Chapter 13 Powerpoint pt. 3 Flashcards
Some states combined _______, ___________, and ______ _________ into a single theft statute.
larceny
embezzlement
false pretenses
_______, ________, and theft of service count as theft.
Blackmail
extortion
Blackmail, extortion, and _____ __ _______ count as theft.
theft of service
_____ was used to streamline the judicial process.
Theft
Theft of a person’s name and identifying information, including?
(1) social security number
(2) bank account information
(3) credit card number(s)
What kind of theft is this: Theft of your name and identifying information?
Identify Theft
In 1998 the U.S. Congress passed the ______ ____ and _________ _________ Act.
Identity Theft
Assumption Deterrence
In _____ the U.S. Congress passed the Identity Theft and Assumption Deterrence Act.
1998
True or False: sending SPAM constitutes as computer crime
True
True or False: There is no such offense [receiving stolen property] under common law.
True
Receiving stolen property is punished as a ___________ or ______ depending on the value of the property.
misdemeanor
felony
What are the requirements for being held liable for receiving stolen property?
(1) Receive property
(2) Knowing the property was stolen
(3) With the intent to permanently deprive the owner of the property
What is the actus reus of receiving stolen property?
Individual must control the stolen property (either actual or constructive possession)
Some states require actual _________ that the goods are stolen while others provide that it is sufficient that an individual _______ that the goods are stolen
knowledge
believe
Originally, _______ was enforced against those who used the king’s _____ without permission.
forging
seal
What is the difference between forgery and uttering?
1) Forgery – creating a false legal document or the material modification of an existing legal document with the intent to deceive or to defraud others
2) Uttering – circulating or using a forged document
What are the elements of establishing forgery?
(1) False document or material modification of an existing document that is
(2) Written with intent to defraud
(3) If genuine, would have legal significance