Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
538 Cards in this Set
- Front
- Back
Felony |
Any crime punished by 1 year or more in a penitentiary |
|
Misdemeanor |
Any crime punishable by less than 1 year in a jail |
|
Modus operandi |
The usual way a suspect commits thier crime |
|
Accelerants |
Substances that cause fires to burn faster and hotter |
|
Active voice |
In which the subject performs the action of the sentence; contrast with passive voice. |
|
Adipocere |
So be appearance of a dead body left for weeks in a hot, moist location |
|
Administrative warrant |
Official permission to inspect a given property to determine compliance with city regulations. for example, compliance with fire codes |
|
Admission |
Statement containing some information concerning the elements of a crime, but falling short of a full confession. |
|
Adoptive admission |
Occurs when someone else makes a statement in a person's presence and under circumstances where it would be logical to expect the person to make a denial of the statement falsely implicating him or her but the person does not deny the allegations |
|
Advanced Fingerprint Information Technology (AFIT) |
An integrated system, the precursor to which was the FBI's AFIS ,that can also incorporate additional biometric data such as latent conference and facial recognition technology |
|
Adversary system |
Justice system used in the United States; establishes clearly defined roles for the prosecution and the defense and sets the judges as the neutral party |
|
Adware |
Type of spyware used by advertisers to gather consumer and marketing information |
|
aggravated assault |
(Felonious assault) unlawful attack by one person on another to inflict severe bodily injury |
|
Aggravated arson |
Intentionally destroying or damaging a dwelling or other property real or personal by means of fire or explosion creating in imminent danger of two life or great bodily harm which risk was known or reasonably foreseeable to the suspect |
|
Algore mortis |
Postmortem cooling process of the body |
|
Analogs |
Drugs created by adding to or omitting something from an existing drug |
|
Antichrist |
Son of Satan |
|
Anticipatory warrant |
One based upon prior knowledge or in an affidavit showing probable cause that it some future time (but not presently) certain evidence of crime will be located at a specified place; such warrants are constitutional if a proper showing is made that contraband or evidence will likely be found at the target location at a given time, or when is Pacific trigger in event occurs. |
|
Apple picking |
A particularly brazen type of robbery in which is suspects snatches and iPhone iPad or other mobile device directly from the hands of it's user |
|
Arc mapping |
Involves the survey and analysis of the location where electrical arcing has caused damage to determine the origin of a fire. |
|
Arrest |
Taking a person into custody in the manner authorized by law to prevent that person before magistrate to answer for the commission of a crime |
|
Arson |
Malicious willful burning of a building or property |
|
Asphyxiation |
Death or on consciousness resulting from insufficient oxygen to Supply the red blood cells reaching the body tissues in the brain |
|
Assault |
Unlawfully threatening to harm another person, actually harming another person or attempting unsuccessfully to do so; formerly referred to threat of or attempts to cause bodily harm and now usually includes battery |
|
Associative evidence |
Links a suspect with a crime |
|
Asymmetric warfare |
Combat and which a weaker group attacks a superior group not head on the by targeting areas where the adversary least expect to be hit causing great psychological shock along with loss of life among random victims |
|
Autoerotic asphyxiation |
Accidental death from suffocation strangulation or chemical asphyxia resulting from a combination of ritualistic behavior, oxygen deprivation, danger and fantasy for sexual gratification. |
|
Bait car |
Hey model of vehicle with a high separate that is elected and place in a high crime area as bait for motor vehicle theft |
|
Ballistics |
The study of the dynamics of projectile from proportion through flight to impact; a narrower definition is the study of the functioning of firearms |
|
Bait money |
Currency for which serial numbers are recorded placed so it can be added to any robbery loot. |
|
Baseline (plotting) Method |
Establish is a strategic line from one fixed point to another from which measurements are taking at right angles |
|
Battery |
Actually hitting or striking someone |
|
Beach heading |
Interrogation technique where officer questions a custodial suspect without giving them Miranda warnings and obtained incriminating statements the officer then gives the warning, gets the waiver and repeats the interrogation to obtain the same statement |
|
Beelzebub |
Powerful demon ,subordinate only to Satan, according to Satanist |
|
Bench trial |
Hey trial before a judge without a jury |
|
Best evidence |
Original object or the highest available degree of proof that can be produced |
|
Bias crime |
Motivated by bigotry and hatred against a specific group of people |
|
Bigamy |
Marrying another person when one or both of the parties are already married |
|
Biometrics |
The statistical study of biological data and a means to positively identify an individual by measuring that person's unique physical or behavioral characteristics such as fingerprints |
|
Bioterrorism |
Involves dissemination of such biological weapons of mass (WMD) destruction as anthrax and smallpox |
|
Bitcoin |
And internet currency used in online payment programs |
|
Black mass |
Diabolical communion ritual performed by Satanist that mock and educate the Christian mass |
|
Blind reporting |
Allow sexual assault victims to retain their and anonymity and confidentiality while sharing critical information with Law enforcement; also permits victims gather legal information from Law enforcement without having to commit immediately to an investigation |
|
Blood stain pattern analysis |
The study of blood stains to assist in establishing spatial and sequential events that occurred during and sometimes after the act of blood shed |
|
Blowing (a safe) |
Opening a safe using cotton primer cap copper wire and nitroglycerin |
|
Body packing |
A method of smuggling for otherwise concealing drugs inside a body opening including the rectum or vagina |
|
Bookmaking |
Soliciting and accepting bets on any type of sporting event |
|
Boosters |
Professional shoplifters |
|
Bore |
Inside portion of a weapons Barrel which is surrounded by raised ridges called lands and recessed areas called grooves |
|
Bracket |
Testimony tactic that allows the witness some leeway and helps him or her retain credibility provides the range; for example he was 40 to 50 feet way |
|
Brady rule |
Entitles the accused to information as provided by the statues of the state and disclosure of exculpatory evidence |
|
Bugging |
Using a machine to record conversations with in a room without the consent of those involved |
|
Buie sweep |
authorized search by police of areas immediately adjoining the place of arrest justified when reasonable suspicion exist that another person might be present who poses a danger to the arresting officers held constitutional in Maryland v. Buie (1990) synonymous with protective sweep |
|
Bullying |
A form bof ehavior that encompasses a variety of negative acts carried out repeatedly over time and involves a real or perceived imbalance of power with the more powerful child or group attacking those who are less powerful |
|
Bump key |
A burglary tool a generic key used along with another mechanism to apply force to open a lock |
|
Burning (a safe) |
Opening a safe using a burn bar or other safe cracking device to burn a hole into the safety gain entry |
|
Bustout |
They type of check fraud in which a perpetrator first deposits a fictitious check that appears to be genuinely drawn on a real account into a checking or credit card account at a financial institution. Immediately there after the subject withdrawals funds from the account into which the fictitious check was deposited once the fraudulent nature of the check is discovered and the check is dishonored by the institution the account has been "busted" |
|
Caliber |
Diameter of a weapons bore as measured between lands as well as the size of bullet intended for use with they specific weapon |
|
Capital flight |
Large scale removal of funds or capital for my country; not to be confused with money laundering |
|
Carjacking |
taking of a motor vehicle from a person by force or the threat of force |
|
Car shopping |
The theft of items from unlocked cars |
|
Cast |
To make an impression using plaster of Paris or a similar substance; also the physical reproduction of such an impression |
|
Chain of custody /chain of evidence |
Documentation of what has happened to evidence from the time it was discovered until it is needed in court including every person who has had custody of the evidence and why |
|
Chicken hawk |
An adult who has either heterosexual or homosexual preferences for young boys or girls of a specific limited age range, used synonymously with pedophile |
|
Child molestation |
Violation of a child by lewd or lascivious acts indecent exposure incest or statutory rape usually a felony |
|
Chopping (a safe |
Opening a safe by chopping a hole in the bottom of the safe large enough to remove the contents |
|
Chop Shop |
A business usually an auto body shop that disassemble stolen vehicles and sells the parts |
|
Chronological order |
In time sequence |
|
Circumstantial evidence |
Evidence from which inferences are drawn; fact or event that tends to incriminate a person in a crime. for example being seen running a from a crime scene, also called indirect evidence |
|
Civil liability |
Persons degree of risk of being sued; any person acting under the authority of law who violates another person's constitutional rights can be sued |
