• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/338

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

338 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

What is Forensic Anthropology?

The application of the science of anthropology in human osteology a legal setting, most often in criminal cases where the victim's remains are in the advanced stages of decomposition.

Chapt 1: foundations and History of Criminal Investigation

Who is Mickey Spillane?

An Irish-American mobster from Hell's Kitchen, NY who was called the "last of the gentleman gangsters" was a marked contrast to the violent Westies mob members who succeeded him.

Who were the Bow Street Runners?

London's first professional police force founded in 1749 by Henry Fielding.

When was the Pinkerton Government Services founded?

Founded in 1850 by Allan Pinkerton

What is Serology?

The scientific study of blood serum and other bodily fluids. The diagnostic identification of antibodies in the serum.

What is the CSI effect?

Is any of several ways in which the exaggerated portrayal of forensic science on crime television shows such a CSI: crime scene investigation influences public perception.

What is forensic entomology?

The study of insect and other anthropod biology to criminal matters.

Like Dr. Hodgins on "Bones".

What is ballistics?

The science of mechanics that deals with the flight, behavior, and effects of projectiles, especially bullets, gravity bombs, rockets, or the like; the science or art of designing and accelerating projectiles so as to achieve a desired performance.

What is inductive reasoning?

Induction, sometimes called inductive logic, is reasoning that takes us beyond what we know to conclusions about what we don't know.

What is deductive reasoning?

Reasoning based on specific pieces of evidence to establish proof that the suspect is guilty of an offense.

What is abduction as defined by Nordby who wrote: Dead Reckoning: The Art of Forensic Detection?

The process, therefore, of proposing a likely explanation for anything that must be tested.

Edward Glaser wrote that the ability to think critically involved what three things?

1.) An attitude of being disposed to consider in a thoughtful way the problems and subjects that come within the range of one's experiences


2.) knowledge of the methods of logical inquiry and reasoning


3.) some skill in applying those methods

What is the Bertillon System?

The creation of a personal identification system created by Alphonse Bertillon.

What is the order of the crime scene response?

1.) Aid to the injured


2.) evaluate the situation


3.) obtain basic information


4.) interview witnesses

What is digital imaging?

The creation of digital images, typically from a physical scene.

What is the best evidence rule?

A common-law rule of evidence which can be traced back at least as far as the 18th century. In Omychund v Barker Lord Harwicke stated that no evidence was admissible unless it was 'the best that the nature of the case will allow'.

What is chain of custody?

It should reflect how the evidence was collected, who handled them and the where, and how they are stored, and who now had possession of it.

The admissibility if photographic evidence pertains to materiality. What is a material photograph?

One that relates to and makes a substantive contribution to the specific case in question

The admissibility if photographic evidence pertains to materiality. What is a material photograph?

One that relates to and makes a substantive contribution to the specific case in question

What is a relevant photograph?

Applies to the matter in question and is used to support testimony. It is representative of the evidence that relates it to the matter in question to determine the truth of the circumstances.

The admissibility if photographic evidence pertains to materiality. What is a material photograph?

One that relates to and makes a substantive contribution to the specific case in question

What is a relevant photograph?

Applies to the matter in question and is used to support testimony. It is representative of the evidence that relates it to the matter in question to determine the truth of the circumstances.

What is prejudicial images?

Any photograph or image admitted must not be prejudicial, or appeal unfairly to the emotions of the jury.

The admissibility if photographic evidence pertains to materiality. What is a material photograph?

One that relates to and makes a substantive contribution to the specific case in question

What is a relevant photograph?

Applies to the matter in question and is used to support testimony. It is representative of the evidence that relates it to the matter in question to determine the truth of the circumstances.

What is prejudicial images?

Any photograph or image admitted must not be prejudicial, or appeal unfairly to the emotions of the jury.

What are the three types of distortion common in photographs?

1.) incorrect point of view


2.) perspective


3.) misrepresentation of tone or color

What are the three most widely used sketch methods?

1.) coordinate method


2.) triangulation method


3.) cross-projection method

What are the three most widely used sketch methods?

1.) coordinate method


2.) triangulation method


3.) cross-projection method

What is the coordinate sketch method?

Uses the practice of measuring an object from two fixed points of reference. Like the baseline technique

What are the three most widely used sketch methods?

1.) coordinate method


2.) triangulation method


3.) cross-projection method

What is the coordinate sketch method?

Uses the practice of measuring an object from two fixed points of reference. Like the baseline technique

What is the triangulation sketch method?

A birds-eye view of the scene that uses fixed objects from which to measure. For outdoor crime scenes.

What are the three most widely used sketch methods?

1.) coordinate method


2.) triangulation method


3.) cross-projection method

What is the coordinate sketch method?

Uses the practice of measuring an object from two fixed points of reference. Like the baseline technique

What is the triangulation sketch method?

A birds-eye view of the scene that uses fixed objects from which to measure. For outdoor crime scenes.

What is the cross-projection sketch method?

Used on indoor crime scenes. It is basically the top-down view of the crime scene, with the walls of the room "folded" down to the locations of bullet holes, blood-spatter evidence, and so on which would not be apparent otherwise.

What is the Locard exchange principle?

Edmond Locard was the director of the first known crime lab - it states when the perpetrator(s) of a crime comes into contact with the scene, so he or she will bring something into the scene and leave with something from the scene.

