Strategic Crime Product

Read and analyze pages 388-390 in the textbook, these are the guidelines for creating strategic products. Create a strategic product using the data from the Topic 4 assignment on Tire Slashing’s. This report would be utilized by the special crimes unit.

  1. Create the product title, note the nature of the data, state the geography, and the date range analyzed.
  2. Create necessary tables, graphs, and/or maps that illustrate pertinent information.
  3. Analysis and findings: You may use bullets or paragraph form. Utilize problem-solving techniques to produce your analysis. (word count 250-300)
  4. Disclaimers stating the limitations of the data analysis techniques.
  5. Recommendations to solve the problem and areas for future analysis. (250-300 words)
  6. Credits and dates; list the individual(s) who is (are) credited, the product, and the date it was created.

Be sure to cite three to five relevant scholarly sources in support of your content. Use only sources provided, government websites

263

Journal of Contemporary Criminal Justice

Volume 24 Number 3 August 2008 263-273

© 2008 Sage Publications 10.1177/1043986208318225

http://ccj.sagepub.com hosted at

http://online.sagepub.com

Risk Assessment in Organized Crime Developing a Market and Product-Based Model to Determine Threat Levels Jay S. Albanese Virginia Commonwealth University, Richmond

The risk posed by organized crime is a central concern of governments around the world. The infiltration and control of legal and illegal markets and products is a major concern in nearly every country. New agencies and initiatives are under way in the United Kingdom, Canada, New Zealand, Belgium, and elsewhere, with the specific purpose to better predict and detect organized crime activity. This article proposes a model to assess the risk of organized crime. It employs a different unit of analysis from most current models, focusing on illicit markets rather than groups, and it offers a practical alterna- tive for determining the presence of organized crime in areas that may or may not have a history of organized crime involvement.

Keywords: organized crime; risk assessment; prediction; illicit markets; threat assess- ment; criminal markets

Definition of Organized Crime

It is important to be clear about what we mean by organized crime. Too often, dis- cussions of organized crime lack focus because it is not clear what precisely is being talked about. Definitions of organized crime have been offered by a wide variety of authors and researchers over the years, and an analysis of those definitions is presented in Table 1. It can be seen from Table 1 that authors have identified 11 different char- acteristics of organized crime in their definitions. When these are broken down, however, it is seen that 5 characteristics are most typical: organized continuing hier- archy, rational profit through crime, use of force or threat, corruption of public officials for immunity, and public demand for services. There seems to be less consensus about whether organized crime holds a monopoly over particular markets, has restricted membership, is nonideological, specializes in certain activities, has a code of secrecy, or engages in extensive planning of its activities.

A definition based on the consensus of these authors (see Table 1) would read, “Organized crime is a continuing criminal enterprise that rationally works to profit from illicit activities that are often in great public demand. Its continuing existence is maintained through the use of force, threats, monopoly control, and/or the corruption

 

 

264 Journal of Contemporary Criminal Justice

of public officials” (Albanese, 2007, p. 4). The precise size of the enterprise or group is not important to the definition; two persons are the minimum required to engage in a criminal conspiracy, so any group of two or larger suffices.

Organized crime can be described either by the activities it engages in or by the groups involved. Continuing criminal conspiracies that constitute organized crime require insiders and outsiders to connect suppliers with customers and also to protect the enterprise from law enforcement. Therefore, organized crime groups need to obtain the product (e.g., drugs, stolen property) and make it easily available to customers (e.g., movement from source to destination) while obtaining some “insurance” when members are caught or convicted (e.g., the need for corruption of public officials to protect the enterprise from disruption). All successful organized crime groups require these elements to survive and make a profit.

The Risk of Organized Crime

Determining the risk of organized crime requires specific local assessments rather than global judgments. To say that organized crime is a problem in the United States, for example, is too broad a statement to be useful because it overlooks the huge vari- ations within the country (i.e., some locations have no organized crime problem, whereas other locations within the country have serious organized crime problems). Global assessments of organized crime abound: “Transnational organized crime continues to grow in the absence of a comprehensive, integrated global counter strat- egy. . . . There are more slaves in the world now than at the highest point of the African slave trade” (World Federation of United Nations Associations, 2007). More than $1 trillion is paid each year in political bribes (World Bank Institute, 2007). Global

Table 1 Definitions of Organized Crime in the Literature

Characteristic Number of Authors

Organized hierarchy continuing 16 Rational profit through crime 13 Use of force or threat 12 Corruption of public officials to maintain immunity 11 Public demand for services 7 Monopoly over particular market 6 Restricted membership 4 Nonideological 4 Specialization 3 Code of secrecy 3

Source: Albanese (2007).

 

 

assessments like these are useful in drawing attention to the problem, but they are not useful in assessing the risk or threat in a particular location. To accomplish this, more precise information at the local level is required.

Most risk or threat assessments in organized crime have focused on groups. These assessments are often carried by law enforcement agencies to determine which groups are at highest risk or pose the greatest threat. The methods used to determine risk involve identifying the universe of known crime groups in the country and then ranking them by their attributes and potential seriousness. Sample attributes used in these assessments include violence, corruption, infiltration, sophistication, discipline, insulation, stability, and group cohesiveness (Royal Canadian Mounted Police, 2006; Serious Organized Crime Agency, 2007).

In a similar way, the Federal Bureau of Investigation’s Organized Crime Section at FBI Headquarters is divided into three units, which are focused on Italian American organized crime, Eurasian/Middle Eastern Organized Crime, and Asian and African criminal enterprises (Federal Bureau of Investigation, 2008). This illustrates a primary focus on crime groups as a focal point for attention to organized crime. Table 2 is excerpted from a Canadian threat assessment. It illustrates that threat assessment is carried out by law enforcement agencies to target individuals and groups determined to pose the highest risk. This selection of “groups” as the criterion to be predicted is based on the premise that law enforcement agencies place apprehension of criminals as the central part of their mission. Experience shows, however, that apprehension of organized crime figures usually does not eliminate the group—which recruits new members or promotes existing members after a successful prosecution (Organized Contraband Smuggling, 2000; President’s Commission on Organized Crime, 1987). The expectation that prosecution of individuals involved in organized crime groups will affect the operation of the group and also affect the illegal market for the illicit products in question is problematic. Successful prosecutions of organized crime figures affect groups for only a short period because the customer demand for the illegal products or services is not diminished by a prosecution, so existing or new groups continue to exploit these illicit markets.

High-Risk Activities Versus High-Risk Groups

A focus on organized crime activities rather than groups is useful for purposes of assessment and analysis to produce an objective basis for investigative priorities and targets. Three categories of organized crime can be identified: provision of illicit services, provision of illicit goods, and infiltration of legitimate business (Albanese, 2007). Provision of illicit services involves money, sex, and gambling outside legit- imate avenues (i.e., loan-sharking, prostitution and pornography, and illegal gambling). Provision of illicit goods includes drug trafficking or the buying, selling, or distribution

Albanese / Risk Assessment in Organized Crime 265

 

 

of stolen property. Infiltration of legitimate business involves coercive use of legal busi- nesses to exploit them for profit or use them for money laundering.

This three-part typology of organized crime can be subdivided further into specific offenses of concern to law enforcement agencies and the general public. Summarized in Table 3, it can be seen that the provision of illicit services entails the offenses of commercialized sex (prostitution or pornography), illegal gambling, human trafficking, and subcontracting to others (to provide services such as illicit dumping of waste, trafficking in human organs or protected animal species, or murder for hire). The provision of illicit goods includes the offenses of drug trafficking, property theft (e.g., automobiles, clothing, art), and counterfeiting (e.g., identity documents, software, DVDs, CDs, weapons). The infiltration of business involves extortion of business owners, racketeering (ongoing criminal enterprises which “front” for illegal activity), money laundering, and fraud (e.g., investment fraud, Internet phishing, and smuggling of goods).

Table 3 suggests that much of organized crime can be grouped into 1 of 10 dif- ferent categories of offenses. Of course, manifestations of these criminal behaviors can change over time, but the underlying conduct is remarkably stable. Consider Table 4, which compares “traditional” with “modern” forms of organized crime

266 Journal of Contemporary Criminal Justice

Table 2 Findings From 2006 Canada/U.S. Organized Crime Threat Assessment

Asian organized crime groups are distinguished by a high level of criminal entrepreneurship. They use both personal relationships and specific business and technological skills to maximize profit.

Asian organized crime is active throughout Canada and the United States, from major metropolitan areas and their suburbs to isolated rural communities.

During the past decade, preexisting underground economies of the former Soviet Union and its satellite states have transformed into fully realized transnational organized crime syndicates.

Increasingly, Russian organized crime is characterized by fluid, cellular-type structures. Senior members/associates of Russian criminal groups appear to recognize and accept the hegemony of a single criminal authority who plays an important role in dispute resolution, decision making, and the administration of criminal funds.

Italian organized crime/La Cosa Nostra is the most mature form of organized crime in both Canada and the United States. Its ability to form alliances with and co-opt other organized crime groups gives it global influence.

In both Canada and the United States, Italian organized crime/La Cosa Nostra is distinguished by its strict, vertically integrated, hierarchical structure. The resulting discipline and efficiency permit these groups to focus resources and maximize profit.

African criminal enterprises are engaged in a variety of low- to mid-level criminal activities that include a number of financial fraud schemes.

Albanian criminal groups are engaged in a range of cross-border criminal activity, including drug smug gling and money laundering.