|
Class characteristics |
Features that place an item into a specific category for example the size and shape of a tool |
|
Clearance rate |
The rate of crimes resolved to the number of crimes reported |
|
Click jacking |
Concealing a hyperlink beneath legitimate clickable content which when clicked leads to the execution of hidden unintentional actions such as downloading malware or sending personal information to a website |
|
Cloning |
A crime in which stolen vehicles are given a copied VIN to assume the identity of legally owned or non stolen vehicles of similar make and model |
|
Closed-ended question |
Requires only a yes or no or other short simple answer and should be avoided during interviews; not to be confused with a direct question |
|
Close surveillance |
Staying within a few steps of the subject or keeping the subject in sight. used when t is extremely important not to lose the subject also called tight surveillance |
|
Closing robbery |
A robbery carried out at the end of the business day |
|
Club drugs |
Commonly found at Raves and dance parties |
|
Cocooning |
The idea that victims of violence need to surround themselves with others who are aware of the situation and can be an extra set of eyes and ears, a layer of protection to alert authorities if the victim is unable to call for help. |
|
Cognitive interview |
Interviewing technique that helps victims or witnesses put themselves mentally at the scene of the crime |
|
Commercial burglary |
One that invovles churches, schools barns, public buildings, shops, offices, stores factories, warehouses stables, ships or railroad cars |
|
Community policing |
Philosophy that the police must work with the community through partnerships and problem-solving to address problems of crime and disorder; a belief that by working together the police and the community can accomplish what neither can accomplish alone |
|
Compass-point (plotting) method |
Uses a protractor to measure the angle formed by two lines |
|
Competent evidence |
Has been properly collected, identified, filed and continuously |
|
Competent photograph |
Accurately represents what it purports to represent, is properly identified and is properly placed in the chain of evidence and secured until court presentation |
|
Complainant |
Person you request an investigation for the action be taken; is often the victim of a crime |
|
Computer crime |
That which involves the addition, deletion, change or theft of information |
|
Computer virus |
Program created specifically to infect other programs with copies of itself, it attacks, attaches itself to and becomes part of another executable program |
|
Concise |
Avoiding wordiness making every word count without leaving out important facts |
|
Conclusionary language |
Non-factual, drawing inferences, for example, "the man was nervous"; to be avoided in police reports |
|
Confession |
Information supporting the elements of a crime that is provided and attested to by any person involved in committing the crime can be oral or written and must be voluntary and not given in response to threats promises or rewards |
|
Confidence game |
Obtains money or property buy a trick, device, or swindell that takes advantage of a victims trust in the swindeller; the confidence game offers a get rich quick scheme |
|
Confidential (reliable) informant |
And individual who has previously provided information to the police which was cooroborated and use |
|
Connotative |
Adjective describing words that have an emotional affect with meaning that impart either positive or negative over tones. |
|
Contagioun effect |
Phenomenon in which media publicity of an act or event inspires more such acts or events, for example of belief that coverage of terrorism in spires more terrorism |
|
Contamination |
Post crime transfer of material to or from evidence |
|
Content |
What is said in a narrative as opposed to form which is how a narrative is written; the content of an effective report is factual, accurate, objective, and complete |
|
Cook (meth) |
Someone who produces methamphetamine |
|
Corporal punishment |
The intentional infection of pain or injury in an effort to correct or discipline children |
|
Corporate crime /white color crime |
Business related or occupational crime that involves illegal acts characterized by fraud, concealment, or violation of trust and does not depend on the actual or threatened use of physical force or violence . for example embezzlement, computer crimes, bribery, pilferidge, also called corporate crime or economic crime |
|
Corpus Delicti |
:Body of a crime" elements of a specific crime; evidence establishing that a specific crime has been committed. |
|
Corpus delecti evidence |
Establish is that a crime was committed |
|
Coven |
Group of witches or Satanist |
|
Cover |
Assumed identity used while on and undercover assignment |
|
Crack |
Cocaine mix with baking soda and water heated in a pan and then dried and split into pallet-sized bits or chuncks, which are smoke to produce affects reportedly 10 times greater than powder cocaine at a fraction of the cost. |
|
Cracker |
Computer hacker in the negative sense someone who cracks software protection and removes it deliberately and maliciously intruding into a computer or network to cause damage |
|
Cramming |
Billing consumers for unauthorized, misleading receptive charges such as a personal 800 number, paging, and voicemail. |
|
Crank |
Street name for methamphetamine not to be confused with crack |
|
Crazing |
Formation of irregular cracks in glass cause by rapid in Tempe can indicate arson or the use of an acccellerant. |
|
Crime |
Act or omission forbidden by law, punishable by a fine or even death, crimes and their punishment are established and defined by state and federal statues and local ordinances |
|
Crime mapping |
Focuses on the location of crimes the hot spots where most grams occur rather than on the criminal |
|
Crime prevention through environmental design CPTED |
Altering physical characteristics of a property to make it less attractive to criminals for example removing shrubbery next to windows and doors, improving lighting and closing garage doors; also called target hardening |
|
Criminal enterprise |
By FBI definition a group of individuals with an identified hierarchy or comparable structure engaged in significant criminal activity. Although organized crime and criminal enterprise are often acquainted and used interchangeably, several federal statutes specifically delineate the elements of an enterprise that must be proven to connect individuals or groups under those statutes |
|
Criminal homicide |
Includes murder and manslaughter and is a felony |
|
Criminal intent |
Performing in unlawful act on purpose knowing back to be illegal |
|
Criminal investigation |
The process of discovering, collecting, preparing, identifying, and presenting evidence to determine what happened and who is responsible |
|
Criminalist |
A person who searches for, collects, and preserves physical evidence in the investigations of crime and suspected criminals also called a crime scene technician, examiner, or investigator |
|
Criminalistics |
Specialist trained in recording identifying and interpreting the menutiae (minute details) of physical evidence. |
|
Criminal negligence |
Acts of commission or omission creating situations resulting in unreasonable risk of death or great bodily harm |
|
Criminal profiling |
Method of suspect identification that attempts to identify the individuals mental, emotional and psychological characteristics, also called psychological profiling |
|
Criminal statute |
Legislative act relating to crime and it's punishment |
|
Cross-contamination |
Allowing items of evidence to touch one another and thus exchange matter |
|
Cross examination |
Questioning by the opposite side in a trial that attempts to assess the validity of testimony given under direct examination |
|
Cross projection sketch |
Presents the floor in walls of a room as though they were on the same surfice |
|
CSI effect |
The phenomenon in which unrealistic for trails of forensic science translate into equally unrealistic expectations from not only the public but also other professions that operate within the justice system |
|
Cult |
System of religious beliefs and rituals and its body of adherents also called new religious movement (NRM) |
|
Culturally adroit |
Skilled in interacting across gender, ethnic, generational, social and political group line |
|
Cunnilingus |
Sexual activities involving oral contact with the female genitals |
|
Curtilage |
Portion of the residents that is not open to the public and is reserved for private owner or family use, I contrast to sidewalks and allyways which are used by the public and which hold no reasonable expectations of privacy |
|
Custodial interrogation |
Questioning by law enforcement officers after a person has been taken into custody or otherwise deprived of freedom in a significant way; requires that the Miranda warnings be given |
|
Cyber bullying |
The willful and repeated use of cell phones, computers and other electronic communication devices to harass and threaten others, essentially cyber stalking or cyber harassment involving minors |
|
Cyber crime |
Part of a larger category of cyber crime a criminal act that is carried out using cyber technology and that takes place in cyber space |
|
Cyber stalking |
Repeated use of the Internet, email, or other digital electronic communication devices to stalk another person. |
|
Cyber terrorism |
Premeditated, politically motivated, attack against information, computers system, computer programs, and data that results in harm to noncombatants targets by subnational groups or clandestine agents; also refers to the use of a computer system as a conduit for causing terror |
|
Cycle of violence |
A three phase cycle of domestic violence- tension building stage, accute battery episodes, the honeymoon, and back to the tension building stage which typically increases in both frequency and severity. |
