Final Part 2 Flashcards
Arson refers to the willful
burning or attempting to burn something.
In Arson, the fire must be
deliberately set by someone for the purpose of causing harm
The goal of the first responders is to prevent
human harm, render aid to the injured and extinguish the fire
Investigators in an Arson fire must:
Communicate with first responders
Establish the scope, size, and boundaries of the scene
Identify and interview individuals at the scene
Determine the security access to the scene prior to and during the fire
Identify what is needed to collect evidence at the scene
Photograph the scene
Collect, package and preserve evidence by maintaining the chain of custody
The cause of a fire can be classified as
Natural, Accidental, Suspicious, Incendiary, and Of unknown origin
The presence of an accelerant is usually indicative of
arson
It’s necessary to determine the point of origin
Through the identification of items that cause fires to occur
Through interviews with witnesses and surveillance videos
Through fire patterns
Through examining objects like flammable liquids and light bulbs
Through the examination of the destruction of certain areas
It is difficult to determine who committed arson because
witnesses and physical evidence are rarely available
But motive can aid in
identifying the perpetrator
Some commit arson
out of anger or revenge, as an act of terrorism, to vandalize, to conceal other crimes, for-profit, and for emotional satisfaction (pyromania)
Larceny (Theft) can be defined as the unlawful
taking away of property from someone else’s possession without permission
Larceny (Theft) is the most
common form of property crime
Few larcenies are ever solved because
investigators often have few investigative leads to pursue
Larceny has usually
No witnesses, No usable evidence, Little variation in motive, and The property taken is not remarkable
The most effective interrogation strategy for these crimes is largely dependent upon
the individual characteristics of the offender
An emotional offender will be most responsive to
emotional themes
A non-emotional offender will be the most responsive to
factual themes
Fraud refers to all the ways a person can
falsely represent a fact in order to get someone to surrender something of value
Types of fraud
Tax evasion, Bribery, Embezzlement, Forgery, Blackmail, Extortion, Kick-back, Racketeering, Insider trading, Money Laundering, Insurance fraud, and Welfare and food stamp fraud
80 billion
dollars in fraud a year
Identity theft involves the stealing and use of
an individual’s personal information without their permission
Identifying theft has a financial motive typically
though revenge and embarrassment can also be motivators
Types of Identify Theft
Criminal identity theft, Financial identity theft, Identity cloning, and Medical identity theft
Identities can be stolen through
purse snatching, stealing mail, going through garbage, hacking, and creating counterfeit
Identify Theft Investigations can be simple or complicated
depending on the number of agencies involved and the extent of the crime known
First, the victim’s local police department has the first jurisdiction of the crime (about fraud)
The victim provides information regarding the crimes, always verifying that they are who they say they are
Next, investigators may examine the fraudulent charges with the financial and credit bureau documents
E-information and FinCEN are resources available to investigators of identity theft
The goal is to
identify the perpetrator and other potential victims
Credit and debit card fraud usually involves the
stealing of a card and then using it to make unauthorized purchases
The most common methods of committing this crime are (Debit/Credit)
“Passing and cashing”
Alteration of checks
Presentation of the check or card at checkout
“Card-not-present” purchase
Denial of receiving a legitimate purchase
Investigative actions for fraud
Obtain a hard copy of the fraudulent documents
Investigative the robbery or burglary associated with the crime, it exists
Searching suspects possessions
Determining the date, time, and place of the fraudulent use
Locate the fraudulently purchased property
Prescription drug fraud involves the
misuse of drugs
Pain relievers and stimulants are often the
prescription drugs of choice for many criminals
Methods of obtaining prescription drugs
Theft Forged prescriptions Impersonation of medical staff Doctor shopping Illegal purchases on the internet
The investigation of fraud is dependent upon
A third party notifying the police
The police themselves discovered the illegal drugs
A doctor’s office or pharmacy reports suspicious behaviors to the police
Cyber-attacks are
crimes where the computer system is the target
Cyber-bullying may involve sending or posting
Mean or false messages, starting or circulating rumors, stealing email passwords, and sending messages through the Internal. May or not be criminal
“Sextortion” is a form of cyberbullying that
often leads to criminal charges
“Sextortion” typically involves the sending of compromising photos to a person claiming
to be someone they are not. The person receiving the photos threatens to distribute the photos unless the victim agrees to some demand
Child Pornography can be widely distributed through the use of the
Internet, further complicating the crime through the use of anonymity and accessibility
Three crimes the constitute child pornography
The production of pornographic images
The distribution of pornographic images
The downloading/possession of pornographic images
When Investigating Child Pornography Focus on electronic (digital) evidence such as
hard drives, Web browser history, e-mail and chat logs, digital cameras, mobile phones, IP addresses, and “digger engine” software
The collection and processing of this evidence is done by
trained experts