• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/538

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

538 Cards in this Set

  • Front
  • Back

Felony

Any crime punished by 1 year or more in a penitentiary

Misdemeanor

Any crime punishable by less than 1 year in a jail

Modus operandi

The usual way a suspect commits thier crime

Accelerants

Substances that cause fires to burn faster and hotter

Active voice

In which the subject performs the action of the sentence; contrast with passive voice.

Adipocere

So be appearance of a dead body left for weeks in a hot, moist location

Administrative warrant

Official permission to inspect a given property to determine compliance with city regulations. for example, compliance with fire codes

Admission

Statement containing some information concerning the elements of a crime, but falling short of a full confession.

Adoptive admission

Occurs when someone else makes a statement in a person's presence and under circumstances where it would be logical to expect the person to make a denial of the statement falsely implicating him or her but the person does not deny the allegations

Advanced Fingerprint Information Technology (AFIT)

An integrated system, the precursor to which was the FBI's AFIS ,that can also incorporate additional biometric data such as latent conference and facial recognition technology

Adversary system

Justice system used in the United States; establishes clearly defined roles for the prosecution and the defense and sets the judges as the neutral party

Adware

Type of spyware used by advertisers to gather consumer and marketing information

aggravated assault

(Felonious assault) unlawful attack by one person on another to inflict severe bodily injury

Aggravated arson

Intentionally destroying or damaging a dwelling or other property real or personal by means of fire or explosion creating in imminent danger of two life or great bodily harm which risk was known or reasonably foreseeable to the suspect

Algore mortis

Postmortem cooling process of the body

Analogs

Drugs created by adding to or omitting something from an existing drug

Antichrist

Son of Satan

Anticipatory warrant

One based upon prior knowledge or in an affidavit showing probable cause that it some future time (but not presently) certain evidence of crime will be located at a specified place; such warrants are constitutional if a proper showing is made that contraband or evidence will likely be found at the target location at a given time, or when is Pacific trigger in event occurs.

Apple picking

A particularly brazen type of robbery in which is suspects snatches and iPhone iPad or other mobile device directly from the hands of it's user

Arc mapping

Involves the survey and analysis of the location where electrical arcing has caused damage to determine the origin of a fire.

Arrest

Taking a person into custody in the manner authorized by law to prevent that person before magistrate to answer for the commission of a crime

Arson

Malicious willful burning of a building or property

Asphyxiation

Death or on consciousness resulting from insufficient oxygen to Supply the red blood cells reaching the body tissues in the brain

Assault

Unlawfully threatening to harm another person, actually harming another person or attempting unsuccessfully to do so; formerly referred to threat of or attempts to cause bodily harm and now usually includes battery

Associative evidence

Links a suspect with a crime

Asymmetric warfare

Combat and which a weaker group attacks a superior group not head on the by targeting areas where the adversary least expect to be hit causing great psychological shock along with loss of life among random victims

Autoerotic asphyxiation

Accidental death from suffocation strangulation or chemical asphyxia resulting from a combination of ritualistic behavior, oxygen deprivation, danger and fantasy for sexual gratification.

Bait car

Hey model of vehicle with a high separate that is elected and place in a high crime area as bait for motor vehicle theft

Ballistics

The study of the dynamics of projectile from proportion through flight to impact; a narrower definition is the study of the functioning of firearms

Bait money

Currency for which serial numbers are recorded placed so it can be added to any robbery loot.

Baseline (plotting) Method

Establish is a strategic line from one fixed point to another from which measurements are taking at right angles

Battery

Actually hitting or striking someone

Beach heading

Interrogation technique where officer questions a custodial suspect without giving them Miranda warnings and obtained incriminating statements the officer then gives the warning, gets the waiver and repeats the interrogation to obtain the same statement

Beelzebub

Powerful demon ,subordinate only to Satan, according to Satanist

Bench trial

Hey trial before a judge without a jury

Best evidence

Original object or the highest available degree of proof that can be produced

Bias crime

Motivated by bigotry and hatred against a specific group of people

Bigamy

Marrying another person when one or both of the parties are already married

Biometrics

The statistical study of biological data and a means to positively identify an individual by measuring that person's unique physical or behavioral characteristics such as fingerprints

Bioterrorism

Involves dissemination of such biological weapons of mass (WMD) destruction as anthrax and smallpox

Bitcoin

And internet currency used in online payment programs

Black mass

Diabolical communion ritual performed by Satanist that mock and educate the Christian mass

Blind reporting

Allow sexual assault victims to retain their and anonymity and confidentiality while sharing critical information with Law enforcement; also permits victims gather legal information from Law enforcement without having to commit immediately to an investigation

Blood stain pattern analysis

The study of blood stains to assist in establishing spatial and sequential events that occurred during and sometimes after the act of blood shed

Blowing (a safe)

Opening a safe using cotton primer cap copper wire and nitroglycerin

Body packing

A method of smuggling for otherwise concealing drugs inside a body opening including the rectum or vagina

Bookmaking

Soliciting and accepting bets on any type of sporting event

Boosters

Professional shoplifters

Bore

Inside portion of a weapons Barrel which is surrounded by raised ridges called lands and recessed areas called grooves

Bracket

Testimony tactic that allows the witness some leeway and helps him or her retain credibility provides the range; for example he was 40 to 50 feet way

Brady rule

Entitles the accused to information as provided by the statues of the state and disclosure of exculpatory evidence

Bugging

Using a machine to record conversations with in a room without the consent of those involved

Buie sweep

authorized search by police of areas immediately adjoining the place of arrest justified when reasonable suspicion exist that another person might be present who poses a danger to the arresting officers held constitutional in Maryland v. Buie (1990) synonymous with protective sweep

Bullying

A form bof ehavior that encompasses a variety of negative acts carried out repeatedly over time and involves a real or perceived imbalance of power with the more powerful child or group attacking those who are less powerful

Bump key

A burglary tool a generic key used along with another mechanism to apply force to open a lock

Burning (a safe)

Opening a safe using a burn bar or other safe cracking device to burn a hole into the safety gain entry

Bustout

They type of check fraud in which a perpetrator first deposits a fictitious check that appears to be genuinely drawn on a real account into a checking or credit card account at a financial institution. Immediately there after the subject withdrawals funds from the account into which the fictitious check was deposited once the fraudulent nature of the check is discovered and the check is dishonored by the institution the account has been "busted"

Caliber

Diameter of a weapons bore as measured between lands as well as the size of bullet intended for use with they specific weapon

Capital flight

Large scale removal of funds or capital for my country; not to be confused with money laundering

Carjacking

taking of a motor vehicle from a person by force or the threat of force

Car shopping

The theft of items from unlocked cars

Cast

To make an impression using plaster of Paris or a similar substance; also the physical reproduction of such an impression

Chain of custody /chain of evidence

Documentation of what has happened to evidence from the time it was discovered until it is needed in court including every person who has had custody of the evidence and why

Chicken hawk

An adult who has either heterosexual or homosexual preferences for young boys or girls of a specific limited age range, used synonymously with pedophile

Child molestation

Violation of a child by lewd or lascivious acts indecent exposure incest or statutory rape usually a felony

Chopping (a safe

Opening a safe by chopping a hole in the bottom of the safe large enough to remove the contents

Chop Shop

A business usually an auto body shop that disassemble stolen vehicles and sells the parts

Chronological order

In time sequence

Circumstantial evidence

Evidence from which inferences are drawn; fact or event that tends to incriminate a person in a crime. for example being seen running a from a crime scene, also called indirect evidence

Civil liability

Persons degree of risk of being sued; any person acting under the authority of law who violates another person's constitutional rights can be sued

Class characteristics

Features that place an item into a specific category for example the size and shape of a tool

Clearance rate

The rate of crimes resolved to the number of crimes reported

Click jacking

Concealing a hyperlink beneath legitimate clickable content which when clicked leads to the execution of hidden unintentional actions such as downloading malware or sending personal information to a website

Cloning

A crime in which stolen vehicles are given a copied VIN to assume the identity of legally owned or non stolen vehicles of similar make and model

Closed-ended question

Requires only a yes or no or other short simple answer and should be avoided during interviews; not to be confused with a direct question

Close surveillance

Staying within a few steps of the subject or keeping the subject in sight. used when t is extremely important not to lose the subject also called tight surveillance

Closing robbery

A robbery carried out at the end of the business day

Club drugs

Commonly found at Raves and dance parties

Cocooning

The idea that victims of violence need to surround themselves with others who are aware of the situation and can be an extra set of eyes and ears, a layer of protection to alert authorities if the victim is unable to call for help.