Every contact leaves a trace.

What is trace evidence?

Minute or even microscopic bits of matter that are not immediately apparent to the naked eye.

What is Corpus Delicti?

Evidence that establishes that a crime has been committed.

What is Corpus Delicti?

Evidence that establishes that a crime has been committed.

What is associative evidence?

Evidence which links a suspect with the crime, such as fingerprints, footprints, bloodstains, and fibers.

What is physical evidence?

Self-explanatory and examples are weapons, blood, fingerprints, drugs...etc...

What is physical evidence?

Self-explanatory and examples are weapons, blood, fingerprints, drugs...etc...

What is direct or prima facie evidence?

Evidence established by law that at face value proves a fact in dispute.

What is physical evidence?

Self-explanatory and examples are weapons, blood, fingerprints, drugs...etc...

What is direct or prima facie evidence?

Evidence established by law that at face value proves a fact in dispute.

What is indirect or circumstantial evidence?

Evidence which tends to incriminate a person without offering conclusive proof.

What is physical evidence?

Self-explanatory and examples are weapons, blood, fingerprints, drugs...etc...

What is direct or prima facie evidence?

Evidence established by law that at face value proves a fact in dispute.

What is indirect or circumstantial evidence?

Evidence which tends to incriminate a person without offering conclusive proof.

What is testimonial evidence?

Verbal statement offered by a witness while under oat or affirmation.

What is physical evidence?

Self-explanatory and examples are weapons, blood, fingerprints, drugs...etc...

What is direct or prima facie evidence?

Evidence established by law that at face value proves a fact in dispute.

What is indirect or circumstantial evidence?

Evidence which tends to incriminate a person without offering conclusive proof.

What is testimonial evidence?

Verbal statement offered by a witness while under oat or affirmation.

What is trace evidence?

Consists of extremely small items of evidence, such as hairs, clothing fibers, etc...

What is physical evidence?

Self-explanatory and examples are weapons, blood, fingerprints, drugs...etc...

What is direct or prima facie evidence?

Evidence established by law that at face value proves a fact in dispute.

What is indirect or circumstantial evidence?

Evidence which tends to incriminate a person without offering conclusive proof.

What is testimonial evidence?

Verbal statement offered by a witness while under oath or affirmation.

What is trace evidence?

Consists of extremely small items of evidence, such as hairs, clothing fibers, etc...

What is demonstrative evidence?

Evidence used to demonstrate or clarify an issue rather than to prove something.

What are the 7 actions of the first officer responding to a scene?

1.) en route be alert to perpetrators vehicles, or perpetrators fleeing from the scene


2.) upon arrival verify that a crime has been committed


3.) assist victims, protect witnesses, and bystanders


4.) arrest perpetrator


5.) follow-up communications with headquarters


6.) identify witnesses and vehicles


7.) brief investigators and superiors

The first responders responsibilities

What are the five elements of securing a crime scene?

1.) define the crime scene area


2.) request backup to help restrict access to crime scene and control onlookers


3.) clear the interior of the crime scene area


4.) record actions previously taken at the scene


5.) restrict access to the scene

Chapt 3 pg 72

What are the five elements of securing a crime scene?

1.) define the crime scene area


2.) request backup to help restrict access to crime scene and control onlookers


3.) clear the interior of the crime scene area


4.) record actions previously taken at the scene


5.) restrict access to the scene

Chapt 3 pg 72

Electronic evidence has what four special characteristics?

1.) it is latent


2.) it can transcend national and state borders quickly and easily


3.) it is fragile and can be easily altered, damaged, compromised, or destroyed by improper handling


4.) it may not be time sensitive

What are the five elements of securing a crime scene?

1.) define the crime scene area


2.) request backup to help restrict access to crime scene and control onlookers


3.) clear the interior of the crime scene area


4.) record actions previously taken at the scene


5.) restrict access to the scene

Chapt 3 pg 72

Electronic evidence has what four special characteristics?

1.) it is latent


2.) it can transcend national and state borders quickly and easily


3.) it is fragile and can be easily altered, damaged, compromised, or destroyed by improper handling


4.) it may not be time sensitive

Fill in the blank


Similar to DNA and fingerprints, electronic surveillance is _______ _________ (two words).

Latent evidence

What are the five elements of securing a crime scene?

1.) define the crime scene area


2.) request backup to help restrict access to crime scene and control onlookers


3.) clear the interior of the crime scene area


4.) record actions previously taken at the scene


5.) restrict access to the scene

Chapt 3 pg 72

Electronic evidence has what four special characteristics?

1.) it is latent


2.) it can transcend national and state borders quickly and easily


3.) it is fragile and can be easily altered, damaged, compromised, or destroyed by improper handling


4.) it may not be time sensitive

Fill in the blank


Similar to DNA and fingerprints, electronic surveillance is _______ _________ (two words).

Latent evidence

What does TWGECSI stand for?

Technical working Group for Electronic Crime Scene Investigation

What is the technical working group for electronic crime scene investigation specify?

That Law enforcement must take special precautions when documenting, collecting, preserving, and examining electronic evidence to maintain it's integrity.

Evidence samples that may be subject to DNA testing must be kept in what state to avoid deterioration?

