Chapter 14 Flashcards

0
Q

As a rule after the burglar is inside the structure __________need be committed for the legal elements of the crime to be met.

A

no additional felony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

The UCR uses three classifications of burglary forcible entry, ______________ and attempted forcible entry.

A

unlawful entry or no force used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some burglaries occur at night typically between __________.

A

7pm and 12pm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Although burglaries of multi family homes are the most numerous, _____________ are at a higher risk.

A

single family houses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Burglary rates are the highest in _______ and the lowest in February.

A

August

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Burglaries most often strike on weekdays from 10am-11am and from _______.

A

1-3pm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Burglars select targets based on a number of key factors:

A
  1. familiarity w/target and convenience of location
  2. Occupancy
  3. Visibility and surveillability
  4. Accessibility
  5. Vulnerability or security
  6. Potential rewards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Few burglars keep the goods they steal, they typically dispose of stolen property within _____usually after stashing it in a semi public location.

A

24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Might travel a broad geographical area in search for stealing. Many such persons resort to more personal contact with victims such as purse snatching muggings or even robbery. Is sometimes armed and can pose a serious threat to communities in which he/she operates

A

Amateur burglar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Burglary is when a person knowingly _________ in a building or structure belonging to another for the purpose of committing a crime therein.

A

breaks or remains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Commonly relies on the expert use of tools, typically drive trucks or vans which conceal and transport their tools. Great deal of time in planning to avoid detection

A

Professional burglar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As a rule on burglary calls the first officer to receive the call will assume responsibility for ________ of assisting officers

A

placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a person who buys and sells stolen property with criminal intent

A

Fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

May operate from an otherwise legitimate business such as a pawnshop or used furniture store

A

Professional fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A category of untraceable goods, such as tools, liquor, and clothing that are indistinguishable from others like them

A

Fungible goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anything stolen valued under $200

A

simple larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Takes and carries away the personal property of another without consent and with intent to steal

A

Larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Frauds lasted an average of _____ before being detected

A

18 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The schemes themselves violate Nigerian criminal code

A

Nigerian letter or “419” fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The use of fictitious checks drawn on a nonexistent firm or person consists of drawing cash in accounts made up of uncollected funds.

A

Check kiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Low profile crime that typically consists of employees of organizations stealing large amounts of money over a long period of time. It can be described as a fraudulent appropriation of property by a person to whom that property has been entrusted.

A

Embezzlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The element of _____ is critical in establishing the crime of embezzlement

A

trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Embezzlers usually prefer to steal _____ because it is both difficult to trace and easy to conceal

A

cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Stealing of merchandise by a company’s employees. Many companies consider this shrinkage, an unexplained loss

A

Pilferage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__________ have experience with stolen credit cards are careful to purchase items under the designated limit typically $50-100

A

Plastic workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An ___________steals merchandise for his or her own use

A

Amateur shoplifter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The professional often works in groups of _______ and often victimizes several shopping areas at a time.

A

three or four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Sometimes called _________ professional shoplifters resell stolen merchandise to pawnshops or fences.

A

Boosters or heels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Most shoplifters are amateur pilferers called ______ usually do not perceive themselves as thieves are systematic shoplifters who steak merchandise for their own use

A

Snitches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Shoplifting can be investigated in two ways:

A
  1. Reactive-interview of witnesses

2. Proactive-shoplifter caught in the act by in house security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Retailers are concerned about gangs that have established supply chains that make organized theft know as ________.

A

“Boosting”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Is a special kind of larceny which involves obtaining credit, merchandise, or services by fraudulent personal representation.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Identity theft became a federal crime in 1998 with the passage of the ______________. Under this act the FTC is empowered to act as a nationwide clearinghouse for information related to ID theft crimes

A

Identity theft and Assumption Deterrence Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The law makes identity theft a crime whenever anyone _______________ without lawful authority a means of identification of another person with the intent to commit aid or abet any unlawful activity that constitutes a violation of federal law or felony under any applicable state or local law

A

knowingly transfers or uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

As the use of technology to store and transmit information ________ so too will identity theft

A

increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The average age of identity theft victims was ______ and the most commonly reported age was 33 years.