Cognitive interview

Interviewing technique that helps victims or witnesses put themselves mentally at the scene of the crime

Commercial burglary

One that invovles churches, schools barns, public buildings, shops, offices, stores factories, warehouses stables, ships or railroad cars

Community policing

Philosophy that the police must work with the community through partnerships and problem-solving to address problems of crime and disorder; a belief that by working together the police and the community can accomplish what neither can accomplish alone

Compass-point (plotting) method

Uses a protractor to measure the angle formed by two lines

Competent evidence

Has been properly collected, identified, filed and continuously

Competent photograph

Accurately represents what it purports to represent, is properly identified and is properly placed in the chain of evidence and secured until court presentation

Complainant

Person you request an investigation for the action be taken; is often the victim of a crime

Computer crime

That which involves the addition, deletion, change or theft of information

Computer virus

Program created specifically to infect other programs with copies of itself, it attacks, attaches itself to and becomes part of another executable program

Concise

Avoiding wordiness making every word count without leaving out important facts

Conclusionary language

Non-factual, drawing inferences, for example, "the man was nervous"; to be avoided in police reports

Confession

Information supporting the elements of a crime that is provided and attested to by any person involved in committing the crime can be oral or written and must be voluntary and not given in response to threats promises or rewards

Confidence game

Obtains money or property buy a trick, device, or swindell that takes advantage of a victims trust in the swindeller; the confidence game offers a get rich quick scheme

Confidential (reliable) informant

And individual who has previously provided information to the police which was cooroborated and use

Connotative

Adjective describing words that have an emotional affect with meaning that impart either positive or negative over tones.

Contagioun effect

Phenomenon in which media publicity of an act or event inspires more such acts or events, for example of belief that coverage of terrorism in spires more terrorism

Contamination

Post crime transfer of material to or from evidence

Content

What is said in a narrative as opposed to form which is how a narrative is written; the content of an effective report is factual, accurate, objective, and complete

Cook (meth)

Someone who produces methamphetamine

Corporal punishment

The intentional infection of pain or injury in an effort to correct or discipline children

Corporate crime /white color crime

Business related or occupational crime that involves illegal acts characterized by fraud, concealment, or violation of trust and does not depend on the actual or threatened use of physical force or violence . for example embezzlement, computer crimes, bribery, pilferidge, also called corporate crime or economic crime

Corpus Delicti

:Body of a crime" elements of a specific crime; evidence establishing that a specific crime has been committed.

Corpus delecti evidence

Establish is that a crime was committed

Coven

Group of witches or Satanist

Cover

Assumed identity used while on and undercover assignment

Crack

Cocaine mix with baking soda and water heated in a pan and then dried and split into pallet-sized bits or chuncks, which are smoke to produce affects reportedly 10 times greater than powder cocaine at a fraction of the cost.

Cracker

Computer hacker in the negative sense someone who cracks software protection and removes it deliberately and maliciously intruding into a computer or network to cause damage

Cramming

Billing consumers for unauthorized, misleading receptive charges such as a personal 800 number, paging, and voicemail.

Crank

Street name for methamphetamine not to be confused with crack

Crazing

Formation of irregular cracks in glass cause by rapid in Tempe can indicate arson or the use of an acccellerant.

Crime

Act or omission forbidden by law, punishable by a fine or even death, crimes and their punishment are established and defined by state and federal statues and local ordinances

Crime mapping

Focuses on the location of crimes the hot spots where most grams occur rather than on the criminal

Crime prevention through environmental design CPTED

Altering physical characteristics of a property to make it less attractive to criminals for example removing shrubbery next to windows and doors, improving lighting and closing garage doors; also called target hardening

Criminal enterprise

By FBI definition a group of individuals with an identified hierarchy or comparable structure engaged in significant criminal activity. Although organized crime and criminal enterprise are often acquainted and used interchangeably, several federal statutes specifically delineate the elements of an enterprise that must be proven to connect individuals or groups under those statutes

Criminal homicide

Includes murder and manslaughter and is a felony

Criminal intent

Performing in unlawful act on purpose knowing back to be illegal

Criminal investigation

The process of discovering, collecting, preparing, identifying, and presenting evidence to determine what happened and who is responsible

Criminalist

A person who searches for, collects, and preserves physical evidence in the investigations of crime and suspected criminals also called a crime scene technician, examiner, or investigator

Criminalistics

Specialist trained in recording identifying and interpreting the menutiae (minute details) of physical evidence.

Criminal negligence

Acts of commission or omission creating situations resulting in unreasonable risk of death or great bodily harm

Criminal profiling

Method of suspect identification that attempts to identify the individuals mental, emotional and psychological characteristics, also called psychological profiling

Criminal statute

Legislative act relating to crime and it's punishment

Cross-contamination

Allowing items of evidence to touch one another and thus exchange matter

Cross examination

Questioning by the opposite side in a trial that attempts to assess the validity of testimony given under direct examination

Cross projection sketch

Presents the floor in walls of a room as though they were on the same surfice

CSI effect

The phenomenon in which unrealistic for trails of forensic science translate into equally unrealistic expectations from not only the public but also other professions that operate within the justice system

Cult

System of religious beliefs and rituals and its body of adherents also called new religious movement (NRM)

Culturally adroit

Skilled in interacting across gender, ethnic, generational, social and political group line

Cunnilingus

Sexual activities involving oral contact with the female genitals

Curtilage

Portion of the residents that is not open to the public and is reserved for private owner or family use, I contrast to sidewalks and allyways which are used by the public and which hold no reasonable expectations of privacy

Custodial interrogation

Questioning by law enforcement officers after a person has been taken into custody or otherwise deprived of freedom in a significant way; requires that the Miranda warnings be given

Cyber bullying

The willful and repeated use of cell phones, computers and other electronic communication devices to harass and threaten others, essentially cyber stalking or cyber harassment involving minors

Cyber crime

Part of a larger category of cyber crime a criminal act that is carried out using cyber technology and that takes place in cyber space

Cyber stalking

Repeated use of the Internet, email, or other digital electronic communication devices to stalk another person.

Cyber terrorism

Premeditated, politically motivated, attack against information, computers system, computer programs, and data that results in harm to noncombatants targets by subnational groups or clandestine agents; also refers to the use of a computer system as a conduit for causing terror

Cycle of violence

A three phase cycle of domestic violence- tension building stage, accute battery episodes, the honeymoon, and back to the tension building stage which typically increases in both frequency and severity.

