Final Part 2 Flashcards

1
Q

Arson refers to the willful

A

burning or attempting to burn something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Arson, the fire must be

A

deliberately set by someone for the purpose of causing harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal of the first responders is to prevent

A

human harm, render aid to the injured and extinguish the fire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Investigators in an Arson fire must:

A

Communicate with first responders
Establish the scope, size, and boundaries of the scene
Identify and interview individuals at the scene
Determine the security access to the scene prior to and during the fire
Identify what is needed to collect evidence at the scene
Photograph the scene
Collect, package and preserve evidence by maintaining the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The cause of a fire can be classified as

A

Natural, Accidental, Suspicious, Incendiary, and Of unknown origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The presence of an accelerant is usually indicative of

A

arson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It’s necessary to determine the point of origin

A

Through the identification of items that cause fires to occur
Through interviews with witnesses and surveillance videos
Through fire patterns
Through examining objects like flammable liquids and light bulbs
Through the examination of the destruction of certain areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is difficult to determine who committed arson because

A

witnesses and physical evidence are rarely available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

But motive can aid in

A

identifying the perpetrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some commit arson

A

out of anger or revenge, as an act of terrorism, to vandalize, to conceal other crimes, for-profit, and for emotional satisfaction (pyromania)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Larceny (Theft) can be defined as the unlawful

A

taking away of property from someone else’s possession without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Larceny (Theft) is the most

A

common form of property crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Few larcenies are ever solved because

A

investigators often have few investigative leads to pursue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Larceny has usually

A

No witnesses, No usable evidence, Little variation in motive, and The property taken is not remarkable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The most effective interrogation strategy for these crimes is largely dependent upon

A

the individual characteristics of the offender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An emotional offender will be most responsive to

A

emotional themes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A non-emotional offender will be the most responsive to

A

factual themes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fraud refers to all the ways a person can

A

falsely represent a fact in order to get someone to surrender something of value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Types of fraud

A

Tax evasion, Bribery, Embezzlement, Forgery, Blackmail, Extortion, Kick-back, Racketeering, Insider trading, Money Laundering, Insurance fraud, and Welfare and food stamp fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

80 billion

A

dollars in fraud a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identity theft involves the stealing and use of

A

an individual’s personal information without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identifying theft has a financial motive typically

A

though revenge and embarrassment can also be motivators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Types of Identify Theft

A

Criminal identity theft, Financial identity theft, Identity cloning, and Medical identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Identities can be stolen through

