Term
| why are junkyards and auto repair garages sometimes used as chop shops |
|
Definition
| they already have the necessary equipment to chop cars, they can conceal partially chopped cars subtly they can sell some parts inconspicuously |
|
|
Term
| In what year was the Motor Vehicle Theft Enforcement Act signed into law? |
|
Definition
|
|
Term
| Why are motorcycles easy targets of theft? |
|
Definition
| size, many parts can be used year after year, lack of consistency in placement of identification numbers |
|
|
Term
| What country are vehicle stolen from the United States popular? |
|
Definition
| Mexico, central and south america |
|
|
Term
| What does the abbreviation CCC stand for? |
|
Definition
| Certified Collateral Corporation |
|
|
Term
| Resale thieves usually sell to unsuspecting teenagers. |
|
Definition
|
|
Term
| Since 1984, VINs have been on various parts of a vehicle as well as on the dashboard. |
|
Definition
|
|
Term
| One reason accident probability is so high for a stolen vehicle used in a crime is because the thief may be unfamiliar with the roads and road conditions. |
|
Definition
|
|
Term
| The activities of chopping, stripping, and reselling stolen cars share the common factor of attempting to make a cash profit. |
|
Definition
|
|
Term
| Most vehicles stolen by juveniles for joyriding are recovered. |
|
Definition
|
|
Term
| Firefighters can assist an arson investigation by: |
|
Definition
| identifying regular watchers of fires. |
|
|
Term
| One researcher suggests that the arsonist's motives can be divided into two broad categories. |
|
Definition
|
|
Term
| The actions actually taken during a bombing incident are largely determined by: |
|
Definition
| characteristics of the bomb or incident. |
|
|
Term
| Setting a fire indirectly by means of a mechanical, chemical, other timing device is known as a what? |
|
Definition
|
|
Term
| The most common accelerant is _______________? |
|
Definition
|
|
Term
| Because a timed device can detonate and ignite a fire after the arsonist has established a viable alibi, arson tends to be difficult to solve. |
|
Definition
|
|
Term
| Motive is a necessary element in the corpus delicti of arson. |
|
Definition
|
|
Term
| Fires always have a single point of origin. |
|
Definition
|
|
Term
| It is not possible to have multiple points of origins. |
|
Definition
|
|
Term
| It is difficult to track down the sender of a mail bomb. |
|
Definition
|
|
Term
| What is the Medellin drug cartel named after? |
|
Definition
|
|
Term
| Approximately how many different motorcycle gangs currently operate in the United States? |
|
Definition
|
|
Term
| How can some Yakuza members sometimes be recognized? |
|
Definition
| they wear elaborate tattoos on their bodies |
|
|
Term
| The mafia contain all but whom in the ranks? |
|
Definition
|
|
Term
| Who was the head of the Medellin Cartel? |
|
Definition
|
|
Term
| Tongs began in the United States as union organizations. |
|
Definition
|
|
Term
| The RICO statute relies on the enterprise theory of investigation. |
|
Definition
|
|
Term
| Law enforcement agencies are permitted, under recent statutes, to seize property derived from or used in criminal activities. |
|
Definition
|
|
Term
| John Gotti was the first leader of the Mafia. |
|
Definition
|
|
Term
| Organized crime groups are becoming more diverse and more ruthless and creative in perpetrating criminal enterprises. |
|
Definition
|
|
Term
| Receiving payment in cash, goods, or services in exchange for obtaining some special service, product, or behavior is known as: |
|
Definition
|
|
Term
| if a loan officer in a bank files a fictitious loan application, complete with all the required elements, what element of white-collar crime does it exemplify? |
|
Definition
|
|
Term
| Misusing a voice-mail system to make unauthorized long distance calls falls within which of the following types of computer crime? |
|
Definition
|
|
Term
| Computer crime investigations are often similar to what other type of criminal investigation? |
|
Definition
|
|
Term
| Who used his television pulpit to defraud $3.7 million from his television congregation? |
|
Definition
|
|
Term
| Insider trading typically involves a corporate executive who profits from direct knowledge or market-sensitive information about some stock. |
|
Definition
|
|
Term
