Final Part 2 Flashcards

1
Q

Arson refers to the willful

A

burning or attempting to burn something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Arson, the fire must be

A

deliberately set by someone for the purpose of causing harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal of the first responders is to prevent

A

human harm, render aid to the injured and extinguish the fire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Investigators in an Arson fire must:

A

Communicate with first responders
Establish the scope, size, and boundaries of the scene
Identify and interview individuals at the scene
Determine the security access to the scene prior to and during the fire
Identify what is needed to collect evidence at the scene
Photograph the scene
Collect, package and preserve evidence by maintaining the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The cause of a fire can be classified as

A

Natural, Accidental, Suspicious, Incendiary, and Of unknown origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The presence of an accelerant is usually indicative of

A

arson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It’s necessary to determine the point of origin

A

Through the identification of items that cause fires to occur
Through interviews with witnesses and surveillance videos
Through fire patterns
Through examining objects like flammable liquids and light bulbs
Through the examination of the destruction of certain areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is difficult to determine who committed arson because

A

witnesses and physical evidence are rarely available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

But motive can aid in

A

identifying the perpetrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some commit arson

A

out of anger or revenge, as an act of terrorism, to vandalize, to conceal other crimes, for-profit, and for emotional satisfaction (pyromania)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Larceny (Theft) can be defined as the unlawful

A

taking away of property from someone else’s possession without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Larceny (Theft) is the most

A

common form of property crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Few larcenies are ever solved because

A

investigators often have few investigative leads to pursue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Larceny has usually

A

No witnesses, No usable evidence, Little variation in motive, and The property taken is not remarkable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The most effective interrogation strategy for these crimes is largely dependent upon

A

the individual characteristics of the offender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An emotional offender will be most responsive to

A

emotional themes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A non-emotional offender will be the most responsive to

A

factual themes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fraud refers to all the ways a person can

A

falsely represent a fact in order to get someone to surrender something of value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Types of fraud

A

Tax evasion, Bribery, Embezzlement, Forgery, Blackmail, Extortion, Kick-back, Racketeering, Insider trading, Money Laundering, Insurance fraud, and Welfare and food stamp fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

80 billion

A

dollars in fraud a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identity theft involves the stealing and use of

A

an individual’s personal information without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identifying theft has a financial motive typically

A

though revenge and embarrassment can also be motivators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Types of Identify Theft

A

Criminal identity theft, Financial identity theft, Identity cloning, and Medical identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Identities can be stolen through

A

purse snatching, stealing mail, going through garbage, hacking, and creating counterfeit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Identify Theft Investigations can be simple or complicated

A

depending on the number of agencies involved and the extent of the crime known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

First, the victim’s local police department has the first jurisdiction of the crime (about fraud)

A

The victim provides information regarding the crimes, always verifying that they are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Next, investigators may examine the fraudulent charges with the financial and credit bureau documents

A

E-information and FinCEN are resources available to investigators of identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The goal is to

A

identify the perpetrator and other potential victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Credit and debit card fraud usually involves the

A

stealing of a card and then using it to make unauthorized purchases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The most common methods of committing this crime are (Debit/Credit)

A

“Passing and cashing”
Alteration of checks
Presentation of the check or card at checkout
“Card-not-present” purchase
Denial of receiving a legitimate purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Investigative actions for fraud

A

Obtain a hard copy of the fraudulent documents
Investigative the robbery or burglary associated with the crime, it exists
Searching suspects possessions
Determining the date, time, and place of the fraudulent use
Locate the fraudulently purchased property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Prescription drug fraud involves the

A

misuse of drugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Pain relievers and stimulants are often the

A

prescription drugs of choice for many criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Methods of obtaining prescription drugs

A
Theft 
Forged prescriptions
Impersonation of medical staff
Doctor shopping
Illegal purchases on the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The investigation of fraud is dependent upon

A

A third party notifying the police
The police themselves discovered the illegal drugs
A doctor’s office or pharmacy reports suspicious behaviors to the police

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cyber-attacks are

A

crimes where the computer system is the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Cyber-bullying may involve sending or posting

A

Mean or false messages, starting or circulating rumors, stealing email passwords, and sending messages through the Internal. May or not be criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

“Sextortion” is a form of cyberbullying that

A

often leads to criminal charges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

“Sextortion” typically involves the sending of compromising photos to a person claiming

A

to be someone they are not. The person receiving the photos threatens to distribute the photos unless the victim agrees to some demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Child Pornography can be widely distributed through the use of the