Frozen.

Bio hazardous material pg 76

Evidence samples that may be subject to DNA testing must be kept in what state to avoid deterioration?

Frozen.

Bio hazardous material pg 76

What state should samples that are destined for blood typing and certain other forensic tests be kept in?

Refrigerated.

Bio hazardous waste pg 76

Why is the crime scene "walk through" so crucial?

It provides an overview of the entire scene, identifies any threats to the scene integrity, and ensures protection of physical evidence.

What four objectives does the evidence discovered at the scene serve?

1.) to determine the facts of the crime


2.) identify the lawbreaker


3.) to aid in the arrest of the perpetrator


4.) to aid in the criminal prosecution of the perpetrator

The search of the crime scene consists of what four distinct phases?

1.) surveying the crime scene


2.) documenting the crime scene through sketches and photos


3.) recording all physical evidence


4.) searching for fingerprints

What are the most common search patterns?

1.) spiral search method


2.) grid method


3.) strip or line search


4.) quadrant or zone search

An indoor crime scene is best searched using which method?

The quadrant or zone search- dividing the room in half by two officers and at the conclusion the investigators switch halves.

An indoor crime scene is best searched using which method?

The quadrant or zone search- dividing the room in half by two officers and at the conclusion the investigators switch halves.

Which method of searching is best used for outdoor crime scenes?

The grid method- by using rope to average 6 sqft making it a manageable size to search.

An indoor crime scene is best searched using which method?

The quadrant or zone search- dividing the room in half by two officers and at the conclusion the investigators switch halves.

Which method of searching is best used for outdoor crime scenes?

The grid method- by using rope to average 6 sqft making it a manageable size to search.

What should be used for nighttime crime scene searches?

Lighting generators.

An indoor crime scene is best searched using which method?

The quadrant or zone search- dividing the room in half by two officers and at the conclusion the investigators switch halves.

Which method of searching is best used for outdoor crime scenes?

The grid method- by using rope to average 6 sqft making it a manageable size to search.

What should be used for nighttime crime scene searches?

Lighting generators.

What certain areas of cartridges are typically used for identification?

1.) the base


2.) and the rim or cannelure (just above the base of the case)

What guidelines should be followed when considering the collection of blood?

• good photos and videos should be taken


• samples should be taken from all locations where blood is found


• blood samples can easily rot, so they should be swabbed and air dried before storage

When collected glass could be used to:

• show the direction of travel of a projectile


show the sequence of impact of a projectile


Match other broken glass

Examples of impression evidence include:

two marks (usually found on metal doors or window frames and unlocked metal desk, cabinets, and safes)


tire impressions


• foot impressions


teeth impressions (sometimes located on probably eaten food in crime scenes)

What is polymerase chain reaction?

After the stain has been identified, it is characterized by DNA analysis using the restriction fragment length polymorphism

What are latent prints?

Latent prints are impressions produced by the ridged skin on the human fingers, palms, and soles of the feet.

What is Amido black protein?

An amino acid-staining diazo dye used in biochemical research to stain for total protein on transferred membrane blots. A technique for the development of fingerprints

What is AFIS?

In 1999 FBI developed and implemented a new automated fingerprint system. AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM.

Who maintains one of the largest fingerprint repositories?

The FBI Criminal Justice Information Services Division

What is the spectrograph used for?

To identify minute samples of a substance by burning the material and interpreting the light emitted from the burning process.

What is the spectrograph used for?

To identify minute samples of a substance by burning the material and interpreting the light emitted from the burning process.

What is the spectrophotometer used for?

To analyze coloring agents in small samples such as those found in paint and cloth.

What is the spectrograph used for?

To identify minute samples of a substance by burning the material and interpreting the light emitted from the burning process.

What is the spectrophotometer used for?

To analyze coloring agents in small samples such as those found in paint and cloth.

What is the gas chromatograph used for?

Isolating gases and liquids from complex solutions or mixtures, generally in the analysis of illicit drugs, plastics, and explosives.

What is the spectrograph used for?

To identify minute samples of a substance by burning the material and interpreting the light emitted from the burning process.

What is the spectrophotometer used for?

To analyze coloring agents in small samples such as those found in paint and cloth.

What is the gas chromatograph used for?

Isolating gases and liquids from complex solutions or mixtures, generally in the analysis of illicit drugs, plastics, and explosives.

What is the mass spectrometer used for?

Used to separate and record ions according to their characteristics masses.

Who was Sir William Herschel?

A British chief administrative officer who required natives to affix their fingerprints as well as their signatures to contracts.

Who was Alphonse Bertillon?

He developed a system to measure and record the dimensions of certain bony parts of the body.

Who was Francis Galton?

A noted British anthropologist who published a book on fingerprints. The first scientific method of classifying fingerprint patterns.

Generally, fingerprints can be divided into what three main groups?

Latent, plastic, and visible

What is the definition of a latent fingerprint?

When the entire pattern of whorls on the finger, which contain small amounts of grease, oil, perspiration, or dirt, for example, is transferred to an object when it is touched.

What is the definition of a plastic fingerprint?

Results when a finger presses against plastic material and leaves a negative impression of friction ridges. Typically found on recently painted surfaces. In wax, grease, tar, and putty.

What is the definition of a plastic fingerprint?

