1/75
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
arson
the willful, malicious burning of a home, building, or vehicle
blue-collar crimes
traditional common-law theft crimes such as larceny, burglary, and arson
booster (heel)
professional shoplifter who steals with the intention of reselling stolen merchandise
booster box
device with a false bottom that can be opened and shut by a professional shoplifter, lined with metal or some other substance to prevent security tags from setting off alarms, placed over merchandise
burglary
entering a home by force, threat, or deception with intent to commit a crime
car cloning
using a vehicle identification number (VIN) from a legally registered car to hide the identity of a stolen vehicle for resale
chiseling
using illegal means to cheat an organization, its consumers, or both, on a regular basis
compliance strategies
methods of controlling white-collar crime that rely on the threat of economic sanctions rather than civil penalties to control potential violators, creating a marketplace incentive to obey the law
confidence game
a swindle, usually involving a get-rich-quick scheme, often with illegal overtones, so that the victim will be afraid or embarrassed to call the police
constructive possession
a legal fiction that applies to situations in which persons voluntarily give up physical custody of their property but still retain legal ownership
corporate (organizational) crime
powerful institutions or their representatives willfully violate the laws that restrain these institutions from doing social harm or require them to do social good
criminal environment pollution
a crime involving the intentional or negligent discharge into the biosystem of a toxic waste that destroys plant or animal life
deterrence strategies
methods of controlling white-collar crime that rely on the punishment of individual offenders to deter other would-be violators
economic crime
an act committed in violation of the criminal law for the purpose of monetary gain and financial benefits
embezzlement
taking the possessions of another (fraudulent conversion) that have been placed in the thief's lawful possession for safekeeping, such as a bank teller misappropriating deposits or a stockbroker making off with a customer's account
exploitation
forcing victims to pay for services or contracts to which they have a clear right
false pretenses (fraud)
misrepresenting a fact in a way that causes a deceived victim to give money or property to the offender
fence
a buyer and seller of stolen merchandise
grand larceny
theft of money or property from substantial value, punished as a felony
green-collar crimes
crimes that damage the environment and violate laws designed for its protection
influence peddling
using one's institutional position to grant favors and sell information to which one's co-conspirators are not entitled
insider trading
illegal buying of stock in a company on the basis of information provided by someone who has a fiduciary interest in the company
larceny
taking for one's own use the property of another, by means other than force or threats on the victim or forcibly breaking into a person's home or workplace; simple theft
mark
the target of a con artist
merchant privilege laws
legislation that protects retailers and their employees from lawsuits if they arrest or detain a suspected shoplifter on reasonable grounds
naive check forgers
amateurs who cash bad checks because of some financial crisis but have little identification with a criminal subculture
occasional criminals
offenders who do not define themselves by a criminal role or view themselves as committed career criminals but are willing to commit crime if the occasion arises
petit (petty) larceny
theft of a small amount of money or property, punished as a misdemeanor
pigeon drop
a con game in which a package or wallet containing money is "found" by a con artist, and the victims are bilked out of money they are asked to put up as collateral
professional criminals
offenders who make a significant portion of their income from crime
sherman antitrust act
federal law that subjects to criminal or civil sanctions any person "who shall make any contract or engage in any combination or conspiracy" in restraint of interstate commerce
shoplifting
the taking of goods from retail stores
situational inducement
short-term influence on a person's behavior, such as financial problems or peer pressure, which increases risk taking
snitch
amateur shoplifter who does not self-identify as a thief but who systematically steals merchandise for personal use
systematic forgers
professionals who make a living by passing bad checks
target hardening strategies
making one's home or business crime proof through the use of locks, bars, alarms, and other devices
target removal strategies
displaying dummy or disabled goods as a means of preventing shoplifting
theft
the intentional taking, keeping, or using of another's property without authorization or permission
white-collar crimes
crimes of business enterprise such as embezzlement, price fixing, and bribery
binge drinking
having five or more drinks on the same occasion (that is, at the same time or within a couple hours of each other
drug-dependent personality
a personal trait characterized by a pervasive psychological dependence on mood-altering substances
moral entrepreneur
a person who creates moral rules, which thus reflect the values of those in power, rather than any objective, universal standards of right and wrong
