Common Crimes in The Society, Its Effects and Controls
Common Crimes in The Society, Its Effects and Controls
Common Crimes in The Society, Its Effects and Controls
Controls
But therein lies the true problem. We, as a people, don't really
give a damn about one another. We only care about getting our
own way and we don't care if this costs other people their
livelihoods or their lives. Let's be honest in our debate on crime
and accept our role in the definition of "Criminal". Get off the
damned teeter-totter of moral arguments and let's talk about why
we despise each other so much are increasing day by day in all
societies in the world, but I personally do believe that there are a
lot which can be done by both the governments and the
individuals to reduce the crimes in communities.
To begin, since parents are the initial role model for a child, they
hold the vital aspect in inculcating values which will guide the
child through life. For example, if a child is properly nurtured
during the start of development, this would lead to a better
growth, thus making a person productive and may not
contemplate any lascivious acts in the future. In addition, schools
are said to be the second institution for not just education but also
social growth. The curriculum, in part, should motivate the young
minds to become an asset in the society. By showing inspirational
movies, for instance, can ignite their endeavor to strive for the
betterment of the community and, therefore, can make
attributions in the future.
It's essential to look up for the fundamental and the root cause of
the dilemma. For example, the relationship between committing
a crime and poverty should be considered; as poverty is
increasing, crime rate is increasing too. Besides that, the social
issue of unemployment can lead the individual or any party to
commit a certain crime, such as robbery, human smuggling,
drug trade etc. In addition, the rise in inflation number has a
direct correlation with unemployment and poverty too. As a
result, the prevailing scenario leads to insufficient availability of
job opportunities for the nation. These people will tend to go off
the tangent and become law breakers in order to afford money
for their survival or other real purposes. Statistics have shown
that dealing with bribes between people is specifically the most
committed illegal act in today's world. And eventually, this is
perpetuated to spread corruption and seize human rights in an
unfair way.
The first view states that people think we should give longer
prison sentences. People believe if someone has committed
crime they should stay in prison longer. We need to increase
penalty rates by law. They did something wrong so the prisoners
should have to pay for what they have done and therefore they
will be staying out of trouble in prison. In prison they have
programs that help inmates to make better decisions in life. For
example, they have counsellor and can help people look at
getting a trade job when they are released from prison.
The second view point says some people think there are other
ways to reduce crime in the community other than longer prison
sentences. One thing we could do is having groups put in the
community. For example, making it mandatory that people who
have committed a crime go to a counsellor. Another thing we
could do is helping them get jobs and therefore they do not feel
they need to commit a crime to get by in life. For example,
people will steal because they may not be able to afford money
for groceries.
Types of Crimes
Cybercrime is a crime involving a computer or computer network.
The computer may have been used in committing the crime, or it
may be the target. Cybercrime may harm someone's security or
finances.
Internationally, both state and non-state actors engage in
cybercrimes, including espionage, financial theft, and other cross-
border crimes. Cybercrimes crossing international borders and
involving the actions of at least one nation-state are sometimes
referred to as cyber warfare. Warren Buffett describes cybercrime
as the "number one problem with mankind" and said that it "poses
real risks to humanity."
A 2014 report sponsored by McAfee estimated that cybercrime
resulted in $445 billion in annual damage to Computer crime
encompasses a broad range of activities, including computer
fraud, financial crimes, scams, cybersex trafficking, and ad fraud.
Computer fraud
Computer fraud is the act of using a computer to take or alter
electronic data, or to gain unlawful use of a computer or system. If
computer fraud involves the use of the Internet, it can be
considered Internet fraud. The legal definition of computer fraud
varies by jurisdiction, but typically involves accessing a computer
without permission or authorization.
Forms of computer fraud include hacking into computers to alter
information, distributing malicious code such as computer
worms or viruses, installing malware or spyware to steal
data, phishing, and advance-fee scams.
Other forms of fraud may be committed using computer systems,
including bank fraud, carding, identity theft, extortion, and theft
of classified information. These types of crimes often result in the
loss of personal or financial information.
