{"id":1318,"date":"2017-09-27T17:44:15","date_gmt":"2017-09-27T17:44:15","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/?post_type=chapter&#038;p=1318"},"modified":"2017-10-02T18:09:30","modified_gmt":"2017-10-02T18:09:30","slug":"11-4-end-of-chapter-material","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-4-end-of-chapter-material\/","title":{"raw":"11.4 End-of-Chapter Material","rendered":"11.4 End-of-Chapter Material"},"content":{"raw":"<div id=\"storm_1.0-ch11_s04_n01\" class=\"bcc-box bcc-highlight\">\r\n<h4 class=\"title\">Summary<\/h4>\r\n<p id=\"storm_1.0-ch11_s04_p01\" class=\"para\">Crimes against property include theft, crimes connected to theft, and crimes that invade or damage property. Modern jurisdictions criminalize several forms of theft under consolidated theft statutes that grade theft primarily on the value of the property stolen. Larceny under a consolidated theft statute in many jurisdictions is the physical taking or gaining possession of a victim\u2019s personal property by control and asportation, or a false representation of fact, with the intent to keep the property. Embezzlement under a consolidated theft statute is the conversion of a victim\u2019s real or personal property entrusted to the defendant. False pretenses under a consolidated theft statute is the permanent transfer of ownership of real or personal property or services from the victim to the defendant, based on a false representation of fact. The theft of property of low value is typically a misdemeanor (petty theft), while the theft of property of high value (grand theft) is a felony, felony-misdemeanor, or a gross misdemeanor, depending on the circumstances and the jurisdiction. Federal mail fraud, a felony, is the knowing use of the mail to perpetrate a scheme to defraud.<\/p>\r\n<p id=\"storm_1.0-ch11_s04_p02\" class=\"para\">Extortion is the purposeful theft of property by a threat of future harm such as bodily injury or exposure of the victim\u2019s crime or secret that subjects the victim to hatred, contempt, or ridicule. Extortion is typically graded as a felony. Robbery is the purposeful theft of property from the victim\u2019s person or presence by force or threat of imminent physical harm. Robbery is typically graded as a serious felony. Receiving stolen property is receiving, buying, selling, disposing of, or retaining stolen property with either knowledge or awareness that the property is stolen or knowledge or awareness of a risk that the property is stolen. Receiving stolen property is typically graded as a felony-misdemeanor or a misdemeanor if the property is of low value and a felony if the property is of significant value.<\/p>\r\n<p id=\"storm_1.0-ch11_s04_p03\" class=\"para\">Burglary is either breaking and entering, entering, or remaining on another\u2019s property with the intent to commit a felony, any crime, grand theft, or petty theft once inside. In some jurisdictions, the defendant can burglarize his or her own property. Burglary is typically graded as a serious felony. Criminal trespass is a knowing unauthorized entry onto the property of another. Criminal trespass is typically graded as a less serious felony than burglary, or a misdemeanor if the trespass is into a place, rather than an occupied building or structure. Arson is knowingly burning or damaging by fire property described in the arson statute. Arson is typically graded as a serious felony. Criminal mischief is damaging, destroying, or interfering with property with specific intent or purposely, general intent or knowingly, recklessly, or negligently, depending on the jurisdiction and the degree of the offense. Criminal mischief is typically graded as a less serious felony than arson, a gross misdemeanor, or a misdemeanor.<\/p>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s04_n02\" class=\"bcc-box bcc-info\">\r\n<h3 class=\"title\">You Be the Legal Textbook Author<\/h3>\r\n<p id=\"storm_1.0-ch11_s04_p04\" class=\"para\">Read the statute, and then describe the elements of each of the following crimes. Check your answers using the answer key at the end of the chapter.<\/p>\r\n\r\n<ol id=\"storm_1.0-ch11_s04_l01\" class=\"orderedlist\">\r\n \t<li><strong class=\"emphasis bold\">Offenses against computer users<\/strong>: <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/815.06.html\" target=\"_blank\" rel=\"noopener\">Fla. Stat. Ann. \u00a7\u00a0815.06<\/a>. The statute is available at this link: <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/815.06.