Final Flashcards

1
Q

People may have knowledge about…

A

a crime or a perpetrator and not even know it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The police have to use strategies like tip lines, television shows, and special alerts to…

A

identify and obtain information from these individuals who may have knowledge about a crime or a perpetrator and not even know it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tip lines are…

A

an easy and convenient way for citizens to share information with the police through the use of a telephone or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crime Stoppers offer

A

cash rewards for information leading to an individual’s arrest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Television shows like America’s Most Wanted disseminate…

A

information about unsolved crimes with the intention that the public will have information regarding the crimes and contact the authorities (Many times these cases have a description of the perpetrator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AMBER (America’s Missing: Broadcast Emergency Response) was created to…

A

Disseminate information about child abduction to enlist the public’s help in locating the child quickly and safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To broadcast an AMBER Alert, investigators need:

A

A confirmation that there has been a child abduction,
There is reason to believe that the child is in danger and that there is enough reliable information about the facts of the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The theory is the children abducted by strangers are…

A

harmed quickly (within the first three hours)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Amber Alerts are designed for stranger abductions, which are…

A

rare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most Amber Alerts result in a child recovery, but the…

A

AMBER Alert had nothing to do with the recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AMBER Alert involving a stranger abduction is…

A

less likely to result in the recovery of the child

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where there is a child recovery, only…

A

17% was within six hours of the abduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

National Center for Missing and Exploited Children (NCMEC) send…

A

“Have you seen me?” mailings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Individual police agencies have “most wanted” lists through…

A

crime alerts, media, billboards, and “FaceCrook” (a computer application available to inmates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These strategies for Information Disseminating have limitations

A

Information can be overwhelming
False Information
How to distribute reward money fairly?
Credibility and motivation of citizens contributing information
The publicity of the case may affect a witness’ perceptions
Should money be paid for someone performing what is arguably someone’s civic duty?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential informants are

A

those who actively assist law enforcement in an ongoing capacity (Controversial and Considered a necessary evil)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Four types of informants

A

The hammered informant is coerced by the police
The mercenary informant is motivated by money
The vengeful informant is motivated by revenge
The police buff informant is a fan of the police

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Gang members are disproportionately involved in

A

crime, therefore they are constantly a problem for law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Law enforcement has developed gang task forces as a

A

response to the increasing issue of gangs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What criteria characterizes a gang?

A

Three or more members
Share an identity
View themselves as a gang and are recognized by others as one
Has a level or permanence and some organization
Involved in a high level of criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Gang member identification is through

A

name, colors or symbols, graffiti, tattoos, clothing, and hand symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Crime analysis involves the collection and

A

analysis of data pertaining to a criminal incident, offender, and target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Crime analysis can inform patrol allocation decisions and make

A

predictions of future occurrences for preventative purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Crime analysis is based on the idea that crime is