Cyber terrorism
Cyber terrorism are acts of terrorism committed through the use
of cyberspace or computer resources. Acts of deliberate, large-
scale disruption of computer networks and personal computers
through computer viruses, computer worms, phishing, malicious
software, hardware methods, or programming scripts can all be
forms of cyber terrorism.
Government officials and information technology security
specialists have documented a significant increase in Internet
problems and server scams since early 2001. Within the United
States, there is a growing concern among government agencies
such as the Federal Bureau of Investigation (FBI) and the Central
Intelligence Agency (CIA) that such incidents are part of an
organized efforts by cyber terrorist foreign intelligence services
or other groups to map potential security flaws in critical systems.
Cyber extortion
Cyber extortion is a type of extortion that occurs when a website,
e-mail server, or computer system is subjected to or threatened
with attacks by malicious hackers, such as denial-of-service
attacks. Cyber extortionists demand money in return for
promising to stop the attacks and to offer "protection". According
to the FBI, cyber extortionists are increasingly attacking
corporate websites and networks, crippling their ability to
operate, and demanding payments to restore their service. More
than 20 cases are reported each month to the FBI and many go
unreported in order to keep the victim's name out of the public
domain. Perpetrators typically use a distributed denial-of-service
attack. However, other cyber extortion techniques exist, such
as dosing, extortion, and bug poaching. An example of cyber
extortion was the Sony Hack of 2014
Ransom ware
Ransom ware is a type of malware used in cyber extortion to
restrict access to files, sometimes threatening permanent data
erasure unless a ransom is paid. The Kaspersky Lab 2016 Security
Bulletin report estimated that a business falls victim to ransom
ware every 40 minutes and predicted that the time would decrease
to 11 minutes by 2021. With ransomware remaining one of the
fastest-growing cybercrimes in the world, global damage caused
by it is predicted to cost up to $20 billion in 2021.
Cybersex trafficking
Cybersex trafficking is the transportation of victims and then
the live streaming of coerced sexual acts or rape on
webcam. Victims are abducted, threatened, or deceived and
transferred to "cybersex dens". The dens can be in any location
where the cybersex traffickers have a computer, tablet, or phone
with an internet connection. Perpetrators use social
media networks, video conferences, dating pages, online chat
rooms, apps, dark web sites, and other platforms. They use online
payment systems and crypto currencies to hide their
identities. Millions of reports of its occurrence are sent to
authorities’ annually. New legislation and police procedures are
needed to combat this type of cybercrime.
There are an estimated 6.3 million victims of cybersex trafficking,
according to a recent report by the International Labour
Organization and IOM. This number includes about 1.7
million child victims.
Cyber warfare
Computer as a tool
When the individual is the main target of cybercrime, the
computer can be considered as the tool rather than the target.
These crimes generally involve less technical expertise. Human
weaknesses are generally exploited. The damage dealt is
largely psychological and intangible, making legal action against
the variants more difficult. These are the crimes which have
existed for centuries in the offline world. Scams, theft, and the
like existed before the development of computers and the internet.
The same criminal has simply been given a tool which increases
their potential pool of victims and makes them all the harder to
trace and apprehend.
Crimes that use computer networks or devices to advance other
ends include:
Ad-fraud
Ad-frauds are particularly popular among cybercriminals, as such
frauds are lucrative and less likely to be prosecuted Jean-Loup
Richet, a professor at the Sorbonne Business School, classified
the large variety of ad-fraud committed by cybercriminals into
three categories: identity fraud, attribution fraud, and ad-fraud
services.
Identity fraud aims to impersonate real users and inflate audience
numbers. Several ad-fraud techniques relate to this category and
include traffic from bots (coming from a hosting company or a
data center, or from compromised devices); cookie stuffing;
falsifying user characteristics, such as location and browser type;
fake social traffic (misleading users on social networks into
visiting the advertised website); and the creation of fake social
media accounts to make the bot appear legitimate.
