UnNumbered Animal Cruelty-Cyber-Based Crime Scenario

Uniform Crime Reporting Data Collection Instrument Pretesting and Burden Estimation General Clearance

1110-0057_Animal Cruelty-Cyber-Based Crime Scenarios

Estimation General Clearance

OMB: 1110-0057

Document [docx]
Download: docx | pdf

Animal Cruelty Scenarios

Scenario 1

Police receive a telephone complaint from a person whose neighbor is leaving their dog outside in extreme heat without food or water on a daily basis. Police respond to the call and find a German Sheppard breathing heavily and appearing to be very thin. Police make contact with the owners of the dog who deny the allegations. Police arrest the dog’s owners and charge them with Animal Cruelty.

Answer: Animal Cruelty (720); A = Simple/Gross Neglect



Scenario 2

Police receive a 911 call about someone shooting a gun at a cat. The police respond to the call and find a cat lying in the road with a gunshot wound. Police are unable to locate the shooter of the cat.

Answer: Animal Cruelty (720); I = Intentional Abuse and Torture



Scenario 3

An undercover law enforcement investigation determines that every Saturday evening in a local community, people gather for a cock-fighting contest. The following week, law enforcement officers show up at the contest with a warrant and make numerous arrests.

Answer: Animal Cruelty (720); F = Organized Abuse















Identity Theft Scenarios

Scenario 1

Police receive a phone call from an individual who reports he recently received a letter from a local business making them aware that the business’ computers were recently hacked and the customer’s personal information might have been compromised.  The individual then reports that he noticed that credit cards and other loans have been opened in his name.

Answer: This incident should be reported as a 26F = Identity Theft with a location code of 58 = Cyberspace.  Had cyberspace not been available then this crime could not have been committed



Scenario 2

Police receive a phone call from an individual who reports she recently received a letter from a local business making her aware that the business’ computers were recently stolen and the customer’s personal information might have been compromised.  The individual then reports that she noticed that credit cards and other loans have been opened in her name.

Answer: This incident should be reported as a 26F = Identity Theft with a physical location code.  The fact that Cyberspace exists has nothing to do with the commission of this crime























Hacking/Computer Invasion Scenarios

Scenario 1

Police receive a phone call from a business that reports their computers were recently hacked based on information identified by their Information Technology staff.  The business reports that the hacking/invasion appears to have come from an Internet address located in Iran. 

Answer: This incident should be reported as a 26G = Hacking/Computer Invasion with a location code of 58 = Cyberspace.  Had cyberspace not been available then this crime could not have been committed.



Scenario 2

Police receive a phone call from a business stating that an employee has used his computer to download and steal trade secret information from the company.  The company states that the individual did not have access to the information and fraudulently accessed the folders where the information was located.

Answer: This incident should be reported as a 26G = Hacking/Computer Invasion with the business as the location code.  Even though a computer was used to steal the information, the subject used an internal system and could have directly accessed the information without utilizing the internet.











File Typeapplication/vnd.openxmlformats-officedocument.wordprocessingml.document
AuthorDonahue, Kristi L
File Modified0000-00-00
File Created2021-01-23

© 2024 OMB.report | Privacy Policy