|
Data mining |
Process that uses powerful analytical tools to quickly and thoroughly Explorer mountains of data to discover new patterns or confirm suspected patterns or trends |
|
Data remenance |
Refers to the residual physical representation of data that have been erased from a computer hard drive |
|
Date rape |
Type of sexual assault were the victim knows the suspect |
|
Daubert standard |
Two pronged requirement that an experts testimony be both reliable and relevant |
|
Deconfliction |
Protocal or guidelines to avoid conflict can be applied to declassified and confidential investigation |
|
Deductive reasoning |
A logical process in which a conclusion follows from specific fact a reconstructive process based on specific pieces of evidence to establish proof that a suspect is guilty of an offence |
|
De facto arrest |
Functional equivalent of an arrest; illegally bringing someone in for questioning without probable cause any evidence obtained through this method is inadmisdible in court |
|
Defense wounds |
Non fatal wounds cuts on the hands arms and legs inccurd by victims as they attempt to ward off at actors indicative of murder |
|
De minimus communication |
Allowed or acceptable contact between a witness and a juror such as exchanging a simple hello or giving directions |
|
Denial of service (DOS) attack |
Disruption or degrafation of a computer or networks internet connection or email service that intterupts the regular flow of data; using multiple agents to create a widespread interruption ais a distributed DoS or DDoS |
|
Denotative |
adjective describing words that have little emotional affect and are objective in there meaning |
|
Depressant |
Drug that reduces Restless Ennis and emotional tension and induce asleep, most common are the barbiturates |
|
Depth of char |
How deeply wood is burned, indicates the links of burn in the fires point of origin |
|
Designer drugs |
Substances created by adding to or taking something away from and existing drug |
|
Digital penetration |
The act of using fingers (digits) to penetrate or manipulate sexual organs that includes the penis vagina and anus |
|
Direct evidence |
Establishes proof of a fact without any other evidence |
|
Direct question |
Is to the point, with little chance of misinterpretation, for example "what time did you leave?" |
|
Discovery process |
Pretrial disclosure between prosecution and defense about the evidence they intend to use at trial thus avoiding "trial by surprise" |
|
Disposition |
How a case is disposed of for example ,referred, closed (inactive), open (active), dismissed, pending further information and so on. |
|
Disrupters |
Devices that use gunpowder to fire a Jet of water or projectile at a particular component of an explosion to make it safe |
|
DNA deoxyribonucleic acid |
Organic substance found in the nucleus of living cells that provide the genetic code determining a person's individual characteristics |
|
DNA profiling |
Forensic analysis of blood, hair, saliva, semen or cells from any part of the body to ascertain a positive identity or match. |
|
Domain name |
Unique name of a computer system on the internet that distinguishes it from all other online systems associated with a specific IP address easier to remember the next train of numbers, not then same as a web address |
|
Domestic terrorism |
Activities that involve acts dangerous to human life that violate federal or state law; appear intended 1) to intimidate or course a civilian population 2) to influence the policy ever government by intimidation or torsion or 3) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and that occur primarily within the territorial jurisdiction of the United States |
|
Domestic violence |
Patterns of behaviors involving physical, sexual, economic and emotional abuse alone or in combination often by an intimate partner and are often for the purpose of establishing and maintaining power and control over the other person |
|
Doxing |
Publicly releasing a person's personal sensitive identifying information online without authorization |
|
Dragging (a safe) aka Pulling |
opening a safe inserting a V plate behind the dial and tightening screw bolts on the edges of the V plate until the dial and spindle are pulled out this method is opposite of punching and works on many older space but not on new ones |
|
Dye pack |
Bundle of currency containing color dye and tear gas, taken doing a robbery, it is activated when the robber crosses and electromagnetic field at the facilities exit, staining the money with brightly colored dye and emitting a cloud of colored smoke |
|
Dyer act |
Made Interstate transportation of a stolen water vehicle a federal crime and allowed for federal assistance in prosecuting such cases |
|
Dying Declaration |
A statement that can prove valuable information to investigations and usually qualifies as they hearsay exception making it admissible evidence. |
|
Dynamic IP address |
And IP address that fluctuates it is more secure because it is changed frequently |
|
Economic crime AKA white collar crime |
Business related or occupational crime that involves the legal acts characterized by fraud, concealment, or violation of trust it does not depend on the actual of threatened used to physical for surveillance for example embezzlement computer crimes robbery pilferage also called. corporate crime or economic creme |
|
Eco terrorism |
Seeks to inflict economic damage to those who profit from the destruction of the natural environment |
|
E crime |
Electronic crime, any criminal violation in which a computer or electronic media is used in the Commission of that prime also called cyber crime |
|
Ecstasy MDMA |
Derivative of amphetamine or speed a powerful stimulant increasingly popular club drug |
|
Elder abuse |
Physical or mental mistreatment, financial exploitation and general neglect of the elderly may include fraud as well as assault battery and even murder |
|
Elements of the crime |
Specific conditions that must have occurred for an act to be called a specific kind of crime |
|
Elephant in a matchbox doctrine |
Requires that searches consider the probable size and shape of evidence they seek because for example large objects cannot be concealed in tiny areas |
|
Elimination Prints |
Fingerprints taken of every individual whose prints are likely to be found at the crime scene but who are not suspects |
|
Embezzlement |
Fraudulent appropriate enough property by person to whom it has been entrusted |
|
Emotional abuse |
Causing fear or feelings of unworthiness in others with children this occurs by such means as locking them in closets ignoring them or constantly belittling them |
|
Encryption |
Techniques that puts information in code and thus obscures a normally comprehensive a message |
|
Entrapment |
Tricking someone into committing a crime that here she would not normally commit |
|
Equivocal death |
Situations that are open to interpretation in investigation, the case may present as homicide suicide or accidental death pending on the circumstances |
|
Evidence |
Data on which a judgement or conclusion may be based use for determining the facts and a case for later laboratory examination and for direct presentation Court |
|
Exceptionally cleared |
Disposition of a case when circumstances outside the investigation result in no charges being filed example if the suspect dies |
|
Excessive force |
More than ordinary force justified only when exceptional resistance occurs and there's no other way to make the arrest |
|
Excited delirium |
Describes the manifestation of extreme drug abuse may occur in people under the influence of illicit stimulant substance such as cocaine or in people with the history of mental illness who are not taking their medications |
|
Excluionary rule |
Establish that the courts cannot accept evidence of pain by unreasonable searches seizures either regardless of us relevance in the case. Weeks v. United States, Mapp v. Ohio |
|
Excusable homicide |
Unintentionally truly accidental killing of another person |
|
Exhibitionists |
People who gain sexual satisfaction by exposing themselves |
|
Exigent circumstances |
Emergency situation they do not require a warrant |
|
Expert testimony |
That presented by person deemed to have specialized training, skills, or experience in a particular area that will help the jury understand the topic and evidence presentation |
|
Exploitation |
Taking unfair advantage of Children or using them illegally |
|
Expressive violence |
Stems from hurt feelings anger or rage in contrast to instrumental violence which is gold directed predatory behavior used to exert control |
|
Fellatio |
Sexual activity involving oral contact with the male genitals |
|
Female genital mutilation |
A procedure that involves partial or total removal of the external female genitalia or other injury to the female genitalia organs for non medical reasons |
|
Femicide |
Murder of a woman |
|
Fence |
Go between her received stolen goods for resale |
|
Field identification |
On the scene identification of a suspect by the victim or witnesses to a crime, conducted within a short time after the crime was committed also called show up identification |
|
Field interview |
When questioning occursspontaneously up the scene |
|
Finished scale drawing |
Done in ink on a good grade of paper and drawn to scale using exact measurements |
|
Fire play |
Behavior that conveys a low level of intent to inflact harm an absence of malice; rather in involves curiosity and fascination |
|
Fire setting |
Behavior the involves malice and intent to inflict harm |
|
Fire triangle |
Three elements necessary for a substance to burn, heat, fuel and air |
|
Firewall |
Software or Hardware protective measure that block sports of access to a computer or network to prevent an authorized access and stop malicious programs from entering |
|
First degree murder |