Results when a finger presses against plastic material and leaves a negative impression of friction ridges. Typically found on recently painted surfaces. In wax, grease, tar, and putty.

What is the definition of a visible fingerprint?

Is a print that has been adulterated with foreign matter.

What are the types of patterns for fingerprints?

• Arch loop


• Whorl


• Plain radial


• Plain tented


•Ulnar


• Accidental double


• Central pocket

The only patterns in which one needs to define pattern areas for classification purposes are which two patterns?

Loops and Whorls

The only patterns in which one needs to define pattern areas for classification purposes are which two patterns?

Loops and Whorls

The US department of justice defines the pattern area of a fingerprint as what?

The part of a loop or whorl in which appear the cores, deltas, and ridges with which we are concerned when classifying

The only patterns in which one needs to define pattern areas for classification purposes are which two patterns?

Loops and Whorls

The US department of justice defines the pattern area of a fingerprint as what?

The part of a loop or whorl in which appear the cores, deltas, and ridges with which we are concerned when classifying

What does Type lines mean?

The two innermost ridges, which start parallel, diverge, and surround or tend to surround the pattern area.

When is powder used to develop a fingerprint?

When a latent print is clearly visible. The powder method is used to develop fingerprints by making them show up on the surface where they would otherwise go unnoticed

When is powder used to develop a fingerprint?

When a latent print is clearly visible. The powder method is used to develop fingerprints by making them show up on the surface where they would otherwise go unnoticed

When is iodine used in developing fingerprints?

It is used on the premise that it attacks the object and changes its color. It's generally used on paper and wood.

Fill in the blank


Iodine fumes are controlled through the use of an iodine gun for ________ specimens.,

Smaller

Fill in the blank


Iodine fumes are controlled through the use of an iodine gun for ________ specimens.,

Smaller

Fill in the blank


Iodine fumes are controlled through the use of a fuming cabinet for ________ specimens.

Larger.

What is the ninhydrin process?

Generally the most common method of fingerprint development for latent prints. Involving the development of prints using amino acids, present as a result of perspiration.

What is silver nitrate used for?

Developing latent prints by the use of silver nitrate caused by the reaction of sodium chloride present in perspiration.

When was CODIS developed?

In 1990 by the FBI.

When was CODIS developed?

In 1990 by the FBI.

What does CODIS stand for?

Combined DNA Index System

When was CODIS developed?

In 1990 by the FBI.

What does CODIS stand for?

Combined DNA Index System

What is the Cyanoacrylate process?

Super glue fuming from superglue resin. Useful in developing prints on plastic bags, metal foil, waxed paper, lacquered wood, leather and almost all hard surfaces.

When was CODIS developed?

In 1990 by the FBI.

What does CODIS stand for?

Combined DNA Index System

What is the Cyanoacrylate process?

Super glue fuming from superglue resin. Useful in developing prints on plastic bags, metal foil, waxed paper, lacquered wood, leather and almost all hard surfaces.

As with the ninhydrin method, the age of the print is of no importance. Additionally, there is no alteration of the evidence; therefore, it is generally used before other methods? Which one is this?

Lasers

What are the three types of lasers currently operational in the development of fingerprints?

The argon ion laser, the copper vapor laser, and the neodymium YAG laser

What is DNA?

Deoxyribonucleic acid - it represents a genetic facsimile, or "blueprint," of that organism.

What is DNA?

Deoxyribonucleic acid - it represents a genetic facsimile, or "blueprint," of that organism.

What are the five elements of DNA?

1.) Carbon


2.) hydrogen


3.) oxygen


4.) nitrogen


5.) phosphorous

Who is Alec Jeffreys?

He discovered that certain regions of DNA contain sequences that are repeated over and over again next to each other.

What two standards are used to govern the admission of scientific evidence?

Relevancy test and the Frye test

What two standards are used to govern the admission of scientific evidence?

Relevancy test and the Frye test

What test is the oldest and the most often used in determining whether scientific evidence is admissible?

The Frye test

Think expense boots

What is the two-step analysis for general acceptance of the Frye test?

1.) identifying the field in which the underlying theory falls.


2.) determine whether the principle has been accepted by most members of the field identified.

What did the Supreme Court during the Daubert case uphold?

The Supreme Court held that federal trial judges are the "gatekeepers" of scientific evidence

What did the Supreme Court during the Daubert case uphold?

The Supreme Court held that federal trial judges are the "gatekeepers" of scientific evidence

What is the Daubert Standard?

It is a legal precedent set in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses testimony during federal legal proceedings.

What is the two-pronged test of the Daubert Standard?

1.) the relevancy prong


2.) the reliability prong

What is the two-pronged test of the Daubert Standard?

1.) the relevancy prong


2.) the reliability prong

What is a question document?

Any object containing handwritten or typed written markings and whose source or authenticity is in doubt.

What is the two-pronged test of the Daubert Standard?

1.) the relevancy prong


2.) the reliability prong

What is a question document?

Any object containing handwritten or typed written markings and whose source or authenticity is in doubt.

What two types of exemplars exist?

The requested and the collected.

What certain types of information should be collected in order to use the profiling technique?