Attribution fraud impersonates the activities of real users, such as
clicks and conversations. Multiple ad-fraud techniques belong to
this category: hijacked devices and the use of infected users
(through malware) as part of a botnet to participate in ad fraud
campaigns; click farms (companies where low-wage employees
are paid to click or engage in conversations and affiliates' offers);
incentivized browsing; video placement abuse (delivered in
display banner slots); hidden ads (which will never be viewed by
real users); domain spoofing (ads served on a website other than
the advertised real-time bidding website); and click jacking, in
which the user is forced to click on an ad.
Ad fraud services are related to all online infrastructure and
hosting services that might be needed to undertake identity or
attribution fraud. Services can involve the creation of spam
websites (fake networks of websites created to provide artificial
backlinks); link building services; hosting services; creation of
fake and scam pages impersonating a famous brand and used as
part of an ad fraud campaign.
Online harassment
Whereas content may be offensive in a non-specific
way, harassment directs obscenities and derogatory comments at
specific individuals focusing, for example, on gender, race,
religion, nationality, or sexual orientation.
There are instances when committing a crime using a computer
can lead to an enhanced sentence. In the United States, over 41
states have passed laws and regulations that regard extreme online
harassment as a criminal act. These acts can be punished on a
federal scale, such as US Code 18 Section 2261A, which states
that using computers to threaten or harass can lead to a sentence
of up to 20 years, depending on the action taken.
Several countries outside of the United States have also created
laws to combat online harassment. In China, a country that
supports over 20 percent of the world's internet users, the
Legislative Affairs Office of the State Council passed a strict law
against the bullying of young people through a bill in response to
the Human Flesh Search Engine. The United Kingdom passed
the Malicious Communications Act, among other acts from 1997
to 2013, which stated that sending messages or letters
electronically that the government deemed "indecent or grossly
offensive" and/or language intended to cause "distress and
anxiety" can lead to a prison sentence of six months and a
potentially large fine. Australia, while not directly addressing the
issue of harassment, has grouped the majority of online
harassment under the Criminal Code Act of 1995. Using
telecommunication to send threats or harass and cause offense
was a direct violation of this act.
Although freedom of speech is protected by law in most
democratic societies (in the US this is done by the First
Amendment), it does not include all types of speech. In fact,
spoken or written "true threat" speech or text is criminalized
because of "intent to harm or intimidate". That also applies to
online or network-related threats in written text or speech.
Cyberbullying has increased drastically with the growing
popularity of online social networking. As of January 2020, 44%
of adult internet users in the United States have "personally
experienced online harassment". Children who experience online
harassment deal with negative and sometimes life-threatening
side effects. In 2021, reports displayed 41% of children
developing social anxiety, 37% of children developing
depression, and 26% of children having suicidal thoughts.
The United Arab Emirates was named in a spying scandal where
the Gulf nation along with other repressive governments
purchased NSO Group's mobile spyware Pegasus for mass
surveillance. Prominent activists and journalists were targeted as
part of the campaign, including Ahmed Mansoor, Princess
Latifa, Princess Haya, and more. Ghada Oueiss was one of the
many high-profile female journalists and activists who became
the target of online harassment. Oueiss filed a lawsuit against
UAE ruler Mohamed bin Zayed Al Nahyan along with other
defendants, accusing them of sharing her photos online. The
defendants, including the UAE ruler, filed motions to dismiss the
case of the hack-and-leak attack.
Drug trafficking
Dark net markets are used to buy and sell recreational
drugs online. Some drug traffickers use encrypted messaging
tools to communicate with drug mules or potential customers. The
dark web site Silk Road was the first major online marketplace
for drugs, starting operation in 2011. It was permanently shut
down in 2014 by the FBI and Europol. After Silk Road 2.0 went
down, Silk Road 3 Reloaded emerged. However, it was just an
older marketplace named Diablos Market, that used the name for
more exposure from the brand's previous success.