Source: Royal Canadian Mounted Police. “Strategic Priority: Organized Crime 2006 Canada/US Organized Crime Threat Assessment” http://www.rcmp-grc.gc.ca/organizedcrime/octa_e.htm Royal Canadian Mounted Police, 2007. Reproduced with the permission of the Minister of Public Works and Government Services, 2008.

 

 

activity. It can be seen that the modern forms are simply newer versions of older kinds of criminal conduct that have changed due to opportunity, technology, and likelihood of apprehension. Therefore, the number of underlying organized crime activities does not appear to change significantly over time, although the specific manifestations of those crimes shift to account for broader social changes.

When we think of risk assessment, the fundamental question to be answered is “risk of what?” Tables 3 and 4 illustrate that we can identify in specific terms the particular organized crime risks we wish to target. This is a departure from most risk prediction and assessment efforts to date, which focus on crime groups rather than the products or markets that constitute the focus of organized crime activity.

There has not been much effort to explain organized crime’s choices of particular criminal activities. Why is drug trafficking chosen over cigarette trafficking, or human trafficking engaged in versus trafficking in endangered species? One approach to this question focuses on routine activities or situational crime prevention. This perspective concentrates on criminal settings (environments conducive to organized crime activ- ity) rather than on the motivations of individuals or groups of people. Because much organized crime activity depends on transactions in public and semipublic places (e.g., selling drugs, stolen property), better surveillance and control of these settings would reduce the opportunity for small-time organized crimes, which would affect

Albanese / Risk Assessment in Organized Crime 267

Table 3 Specific Offenses That Constitute Organized Crime

Provision of Illicit Services Provision of Illicit Goods Infiltration of Business

Commercialized sex activity Drug trafficking Extortion and racketeering Illegal gambling Stolen property Money laundering Human trafficking Counterfeiting (identity documents, Fraud (investment fraud, Subcontracted services: dumping, software, DVDs, CDs, weapons) phishing, smuggling)

trafficking in protected species, human organs, murder for hire

Table 4 Shifts in Organized Crime Activity Over Time

Original Activity Modern Version

Local numbers and lottery gambling Internet gambling at international sites Heroin, cocaine trafficking Synthetic drugs (less vulnerable to supply problems) Street prostitution Internet prostitution and trafficking in human beings Extortion of local businesses for protection Extortion of corporations, kidnappings Loan-sharking Money laundering, precious stones, commodities Fencing stolen property Theft of intellectual property

 

 

larger organized crime operations, according to this view (Felson, 2006). The routine activities approach has not been systematically applied to organized crime, however, so it is not clear whether a focus on criminal settings, and the exclusion of individual motivation, would effectively prevent large-scale organized crime activity.

Risk Assessment in Criminal Justice Settings

Risk assessment is not easy, because criminal conduct remains a relatively rare event. The less common an event, the harder it is to forecast or predict effectively. Therefore, it is easier to predict automobile accidents than it is to predict incidents of organized crime. In the biological sciences, where many well-known diseases are in fact rare, it is difficult to predict diseases such as prostate cancer or breast cancer in an individual patient. However, it is possible to determine broader risk levels among groups by scrutinizing common factors among known victims of the disease and comparing them with nonvictims. It is this basic strategy of science that helped to identify factors such as cigarette smoking, obesity, and lack of exercise to increase risk for a number of serious diseases. Indeed, it has been found that in general, people themselves are not at high risk; it is their activities that place them at high risk (Kravitz, 2007; Ortega, Ruiz, & Sjostrom, 2007).

In criminology, the approach should be similar. We cannot predict very well who will become a criminal or which precise offense or victim will be chosen in a given case. However, a close examination of known cases of offenders, crimes, and victims can be compared with nonoffenders, crime-free activities, and nonvictims to assess their comparative risk levels. Therefore, the purpose of risk assessment and prediction in criminal justice is the same as it is in natural science: to determine comparative risk levels of different activities so that resources can be focused on those activities that pose the highest risk. A great deal of useful research has been produced that shows the utility of risk levels to determine intensity of probation supervision, the factors important in determining parole release guidelines, and sentencing guidelines in criminal justice (Davies & Dedel, 2006; Kleiman, Ostrom, & Cheesman, 2007; Langton, 2006; Sims & Jones, 1997).

Research in criminal justice risk assessment has been consistent in that very few variables account for most of the risk; the addition of more factors does not add to predictive efficiency. Although our ability to predict the behavior of individuals is poor, our ability to distinguish risk levels among and within groups is much better (Farrington & Tarling, 1985; Gottfredson & Tonry, 1988). Here, we wish to assess comparative risk levels of criminal activities and illicit markets. The assumption is that if we properly assess and rank these illicit markets and activities, our targeting of these activities will lead us, in turn, to the high-risk people (organized crime groups) involved in them. Another way to illustrate this is presented in Figure 1.

268 Journal of Contemporary Criminal Justice

 

 

Figure 1 compares traditional approaches to organized crime risk assessment with a different approach. Historically, the focus of risk assessment has been to gather information on offenders to locate and interdict high-risk individuals and groups involved in organized crime. The long-term goal for the prosecution of these individ- uals is to have an impact on the illicit activities involved. The alternative approach, proposed here (following the large, curved arrows in Figure 1), looks to assessment of high risk in specific products and markets, knowing that these markets will attract the offenders that law enforcement seeks. The difference in the two approaches is that the traditional approach focuses on high-risk offenders (with impacts on illicit markets and activities a secondary concern), whereas the alternative approach focuses on identification of high-risk products and markets (knowing that targeting these will have a more substantial impact and also yield the offenders involved). Put another way, if you correctly identify the high-risk products and markets, you will know where to look for the offenders. This is an important distinction because even markets with no prior history of organized crime can be identified through this process, providing information for investigators beyond what might be obtained from targeting assess- ments to those individuals and groups with known ties to organized crime.

Modeling the Illicit Markets

Changing the criterion of risk assessment from identifying high-risk individuals and groups to high-risk illicit markets requires an understanding of important mar- ket variables. Prior work on illicit markets and organized crime makes it clear that supply, demand, regulators, and competition are crucial variables to measure to determine markets at risk (Albanese, 2001; Edwards & Gill, 2002; Reuter, 1985;

Albanese / Risk Assessment in Organized Crime 269

Risk of organized crime

involvement in specific

products and markets

Impact

High-risk markets

will attract offenders

Historical law enforcement

focus: Gather information to

locate offenders

A different focus and approach

Traditional approach

Locate/interdict high-risk

individuals and groups

Figure 1 Risk Assessment Focus on Activities Versus Individuals

 

 

Smith, 1980; Vander Beken, 2004; Wilkins & Casswell, 2003). Figure 2 illustrates how these risk factors might interact to increase the risk of organized crime involvement for a particular product or market.

Figure 2 illustrates that organized crime groups operate enterprises with the goals of survival and making a profit, while controlling the pressures they face from sup- pliers (sources), customers (demand), regulators (law, police), and competitors (other legal and illegal businesses and products). In each category, it can be seen that spe- cific indicators (variables) can be developed to measure the comparative nature of supply (availability, ease of movement), demand (the level of demand and whether it is elastic or inelastic), competition from other groups and products (profitability, history of organized crime in that market, and impact of harms produced), and regu- lators (ease of entry into the illicit market or product—existing regulations and any special skills needed, the capacity and effectiveness of law enforcement in that juris- diction, and government corruption levels). If indicators for each of these variables are developed (and applied to different illicit products), it is possible to assess the comparative risk of organized crime involvement for different types of products and illicit markets (a listing of specific product markets is shown in Table 3).

There is a need to measure these variables for each product periodically to assess changes in risk over time. It is likely that the true value of such a risk assessment effort will be to assess changes in the comparative risk of organized crime involve- ment in different products and markets over time. A one-time effort to assess risk would be limited in its utility because it cannot assess the direction of the risk (is it

270 Journal of Contemporary Criminal Justice

Regulators •Ease of entry into

market (regulation/skills) •Law enforcement

capability •Government corruption

level

Competition •History of Organized crime in market

•Profitability •Harm

Supply •Objective availability of product or service

•Ease of movement/sale

Customers •Current demand

for product •Elastic/inelastic nature of demand

Organized crime as enterprise

Goal: survive and make profit

Figure 2 A Model of Organized Crime Operation in Illicit Markets

 

 

on its way up or down?), and periodic assessments are needed to assess the impact of efforts and initiatives against organized crime.

Summarized in another way, Figure 2 offers a 10-factor model for risk assessment. The types of variables include supply indicators ([a] objective availability of product or service, [b] ease of movement/sale), regulation indicators ([c] ease of entry into market by its regulation and the skills needed, [d] law enforcement capability and competence, [e] level of local government corruption), competition indicators ([f] history of organized crime in the market, [g] profitability, [h] harm), demand indi- cators ([i] current customer demand for product, [j] nature of the demand—whether elastic or inelastic). Using multiple indicators or measures for each of the variables (and for each product) would yield a reliable, comparative assessment of risk.