Pre meditated killing of another person or killing someone while committing or attempting to commit a felony |
|
First person |
Use of I, me, we and us in speaking in writing and contrast to the second person (you) and the third person (he or this officer.) |
|
Fixed surveillance |
Observing a from a fixed location also called plant and steakout |
|
Flaggers |
Theived who go around neighborhood targeting mailboxes with their flags up searching for envelopes containing checks and other forms of payment |
|
Flash mob |
Theft technique where a mass of individuals rapidly enter, steal from, and exit an establishment overwhelming employees ability to do anything about the situation, also called mob rob or swarming |
|
Flash roll |
Money used in an undercover drug buy |
|
Floor release limit |
Maximum dollar amount that maybe paid with a check or credit card without authorization from the central office unless the business assumes liability for any loss |
|
Fluffing |
Increasing telephone rates without notification |
|
Force |
Amount of physical influence required to control of persons behavior under police authority |
|
Forcible rape |
Sexual intercourse against a person's will by use or threat of force |
|
Forensic photogrammetry |
Technique of extrapolating 3D measurements directly from two dimensional photographs |
|
Forensic science |
Application of the physical sciences and there technology to examine physical evidence of crime includes the branch of Criminalistics |
|
Forgery |
Signing someone else's name to document or all during the name for amount on a check for document with the intent to defraud |
|
Form |
How a narrative is written, in contrast to content which is what it said in a narrative, the form of a well written report is concise, clear grammatically and mechanically correct and written in standard English |
|
Fraud |
Intentional deception to cause a person to give up property or some lawful right |
|
Frisk |
External search of an individuals clothing also called a pack down |
|
Fruit of the poisonous tree doctrine |
Establish that evidence of paint as results of an earlier illegality must be excluded from trial |
|
Full Faith and Credit |
Legal status where in a document, contract, license or Court order issued anywhere in the country is legally binding and enforceable nationwide |
|
Fusion Center |
A repository of intelligence and information where analysis crunch data to produce actionable knowledge, a national network of such centers promotes and facilitates information and intelligence sharing among local, State, and federal law enforcement agencies in the effort to fight crime and terrorism |
|
Gang |
A group of people who form an allegiance for a common purpose and engage in unlawful or criminal activity |
|
Geographic profiling |
Uses the fact that everyone has a pattern in there lives particularly in relation to the geographical areas they frequent, to help identify suspects who commits multiple crimes (serial criminals) |
|
Giglio impaired |
A condition in which there exists potential impeachment evidence that would render the officers testimony in a case or for future cases of marginal value |
|
Good faith doctrine |
Establish that illegally obtained evidence maybe admissible if the police were truly not aware they were violating the suspect 4th amendment rights |
|
Gouging |
Charging undisclosed fees when calls are made from payphone or hotel rooms |
|
Graffiti |
Wall writing; Sometimes called the "newspaper of the street" |
|
Grand larceny |
Felony based on the substantial value of the property stolen |
|
Hacker |
Computer buff; one who intrude into anothers computer or network for the challenge and status, it's not necessarily a negative term in contrast to a cracker who is someone who intrudes to commit a crime |
|
Hacktivism |
Using cyber space to harass or sabotage sites that conduct activities or advocate philosophy that Hacktivists find unacceptable |
|
Hallucinogens |
A drug that induces hallucinations or perceptual distortion of reality for example LSD DMT and PCP for Angel dust. |
|
Hand of glory |
Left hand of a person who has died |
|
Hardware disabler |
A device designed to ensure a self destruct sequence of any potential evidence it maybe present on or around a computer with a remote power switch being the most prevalent of the disabler Hardware devices |
|
Hate crime |
In which the defendant intentionally selects a victim or in the case of a property crime the property that is the object of the crime because of the actual or proceed race, color, National origin, ethnicity, gender, disability or sexual orientation of any person also called bias prime |
|
Hate incidents |
Behaviors that though motivated bias against the victims race religion ethnic national origin gender age disability or sexual orientation are not criminal acts, for example hostile or hateful speech or other disrespectful or discriminate or behavior motivated by bias. |
|
Hawala |
Informal banking system based on trust and often bartering, common throughout the middle East and used to transfer billions of dollars every year |
|
Hearsay |
What one has heard from another what was told about by others |
|
Heat of passion |
Extremely volatile emotional condition |
|
Hebephile |
Person who select high school-aged youth. a sex victims |
|
Hesitation wounds |
Leesd severe cutting mark caused by and individuals attempt to build up nerve before making a fatal cutting wound, indicates suicide |
|
Hit and run burglary |
Theft in which a window is smashed you're still merchandise also called a smash and grab |
|
Holder |
Person to him a credit or debit card is issued and who agrees to pay obligations are rising from it's use |
|
Home invasion |
A forced entry into an occupied dwelling to commit a violent crime whether robbery, sexual assault, murder or some combination of violent offensive |
|
Home grown violent extremist (HVEs) |
U.s. based individuals with loose affiliation to terrorist groups overseas |
|
Homicide |
Killing of one person by another |
|
Hot sheet |
A list of stolen vehicle |
|
Hot spots |
Geographic areas with the higher incidence right of Criminal activity |
|
Human trafficking |
The act of recruiting, harboring, transporting, providing or obtaining a person for compelled labor or commercial sex acts, through the use of force, fraud or coercion modern-day slavery also called trafficking in persons |
|
Identity theft |
Criminal active of assuming someone else's identity for some type of gain, normally financial |
|
Igniters |
Substances or devices used to start a fire |
|
Imaging |
Making a byte by byte copy of everything on the hard drive |
|
Immediate control |
Within a person's reach |
|
Immersive imaging |
360 degree photographic view of a crime scene that allows viewers to virtually "walk through it" as though they were there |
|
Immobilizer |
Device in which a Vehicles engine recognizes only the preprogrammed key assigned to the vehicle, in an effort to prevent auto theft |
|
Impeach |
To discredit testimony, to challenge the truth or accuracy of what a prosecution witness testified to under direct examination |
|
Incantation |
Verbal spell ritualistic prayer |
|
Incendiary |
Describes a fire ignited intentionally and maliciously under circumstances in which a person knows that the fire should not be set; arson |
|
Incest |
Sexual intercourse between family members or close relative including children related by adoption |
|
In custody (custodial arrest) |
The point at which an officer has decided a suspect is not free to leave; there has been considerable deprivation of the suspect liberty or the officer has arrested the suspect |
|
Indecent exposure |
Ones Jennifer's to another person to such an extent as to shock the others sense of decency |
|
Indicator crimes |
Offences that, in situations involving the same victim and suspect, can establish a pattern of events indicative of an abusive relationship can range from harassing phone calls to hit in run |
|
Indirect evidence |
Evidence from which inference are drawn; fact or event that that tends to incriminate a person in a crime, for example being seen running from a crime scene also called circumstance evidence. |
|
Indirect question |
Skirts the issue, for example how do you and the victim get along? should be used sparingly if at all |
|
Individual characteristics |
Features that distinguish one item from others of the same type also called identifying characteristics |
|
Inevitable discovery doctrine |
Established that if the legally obtained evidence would in all likelihood eventually have been discovered legally, it may be used |
|
Inductive reasoning |
Going from the generalization and establishing it by gathering specific fax |
|
Informant |
Any individual who can provide information related to a case but who is not a complainant, witness victim or suspect |
|
Information age |
A period driven by information rather than by agriculture or industry as in the past |
|
Inkless fingerprints |
Digital Live-Scan capture of a fingerprint that can be stored in a database for special retrieval |
|
In Loco Parentis |
Having the authority to take the place of the parent, teachers usually have this right |
|
Instrumental violence |
Goal directed predatory behavior used to exert control in contrast to expressive violence which stems from hurt feelings, anger for rage |
|
Integration |
3rd and final step in the money laundering cycle where criminals repatriate their money through seemingly legitimate business transactions |
|
Integrity of evidence |
Referring to the requirement the any item introduced in court must be in the same condition as when it was found at the crime scene |
|
International terrorism |