Dark net markets have had a rise in traffic in recent years for many
reasons, one of the biggest contributors being the anonymity
offered in purchases, and often a seller-review system. There are
many ways in which dark net markets can financially drain
individuals. Vendors and customers alike go to great lengths to
keep their identities a secret while online. Commonly used tools
are virtual private networks (VPN), Tails, and the Tor Browser to
help hide their online presence. Dark net markets entice
customers by making them feel comfortable. People can easily
gain access to a Tor browser with DuckDuckGo browser that
allows a user to explore much deeper than other browsers such
as Google Chrome. However, actually gaining access to an illicit
market is not as simple as typing it in on a search engine like one
would with Google. Dark net markets have special links that
change frequently, ending in .onion as opposed to the
typical .com, .net, and .org domain extensions. To add to privacy,
the most prevalent currency on these markets is Bitcoin. Bitcoin
allows transactions to be anonymous, with the only information
available to the public being the record that a transaction occurred
between two parties.
One of the biggest issues the users who use marketplaces face is
when vendors or the market itself are exit scamming. This is when
usually a vendor with a high rating will act as if they are still
selling on the market and have users pay for products they will
not receive. The vendor will then close off their account after
receiving money from multiple buyers and never send what they
purchased. The vendors all being involved in illegal activities
have a low chance of not exit scamming when they no longer want
to be a vendor. In 2019, an entire market known as Wall Street
Market had allegedly exit scammed, stealing 30 million dollars
from the vendors' and buyers' wallets in bitcoin.
Federal agents have cracked down on these markets. In July 2017,
federal agents seized one of the biggest markets, commonly
called Alpha bay, which later re-opened in August 2021 under the
control of De Snake, one of the original
administrators. Commonly, investigators will pose as a buyer and
order products from dark net vendors in the hopes that vendors
leave a trail the investigators can follow. One investigation had
an investigator pose as a firearms seller and for six months people
purchased from them and provided home addresses. The
investigators were able to make over a dozen arrests during this
six-month investigation. Another one of law enforcement's
biggest crackdowns is on vendors selling fentanyl and opiates.
With thousands of people dying each year due to drug overdose,
investigators have made it a priority. Many vendors do not realize
the extra criminal charges that go along with selling drugs online.
Commonly they get charged with money laundering and charges
for when the drugs are shipped in the mail on top of being a drug
distributor. In 2019, a vendor was sentenced to 10 years in prison
after selling cocaine and methamphetamine under the name Jet
Set Life. Although many investigators spend large amounts of
time tracking down people, in 2018, only 65 suspects who bought
and sold illegal goods on some of the biggest markets were
identified. This is compared to the thousands of transactions
taking place daily on these markets.
The World Economic Forum 2020 Global Risk Report confirmed
that organized cybercrime groups are joining forces to commit
criminal activities online, while estimating the likelihood of their
detection and prosecution to be less than 1% in the US. There are
also many privacy concerns surrounding cybercrime when
confidential information is intercepted or disclosed, legally or
otherwise.
Intelligence:
As cybercrime has proliferated, a professional ecosystem has
evolved to support individuals and groups seeking to profit from
cybercriminal activities. The ecosystem has become quite
specialized, including malware developers, botnet operators,
professional cybercrime groups, groups specializing in the sale of
stolen content, and so forth. A few of the leading cyber security
companies have the skills, resources and visibility to follow the
activities of these individuals and groups. A wide variety of
information is available from these sources which can be used for
defensive purposes, including technical indicators such as hashes
of infected files or malicious IPs/URLs, as well as strategic
information profiling the goals, techniques and campaigns of the
profiled groups. Some of it is freely published, but consistent,
ongoing access typically requires subscribing to an adversary
intelligence subscription service. At the level of an individual
threat actor, threat intelligence is often referred to as that actor's
"TTP" or "tactics, techniques, and procedures", as the
infrastructure, tools, and other technical indicators are often
trivial for attackers to change. Corporate sectors are considering
crucial role of artificial intelligence cyber security.