A

a non-random phenomenon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The use of GIS and COMPSTAT help
the police identify patterns to develop policing strategies
26
ViCAP(Violent Criminal Apprehension Program) is a
a national computer database system that is operated by the FBI to identify the MO or signature aspects of crimes for the purpose of identifying crimes that are committed by the same person
27
Three types of crimes are focused on
Solving or unsolved homicides or attempted homicides Missing persons where foul play was suspected Unidentified bodies where the cause of death was suspected to be homicide
28
ViCAP is used to overcome linkage blindness on behalf of law enforcement who are unable to identify
serial crimes due to jurisdictional boundaries
29
Limitations ViCAP of include
ViCAP is not effective when the MO is not similar or there is missing information ViCAP has little to do with solving crimes Crimes have to be in the database in order to be useful
30
Intradepartmental databases are operated by individual
Law enforcement agencies for their own investigators’ use.
31
Interdepartmental agencies share information across law enforcement agencies
NCIC: the largest crime information network in the U.S. NLETS: (JANET-PA) Network that links law enforcement with a motor vehicle and licensing departments ICTS CIS Sentry Equifax
32
Facebook, Twitter, Craigslist
Investigators can find information
33
YouTube (VARIOUS OTHERS)
Many people post videos of them partaking in illegal activities
34
All death can be classified in one of four ways (the manner of death)
Natural causes (the most common) Accidents Suicides Homicides
35
In determining the manner of death, investigators must consider
The cause of death The characteristics of the decedent The circumstances of the death
36
Indicators of Suicide
The presence of a weapon Wounds that could have been self-inflicted A lack of defensive wounds The presence of a suicidal motive
37
Offensive/Defense Wound
Knife slash on criminal | Bruises on the ribs, back
38
Autoerotic deaths- Deaths usually involve a...
solo sexual activity went wrong, where the individual dies as a result of asphyxia
39
Indicators of this accidental death(Autoerotic death)
``` The arrangement of a self-rescue system Evidence of solo sexual activity Evidence of sexual fantasy aids Evidence of the prior autoerotic presence No apparent suicidal attempt ```
40
Patterns are...
Characteristics of Homicides
41
Murder can be defined as
the willful killing of one person by another - Most victims and perpetrators share the same characteristics - Least committed crime, relatively infrequent - Most often, homicides occur as a result of an argument of the commission of another felony (felony murders) - Most victims and perpetrators know each other prior to the incident - Firearms are the most commonly used weapon - Highest clearest rate
42
Death investigations usually begin...
where the body was found
43
Three basic questions that need to be answered in a death investigation
Who is the decedent? What was the cause of death? Who committed the murder?
44
Witnesses, relatives, and friends may be present to...
inform investigators of this (Who is the decedent?)
45
A person’s possessions can...
also, identify a victim
46
Scientific methods like DNA, fingerprints and anthropological facial reconstruction may...
help identify the decedent as well
47
Gunshot wounds as a result of firearms
Shell casing, the presence of entrance and exit wounds, the distance of the gun from the body (contact, close, distant), the amount of trauma sustained, the location of the trauma, and gunshot residue are important features in firearm deaths
48
Cutting wounds involve
the slicing of tissue with smooth edges
49
Stab and puncture wounds will
present holes in the tissue
50
Blunt force trauma is characterized by
irregular or rough-edged laceration, bruising, and broken bones
51
Poisoning most often occurs
accidentally but can be as a result of a suicide
52
Asphyxia is when
a person is unable to breathe due to any action or material, Petechial hemorrhaging
53
Asphyxia can occur in form of manual strangulation (with hands)
ligature strangulation (such as a rope), hanging, suffocation (smothering), or drowning
54
Drug overdoses are often about
determining who supplied the drugs to the victim
55
Drugs can be introduced into the body intravenously...
intramuscularly, orally, rectal/vaginally, through inhalation, subcutaneously, and sublingually
56
Death via fire
is challenging
57
Most often fire deaths are a result of
smoke inhalation, not from the fire itself
58
To identify perpetrators
- Circumstances of the incident and characteristics of the victim can be crucial - Establishing a motive - Physical evidence on the victim’s body or at the crime scene - Establishing the time of death can be essential for it can be compared to a suspect's alibi
59
The postmortem interval (PMI) guesses the...
Time of death through the changes a body goes through after death - Potassium levels in the vitreous humor - Contents of the victim’s gastrointestinal tract - The degree of decomposition - Insect and animal activity
60
Algor mortis refers to the
the cooling process of the body - loss of heat by a body
61
Liver Mortis (postmortem lividity) refers to
the blood pooling of the body
62
Rigor mortis refers to
the rigidity of the body
63
An insect’s presence, stage of...