Activities that involve violent acts or acts dangerous to human life that violate federal or state law appear to be intended 1 to intimidate or course a civilian population 2 to influence the policy of a government by intimidation or corrosion or 3 affect the conduct of a government by Mass destruction, assassination or kidnapping and occur primarily outside the territorial jurisdiction of the United States or transend national boundaries and terms of the means by which they are accomplished, the person's they appear intended to intimidate or coerce or the locale in which their perpetrators operate or seek asylum. |
|
Internet protocol address IP |
Unique number analogous to a phone number, needed to access the internet, commonly issued by a users internet service provider ISP |
|
Interrogation |
Questioning people suspected of direct or indirect involvement in the crime being investigated |
|
Interview |
Questioning people not suspected of being involved in a crime but who knows something about the crime or the individuals involved in it |
|
Intifada |
Armed uprising of Palestinians against Israel's occupation of the West bank and the Gaza Strip |
|
Intimate partner violence IP V |
Domestic violence directed by one partner against another |
|
Intimate Parts |
Usually referrs to the primary genital areas groin, inner thighs, buttocks and breast |
|
Intuition |
sudden knowing without any conclusion, reasoning or parent logic, based on knowledge and experience or what is commonly called "Street sense", a gut feeling develop by experience |
|
Investigate |
Observe for study closely to inquire into something systematic Lee in a search for truthful information |
|
Involuntary manslaughter |
Accidental homicide that results from extreme (cupable) negligence |
|
Islamic state of Iraq and Levant (ISIL) |
G hottest group formerly known as Alki de and Iraq establish in April 2004 by long time Sunning extremist Abu Musab al-Zarqawi |
|
Jamming |
Setting up roadblocks to make it difficult to switch in-state long distance service |
|
Jargon |
The shorthand vocabulary and technical terminology specific to a particular profession or trade that allows colleagues within the area of work to communicate quickly and concisely l |
|
Jihad |
Holy war |
|
Joyriding |
Simply taking a vehicle for fun, often driving recklessly and without regard for any damage caused to the vehicle itself or other property and then abandoning it |
|
Justifiable homicide |
Killing another person under authorization of the law |
|
Key stroke logging |
Diagnostic technique that captures a users key strokes used in espionage to bypass security measures and obtain passwords or encryption keys, also called keylogging |
|
Kidnapping |
Taking a person to another location by force often for ransom |
|
Larceny /theft |
Unlawful taking carrying leading or driving away of property from anothers possession |
|
Laser beam photography |
And imaging process that reveals evidence indiscerable to the naked eye such as the outline of a footprint in a carpet even though the fibers have returned to normal position |
|
Latent fingerprints |
Print impressions transferred to a surface eithet by sweat on the ridges of the fingers or because the fingers carry residue of oil, dirt, blood or other substances |
|
Layering |
2nd step in the money laundering process where the money is "cleaned" by moving it around through a series of elaborate transactions Austin involving offshore bank account and International business companies (IBCs) |
|
Leading question |
Prompts for leaves a person to a specific response and often implies an answer, a useful interrogation techniques |
|
Leads |
Avenues bearing clues or potential sources of information relevant to solving a crime |
|
Leakage |
The illegal or unauthorized removal of cargo from the supply chain a concept similar to that of shrinkage |
|
Legend |
The part of a crime scene sketch containing the case number, type of crime, name of victim or complainant, location, date, time, investigator, anyone assisting, scale of the sketch, direction of North, and name of the person making the sketch |
|
legibility |
Refers to the ease with which a handwritten or type printed character is recognized based on its appearance |
|
Lewdness (with a minor) |
Touching aminor to arouse apeal to, or gratify the perpetrators sexual desires, the touching maybe done by the perpetrator or by the minor under the perpetrators direction |
|
Liver mortis/ postmortem lividity |
Dark blue or purple discoloration of the body for blood has drained to the lowest level after death also called simple lividity |
|
Loan sharking |
lending money at exorbitant rates |
|
Locard's principle of Exchange |
Basic forensic theory that objects that come in contact with each other always transfer material, however minute, to each other |
|
Lock bumping |
A lock picking technique used on standard pin tumbler locks in which a generic key is used along with another mechanism to apply forced to open the lock |
|
Logic bomb |
Secretly attaches another program to a company's computer system; the attached program monitors the input data, awaits for some type of error to occur, when this happens the new program exploits the weakness to steal money or company secrets to sabotage the system |
|
Long con games |
Games in which the victims are stroung along and allowed to win several small stakes before being convinced to place the "big bet" in which they inevitably lose far more than they had won previously |
|
Loose surveillance |
Moving surveillance, used when it is more important to remain undetected than to keep the subject under constant observation |
|
Lust murder |
Sex-related homicide involving a sadistic, deviant assault, where the killer depersonalizes the victim, sexually mulate's the body, and may displace body parts |
|
Macrophotography |
Photographic enlargement of a subject to enhance details of evidence such as fingerprints or tool marks |
|
Magick |
Glue that binds occult groups, the supernatural act or force that causes a change in the environment |
|
Malicious intent (malice) |
Element of first and second degree murder implies ill-will, wickedness, cruelty, or recklessness |
|
Maltreatment |
Includes neglect, medical neglect, physical abuse, sexual abuse, and psychological maltreatment |
|
Malware |
Contraction of "malicious software"; software developed to cause harm |
|
Mandated reporters |
Certain individuals including- teachers, schools Authorities, Child Care Personnel, Camp Personnel, clergy, Physicians, dentist, chiropractors, nurses, psychologists, medical assistance, attorneys, and social workers--who work with or treat children and are required by law to report cases of suspected neglect or abuse |
|
Manslaughter |
Unlawful killing of another person with no prior malice may be voluntary or involuntary |
|
Marker (photographic) |
Item included in a photograph to show accurate or relative size |
|
Mass murder |
When multiple victims are killed in a single incident by one or a few suspects |
|
Material evidence |
That which is relevant to the specific case and forms a substantive part of the case presented or that has legitimate and effective influence on the decision of the case |
|
Material photograph |
Image that relates to the specific case and subject being discussed |
|
MDMA |
3 ,4- methylenedioxymethylamphetamine, known more commonly as Ecstasy; a powerful stimulant derivative of in phetamine or speed |
|
Mechanics |
Use of spelling, capitalization, and punctuation and written communication |
|
Megapixel |
Pixels are the dots making up a digital image, one megapixel is about a million dots |
|
Micro photography |
Taking pictures through a microscope to help identify minute particles of evidence (example hair or fiber) |
|
Minor |
Person under the legal age for becoming an adult the most common being under the age of 16 or 18 depending on the state |
|
Miranda warning |
Inform suspects of their rights to remain silent, to have counsel present and have the state appoint and pay counsel if they cannot afford one, it also warn suspects that anything they say can be used against them in court |
|
Misoped |
Person who hates children, has sex with them, and then brutally murders them |
|
Modus operandi (MO) |
Characteristic way a criminal commits a specific type of crime |
|
Molestation (sexual) |
Acts motivated by unnatural or abnormal sexual interest in minors that would reasonably be expected to disturb, irritate or offend the victim, no touching of the victim is necessary |
|
Money laundering |
Converting illegally earned (dirty) cash to one or more alternative forms (clean) to conceal its illegal origin and true ownership |
|
Moniker |
Gang member street names, nicknames |
|
Morning Glory robbery |
A robbery that occurs first thing in the morning and catches arriving employees off guard |
|
Motion in limine |
Request for the judge to issue a protective order against prejudicial questions or statements |
|
Motor vehicle |
Any self-propelled device for moving persons or property or pulling implements, weather operated on land, on water, or in the air, includes automobiles, trucks, buses, motorcycles, motor scooters, mopeds, snowmobiles, Vans, self-propelled watercraft, and aircraft |
|
Mugshots |
Photographs of those who have been taken into custody and booked |
|
Mules |
Individuals who sell or transport drugs for a regular dealer in return for being assured of a personal drug supply |
|
Mummification |
Complete dehydration of all body tissue that occurs when a cadaver is left in the extremely dry, hot area |
|
Munchausen syndrome |
Involve self-induced or self-inflicted injuries |
|
Munchausen by proxy syndrome MBPS |
A form of child abuse in which the parent or adult caregiver deliberately stimulates, or causes medical distress in a child |
|
Narcoterrorism |
Refers to the use of terrorist tactics to support drug operations or the use of drug trade profits to finance terrorism |
|
Narcotic |
Drug that is physically and psychologically addicting, examples include heroin, morphine, codeine, and cocaine |
|
Narrative |
Technical report structured in chronological order describing a sequence of investigative events |
|
Neglect |
Failure to meet a child's basic needs including housing, food, clothing, education and access to Medical Care |