A

42 years

36
Q

The greatest number of identity theft complaints came from California, New York, Texas and ________.

A

Florida

37
Q

The ______ mandate is to prohibit unfair or deceptive acts or practices and to promote vigorous competition in the marketplace. The act also gives jurisdiction over cross border consumer transactions (central database)

A

FTC

38
Q

Those who commit identity theft are generally after __________ information that can be used for monetary gain.

A

Personal and confidential

39
Q

A practice whereby the thief positions himself near a victim to obtain personal information by overhearing the victim or seeing the victims actions. (May listen to telephone conversation)

A

Shoulder surfing

40
Q

Electronic lifting of data encoded on a valid credit or ATM card and transferring that data to a counterfeit card

A

Skimming

41
Q

A proper investigative response to ID theft will include:

A
  1. Develop a standardized procedure for taking reports
  2. Initiate criminal investigations of ID reports
  3. Prosecute violators
  4. Cooperate with other agencies
  5. Assist victims by providing helpful info
42
Q

UCR defines motor vehicle as a ___________ vehicle that runs on the ground and not on rails, includes automobiles motorcycles bicycles trucks motor scooters buses and snowmobiles

A

self propelled

43
Q

A non profit insurance organization committing to combating vehicle theft and insurance fraud

A

National insurance crime bureau (NICB)

44
Q

2010 national top 10 vehicles stolen:

A
  1. Honda Accord (94)
  2. Honda civic (95)
  3. Toyota Camry (91)
  4. Chevrolet pickup full size (99)
  5. Ford f150 (97)
  6. Dodge ram (04)
  7. Dodge caravan (00)
  8. Acura integra (94)
  9. Ford explorer (02)
  10. Ford Taurus (99)
45
Q

Individual car components in high demand are _____________ which are often stolen for illegal export to central and South America or Europe

A

“Tuners” or “street racers”

46
Q

Top 10 metro areas w/ highest auto theft rates:

A
  1. Modesto California
  2. Bakersfield-Delano California
  3. Spokane Washington
  4. Vallejo-Fairfield California
  5. Sacramento/Arden-arcade/Roseville California
  6. Stockton California
  7. Visalia porter California
  8. San Francisco/Oakland/Fremont California
  9. Yakima Washington
47
Q

Motivations for auto theft:

A
  1. Joyriding- premier motivation for auto theft, primarily juv offenders
  2. Theft for resale
  3. Transportation for other crimes
  4. Stripping and chop shop operations
48
Q

Where stolen vehicles are disposed off, typically a private garage in an unpopulated residential area of town

A

Stripping operations

49
Q

Involve larger garages and deal in larger quantities of goods. Can house both stolen vehicle and the tin truck inside building. Remove any identifying numbers from the remains of vehicles left behind after the valued parts have been removed

A

Chop shops

50
Q

The auto parts transport vehicle

A

Tin truck

51
Q

Vehicle owner lies about the theft of his vehicle and orchestrates its destruction to collect insurance money

A

Owner give ups

52
Q

Owners who’s vehicle need extensive repair will report vehicle stolen and hide it for 30 days, long enough for insurance company to settle claim

A

30 day specials

53
Q

Owner obtains an insurance policy then reports it stolen, after it is legally shipped overseas to be sold on the black market. Owner then collects insurance proceeds and oversea profits

A

Export fraud

54
Q

Creates a phony title or registration to secure insurance on a non existent vehicle. Reports vehicle stolen before filing a fraudulent insurance claim. Often times antique or luxury vehicles for larger insurance settlements

A

Phantom vehicles

55
Q

The primary purpose of the VIN is for ______________.

A

identification and registration

56
Q

Before _____ VIN locations varied, now all American made automobiles are assembled with VIN plate, visible through windshield on drivers side of door.

A

1968

57
Q

VIN’s can also be found on a ______________located on the driver’s door on the door post

A

Federal safety certification label

58
Q

Certain luxury automobiles have their VINs affixed to the ______________.

A

left side windshield post

59
Q

Before 1981 VIN numbering systems varied, since the standard __________ was adopted.

