Final exam Day 3 Flashcards Preview

Criminal investigation > Final exam Day 3 > Flashcards

Flashcards in Final exam Day 3 Deck (15)
Loading flashcards...
1

Business related or occupational crime that involves illegal acts characterized by fraud, concealment, or a violation of trust and does not depend on the actual or threatened use of physical force or violence.

White Collar Crime

2

A model of vehicle with a high theft rate that is selected and placed in a high crime area as bait for motor vehicle theft.

Bait Car

3

Made interstate transportation of a stolen motor vehicle a federal crime and allowed for federal assistance in prosecuting such cases.

Dyer Act

4

Simply taking a vehicle for fun, often driving recklessly and without regard for any damage caused to the vehicle itself or other property, and then abandoning it.

Joyriding

5

Any self-propelled device for moving persons or property or pulling implements, whether operated on land, on water, or in the air.

motor vehicle

6

Primary non duplicated, serialized number assigned by the manufacturer to each vehicle manufactured

vehicle identification number (VIN)-

7

Malicious, willful burning of a building or property

Arson

8

Substances that cause fires to burn faster and hotter.

Accelerant

9

Behavior that conveys a low level of intent to inflict harm and an absence of malice.

Fire play

10

Describes a fire ignited intentionally and maliciously under circumstances in which a person knows that the fire should not be set.

Incendiary

11

Breaking off of surface pieces of concrete, cement or brick because of intense heat.

Spalling

12

An internet currency used in online payment programs.

Bitcoins

13

Part of the larger category of computer crime, a criminal act that is carried out using cyber-technology and that takes place in cyberspace.

Cybercrime

14

Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in harm to noncombatant targets by subnational groups or clandestine agents

Cyberterrorism

15

Secretly attaches another program to a company’s computer system.

Logic Bomb