|
Network |
Relationships, links between people, and between people and their beliefs; two or more computers connected for the purpose of sharing data and resources |
|
Nightcapped warrant |
Court approved stipulation that an arrest or search warrant may be carried out at night |
|
No-knock warrant |
Search warrant that contains a special provision permitting officers to execute the warrant without first announcing themselves |
|
Non criminal homicide |
Includes excusable and justifiable homicide |
|
Nonverbal communication |
Messages conveyed by dress, eye contact, posture, gestures, distance, mannerisms, rate of speech, and tone of voice |
|
Objective |
Non opinionated, fair and impartial |
|
Occult |
Secret knowledge of supernormal powers, many Cults claim to have such knowledge |
|
Open ended question |
Gives the victim, witness, or suspect the opportunity to provide a much fuller response, allowing the investigator greater insight into the person's knowledge and feelings, often begins with "Why , how, or tell me about" , should be asked liberally during interrogation |
|
Open surveillance |
No extraordinary means are used to remain undetected also called a rough surveillance |
|
Oral copulation |
Act of joining the mouth of one person with the sexual organ of another person, see cunnilingus and fellatio |
|
Ordinance |
Act of the legislative body of a municipality or County regulating to all the rules governing the municipality or County, including misdemeanor crimes |
|
Organized crime |
Any group having some manner of a formalized structure and whose primary objective is to obtain money through illegal activities |
|
Organized retail crime (ORC) |
An umbrella term used to describe large-scale retail theft and fraud activity by organized groups of professional shoplifters, alternately called organized retail theft |
|
Osteogenesis imperfecta (OI) |
Genetic disorder characterized by bones that break easily, often from Little or no apparent cause, also called brittle bone disease |
|
OTC drugs |
Over the counter drugs, no prescription required |
|
Overlapping |
Photographic technique whereby the entire scene is photographed in a clockwise Direction so that a specific object is on the right side of the first photograph, on the next photo the same object is on the left side of the photo and so on until the entire scene is photographed |
|
Parallel proceedings |
Pursuing civil and criminal sanctions at the same time |
|
Particularity requirement |
Dictates that a search conducted with a warrant must be limited to the specific area and specific items named in the warrant, as held in Stanford V Texas 1965 |
|
Past tense |
Use of verbs that indicate that events have already occurred, for example lived rather than lives |
|
Pedophile |
Person who is sexually attracted to young children |
|
Peeling (a safe) |
Opening a safe by drilling a hole in the corner of the safe then making the hole successively larger by using other drills until the narrow end of a jimmy can be inserted in the hole to pry the door partially open |
|
Petty larceny |
A misdemeanor based on the value of the property stolen |
|
Pharming |
A cyber crime at involves the high jacking of a domain name for the purpose of reader acting online traffic away from a legitimate website or a fake site , such as a bogus bank website; also refers to the dangerous at of wrestling through the family medicine cabinet for pills both OTC and prescription combining everything in a bowl scooping out in adjusting handful and waiting to see what happens |
|
Phishing |
Method in which criminals misrepresent themselves as a trustworthy source to get victims to disclose personal, sensitive information, such as passwords, bank account numbers, and the like, which is then use by the criminals to commit fraud or other crimes |
|
Physical abuse |
Beating, whipping, burning or otherwise inspecting physical harm upon a child |
|
Physical evidence |
Anything real -that has substance- and helps establish the facts of the case |
|
Pictometry |
Unique, patented computer technology that integrate various Ariel shot of a land based artifact taken straight down (orthogonal) from numerous angles (oblique); the result is a high resolution 3D image of the object |
|
Pill Mills |
Rogue pain management clinic staffed by unethical "doctors" who supply users with illicit pharmaceuticals |
|
Piracy |
Copying and using computer programs in violation of copyright and trade secret laws |
|
Pixel |
Smallest unit of a digital image also referred to as a dot |
|
Placement |
The first step in the process of laundering money that inserts the ill-gotten funds into the legitimate US Market; common methods include smurfing (technically known as structuring) whereby large amounts of cash are broken into increments less than $10,000 to avoid federal reporting requirements and then deposited into various bank accounts |
|
Plain feel / touch evidence |
object discovered by a police officer who was lawfully patting down a suspect's outer clothing and that is immediately identified, by touch, as contraband, a warrantless seizure is justified because there's no invasion of the suspects privacy beyond theat already authorized by the police officer search for weapons Minnesota vs Dickerson, 1993 |
|
Plain View evidence |
Unconcealed evidence that is seen by an officer engaged in the lawful activity |
|
Plant |
Observing a location from a fixed location also called fixed surveillance and Stakeout |
|
Plastic fingerprints |
Impressions left and soft substances such as putty, grease, tar, butter or soft soap, see also visible fingerprints |
|
Plastic fingerprints |
Impressions left and soft substances such as putty, grease, tar, butter or soft soap, see also visible fingerprints |
|
Poaching |
Illegally taking or possessing fish, game for other Wildlife including dear, Elk, bear, pheasant ducks, while turkeys, and grouse |
|
Polygraph |
scientifically measures respiration and depth of breathing, changes in the skins electrical resistance and blood pressure and pulse also called lie detector |
|
Ponzi scheme |
Pyramid type fraud scheme, named after Charles Ponzi, that involves using capital from new investors to pay off earlier investors, requiring an ever-expanding base of new investors to support the financial obligations to the existing higher-ups which, eventually and inevitably, will collapse |
|
Port scanning |
Looking for Access (open doors) into a computer |
|
Post-mortem artifact |
an injury occurring after death from another source that can look like it was related to the homicide when it actually occurred from an outside Source after death |
|
PPI |
Pixels per inch |
|
Pre meditation |
Considering planning or preparing for an act, no matter how briefly, before committing it |
|
Presumptive evidence |
Provides a reasonable basis for belief |
|
Pretextual traffic stops |
Stop so Vehicles when an officers interest (pretext) was not the real reason for the stuff presence of and ulterior motive fine officer for the stock |
|
Prima face evidence |
Established by law; for example the blood alcohol level for intoxication also call direct evidence |
|
Probable cause |
What would be a person of reasonable caution to believe that something connected with the crime is on the premise or person to be searched |
|
Probative evidence |
Tends to prove or actually proves guilt or innocence, vital for the investigation or prosecution of AKA |
|
Profiling/psychological profiling |
Attempts to identify an individuals emotional and psychological characteristics to provide investigations with collaborative information about a non suspect for possible leads to a non suspect also called criminal profiling or simple profile |
|
Property flipping |
Practice where by in offender buys the property near its estimated market value, artificially inflates the property value through a false appraisal and then resells (flips) the property, often within days of the original purpose for a greatly increased price; although flipping pur se a is not illegal it often involves mortgage fraud which is illegal. |
|
Prostitution |
Soliciting sexual intercourse for pay |
|
Protective sweep |
The authorized search by police of areas and immediately a joining the place of arrest, justified when reasonable suspicion exist that another person might be present or compose a danger to the arresting officer, health constitutional in Maryland v Buei (1990), also called Beui sweep |
|
Proxy data |
Remnants of an interaction, transfer, or exchange of material between two items (Locards exchange principal) the evidence analyzed by forensic scientists to uncover the relationship between people, places, and objects |
|
Proximity informant |
One who can keep tabs on a victims normal schedule and who can establish a routine of contact with the victim, with the principal being too serve as a lifeline to police if something seems wrong or off |
|
Public Safety exception |
Ruling that policeman interrogation of a suspect without first giving them Miranda warning if a public threat exists that might be removed by having the suspect talk |
|
Pulling (dragging) a safe |
Opening safe by inserting a V plate behind the dial and tightening screw bolts on the edges of the V plate until the dial and spindle are pulled out; this method the opposite of punching, works on many older safe but not on new ones |
|
Punching a safe |
opening a safe by shearing the dial from the safe door by a downward blow with a sledge or by holding it chisel to the dial and using a sledge to knock it off exposing the safe mechanism and spindle |
|
Racial profiling |
Occurs when and officer focuses on an individual as of suspect based solely on that person's rate, excluding legitimate factors such as behavior this is unconstitutional |
|
Raid |
A plant, organize invasion that use the elements of surprise to recover stolen property, seize evidence, or arrest a suspect |
|
Rainbow effect |