• Photos


• neighborhood information


• medical examiner's report


• map of the victim's travel before death


• complete investigation report of the incident


• background of victim

What are the three main goals of criminal profiling?

to provide a law-enforcement with the social and psychological assessment of the offender


to provide a law-enforcement with the psychological evaluation of belongings found in the position of the offender


to give suggestions and strategies for the interviewing process

According to Brent E. Turvey, case linkage or linking analysis refers to the process of what?

Determining whether or not there are discrete connections between two or more previously unrelated cases through crime scene analysis.

What does the Leon case allow for?

That any evidence seized through a search warrant is immune from suppression even if the judge signing the warrant was wrong and there was not probable cause to believe that contraband or other evidence would be discovered under the warrant.

What are the advantages of a search warrant?

• Recover stolen property


• Seize drugs or other contraband


• Seize any other type of property used in the commission of a crime

What are the legal requirements for a search warrant?

• It must be authorized by the proper official


• It must be issued only for specifically authorized objects


• It must be issued on probable cause

What must a warrant contain?

• Reasons to request the search


• Name of the officer requesting the warrant


• Items to be seized


• Specific place to be searched


• Signature of the issuing judge

The search warrant process consists basically of what three things?

The affidavit, the search warrant, and the search warrant return

A search warrant affidavit must tell the judge what three things?

1.) what is being searched for


2.) where the search is to occur


3.) why the search is to be conducted

What are the exceptions to warrantless searches?

• Consent


• Searches under exigent circumstances


• Incident to lawful arrests


• Stop-and-frisk searches


• Plain-view


• Automobile searches


• Open-field searches

Reasonably deadly force is authorized under what three circumstances?

1.) To prevent an escape when the suspect has threatened the officer with a weapon


2.) when there is a threat of death or serious physical injury to the officer or others


3.) if there is probable cause to believe that the suspect has committed a crime or threatened infliction of serious physical injury and, when practical, some warning has been given by the officer

Fill in the blank


An interview is __________________.

Non-accusatory

Fill in the blank


An interrogation is ______________.

Accusatory

According to Richard Conti, coercion or fear tactics are referred to as?

Coerced-complaint confessions

Fisher and Geiselman came up with what?

The cognitive interview

What are the two major sub types of cognitive interviewing?

"Think-Aloud" Interviewing and Verbal Probing Techniques

The value of an examination using a polygraph can be looked at in what two regards?

Reliability and validity

The intelligence function includes what 5 functions?

1.) target selection


2.) data collection


3.) data collation


4.) analysis


5.) dissemination

What is the RISS project?

A nationwide program consisting of six regional centers and a technology support center that provide flexible and locally based services to local, state, federal, and tribal law enforcement.



It stands for regional info sharing systems

As far as cell-phones go, Localization-Based Systems can be generally grouped into three what categories?

Network-Based


Handset-Based


Hybrid-Based

What are the two main types of burglaries?

Residential


Commercial


What are the preliminary steps in an investigation in a burglary?

Patrol responds


•determine crime is in progress


•quietly approach


•be on look out en route


•after arriving approach from front and back

What is embezzlement?

A fraudulent appropriation of property by a person to whom that property has been entrusted.

What are the main categories of embezzlement?

•Theft of currency -the most common type of embezzlement


•Theft of cash from a trusted party


•Manipulation of accounts - employees of an accounting dept


•Retail Theft- theft by company employees

When did the Identity Theft and Assumption Deterrence Act get passed?

1998- it became a federal crime

What are the methods for fraud?

•Desire for immediate cash


•End of costly repair bills


•Avoidance of the hassle of selling


•Breaking of the car lease

What is the salvage switch?

Involves the thief purchasing a wrecked vehicle that is unrepairable strictly for it's certificate title and the VIN.

What are plastic workers?

Professionals who have experience dealing with stolen credit cards.

What is pilferage?

A form if embezzlement and stealing of merchandise by company employees.

What is check kiting?

A form of forgery which includes fictitious checks drawn on a nonexistent firm or person.

What are fungible goods?

Untraceable goods. Items such as tools, liquor, and clothing that are indistinguishable from others like them.

Fill in the Blank


An __________ burglar might travel a broad geographical area in search of the best opportunities for stealing. Many resort to personal contact with victims.

Amateur burglar

Fill in the Blank


An __________ burglar might travel a broad geographical area in search of the best opportunities for stealing. Many resort to personal contact with victims.

Amateur burglar

Fill in the Blank


The _____________ burglar takes a great deal of time in planning a crime to avoid detection and net the greatest cache of property.

The Professional Burglar

Arson is legally characterized by what two distinct categories?

Aggravated arson


Simple arson

What is the first step in an arson investigation?

Determining the "point of origin" of the fire. It includes the ruling out of natural or accidental causes.

What are the most commonly used accelerants for arson?

Gasoline, kerosene, turpentine, and diesel fuel. Organic compounds containing mixtures of hydrocarbon molecules.

What is the "headspace"?

As accelerants evaporate, the hydrocarbons move into the air above the fire debris.

One of the most advanced techniques for detecting accelerants in fire debris is called what?

Headspace gas chromatography.

What does gas chromatography involve?

Separating mixtures of gases into their individual components based on different boiling points of their hydrocarbons.

Fill in the Blank


Each gas in the mixture can be identified because each one produces a distinct chemical fingerprint called a ___________.

Chromatogram.