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/florida\/crimes\/815.06.html<\/a>. Identify the criminal <strong class=\"emphasis bold\">act<\/strong> (seven possible), criminal <strong class=\"emphasis bold\">intent<\/strong>, <strong class=\"emphasis bold\">attendant circumstance<\/strong>, and <strong class=\"emphasis bold\">harm<\/strong>. How is this crime <strong class=\"emphasis bold\">graded<\/strong>?<\/li>\r\n \t<li><strong class=\"emphasis bold\">Identity theft<\/strong>: <a class=\"link\" href=\"http:\/\/law.onecle.com\/pennsylvania\/crimes-and-offenses\/00.041.020.000.html\" target=\"_blank\" rel=\"noopener\">18 Pa. C.S. \u00a7\u00a04120<\/a>. The statute is available at this link: <a class=\"link\" href=\"http:\/\/law.onecle.com\/pennsylvania\/crimes-and-offenses\/00.041.020.000.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/pennsylvania\/crimes-and-offenses\/00.041.020.000.html<\/a>. Identify the criminal <strong class=\"emphasis bold\">act<\/strong> (two possible), <strong class=\"emphasis bold\">criminal intent<\/strong>, <strong class=\"emphasis bold\">attendant circumstance<\/strong>, and <strong class=\"emphasis bold\">harm<\/strong>. How is this crime <strong class=\"emphasis bold\">graded<\/strong>?<\/li>\r\n \t<li><strong class=\"emphasis bold\">Unlawful duplication of computer-related material in the first degree<\/strong>: <a class=\"link\" href=\"http:\/\/law.onecle.com\/new-york\/penal\/PEN0156.30_156.30.html\" target=\"_blank\" rel=\"noopener\">N.Y. Penal Law \u00a7\u00a0156.30<\/a>. The statute is available at this link: <a class=\"link\" href=\"http:\/\/law.onecle.com\/new-york\/penal\/PEN0156.30_156.30.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/new-york\/penal\/PEN0156.30_156.30.html<\/a>. Identify the criminal <strong class=\"emphasis bold\">act<\/strong> (three possible), <strong class=\"emphasis bold\">criminal intent<\/strong>, <strong class=\"emphasis bold\">attendant circumstance<\/strong>, and <strong class=\"emphasis bold\">harm<\/strong>. How is this crime <strong class=\"emphasis bold\">graded<\/strong>?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s04_n03\" class=\"bcc-box bcc-highlight\">\r\n<h4 class=\"title\">Cases of Interest<\/h4>\r\n<ul id=\"storm_1.0-ch11_s04_l02\" class=\"itemizedlist\">\r\n \t<li><em class=\"emphasis\">People v. Beaver<\/em>, 186 Cal. App. 4th 107 (2010), illustrates the complexity of prosecuting theft under a consolidated theft statute: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=12194560873043980150&amp;q=false+pretenses+theft+of+a+service&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1999\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=12194560873043980150&amp;q= false+pretenses+theft+of+a+service&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1999<\/a>.<\/li>\r\n \t<li><em class=\"emphasis\">State v. Castillo<\/em>, Docket No. 29, 641 (NM: 2011), discusses the difference between a debit card and credit card for theft: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=8674118418557512209&amp;q=State+v+Castillo+NM&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2010\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=8674118418557512209&amp;q=State+v+Castillo+NM&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2010<\/a>.<\/li>\r\n \t<li><em class=\"emphasis\">People v. Nowack<\/em>, 614 N.W.2d 78 (2000), discusses the criminal intent element required for arson: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=3668258956679541189&amp;q=arson+%22specific+intent+crime%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=3668258956679541189&amp;q= arson+%22specific+intent+crime%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s04_n04\" class=\"bcc-box bcc-highlight\">\r\n<h4 class=\"title\">Articles of Interest<\/h4>\r\n<ul id=\"storm_1.0-ch11_s04_l03\" class=\"itemizedlist\">\r\n \t<li>Bernie Madoff case: <a class=\"link\" href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1661462\" target=\"_blank\" rel=\"noopener\">http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1661462<\/a><\/li>\r\n \t<li>Largest hedge fund insider trading case in US history: <a class=\"link\" href=\"http:\/\/www.huffingtonpost.com\/2011\/03\/22\/raj-rajaratnam-jury-hears_n_839281.