INTERPOL Cyber Fusion Center has begun a collaboration with
cyber security key players to distribute information on the latest
online scams, cyber threats and risks to internet users. Reports
cutting across social engineered frauds, ransom ware, phishing,
and other has since 2017 been distributed to security agencies in
over 150 countries.
Diffusion of cybercrime
The broad diffusion of cybercriminal activities is an issue in
computer crime detection and prosecution.
Hacking has become less complex as hacking communities have
greatly diffused their knowledge through the Internet. Blogs and
communities have contributed substantially to information
sharing as beginners can benefit from older hackers' knowledge
and advice.
Furthermore, hacking is cheaper than ever: before the cloud
computing era, in order to spam or scam, one needed a variety of
resources, such as a dedicated server, skills in server
management, network configuration, and maintenance, and
knowledge of Internet service provider standards. By comparison,
a mail software-as-a-service is a scalable, inexpensive, bulk, and
transactional e-mail-sending service for marketing purposes and
could be easily set up for spam. Cloud computing could be helpful
for a cybercriminal as a way to leverage his or her attack, in terms
of brute-forcing a password, improving the reach of a botnet, or
facilitating a spamming campaign.
Robbery
Robbery is the crime of taking or attempting to take anything of
value by force, threat of force, or by use of fear. According
to common law, robbery is defined as taking the property of
another, with the intent to permanently deprive the person of that
property, by means of force or fear; that is, it is
a larceny or theft accomplished by an assault. Precise definitions
of the offence may vary between jurisdictions. Robbery is
differentiated from other forms of theft (such
as burglary, shoplifting, pickpocketing, or car theft) by its
inherently violent nature (a violent crime); whereas many lesser
forms of theft are punished as misdemeanors, robbery is always
a felony in jurisdictions that distinguish between the two. Under
English law, most forms of theft are triable either way, whereas
robbery is triable only on indictment. The word "rob" came
via French from Late Latin words (e.g., deraubare)
of Germanic origin, from Common Germanic raub "theft".
Among the types of robbery are armed robbery, which involves
the use of a weapon, and aggravated robbery, when someone
brings with them a deadly weapon or something that appears to
be a deadly weapon. Highway robbery or mugging takes place
outside or in a public place such as a sidewalk, street, or parking
lot. Carjacking is the act of stealing a car from a victim by
force. Extortion is the threat to do something illegal, or the offer
to not do something illegal, in the event that goods are not given,
primarily using words instead of actions.
Criminal slang for robbery includes "blagging" (armed robbery,
usually of a bank) or "stick-up" (derived from the verbal
command to robbery targets to raise their hands in the air), and
"steaming" (organized robbery on underground train systems).
Blue-collar crime
The types of crime committed are a function of what is available
to the potential offender. Thus, those employed in relatively
unskilled environments have fewer opportunities to exploit than
those who work in situations where large financial transactions
occur. Blue-collar crime tends to be more obvious and thus
attracts more active police attention such
as vandalism or shoplifting. In contrast, white-collar employees
can incorporate legitimate and criminal behavior, thus making
themselves less obvious when committing the crime. Therefore,
blue-collar crime will more often use physical force, whereas in
the corporate world, the identification of a victim is less obvious
and the issue of reporting is complicated by a culture of
commercial confidentiality to protect shareholder value. It is
estimated that a great deal of white-collar crime is undetected or,
if detected, it is not reported.
Corporate crime
Corporate crime benefits the corporation (company or other type
of business organization), rather than individuals. It may,
however, result from decisions of high-ranking individuals within
the corporation. Corporations are not, unlike individuals, litigated
in criminal courts, which means the term "crime" does not really
apply. Litigation usually takes place in civil courts or by
institutions with jurisdiction over specific types of offences, such
as the U.S. Securities and Exchange Commission that litigates
violations of financial market and investment statutes.
State-corporate crime
The negotiation of agreements between a state and a corporation
will be at a relatively senior level on both sides, this is almost
exclusively a white-collar "situation" which offers the
opportunity for crime. Although law enforcement claims to have
prioritized white-collar crime, evidence shows that it continues to
be a low priority.