development and contents of their gut are particularly useful
64
Information from an autopsy is useful in
determining the cause and manner of death
65
An autopsy consists of two parts:
The external examination consists of the opening of the chest, abdominal cavity, pelvic cavity, and the skull
66
Investigating homicides that are suspected as being a part of a series...
appear as random and lack a traditional motive. This makes them difficult to solve
67
Serial killers are mobile...
and they plan well in advance
68
Several law enforcement agencies may be involved which complicate the investigation
VICAP | Task forces are often developed to address this issue
69
Homicides with certain characteristics are more likely to be solved within
24 hours. If a case does not have those characteristics, it may not be solved
70
Some cases get pushed aside due to
caseload and time pressures
71
Cold case investigations provide new eyes
on old cases
72
There are three types of cold cases
- Cases that are reopened due to outside pressure - Cases that are reopened due to the availability of previously untested evidence- DNA - Cases that are reopened when a person confesses or a witness comes forward
73
Cold cases are difficult to solve because investigators often face
Uncooperative witnesses Difficulty locating witnesses Decrease suspects DNA results that do not lead anywhere
74
Cold cases are more likely to be solved if:
It is a recent crime It did not involve drugs The victim was found in a private residence The victim was a young male There was a known motivation for the crime A prime suspect had earlier been identified
75
Forcible rape refers to
the penetration of the vagina or anus with a body part or object, or oral penetration by a sex organ of another person without the consent of the victim (UCR), most are planned
76
It's not about the sex
it's about the power and control
77
(Sexual Assult) Victims are
young female typically
78
(Sexual Assult) Offenders are usually
white, adult males
79
(Sexual Assult) A majority of sexual assaults occur between
people who know each other
80
(Sexual Assult) The most important investigative information comes from the...
victim, either through interviews or through forensic medical examination of the victim
81
Sexual assault is the most...
traumatic type of criminal victimization
82
(Sexual Assult) Victims tend to have a wide variety of emotions and behaviors and should be approached
carefully and considerately as a result
83
Large number of sexual assaults go
unreported
84
(Sexual Assult) First responders should:
Be continually supportive of the victim Approach victims calmly Interview victims with extreme sensitivity Minimize the amount of times a victim has to share their story Ask the victim whether they prefer a male or female officer conduct the interview Have only one officer assigned to the interviews Remember that it is normal for the victim to forget, or want to forget, the incident Encourage the victims to get medical treatment Encourage the victims to obtain counseling
85
(Sexual Assult) Interviewing the victim should:
Be minimized as much as possible Have only one officer conduct all interviews Should not be conducted like an interrogation (cognitive process) Involve the victim as much as possible Be responsive and receptive Give some control to the victim Consist of mostly listening Be conducted with professional language Obtain a healthy balance of difficult questions and ones that understand what the victim is going through Focus on the violence of the incident, not the sexuality of the crime Show sensitivity in obtaining detailed information Conclude with informing the victim of what to expect next
86
The victim and perpetrator know each other
Document injuries, the use of a weapon, the circumstances of the crime, and the age of the victim
87
(Sexual Assult) The victim and the perpetrator do not know each other but the victim has
described the perpetrator
88
(Sexual Assult) The perpetrator was a stranger and the victim was unable to provide a
sufficient description
89
(Sexual Assult) In these situations, it is important that the investigators ask question regarding the MO or
signature of the perpetrator as well as the nature of circumstances of the attack
90
(Sexual Assult) Physical evidence can confirm and identify a
perpetrator and establish the elements of the crime
91
In a sexual assault, the victim’s body is considered a crime scene for SANEs
(Sexual Assault Nurse Examiners) to document injuries and recover evidence
92
(Sexual Assult) Physical evidence may also be present at the actual
crime scene as well
93
“Date rape” drugs are said to
facilitate rape
94
Rohypnol is a
tranquilizer that is tasteless and odorless
95
Gamma-hydroxybutyraye (GHB) is a
nervous system depressant is commonly referred to as “liquid ecstasy”
96
Rape suspects may be required to undergo a
a forensic examination
97
Forcible rape refers to
the penetration of the vagina or anus with a body part or object, or oral penetration by a sex organ of another person without the consent of the victim (UCR), most are planned
98
It's not about the sex
it's about the power and control
99
(Sexual Assult) Victims are
young female typically
100
(Sexual Assult) Offenders are usually
white, adult males
101
(Sexual Assult) A majority of sexual assaults occur between
people who know each other
102