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.huffingtonpost.com\/2011\/03\/22\/raj-rajaratnam-jury-hears_n_839281.html<\/a><\/li>\r\n \t<li>Celebrity burglaries: <a class=\"link\" href=\"http:\/\/www.nigerianbestforum.com\/generaltopics\/?p=50094\" target=\"_blank\" rel=\"noopener\">http:\/\/www.nigerianbestforum.com\/generaltopics\/?p=50094<\/a><\/li>\r\n \t<li>Wildland arson: <a class=\"link\" href=\"http:\/\/www.springerlink.com\/content\/h4w5015373m2v200\" target=\"_blank\" rel=\"noopener\">http:\/\/www.springerlink.com\/content\/h4w5015373m2v200<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s04_n05\" class=\"bcc-box bcc-highlight\">\r\n<h4 class=\"title\">Websites of Interest<\/h4>\r\n<ul id=\"storm_1.0-ch11_s04_l04\" class=\"itemizedlist\">\r\n \t<li>Information on arson: <a class=\"link\" href=\"http:\/\/www.ncjrs.gov\/App\/Topics\/Topic.aspx?topicid=66\" target=\"_blank\" rel=\"noopener\">http:\/\/www.ncjrs.gov\/App\/Topics\/Topic.aspx?topicid=66<\/a><\/li>\r\n \t<li>Cybercrime: <a class=\"link\" href=\"http:\/\/www.justice.gov\/usao\/priority-areas\/cyber-crime\" target=\"_blank\" rel=\"noopener\">http:\/\/www.justice.gov\/usao\/priority-areas\/cyber-crime<\/a><\/li>\r\n \t<li>US DOJ identity theft information: <a class=\"link\" href=\"http:\/\/www.justice.gov\/criminal\/fraud\/websites\/idtheft.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.justice.gov\/criminal\/fraud\/websites\/idtheft.html<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s04_n06\" class=\"bcc-box bcc-highlight\">\r\n<h4 class=\"title\">Statistics of Interest<\/h4>\r\n<ul id=\"storm_1.0-ch11_s04_l05\" class=\"itemizedlist\">\r\n \t<li>Burglary: <a class=\"link\" href=\"http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=321\" target=\"_blank\" rel=\"noopener\">http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=321<\/a><\/li>\r\n \t<li>Identity theft: <a class=\"link\" href=\"http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=42\" target=\"_blank\" rel=\"noopener\">http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=42<\/a><\/li>\r\n<\/ul>\r\n<\/div>","rendered":"<div id=\"storm_1.0-ch11_s04_n01\" class=\"bcc-box bcc-highlight\">\n<h4 class=\"title\">Summary<\/h4>\n<p id=\"storm_1.0-ch11_s04_p01\" class=\"para\">Crimes against property include theft, crimes connected to theft, and crimes that invade or damage property. Modern jurisdictions criminalize several forms of theft under consolidated theft statutes that grade theft primarily on the value of the property stolen. Larceny under a consolidated theft statute in many jurisdictions is the physical taking or gaining possession of a victim\u2019s personal property by control and asportation, or a false representation of fact, with the intent to keep the property. Embezzlement under a consolidated theft statute is the conversion of a victim\u2019s real or personal property entrusted to the defendant. False pretenses under a consolidated theft statute is the permanent transfer of ownership of real or personal property or services from the victim to the defendant, based on a false representation of fact. The theft of property of low value is typically a misdemeanor (petty theft), while the theft of property of high value (grand theft) is a felony, felony-misdemeanor, or a gross misdemeanor, depending on the circumstances and the jurisdiction. Federal mail fraud, a felony, is the knowing use of the mail to perpetrate a scheme to defraud.<\/p>\n<p id=\"storm_1.0-ch11_s04_p02\" class=\"para\">Extortion is the purposeful theft of property by a threat of future harm such as bodily injury or exposure of the victim\u2019s crime or secret that subjects the victim to hatred, contempt, or ridicule. Extortion is typically graded as a felony. Robbery is the purposeful theft of property from the victim\u2019s person or presence by force or threat of imminent physical harm. Robbery is typically graded as a serious felony. Receiving stolen property is receiving, buying, selling, disposing of, or retaining stolen property with either knowledge or awareness that the property is stolen or knowledge or awareness of a risk that the property is stolen. Receiving stolen property is typically graded as a felony-misdemeanor or a misdemeanor if the property is of low value and a felony if the property is of significant value.<\/p>\n<p id=\"storm_1.0-ch11_s04_p03\" class=\"para\">Burglary is either breaking and entering, entering, or remaining on another\u2019s property with the intent to commit a felony, any crime, grand theft, or petty theft once inside. In some jurisdictions, the defendant can burglarize his or her own property. Burglary is typically graded as a serious felony. Criminal trespass is a knowing unauthorized entry onto the property of another. Criminal trespass is typically graded as a less serious felony than burglary, or a misdemeanor if the trespass is into a place, rather than an occupied building or structure. Arson is knowingly burning or damaging by fire property described in the arson statute. Arson is typically graded as a serious felony. Criminal mischief is damaging, destroying, or interfering with property with specific intent or purposely, general intent or knowingly, recklessly, or negligently, depending on the jurisdiction and the degree of the offense. Criminal mischief is typically graded as a less serious felony than arson, a gross misdemeanor, or a misdemeanor.