Data mining

Process that uses powerful analytical tools to quickly and thoroughly Explorer mountains of data to discover new patterns or confirm suspected patterns or trends

Data remenance

Refers to the residual physical representation of data that have been erased from a computer hard drive

Date rape

Type of sexual assault were the victim knows the suspect

Daubert standard

Two pronged requirement that an experts testimony be both reliable and relevant

Deconfliction

Protocal or guidelines to avoid conflict can be applied to declassified and confidential investigation

Deductive reasoning

A logical process in which a conclusion follows from specific fact a reconstructive process based on specific pieces of evidence to establish proof that a suspect is guilty of an offence

De facto arrest

Functional equivalent of an arrest; illegally bringing someone in for questioning without probable cause any evidence obtained through this method is inadmisdible in court

Defense wounds

Non fatal wounds cuts on the hands arms and legs inccurd by victims as they attempt to ward off at actors indicative of murder

De minimus communication

Allowed or acceptable contact between a witness and a juror such as exchanging a simple hello or giving directions

Denial of service (DOS) attack

Disruption or degrafation of a computer or networks internet connection or email service that intterupts the regular flow of data; using multiple agents to create a widespread interruption ais a distributed DoS or DDoS

Denotative

adjective describing words that have little emotional affect and are objective in there meaning

Depressant

Drug that reduces Restless Ennis and emotional tension and induce asleep, most common are the barbiturates

Depth of char

How deeply wood is burned, indicates the links of burn in the fires point of origin

Designer drugs

Substances created by adding to or taking something away from and existing drug

Digital penetration

The act of using fingers (digits) to penetrate or manipulate sexual organs that includes the penis vagina and anus

Direct evidence

Establishes proof of a fact without any other evidence

Direct question

Is to the point, with little chance of misinterpretation, for example "what time did you leave?"

Discovery process

Pretrial disclosure between prosecution and defense about the evidence they intend to use at trial thus avoiding "trial by surprise"

Disposition

How a case is disposed of for example ,referred, closed (inactive), open (active), dismissed, pending further information and so on.

Disrupters

Devices that use gunpowder to fire a Jet of water or projectile at a particular component of an explosion to make it safe

DNA deoxyribonucleic acid

Organic substance found in the nucleus of living cells that provide the genetic code determining a person's individual characteristics

DNA profiling

Forensic analysis of blood, hair, saliva, semen or cells from any part of the body to ascertain a positive identity or match.

Domain name

Unique name of a computer system on the internet that distinguishes it from all other online systems associated with a specific IP address easier to remember the next train of numbers, not then same as a web address

Domestic terrorism

Activities that involve acts dangerous to human life that violate federal or state law; appear intended 1) to intimidate or course a civilian population 2) to influence the policy ever government by intimidation or torsion or 3) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and that occur primarily within the territorial jurisdiction of the United States

Domestic violence

Patterns of behaviors involving physical, sexual, economic and emotional abuse alone or in combination often by an intimate partner and are often for the purpose of establishing and maintaining power and control over the other person

Doxing

Publicly releasing a person's personal sensitive identifying information online without authorization

Dragging (a safe) aka Pulling

opening a safe inserting a V plate behind the dial and tightening screw bolts on the edges of the V plate until the dial and spindle are pulled out this method is opposite of punching and works on many older space but not on new ones

Dye pack

Bundle of currency containing color dye and tear gas, taken doing a robbery, it is activated when the robber crosses and electromagnetic field at the facilities exit, staining the money with brightly colored dye and emitting a cloud of colored smoke

Dyer act

Made Interstate transportation of a stolen water vehicle a federal crime and allowed for federal assistance in prosecuting such cases

Dying Declaration

A statement that can prove valuable information to investigations and usually qualifies as they hearsay exception making it admissible evidence.

Dynamic IP address

And IP address that fluctuates it is more secure because it is changed frequently

Economic crime AKA white collar crime

Business related or occupational crime that involves the legal acts characterized by fraud, concealment, or violation of trust it does not depend on the actual of threatened used to physical for surveillance for example embezzlement computer crimes robbery pilferage also called. corporate crime or economic creme

Eco terrorism

Seeks to inflict economic damage to those who profit from the destruction of the natural environment

E crime

Electronic crime, any criminal violation in which a computer or electronic media is used in the Commission of that prime also called cyber crime

Ecstasy MDMA

Derivative of amphetamine or speed a powerful stimulant increasingly popular club drug

Elder abuse

Physical or mental mistreatment, financial exploitation and general neglect of the elderly may include fraud as well as assault battery and even murder

Elements of the crime

Specific conditions that must have occurred for an act to be called a specific kind of crime

Elephant in a matchbox doctrine

Requires that searches consider the probable size and shape of evidence they seek because for example large objects cannot be concealed in tiny areas

Elimination Prints

Fingerprints taken of every individual whose prints are likely to be found at the crime scene but who are not suspects

Embezzlement

Fraudulent appropriate enough property by person to whom it has been entrusted

Emotional abuse

Causing fear or feelings of unworthiness in others with children this occurs by such means as locking them in closets ignoring them or constantly belittling them

Encryption

Techniques that puts information in code and thus obscures a normally comprehensive a message

Entrapment

Tricking someone into committing a crime that here she would not normally commit

Equivocal death

Situations that are open to interpretation in investigation, the case may present as homicide suicide or accidental death pending on the circumstances

Evidence

Data on which a judgement or conclusion may be based use for determining the facts and a case for later laboratory examination and for direct presentation Court

Exceptionally cleared

Disposition of a case when circumstances outside the investigation result in no charges being filed example if the suspect dies

Excessive force

More than ordinary force justified only when exceptional resistance occurs and there's no other way to make the arrest

Excited delirium

Describes the manifestation of extreme drug abuse may occur in people under the influence of illicit stimulant substance such as cocaine or in people with the history of mental illness who are not taking their medications

Excluionary rule

Establish that the courts cannot accept evidence of pain by unreasonable searches seizures either regardless of us relevance in the case. Weeks v. United States, Mapp v. Ohio

Excusable homicide

Unintentionally truly accidental killing of another person

Exhibitionists

People who gain sexual satisfaction by exposing themselves

Exigent circumstances

Emergency situation they do not require a warrant

Expert testimony

That presented by person deemed to have specialized training, skills, or experience in a particular area that will help the jury understand the topic and evidence presentation

Exploitation

Taking unfair advantage of Children or using them illegally

Expressive violence

Stems from hurt feelings anger or rage in contrast to instrumental violence which is gold directed predatory behavior used to exert control

Fellatio

Sexual activity involving oral contact with the male genitals

Female genital mutilation

A procedure that involves partial or total removal of the external female genitalia or other injury to the female genitalia organs for non medical reasons

Femicide

Murder of a woman

Fence

Go between her received stolen goods for resale

Field identification

On the scene identification of a suspect by the victim or witnesses to a crime, conducted within a short time after the crime was committed also called show up identification

Field interview

When questioning occursspontaneously up the scene

Finished scale drawing

Done in ink on a good grade of paper and drawn to scale using exact measurements

Fire play

Behavior that conveys a low level of intent to inflact harm an absence of malice; rather in involves curiosity and fascination

Fire setting

Behavior the involves malice and intent to inflict harm

Fire triangle

Three elements necessary for a substance to burn, heat, fuel and air

Firewall

Software or Hardware protective measure that block sports of access to a computer or network to prevent an authorized access and stop malicious programs from entering

First degree murder

Pre meditated killing of another person or killing someone while committing or attempting to commit a felony

First person

Use of I, me, we and us in speaking in writing and contrast to the second person (you) and the third person (he or this officer.)