narcotic
a drug that produces sleep and relieves pain, such as heroin, morphine, and opium; a habit-forming drug
obscenity
material that violates community standards or morality or decency and has no redeeming social value
paraphilia
bizarre or abnormal sexual practices that may involve nonhuman objects, humiliation, or children
pornography
sexually explicit books, magazines, films, and DVDs intended to provide sexual titillation and excitement for paying customers
prohibition
the period from 1919 until 1933, when the eighteenth amendment to the united states constitution outlawed the sale of alcohol; also known as the "noble experiment"
prostitution
the granting of non marital sexual access for remuneration
public order crime
behavior that is outlawed because it threatens the general well-being of society and challenges its accepted moral principles
social harm
the injury caused to others by willful wrongful conduct
temperance movement
the drive to prohibit the sale of alcohol in the united states, culminating in ratification of the eighteenth amendment in 1919
victimless crime
public order crime that violates the moral order but has no specific victim other than society as a whole
atm skimming*
using an electronic device or camera on an atm that copies information from a bank card's magnetic strip whenever a computer uses the machine or photographs their key strokes
computer worms
programs that attack computer networks (or the internet) by self-replicating and sending themselves o other users, generally via email, without the aid of the operator
cyberbullying
willful and repeated harm inflicted through the medium of electronic text
cybercrime
the use of modern technology for criminal purposes
cyberespionage
efforts by intelligence agencies to penetrate computer networks of an enemy nation in order to steal important data
cyberspying
illegally using the internet to gather information that is considered private and confidential
cyberstalking
use of the internet, email, or other electronic communications devices to stalk another person. some cyberstalkers pursue minors through online chat rooms; others harass their victims electronically
cyberterrorism
internet attacks against an enemy nation's technological infrastructure.
cybertheft
use of computer networks for criminal profits. illegal copyright infringement, identity theft, and internet securities fraud are examples of cybertheft
cybervandalism
malicious attacks aimed at disrupting, defacing, and destroying technology
cyberwar
using cyberspace for acts of war, including spying and disrupting an enemy's computer network
darknet
computer network that can only be accessed using nonstandard communications protocols and ports, with restricted access that can only be opened with specific software configurations
denial-of-service attack (dos)
extorting money from an internet service user by threatening to prevent the user from having access to the service
etailing fraud
illegally buying and/or selling merchandise on the internet
identity theft
using the internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name and identity
logic bomb
a program that is secretly attached to a computer system, monitors the network's output, and waits for a particular signal such as a date to appear. also called a slag code, it is a type of delayed action virus that may be set off when a program user makes certain input that sets it in motion. a logic bomb may cause a variety of problems ranging from displaying or printing a spurious message to deleting or corrupting data
malware
a malicious software program
phishing
sometimes called carding or brand spoofing, phishing is a scam where the perpetrator sends out emails appearing to come from legitimate web enterprises such as ebay, amazon, or paypal in an effort to get the recipient to reveal personal and financial information
racketeer influenced and corrupt organizations (rico) act
federal legislation that enables prosecutors to bring additional criminal or civil charges against people whose multiple criminal acts constitute a conspiracy. rico features monetary penalties that allow the government to confiscate all profits derived from criminal activities. originally intended to be used against organized criminals, rico has also been used against white-collar criminals
spear-phishing
targeting specific victims, sending them emails that contain accurate information about their lives obtained from social networking sites, and asking them to open an email attachment from malware harvests details such as the victim's usernames and passwords, bank account details, credit card numbers, and other personal information
transnational organized crime
a criminal enterprise that involves the planning and execution of the distribution of illicit materials or services by groups or networks of individuals working in more than one country
trojan horse
a computer program that looks like a benign application but contains illicit codes that can damage the system operations. though trojan horses do not replicate themselves like viruses, they can be just as destructive
warez
a term computer hackers and software pirates use to describe a game or application that is made available for use on the internet in violation of its copyright protection
website defacement
a type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information. defacement can range from installing humorous graffiti to sabotaging or corrupting the site