Fill in the Blank


Determining the _______ of the _______ is also of paramount importance.

Span of the fire.

What are plants (when arson is involved)?

Preparations used to set the fire.

What are plants (when arson is involved)?

Preparations used to set the fire.

What are trailers (when arson is involved)?

Materials used to spread the fire.

What is alligatoring (when arson is involved)?

The term alligatoring refers to the pattern of crevices formed by the burning wood structure. Resembling the skin of an alligator.

Many things indicate a fire was of suspicious origin. What are some of these clues?

•Flames-the color is noteworthy


•Smoke-can be of value determine what substance was used to start the fire


•Size of the fire-depending on the time element of the fire, size might give investigators info on an act of arson


•Odors-specific fire starters

What category represents 50% of all fire-related property damage?

Arson for Profit

What category represents 50% of all fire-related property damage?

Arson for Profit

Multiple Choice


What type of arson is motivated by jealousy, spite and are usually committed by adults who target both individuals and property?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

C.) Arson for revenge

What category represents 50% of all fire-related property damage?

Arson for Profit

Multiple Choice


What type of arson is motivated by jealousy, spite and are usually committed by adults who target both individuals and property?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

C.) Arson for revenge

Multiple Choice


What type of arson includes little planning or preparation and include most offenders who are youths from lower socioeconomic groups?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

B.) Arson for Vandalism

What category represents 50% of all fire-related property damage?

Arson for Profit

Multiple Choice


What type of arson is motivated by jealousy, spite and are usually committed by adults who target both individuals and property?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

C.) Arson for revenge

Multiple Choice


What type of arson includes little planning or preparation and include most offenders who are youths from lower socioeconomic groups?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

B.) Arson for Vandalism

Multiple Choice


What type of arson is it common for criminals to cover up through the use of fire?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

A.) Arson for Crime Concealment

What category represents 50% of all fire-related property damage?

Arson for Profit

Multiple Choice


What type of arson is motivated by jealousy, spite and are usually committed by adults who target both individuals and property?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

C.) Arson for revenge

Multiple Choice


What type of arson includes little planning or preparation and include most offenders who are youths from lower socioeconomic groups?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

B.) Arson for Vandalism

Multiple Choice


What type of arson is it common for criminals to cover up through the use of fire?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

A.) Arson for Crime Concealment

Multiple Choice


What type of arson is motivated by persons who gain sexual stimulator from setting fires?


A.) Arson for Crime Concealment


B.) Arson for Vandalism


C.) Arson for Revenge


D.) Arson for Profit


E.) Pyromania

E.) Pyromania

Compulsive fire setting can be classified into what three categories?

•mass arsonist


•spree arsonist


•serial arsonist

Compulsive fire setting can be classified into what three categories?

•mass arsonist


•spree arsonist


•serial arsonist

What type of arsonist sets three or more fires at the same location?

A mass arsonist.

What type of arsonist sets three or more fires at separate locations, with no cooling-off period between them?

A spree arsonist

What type of arsonist sets three or more fires at separate locations, with no cooling-off period between them?

A spree arsonist

What type of arsonist sets three or more separate fires with a definite cooling-off period between them. This period may last for days, weeks, or months?

The serial arsonist

Fill in the Blank


"Without the _____ _______ - heat, fuel, oxygen-there can be no fire."

Fire triangle

What are the four primary elements to describe terrorism?

1.) premeditated


2.) politically motivated


3.) violent


4.) committed against noncombatant targets

What are the five distinct forms of terrorism?

•criminal terrorism


•ideological terrorism


•nationalistic terrorism


•state-sponsored terrorism


•revolutionary terrorism

What is Jihadism?

Islamic Holy War Movement

What is Islamism?

A set of ideologies holding that Islam is not only a region but also a political system and that modern Muslims must return to their roots of their religion and unite politically.

What is Al-Qaeda?

Most widely known Islamist group that operates as a network composed of both a multinational arm and a fundamentalist Sunni movement.

What does hawala mean?

Means 'trust' and refers to a fast and cost-effective method for the worldwide remittance of money or value, particularly for persons who may be outside the reach of the traditional financial sector.

What are copping areas?

Most large urban areas have sections of town that are known as drug distribution areas and are well known to drug dealers.

What percentage are Gangs responsible for violent crime?

48%

What are OMG's?

Outlaw Motorcycle Gangs-whose members use their motorcycle clubs as conduits for criminal enterprises.

What are the One-Percenter OMG's?

ATF defines One Percenters as any group of motorcyclists who have voluntarily made a commitment to band together to abide by their organizations rules enforced by violence and who engage in activities that bring their club into repeated serious conflict with society and law.

What are hybrid gangs?

Gangs formed to avoid police attention and make it more difficult for police to identify.

Fill in the Blank


________ is the number one foreign supplier of _______ abused in the US.

Mexico; Marijuana

What is drug courier profile?

It involved agents observing suspected drug traffickers and developing a pattern of behavior typical of those who use commercial airlines or public highways for drug trafficking.

What are the various businesses conducted by members of organized crime in the US?

•Alien Smuggling


•Human Trafficking


•Prostitution


•Drug Trafficking

What is the general structure of drug laws?

•Possession


•Distribution


•Manufacturing

What is the CCCA?