Fixed surveillance

Observing a from a fixed location also called plant and steakout

Flaggers

Theived who go around neighborhood targeting mailboxes with their flags up searching for envelopes containing checks and other forms of payment

Flash mob

Theft technique where a mass of individuals rapidly enter, steal from, and exit an establishment overwhelming employees ability to do anything about the situation, also called mob rob or swarming

Flash roll

Money used in an undercover drug buy

Floor release limit

Maximum dollar amount that maybe paid with a check or credit card without authorization from the central office unless the business assumes liability for any loss

Fluffing

Increasing telephone rates without notification

Force

Amount of physical influence required to control of persons behavior under police authority

Forcible rape

Sexual intercourse against a person's will by use or threat of force

Forensic photogrammetry

Technique of extrapolating 3D measurements directly from two dimensional photographs

Forensic science

Application of the physical sciences and there technology to examine physical evidence of crime includes the branch of Criminalistics

Forgery

Signing someone else's name to document or all during the name for amount on a check for document with the intent to defraud

Form

How a narrative is written, in contrast to content which is what it said in a narrative, the form of a well written report is concise, clear grammatically and mechanically correct and written in standard English

Fraud

Intentional deception to cause a person to give up property or some lawful right

Frisk

External search of an individuals clothing also called a pack down

Fruit of the poisonous tree doctrine

Establish that evidence of paint as results of an earlier illegality must be excluded from trial

Full Faith and Credit

Legal status where in a document, contract, license or Court order issued anywhere in the country is legally binding and enforceable nationwide

Fusion Center

A repository of intelligence and information where analysis crunch data to produce actionable knowledge, a national network of such centers promotes and facilitates information and intelligence sharing among local, State, and federal law enforcement agencies in the effort to fight crime and terrorism

Gang

A group of people who form an allegiance for a common purpose and engage in unlawful or criminal activity

Geographic profiling

Uses the fact that everyone has a pattern in there lives particularly in relation to the geographical areas they frequent, to help identify suspects who commits multiple crimes (serial criminals)

Giglio impaired

A condition in which there exists potential impeachment evidence that would render the officers testimony in a case or for future cases of marginal value

Good faith doctrine

Establish that illegally obtained evidence maybe admissible if the police were truly not aware they were violating the suspect 4th amendment rights

Gouging

Charging undisclosed fees when calls are made from payphone or hotel rooms

Graffiti

Wall writing; Sometimes called the "newspaper of the street"

Grand larceny

Felony based on the substantial value of the property stolen

Hacker

Computer buff; one who intrude into anothers computer or network for the challenge and status, it's not necessarily a negative term in contrast to a cracker who is someone who intrudes to commit a crime

Hacktivism

Using cyber space to harass or sabotage sites that conduct activities or advocate philosophy that Hacktivists find unacceptable

Hallucinogens

A drug that induces hallucinations or perceptual distortion of reality for example LSD DMT and PCP for Angel dust.

Hand of glory

Left hand of a person who has died

Hardware disabler

A device designed to ensure a self destruct sequence of any potential evidence it maybe present on or around a computer with a remote power switch being the most prevalent of the disabler Hardware devices

Hate crime

In which the defendant intentionally selects a victim or in the case of a property crime the property that is the object of the crime because of the actual or proceed race, color, National origin, ethnicity, gender, disability or sexual orientation of any person also called bias prime

Hate incidents

Behaviors that though motivated bias against the victims race religion ethnic national origin gender age disability or sexual orientation are not criminal acts, for example hostile or hateful speech or other disrespectful or discriminate or behavior motivated by bias.

Hawala

Informal banking system based on trust and often bartering, common throughout the middle East and used to transfer billions of dollars every year

Hearsay

What one has heard from another what was told about by others

Heat of passion

Extremely volatile emotional condition

Hebephile

Person who select high school-aged youth. a sex victims

Hesitation wounds

Leesd severe cutting mark caused by and individuals attempt to build up nerve before making a fatal cutting wound, indicates suicide

Hit and run burglary

Theft in which a window is smashed you're still merchandise also called a smash and grab

Holder

Person to him a credit or debit card is issued and who agrees to pay obligations are rising from it's use

Home invasion

A forced entry into an occupied dwelling to commit a violent crime whether robbery, sexual assault, murder or some combination of violent offensive

Home grown violent extremist (HVEs)

U.s. based individuals with loose affiliation to terrorist groups overseas

Homicide

Killing of one person by another

Hot sheet

A list of stolen vehicle

Hot spots

Geographic areas with the higher incidence right of Criminal activity

Human trafficking

The act of recruiting, harboring, transporting, providing or obtaining a person for compelled labor or commercial sex acts, through the use of force, fraud or coercion modern-day slavery also called trafficking in persons

Identity theft

Criminal active of assuming someone else's identity for some type of gain, normally financial

Igniters

Substances or devices used to start a fire

Imaging

Making a byte by byte copy of everything on the hard drive

Immediate control

Within a person's reach

Immersive imaging

360 degree photographic view of a crime scene that allows viewers to virtually "walk through it" as though they were there

Immobilizer

Device in which a Vehicles engine recognizes only the preprogrammed key assigned to the vehicle, in an effort to prevent auto theft

Impeach

To discredit testimony, to challenge the truth or accuracy of what a prosecution witness testified to under direct examination

Incantation

Verbal spell ritualistic prayer

Incendiary

Describes a fire ignited intentionally and maliciously under circumstances in which a person knows that the fire should not be set; arson

Incest

Sexual intercourse between family members or close relative including children related by adoption

In custody (custodial arrest)

The point at which an officer has decided a suspect is not free to leave; there has been considerable deprivation of the suspect liberty or the officer has arrested the suspect

Indecent exposure

Ones Jennifer's to another person to such an extent as to shock the others sense of decency

Indicator crimes

Offences that, in situations involving the same victim and suspect, can establish a pattern of events indicative of an abusive relationship can range from harassing phone calls to hit in run

Indirect evidence

Evidence from which inference are drawn; fact or event that that tends to incriminate a person in a crime, for example being seen running from a crime scene also called circumstance evidence.

Indirect question

Skirts the issue, for example how do you and the victim get along? should be used sparingly if at all

Individual characteristics

Features that distinguish one item from others of the same type also called identifying characteristics

Inevitable discovery doctrine

Established that if the legally obtained evidence would in all likelihood eventually have been discovered legally, it may be used

Inductive reasoning

Going from the generalization and establishing it by gathering specific fax

Informant

Any individual who can provide information related to a case but who is not a complainant, witness victim or suspect

Information age

A period driven by information rather than by agriculture or industry as in the past

Inkless fingerprints

Digital Live-Scan capture of a fingerprint that can be stored in a database for special retrieval

In Loco Parentis

Having the authority to take the place of the parent, teachers usually have this right

Instrumental violence

Goal directed predatory behavior used to exert control in contrast to expressive violence which stems from hurt feelings, anger for rage

Integration

3rd and final step in the money laundering cycle where criminals repatriate their money through seemingly legitimate business transactions

Integrity of evidence

Referring to the requirement the any item introduced in court must be in the same condition as when it was found at the crime scene

International terrorism

Activities that involve violent acts or acts dangerous to human life that violate federal or state law appear to be intended 1 to intimidate or course a civilian population 2 to influence the policy of a government by intimidation or corrosion or 3 affect the conduct of a government by Mass destruction, assassination or kidnapping and occur primarily outside the territorial jurisdiction of the United States or transend national boundaries and terms of the means by which they are accomplished, the person's they appear intended to intimidate or coerce or the locale in which their perpetrators operate or seek asylum.