When senior levels of a corporation engage in criminal activity
using the company this is sometimes called control fraud.
Occupational crime
Individuals may commit crime during employment or
unemployment. The two most common forms are theft and fraud.
Theft can be of varying degrees, from a pencil to furnishings to a
car. Insider trading, the trading of stock by someone with access
to publicly unavailable information, is a type of fraud.
Money Laundering
Money laundering is the process of illegally concealing the origin
of money, obtained from illicit activities such as drug
trafficking, corruption, embezzlement or gambling, by converting
it into a legitimate source. It is a crime in many jurisdictions with
varying definitions. It is usually a key operation of organized
crime.
In United States law, money laundering is the practice of
engaging in financial transactions to conceal the identity, source,
or destination of illegally gained money. In United Kingdom law,
the common law definition is wider. The act is defined as "taking
any action with property of any form which is either wholly or in
part the proceeds of a crime that will disguise the fact that that
property is the proceeds of a crime or obscure the beneficial
ownership of said property".
In the past, the term "money laundering" was applied only to
financial transactions related to organized crime. Today its
definition is often expanded by government and international
regulators such as the US Office of the Comptroller of the
Currency to mean "any financial transaction which generates an
asset or a value as the result of an illegal act," which may involve
actions such as tax evasion or false accounting. In the UK, it does
not need to involve money, but any economic good. Courts
involve money laundering committed by private individuals, drug
dealers, businesses, corrupt officials, members of criminal
organizations such as the Mafia, and even states.
As financial crime has become more complex and financial
intelligence more important to combating international crime and
terrorism, money laundering has become a prominent political,
economic, and legal debate. Money laundering is ipso
facto illegal; the acts generating the money almost always are
themselves criminal in some way (for if not, the money would not
need to be laundered).
Money laundering is the conversion or transfer of property; the
concealment or disguising of the nature of the proceeds; the
acquisition, possession or use of property, knowing that these are
derived from criminal acts; the participating in or assisting the
movement of funds to make the proceeds appear legitimate.
Money obtained from certain crimes, such as extortion, insider
trading, drug trafficking, and illegal gambling is "dirty" and needs
to be "cleaned" to appear to have been derived from legal
activities, so that banks and other financial institutions will deal
with it without suspicion. Money can be laundered by many
methods that vary in complexity and sophistication.
Money laundering typically involves three steps: The first
involves introducing cash into the financial system by some
means ("placement"); the second involves carrying out complex
financial transactions to camouflage the illegal source of the cash
("layering"); and finally, acquiring wealth generated from the
transactions of the illicit funds ("integration"). Some of these
steps may be omitted, depending upon the circumstances. For
example, non-cash proceeds that are already in the financial
system would not need to be placed.
Arson Crime
Arson is the crime of willfully and deliberately setting fire to
or charring property. Although the act of arson typically
involves buildings, the term can also refer to the
intentional burning of other things, such as motor vehicles,
watercraft, or forests. The crime is typically classified as
a felony, with instances involving a greater degree of risk to
human life or property carrying a stricter penalty. Arson
which results in death can be further prosecuted
as manslaughter or murder. A common motive for arson is
to commit insurance fraud. In such cases, a person destroys
their own property by burning it and then lies about the cause
in order to collect against their insurance policy.
A person who commits arson is referred to as an arsonist, or
a serial arsonist if arson has been committed several times.
Arsonists normally use an accelerant (such
as gasoline or kerosene) to ignite, propel and directionalize
fires, and the detection and identification of ignitable liquid
residues (ILRs) is an important part of fire
investigations. Pyromania is an impulse control
disorder characterized by the pathological setting of
fires. Most acts of arson are not committed by pyromaniacs.
Historically, the common law crime of arson had
four elements:
The malicious
1. burning
2. of the dwelling
3. of another
Malicious
For purposes of common law arson, "malicious" refers to
action creating a great risk of a burning.