A

17 character VIN

60
Q

The ninth character in the VIN is called the ________. It may be a number or a letter, it is derived mathematically from other characteristics in the VIN to reveal coding and recording errors

A

Check digit

61
Q

17 digit vin represents:

A
  1. Nation of origin
  2. Manufacturer
  3. Make
  4. Restraint system
    1. 7.Car line series and body type
  5. Engine description
  6. Check digit
  7. Model year
  8. Assembly plant location
    12/13/14/15/16/17. Sequential production numbers
62
Q

Beginning in _____ us automobile manufacturers have placed a portion of VIN on other areas of the vehicle such as engine and transmission

A

1968

63
Q

Involves the thief purchasing a wrecked vehicle that is unrepairable strictly for its certificate of title and for the VIN

A

Salvage switch

64
Q

Replace the original vin with a phony one. VIN is stamped on a label and spray painted and placed over the original VIN

A

The modified VIN technique

65
Q

Construct a completely bogus VIN that closely resembles the original

A

Bogus vin

66
Q

Thin easily obtainable piece of metal or aluminum that is notched at both ends. Thief slides tool in small crevice between door and door frame

A

Slim Jim

67
Q

Tool is also referred to as a dent puller or slam puller. Is inserted by screwing the tip into the key way

A

Slide hammer

68
Q

Lock cap is removed extractor is attached and turned to remove the lock can then be started with a screw driver

A

Ignition extractor

69
Q

This tool is placed over the lock and tapped after removal of the lock cap ratchet is turned destroying the lock mechanism

A

Force tool

70
Q

These tools enable entry into a single key vehicle. Door lock is pulled, code number from that lock is obtained and a new key is made

A

Key cutter code book and blank keys

71
Q

Completed or attempted robbery of a motor vehicle by a stranger to the victim

A

Carjacking

72
Q

Enacted in 1992 made armed auto theft a federal offense

A

The anti-car theft act

73
Q

In 1994 the passage of the violent crime control and law enforcement act made carjacking resulting in ______ a federal crime punishable by death

A

death

74
Q

The national auto theft bureau estimates that _____ of all vehicles reported stolen are fraudulent claims

A

15 percent

75
Q

The _______ role is to implement policies for the prevention of vehicle theft. Publishes passenger ID manuals that interpret characters in the vehicles VIN

A

National Insurance Crime Bureau (NICB)

76
Q

What are the main categories of embezzlement?

A

Theft of currency (most common type)
Manipulation of accounts
Retail theft/pilferage

77
Q

Women were ______ more likely to be victims of identity fraud than men in 2008

A

26 percent

78
Q

__________ detached houses are often attractive targets with greater rewards and more difficult to secure because they have multiple access points

A

Single family

79
Q

Compared with nonburglarized houses those previously targeted are up to _______more likely to be burglarized; any subsequent burglary is most likely to occur within six weeks of initial crime

A

four times

80
Q

Most retail and residential burglars are ________who commit a variety of predatory crimes

A

young men

81
Q

Most retail burglaries occur at night or on ________ when stores are closed

A

weekends

82
Q

Unless burglars are caught in the act they are ________ to detect. Clearance rate is lowest for 8 UCR index crimes

A

very difficult

83
Q

Experience has shown that most burglars are convicted on _____________.

A

Circumstantial evidence

84
Q

The UCR defines larceny theft as the unlawful taking, carrying, leading, or ________ of property from the possession or constructive possession if another

A

Riding away

85
Q

The most common behavioral red flags displayed by the perpetrators in our study were living behind their means (43%) and ____________(36%)

A

experiencing financial difficulties

86
Q

Records from credit card transactions have provided law enforcement with a twofold benefit: the apprehension of the fraudulent credit card user and ________ that often point to other crimes

A

accurate records

87
Q

The professional shoplifter often works in groups of _______ and victimizes several shopping areas at a time

A

3 or 4

88
Q

According to the UCR the crime of motor vehicle theft includes trains, airplanes, bulldozers ,most farm and construction machinery, ships, boats, and _________.

A

space craft