Chapter 10

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts from the lecture notes on criminal law and procedures, aiming to aid students in understanding the main ideas and legal terms.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

What is the Consensus View of criminal law?

It is a view that emphasizes social control to manage certain behaviors, protect people from harm, and reflect the values and morals of the majority.

2
New cards

Define the Conflict view of criminal law.

This view asserts that laws are created and enforced by those who hold political and economic power, with the ruling class exerting control over society.

3
New cards

Victimization Paradox

the gap between fear of crime and reality of one's victimization. People put themselves in position to make themselves a victim

4
New cards

What is the Fraud Triangle?

A model for understanding white collar crime that consists of three elements:

  • Pressure - motivation or incentive to commit fraud

  • Opportunity - he knowledge and ability to carry out fraud

  • Rationalization - justification of dishonest actions

5
New cards

What is the difference in burden of proof between civil and criminal cases?

In criminal cases, the burden of proof is 'beyond a reasonable doubt'. In civil cases, the burden is lower, with a 51% chance of winning needed to prevail.

6
New cards

What are the key differences between civil law and criminal law?

  • Criminal law is prosecuted by the state, while civil law is typically between private parties.

  • In criminal cases, the burden of proof is higher (beyond a reasonable doubt) compared to civil cases (preponderance of the evidence, or 51% chance of winning).

  • Criminal sanctions may include jail time, while civil remedies usually involve monetary compensation.

7
New cards

What is the definition of Intent in a criminal context?

Intent refers to the mental state and awareness of committing a crime, as determined by statute.

8
New cards

What are the key elements of a crime, particularly regarding intent and state of mind?

  • Intent/State of Mind: Determined by words and acts, mental state defined by statute (e.g., awareness, intent to defraud, knowingly). Intent to defraud

  • Recklessness: Consciously disregards a substantial or unjustifiable risk.

  • Criminal Negligence: Fails to be aware of a substantial risk, but should have been aware.

  • Strict Liability: Liability without fault, not requiring a wrongful mental state (some argue this leads to overcriminalization).

  • Causation: link between act and intent

  • Act

9
New cards

Explain the difference between recklessness and criminal negligence.

Recklessness involves consciously disregarding an unjustifiable risk.

Criminal negligence involves the mental state in which the defendant takes an unjustified, substantial, and foreseeable risk that results in harm.

10
New cards

What are the different categories of violent crimes?

Violent crimes cause harm to others and include:

  • Murder

    • First Degree: Premeditation and planning

    • Second Degree: Malice aforethought, general evil state of mind

    • Voluntary Manslaughter: Killing in the heat of passion or with mitigating circumstances

    • Involuntary Manslaughter: Death due to negligence, like a car accident

    • Felony Murder: Death occurring during the commission of a felony

11
New cards

What are some property crimes and their definitions?

Property crimes are committed for economic gain and include:

  • Larceny (Theft): Taking another’s personal property

  • Receiving Stolen Property: Buying or receiving stolen goods knowingly

  • Extortion (Blackmail): Using threats or coercion to steal from someone

  • Embezzlement: Converting property to one's own with intent to defraud

  • Forgery and Uttering: Falsifying documents or using fake documents

  • Arson: Deliberately setting fire to property

  • Burglary: Breaking into a building to commit a crime

12
New cards

What are some economic crimes and white-collar crimes?

Economic crimes include:

  • Shoplifting

  • Tax Fraud/Evasion

  • White Collar Crimes: Non-violent crimes typically committed for financial gain

    • Employee Pilferage: Stealing small items from work

    • Money Laundering: Concealing illegal financial activities

    • Bribery: Offering, receiving, or agreeing to receive bribes

    • Fraud: Deceptive practices for financial gain

    • Anti-Trust Violations: Manipulating the market to control prices

13
New cards

What is organized crime and its impact on businesses?

Organized crime refers to criminal enterprises involved in illegal activities such as drug trafficking, money laundering, and extortion. For businesses, it can significantly impact risk and decision-making, as it often involves illegal influence over markets or operations.

14
New cards

What characterizes a felony?

A felony is a serious crime such as murder or robbery that usually carries severe penalties, including imprisonment for more than one year.

15
New cards

What are the key protections provided by the Fifth Amendment?

Requires that no one be deprived of “life, liberty, or property without due process of law”, and prohibits against double jeopardy (when a person is tried twice for the same criminal offense), and self-incrimination.

16
New cards

What does the Sixth Amendment guarantee?

  1. A speedy trial, a trial by jury, and a public trail

  2. The right to confront witnesses

  3. The right to a lawyer at various stages in some proceedings

17
New cards

What does the Eighth Amendment prohibit?

  1. Excessive bail and fines

  2. Cruel and unusual punishment

18
New cards

What does the Fourth Amendment protect, and when can law enforcement search private property?

The Fourth Amendment protects the right of the people to be secure in their persons, houses, papers, and effects. Law enforcement officers must generally obtain a search warrant before searching or seizing private property.

19
New cards

What is a search warrant?

A search warrant is an order granted by a public authority, such as a judge, that authorizes law enforcement personnel to search specific premises or property.