Internet protocol address IP

Unique number analogous to a phone number, needed to access the internet, commonly issued by a users internet service provider ISP

Interrogation

Questioning people suspected of direct or indirect involvement in the crime being investigated

Interview

Questioning people not suspected of being involved in a crime but who knows something about the crime or the individuals involved in it

Intifada

Armed uprising of Palestinians against Israel's occupation of the West bank and the Gaza Strip

Intimate partner violence IP V

Domestic violence directed by one partner against another

Intimate Parts

Usually referrs to the primary genital areas groin, inner thighs, buttocks and breast

Intuition

sudden knowing without any conclusion, reasoning or parent logic, based on knowledge and experience or what is commonly called "Street sense", a gut feeling develop by experience

Investigate

Observe for study closely to inquire into something systematic Lee in a search for truthful information

Involuntary manslaughter

Accidental homicide that results from extreme (cupable) negligence

Islamic state of Iraq and Levant (ISIL)

G hottest group formerly known as Alki de and Iraq establish in April 2004 by long time Sunning extremist Abu Musab al-Zarqawi

Jamming

Setting up roadblocks to make it difficult to switch in-state long distance service

Jargon

The shorthand vocabulary and technical terminology specific to a particular profession or trade that allows colleagues within the area of work to communicate quickly and concisely l

Jihad

Holy war

Joyriding

Simply taking a vehicle for fun, often driving recklessly and without regard for any damage caused to the vehicle itself or other property and then abandoning it

Justifiable homicide

Killing another person under authorization of the law

Key stroke logging

Diagnostic technique that captures a users key strokes used in espionage to bypass security measures and obtain passwords or encryption keys, also called keylogging

Kidnapping

Taking a person to another location by force often for ransom

Larceny /theft

Unlawful taking carrying leading or driving away of property from anothers possession

Laser beam photography

And imaging process that reveals evidence indiscerable to the naked eye such as the outline of a footprint in a carpet even though the fibers have returned to normal position

Latent fingerprints

Print impressions transferred to a surface eithet by sweat on the ridges of the fingers or because the fingers carry residue of oil, dirt, blood or other substances

Layering

2nd step in the money laundering process where the money is "cleaned" by moving it around through a series of elaborate transactions Austin involving offshore bank account and International business companies (IBCs)

Leading question

Prompts for leaves a person to a specific response and often implies an answer, a useful interrogation techniques

Leads

Avenues bearing clues or potential sources of information relevant to solving a crime

Leakage

The illegal or unauthorized removal of cargo from the supply chain a concept similar to that of shrinkage

Legend

The part of a crime scene sketch containing the case number, type of crime, name of victim or complainant, location, date, time, investigator, anyone assisting, scale of the sketch, direction of North, and name of the person making the sketch

legibility

Refers to the ease with which a handwritten or type printed character is recognized based on its appearance

Lewdness (with a minor)

Touching aminor to arouse apeal to, or gratify the perpetrators sexual desires, the touching maybe done by the perpetrator or by the minor under the perpetrators direction

Liver mortis/ postmortem lividity

Dark blue or purple discoloration of the body for blood has drained to the lowest level after death also called simple lividity

Loan sharking

lending money at exorbitant rates

Locard's principle of Exchange

Basic forensic theory that objects that come in contact with each other always transfer material, however minute, to each other

Lock bumping

A lock picking technique used on standard pin tumbler locks in which a generic key is used along with another mechanism to apply forced to open the lock

Logic bomb

Secretly attaches another program to a company's computer system; the attached program monitors the input data, awaits for some type of error to occur, when this happens the new program exploits the weakness to steal money or company secrets to sabotage the system

Long con games

Games in which the victims are stroung along and allowed to win several small stakes before being convinced to place the "big bet" in which they inevitably lose far more than they had won previously

Loose surveillance

Moving surveillance, used when it is more important to remain undetected than to keep the subject under constant observation

Lust murder

Sex-related homicide involving a sadistic, deviant assault, where the killer depersonalizes the victim, sexually mulate's the body, and may displace body parts

Macrophotography

Photographic enlargement of a subject to enhance details of evidence such as fingerprints or tool marks

Magick

Glue that binds occult groups, the supernatural act or force that causes a change in the environment

Malicious intent (malice)

Element of first and second degree murder implies ill-will, wickedness, cruelty, or recklessness

Maltreatment

Includes neglect, medical neglect, physical abuse, sexual abuse, and psychological maltreatment

Malware

Contraction of "malicious software"; software developed to cause harm

Mandated reporters

Certain individuals including- teachers, schools Authorities, Child Care Personnel, Camp Personnel, clergy, Physicians, dentist, chiropractors, nurses, psychologists, medical assistance, attorneys, and social workers--who work with or treat children and are required by law to report cases of suspected neglect or abuse

Manslaughter

Unlawful killing of another person with no prior malice may be voluntary or involuntary

Marker (photographic)

Item included in a photograph to show accurate or relative size

Mass murder

When multiple victims are killed in a single incident by one or a few suspects

Material evidence

That which is relevant to the specific case and forms a substantive part of the case presented or that has legitimate and effective influence on the decision of the case

Material photograph

Image that relates to the specific case and subject being discussed

MDMA

3 ,4- methylenedioxymethylamphetamine, known more commonly as Ecstasy; a powerful stimulant derivative of in phetamine or speed

Mechanics

Use of spelling, capitalization, and punctuation and written communication

Megapixel

Pixels are the dots making up a digital image, one megapixel is about a million dots

Micro photography

Taking pictures through a microscope to help identify minute particles of evidence (example hair or fiber)

Minor

Person under the legal age for becoming an adult the most common being under the age of 16 or 18 depending on the state

Miranda warning

Inform suspects of their rights to remain silent, to have counsel present and have the state appoint and pay counsel if they cannot afford one, it also warn suspects that anything they say can be used against them in court

Misoped

Person who hates children, has sex with them, and then brutally murders them

Modus operandi (MO)

Characteristic way a criminal commits a specific type of crime

Molestation (sexual)

Acts motivated by unnatural or abnormal sexual interest in minors that would reasonably be expected to disturb, irritate or offend the victim, no touching of the victim is necessary

Money laundering

Converting illegally earned (dirty) cash to one or more alternative forms (clean) to conceal its illegal origin and true ownership

Moniker

Gang member street names, nicknames

Morning Glory robbery

A robbery that occurs first thing in the morning and catches arriving employees off guard

Motion in limine

Request for the judge to issue a protective order against prejudicial questions or statements

Motor vehicle

Any self-propelled device for moving persons or property or pulling implements, weather operated on land, on water, or in the air, includes automobiles, trucks, buses, motorcycles, motor scooters, mopeds, snowmobiles, Vans, self-propelled watercraft, and aircraft

Mugshots

Photographs of those who have been taken into custody and booked

Mules

Individuals who sell or transport drugs for a regular dealer in return for being assured of a personal drug supply

Mummification

Complete dehydration of all body tissue that occurs when a cadaver is left in the extremely dry, hot area

Munchausen syndrome

Involve self-induced or self-inflicted injuries

Munchausen by proxy syndrome MBPS

A form of child abuse in which the parent or adult caregiver deliberately stimulates, or causes medical distress in a child

Narcoterrorism

Refers to the use of terrorist tactics to support drug operations or the use of drug trade profits to finance terrorism

Narcotic

Drug that is physically and psychologically addicting, examples include heroin, morphine, codeine, and cocaine

Narrative

Technical report structured in chronological order describing a sequence of investigative events

Neglect

Failure to meet a child's basic needs including housing, food, clothing, education and access to Medical Care

Network

Relationships, links between people, and between people and their beliefs; two or more computers connected for the purpose of sharing data and resources