<\/p>\n<\/div>\n<div id=\"storm_1.0-ch11_s04_n02\" class=\"bcc-box bcc-info\">\n<h3 class=\"title\">You Be the Legal Textbook Author<\/h3>\n<p id=\"storm_1.0-ch11_s04_p04\" class=\"para\">Read the statute, and then describe the elements of each of the following crimes. Check your answers using the answer key at the end of the chapter.<\/p>\n<ol id=\"storm_1.0-ch11_s04_l01\" class=\"orderedlist\">\n<li><strong class=\"emphasis bold\">Offenses against computer users<\/strong>: <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/815.06.html\" target=\"_blank\" rel=\"noopener\">Fla. Stat. Ann. \u00a7\u00a0815.06<\/a>. The statute is available at this link: <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/815.06.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/florida\/crimes\/815.06.html<\/a>. Identify the criminal <strong class=\"emphasis bold\">act<\/strong> (seven possible), criminal <strong class=\"emphasis bold\">intent<\/strong>, <strong class=\"emphasis bold\">attendant circumstance<\/strong>, and <strong class=\"emphasis bold\">harm<\/strong>. How is this crime <strong class=\"emphasis bold\">graded<\/strong>?<\/li>\n<li><strong class=\"emphasis bold\">Identity theft<\/strong>: <a class=\"link\" href=\"http:\/\/law.onecle.com\/pennsylvania\/crimes-and-offenses\/00.041.020.000.html\" target=\"_blank\" rel=\"noopener\">18 Pa. C.S. \u00a7\u00a04120<\/a>. The statute is available at this link: <a class=\"link\" href=\"http:\/\/law.onecle.com\/pennsylvania\/crimes-and-offenses\/00.041.020.000.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/pennsylvania\/crimes-and-offenses\/00.041.020.000.html<\/a>. Identify the criminal <strong class=\"emphasis bold\">act<\/strong> (two possible), <strong class=\"emphasis bold\">criminal intent<\/strong>, <strong class=\"emphasis bold\">attendant circumstance<\/strong>, and <strong class=\"emphasis bold\">harm<\/strong>. How is this crime <strong class=\"emphasis bold\">graded<\/strong>?<\/li>\n<li><strong class=\"emphasis bold\">Unlawful duplication of computer-related material in the first degree<\/strong>: <a class=\"link\" href=\"http:\/\/law.onecle.com\/new-york\/penal\/PEN0156.30_156.30.html\" target=\"_blank\" rel=\"noopener\">N.Y. Penal Law \u00a7\u00a0156.30<\/a>. The statute is available at this link: <a class=\"link\" href=\"http:\/\/law.onecle.com\/new-york\/penal\/PEN0156.30_156.30.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/new-york\/penal\/PEN0156.30_156.30.html<\/a>. Identify the criminal <strong class=\"emphasis bold\">act<\/strong> (three possible), <strong class=\"emphasis bold\">criminal intent<\/strong>, <strong class=\"emphasis bold\">attendant circumstance<\/strong>, and <strong class=\"emphasis bold\">harm<\/strong>. How is this crime <strong class=\"emphasis bold\">graded<\/strong>?<\/li>\n<\/ol>\n<\/div>\n<div id=\"storm_1.0-ch11_s04_n03\" class=\"bcc-box bcc-highlight\">\n<h4 class=\"title\">Cases of Interest<\/h4>\n<ul id=\"storm_1.0-ch11_s04_l02\" class=\"itemizedlist\">\n<li><em class=\"emphasis\">People v. Beaver<\/em>, 186 Cal. App. 4th 107 (2010), illustrates the complexity of prosecuting theft under a consolidated theft statute: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=12194560873043980150&amp;q=false+pretenses+theft+of+a+service&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1999\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=12194560873043980150&amp;q= false+pretenses+theft+of+a+service&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1999<\/a>.<\/li>\n<li><em class=\"emphasis\">State v. Castillo<\/em>, Docket No. 29, 641 (NM: 2011), discusses the difference between a debit card and credit card for theft: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=8674118418557512209&amp;q=State+v+Castillo+NM&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2010\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=8674118418557512209&amp;q=State+v+Castillo+NM&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2010<\/a>.