Burning
At common law charring to any part of dwelling was
sufficient to satisfy this element. No significant amount of
damage to the dwelling was required. Any injury or damage
to the structure caused by exposure to heat or flame is
sufficient.
Of the dwelling
'Dwelling' refers to a place of residence. The destruction of
an unoccupied building was not considered arson: "... since
arson protected habitation, the burning of an unoccupied
house did not constitute arson." At common law a structure
did not become a residence until the first occupants had
moved in, and ceased to be a dwelling if the occupants
abandoned the premises with no intention of resuming their
residency. Dwelling includes structures and outbuildings
within the curtilage. Dwellings were not limited to houses.
A barn could be the subject of arson if occupied as a
dwelling.
Of another
Burning one's own dwelling does not constitute common law
arson, even if the purpose was to collect insurance, because
"it was generally assumed in early England that one had the
legal right to destroy his own property in any manner he
chose". Moreover, for purposes of common law arson,
possession or occupancy rather than title determines whose
dwelling the structure is. Thus a tenant who sets fire to his
rented house would not be guilty of common law arson,
while the landlord who set fire to a rented dwelling house
would be guilty.
Embezzlement
Embezzlement is a crime that consists of withholding assets for
the purpose of conversion of such assets, by one or more persons
to whom the assets were entrusted, either to be held or to be used
for specific purposes. Embezzlement is a type of financial fraud.
For example, a lawyer might embezzle funds from the trust
accounts of their clients; a financial advisor might embezzle the
funds of investors; and a husband or a wife might embezzle funds
from a bank account jointly held with the spouse or peer.
The term embezzlement is often used in informal speech to mean
theft of money, usually from an organization or company such as
an employer.
Embezzlement is usually a premeditated crime, performed
methodically, with precautions that conceal the criminal
conversion of the property, which occurs without the knowledge
or consent of the victim. Often it involves the trusted individual
embezzling only a small proportion of the total of the funds or
resources they receive or control, in an attempt to minimize the
risk of the detection of the misallocation of the funds or resources.
When successful, embezzlement may continue for many years
without detection.
A thin metal strap or rod that slips inside a door's cavity at the
base of the window, to manipulate an internal locking
mechanism or linkage. A famously known tool is called the
"slim jim".
A long rod with a hooked end that slips between door and
frame, or through an opened window, that can reach and
manipulate the door handle or lock from inside the vehicle cab.
(A primary technique used professionally.)
Broken pieces of ceramic, often from a spark plug insulator,
used for throwing at car door windows so they shatter quietly.
Specially cut or filed-down car keys, numerous tryout keys,
jugglers and other lock picking tools.
Slide hammer puller to break apart door locks, steering-wheel
locks, and ignition switch locks by forced removal of the
cylinder core.
Multi meter or electrician's test lamp to locate a power source,
for disabling alarms and jump starting vehicles.
Spare wires and/or a screwdriver to connect a power source to
the ignition and starter wires.
Unusual looking electronics gear that may include; laptop or
tablet, radio antennas, cables, battery packs, and other
modified computer components that look homemade.
Many keyless ignition/lock cars have weak cryptographic
protection of their unlock radio signal or are susceptible to
some form of record-and-playback or range extending attack.
While proof-of-concept "thefts" of top-of-the-line luxury
cars have been demonstrated by academic researchers using
commercially available tools, such as RFID microreaders,
examples of actual car theft using these methods are not very
prevalent.
A firearm, knife or other weapon used to break a window.
OBD key cloning kit.
(1) Professional criminals are skilled in their criminal activity but not the
conventional criminals.
(4) Professional criminals not only regard themselves as criminals but are
also known to others as criminals, while many ordinary criminals think
that they are not criminals but are the victims of circumstances. Others
also may or may not regard them as criminals.
(7) Professional criminals have their own philosophy of life but this is not
true of ordinary criminals.
(10) Professional criminals tend to continue in crime for most part of their
lives but not ordinary criminals.