Nightcapped warrant

Court approved stipulation that an arrest or search warrant may be carried out at night

No-knock warrant

Search warrant that contains a special provision permitting officers to execute the warrant without first announcing themselves

Non criminal homicide

Includes excusable and justifiable homicide

Nonverbal communication

Messages conveyed by dress, eye contact, posture, gestures, distance, mannerisms, rate of speech, and tone of voice

Objective

Non opinionated, fair and impartial

Occult

Secret knowledge of supernormal powers, many Cults claim to have such knowledge

Open ended question

Gives the victim, witness, or suspect the opportunity to provide a much fuller response, allowing the investigator greater insight into the person's knowledge and feelings, often begins with "Why , how, or tell me about" , should be asked liberally during interrogation

Open surveillance

No extraordinary means are used to remain undetected also called a rough surveillance

Oral copulation

Act of joining the mouth of one person with the sexual organ of another person, see cunnilingus and fellatio

Ordinance

Act of the legislative body of a municipality or County regulating to all the rules governing the municipality or County, including misdemeanor crimes

Organized crime

Any group having some manner of a formalized structure and whose primary objective is to obtain money through illegal activities

Organized retail crime (ORC)

An umbrella term used to describe large-scale retail theft and fraud activity by organized groups of professional shoplifters, alternately called organized retail theft

Osteogenesis imperfecta (OI)

Genetic disorder characterized by bones that break easily, often from Little or no apparent cause, also called brittle bone disease

OTC drugs

Over the counter drugs, no prescription required

Overlapping

Photographic technique whereby the entire scene is photographed in a clockwise Direction so that a specific object is on the right side of the first photograph, on the next photo the same object is on the left side of the photo and so on until the entire scene is photographed

Parallel proceedings

Pursuing civil and criminal sanctions at the same time

Particularity requirement

Dictates that a search conducted with a warrant must be limited to the specific area and specific items named in the warrant, as held in Stanford V Texas 1965

Past tense

Use of verbs that indicate that events have already occurred, for example lived rather than lives

Pedophile

Person who is sexually attracted to young children

Peeling (a safe)

Opening a safe by drilling a hole in the corner of the safe then making the hole successively larger by using other drills until the narrow end of a jimmy can be inserted in the hole to pry the door partially open

Petty larceny

A misdemeanor based on the value of the property stolen

Pharming

A cyber crime at involves the high jacking of a domain name for the purpose of reader acting online traffic away from a legitimate website or a fake site , such as a bogus bank website; also refers to the dangerous at of wrestling through the family medicine cabinet for pills both OTC and prescription combining everything in a bowl scooping out in adjusting handful and waiting to see what happens

Phishing

Method in which criminals misrepresent themselves as a trustworthy source to get victims to disclose personal, sensitive information, such as passwords, bank account numbers, and the like, which is then use by the criminals to commit fraud or other crimes

Physical abuse

Beating, whipping, burning or otherwise inspecting physical harm upon a child

Physical evidence

Anything real -that has substance- and helps establish the facts of the case

Pictometry

Unique, patented computer technology that integrate various Ariel shot of a land based artifact taken straight down (orthogonal) from numerous angles (oblique); the result is a high resolution 3D image of the object

Pill Mills

Rogue pain management clinic staffed by unethical "doctors" who supply users with illicit pharmaceuticals

Piracy

Copying and using computer programs in violation of copyright and trade secret laws

Pixel

Smallest unit of a digital image also referred to as a dot

Placement

The first step in the process of laundering money that inserts the ill-gotten funds into the legitimate US Market; common methods include smurfing (technically known as structuring) whereby large amounts of cash are broken into increments less than $10,000 to avoid federal reporting requirements and then deposited into various bank accounts

Plain feel / touch evidence

object discovered by a police officer who was lawfully patting down a suspect's outer clothing and that is immediately identified, by touch, as contraband, a warrantless seizure is justified because there's no invasion of the suspects privacy beyond theat already authorized by the police officer search for weapons Minnesota vs Dickerson, 1993

Plain View evidence

Unconcealed evidence that is seen by an officer engaged in the lawful activity

Plant

Observing a location from a fixed location also called fixed surveillance and Stakeout

Plastic fingerprints

Impressions left and soft substances such as putty, grease, tar, butter or soft soap, see also visible fingerprints

Plastic fingerprints

Impressions left and soft substances such as putty, grease, tar, butter or soft soap, see also visible fingerprints

Poaching

Illegally taking or possessing fish, game for other Wildlife including dear, Elk, bear, pheasant ducks, while turkeys, and grouse

Polygraph

scientifically measures respiration and depth of breathing, changes in the skins electrical resistance and blood pressure and pulse also called lie detector

Ponzi scheme

Pyramid type fraud scheme, named after Charles Ponzi, that involves using capital from new investors to pay off earlier investors, requiring an ever-expanding base of new investors to support the financial obligations to the existing higher-ups which, eventually and inevitably, will collapse

Port scanning

Looking for Access (open doors) into a computer

Post-mortem artifact

an injury occurring after death from another source that can look like it was related to the homicide when it actually occurred from an outside Source after death

PPI

Pixels per inch

Pre meditation

Considering planning or preparing for an act, no matter how briefly, before committing it

Presumptive evidence

Provides a reasonable basis for belief

Pretextual traffic stops

Stop so Vehicles when an officers interest (pretext) was not the real reason for the stuff presence of and ulterior motive fine officer for the stock

Prima face evidence

Established by law; for example the blood alcohol level for intoxication also call direct evidence

Probable cause

What would be a person of reasonable caution to believe that something connected with the crime is on the premise or person to be searched

Probative evidence

Tends to prove or actually proves guilt or innocence, vital for the investigation or prosecution of AKA

Profiling/psychological profiling

Attempts to identify an individuals emotional and psychological characteristics to provide investigations with collaborative information about a non suspect for possible leads to a non suspect also called criminal profiling or simple profile

Property flipping

Practice where by in offender buys the property near its estimated market value, artificially inflates the property value through a false appraisal and then resells (flips) the property, often within days of the original purpose for a greatly increased price; although flipping pur se a is not illegal it often involves mortgage fraud which is illegal.

Prostitution

Soliciting sexual intercourse for pay

Protective sweep

The authorized search by police of areas and immediately a joining the place of arrest, justified when reasonable suspicion exist that another person might be present or compose a danger to the arresting officer, health constitutional in Maryland v Buei (1990), also called Beui sweep

Proxy data

Remnants of an interaction, transfer, or exchange of material between two items (Locards exchange principal) the evidence analyzed by forensic scientists to uncover the relationship between people, places, and objects

Proximity informant

One who can keep tabs on a victims normal schedule and who can establish a routine of contact with the victim, with the principal being too serve as a lifeline to police if something seems wrong or off

Public Safety exception

Ruling that policeman interrogation of a suspect without first giving them Miranda warning if a public threat exists that might be removed by having the suspect talk

Pulling (dragging) a safe

Opening safe by inserting a V plate behind the dial and tightening screw bolts on the edges of the V plate until the dial and spindle are pulled out; this method the opposite of punching, works on many older safe but not on new ones

Punching a safe

opening a safe by shearing the dial from the safe door by a downward blow with a sledge or by holding it chisel to the dial and using a sledge to knock it off exposing the safe mechanism and spindle

Racial profiling

Occurs when and officer focuses on an individual as of suspect based solely on that person's rate, excluding legitimate factors such as behavior this is unconstitutional

Raid

A plant, organize invasion that use the elements of surprise to recover stolen property, seize evidence, or arrest a suspect

Rainbow effect

Refers to the sheen appearance caused when substances such as oil and gasoline, float on the surface of the water