Refers to the sheen appearance caused when substances such as oil and gasoline, float on the surface of the water |
|
Rape |
Having sexual intercourse with the person against his or her will |
|
Repport |
Understanding between individual created by genuine interest and concern |
|
Raves |
Dance party that feature fast paced, repetitive electronic music and accompanied by light shows and usually entail the use of alcohol, tobacco, and drugs |
|
Reasonable |
Sensible, rational, justifiable |
|
Reasonable force |
Amount of force a prudent person would use in similar circumstances |
|
Rebuttal |
Testimony by witness for the prosecution given to contradict the testimony or evidence presented by the different |
|
Rectangular coordinates (plotting) method |
Uses two adjacent walls of a room at fixed points from which distances are measured at right angles from each wall |
|
Relevant evidence |
Applies to the matter and question |
|
Relevant photograph |
Image that assist or explains |
|
Red gestae statement |
Spontaneous statements made at the time a crime is committed and closely related to actions involved in the crime; considered more truthful then later, planned responsive |
|
Residential burglary |
Occurs in buildings, structures, or attachments that are used as or are suitable for dwelling, even though they may be unoccupied at the time of the burglary |
|
Resolution |
Five nights of image detail either captured with the camera, displayed on a monitor or printed on paper, commonly Quantified by pixels |
|
Restraining order |
A court issued document that aims to restrict an alleged abusers behavior and protect the intended victim, alternately called an order for protection or civil protection order |
|
Reverse buy |
Labor intensive, logisticly complex narcotics investigation tactic, also called the sting |
|
Rifling |
Lands and grooves inside of a weapon, which grip and spin the bullet as it passes through the bore, providing greater projectile control and accuracy |
|
Rigor mortis |
Stiffening of the joints of the body after death because of partial skeletal muscle contraction |
|
Ritual |
Prescribed form of religious or mystical ceremony |
|
Ritualistic crime |
Unlawful act committed within the context of a ceremony |
|
Robbery |
Feloniously taking of another person's property, either directly from the person or in the person's present, through force or intimidation |
|
Robbery by appointment |
A robbery that occurs when a victim willingly meets with the offender, believing a legitimate transaction will occur, also called by and sell robberies or Craigslist robberies |
|
Robo tripping |
Slang for the act of drinking bottles of cough syrup such, as robitussin, to get high |
|
Rogues gallery |
Mugshots gathered in files and displayed in groups |
|
Rohypnol |
The date rape drug, a sedative that dissolves rapidly when placed in a carbonated drink and acts quickly(20 to 30 minutes) to produce physical as well as mental incapacitation after ingestion |
|
Rough sketch |
First, pencil drawing outline of the crime scene which shows the location of objects in evidence within its outline |
|
Rough surveillance |
Moving surveillance in which it does not matter if the surveillance is detected, also called an open surveillance |
|
Routine activity theory |
Crime results from the convergence of three elements in time and space: the presence of likely or motivated offenders, the presents of suitable target, and the absence of guardians to prevent the criminal act |
|
Rule on witnesses |
Common explosion of Witnesses from the courtroom during a trial, in and effort to keep witnesses from hearing each other's testimony, also called the witness sequestration rule |
|
Sabbat |
Gathering of witches |
|
Sadist |
Person who received sexual gratification from causing pain to others, often through mutilation |
|
Sadomasochistic abuse |
Fettering, binding, or otherwise physically restraining; whipping or torturing for sexual gratification |
|
Safe |
Semi portable strong box with a combination lock |
|
Scale |
Used in sketching, determine by taking the longest measurement at the scene then dividing it by the longest measurement of the paper used for sketching |
|
Script kiddie |
A derogatory term used to describe a less talented hacker who must use script or programs created by others to carry out a cyber attack also called a skiddie |
|
Search |
An examination of a person, place, or vehicle for contraband, illicit, or stolen property, or some evidence of a crime to be used in prosecuting a criminal action or offense, by its very nature and intrusion into ones privacy |
|
2nd degree murder |
Contact to cause the death of another but without pre meditation |
|
Seizure |
Taking by law or other government agent of contraband, evidence of a crime, or even a person (via arrest) into custody |
|
Sequestering |
A practiced used during the trial whereby the judge excludes all Witnesses from the courtroom except the person testifying |
|
Serial murder |
Killing of three or more victims with emotional time breaks between the killings |
|
Sexting |
A category of child pronography involving the sending or posting of a nude picture of oneself to another person, or on the internet using a cell phone to transmit the image |
|
Sexual abuse |
Include sexually molesting a child, performing sexual acts with a child, and statutory rape and seduction |
|
Sexual contact (illegal) |
Any sexual act committed without the complainants consent for the suspects sexual or aggressive satisfaction |
|
Sexual exploitation (of a minor) |
To employ, use, persuade, induce, entice, or coerce a minor to engage or assist in engaging in any sexually explicit conduct, for example prostitution or pornography |
|
Sexually explicit conduct |
Any type of sexual intercourse between persons of the same or opposite sex, beastiality, sadomasochistic abuse, lewd exhibition, or masturbation |
|
Sexual penetration |
Includes sexual intercourse, cunnilingus, fellatio, anal intercourse, or any other intrusion, no matter how slight, into the victim's genital, oral, or anal openings by the suspects body or by an object; anemission of semen is not required |
|
Sexual seduction (of a minor) |
Ordinary sexual intercourse, anal intercourse, cunnilingus, or fellatio committed by a non minor with a consenting minor |
|
Short con games |
Schemes in which victims are taken for whatever money they have on their person at the time of the swindle |
|
Show up identification |
On the scene identification of a suspect by victim of or witness to a crime; also called field identification |
|
Shrinkage |
Unexplained or unauthorized deduction of inventory, merchandise, cash, or any other asset from a retail establishment |
|
Silver Alert |
Public notification system similar to Amber Alerts for missing children but that aim to recover missing seniors |
|
Simple arson |
Intentional destruction by fire or explosives that does not create imminent danger to life or risk of great bodily harm |
|
Simple assault |
Intentionally causing another person to fear imminent bodily harm or death or intentionally inflicting or attempting to inflict bodily harm on another; usually a misdemeanor |
|
Sinsemilla |
Homegrown marijuana |
|
Sketch |
Drawing, or to create a drawing, maybe a rough or finished sketch; accurately portrays the physical facts, relates to the sequence of events at the scene, establishes the precise location and relationship of objects and evidence at the scene, helps create a mental picture of the scene for those not present, is a permanent record of the same, and is usually admissible in court |
|
Skimming |
Electronic crime method in which a device is placed in a card reader, such as that found at an ATM, to record sensitive information, such as bank account numbers, credit card numbers, and passwords |
|
Skittling |
Ingesting high doses of Coricidin cough and cold ("Triple C") tablets to get high |
|
Slamming |
The unauthorized switch of a long distance carrier |
|
Slanting |
Including only one side of a story or only fax that tend to prove or support one side's theory; result of a lack of objectivity |
|
Sleeper Cell |
A group of terrorists who blend into a community |
|
Sliding |
Occurs when an unauthorized carrier switches a specific call from the long distance carrier |
|
Smash and grab |
In burglary, breaking a window and taking items from the window display |
|
Smurfing |
More technically known as structuring, a method of money laundering where by large amounts of cash are broken into increments less than $10,000 to avoid federal reporting requirements and deposited into various Bank accounts |
|
Sniffing |
Monitoring data traveling along a network |
|
Sodomy |
Any form of anal or oral copulation |
|
Solvability factors |
Those crucial to resolving criminal investigations |
|
Sources of information file |
Contains the name and location of persons, organizations, and records that can assist in a criminal investigation |
|
Spalling |
Breaking off surface pieces of concrete, cement or brick because of intense Heat |
|
Spam |
Unsolicited email messages, similar in concept to junk mail and commonly commercial in nature; less commonly known by its formal designation as unsolicited commercial email (UCE) |
|
Spoofing |
Requiring unauthorized access to a computer or network through a message using IP address that appears to be from a trusted host; often considered synonymous with phishing |
|
Spyware |
Malicious, covert (difficult to detect) software that infects a computer and a manner similar to a virus, collecting information or executing other programs without the user's knowledge; some programs can track which websites user visits and some can track and capture personal user information |
|
Stake in conformity |
Constellation of variables that, in effect, influence someone to take a particular course of action; for offenders, it constitutes what they stand to lose if convicted, such as marital status, residential stability, or employment |
