Chapter 14 Flashcards
As a rule after the burglar is inside the structure __________need be committed for the legal elements of the crime to be met.
no additional felony
The UCR uses three classifications of burglary forcible entry, ______________ and attempted forcible entry.
unlawful entry or no force used
Some burglaries occur at night typically between __________.
7pm and 12pm
Although burglaries of multi family homes are the most numerous, _____________ are at a higher risk.
single family houses
Burglary rates are the highest in _______ and the lowest in February.
August
Burglaries most often strike on weekdays from 10am-11am and from _______.
1-3pm
Burglars select targets based on a number of key factors:
- familiarity w/target and convenience of location
- Occupancy
- Visibility and surveillability
- Accessibility
- Vulnerability or security
- Potential rewards
Few burglars keep the goods they steal, they typically dispose of stolen property within _____usually after stashing it in a semi public location.
24 hours
Might travel a broad geographical area in search for stealing. Many such persons resort to more personal contact with victims such as purse snatching muggings or even robbery. Is sometimes armed and can pose a serious threat to communities in which he/she operates
Amateur burglar
Burglary is when a person knowingly _________ in a building or structure belonging to another for the purpose of committing a crime therein.
breaks or remains
Commonly relies on the expert use of tools, typically drive trucks or vans which conceal and transport their tools. Great deal of time in planning to avoid detection
Professional burglar
As a rule on burglary calls the first officer to receive the call will assume responsibility for ________ of assisting officers
placement
Is a person who buys and sells stolen property with criminal intent
Fence
May operate from an otherwise legitimate business such as a pawnshop or used furniture store
Professional fence
A category of untraceable goods, such as tools, liquor, and clothing that are indistinguishable from others like them
Fungible goods
Anything stolen valued under $200
simple larceny
Takes and carries away the personal property of another without consent and with intent to steal
Larceny
Frauds lasted an average of _____ before being detected
18 months
The schemes themselves violate Nigerian criminal code
Nigerian letter or “419” fraud
The use of fictitious checks drawn on a nonexistent firm or person consists of drawing cash in accounts made up of uncollected funds.
Check kiting
Low profile crime that typically consists of employees of organizations stealing large amounts of money over a long period of time. It can be described as a fraudulent appropriation of property by a person to whom that property has been entrusted.
Embezzlement
The element of _____ is critical in establishing the crime of embezzlement
trust
Embezzlers usually prefer to steal _____ because it is both difficult to trace and easy to conceal
cash
Stealing of merchandise by a company’s employees. Many companies consider this shrinkage, an unexplained loss
Pilferage
__________ have experience with stolen credit cards are careful to purchase items under the designated limit typically $50-100
Plastic workers
An ___________steals merchandise for his or her own use
Amateur shoplifter
The professional often works in groups of _______ and often victimizes several shopping areas at a time.
three or four
Sometimes called _________ professional shoplifters resell stolen merchandise to pawnshops or fences.
Boosters or heels
Most shoplifters are amateur pilferers called ______ usually do not perceive themselves as thieves are systematic shoplifters who steak merchandise for their own use
Snitches
Shoplifting can be investigated in two ways:
- Reactive-interview of witnesses
2. Proactive-shoplifter caught in the act by in house security
Retailers are concerned about gangs that have established supply chains that make organized theft know as ________.
“Boosting”
Is a special kind of larceny which involves obtaining credit, merchandise, or services by fraudulent personal representation.
Identity theft
Identity theft became a federal crime in 1998 with the passage of the ______________. Under this act the FTC is empowered to act as a nationwide clearinghouse for information related to ID theft crimes
Identity theft and Assumption Deterrence Act
The law makes identity theft a crime whenever anyone _______________ without lawful authority a means of identification of another person with the intent to commit aid or abet any unlawful activity that constitutes a violation of federal law or felony under any applicable state or local law
knowingly transfers or uses
As the use of technology to store and transmit information ________ so too will identity theft
increases