sold on the black market. Owner then collects insurance proceeds and oversea profits
Export fraud
54
Creates a phony title or registration to secure insurance on a non existent vehicle. Reports vehicle stolen before filing a fraudulent insurance claim. Often times antique or luxury vehicles for larger insurance settlements
Phantom vehicles
55
The primary purpose of the VIN is for ______________.
identification and registration
56
Before _____ VIN locations varied, now all American made automobiles are assembled with VIN plate, visible through windshield on drivers side of door.
1968
57
VIN's can also be found on a ______________located on the driver's door on the door post
Federal safety certification label
58
Certain luxury automobiles have their VINs affixed to the ______________.
left side windshield post
59
Before 1981 VIN numbering systems varied, since the standard __________ was adopted.
17 character VIN
60
The ninth character in the VIN is called the ________. It may be a number or a letter, it is derived mathematically from other characteristics in the VIN to reveal coding and recording errors
Check digit
61
17 digit vin represents:
1. Nation of origin 2. Manufacturer 3. Make 4. Restraint system 5. 6. 7.Car line series and body type 8. Engine description 9. Check digit 10. Model year 11. Assembly plant location 12/13/14/15/16/17. Sequential production numbers
62
Beginning in _____ us automobile manufacturers have placed a portion of VIN on other areas of the vehicle such as engine and transmission
1968
63
Involves the thief purchasing a wrecked vehicle that is unrepairable strictly for its certificate of title and for the VIN
Salvage switch
64
Replace the original vin with a phony one. VIN is stamped on a label and spray painted and placed over the original VIN
The modified VIN technique
65
Construct a completely bogus VIN that closely resembles the original
Bogus vin
66
Thin easily obtainable piece of metal or aluminum that is notched at both ends. Thief slides tool in small crevice between door and door frame
Slim Jim
67
Tool is also referred to as a dent puller or slam puller. Is inserted by screwing the tip into the key way
Slide hammer
68
Lock cap is removed extractor is attached and turned to remove the lock can then be started with a screw driver
Ignition extractor
69
This tool is placed over the lock and tapped after removal of the lock cap ratchet is turned destroying the lock mechanism
Force tool
70
These tools enable entry into a single key vehicle. Door lock is pulled, code number from that lock is obtained and a new key is made
Key cutter code book and blank keys
71
Completed or attempted robbery of a motor vehicle by a stranger to the victim
Carjacking
72
Enacted in 1992 made armed auto theft a federal offense
The anti-car theft act
73
In 1994 the passage of the violent crime control and law enforcement act made carjacking resulting in ______ a federal crime punishable by death
death
74
The national auto theft bureau estimates that _____ of all vehicles reported stolen are fraudulent claims
15 percent
75
The _______ role is to implement policies for the prevention of vehicle theft. Publishes passenger ID manuals that interpret characters in the vehicles VIN
National Insurance Crime Bureau (NICB)
76
What are the main categories of embezzlement?
Theft of currency (most common type) Manipulation of accounts Retail theft/pilferage
77
Women were ______ more likely to be victims of identity fraud than men in 2008
26 percent
78
__________ detached houses are often attractive targets with greater rewards and more difficult to secure because they have multiple access points
Single family
79
Compared with nonburglarized houses those previously targeted are up to _______more likely to be burglarized; any subsequent burglary is most likely to occur within six weeks of initial crime
four times
80
Most retail and residential burglars are ________who commit a variety of predatory crimes
young men
81
Most retail burglaries occur at night or on ________ when stores are closed
weekends
82
Unless burglars are caught in the act they are ________ to detect. Clearance rate is lowest for 8 UCR index crimes
very difficult
83
Experience has shown that most burglars are convicted on _____________.
Circumstantial evidence
84
The UCR defines larceny theft as the unlawful taking, carrying, leading, or ________ of property from the possession or constructive possession if another
Riding away
85
The most common behavioral red flags displayed by the perpetrators in our study were living behind their means (43%) and ____________(36%)
experiencing financial difficulties
86
Records from credit card transactions have provided law enforcement with a twofold benefit: the apprehension of the fraudulent credit card user and ________ that often point to other crimes
accurate records
87
The professional shoplifter often works in groups of _______ and victimizes several shopping areas at a time
3 or 4
88
According to the UCR the crime of motor vehicle theft includes trains, airplanes, bulldozers ,most farm and construction machinery, ships, boats, and _________.
space craft