Rape

Having sexual intercourse with the person against his or her will

Repport

Understanding between individual created by genuine interest and concern

Raves

Dance party that feature fast paced, repetitive electronic music and accompanied by light shows and usually entail the use of alcohol, tobacco, and drugs

Reasonable

Sensible, rational, justifiable

Reasonable force

Amount of force a prudent person would use in similar circumstances

Rebuttal

Testimony by witness for the prosecution given to contradict the testimony or evidence presented by the different

Rectangular coordinates (plotting) method

Uses two adjacent walls of a room at fixed points from which distances are measured at right angles from each wall

Relevant evidence

Applies to the matter and question

Relevant photograph

Image that assist or explains

Red gestae statement

Spontaneous statements made at the time a crime is committed and closely related to actions involved in the crime; considered more truthful then later, planned responsive

Residential burglary

Occurs in buildings, structures, or attachments that are used as or are suitable for dwelling, even though they may be unoccupied at the time of the burglary

Resolution

Five nights of image detail either captured with the camera, displayed on a monitor or printed on paper, commonly Quantified by pixels

Restraining order

A court issued document that aims to restrict an alleged abusers behavior and protect the intended victim, alternately called an order for protection or civil protection order

Reverse buy

Labor intensive, logisticly complex narcotics investigation tactic, also called the sting

Rifling

Lands and grooves inside of a weapon, which grip and spin the bullet as it passes through the bore, providing greater projectile control and accuracy

Rigor mortis

Stiffening of the joints of the body after death because of partial skeletal muscle contraction

Ritual

Prescribed form of religious or mystical ceremony

Ritualistic crime

Unlawful act committed within the context of a ceremony

Robbery

Feloniously taking of another person's property, either directly from the person or in the person's present, through force or intimidation

Robbery by appointment

A robbery that occurs when a victim willingly meets with the offender, believing a legitimate transaction will occur, also called by and sell robberies or Craigslist robberies

Robo tripping

Slang for the act of drinking bottles of cough syrup such, as robitussin, to get high

Rogues gallery

Mugshots gathered in files and displayed in groups

Rohypnol

The date rape drug, a sedative that dissolves rapidly when placed in a carbonated drink and acts quickly(20 to 30 minutes) to produce physical as well as mental incapacitation after ingestion

Rough sketch

First, pencil drawing outline of the crime scene which shows the location of objects in evidence within its outline

Rough surveillance

Moving surveillance in which it does not matter if the surveillance is detected, also called an open surveillance

Routine activity theory

Crime results from the convergence of three elements in time and space: the presence of likely or motivated offenders, the presents of suitable target, and the absence of guardians to prevent the criminal act

Rule on witnesses

Common explosion of Witnesses from the courtroom during a trial, in and effort to keep witnesses from hearing each other's testimony, also called the witness sequestration rule

Sabbat

Gathering of witches

Sadist

Person who received sexual gratification from causing pain to others, often through mutilation

Sadomasochistic abuse

Fettering, binding, or otherwise physically restraining; whipping or torturing for sexual gratification

Safe

Semi portable strong box with a combination lock

Scale

Used in sketching, determine by taking the longest measurement at the scene then dividing it by the longest measurement of the paper used for sketching

Script kiddie

A derogatory term used to describe a less talented hacker who must use script or programs created by others to carry out a cyber attack also called a skiddie

Search

An examination of a person, place, or vehicle for contraband, illicit, or stolen property, or some evidence of a crime to be used in prosecuting a criminal action or offense, by its very nature and intrusion into ones privacy

2nd degree murder

Contact to cause the death of another but without pre meditation

Seizure

Taking by law or other government agent of contraband, evidence of a crime, or even a person (via arrest) into custody

Sequestering

A practiced used during the trial whereby the judge excludes all Witnesses from the courtroom except the person testifying

Serial murder

Killing of three or more victims with emotional time breaks between the killings

Sexting

A category of child pronography involving the sending or posting of a nude picture of oneself to another person, or on the internet using a cell phone to transmit the image

Sexual abuse

Include sexually molesting a child, performing sexual acts with a child, and statutory rape and seduction

Sexual contact (illegal)

Any sexual act committed without the complainants consent for the suspects sexual or aggressive satisfaction

Sexual exploitation (of a minor)

To employ, use, persuade, induce, entice, or coerce a minor to engage or assist in engaging in any sexually explicit conduct, for example prostitution or pornography

Sexually explicit conduct

Any type of sexual intercourse between persons of the same or opposite sex, beastiality, sadomasochistic abuse, lewd exhibition, or masturbation

Sexual penetration

Includes sexual intercourse, cunnilingus, fellatio, anal intercourse, or any other intrusion, no matter how slight, into the victim's genital, oral, or anal openings by the suspects body or by an object; anemission of semen is not required

Sexual seduction (of a minor)

Ordinary sexual intercourse, anal intercourse, cunnilingus, or fellatio committed by a non minor with a consenting minor

Short con games

Schemes in which victims are taken for whatever money they have on their person at the time of the swindle

Show up identification

On the scene identification of a suspect by victim of or witness to a crime; also called field identification

Shrinkage

Unexplained or unauthorized deduction of inventory, merchandise, cash, or any other asset from a retail establishment

Silver Alert

Public notification system similar to Amber Alerts for missing children but that aim to recover missing seniors

Simple arson

Intentional destruction by fire or explosives that does not create imminent danger to life or risk of great bodily harm

Simple assault

Intentionally causing another person to fear imminent bodily harm or death or intentionally inflicting or attempting to inflict bodily harm on another; usually a misdemeanor

Sinsemilla

Homegrown marijuana

Sketch

Drawing, or to create a drawing, maybe a rough or finished sketch; accurately portrays the physical facts, relates to the sequence of events at the scene, establishes the precise location and relationship of objects and evidence at the scene, helps create a mental picture of the scene for those not present, is a permanent record of the same, and is usually admissible in court

Skimming

Electronic crime method in which a device is placed in a card reader, such as that found at an ATM, to record sensitive information, such as bank account numbers, credit card numbers, and passwords

Skittling

Ingesting high doses of Coricidin cough and cold ("Triple C") tablets to get high

Slamming

The unauthorized switch of a long distance carrier

Slanting

Including only one side of a story or only fax that tend to prove or support one side's theory; result of a lack of objectivity

Sleeper Cell

A group of terrorists who blend into a community

Sliding

Occurs when an unauthorized carrier switches a specific call from the long distance carrier

Smash and grab

In burglary, breaking a window and taking items from the window display

Smurfing

More technically known as structuring, a method of money laundering where by large amounts of cash are broken into increments less than $10,000 to avoid federal reporting requirements and deposited into various Bank accounts

Sniffing

Monitoring data traveling along a network

Sodomy

Any form of anal or oral copulation

Solvability factors

Those crucial to resolving criminal investigations

Sources of information file

Contains the name and location of persons, organizations, and records that can assist in a criminal investigation

Spalling

Breaking off surface pieces of concrete, cement or brick because of intense Heat

Spam

Unsolicited email messages, similar in concept to junk mail and commonly commercial in nature; less commonly known by its formal designation as unsolicited commercial email (UCE)

Spoofing

Requiring unauthorized access to a computer or network through a message using IP address that appears to be from a trusted host; often considered synonymous with phishing

Spyware

Malicious, covert (difficult to detect) software that infects a computer and a manner similar to a virus, collecting information or executing other programs without the user's knowledge; some programs can track which websites user visits and some can track and capture personal user information

Stake in conformity

Constellation of variables that, in effect, influence someone to take a particular course of action; for offenders, it constitutes what they stand to lose if convicted, such as marital status, residential stability, or employment