The 1984 Comprehensive Crime Control Act which provides civil provisions for asset forfeiture.

What are confidence games?

Crimes that betray the trust of the victim.

What is the pigeon drop?

The most practiced confidence game of all time, it comes from many varieties.

Multiple Choice


What scheme involves the victim being contacted by the con artists pretending to need help in conducting an investigation?


A.) The Pigeon Drop


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Travel Scam

B.) The bank examiner scheme

Multiple Choice


What scheme involves the victim being contacted by the con artists pretending to need help in conducting an investigation?


A.) The Pigeon Drop


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Travel Scam

B.) The bank examiner scheme

Multiple Choice


What scheme involves selling franchises to unsuspecting persons who then must sell franchises to more victims and so on?


A.) The Pigeon Drop


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Travel Scam

C.) The Pyramid Scheme

Multiple Choice


What scheme involves the victim being contacted by the con artists pretending to need help in conducting an investigation?


A.) The Pigeon Drop


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Travel Scam

B.) The bank examiner scheme

Multiple Choice


What scheme involves selling franchises to unsuspecting persons who then must sell franchises to more victims and so on?


A.) The Pigeon Drop


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Travel Scam

C.) The Pyramid Scheme

Multiple Choice


What Scheme involves the promise of a free vacation that offers a small service charge?


A.) The Pigeon Drop


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Travel Scam

D.) The Travel Scam

Multiple Choice


What Scheme involves the scammer accepting money for repair jobs that they never finish or fail to honor?


A.) The Home Repair Scams


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Contest Con


E.) Magazine Subscription Scam

A.) Home Repair Scams

Multiple Choice


What Scheme involves the scammer accepting money for repair jobs that they never finish or fail to honor?


A.) The Home Repair Scams


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Contest Con


E.) Magazine Subscription Scam

A.) Home Repair Scams

Multiple Choice


What Scheme involves the scammer sending a computerized "personal letter" to the victim stating that he or she has just won something like a car or necklace?


A.) The Home Repair Scams


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Contest Con


E.) Magazine Subscription Scam

D.) Contest Con

Multiple Choice


What Scheme involves the scammer accepting money for repair jobs that they never finish or fail to honor?


A.) The Home Repair Scams


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Contest Con


E.) Magazine Subscription Scam

A.) Home Repair Scams

Multiple Choice


What Scheme involves the scammer sending a computerized "personal letter" to the victim stating that he or she has just won something like a car or necklace?


A.) The Home Repair Scams


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Contest Con


E.) Magazine Subscription Scam

D.) Contest Con

Multiple Choice


What Scheme involves the scammer calling the victim to ask if they would like to receive magazines for two years at no cost?


A.) The Home Repair Scams


B.) The Bank Examiner Scheme


C.) The Pyramid Scheme


D.) Contest Con


E.) Magazine Subscription Scam

E.) Magazine Subscription Scam

Fill in the Blank


The __________ of entire regions with drug money is one of the more sinister and surreptitious types of drug-related crime.

Flooding

What does BSA stand for?

Bank Security Act

What forms can the money laundering business take on?

(1) simply merging illicit money with a legitimate cash source, which usually uses a business that generates large amounts if cash (2) using sophisticated international money laundering techniques.

What is the most common method for laundering money?

Bank methods- traffickers take their cash to a bank and conduct several transactions that usually involve trading currency of small denominations for larger ones.

What is smurfing?

A method of conducting mass deposits using people called "smurfs" to go to different banks and purchase cashier's checks in denominations of less than $10,000, thus bypassing the reporting requirement.

What is smurfing?

A method of conducting mass deposits using people called "smurfs" to go to different banks and purchase cashier's checks in denominations of less than $10,000, thus bypassing the reporting requirement.

What is the currency exchange method of money laundering?

Traffickers may also use either money exchanges or brokerage houses for facilitating movement of their money.

What is the double invoicing method of money laundering?

Another popular method of hiding illicit financial gains by having a company order merchandise from foreign subsidiary's at an inflated price. The difference between the actual price and the inflated price is deposited by the subsidiary in an offshore account.

What is the double invoicing method of money laundering?

Another popular method of hiding illicit financial gains by having a company order merchandise from foreign subsidiary's at an inflated price. The difference between the actual price and the inflated price is deposited by the subsidiary in an offshore account.

What is the fifth money laundering method?

Acquisition of Financial Institutions-acquiring a domestic or international financial institution.

What does cybercrime mean?

The destruction, theft or unauthorized use, modification, or copying of info, programs, services, equipment or communication networks.

What is computer hardware?

The physical computer itself and any peripherals associated with it.

What is computer hardware?

The physical computer itself and any peripherals associated with it.

What is computer software?

Refers to the media on which info is stored.

What are the four main areas of computer crime?