|
Stake out |
Observing a location from a fixed location; also called fixed surveillance and plant |
|
Stalking |
The willful or intentional commision of a series of acts that would cause a reasonable person to fear death or serious bodily injury and that, in fact, does place the victim in fear of death or serious bodily injury |
|
Standard of comparison |
Object, measure, or model with which evidence is compared to determine whether both originated from the same source |
|
Statement |
Legal narrative description of events related to a crime |
|
Statement analysis |
A technique used to determine whether a person's verbal or written statement is truthful or deceptive |
|
Static IP address |
An IP address that does not change |
|
Statutory rape |
Sexual intercourse with a minor, with or without consent |
|
Steganography |
Greek for "hidden writing" aims to keep everyone, except the intended recipient of a message, oblivious to its very existence by making the message appear as some type of cover message, a shopping list a picture excetera |
|
Sting |
Complex operation organized and implemented by undercover agents to apprehend criminals especially drug dealers; also called a reverse Buy |
|
Stockholm Syndrome |
Psychological phenomenon where hostages feel no ill feelings toward the hostage-takers in fear the police more than their captors |
|
Street game |
A group of individuals who form a social allegiance and engage in unlawful or criminal activity |
|
Striations |
Highly individualized and characteristic scratches made on a projectile (bullet) as it passes through a weapons rifle, provide valuable comparison evidence on recovered bullets |
|
Strikers |
Firefighters who set fires to become Heroes in putting them out |
|
Structuring |
Common method of money laundering whereby large amounts of cash are broken into increments less than $10,000 to avoid federal reporting requirements in deposited into various bank accounts also called smurfing |
|
Subject |
What is observed during surveillance for example a person, place, property, vehicle, group of people, organization, or object |
|
Subpoena |
Written order to appear before the court |
|
Sudden infant death syndrome (SIDS) |
Tragic condition, who's cause is uncertain, that takes the lives of young victims and for which parents may become suspected of child abuse |
|
Suicide |
Intentionally taking one's own life |
|
Suicide by police |
Situation where a person decides he or she wants to die but doesn't want to pull the trigger and so, therefore, creates a situation where police are forced to shoot |
|
Serrebuttal |
Testimony by a witness for the defense given to contradict the testimony or evidence presented by the prosecution |
|
Surveillance |
Covert, discrete observation of people or places |
|
Surveillant |
Plain clothes investigator assigned to surveillance |
|
Tail |
Following people or vehicles on foot or in a vehicle to observe their actions or destinations |
|
Tagging |
Public displays by Urban artists who are unaffiliated with gangs, artistic Expressions that replicate graffiti |
|
Takeover robbery |
The type commonly portrayed in movies in which multiple perpetrators, heavily armed and wearing masks or disguises, conduct a hostile and violent takeover of a Bank lobby, or in persons to the floor and often jumping over teller counters to demand money at gunpoint |
|
Target hardening |
Altering physical characteristics of a property to make it less attractive to criminals also called crime prevention through environmental design (CPTED) |
|
Tech effect |
A broad public awareness up and familiarity with the capabilities of modern technology that indirectly influences jurors expectations regarding forensic evidence |
|
Telematic technology |
Transfer data between a remote vehicle and a host computer such as with bait cars |
|
Temporary custody without hearing |
Removing a child from the custody of parents or guardians for a brief period, usually 48 hours |
|
Terry stop |
Detaining, questioning, and possibly frisking of an individual based on officers Reasonable Suspicion of that individuals involvement in criminal activity |
|
Testimonial hearsay |
Prior testimony or statements made as a result of police interrogation, a witness's statement obtained through "structured questioning" by police officers that is inadmissible in a criminal trial unless the witness is unavailable to testify and was previously cross-examined by the defendant |
|
The well |
Area within the courtroom that exists in front of the judge, in between the judge in the attorneys tables, normally off-limits and to be entered under only if the judge so directs or permission is granted traditionally, the area is a swords length and was intended for the judges protection |
|
Third degree |
Use of physical Force, threats force, or other physical, mental, or psychological abuse to induce a suspect to confess |
|
Tight surveillance |
Staying within a few steps of the subject or keeping the subject Insight, used when it is extremely important not to lose the subject, also called Close surveillance |
|
third-degree murder |
Death that results from an imminently dangerous act but does not involve premeditation or intent |
|
Tool mark |
Impression left by a tool on a surface |
|
Torch |
A professional arsonist |
|
Totality of circumstances test |
Principle upon which a number of legal assessments are made, refers to the sum total of factors leading a reasonable person to a course of action |
|
Toxicology |
Study of poisons, toxicologists are consulted a food or drink poison is suspected |
|
Trace evidence |
Extremely small physical matter |
|
Trailer |
Half, consisting of paper, hey, flammable compounds, or any other substance that burns, that is set down for a fire to follow, indicates arson |
|
Trap photography |
Photos that prove an incident occurred; can assist in identifying suspects and weapons used; can also corroborate witness testimony and identification, also called surveillance photography |
|
Triangulation (plotting method) |
Uses straight line measurements from two fixd objects to the evidence to create a triangle with the evidence in the angle formed by the two straight lines, the degree of the angle form to the location of the object or evidence can be measured with a protractor |
|
Trojan Horse |
Malicious program hidden inside and apparently harmless, legitimate program and intended to carry out unauthorized or illegal functions |
|
True (uncontaminated) scene |
Crime scene where no evidence has been introduced or removed except by the person(s) committing the crime |
|
Turf |
Geographic area claimed by a gang; often marked by graffiti |
|
Tweaker |
Methamphetamine addict |
|
Ultraviolet photography |
Uses the low end of the color spectrum, which is invisible to human sight, to make visible impressions of bruises and injuries long after there ocurrence, type of weapon used can often be determined by examining its impression, developed using ultraviolet light |
|
Undercover |
Using an assumed identity to obtain information or evidence |
|
URL |
Uniform resource locator, a string of characters representing an internet resource |
|
Vault |
Stationary security chamber of reinforced concrete, often steel lined, with a combination lock |
|
Vehicle identification number (VIN) |
Primary non duplicated, serialize number assigned by the manufacturer to each vehicle manufactured, this number critical in motor vehicle theft investigations identifies the specific vehicle in question |
|
Verified response policy |
Procedure implemented by some law enforcement agencies, whereby they will not respond to a burglary alarm unless criminal activity is first confirmed through either an on-site security officer or some method of electronic surveillance, such as CCTV |
|
Victimology |
The collection of significant and relevant information related to a victim in that victims lifestyle which helps investigators develop and ascertain suspects, motives, and risk factors |
|
Victimless crime |
Illegal activity in which the victim is a willing participant, for example a person who bets |
|
Visible fingerprints |
Prints made when fingers are dirty or stained and leave their impression on a glossy or light-colored surface and can be dusted and lifted |
|
Voice print |
Graphic record of an individual's voice characteristics made by a sound spectrograph of the energy patterns emitted by speech |
|
Voluntary manslaughter |
Intentionally causing the death of another person in the heat of passion |
|
Voyeurism |
The act of gaining sexual pleasure from watching others when they are naked or engaged in sexual activity of Voyer is often called a Peeping Tom |
|
Waiver |
Giving up of certain rights |
|
White collar crime |
Business-related or occupational crime that involves illegal acts characterized by fraud, concealment, or a violation of trust it does not depend on the actual or threatened use of physical force or violence, for example embezzlement, computer crimes, bribery, pilferage, also called corporate crime or economic crime |
|
Wiretapping |
Intercepting in recording telephone conversations by a mechanical device without the consent of either party in the conversation |
|
Witness sequestration rule |
Common practice of excluding Witnesses from the courtroom during a trial to prevent one witness from hearing another Witnesses testimony also called the rule on Witnesses |
|
Worm (computer) |
Self contained program that travels from machine-to-machine across network connections, often clogging networks and information systems as it spreads; need not become part of another program to propagate its |
|
Zero floor release |
Requirement that all transactions by credit card be authorized |
|
Zombie |
Computer that has been taken over by another computer, typically through infection with hidden software (virus) that allows the zombie machine to be accessed and controlled remotely, often with the intention of perpetrating attacks on other computers |