A

Internet, further complicating the crime through the use of anonymity and accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Three crimes the constitute child pornography

A

The production of pornographic images
The distribution of pornographic images
The downloading/possession of pornographic images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

When Investigating Child Pornography Focus on electronic (digital) evidence such as

A

hard drives, Web browser history, e-mail and chat logs, digital cameras, mobile phones, IP addresses, and “digger engine” software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The collection and processing of this evidence is done by

A

trained experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Investigators locate and remove child pornography sites through the use of

A

undercover sting operation or “buy-bust” operations

45
Q

These crimes come to the attention of the police through

A

the public, computer technicians, or victims

46
Q

Digital evidence is

A

information and data or values to a police investigation that is tired, retrieved or transmitted by an electronic device

47
Q

The device must first be identified as being

A

potentially relevant in the investigation

48
Q

An IP address is

A

an identifying number that is associated with a computer. This is incredibly beneficial in criminal investigations

49
Q

Digital evidence can be found in the memory of the device

A

Magnetic memory
Optical memory
Electronic memory

50
Q

Investigators must copy the data on a new blank hard drive, examine the data for

A

deleted or “latent” files, and examine the system files compiled by the computer operating system

51
Q

The identification and apprehension of criminals is not

A

the end of the road for criminal investigations

52
Q

Investigators have to be effective and

A

competent witnesses in court

53
Q

Investigators play an important role in the

A

persecution of offenders

54
Q

There are severe consequences to prosecuting an individual therefore it is important that the police are aware of the price of

A

bad judicial outcomes

55
Q

The court process is adversarial in nature, meaning that it is

A

a contest to obtain justice through opposing teams (defense attorneys and prosecuting attorneys) and a neutral referee (judge).

56
Q

The police are on the

A

prosecutor’s team

57
Q

Defense attorneys have to

A

discredit witness

58
Q

Prosecuting attorneys have the burden of

A

proof probable cause in train through the many resources available to them

59
Q

Police officers and investigators are to present the observed

A

facts of the case for the prosecution and be tested by the defense

60
Q

Error in justice outcomes (when an innocent person receives a conviction or a guilty person goes free) can have

A

serious and devastating effects

61
Q

Reasons for error in justice outcomes:

A

DNA evidence was collected at the times but analysis not being used yet
Police misconduct and incompetence
Prosecutorial misconduct and incompetence
Defense attorney misconduct and incompetence
Inept judges

62
Q

Incident reports are

A

written documents that contain information about a criminal investigation

63
Q

Supplementary reposts consist of a narrative that

A

describes the lead of a case, the results of any lead, and statements made from witnesses and suspects

64
Q

Rules of Report Writing

A

Reports should be well organized, factual, specific, and detailed, written in past tense first person and active voice, accurate, objective, written in Standard written English

65
Q

All evidence in court is presented through either lay witnesses or

A

expert witness

66
Q

Lay witnesses can

A

testify only in their observations of fact. They cannot offer opinions

67
Q

Investigator testimony is a

A

lay witness testimony

68
Q

Expert witnesses can testify to their

A

opinion and discuss hypothetical scenarios. They are usually someone with a skill or knowledge on a particular topic, Often are hired and compensated for their testimony

69
Q

Investigators are required to provide

A

testimony

70
Q

A deposition is a proceeding that does not

A

occur in court and is before a trial. A deposition provides an attorney an opportunity to ask questions of a witness before the case goes to trial

71
Q

A preliminary hearing is a mini-trial of sorts with the purpose of

A

providing that a crime occurred in that the defendant committed it the standard of proof needed by the prosecutor is probable cause

72
Q

A trial may be a bench trial (judge determine the verdict) or

A

a jury trial (jury determines the verdicts)

73
Q

Trial Steps

A
Voir dire (jury selection)
Opening statement by the prosecution
Opening statement by the defense attorney
The presentation of the prosecution case
The presentation of the defense case
Closing statements
Instruction to the jury by the judge 
Jury deliberations
Reading of the verdict
74
Q

A direct examination elects the facts of a case, a cross-examination is

A

designed to test the evidence presented with the goal of impeaching the witness

75
Q

Cross-examination strategies

A

Ask leading questions
Badger, anger, to annoy the investigator
Ask difficult or slanted questions
Ask the witness about the legality of the actions taken by the investigator
Attack the quality/accuracy of the investigative reports
Look for inconsistencies
Call into question statement of fact and opinions
Call into question the witness honesty and credibility
Confuse or otherwise fluster the witness