Stake out

Observing a location from a fixed location; also called fixed surveillance and plant

Stalking

The willful or intentional commision of a series of acts that would cause a reasonable person to fear death or serious bodily injury and that, in fact, does place the victim in fear of death or serious bodily injury

Standard of comparison

Object, measure, or model with which evidence is compared to determine whether both originated from the same source

Statement

Legal narrative description of events related to a crime

Statement analysis

A technique used to determine whether a person's verbal or written statement is truthful or deceptive

Static IP address

An IP address that does not change

Statutory rape

Sexual intercourse with a minor, with or without consent

Steganography

Greek for "hidden writing" aims to keep everyone, except the intended recipient of a message, oblivious to its very existence by making the message appear as some type of cover message, a shopping list a picture excetera

Sting

Complex operation organized and implemented by undercover agents to apprehend criminals especially drug dealers; also called a reverse Buy

Stockholm Syndrome

Psychological phenomenon where hostages feel no ill feelings toward the hostage-takers in fear the police more than their captors

Street game

A group of individuals who form a social allegiance and engage in unlawful or criminal activity

Striations

Highly individualized and characteristic scratches made on a projectile (bullet) as it passes through a weapons rifle, provide valuable comparison evidence on recovered bullets

Strikers

Firefighters who set fires to become Heroes in putting them out

Structuring

Common method of money laundering whereby large amounts of cash are broken into increments less than $10,000 to avoid federal reporting requirements in deposited into various bank accounts also called smurfing

Subject

What is observed during surveillance for example a person, place, property, vehicle, group of people, organization, or object

Subpoena

Written order to appear before the court

Sudden infant death syndrome (SIDS)

Tragic condition, who's cause is uncertain, that takes the lives of young victims and for which parents may become suspected of child abuse

Suicide

Intentionally taking one's own life

Suicide by police

Situation where a person decides he or she wants to die but doesn't want to pull the trigger and so, therefore, creates a situation where police are forced to shoot

Serrebuttal

Testimony by a witness for the defense given to contradict the testimony or evidence presented by the prosecution

Surveillance

Covert, discrete observation of people or places

Surveillant

Plain clothes investigator assigned to surveillance

Tail

Following people or vehicles on foot or in a vehicle to observe their actions or destinations

Tagging

Public displays by Urban artists who are unaffiliated with gangs, artistic Expressions that replicate graffiti

Takeover robbery

The type commonly portrayed in movies in which multiple perpetrators, heavily armed and wearing masks or disguises, conduct a hostile and violent takeover of a Bank lobby, or in persons to the floor and often jumping over teller counters to demand money at gunpoint

Target hardening

Altering physical characteristics of a property to make it less attractive to criminals also called crime prevention through environmental design (CPTED)

Tech effect

A broad public awareness up and familiarity with the capabilities of modern technology that indirectly influences jurors expectations regarding forensic evidence

Telematic technology

Transfer data between a remote vehicle and a host computer such as with bait cars

Temporary custody without hearing

Removing a child from the custody of parents or guardians for a brief period, usually 48 hours

Terry stop

Detaining, questioning, and possibly frisking of an individual based on officers Reasonable Suspicion of that individuals involvement in criminal activity

Testimonial hearsay

Prior testimony or statements made as a result of police interrogation, a witness's statement obtained through "structured questioning" by police officers that is inadmissible in a criminal trial unless the witness is unavailable to testify and was previously cross-examined by the defendant

The well

Area within the courtroom that exists in front of the judge, in between the judge in the attorneys tables, normally off-limits and to be entered under only if the judge so directs or permission is granted traditionally, the area is a swords length and was intended for the judges protection

Third degree

Use of physical Force, threats force, or other physical, mental, or psychological abuse to induce a suspect to confess

Tight surveillance

Staying within a few steps of the subject or keeping the subject Insight, used when it is extremely important not to lose the subject, also called Close surveillance

third-degree murder

Death that results from an imminently dangerous act but does not involve premeditation or intent

Tool mark

Impression left by a tool on a surface

Torch

A professional arsonist

Totality of circumstances test

Principle upon which a number of legal assessments are made, refers to the sum total of factors leading a reasonable person to a course of action

Toxicology

Study of poisons, toxicologists are consulted a food or drink poison is suspected

Trace evidence

Extremely small physical matter

Trailer

Half, consisting of paper, hey, flammable compounds, or any other substance that burns, that is set down for a fire to follow, indicates arson

Trap photography

Photos that prove an incident occurred; can assist in identifying suspects and weapons used; can also corroborate witness testimony and identification, also called surveillance photography

Triangulation (plotting method)

Uses straight line measurements from two fixd objects to the evidence to create a triangle with the evidence in the angle formed by the two straight lines, the degree of the angle form to the location of the object or evidence can be measured with a protractor

Trojan Horse

Malicious program hidden inside and apparently harmless, legitimate program and intended to carry out unauthorized or illegal functions

True (uncontaminated) scene

Crime scene where no evidence has been introduced or removed except by the person(s) committing the crime

Turf

Geographic area claimed by a gang; often marked by graffiti

Tweaker

Methamphetamine addict

Ultraviolet photography

Uses the low end of the color spectrum, which is invisible to human sight, to make visible impressions of bruises and injuries long after there ocurrence, type of weapon used can often be determined by examining its impression, developed using ultraviolet light

Undercover

Using an assumed identity to obtain information or evidence

URL

Uniform resource locator, a string of characters representing an internet resource

Vault

Stationary security chamber of reinforced concrete, often steel lined, with a combination lock

Vehicle identification number (VIN)

Primary non duplicated, serialize number assigned by the manufacturer to each vehicle manufactured, this number critical in motor vehicle theft investigations identifies the specific vehicle in question

Verified response policy

Procedure implemented by some law enforcement agencies, whereby they will not respond to a burglary alarm unless criminal activity is first confirmed through either an on-site security officer or some method of electronic surveillance, such as CCTV

Victimology

The collection of significant and relevant information related to a victim in that victims lifestyle which helps investigators develop and ascertain suspects, motives, and risk factors

Victimless crime

Illegal activity in which the victim is a willing participant, for example a person who bets

Visible fingerprints

Prints made when fingers are dirty or stained and leave their impression on a glossy or light-colored surface and can be dusted and lifted

Voice print

Graphic record of an individual's voice characteristics made by a sound spectrograph of the energy patterns emitted by speech

Voluntary manslaughter

Intentionally causing the death of another person in the heat of passion

Voyeurism

The act of gaining sexual pleasure from watching others when they are naked or engaged in sexual activity of Voyer is often called a Peeping Tom

Waiver

Giving up of certain rights

White collar crime

Business-related or occupational crime that involves illegal acts characterized by fraud, concealment, or a violation of trust it does not depend on the actual or threatened use of physical force or violence, for example embezzlement, computer crimes, bribery, pilferage, also called corporate crime or economic crime

Wiretapping

Intercepting in recording telephone conversations by a mechanical device without the consent of either party in the conversation

Witness sequestration rule

Common practice of excluding Witnesses from the courtroom during a trial to prevent one witness from hearing another Witnesses testimony also called the rule on Witnesses

Worm (computer)

Self contained program that travels from machine-to-machine across network connections, often clogging networks and information systems as it spreads; need not become part of another program to propagate its

Zero floor release

Requirement that all transactions by credit card be authorized

Zombie

Computer that has been taken over by another computer, typically through infection with hidden software (virus) that allows the zombie machine to be accessed and controlled remotely, often with the intention of perpetrating attacks on other computers