The indicators in the risk assessment model can be combined into an index for ease of use in practice. The index would be based on the perceptions and experiences of those who might have knowledge of illicit products. Much in the same way that the Transparency International (2005) corruption surveys rely heavily on perceptions of business activities, analogous surveys at the local level could be conducted to deter- mine the circumstances surrounding the supply, demand, regulation, and competition for various illicit products in specific jurisdictions. For example, local citizen, business, police, and perhaps offender surveys could be used to help measure perceptions of supply, demand, regulation, and competition for particular illicit products. An analysis of known, closed cases could be added to this information to look for evidence of the 10 indicators (noted above) in actual criminal cases. Police training and performance can be comparatively assessed to determine its capability and competence. Similarly, an assessment of local or national legislation and regulations can be carried out to determine the extent to which they advance organized crime activity by unwittingly enlarging or shifting illegal markets for various products or services. Preliminary work on the impact of legislation on organized crime has begun in the European Union (Morgan & Clarke, 2006; Savona, 2006; Vander Beken & Balcaen, 2006).

The Future of Risk Assessment in Organized Crime

The preceding discussion illustrates that it is possible to develop a model and com- posite measures for each of the 10 indicators noted above to produce an index of risk of organized crime involvement in different illegal products and markets. The poten- tial utility of such a risk assessment index for screening, and targeting of law enforce- ment and prevention efforts, should not be underestimated. A 10-factor risk model does not oversimplify the situation. Consider the UN Gender-Related Development Index, which is an indicator of the standard of living in a country, measuring inequal- ities between men and women in health, life expectancy, and income. The Gender- Related Development Index is composed of only three indicators (Somers, 2007). In a similar way, the Transparency International Corruption Perceptions Index uses only six

Albanese / Risk Assessment in Organized Crime 271

 

 

survey sources for most nations included (Beets, 2005; Transparency International, 2007). Therefore, a risk assessment model does not need to contain a large number of variables to be useful in practice in distinguishing risk levels.

Unlike most contemporary efforts to assess risk of organized crime, the model proposed here focuses on assessment of products/markets at highest risk (rather than on offenders or groups). Correct identification of these product markets will lead police to the organized crime groups they are looking for. Targeting only the crime groups themselves fails to anticipate future changes in organized crime involvement in new and different products and locations.

To enhance the utility of the risk assessment approach proposed here, several important aspects cannot be ignored. First, specific locations must be the basis for analysis due to variations in supply, demand, regulation, and competition among localities and regions. Second, different products/activities will have different risks, so separate risk assessments must be carried out for each product/activity—to produce a comparative risk (threat) for each activity in a given location (Table 3 provides a list of these organized crimes/activities). Third, risk assessment in organized crime must be connected to allocation of resources so that government resources can be targeted systematically at those criminal activities found to be the highest risk. Fourth, there must be periodic application of risk assessment to different products and loca- tions to help assess the impact of intervention efforts over time. Systematic risk assess- ment in organized crime holds great promise as a practical screening device and investigative tool to target illicit markets, activities, and government resources in responding to the threats identified.

References

Albanese, J. S. (2001). The prediction and control of organized crime: A risk assessment instrument for targeting law enforcement efforts. Trends in Organized Crime, 6(3/4), 4-29.

Albanese, J. S. (2007). Organized crime in our times (5th ed.). Newark, NJ: LexisNexis. Beets, S. D. (2005). Understanding the demand-side issues of international corruption. Journal of Business

Ethics, 57(1), 65-82. Davies, G., & Dedel, K. (2006). Violence risk screening in community corrections. Criminology & Public

Policy, 5(4), 743-770. Edwards, A., & Gill, P. (2002). Crime as enterprise? The case of “transnational organized crime.” Crime,

Law and Social Change, 37(3), 203-224. Farrington, D. P., & Tarling, R. (1985). Prediction in criminology. Albany: State University of New York

Press. Federal Bureau of Investigation. (2008). Organized crime. Retrieved February 28, 2008, from http://www

.fbi.gov/hq/cid/orgcrime/aboutocs.htm Felson, M. (2006). The ecosystem for organized crime. Helsinki, Finland: European Institute for Crime

Prevention and Control. Gottfredson, D. M., & Tonry, M. (Eds.). (1988). Prediction and classification: Criminal justice decision-

making. Chicago: University of Chicago Press. Kleiman, M., Ostrom, B. J., & Cheesman, F. L., II. (2007). Using risk assessment to inform sentencing

decisions for nonviolent offenders in Virginia. Crime & Delinquency, 53(1), 106-133.

272 Journal of Contemporary Criminal Justice

 

 

Kravitz, L. (2007). The 25 most significant health benefits of physical activity & exercise: Common health issues that can be affected, prevented or controlled by exercise. IDEA Fitness Journal, 4(9), 54-63.

Langton, L. (2006). Low self-control and parole failure: An assessment of risk from a theoretical perspec- tive. Journal of Criminal Justice, 34(5), 469-478.

Morgan, R., & Clarke, R. V. (2006). Legislation and unintended consequences for crime. European Journal on Criminal Policy and Research, 12(3/4), 189-212.

Organized contraband smuggling and its enforcement in Canada: An assessment of the anti-smuggling initiative. (2000). Trends in Organized Crime, 6(2), 3-32.

Ortega, F. B., Ruiz, J. R., & Sjostrom, M. (2007). Physical activity, overweight and central adiposity in Swedish children and adolescents: The European Youth Heart Study. International Journal of Behavioral Nutrition and Physical Activity, 4(November 19), 61-71.

President’s Commission on Organized Crime. (1987). Organized crime today. Washington, DC: Government Printing Office.

Reuter, P. (1985). The organization of illegal markets: An economic analysis. Washington, DC: U.S. Department of Justice.

Royal Canadian Mounted Police. (2006). 2006 Canada/U.S. organized crime threat assessment. Retrieved February 10, 2008, from http://www.rcmp-grc.gc.ca/organizedcrime/octa_e.htm

Savona, E. U. (2006). Initial methodology for the crime proofing of new or amended legislation at the EU level. European Journal on Criminal Policy and Research, 12(3/4), 221-230.

Serious Organized Crime Agency. (2007). The United Kingdom threat assessment of serious organized crime. Retrieved February 28, 2008, from http://www.soca.gov.uk/assessPublications/downloads/ threat_assess_unclass_250706.pdf

Sims, B., & Jones, M. (1997). Predicting success or failure on probation: Factors associated with felony probation outcomes. Crime & Delinquency, 43(3), 314-328.

Smith, D. C., Jr. (1980). Paragons, pariahs, and pirates: A spectrum-based theory of enterprise. Crime & Delinquency, 26(3), 358-386.

Somers, K. B. (2007). Exploring the United Nations’ Human Development Index. Mathematics Teacher, 101(3), 214-224.

Transparency International. (2005). Global corruption report 2005. London: Pluto. Transparency International. (2007). Global corruption report 2007. Cambridge, UK: Cambridge University

Press. Vander Beken, T. (2004). Risky business: A risk-based methodology to measure organized crime. Crime,

Law and Social Change, 44, 471-516. Vander Beken, T., & Balcaen, A. (2006). Crime opportunities provided by legislation in market sectors:

Mobile phones, waste disposal, banking, pharmaceuticals. European Journal on Criminal Policy and Research, 12(3/4), 299-324.

Wilkins, C., & Casswell, S. (2003). Organized crime in cannabis cultivation in New Zealand: An economic analysis. Contemporary Drug Problems, 30(4), 757-778.

World Bank Institute. (2007). More than $1 trillion is paid in bribes each year. Retrieved February 28, 2008, from http://go.worldbank.org/JRT5WLXPU0

World Federation of United Nations Associations. (2007). 2007 state of the future. Retrieved February 27, 2008, from http://www.millennium-project.org

Jay S. Albanese is a professor at Virginia Commonwealth University. He served as chief of the International Center at the National Institute of Justice. Dr. Albanese is the author/editor of 10 books on organized crime, ethics, transnational crime, and criminal justice. He is a past president of the Academy of Criminal Justice Sciences.

Albanese / Risk Assessment in Organized Crime 273

 