1.) the intro of fraudulent records or data into a computer system


2.) unauthorized use of computer-related facilities


3.) the alteration or destruction of info or files


4.) the stealing, whether by electronic means or otherwise, of money, financial instruments, property, services, or valuable data

Multiple Choice


What type of computer crime involves a compulsive computer programmer who explores, tests, and pushes the computer to it's limits, regardless of it's consequences?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

C. Computer Hacking

Multiple Choice


What type of computer crime involves a compulsive computer programmer who explores, tests, and pushes the computer to it's limits, regardless of it's consequences?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

C. Computer Hacking

Multiple Choice


What type of computer crime involves the process of presenting sequentially changing info to an automated system to identify those receiving a positive response?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

A.) Scanning

Multiple Choice


What type of computer crime involves a compulsive computer programmer who explores, tests, and pushes the computer to it's limits, regardless of it's consequences?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

C. Computer Hacking

Multiple Choice


What type of computer crime involves the process of presenting sequentially changing info to an automated system to identify those receiving a positive response?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

A.) Scanning

Multiple Choice


What type of computer crime involves one person assuming the identity of an authorized computer user by acquiring items, knowledge, or characteristics?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

B. Masquerading

Multiple Choice


What type of computer crime involves a compulsive computer programmer who explores, tests, and pushes the computer to it's limits, regardless of it's consequences?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

C. Computer Hacking

Multiple Choice


What type of computer crime involves the process of presenting sequentially changing info to an automated system to identify those receiving a positive response?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

A.) Scanning

Multiple Choice


What type of computer crime involves one person assuming the identity of an authorized computer user by acquiring items, knowledge, or characteristics?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

B. Masquerading

Multiple Choice


What type of computer crime involves the changing data before or during their input to computers?


A.) Scannning


B.) Masquerading


C.) Computer Hacking


D.) False Data Entry

D. False Data Entry

What is the Robin Hood Syndrome when associated with computer crime?

Most computer crime perpetrators interviewed in the study differentiated between harming people and organizations.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Salami technique?

An automated form of the Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Salami technique?

An automated form of the Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected.

What is the trap door technique?

Programmers insert debugging aids that break security codes in the computer and then insert an additional code of their own to enable entry into the program for such purposes as false data entry.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Salami technique?

An automated form of the Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected.

What is the trap door technique?

Programmers insert debugging aids that break security codes in the computer and then insert an additional code of their own to enable entry into the program for such purposes as false data entry.

What is a logic bomb?

A set of instructions inserted into a computer program that looks for specific errors in a computer's normal functioning and then exploits the identified error.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Salami technique?

An automated form of the Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected.

What is the trap door technique?

Programmers insert debugging aids that break security codes in the computer and then insert an additional code of their own to enable entry into the program for such purposes as false data entry.

What is a logic bomb?

A set of instructions inserted into a computer program that looks for specific errors in a computer's normal functioning and then exploits the identified error.

What is an Asynchronous?

It attacks the computer system making it unable to differentiate one job from another.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Salami technique?

An automated form of the Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected.

What is the trap door technique?

Programmers insert debugging aids that break security codes in the computer and then insert an additional code of their own to enable entry into the program for such purposes as false data entry.

What is a logic bomb?

A set of instructions inserted into a computer program that looks for specific errors in a computer's normal functioning and then exploits the identified error.

What is an Asynchronous?

It attacks the computer system making it unable to differentiate one job from another.

What is Computer Program Piracy?

The unauthorized copying and use of computer programs in violation of copyright and trade secret laws.

What is the Trojan horse?

The secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

What is a computer virus?

Sets it computer instructions that reproduce themselves in computer programs when they are executed weighing unauthorized programs

What is Superzapping?

Superzapping stems from a macro or utility program used in most IBM mainframes as a systems tool.

What is the Salami technique?

An automated form of the Trojan horse method where small amounts of assets are taken from specified accounts or sources and where the whole appears to be unaffected.

What is the trap door technique?

Programmers insert debugging aids that break security codes in the computer and then insert an additional code of their own to enable entry into the program for such purposes as false data entry.

What is a logic bomb?

A set of instructions inserted into a computer program that looks for specific errors in a computer's normal functioning and then exploits the identified error.

What is an Asynchronous?

It attacks the computer system making it unable to differentiate one job from another.

What is Computer Program Piracy?

The unauthorized copying and use of computer programs in violation of copyright and trade secret laws.

What is ATM fraud?

Persons with legitimate bank accounts make fraudulent deposits and then withdraw money from those accounts based on those deposits.

What types of witnesses may testify in court?

•Fact Witness


•Expert Witness


•Police Officer

What types of witnesses may testify in court?

•Fact Witness


•Expert Witness


•Police Officer

Multiple Choice


Which type of witness has personal knowledge of events pertaining to a case and can only testify to things they personally saw?


A.) Fact Witness


B.) Police Officer


C.) Expert Witness


D.) All of the Above

A.) Fact Witness

What types of witnesses may testify in court?

•Fact Witness


•Expert Witness


•Police Officer

Multiple Choice


Which type of witness has personal knowledge of events pertaining to a case and can only testify to things they personally saw?


A.) Fact Witness


B.) Police Officer


C.) Expert Witness


D.) All of the Above

A.) Fact Witness

Multiple Choice


Which type of witness is permitted to offer opinions that may assist the judge or jury in understanding specialized technical knowledge that would otherwise be beyond their expertise?


A.) Fact Witness


B.) Police Officer


C.) Expert Witness


D.) All of the Above

C.) Expert Witness

Multiple Choice


Which type of witness straddles the domains of fact and expert witnesses. Maybe asked about what he and or the defendant did and then be asked to state an opinion?


A.) Fact Witness


B.) Police Officer


C.) Expert Witness


D.) All of the Above

B.) Police Officer