20
New cards

Probable Cause

Reasonable grounds for believing that a search

should be conducted or that a person should be arrested

21
New cards

What does the Fourth Amendment require regarding the scope of a search warrant?

The Fourth Amendment requires a specific description of what is to be searched or seized, and the search must not extend beyond what is described in the warrant.

22
New cards

What is a reasonable expectation of privacy under the Fourth Amendment?

A reasonable expectation of privacy exists if:

  • The individual actually expects privacy.

  • Society would consider the person’s expectation legitimate. The Fourth Amendment protects against searches that violate such expectations of privacy.

23
New cards

What is the exclusionary rule in criminal procedure?

The exclusionary rule states that any evidence obtained in violation of the accused’s constitutional rights (Fourth, Fifth, and Sixth Amendments), or any evidence derived from illegally obtained evidence, will not be admissible in court.

24
New cards

What is the purpose of the Exclusionary Rule?

The purpose of the exclusionary rule is to deter police from conducting warrantless searches and engaging in other misconduct.

25
New cards

What is identity theft?

The act of stealing another’s identifying information to access their financial resources.

26
New cards

Misdemeanor

A lesser crime than a felony, punishable by a fine or imprisonment for up to one year in other than a state or federal penitentiary

27
New cards

What are the two essential elements that must exist for a person to be convicted of a crime?

1. The performance of a prohibited act (actus reus)

2. A specified state of mind, or intent, on the part of the actor (mens rea)

28
New cards

5 broad categories of criminal acts

1. Violent crime

2. Property crime

3. Public order crime

4. White-collar crime

5. Organized crime

29
New cards


What is the Miranda Rule, and what rights must be informed to a suspect upon arrest?

The Miranda Rule, established in Miranda v. Arizona, requires that individuals who are arrested must be informed of their Fifth Amendment right to remain silent and their Sixth Amendment right to counsel.

30
New cards

What happens if law enforcement fails to inform a suspect of their Miranda rights?

If the arresting officers fail to inform a criminal suspect of their Miranda rights, any statements made by the suspect are generally not admissible in court.

31
New cards

What is the "public safety" exception to the Miranda Rule?

The "public safety" exception allows certain statements, like revealing the location of a weapon, to be admitted in court even if the defendant was not given Miranda warnings.

32
New cards

What must a suspect do to stop police questioning under the Miranda Rule?

A suspect must unequivocally and assertively request to exercise their right to counsel in order to stop police questioning.

33
New cards

What is cyber fraud and what does it involve?

Cyber fraud involves the online theft of credit card information, banking details, and other personal information for criminal use.

34
New cards

What is advance fee fraud in the context of cyber crime?

In advance fee fraud, consumers order and pay for items that are never delivered, often through online transactions.

35
New cards

What is online auction fraud?

In online auction fraud, a person lists an expensive item for auction (on a legitimate or fake site) and then refuses to send the product after receiving payment.

36
New cards

How do online auction sites protect consumers against cyber fraud?

Larger online auction sites try to protect consumers by providing warnings about deceptive sellers and offering various forms of insurance. However, it is difficult to pinpoint fraudulent sellers because users can assume multiple identities.

37
New cards

What is identity theft and how does it work?

Identity theft involves stealing another person's identifying information, such as their name, date of birth, or Social Security number, and using that information to access the victim's financial resources. Over half of identity thefts involve misappropriating existing credit-card accounts.

38
New cards

How does password theft occur in cyber theft?

Cyber criminals can steal a victim’s password after obtaining their online username. Password theft is a critical step since passwords are often the last line of defense for protecting financial information. Software programs assist identity thieves in illegally obtaining passwords.

39
New cards

What is phishing in the context of cyber theft?

Phishing is an online fraud tactic in which criminals impersonate legitimate companies through emails or malicious websites to trick individuals or companies into providing sensitive information, such as bank account numbers, Social Security numbers, and credit-card details.

40
New cards

What is a hacker and how do they operate?

A hacker is a person who uses one computer to break into another, typically to access unauthorized data or systems.

41
New cards

What is service-based hacking, and how do cyber criminals exploit it?

Service-based hacking involves "software as a service" where users access web-based software for tasks. Cyber criminals exploit this model by offering "crimeware as a service," renting online criminal services to others for a small fee.

42
New cards

What are the goals of a hacking operation, including cyberterrorism?

The goals of hacking operations, including cyberterrorism, can include:

  • Wholesale theft of data

  • Monitoring a computer

  • Inserting false codes or data into systems

43
New cards

What is malware and what does it do?

Malware is malicious software designed to disrupt or harm a computer, network, smartphone, or other device. Forms of malware include botnets, worms, and viruses.

44
New cards

What is a botnet and how does it operate?

A botnet is a group of computers running an application controlled and manipulated by a software source. These computers are typically infected by malicious robot software.

45
New cards

What is a worm in terms of malware?

A worm is a type of malware designed to copy itself from one computer to another without human interaction. It replicates automatically and spreads quickly, often in large volumes.

46
New cards

What is a virus in the context of malware?

A virus is a type of malware transmitted between computers that attempts to deliberately damage systems and data.