(Sexual Assult) The most important investigative information comes from the...
victim, either through interviews or through forensic medical examination of the victim
103
Sexual assault is the most...
traumatic type of criminal victimization
104
(Sexual Assult) Victims tend to have a wide variety of emotions and behaviors and should be approached
carefully and considerately as a result
105
Large number of sexual assaults go
unreported
106
(Sexual Assult) First responders should:
Be continually supportive of the victim Approach victims calmly Interview victims with extreme sensitivity Minimize the amount of times a victim has to share their story Ask the victim whether they prefer a male or female officer conduct the interview Have only one officer assigned to the interviews Remember that it is normal for the victim to forget, or want to forget, the incident Encourage the victims to get medical treatment Encourage the victims to obtain counseling
107
(Sexual Assult) Interviewing the victim should:
Be minimized as much as possible Have only one officer conduct all interviews Should not be conducted like an interrogation (cognitive process) Involve the victim as much as possible Be responsive and receptive Give some control to the victim Consist of mostly listening Be conducted with professional language Obtain a healthy balance of difficult questions and ones that understand what the victim is going through Focus on the violence of the incident, not the sexuality of the crime Show sensitivity in obtaining detailed information Conclude with informing the victim of what to expect next
108
The victim and perpetrator know each other
Document injuries, the use of a weapon, the circumstances of the crime, and the age of the victim
109
(Sexual Assult) The victim and the perpetrator do not know each other but the victim has
described the perpetrator
110
(Sexual Assult) The perpetrator was a stranger and the victim was unable to provide a
sufficient description
111
(Sexual Assult) In these situations, it is important that the investigators ask question regarding the MO or
signature of the perpetrator as well as the nature of circumstances of the attack
112
(Sexual Assult) Physical evidence can confirm and identify a
perpetrator and establish the elements of the crime
113
Aggravated assaults have a
a relatively high clearance rate
114
(Sexual Assult) Physical evidence may also be present at the actual
crime scene as well
115
“Date rape” drugs are said to
facilitate rape
116
Rohypnol is a
tranquilizer that is tasteless and odorless
117
Gamma-hydroxybutyraye (GHB) is a
nervous system depressant is commonly referred to as “liquid ecstasy”
118
Rape suspects may be required to undergo a
a forensic examination
119
There are different types of rapists. Knowing these help
identify successful themes in interrogations
120
(Child abuse) Characteristics of the crime
The risk of physical abuse decreases with age The risk of neglect decreases with age Children at highest risk for sexual victimization between 7 and 12 Offenders of the crime vary
121
(Child abuse) It is important to determine whether injuries sustained by an individual is a result of an
accident or abuse
122
(Child abuse) Investigators must also understand a child’s
unique needs
123
(Child abuse) Investigators must be aware that child abuse almost always occurs
in private
124
(Child abuse) Investigators of child abuse often require the help of a local
child protective agency
125
The anger excitation rapist commits rape to
inflict pain
126
False Rape Allegations very
rarely
127
Some possible motives for falsely reporting a rape are:
``` To seek revenge To get attention To receive medical treatment To create an alibi For-profit To be favored in child custody decisions To explain a pregnancy or contraction of an STD ```
128
A simple assault includes
all other types of assaults that do not involve a weapon or serious injuries
129
The investigator must also make efforts to offset any
guilt that the child victim may experience
130
(Simple assault) Typically committed by
young males
131
Aggravated assault refers to
an attack by one person upon another for the purpose of inflicting severe bodily injury (this includes attempted murder)
132
Aggravated assault is the most
common index violent crime
133
(Aggravated assault) Young males typically
commit it
134
(Aggravated assault) Half of the aggravated assault victims know
the perpetrator
135
Aggravated assaults have a
a relatively high clearance rate
136
The identification of the perpetrator is not an issue in domestic violence. Arrest as a result of this identification unfortunately
has not proven to be effective
137
Domestic violence involves assaultive behaviors among
current or former intimate partners.
138
(Domestic violence) Restraining orders are an option for victims, though the crime is still
underreported
139
Why do victims resist leaving an abuser?
``` Cycle of violence Battered women syndrome Stockholm syndrome Traumatic bonding theory Psychological entrapment theory Multifactor ecological perspective ```
140
(Child abuse) The identification of the perpetrator again is not an
the issue in these investigations
141
Child abuse may involve
physical, sexual, and emotional abuse as well as neglect. Neglect is the most common form of child abuse
142
(Child abuse) Characteristics of the crime