A

purse snatching, stealing mail, going through garbage, hacking, and creating counterfeit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Identify Theft Investigations can be simple or complicated
depending on the number of agencies involved and the extent of the crime known
26
First, the victim’s local police department has the first jurisdiction of the crime (about fraud)
The victim provides information regarding the crimes, always verifying that they are who they say they are
27
Next, investigators may examine the fraudulent charges with the financial and credit bureau documents
E-information and FinCEN are resources available to investigators of identity theft
28
The goal is to
identify the perpetrator and other potential victims
29
Credit and debit card fraud usually involves the
stealing of a card and then using it to make unauthorized purchases
30
The most common methods of committing this crime are (Debit/Credit)
“Passing and cashing” Alteration of checks Presentation of the check or card at checkout “Card-not-present” purchase Denial of receiving a legitimate purchase
31
Investigative actions for fraud
Obtain a hard copy of the fraudulent documents Investigative the robbery or burglary associated with the crime, it exists Searching suspects possessions Determining the date, time, and place of the fraudulent use Locate the fraudulently purchased property
32
Prescription drug fraud involves the
misuse of drugs
33
Pain relievers and stimulants are often the
prescription drugs of choice for many criminals
34
Methods of obtaining prescription drugs
``` Theft Forged prescriptions Impersonation of medical staff Doctor shopping Illegal purchases on the internet ```
35
The investigation of fraud is dependent upon
A third party notifying the police The police themselves discovered the illegal drugs A doctor's office or pharmacy reports suspicious behaviors to the police
36
Cyber-attacks are
crimes where the computer system is the target
37
Cyber-bullying may involve sending or posting
Mean or false messages, starting or circulating rumors, stealing email passwords, and sending messages through the Internal. May or not be criminal
38
“Sextortion” is a form of cyberbullying that
often leads to criminal charges
39
“Sextortion” typically involves the sending of compromising photos to a person claiming
to be someone they are not. The person receiving the photos threatens to distribute the photos unless the victim agrees to some demand
40
Child Pornography can be widely distributed through the use of the
Internet, further complicating the crime through the use of anonymity and accessibility
41
Three crimes the constitute child pornography
The production of pornographic images The distribution of pornographic images The downloading/possession of pornographic images
42
When Investigating Child Pornography Focus on electronic (digital) evidence such as
hard drives, Web browser history, e-mail and chat logs, digital cameras, mobile phones, IP addresses, and “digger engine” software
43
The collection and processing of this evidence is done by
trained experts
44
Investigators locate and remove child pornography sites through the use of
undercover sting operation or “buy-bust” operations
45
These crimes come to the attention of the police through
the public, computer technicians, or victims
46
Digital evidence is
information and data or values to a police investigation that is tired, retrieved or transmitted by an electronic device
47
The device must first be identified as being
potentially relevant in the investigation
48
An IP address is
an identifying number that is associated with a computer. This is incredibly beneficial in criminal investigations
49
Digital evidence can be found in the memory of the device
Magnetic memory Optical memory Electronic memory
50
Investigators must copy the data on a new blank hard drive, examine the data for
deleted or “latent” files, and examine the system files compiled by the computer operating system
51
The identification and apprehension of criminals is not
the end of the road for criminal investigations
52
Investigators have to be effective and
competent witnesses in court
53
Investigators play an important role in the
persecution of offenders
54
There are severe consequences to prosecuting an individual therefore it is important that the police are aware of the price of
bad judicial outcomes
55
The court process is adversarial in nature, meaning that it is
a contest to obtain justice through opposing teams (defense attorneys and prosecuting attorneys) and a neutral referee (judge).
56
The police are on the
prosecutor’s team
57
Defense attorneys have to
discredit witness
58
Prosecuting attorneys have the burden of
proof probable cause in train through the many resources available to them
59
Police officers and investigators are to present the observed
facts of the case for the prosecution and be tested by the defense
60
Error in justice outcomes (when an innocent person receives a conviction or a guilty person goes free) can have
serious and devastating effects
61
Reasons for error in justice outcomes:
DNA evidence was collected at the times but analysis not being used yet Police misconduct and incompetence Prosecutorial misconduct and incompetence Defense attorney misconduct and incompetence Inept judges
62
Incident reports are
written documents that contain information about a criminal investigation
63
Supplementary reposts consist of a narrative that
describes the lead of a case, the results of any lead, and statements made from witnesses and suspects
64
Rules of Report Writing
Reports should be well organized, factual, specific, and detailed, written in past tense first person and active voice, accurate, objective, written in Standard written English
65
All evidence in court is presented through either lay witnesses or
expert witness
66
Lay witnesses can
testify only in their observations of fact. They cannot offer opinions
67
Investigator testimony is a
lay witness testimony
68
Expert witnesses can testify to their
opinion and discuss hypothetical scenarios. They are usually someone with a skill or knowledge on a particular topic, Often are hired and compensated for their testimony
69
Investigators are required to provide
testimony
70
A deposition is a proceeding that does not
