Term
why are junkyards and auto repair garages sometimes used as chop shops |
|
Definition
they already have the necessary equipment to chop cars, they can conceal partially chopped cars subtly they can sell some parts inconspicuously |
|
|
Term
In what year was the Motor Vehicle Theft Enforcement Act signed into law? |
|
Definition
|
|
Term
Why are motorcycles easy targets of theft? |
|
Definition
size, many parts can be used year after year, lack of consistency in placement of identification numbers |
|
|
Term
What country are vehicle stolen from the United States popular? |
|
Definition
Mexico, central and south america |
|
|
Term
What does the abbreviation CCC stand for? |
|
Definition
Certified Collateral Corporation |
|
|
Term
Resale thieves usually sell to unsuspecting teenagers. |
|
Definition
|
|
Term
Since 1984, VINs have been on various parts of a vehicle as well as on the dashboard. |
|
Definition
|
|
Term
One reason accident probability is so high for a stolen vehicle used in a crime is because the thief may be unfamiliar with the roads and road conditions. |
|
Definition
|
|
Term
The activities of chopping, stripping, and reselling stolen cars share the common factor of attempting to make a cash profit. |
|
Definition
|
|
Term
Most vehicles stolen by juveniles for joyriding are recovered. |
|
Definition
|
|
Term
Firefighters can assist an arson investigation by: |
|
Definition
identifying regular watchers of fires. |
|
|
Term
One researcher suggests that the arsonist's motives can be divided into two broad categories. |
|
Definition
|
|
Term
The actions actually taken during a bombing incident are largely determined by: |
|
Definition
characteristics of the bomb or incident. |
|
|
Term
Setting a fire indirectly by means of a mechanical, chemical, other timing device is known as a what? |
|
Definition
|
|
Term
The most common accelerant is _______________? |
|
Definition
|
|
Term
Because a timed device can detonate and ignite a fire after the arsonist has established a viable alibi, arson tends to be difficult to solve. |
|
Definition
|
|
Term
Motive is a necessary element in the corpus delicti of arson. |
|
Definition
|
|
Term
Fires always have a single point of origin. |
|
Definition
|
|
Term
It is not possible to have multiple points of origins. |
|
Definition
|
|
Term
It is difficult to track down the sender of a mail bomb. |
|
Definition
|
|
Term
What is the Medellin drug cartel named after? |
|
Definition
|
|
Term
Approximately how many different motorcycle gangs currently operate in the United States? |
|
Definition
|
|
Term
How can some Yakuza members sometimes be recognized? |
|
Definition
they wear elaborate tattoos on their bodies |
|
|
Term
The mafia contain all but whom in the ranks? |
|
Definition
|
|
Term
Who was the head of the Medellin Cartel? |
|
Definition
|
|
Term
Tongs began in the United States as union organizations. |
|
Definition
|
|
Term
The RICO statute relies on the enterprise theory of investigation. |
|
Definition
|
|
Term
Law enforcement agencies are permitted, under recent statutes, to seize property derived from or used in criminal activities. |
|
Definition
|
|
Term
John Gotti was the first leader of the Mafia. |
|
Definition
|
|
Term
Organized crime groups are becoming more diverse and more ruthless and creative in perpetrating criminal enterprises. |
|
Definition
|
|
Term
Receiving payment in cash, goods, or services in exchange for obtaining some special service, product, or behavior is known as: |
|
Definition
|
|
Term
if a loan officer in a bank files a fictitious loan application, complete with all the required elements, what element of white-collar crime does it exemplify? |
|
Definition
|
|
Term
Misusing a voice-mail system to make unauthorized long distance calls falls within which of the following types of computer crime? |
|
Definition
|
|
Term
Computer crime investigations are often similar to what other type of criminal investigation? |
|
Definition
|
|
Term
Who used his television pulpit to defraud $3.7 million from his television congregation? |
|
Definition
|
|
Term
Insider trading typically involves a corporate executive who profits from direct knowledge or market-sensitive information about some stock. |
|
Definition
|
|
Term
Industrial espionage is not really a form of white-collar crime. |