The risk of physical abuse decreases with age The risk of neglect decreases with age Children at highest risk for sexual victimization between 7 and 12 Offenders of the crime vary
143
It is important to determine whether injuries sustained by an individual is a result of an
accident or abuse
144
Investigators must also understand a child’s
unique needs
145
Investigators must be aware that child abuse almost always occurs
in private
146
Investigators of child abuse often require the help of a local
child protective agenc
147
The interview must be child
friendly
148
The interviewer must recognize the developmental capabilities of children at different
ages
149
The interviewer must practice
patience
150
The interviewer must avoid
“why” question
151
The investigator must also make efforts to offset any
guilt that the child victim may experience
152
(The Robber’s Approach to the Victim) Convenience store robbers
Take the straight approach (go to the clerk right away to demand the money) or the customer approach (pretend to be a customer)
153
Robbery is the second most common
violent crime and one of the worst clearance rates because the victim and perpetrator are strangers and there is a little physical evidence
154
“Muggings” are robberies involving
strong-arm tactics like the use of a gun
155
Types of Robberies
Street robberies Commercial robberies Vehicle-related robberies Home-invasion robberies
156
More of a focus on robbery prevention strategies than robbery
apprehension strategies due to a lack of evidence available
157
Evidence that may be helpful in the apprehension of burgularies
Hold-up alarms Eyewitness identification An offender’s MO
158
The value of hold-up alarms lies in their ability to
stir a quick police response while the crime is in progress. The faster the response time, the more likely the perpetrator will be apprehended
159
Robbers are likely to use the same words are phrases in the commission
of a crime
160
(Police response procedure) Investigators should assume that the perpetrator is (in robberies and such)
armed and that there is more than one perpetrator
161
(Police response procedure) Nothing should be done to create
anxiety in the perpetrator
162
Eyewitness identification is the best evidence available to
investigators in robberies
163
A composite picture of the perpetrator/s and or the getaway car should be
advertised so the police can obtain information through tip lines
164
Closed Circuit Television security surveillance camera videos can be
essential in identifying the perpetrator
165
Closed Circuit Television security surveillance camera videos may be of poor quality or robbers are aware of
their presence, and plan accordingly
166
An MO can link robberies to
one offender, clear crimes, or provide further clues to the characteristics of the offender
167
The following are things to examine to determine an offender’s MO
``` Targets Robber’s approach to the victim The language sed Discovery of a weapon Disguises ```
168
Targets that are unguarded, in a robber’s familiar geographic zone where escape routes are known and clear to the offender are the
most attractive targets for an offender.
169
Residential burglaries are
the most common
170
(The Robber’s Approach to the Victim) Confrontations
Verbal demands of money or money or property from the victim, with the threat of force is necessary
171
(The Robber’s Approach to the Victim) Blitzes
When the offender uses violence first to gain compliance
172
(The Robber’s Approach to the Victim) Con Man (Cons)
When the offender uses a distraction first to surprise the victim with the demand
173
(The Robber’s Approach to the Victim) Snatch-thefts
When there is no communication or interaction
174
(The Robber’s Approach to the Victim) Convenience store robbers
Take the straight approach (go to the clerk right away to demand the money) or the customer approach (pretend to be a customer)
175
(Robbers) The nature of the demand can be
unique to the offender
176
(Robbers) The identification of a weapon used in the commission of the crime is
valuable info
177
The disguise that a robber uses is also valuable
Why the need for a disguise? | What feature is trying to be covered up?
178
One common form of physical evidence sometimes found in bank robbery investigations is that of a
dye pack
179
Overall however, robberies have little
physical evidence available
180
Robberies are all about the
money
181
Burglars can obtain information about their target through the perpetrator’s own observations as well as their
relationship with the target
182
(Property Taken) The money is often spent immediately after being
stolen and never recovered by the police
183
A common piece of property taken is that of a cell phone
This is done to prevent the victim from calling the police | The cell phone also possesses a monetary value
184
When interrogating robbery suspects, the most effective approach is
a non-emotional approach because robbers are generally angry, hostile, and desperate
185
Monitor the whereabouts of convicted robbers because
they often reoffend
186
The use of bait money in
bank and commercial robbery investigations
187
Publicize information on high profile suspects so that
tip lines can be used
188
Burglaries do not require
force compared to robberies
189
A burglary is defined as the
unlawful entry of a building to commit a felony or theft without permission. Use of force to gain entry is not necessary
190
Burglaries are
frequent and serious
