Chapter 14 Flashcards
As a rule after the burglar is inside the structure __________need be committed for the legal elements of the crime to be met.
no additional felony
The UCR uses three classifications of burglary forcible entry, ______________ and attempted forcible entry.
unlawful entry or no force used
Some burglaries occur at night typically between __________.
7pm and 12pm
Although burglaries of multi family homes are the most numerous, _____________ are at a higher risk.
single family houses
Burglary rates are the highest in _______ and the lowest in February.
August
Burglaries most often strike on weekdays from 10am-11am and from _______.
1-3pm
Burglars select targets based on a number of key factors:
- familiarity w/target and convenience of location
- Occupancy
- Visibility and surveillability
- Accessibility
- Vulnerability or security
- Potential rewards
Few burglars keep the goods they steal, they typically dispose of stolen property within _____usually after stashing it in a semi public location.
24 hours
Might travel a broad geographical area in search for stealing. Many such persons resort to more personal contact with victims such as purse snatching muggings or even robbery. Is sometimes armed and can pose a serious threat to communities in which he/she operates
Amateur burglar
Burglary is when a person knowingly _________ in a building or structure belonging to another for the purpose of committing a crime therein.
breaks or remains
Commonly relies on the expert use of tools, typically drive trucks or vans which conceal and transport their tools. Great deal of time in planning to avoid detection
Professional burglar
As a rule on burglary calls the first officer to receive the call will assume responsibility for ________ of assisting officers
placement
Is a person who buys and sells stolen property with criminal intent
Fence
May operate from an otherwise legitimate business such as a pawnshop or used furniture store
Professional fence
A category of untraceable goods, such as tools, liquor, and clothing that are indistinguishable from others like them
Fungible goods
Anything stolen valued under $200
simple larceny
Takes and carries away the personal property of another without consent and with intent to steal
Larceny
Frauds lasted an average of _____ before being detected
18 months
The schemes themselves violate Nigerian criminal code
Nigerian letter or “419” fraud
The use of fictitious checks drawn on a nonexistent firm or person consists of drawing cash in accounts made up of uncollected funds.
Check kiting
Low profile crime that typically consists of employees of organizations stealing large amounts of money over a long period of time. It can be described as a fraudulent appropriation of property by a person to whom that property has been entrusted.
Embezzlement
The element of _____ is critical in establishing the crime of embezzlement
trust
Embezzlers usually prefer to steal _____ because it is both difficult to trace and easy to conceal
cash
Stealing of merchandise by a company’s employees. Many companies consider this shrinkage, an unexplained loss
Pilferage
__________ have experience with stolen credit cards are careful to purchase items under the designated limit typically $50-100
Plastic workers
An ___________steals merchandise for his or her own use
Amateur shoplifter
The professional often works in groups of _______ and often victimizes several shopping areas at a time.
three or four
Sometimes called _________ professional shoplifters resell stolen merchandise to pawnshops or fences.
Boosters or heels
Most shoplifters are amateur pilferers called ______ usually do not perceive themselves as thieves are systematic shoplifters who steak merchandise for their own use
Snitches
Shoplifting can be investigated in two ways:
- Reactive-interview of witnesses
2. Proactive-shoplifter caught in the act by in house security
Retailers are concerned about gangs that have established supply chains that make organized theft know as ________.
“Boosting”
Is a special kind of larceny which involves obtaining credit, merchandise, or services by fraudulent personal representation.
Identity theft
Identity theft became a federal crime in 1998 with the passage of the ______________. Under this act the FTC is empowered to act as a nationwide clearinghouse for information related to ID theft crimes
Identity theft and Assumption Deterrence Act
The law makes identity theft a crime whenever anyone _______________ without lawful authority a means of identification of another person with the intent to commit aid or abet any unlawful activity that constitutes a violation of federal law or felony under any applicable state or local law
knowingly transfers or uses
As the use of technology to store and transmit information ________ so too will identity theft
increases
The average age of identity theft victims was ______ and the most commonly reported age was 33 years.
42 years
The greatest number of identity theft complaints came from California, New York, Texas and ________.
Florida
The ______ mandate is to prohibit unfair or deceptive acts or practices and to promote vigorous competition in the marketplace. The act also gives jurisdiction over cross border consumer transactions (central database)
FTC
Those who commit identity theft are generally after __________ information that can be used for monetary gain.