76
Q

Guideline for Investigator in creating effective testimony in court

A
Tell the truth
Be prepared
Stick to the fact
Answer only the questions asked
Be mindful of non-verbal communication
Be respectful
Speak directly, clearly, and confidently
Listen and think before you speak
Be professional
77
Q

Investigators should not

A

Comment on a defendant’s criminal record
Use a defendant’s use or nonuse of their Miranda rights as evidence
Use a defendant’s attempts to negotiate a plea bargain as evidence
Provide testimony on evidence that has been ruled inadmissible by the judge

78
Q

The political era

A

Politicians controlled virtually all aspects of policing

It ended as a result of a crisis: technology (specifically, automobiles)

79
Q

The reform era

A

Took advantage of technology by making it available to the police so that they can be more effective at crime control
It ended as a result of crisis: assassinations, riots, and counter-culture movements led to a doubling crime rate

80
Q

The community problem-solving era

A

Police recognize the importance of having citizens participating in crime-stopping and crime solving
What crisis will end this era?
Maybe technological demands?

81
Q

The information revolution is affecting

A

every aspect of human life

82
Q

Crime is expanding and evolving, just as

A

tech is.

83
Q

Over time, crime is becoming more

A

sophisticated and more global

84
Q

Terrorism, tech, citizens as powerful players in crime-fighting, and blurred lines between

A

the police and the military will characterize the future of policing

85
Q

Terrorism is one of these “new” demands of the police as technology is

A

advancing

86
Q

Terrorism is the

A

unlawful use of force or violence against the property of persons to intimidate people to further political or social objectives (FBI)

87
Q

Terrorism can be domestic or

A

international

88
Q

Domestic terrorism is motivated by

A

anti-government agendas

89
Q

Foreign-based terrorism is motivated by

A

Anti-American agendas

90
Q

Terrorism is not a new phenomenon, but it has been

A

increasing in recent years

91
Q

Law enforcement and government agencies have been criticized for

A

not being able to predict terrorist attacks

92
Q

The threat of international terrorist attacks is not likely to

A

disappear any time soon

93
Q

Technology is rapidly being discovered and

A

employed in new ways

94
Q

The most powerful piece of technology that is affecting the police is that of the

A

Internet

95
Q

The Internet is a global digital network in which

A

info can be disseminated.

96
Q

As tech makes crime more complex and global, more resources will likely go

A

to the federal government.

97
Q

The USA Patriot Act was a response to the terrorist attacks of 9/11

A

It gave additional power to law enforcement
Amended money laundering laws
Made stricter immigration laws
Expanded law enforcement’s authority to seize an individual’s records for a third party (Apple)

98
Q

Citizen Involvement in Future Criminal Investigations

A

If you see something say something

99
Q

The military is increasingly becoming involved in

A

domestic law enforcement activities

100
Q

The Posse Comitatus Act of 1878, which was amended in 1994, was written to end the use of federal troops in state affairs. But this act excludes:

A

National Guard forces
Federal troops being involved in domestic violence
Military personnel combating the “war on drugs and immigration”
Navy resources being used to assist the Coast Guard

101
Q

The police are becoming increasingly military-like as well, a phenomenon is known as the “militarization of the police”

A

Police organizations are “quasi-military” in structure and function
The police are also fighting the war or terrorism at home
Military technologies are not being used by local law enforcement

102
Q

Biometrics refers to tech capable of identifying a person by

A

their unique characteristics of features: Fingerprint technology, Facial recognition systems, Voice biometrics, and DNA

103
Q

DNA

A

The largest database (CODIS) only has DNA evidence of convicted felons. If this database could legally expand to other populations, it might be more useful. However, to increase its use would be problematic for legal and ethical reasons

104
Q

Technological advancements may affect the way we “see” in criminal investigations

A

Low-level x-rays
Gunshot detection systems
Thermal imaging technology can detect heat in buildings
CCTV surveillance
Unmanned aerial vehicles (UAVs) or “drones”
Electric “sniffer” microchips may replace canines
“Smart” camera and brain scans

105
Q

Searching email traffic, keystrokes, and cell phone locations are

A

common practices among law enforcement investigators

106
Q

Tech is meant to enhance work productivity by

A

making everyday tasks take less time

107
Q

Laptops computers in patrol vehicles aid in the

A

quick communication among officers. Also, massive databases for criminal intelligence purposes speed up investigative tasks

108
Q

Because tech is constantly changing and creating new ways of knowing and being

A

laws are largely incapable of keeping up.

109
Q

Concerns of the future

A

Privacy issues will become a concern of the future

Operation costs will also become a concern of the future