occur in court and is before a trial. A deposition provides an attorney an opportunity to ask questions of a witness before the case goes to trial
71
A preliminary hearing is a mini-trial of sorts with the purpose of
providing that a crime occurred in that the defendant committed it the standard of proof needed by the prosecutor is probable cause
72
A trial may be a bench trial (judge determine the verdict) or
a jury trial (jury determines the verdicts)
73
Trial Steps
``` Voir dire (jury selection) Opening statement by the prosecution Opening statement by the defense attorney The presentation of the prosecution case The presentation of the defense case Closing statements Instruction to the jury by the judge Jury deliberations Reading of the verdict ```
74
A direct examination elects the facts of a case, a cross-examination is
designed to test the evidence presented with the goal of impeaching the witness
75
Cross-examination strategies
Ask leading questions Badger, anger, to annoy the investigator Ask difficult or slanted questions Ask the witness about the legality of the actions taken by the investigator Attack the quality/accuracy of the investigative reports Look for inconsistencies Call into question statement of fact and opinions Call into question the witness honesty and credibility Confuse or otherwise fluster the witness
76
Guideline for Investigator in creating effective testimony in court
``` Tell the truth Be prepared Stick to the fact Answer only the questions asked Be mindful of non-verbal communication Be respectful Speak directly, clearly, and confidently Listen and think before you speak Be professional ```
77
Investigators should not
Comment on a defendant's criminal record Use a defendant's use or nonuse of their Miranda rights as evidence Use a defendant's attempts to negotiate a plea bargain as evidence Provide testimony on evidence that has been ruled inadmissible by the judge
78
The political era
Politicians controlled virtually all aspects of policing | It ended as a result of a crisis: technology (specifically, automobiles)
79
The reform era
Took advantage of technology by making it available to the police so that they can be more effective at crime control It ended as a result of crisis: assassinations, riots, and counter-culture movements led to a doubling crime rate
80
The community problem-solving era
Police recognize the importance of having citizens participating in crime-stopping and crime solving What crisis will end this era? Maybe technological demands?
81
The information revolution is affecting
every aspect of human life
82
Crime is expanding and evolving, just as
tech is.
83
Over time, crime is becoming more
sophisticated and more global
84
Terrorism, tech, citizens as powerful players in crime-fighting, and blurred lines between
the police and the military will characterize the future of policing
85
Terrorism is one of these “new” demands of the police as technology is
advancing
86
Terrorism is the
unlawful use of force or violence against the property of persons to intimidate people to further political or social objectives (FBI)
87
Terrorism can be domestic or
international
88
Domestic terrorism is motivated by
anti-government agendas
89
Foreign-based terrorism is motivated by
Anti-American agendas
90
Terrorism is not a new phenomenon, but it has been
increasing in recent years
91
Law enforcement and government agencies have been criticized for
not being able to predict terrorist attacks
92
The threat of international terrorist attacks is not likely to
disappear any time soon
93
Technology is rapidly being discovered and
employed in new ways
94
The most powerful piece of technology that is affecting the police is that of the
Internet
95
The Internet is a global digital network in which
info can be disseminated.
96
As tech makes crime more complex and global, more resources will likely go
to the federal government.
97
The USA Patriot Act was a response to the terrorist attacks of 9/11
It gave additional power to law enforcement Amended money laundering laws Made stricter immigration laws Expanded law enforcement’s authority to seize an individual’s records for a third party (Apple)
98
Citizen Involvement in Future Criminal Investigations
If you see something say something
99
The military is increasingly becoming involved in
domestic law enforcement activities
100
The Posse Comitatus Act of 1878, which was amended in 1994, was written to end the use of federal troops in state affairs. But this act excludes:
National Guard forces Federal troops being involved in domestic violence Military personnel combating the “war on drugs and immigration” Navy resources being used to assist the Coast Guard
101
The police are becoming increasingly military-like as well, a phenomenon is known as the “militarization of the police”
Police organizations are “quasi-military” in structure and function The police are also fighting the war or terrorism at home Military technologies are not being used by local law enforcement
102
Biometrics refers to tech capable of identifying a person by
their unique characteristics of features: Fingerprint technology, Facial recognition systems, Voice biometrics, and DNA
103
DNA
The largest database (CODIS) only has DNA evidence of convicted felons. If this database could legally expand to other populations, it might be more useful. However, to increase its use would be problematic for legal and ethical reasons
104
Technological advancements may affect the way we “see” in criminal investigations
Low-level x-rays Gunshot detection systems Thermal imaging technology can detect heat in buildings CCTV surveillance Unmanned aerial vehicles (UAVs) or “drones” Electric “sniffer” microchips may replace canines “Smart” camera and brain scans
105
Searching email traffic, keystrokes, and cell phone locations are
common practices among law enforcement investigators
106
Tech is meant to enhance work productivity by
making everyday tasks take less time
107
Laptops computers in patrol vehicles aid in the
quick communication among officers. Also, massive databases for criminal intelligence purposes speed up investigative tasks
108
Because tech is constantly changing and creating new ways of knowing and being
laws are largely incapable of keeping up.
109
Concerns of the future
Privacy issues will become a concern of the future | Operation costs will also become a concern of the future