191
Physical evidence in burglary scenes are often in the
form of tool markers at the point of entry or exit
192
Nonresidential burglaries occur at
night
193
Few burglaries are
solved and seldom is property recovered
194
Often, burglars steal cash or
property that can easily and quickly be converted into cash
195
Burglaries are often discovered
well after the crime has taken place and the perpetrator has fled
196
Burglaries are difficult to solve because:
Investigators don’t always know when the crime occurred Little information is available from witnesses/victims Physical evidence may not be found Stolen property is often discarded
197
What makes a good burglary investigation?
Physical evidence and eyewitnesses The stolen property Other witnesses and information The perpetrator’s MO
198
Burglar alarms may help prevent but not apprehend because burglar alarms:
Can be easily foiled by burglars Often give false alarms Burglars often avoid these homes
199
The police’s first must verify the entry and whether a
perpetrator is inside the structure still (“clear” the building)
200
VINs are a series of
letters and numbers unique to each car. Stolen vehicle VINs are entered in NCIC
201
After that, the police should conduct a
neighborhood canvass
202
A burglar’s MO can be determined through:
Inferences regarding the chosen target The perpetrator’s method of entry The type of property taken or not taken The amount of planning it probably took the offender to pull it off How the perpetrator searched for property
203
Burglars can obtain information about their target through the perpetrator’s own observations as well as their
relationship with the target
204
2 out of 3 burglaries involve
forced entry
205
Forced entries can be through
screwdrivers or crowbars or through the breaking of windows and doors.
206
When forced entry is not used, the structure was
open or unlocked
207
Burglars can be categorized into 3 levels of experience:
A professional burglar A novice burglar A mid-range burglar
208
Of the perpetrator did not ransack the palace, he/she is likely
familiar with the building
209
CRAVED defines the type of items commonly stolen by burglars
``` Concealable Removable Available Valuable Enjoyable Disposable ```
210
A lot of solved burglars are due to the
identification and recovery of stolen property
211
Stealing property is largely to support a
drug habit
212
There are 6 ways in which money is quickly converted into cash
Sell the property to a friend or relative Trade the property for drugs Sell the property to a professional fence Sell the stolen property toa pawnshop or second-hand store Sell the property to strangers Keep the property for themselves
213
Physical evidence in burglary scenes are often in the
form of tool markers at the point of entry or exit
214
Despite the benefits of collecting DNA to identify a perpetrator, it is often not done because the process is too
expensive
215
(Burglary Investigations) Informants may come forward with
info
216
Many burglars commit more than one crime, so it is important to determine
the extent of burglaries in which a burglar is responsible for
217
Motor vehicle theft is when
an individual steals or attempts to steal an automobile, truck, bus, motorcycle, snowmobile, or motor scooter
218
Most involve automobiles and are stolen by
juveniles for the purpose of “joyriding”
219
Motor vehicle theft has
Low clearance rates because they are difficult to solve, They often have no witness or physical evidence
220
The best chance at apprehension is when the vehicle is located with the
perpetrator in it, through this is rare
221
Indicators that a vehicle may be stolen
Vehicles being operated without ignition keys A broken steering column Broken windows The car has parts that are not consistent with the rest of the car VINs on a vehicle that do not match License plates that do not register to the vehicle they are on
222
VINs are a series of
letters and numbers unique to each car. Stolen vehicle VINs are entered in NCIC
223
LPRs are
cameras attached to squad cars that can identify stolen vehicles
224
Methods used to commit vehicle theft
Hot-wiring a car Stealing keys from a parking lot attendant Towing the car away Partaking in a bump and run Obtaining the ignition code number from the vehicle to make a duplicate key
225
Motivations for committing vehicle theft:
Joyriding and Profit
226
Motivations for committing vehicle theft: Profit
Vehicle reported as stolen by owner for insurance benefits Selling cars overseas Stripped for parts at a “chop shop”
227
Evidence and investigative Strategies of Vehicle Theft- Physical Evidence
A stolen vehicle must be processed for fingerprints and DNA
228
Evidence and investigative Strategies of Vehicle Theft- Eyewitnesses
Are rare, but can be incredibly beneficial to these investigations
229
Evidence and investigative Strategies of Vehicle Theft- Surveillance cameras
Cars parked in parking lots are most vulnerable to theft but the theft may be caught on surveillance video
230
Evidence and investigative Strategies of Vehicle Theft- Bait car investigative strategy
A bait car is a way to apprehend auto thieves through the presentation of an opportunity for theft
231
Evidence and investigative Strategies of Vehicle Theft- Investigative task forces
Auto theft task forces are created to identify and apprehend auto thieves through the effort of multiple agencies