Animal Cruelty Scenarios
Scenario 1
Police receive a telephone complaint from a person whose neighbor is leaving their dog outside in extreme heat without food or water on a daily basis. Police respond to the call and find a German Sheppard breathing heavily and appearing to be very thin. Police make contact with the owners of the dog who deny the allegations. Police arrest the dog’s owners and charge them with Animal Cruelty.
Answer: Animal Cruelty (720); A = Simple/Gross Neglect
Scenario 2
Police receive a 911 call about someone shooting a gun at a cat. The police respond to the call and find a cat lying in the road with a gunshot wound. Police are unable to locate the shooter of the cat.
Answer: Animal Cruelty (720); I = Intentional Abuse and Torture
Scenario 3
An undercover law enforcement investigation determines that every Saturday evening in a local community, people gather for a cock-fighting contest. The following week, law enforcement officers show up at the contest with a warrant and make numerous arrests.
Answer: Animal Cruelty (720); F = Organized Abuse
Identity Theft Scenarios
Scenario 1
Police receive a phone call from an individual who reports he recently received a letter from a local business making them aware that the business’ computers were recently hacked and the customer’s personal information might have been compromised. The individual then reports that he noticed that credit cards and other loans have been opened in his name.
Answer: This incident should be reported as a 26F = Identity Theft with a location code of 58 = Cyberspace. Had cyberspace not been available then this crime could not have been committed
Scenario 2
Police receive a phone call from an individual who reports she recently received a letter from a local business making her aware that the business’ computers were recently stolen and the customer’s personal information might have been compromised. The individual then reports that she noticed that credit cards and other loans have been opened in her name.
Answer: This incident should be reported as a 26F = Identity Theft with a physical location code. The fact that Cyberspace exists has nothing to do with the commission of this crime
Hacking/Computer Invasion Scenarios
Scenario 1
Police receive a phone call from a business that reports their computers were recently hacked based on information identified by their Information Technology staff. The business reports that the hacking/invasion appears to have come from an Internet address located in Iran.
Answer: This incident should be reported as a 26G = Hacking/Computer Invasion with a location code of 58 = Cyberspace. Had cyberspace not been available then this crime could not have been committed.
Scenario 2
Police receive a phone call from a business stating that an employee has used his computer to download and steal trade secret information from the company. The company states that the individual did not have access to the information and fraudulently accessed the folders where the information was located.
Answer: This incident should be reported as a 26G = Hacking/Computer Invasion with the business as the location code. Even though a computer was used to steal the information, the subject used an internal system and could have directly accessed the information without utilizing the internet.
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | Donahue, Kristi L |
File Modified | 0000-00-00 |
File Created | 2021-01-27 |