<\/li>\n<li><em class=\"emphasis\">People v. Nowack<\/em>, 614 N.W.2d 78 (2000), discusses the criminal intent element required for arson: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=3668258956679541189&amp;q=arson+%22specific+intent+crime%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=3668258956679541189&amp;q= arson+%22specific+intent+crime%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\n<\/ul>\n<\/div>\n<div id=\"storm_1.0-ch11_s04_n04\" class=\"bcc-box bcc-highlight\">\n<h4 class=\"title\">Articles of Interest<\/h4>\n<ul id=\"storm_1.0-ch11_s04_l03\" class=\"itemizedlist\">\n<li>Bernie Madoff case: <a class=\"link\" href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1661462\" target=\"_blank\" rel=\"noopener\">http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1661462<\/a><\/li>\n<li>Largest hedge fund insider trading case in US history: <a class=\"link\" href=\"http:\/\/www.huffingtonpost.com\/2011\/03\/22\/raj-rajaratnam-jury-hears_n_839281.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.huffingtonpost.com\/2011\/03\/22\/raj-rajaratnam-jury-hears_n_839281.html<\/a><\/li>\n<li>Celebrity burglaries: <a class=\"link\" href=\"http:\/\/www.nigerianbestforum.com\/generaltopics\/?p=50094\" target=\"_blank\" rel=\"noopener\">http:\/\/www.nigerianbestforum.com\/generaltopics\/?p=50094<\/a><\/li>\n<li>Wildland arson: <a class=\"link\" href=\"http:\/\/www.springerlink.com\/content\/h4w5015373m2v200\" target=\"_blank\" rel=\"noopener\">http:\/\/www.springerlink.com\/content\/h4w5015373m2v200<\/a><\/li>\n<\/ul>\n<\/div>\n<div id=\"storm_1.0-ch11_s04_n05\" class=\"bcc-box bcc-highlight\">\n<h4 class=\"title\">Websites of Interest<\/h4>\n<ul id=\"storm_1.0-ch11_s04_l04\" class=\"itemizedlist\">\n<li>Information on arson: <a class=\"link\" href=\"http:\/\/www.ncjrs.gov\/App\/Topics\/Topic.aspx?topicid=66\" target=\"_blank\" rel=\"noopener\">http:\/\/www.ncjrs.gov\/App\/Topics\/Topic.aspx?topicid=66<\/a><\/li>\n<li>Cybercrime: <a class=\"link\" href=\"http:\/\/www.justice.gov\/usao\/priority-areas\/cyber-crime\" target=\"_blank\" rel=\"noopener\">http:\/\/www.justice.gov\/usao\/priority-areas\/cyber-crime<\/a><\/li>\n<li>US DOJ identity theft information: <a class=\"link\" href=\"http:\/\/www.justice.gov\/criminal\/fraud\/websites\/idtheft.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.justice.gov\/criminal\/fraud\/websites\/idtheft.html<\/a><\/li>\n<\/ul>\n<\/div>\n<div id=\"storm_1.0-ch11_s04_n06\" class=\"bcc-box bcc-highlight\">\n<h4 class=\"title\">Statistics of Interest<\/h4>\n<ul id=\"storm_1.0-ch11_s04_l05\" class=\"itemizedlist\">\n<li>Burglary: <a class=\"link\" href=\"http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=321\" target=\"_blank\" rel=\"noopener\">http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=321<\/a><\/li>\n<li>Identity theft: <a class=\"link\" href=\"http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=42\" target=\"_blank\" rel=\"noopener\">http:\/\/bjs.ojp.usdoj.gov\/index.cfm?ty=tp&amp;tid=42<\/a><\/li>\n<\/ul>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-1318\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Criminal Law. <strong>Provided by<\/strong>: University of Minnesota Libraries Publishing . <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/open.lib.umn.edu\/criminallaw\/\">http:\/\/open.lib.umn.edu\/criminallaw\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/\">CC BY-NC-SA: Attribution-NonCommercial-ShareAlike<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":23485,"menu_order":4,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Criminal Law\",\"author\":\"\",\"organization\":\"University of Minnesota Libraries Publishing \",\"url\":\"http:\/\/open.lib.umn.edu\/criminallaw\/\",\"project\":\"\",\"license\":\"cc-by-nc-sa\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-1318","chapter","type-chapter","status-publish","hentry"],"part":1305,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/wp\/v2\/users\/23485"}],"version-history":[{"count":2,"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1318\/revisions"}],"predecessor-version":[{"id":1596,"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1318\/revisions\/1596"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/parts\/1305"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1318\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/wp\/v2\/media?parent=1318"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/pressbooks\/v2\/chapter-type?post=1318"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/wp\/v2\/contributor?post=1318"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/wp-json\/wp\/v2\/license?post=1318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}