| Industrial espionage is not really a form of white-collar crime. |
|
Definition
|
|
Term
| Telecommunications crimes can include the theft of someone's telephone calling card or number. |
|
Definition
|
|
Term
| Industrial espionage refers to white-collar crime committed in government agencies. |
|
Definition
|
|
Term
| All hackers are teenagers playing around on their computers. |
|
Definition
|
|
Term
| Properly defined, narcotics include only the natural derivatives of Papavar somniferum called? |
|
Definition
|
|
Term
| What determines a drug's placement into one category or another of controlled substances? |
|
Definition
| Its effects, medical use, and potential for abuse |
|
|
Term
| From where does cocaine derive? |
|
Definition
| the leaves of the cocoa plant |
|
|
Term
| How is marijuana commonly used? |
|
Definition
| smoking, tea, baked goods |
|
|
Term
| A pat down of the otter clothing for the protection of a police officer can be attributed to this landmark Supreme Court Case. |
|
Definition
|
|
Term
| The Controlled Substances Act is intended to place certain controls over a variety of drugs and chemical substances. |
|
Definition
|
|
Term
| The longer a drug-dependent person is without his or her drugs, the stronger and more violent the withdrawal symptoms. |
|
Definition
|
|
Term
| At one time cocaine was widely used as an analgesic. |
|
Definition
|
|
Term
| Synthetic narcotics are compounds possessing pharmacological structure and properties similar to natural narcotics. |
|
Definition
|
|
Term
| Hallucinogens are also known as psychedelics. |
|
Definition
|
|
Term
| How were suspects located in both the World Trade Center and the Oklahoma City bombings? |
|
Definition
| Fragments of physical evidence led to suspects. |
|
|
Term
| This domestic terrorist group is known to participate in survivalist training. |
|
Definition
|
|
Term
| This group took responsibility for the September 11, attacks on the United States: |
|
Definition
|
|
Term
| 97% of Internet predators: |
|
Definition
|
|
Term
| Using the Internet to track and repeatedly contact people, especially children. |
|
Definition
|
|
Term
| Anti-terrorism activities always require reactive rather than proactive intervention. |
|
Definition
|
|
Term
| No American lives have been lost in terrorist attacks in other countries. |
|
Definition
|
|
Term
| There are no special people to contact once a field officer recognizes that the situation is a terrorist act. |
|
Definition
|
|
Term
| Users of Internet child pornography are not necessarily involved in hands-on sexual abuse of children. |
|
Definition
|
|
Term
| From a legal standpoint, terrorism is not in itself a crime. |
|
Definition
|
|
Term
|
Definition
–The unlawful use or threat of violence against persons and property to further political, social, or religious objectives.
|
|
|
Term
|
Definition
•Terrorists often act based on one or more of these basic motives: Erick Rudolph
¨Strong moral convictions
¨Simplified definitions for good and evil
¨A desire to find utopia
¨Code of self-sacrifice mostly in muslim
•Moral convictions are a powerful element for terrorists.
|
|
|
Term
|
Definition
–An unlawful violent act directed at elements of the U.S. government or population by groups or individuals who are based and operate entirely within the United States and Puerto Rico without foreign direction.
|
|
|
Term
|
Definition
–Violent acts or dangers brought against people or property; intended to intimidate or coerce a civilian population or otherwise affect the conduct of a government by intimidation, assassination, or kidnapping.
–It must occur outside the borders of the United States or otherwise transcend national boundaries.
|
|
|
Term
| The FBI divides international terrorism into three (3) subcategories: |
|
Definition
ira hamas al-quieda
1.Foreign state sponsors using terrorism as a tool of foreign policy.
2.Formalized terrorist groups
3.Loosely affiliated international radical extremists who have a variety of identities and travel freely in the United States unknown to law enforcement or the government.
|
|
|
Term
|
Definition
•Quickly provide broad new powers to domestic law enforcement agencies and international intelligence agencies in an effort to provide the tools necessary to fight terrorism, to expand the definition of terrorists activities, and to change sanctions for violent terrorism.
|
|
|