|
Definition
|
|
Term
Telecommunications crimes can include the theft of someone's telephone calling card or number. |
|
Definition
|
|
Term
Industrial espionage refers to white-collar crime committed in government agencies. |
|
Definition
|
|
Term
All hackers are teenagers playing around on their computers. |
|
Definition
|
|
Term
Properly defined, narcotics include only the natural derivatives of Papavar somniferum called? |
|
Definition
|
|
Term
What determines a drug's placement into one category or another of controlled substances? |
|
Definition
Its effects, medical use, and potential for abuse |
|
|
Term
From where does cocaine derive? |
|
Definition
the leaves of the cocoa plant |
|
|
Term
How is marijuana commonly used? |
|
Definition
smoking, tea, baked goods |
|
|
Term
A pat down of the otter clothing for the protection of a police officer can be attributed to this landmark Supreme Court Case. |
|
Definition
|
|
Term
The Controlled Substances Act is intended to place certain controls over a variety of drugs and chemical substances. |
|
Definition
|
|
Term
The longer a drug-dependent person is without his or her drugs, the stronger and more violent the withdrawal symptoms. |
|
Definition
|
|
Term
At one time cocaine was widely used as an analgesic. |
|
Definition
|
|
Term
Synthetic narcotics are compounds possessing pharmacological structure and properties similar to natural narcotics. |
|
Definition
|
|
Term
Hallucinogens are also known as psychedelics. |
|
Definition
|
|
Term
How were suspects located in both the World Trade Center and the Oklahoma City bombings? |
|
Definition
Fragments of physical evidence led to suspects. |
|
|
Term
This domestic terrorist group is known to participate in survivalist training. |
|
Definition
|
|
Term
This group took responsibility for the September 11, attacks on the United States: |
|
Definition
|
|
Term
97% of Internet predators: |
|
Definition
|
|
Term
Using the Internet to track and repeatedly contact people, especially children. |
|
Definition
|
|
Term
Anti-terrorism activities always require reactive rather than proactive intervention. |
|
Definition
|
|
Term
No American lives have been lost in terrorist attacks in other countries. |
|
Definition
|
|
Term
There are no special people to contact once a field officer recognizes that the situation is a terrorist act. |
|
Definition
|
|
Term
Users of Internet child pornography are not necessarily involved in hands-on sexual abuse of children. |
|
Definition
|
|
Term
From a legal standpoint, terrorism is not in itself a crime. |
|
Definition
|
|
Term
|
Definition
–The unlawful use or threat of violence against persons and property to further political, social, or religious objectives.
|
|
|
Term
|
Definition
•Terrorists often act based on one or more of these basic motives: Erick Rudolph
¨Strong moral convictions
¨Simplified definitions for good and evil
¨A desire to find utopia
¨Code of self-sacrifice mostly in muslim
•Moral convictions are a powerful element for terrorists.
|
|
|
Term
|
Definition
–An unlawful violent act directed at elements of the U.S. government or population by groups or individuals who are based and operate entirely within the United States and Puerto Rico without foreign direction.
|
|
|
Term
|
Definition
–Violent acts or dangers brought against people or property; intended to intimidate or coerce a civilian population or otherwise affect the conduct of a government by intimidation, assassination, or kidnapping.
–It must occur outside the borders of the United States or otherwise transcend national boundaries.
|
|
|
Term
The FBI divides international terrorism into three (3) subcategories: |
|
Definition
ira hamas al-quieda
1.Foreign state sponsors using terrorism as a tool of foreign policy.
2.Formalized terrorist groups
3.Loosely affiliated international radical extremists who have a variety of identities and travel freely in the United States unknown to law enforcement or the government.
|
|
|
Term
|
Definition
•Quickly provide broad new powers to domestic law enforcement agencies and international intelligence agencies in an effort to provide the tools necessary to fight terrorism, to expand the definition of terrorists activities, and to change sanctions for violent terrorism.
|
|
|