Personal and confidential
A practice whereby the thief positions himself near a victim to obtain personal information by overhearing the victim or seeing the victims actions. (May listen to telephone conversation)
Shoulder surfing
Electronic lifting of data encoded on a valid credit or ATM card and transferring that data to a counterfeit card
Skimming
A proper investigative response to ID theft will include:
- Develop a standardized procedure for taking reports
- Initiate criminal investigations of ID reports
- Prosecute violators
- Cooperate with other agencies
- Assist victims by providing helpful info
UCR defines motor vehicle as a ___________ vehicle that runs on the ground and not on rails, includes automobiles motorcycles bicycles trucks motor scooters buses and snowmobiles
self propelled
A non profit insurance organization committing to combating vehicle theft and insurance fraud
National insurance crime bureau (NICB)
2010 national top 10 vehicles stolen:
- Honda Accord (94)
- Honda civic (95)
- Toyota Camry (91)
- Chevrolet pickup full size (99)
- Ford f150 (97)
- Dodge ram (04)
- Dodge caravan (00)
- Acura integra (94)
- Ford explorer (02)
- Ford Taurus (99)
Individual car components in high demand are _____________ which are often stolen for illegal export to central and South America or Europe
“Tuners” or “street racers”
Top 10 metro areas w/ highest auto theft rates:
- Modesto California
- Bakersfield-Delano California
- Spokane Washington
- Vallejo-Fairfield California
- Sacramento/Arden-arcade/Roseville California
- Stockton California
- Visalia porter California
- San Francisco/Oakland/Fremont California
- Yakima Washington
Motivations for auto theft:
- Joyriding- premier motivation for auto theft, primarily juv offenders
- Theft for resale
- Transportation for other crimes
- Stripping and chop shop operations
Where stolen vehicles are disposed off, typically a private garage in an unpopulated residential area of town
Stripping operations
Involve larger garages and deal in larger quantities of goods. Can house both stolen vehicle and the tin truck inside building. Remove any identifying numbers from the remains of vehicles left behind after the valued parts have been removed
Chop shops
The auto parts transport vehicle
Tin truck
Vehicle owner lies about the theft of his vehicle and orchestrates its destruction to collect insurance money
Owner give ups
Owners who’s vehicle need extensive repair will report vehicle stolen and hide it for 30 days, long enough for insurance company to settle claim
30 day specials
Owner obtains an insurance policy then reports it stolen, after it is legally shipped overseas to be sold on the black market. Owner then collects insurance proceeds and oversea profits
Export fraud
Creates a phony title or registration to secure insurance on a non existent vehicle. Reports vehicle stolen before filing a fraudulent insurance claim. Often times antique or luxury vehicles for larger insurance settlements
Phantom vehicles
The primary purpose of the VIN is for ______________.
identification and registration
Before _____ VIN locations varied, now all American made automobiles are assembled with VIN plate, visible through windshield on drivers side of door.
1968
VIN’s can also be found on a ______________located on the driver’s door on the door post
Federal safety certification label
Certain luxury automobiles have their VINs affixed to the ______________.
left side windshield post
Before 1981 VIN numbering systems varied, since the standard __________ was adopted.
17 character VIN
The ninth character in the VIN is called the ________. It may be a number or a letter, it is derived mathematically from other characteristics in the VIN to reveal coding and recording errors
Check digit
17 digit vin represents:
- Nation of origin
- Manufacturer
- Make
- Restraint system
- 7.Car line series and body type
- Engine description
- Check digit
- Model year
- Assembly plant location
12/13/14/15/16/17. Sequential production numbers
Beginning in _____ us automobile manufacturers have placed a portion of VIN on other areas of the vehicle such as engine and transmission
1968
Involves the thief purchasing a wrecked vehicle that is unrepairable strictly for its certificate of title and for the VIN
Salvage switch
Replace the original vin with a phony one. VIN is stamped on a label and spray painted and placed over the original VIN
The modified VIN technique
Construct a completely bogus VIN that closely resembles the original
Bogus vin
Thin easily obtainable piece of metal or aluminum that is notched at both ends. Thief slides tool in small crevice between door and door frame
Slim Jim
Tool is also referred to as a dent puller or slam puller. Is inserted by screwing the tip into the key way
Slide hammer
Lock cap is removed extractor is attached and turned to remove the lock can then be started with a screw driver
Ignition extractor
This tool is placed over the lock and tapped after removal of the lock cap ratchet is turned destroying the lock mechanism
Force tool
These tools enable entry into a single key vehicle. Door lock is pulled, code number from that lock is obtained and a new key is made
Key cutter code book and blank keys
Completed or attempted robbery of a motor vehicle by a stranger to the victim
Carjacking
Enacted in 1992 made armed auto theft a federal offense
The anti-car theft act
In 1994 the passage of the violent crime control and law enforcement act made carjacking resulting in ______ a federal crime punishable by death
death
The national auto theft bureau estimates that _____ of all vehicles reported stolen are fraudulent claims
15 percent
The _______ role is to implement policies for the prevention of vehicle theft. Publishes passenger ID manuals that interpret characters in the vehicles VIN
National Insurance Crime Bureau (NICB)
What are the main categories of embezzlement?
Theft of currency (most common type)
Manipulation of accounts
Retail theft/pilferage
Women were ______ more likely to be victims of identity fraud than men in 2008
26 percent
__________ detached houses are often attractive targets with greater rewards and more difficult to secure because they have multiple access points
Single family
Compared with nonburglarized houses those previously targeted are up to _______more likely to be burglarized; any subsequent burglary is most likely to occur within six weeks of initial crime
four times
Most retail and residential burglars are ________who commit a variety of predatory crimes
young men
Most retail burglaries occur at night or on ________ when stores are closed
weekends
Unless burglars are caught in the act they are ________ to detect. Clearance rate is lowest for 8 UCR index crimes
very difficult
Experience has shown that most burglars are convicted on _____________.
Circumstantial evidence
The UCR defines larceny theft as the unlawful taking, carrying, leading, or ________ of property from the possession or constructive possession if another
Riding away
The most common behavioral red flags displayed by the perpetrators in our study were living behind their means (43%) and ____________(36%)
experiencing financial difficulties
Records from credit card transactions have provided law enforcement with a twofold benefit: the apprehension of the fraudulent credit card user and ________ that often point to other crimes
accurate records
The professional shoplifter often works in groups of _______ and victimizes several shopping areas at a time
3 or 4
According to the UCR the crime of motor vehicle theft includes trains, airplanes, bulldozers ,most farm and construction machinery, ships, boats, and _________.
space craft