<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Dot Gain 20%) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.3 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.1000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams false /MaxSubsetPct 100 /Optimize false /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness true /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Remove /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true /ACaslon-Bold /ACaslon-BoldItalic /ACaslon-Italic /ACaslon-Ornaments /ACaslon-Regular /ACaslon-Semibold /ACaslon-SemiboldItalic /AdobeCorpID-Acrobat /AdobeCorpID-Adobe /AdobeCorpID-Bullet /AdobeCorpID-MinionBd /AdobeCorpID-MinionBdIt /AdobeCorpID-MinionRg /AdobeCorpID-MinionRgIt /AdobeCorpID-MinionSb /AdobeCorpID-MinionSbIt /AdobeCorpID-MyriadBd /AdobeCorpID-MyriadBdIt /AdobeCorpID-MyriadBdScn /AdobeCorpID-MyriadBdScnIt /AdobeCorpID-MyriadBl /AdobeCorpID-MyriadBlIt /AdobeCorpID-MyriadLt /AdobeCorpID-MyriadLtIt /AdobeCorpID-MyriadPkg /AdobeCorpID-MyriadRg /AdobeCorpID-MyriadRgIt /AdobeCorpID-MyriadRgScn /AdobeCorpID-MyriadRgScnIt /AdobeCorpID-MyriadSb /AdobeCorpID-MyriadSbIt /AdobeCorpID-MyriadSbScn /AdobeCorpID-MyriadSbScnIt /AdobeCorpID-PScript /AGaramond-BoldScaps /AGaramond-Italic /AGaramond-Regular /AGaramond-RomanScaps /AGaramond-Semibold /AGaramond-SemiboldItalic /AGar-Special /AkzidenzGroteskBE-Bold /AkzidenzGroteskBE-BoldEx /AkzidenzGroteskBE-BoldExIt /AkzidenzGroteskBE-BoldIt /AkzidenzGroteskBE-Ex /AkzidenzGroteskBE-It /AkzidenzGroteskBE-Light /AkzidenzGroteskBE-LightEx /AkzidenzGroteskBE-LightOsF /AkzidenzGroteskBE-Md /AkzidenzGroteskBE-MdEx /AkzidenzGroteskBE-MdIt /AkzidenzGroteskBE-Regular /AkzidenzGroteskBE-Super /AlbertusMT /AlbertusMT-Italic /AlbertusMT-Light /Aldine401BT-BoldA /Aldine401BT-BoldItalicA /Aldine401BT-ItalicA /Aldine401BT-RomanA /Aldine401BTSPL-RomanA /Aldine721BT-Bold /Aldine721BT-BoldItalic /Aldine721BT-Italic /Aldine721BT-Light /Aldine721BT-LightItalic /Aldine721BT-Roman /Aldus-Italic /Aldus-ItalicOsF /Aldus-Roman /Aldus-RomanSC /AlternateGothicNo2BT-Regular /AmazoneBT-Regular /AmericanTypewriter-Bold /AmericanTypewriter-BoldA /AmericanTypewriter-BoldCond /AmericanTypewriter-BoldCondA /AmericanTypewriter-Cond /AmericanTypewriter-CondA /AmericanTypewriter-Light /AmericanTypewriter-LightA /AmericanTypewriter-LightCond /AmericanTypewriter-LightCondA /AmericanTypewriter-Medium /AmericanTypewriter-MediumA /Anna /AntiqueOlive-Bold /AntiqueOlive-Compact /AntiqueOlive-Italic /AntiqueOlive-Roman /Arcadia /Arcadia-A /Arkona-Medium /Arkona-Regular /ArrusBT-Black /ArrusBT-BlackItalic /ArrusBT-Bold /ArrusBT-BoldItalic /ArrusBT-Italic /ArrusBT-Roman /AssemblyLightSSK /AuroraBT-BoldCondensed /AuroraBT-RomanCondensed /AuroraOpti-Condensed /AvantGarde-Book /AvantGarde-BookOblique /AvantGarde-Demi /AvantGarde-DemiOblique /Avenir-Black /Avenir-BlackOblique /Avenir-Book /Avenir-BookOblique /Avenir-Heavy /Avenir-HeavyOblique /Avenir-Light /Avenir-LightOblique /Avenir-Medium /Avenir-MediumOblique /Avenir-Oblique /Avenir-Roman /BaileySansITC-Bold /BaileySansITC-BoldItalic /BaileySansITC-Book /BaileySansITC-BookItalic /BakerSignetBT-Roman /BaskervilleBE-Italic /BaskervilleBE-Medium /BaskervilleBE-MediumItalic /BaskervilleBE-Regular /Baskerville-Bold /BaskervilleBook-Italic /BaskervilleBook-MedItalic /BaskervilleBook-Medium /BaskervilleBook-Regular /BaskervilleBT-Bold /BaskervilleBT-BoldItalic /BaskervilleBT-Italic /BaskervilleBT-Roman /BaskervilleMT /BaskervilleMT-Bold /BaskervilleMT-BoldItalic /BaskervilleMT-Italic /BaskervilleMT-SemiBold /BaskervilleMT-SemiBoldItalic /BaskervilleNo2BT-Bold /BaskervilleNo2BT-BoldItalic /BaskervilleNo2BT-Italic /BaskervilleNo2BT-Roman /Baskerville-Normal-Italic /BauerBodoni-Black /BauerBodoni-BlackCond /BauerBodoni-BlackItalic /BauerBodoni-Bold /BauerBodoni-BoldCond /BauerBodoni-BoldItalic /BauerBodoni-BoldItalicOsF /BauerBodoni-BoldOsF /BauerBodoni-Italic /BauerBodoni-ItalicOsF /BauerBodoni-Roman /BauerBodoni-RomanSC /Bauhaus-Bold /Bauhaus-Demi /Bauhaus-Heavy /BauhausITCbyBT-Bold /BauhausITCbyBT-Heavy /BauhausITCbyBT-Light /BauhausITCbyBT-Medium /Bauhaus-Light /Bauhaus-Medium /BellCentennial-Address /BellGothic-Black /BellGothic-Bold /Bell-GothicBoldItalicBT /BellGothicBT-Bold /BellGothicBT-Roman /BellGothic-Light /Bembo /Bembo-Bold /Bembo-BoldExpert /Bembo-BoldItalic /Bembo-BoldItalicExpert /Bembo-Expert /Bembo-ExtraBoldItalic /Bembo-Italic /Bembo-ItalicExpert /Bembo-Semibold /Bembo-SemiboldItalic /Benguiat-Bold /Benguiat-BoldItalic /Benguiat-Book /Benguiat-BookItalic /BenguiatGothicITCbyBT-Bold /BenguiatGothicITCbyBT-BoldItal /BenguiatGothicITCbyBT-Book /BenguiatGothicITCbyBT-BookItal /BenguiatITCbyBT-Bold /BenguiatITCbyBT-BoldItalic /BenguiatITCbyBT-Book /BenguiatITCbyBT-BookItalic /Benguiat-Medium /Benguiat-MediumItalic /Berkeley-Black /Berkeley-BlackItalic /Berkeley-Bold /Berkeley-BoldItalic /Berkeley-Book /Berkeley-BookItalic /Berkeley-Italic /Berkeley-Medium /Berling-Bold /Berling-BoldItalic /Berling-Italic /Berling-Roman /BernhardBoldCondensedBT-Regular /BernhardFashionBT-Regular /BernhardModernBT-Bold /BernhardModernBT-BoldItalic /BernhardModernBT-Italic /BernhardModernBT-Roman /BernhardTangoBT-Regular /BlockBE-Condensed /BlockBE-ExtraCn /BlockBE-ExtraCnIt /BlockBE-Heavy /BlockBE-Italic /BlockBE-Regular /Bodoni /Bodoni-Bold /Bodoni-BoldItalic /Bodoni-Italic /Bodoni-Poster /Bodoni-PosterCompressed /Bookman-Demi /Bookman-DemiItalic /Bookman-Light /Bookman-LightItalic /Boton-Italic /Boton-Medium /Boton-MediumItalic /Boton-Regular /Boulevard /BremenBT-Black /BremenBT-Bold /BroadwayBT-Regular /CaflischScript-Bold /CaflischScript-Regular /Caliban /CarminaBT-Bold /CarminaBT-BoldItalic /CarminaBT-Light /CarminaBT-LightItalic /CarminaBT-Medium /CarminaBT-MediumItalic /Carta /Caslon224ITCbyBT-Bold /Caslon224ITCbyBT-BoldItalic /Caslon224ITCbyBT-Book /Caslon224ITCbyBT-BookItalic /Caslon540BT-Italic /Caslon540BT-Roman /CaslonBT-Bold /CaslonBT-BoldItalic /CaslonOpenFace /CaslonTwoTwentyFour-Black /CaslonTwoTwentyFour-BlackIt /CaslonTwoTwentyFour-Bold /CaslonTwoTwentyFour-BoldIt /CaslonTwoTwentyFour-Book /CaslonTwoTwentyFour-BookIt /CaslonTwoTwentyFour-Medium /CaslonTwoTwentyFour-MediumIt /CastleT-Bold /CastleT-Book /Caxton-Bold /Caxton-BoldItalic /Caxton-Book /Caxton-BookItalic /CaxtonBT-Bold /CaxtonBT-BoldItalic /CaxtonBT-Book /CaxtonBT-BookItalic /Caxton-Light /Caxton-LightItalic /CelestiaAntiqua-Ornaments /Centennial-BlackItalicOsF /Centennial-BlackOsF /Centennial-BoldItalicOsF /Centennial-BoldOsF /Centennial-ItalicOsF /Centennial-LightItalicOsF /Centennial-LightSC /Centennial-RomanSC /Century-Bold /Century-BoldItalic /Century-Book /Century-BookItalic /CenturyExpandedBT-Bold /CenturyExpandedBT-BoldItalic /CenturyExpandedBT-Italic /CenturyExpandedBT-Roman /Century-HandtooledBold /Century-HandtooledBoldItalic /Century-Light /Century-LightItalic /CenturyOldStyle-Bold /CenturyOldStyle-Italic /CenturyOldStyle-Regular /CenturySchoolbookBT-Bold /CenturySchoolbookBT-BoldCond /CenturySchoolbookBT-BoldItalic /CenturySchoolbookBT-Italic /CenturySchoolbookBT-Roman /Century-Ultra /Century-UltraItalic /CharterBT-Black /CharterBT-BlackItalic /CharterBT-Bold /CharterBT-BoldItalic /CharterBT-Italic /CharterBT-Roman /CheltenhamBT-Bold /CheltenhamBT-BoldCondItalic /CheltenhamBT-BoldExtraCondensed /CheltenhamBT-BoldHeadline /CheltenhamBT-BoldItalic /CheltenhamBT-BoldItalicHeadline /CheltenhamBT-Italic /CheltenhamBT-Roman /Cheltenham-HandtooledBdIt /Cheltenham-HandtooledBold /CheltenhamITCbyBT-Bold /CheltenhamITCbyBT-BoldItalic /CheltenhamITCbyBT-Book /CheltenhamITCbyBT-BookItalic /Christiana-Bold /Christiana-BoldItalic /Christiana-Italic /Christiana-Medium /Christiana-MediumItalic /Christiana-Regular /Christiana-RegularExpert /Christiana-RegularSC /Clarendon /Clarendon-Bold /Clarendon-Light /ClassicalGaramondBT-Bold /ClassicalGaramondBT-BoldItalic /ClassicalGaramondBT-Italic /ClassicalGaramondBT-Roman /CMR10 /CMR8 /CMSY10 /CMSY8 /CMTI10 /CommonBullets /ConduitITC-Bold /ConduitITC-BoldItalic /ConduitITC-Light /ConduitITC-LightItalic /ConduitITC-Medium /ConduitITC-MediumItalic /CooperBlack /CooperBlack-Italic /CooperBT-Bold /CooperBT-BoldItalic /CooperBT-Light /CooperBT-LightItalic /CopperplateGothicBT-Bold /CopperplateGothicBT-BoldCond /CopperplateGothicBT-Heavy /CopperplateGothicBT-Roman /CopperplateGothicBT-RomanCond /Copperplate-ThirtyThreeBC /Copperplate-ThirtyTwoBC /Coronet-Regular /Courier /Courier-Bold /Courier-BoldOblique /Courier-Oblique /Critter /CS-Special-font /DellaRobbiaBT-Bold /DellaRobbiaBT-Roman /Della-RobbiaItalicBT /Della-RobbiaSCaps /Del-NormalSmallCaps /Delphin-IA /Delphin-IIA /Delta-Bold /Delta-BoldItalic /Delta-Book /Delta-BookItalic /Delta-Light /Delta-LightItalic /Delta-Medium /Delta-MediumItalic /Delta-Outline /DextorD /DextorOutD /DidotLH-OrnamentsOne /DidotLH-OrnamentsTwo /DINEngschrift /DINEngschrift-Alternate /DINMittelschrift /DINMittelschrift-Alternate /DINNeuzeitGrotesk-BoldCond /DINNeuzeitGrotesk-Light /Dom-CasItalic /DomCasual /DomCasual-Bold /Dom-CasualBT /Ehrhard-Italic /Ehrhard-Regular /EhrhardSemi-Italic /EhrhardtMT /EhrhardtMT-Italic /EhrhardtMT-SemiBold /EhrhardtMT-SemiBoldItalic /EhrharSemi /ELANGO-IB-A03 /ELANGO-IB-A75 /ELANGO-IB-A99 /ElectraLH-Bold /ElectraLH-BoldCursive /ElectraLH-Cursive /ElectraLH-Regular /ElGreco /EnglischeSchT-Bold /EnglischeSchT-Regu /ErasContour /ErasITCbyBT-Bold /ErasITCbyBT-Book /ErasITCbyBT-Demi /ErasITCbyBT-Light /ErasITCbyBT-Medium /ErasITCbyBT-Ultra /Euclid /Euclid-Bold /Euclid-BoldItalic /EuclidExtra /EuclidExtra-Bold /EuclidFraktur /EuclidFraktur-Bold /Euclid-Italic /EuclidMathOne /EuclidMathOne-Bold /EuclidMathTwo /EuclidMathTwo-Bold /EuclidSymbol /EuclidSymbol-Bold /EuclidSymbol-BoldItalic /EuclidSymbol-Italic /EUEX10 /EUFB10 /EUFB5 /EUFB7 /EUFM10 /EUFM5 /EUFM7 /EURB10 /EURB5 /EURB7 /EURM10 /EURM5 /EURM7 /EuropeanPi-Four /EuropeanPi-One /EuropeanPi-Three /EuropeanPi-Two /EuroSans-Bold /EuroSans-BoldItalic /EuroSans-Italic /EuroSans-Regular /EuroSerif-Bold /EuroSerif-BoldItalic /EuroSerif-Italic /EuroSerif-Regular /Eurostile /Eurostile-Bold /Eurostile-BoldCondensed /Eurostile-BoldExtendedTwo /Eurostile-BoldOblique /Eurostile-Condensed /Eurostile-Demi /Eurostile-DemiOblique /Eurostile-ExtendedTwo /EurostileLTStd-Demi /EurostileLTStd-DemiOblique /Eurostile-Oblique /EUSB10 /EUSB5 /EUSB7 /EUSM10 /EUSM5 /EUSM7 /ExPonto-Regular /FairfieldLH-Bold /FairfieldLH-BoldItalic /FairfieldLH-BoldSC /FairfieldLH-CaptionBold /FairfieldLH-CaptionHeavy /FairfieldLH-CaptionLight /FairfieldLH-CaptionMedium /FairfieldLH-Heavy /FairfieldLH-HeavyItalic /FairfieldLH-HeavySC /FairfieldLH-Light /FairfieldLH-LightItalic /FairfieldLH-LightSC /FairfieldLH-Medium /FairfieldLH-MediumItalic /FairfieldLH-MediumSC /FairfieldLH-SwBoldItalicOsF /FairfieldLH-SwHeavyItalicOsF /FairfieldLH-SwLightItalicOsF /FairfieldLH-SwMediumItalicOsF /Fences /Fenice-Bold /Fenice-BoldOblique /FeniceITCbyBT-Bold /FeniceITCbyBT-BoldItalic /FeniceITCbyBT-Regular /FeniceITCbyBT-RegularItalic /Fenice-Light /Fenice-LightOblique /Fenice-Regular /Fenice-RegularOblique /Fenice-Ultra /Fenice-UltraOblique /FlashD-Ligh /Flood /Folio-Bold /Folio-BoldCondensed /Folio-ExtraBold /Folio-Light /Folio-Medium /FontanaNDAaOsF /FontanaNDAaOsF-Italic /FontanaNDCcOsF-Semibold /FontanaNDCcOsF-SemiboldIta /FontanaNDEeOsF /FontanaNDEeOsF-Bold /FontanaNDEeOsF-BoldItalic /FontanaNDEeOsF-Light /FontanaNDEeOsF-Semibold /FormalScript421BT-Regular /Formata-Bold /Formata-MediumCondensed /ForteMT /FournierMT-Ornaments /FrakturBT-Regular /FrankfurterHigD /FranklinGothic-Book /FranklinGothic-BookItal /FranklinGothic-BookOblique /FranklinGothic-Condensed /FranklinGothic-Demi /FranklinGothic-DemiItal /FranklinGothic-DemiOblique /FranklinGothic-Heavy /FranklinGothic-HeavyItal /FranklinGothic-HeavyOblique /FranklinGothicITCbyBT-BookItal /FranklinGothicITCbyBT-Demi /FranklinGothicITCbyBT-DemiItal /FranklinGothicITCbyBT-Heavy /FranklinGothicITCbyBT-HeavyItal /FranklinGothic-Medium /FranklinGothic-MediumItal /FranklinGothic-Roman /Freeform721BT-Bold /Freeform721BT-BoldItalic /Freeform721BT-Italic /Freeform721BT-Roman /FreestyleScrD /FreestyleScript /Freestylescript /FrizQuadrataITCbyBT-Bold /FrizQuadrataITCbyBT-Roman /Frutiger-Black /Frutiger-BlackCn /Frutiger-BlackItalic /Frutiger-Bold /Frutiger-BoldCn /Frutiger-BoldItalic /Frutiger-Cn /Frutiger-ExtraBlackCn /Frutiger-Italic /Frutiger-Light /Frutiger-LightCn /Frutiger-LightItalic /Frutiger-Roman /Frutiger-UltraBlack /Futura /FuturaBlackBT-Regular /Futura-Bold /Futura-BoldOblique /Futura-Book /Futura-BookOblique /FuturaBT-Bold /FuturaBT-BoldCondensed /FuturaBT-BoldCondensedItalic /FuturaBT-BoldItalic /FuturaBT-Book /FuturaBT-BookItalic /FuturaBT-ExtraBlack /FuturaBT-ExtraBlackCondensed /FuturaBT-ExtraBlackCondItalic /FuturaBT-ExtraBlackItalic /FuturaBT-Heavy /FuturaBT-HeavyItalic /FuturaBT-Light /FuturaBT-LightCondensed /FuturaBT-LightItalic /FuturaBT-Medium /FuturaBT-MediumCondensed /FuturaBT-MediumItalic /Futura-CondensedLight /Futura-CondensedLightOblique /Futura-ExtraBold /Futura-ExtraBoldOblique /Futura-Heavy /Futura-HeavyOblique /Futura-Light /Futura-LightOblique /Futura-Oblique /Futura-Thin /Galliard-Black /Galliard-BlackItalic /Galliard-Bold /Galliard-BoldItalic /Galliard-Italic /GalliardITCbyBT-Bold /GalliardITCbyBT-BoldItalic /GalliardITCbyBT-Italic /GalliardITCbyBT-Roman /Galliard-Roman /Galliard-Ultra /Galliard-UltraItalic /Garamond-Antiqua /GaramondBE-Bold /GaramondBE-BoldExpert /GaramondBE-BoldOsF /GaramondBE-CnExpert /GaramondBE-Condensed /GaramondBE-CondensedSC /GaramondBE-Italic /GaramondBE-ItalicExpert /GaramondBE-ItalicOsF /GaramondBE-Medium /GaramondBE-MediumCn /GaramondBE-MediumCnExpert /GaramondBE-MediumCnOsF /GaramondBE-MediumExpert /GaramondBE-MediumItalic /GaramondBE-MediumItalicExpert /GaramondBE-MediumItalicOsF /GaramondBE-MediumSC /GaramondBE-Regular /GaramondBE-RegularExpert /GaramondBE-RegularSC /GaramondBE-SwashItalic /Garamond-Bold /Garamond-BoldCondensed /Garamond-BoldCondensedItalic /Garamond-BoldItalic /Garamond-Book /Garamond-BookCondensed /Garamond-BookCondensedItalic /Garamond-BookItalic /Garamond-Halbfett /Garamond-HandtooledBold /Garamond-HandtooledBoldItalic /GaramondITCbyBT-Bold /GaramondITCbyBT-BoldCondensed /GaramondITCbyBT-BoldCondItalic /GaramondITCbyBT-BoldItalic /GaramondITCbyBT-BoldNarrow /GaramondITCbyBT-BoldNarrowItal /GaramondITCbyBT-Book /GaramondITCbyBT-BookCondensed /GaramondITCbyBT-BookCondItalic /GaramondITCbyBT-BookItalic /GaramondITCbyBT-BookNarrow /GaramondITCbyBT-BookNarrowItal /GaramondITCbyBT-Light /GaramondITCbyBT-LightCondensed /GaramondITCbyBT-LightCondItalic /GaramondITCbyBT-LightItalic /GaramondITCbyBT-LightNarrow /GaramondITCbyBT-LightNarrowItal /GaramondITCbyBT-Ultra /GaramondITCbyBT-UltraCondensed /GaramondITCbyBT-UltraCondItalic /GaramondITCbyBT-UltraItalic /Garamond-Kursiv /Garamond-KursivHalbfett /Garamond-Light /Garamond-LightCondensed /Garamond-LightCondensedItalic /Garamond-LightItalic /GaramondNo4CyrTCY-Ligh /GaramondNo4CyrTCY-LighItal /GaramondThree /GaramondThree-Bold /GaramondThree-BoldItalic /GaramondThree-BoldItalicOsF /GaramondThree-BoldSC /GaramondThree-Italic /GaramondThree-ItalicOsF /GaramondThree-SC /GaramondThreeSMSIISpl-Italic /GaramondThreeSMSitalicSpl-Italic /GaramondThreeSMSspl /GaramondThreespl /GaramondThreeSpl-Bold /GaramondThreeSpl-Italic /Garamond-Ultra /Garamond-UltraCondensed /Garamond-UltraCondensedItalic /Garamond-UltraItalic /GarthGraphic /GarthGraphic-Black /GarthGraphic-Bold /GarthGraphic-BoldCondensed /GarthGraphic-BoldItalic /GarthGraphic-Condensed /GarthGraphic-ExtraBold /GarthGraphic-Italic /Geometric231BT-HeavyC /GeometricSlab712BT-BoldA /GeometricSlab712BT-ExtraBoldA /GeometricSlab712BT-LightA /GeometricSlab712BT-LightItalicA /GeometricSlab712BT-MediumA /GeometricSlab712BT-MediumItalA /Giddyup /Giddyup-Thangs /GillSans /GillSans-Bold /GillSans-BoldCondensed /GillSans-BoldExtraCondensed /GillSans-BoldItalic /GillSans-Condensed /GillSans-ExtraBold /GillSans-ExtraBoldDisplay /GillSans-Italic /GillSans-Light /GillSans-LightItalic /GillSans-LightShadowed /GillSans-Shadowed /GillSans-UltraBold /GillSans-UltraBoldCondensed /Gill-Special /Giovanni-Bold /Giovanni-BoldItalic /Giovanni-Book /Giovanni-BookItalic /Glypha /Glypha-Bold /Glypha-BoldOblique /Glypha-Oblique /Gothic-Thirteen /Goudy /Goudy-Bold /Goudy-BoldItalic /GoudyCatalogueBT-Regular /Goudy-ExtraBold /GoudyHandtooledBT-Regular /GoudyHeavyfaceBT-Regular /GoudyHeavyfaceBT-RegularCond /Goudy-Italic /GoudyOldStyleBT-Bold /GoudyOldStyleBT-BoldItalic /GoudyOldStyleBT-ExtraBold /GoudyOldStyleBT-Italic /GoudyOldStyleBT-Roman /GoudySans-Black /GoudySans-BlackItalic /GoudySans-Bold /GoudySans-BoldItalic /GoudySans-Book /GoudySans-BookItalic /GoudySansITCbyBT-Black /GoudySansITCbyBT-BlackItalic /GoudySansITCbyBT-Bold /GoudySansITCbyBT-BoldItalic /GoudySansITCbyBT-Light /GoudySansITCbyBT-LightItalic /GoudySansITCbyBT-Medium /GoudySansITCbyBT-MediumItalic /GoudySans-Medium /GoudySans-MediumItalic /Granjon /Granjon-Bold /Granjon-BoldOsF /Granjon-Italic /Granjon-ItalicOsF /Granjon-SC /GreymantleMVB-Ornaments /Helvetica /Helvetica-Black /Helvetica-BlackOblique /Helvetica-Black-SemiBold /Helvetica-Bold /Helvetica-BoldOblique /Helvetica-Compressed /Helvetica-Condensed /Helvetica-Condensed-Black /Helvetica-Condensed-BlackObl /Helvetica-Condensed-Bold /Helvetica-Condensed-BoldObl /Helvetica-Condensed-Light /Helvetica-Condensed-Light-Light /Helvetica-Condensed-LightObl /Helvetica-Condensed-Oblique /Helvetica-Condensed-Thin /Helvetica-ExtraCompressed /Helvetica-Fraction /Helvetica-FractionBold /HelveticaInserat-Roman /HelveticaInserat-Roman-SemiBold /Helvetica-Light /Helvetica-LightOblique /Helvetica-Narrow /Helvetica-Narrow-Bold /Helvetica-Narrow-BoldOblique /Helvetica-Narrow-Oblique /HelveticaNeue-Black /HelveticaNeue-BlackCond /HelveticaNeue-BlackCondObl /HelveticaNeue-BlackExt /HelveticaNeue-BlackExtObl /HelveticaNeue-BlackItalic /HelveticaNeue-Bold /HelveticaNeue-BoldCond /HelveticaNeue-BoldCondObl /HelveticaNeue-BoldExt /HelveticaNeue-BoldExtObl /HelveticaNeue-BoldItalic /HelveticaNeue-Condensed /HelveticaNeue-CondensedObl /HelveticaNeue-ExtBlackCond /HelveticaNeue-ExtBlackCondObl /HelveticaNeue-Extended /HelveticaNeue-ExtendedObl /HelveticaNeue-Heavy /HelveticaNeue-HeavyCond /HelveticaNeue-HeavyCondObl /HelveticaNeue-HeavyExt /HelveticaNeue-HeavyExtObl /HelveticaNeue-HeavyItalic /HelveticaNeue-Italic /HelveticaNeue-Light /HelveticaNeue-LightCond /HelveticaNeue-LightCondObl /HelveticaNeue-LightExt /HelveticaNeue-LightExtObl /HelveticaNeue-LightItalic /HelveticaNeueLTStd-Md /HelveticaNeueLTStd-MdIt /HelveticaNeue-Medium /HelveticaNeue-MediumCond /HelveticaNeue-MediumCondObl /HelveticaNeue-MediumExt /HelveticaNeue-MediumExtObl /HelveticaNeue-MediumItalic /HelveticaNeue-Roman /HelveticaNeue-Thin /HelveticaNeue-ThinCond /HelveticaNeue-ThinCondObl /HelveticaNeue-ThinItalic /HelveticaNeue-UltraLigCond /HelveticaNeue-UltraLigCondObl /HelveticaNeue-UltraLigExt /HelveticaNeue-UltraLigExtObl /HelveticaNeue-UltraLight /HelveticaNeue-UltraLightItal /Helvetica-Oblique /Helvetica-UltraCompressed /HelvExtCompressed /HelvLight /HelvUltCompressed /Humanist521BT-Bold /Humanist521BT-BoldCondensed /Humanist521BT-BoldItalic /Humanist521BT-ExtraBold /Humanist521BT-Italic /Humanist521BT-Light /Humanist521BT-LightItalic /Humanist521BT-Roman /Humanist521BT-RomanCondensed /Humanist521BT-UltraBold /Humanist521BT-XtraBoldCondensed /Humanist531BT-BlackA /Humanist531BT-BoldA /Humanist531BT-RomanA /Humanist531BT-UltraBlackA /Humanist777BT-BlackB /Humanist777BT-BlackCondensedB /Humanist777BT-BlackItalicB /Humanist777BT-BoldB /Humanist777BT-BoldCondensedB /Humanist777BT-BoldItalicB /Humanist777BT-ExtraBlackB /Humanist777BT-ExtraBlackCondB /Humanist777BT-ItalicB /Humanist777BT-LightB /Humanist777BT-LightCondensedB /Humanist777BT-LightItalicB /Humanist777BT-RomanB /Humanist777BT-RomanCondensedB /Humanist970BT-BoldC /Humanist970BT-RomanC /HumanistSlabserif712BT-Black /HumanistSlabserif712BT-Bold /HumanistSlabserif712BT-Italic /HumanistSlabserif712BT-Roman /ICMEX10 /ICMMI8 /ICMSY8 /ICMTT8 /Iglesia-Light /ILASY8 /ILCMSS8 /ILCMSSB8 /ILCMSSI8 /Imago-Book /Imago-BookItalic /Imago-ExtraBold /Imago-ExtraBoldItalic /Imago-Light /Imago-LightItalic /Imago-Medium /Imago-MediumItalic /Industria-Inline /Industria-InlineA /Industria-Solid /Industria-SolidA /Insignia /Insignia-A /IPAExtras /IPAHighLow /IPAKiel /IPAKielSeven /IPAsans /ITCGaramondMM /ITCGaramondMM-It /JAKEOpti-Regular /JansonText-Bold /JansonText-BoldItalic /JansonText-Italic /JansonText-Roman /JansonText-RomanSC /JoannaMT /JoannaMT-Bold /JoannaMT-BoldItalic /JoannaMT-Italic /Juniper /KabelITCbyBT-Book /KabelITCbyBT-Demi /KabelITCbyBT-Medium /KabelITCbyBT-Ultra /Kaufmann /Kaufmann-Bold /KeplMM-Or2 /KisBT-Italic /KisBT-Roman /KlangMT /Kuenstler480BT-Black /Kuenstler480BT-Bold /Kuenstler480BT-BoldItalic /Kuenstler480BT-Italic /Kuenstler480BT-Roman /KunstlerschreibschD-Bold /KunstlerschreibschD-Medi /Lapidary333BT-Black /Lapidary333BT-Bold /Lapidary333BT-BoldItalic /Lapidary333BT-Italic /Lapidary333BT-Roman /LASY10 /LASY5 /LASY6 /LASY7 /LASY8 /LASY9 /LASYB10 /LatinMT-Condensed /LCIRCLE10 /LCIRCLEW10 /LCMSS8 /LCMSSB8 /LCMSSI8 /LDecorationPi-One /LDecorationPi-Two /Leawood-Black /Leawood-BlackItalic /Leawood-Bold /Leawood-BoldItalic /Leawood-Book /Leawood-BookItalic /Leawood-Medium /Leawood-MediumItalic /LegacySans-Bold /LegacySans-BoldItalic /LegacySans-Book /LegacySans-BookItalic /LegacySans-Medium /LegacySans-MediumItalic /LegacySans-Ultra /LegacySerif-Bold /LegacySerif-BoldItalic /LegacySerif-Book /LegacySerif-BookItalic /LegacySerif-Medium /LegacySerif-MediumItalic /LegacySerif-Ultra /LetterGothic /LetterGothic-Bold /LetterGothic-BoldSlanted /LetterGothic-Slanted /Life-Bold /Life-Italic /Life-Roman /LINE10 /LINEW10 /Linotext /Lithos-Black /LithosBold /Lithos-Bold /Lithos-Regular /LOGO10 /LOGO8 /LOGO9 /LOGOBF10 /LOGOSL10 /LOMD-Normal /LubalinGraph-Book /LubalinGraph-BookOblique /LubalinGraph-Demi /LubalinGraph-DemiOblique /LucidaHandwritingItalic /LucidaMath-Symbol /LucidaSansTypewriter /LucidaSansTypewriter-Bd /LucidaSansTypewriter-BdObl /LucidaSansTypewriter-Obl /LucidaTypewriter /LucidaTypewriter-Bold /LucidaTypewriter-BoldObl /LucidaTypewriter-Obl /LydianBT-Bold /LydianBT-BoldItalic /LydianBT-Italic /LydianBT-Roman /LydianCursiveBT-Regular /Machine /Machine-Bold /Marigold /MathematicalPi-Five /MathematicalPi-Four /MathematicalPi-One /MathematicalPi-Six /MathematicalPi-Three /MathematicalPi-Two /MatrixScriptBold /MatrixScriptBoldLin /MatrixScriptBook /MatrixScriptBookLin /MatrixScriptRegular /MatrixScriptRegularLin /Melior /Melior-Bold /Melior-BoldItalic /Melior-Italic /MercuriusCT-Black /MercuriusCT-BlackItalic /MercuriusCT-Light /MercuriusCT-LightItalic /MercuriusCT-Medium /MercuriusCT-MediumItalic /MercuriusMT-BoldScript /Meridien-Bold /Meridien-BoldItalic /Meridien-Italic /Meridien-Medium /Meridien-MediumItalic /Meridien-Roman /Minion-Black /Minion-Bold /Minion-BoldCondensed /Minion-BoldCondensedItalic /Minion-BoldItalic /Minion-Condensed /Minion-CondensedItalic /Minion-DisplayItalic /Minion-DisplayRegular /MinionExp-Italic /MinionExp-Semibold /MinionExp-SemiboldItalic /Minion-Italic /Minion-Ornaments /Minion-Regular /Minion-Semibold /Minion-SemiboldItalic /MonaLisa-Recut /MrsEavesAllPetiteCaps /MrsEavesAllSmallCaps /MrsEavesBold /MrsEavesFractions /MrsEavesItalic /MrsEavesPetiteCaps /MrsEavesRoman /MrsEavesRomanLining /MrsEavesSmallCaps /MSAM10 /MSAM10A /MSAM5 /MSAM6 /MSAM7 /MSAM8 /MSAM9 /MSBM10 /MSBM10A /MSBM5 /MSBM6 /MSBM7 /MSBM8 /MSBM9 /MTEX /MTEXB /MTEXH /MTGU /MTGUB /MTMI /MTMIB /MTMIH /MTMS /MTMSB /MTMUB /MTMUH /MTSY /MTSYB /MTSYH /MTSYN /MusicalSymbols-Normal /Myriad-Bold /Myriad-BoldItalic /Myriad-CnBold /Myriad-CnBoldItalic /Myriad-CnItalic /Myriad-CnSemibold /Myriad-CnSemiboldItalic /Myriad-Condensed /Myriad-Italic /MyriadMM /MyriadMM-It /Myriad-Roman /Myriad-Sketch /Myriad-Tilt /NeuzeitS-Book /NeuzeitS-BookHeavy /NewBaskerville-Bold /NewBaskerville-BoldItalic /NewBaskerville-Italic /NewBaskervilleITCbyBT-Bold /NewBaskervilleITCbyBT-BoldItal /NewBaskervilleITCbyBT-Italic /NewBaskervilleITCbyBT-Roman /NewBaskerville-Roman /NewCaledonia /NewCaledonia-Black /NewCaledonia-BlackItalic /NewCaledonia-Bold /NewCaledonia-BoldItalic /NewCaledonia-BoldItalicOsF /NewCaledonia-BoldSC /NewCaledonia-Italic /NewCaledonia-ItalicOsF /NewCaledonia-SC /NewCaledonia-SemiBold /NewCaledonia-SemiBoldItalic /NewCenturySchlbk-Bold /NewCenturySchlbk-BoldItalic /NewCenturySchlbk-Italic /NewCenturySchlbk-Roman /NewsGothic /NewsGothic-Bold /NewsGothic-BoldOblique /NewsGothicBT-Bold /NewsGothicBT-BoldCondensed /NewsGothicBT-BoldCondItalic /NewsGothicBT-BoldExtraCondensed /NewsGothicBT-BoldItalic /NewsGothicBT-Demi /NewsGothicBT-DemiItalic /NewsGothicBT-ExtraCondensed /NewsGothicBT-Italic /NewsGothicBT-ItalicCondensed /NewsGothicBT-Light /NewsGothicBT-LightItalic /NewsGothicBT-Roman /NewsGothicBT-RomanCondensed /NewsGothic-Oblique /New-Symbol /NovareseITCbyBT-Bold /NovareseITCbyBT-BoldItalic /NovareseITCbyBT-Book /NovareseITCbyBT-BookItalic /Nueva-BoldExtended /Nueva-Roman /NuptialScript /OceanSansMM /OceanSansMM-It /OfficinaSans-Bold /OfficinaSans-BoldItalic /OfficinaSans-Book /OfficinaSans-BookItalic /OfficinaSerif-Bold /OfficinaSerif-BoldItalic /OfficinaSerif-Book /OfficinaSerif-BookItalic /OnyxMT /Optima /Optima-Bold /Optima-BoldItalic /Optima-BoldOblique /Optima-ExtraBlack /Optima-ExtraBlackItalic /Optima-Italic /Optima-Oblique /OSPIRE-Plain /OttaIA /Otta-wa /Ottawa-BoldA /OttawaPSMT /Oxford /Palatino-Bold /Palatino-BoldItalic /Palatino-Italic /Palatino-Roman /Parisian /Perpetua /Perpetua-Bold /Perpetua-BoldItalic /Perpetua-Italic /PhotinaMT /PhotinaMT-Bold /PhotinaMT-BoldItalic /PhotinaMT-Italic /PhotinaMT-SemiBold /PhotinaMT-SemiBoldItalic /PhotinaMT-UltraBold /PhotinaMT-UltraBoldItalic /Plantin /Plantin-Bold /Plantin-BoldItalic /Plantin-Italic /Plantin-Light /Plantin-LightItalic /Plantin-Semibold /Plantin-SemiboldItalic /Poetica-ChanceryI /Poetica-SuppLowercaseEndI /PopplLaudatio-Italic /PopplLaudatio-Medium /PopplLaudatio-MediumItalic /PopplLaudatio-Regular /ProseAntique-Bold /ProseAntique-Normal /QuaySansEF-Black /QuaySansEF-BlackItalic /QuaySansEF-Book /QuaySansEF-BookItalic /QuaySansEF-Medium /QuaySansEF-MediumItalic /Quorum-Black /Quorum-Bold /Quorum-Book /Quorum-Light /Quorum-Medium /Raleigh /Raleigh-Bold /Raleigh-DemiBold /Raleigh-Medium /Revival565BT-Bold /Revival565BT-BoldItalic /Revival565BT-Italic /Revival565BT-Roman /Ribbon131BT-Bold /Ribbon131BT-Regular /RMTMI /Rockwell /Rockwell-Bold /Rockwell-BoldItalic /Rockwell-Italic /Rockwell-Light /Rockwell-LightItalic /RotisSansSerif /RotisSansSerif-Bold /RotisSansSerif-ExtraBold /RotisSansSerif-Italic /RotisSansSerif-Light /RotisSansSerif-LightItalic /RotisSemiSans /RotisSemiSans-Bold /RotisSemiSans-ExtraBold /RotisSemiSans-Italic /RotisSemiSans-Light /RotisSemiSans-LightItalic /RotisSemiSerif /RotisSemiSerif-Bold /RotisSerif /RotisSerif-Bold /RotisSerif-Italic /RunicMT-Condensed /Sabon-Bold /Sabon-BoldItalic /Sabon-Italic /Sabon-Roman /SackersGothicLight /SackersGothicLightAlt /SackersItalianScript /SackersItalianScriptAlt /Sam /Sanvito-Light /SanvitoMM /Sanvito-Roman /Semitica /Semitica-Italic /SIVAMATH /Siva-Special /SMS-SPELA /Souvenir-Demi /Souvenir-DemiItalic /SouvenirITCbyBT-Demi /SouvenirITCbyBT-DemiItalic /SouvenirITCbyBT-Light /SouvenirITCbyBT-LightItalic /Souvenir-Light /Souvenir-LightItalic /SpecialAA /Special-Gali /Sp-Sym /StempelGaramond-Bold /StempelGaramond-BoldItalic /StempelGaramond-Italic /StempelGaramond-Roman /StoneSans /StoneSans-Bold /StoneSans-BoldItalic /StoneSans-Italic /StoneSans-PhoneticAlternate /StoneSans-PhoneticIPA /StoneSans-Semibold /StoneSans-SemiboldItalic /StoneSerif /StoneSerif-Italic /StoneSerif-PhoneticAlternate /StoneSerif-PhoneticIPA /StoneSerif-Semibold /StoneSerif-SemiboldItalic /Swiss721BT-Black /Swiss721BT-BlackCondensed /Swiss721BT-BlackCondensedItalic /Swiss721BT-BlackExtended /Swiss721BT-BlackItalic /Swiss721BT-BlackOutline /Swiss721BT-BlackRounded /Swiss721BT-Bold /Swiss721BT-BoldCondensed /Swiss721BT-BoldCondensedItalic /Swiss721BT-BoldCondensedOutline /Swiss721BT-BoldExtended /Swiss721BT-BoldItalic /Swiss721BT-BoldOutline /Swiss721BT-BoldRounded /Swiss721BT-Heavy /Swiss721BT-HeavyItalic /Swiss721BT-Italic /Swiss721BT-ItalicCondensed /Swiss721BT-Light /Swiss721BT-LightCondensed /Swiss721BT-LightCondensedItalic /Swiss721BT-LightExtended /Swiss721BT-LightItalic /Swiss721BT-Medium /Swiss721BT-MediumItalic /Swiss721BT-Roman /Swiss721BT-RomanCondensed /Swiss721BT-RomanExtended /Swiss721BT-Thin /Swiss721BT-ThinItalic /Swiss921BT-RegularA /Symbol /Syntax-Black /Syntax-Bold /Syntax-Italic /Syntax-Roman /Syntax-UltraBlack /Tekton /Times-Bold /Times-BoldA /Times-BoldItalic /Times-BoldOblique /Times-Italic /Times-NewRoman /Times-NewRomanBold /TimesNewRomanPS-BoldItalicMT /TimesNewRomanPS-ItalicMT /TimesNewRomanPSMT /Times-Oblique /Times-PhoneticAlternate /Times-PhoneticIPA /Times-Roman /Times-RomanSmallCaps /Times-Sc /Times-SCB /Times-special /TimesTenGreekP-Upright /TradeGothic /TradeGothic-Bold /TradeGothic-BoldCondTwenty /TradeGothic-BoldCondTwentyObl /TradeGothic-BoldOblique /TradeGothic-BoldTwo /TradeGothic-BoldTwoOblique /TradeGothic-CondEighteen /TradeGothic-CondEighteenObl /TradeGothicLH-BoldExtended /TradeGothicLH-Extended /TradeGothic-Light /TradeGothic-LightOblique /TradeGothic-Oblique /Trajan-Bold /TrajanPro-Bold /TrajanPro-Regular /Trajan-Regular /Transitional521BT-BoldA /Transitional521BT-CursiveA /Transitional521BT-RomanA /Transitional551BT-MediumB /Transitional551BT-MediumItalicB /Univers /Universal-GreekwithMathPi /Universal-NewswithCommPi /Univers-BlackExt /Univers-BlackExtObl /Univers-Bold /Univers-BoldExt /Univers-BoldExtObl /Univers-BoldOblique /Univers-Condensed /Univers-CondensedBold /Univers-CondensedBoldOblique /Univers-CondensedOblique /Univers-Extended /Univers-ExtendedObl /Univers-ExtraBlackExt /Univers-ExtraBlackExtObl /Univers-Light /Univers-LightOblique /UniversLTStd-Black /UniversLTStd-BlackObl /Univers-Oblique /Utopia-Black /Utopia-BlackOsF /Utopia-Bold /Utopia-BoldItalic /Utopia-Italic /Utopia-Ornaments /Utopia-Regular /Utopia-Semibold /Utopia-SemiboldItalic /VAGRounded-Black /VAGRounded-Bold /VAGRounded-Light /VAGRounded-Thin /Viva-BoldExtraExtended /Viva-Regular /Weidemann-Black /Weidemann-BlackItalic /Weidemann-Bold /Weidemann-BoldItalic /Weidemann-Book /Weidemann-BookItalic /Weidemann-Medium /Weidemann-MediumItalic /WindsorBT-Elongated /WindsorBT-Light /WindsorBT-LightCondensed /WindsorBT-Roman /Wingdings-Regular /WNCYB10 /WNCYI10 /WNCYR10 /WNCYSC10 /WNCYSS10 /WoodtypeOrnaments-One /WoodtypeOrnaments-Two /ZapfCalligraphic801BT-Bold /ZapfCalligraphic801BT-BoldItal /ZapfCalligraphic801BT-Italic /ZapfCalligraphic801BT-Roman /ZapfChanceryITCbyBT-Bold /ZapfChanceryITCbyBT-Demi /ZapfChanceryITCbyBT-Medium /ZapfChanceryITCbyBT-MediumItal /ZapfChancery-MediumItalic /ZapfDingbats /ZapfDingbatsITCbyBT-Regular /ZapfElliptical711BT-Bold /ZapfElliptical711BT-BoldItalic /ZapfElliptical711BT-Italic /ZapfElliptical711BT-Roman /ZapfHumanist601BT-Bold /ZapfHumanist601BT-BoldItalic /ZapfHumanist601BT-Demi /ZapfHumanist601BT-DemiItalic /ZapfHumanist601BT-Italic /ZapfHumanist601BT-Roman /ZapfHumanist601BT-Ultra /ZapfHumanist601BT-UltraItalic /ZurichBT-Black /ZurichBT-BlackExtended /ZurichBT-BlackItalic /ZurichBT-Bold /ZurichBT-BoldCondensed /ZurichBT-BoldCondensedItalic /ZurichBT-BoldExtended /ZurichBT-BoldExtraCondensed /ZurichBT-BoldItalic /ZurichBT-ExtraBlack /ZurichBT-ExtraCondensed /ZurichBT-Italic /ZurichBT-ItalicCondensed /ZurichBT-Light /ZurichBT-LightCondensed /ZurichBT-LightCondensedItalic /ZurichBT-LightExtraCondensed /ZurichBT-LightItalic /ZurichBT-Roman /ZurichBT-RomanCondensed /ZurichBT-RomanExtended /ZurichBT-UltraBlackExtended ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 150 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /ColorImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 150 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /GrayImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox false /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (U.S. Web Coated \050SWOP\051 v2) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /Unknown /CreateJDFFile false /SyntheticBoldness 1.000000 /Description << /FRA <FEFF004f007000740069006f006e00730020007000650072006d0065007400740061006e007400200064006500200063007200e900650072002000640065007300200064006f00630075006d0065006e00740073002000500044004600200064006f007400e900730020006400270075006e00650020007200e90073006f006c007500740069006f006e002000e9006c0065007600e9006500200070006f0075007200200075006e00650020007100750061006c0069007400e90020006400270069006d007000720065007300730069006f006e00200061006d00e9006c0069006f007200e90065002e00200049006c002000650073007400200070006f0073007300690062006c0065002000640027006f00750076007200690072002000630065007300200064006f00630075006d0065006e007400730020005000440046002000640061006e00730020004100630072006f0062006100740020006500740020005200650061006400650072002c002000760065007200730069006f006e002000200035002e00300020006f007500200075006c007400e9007200690065007500720065002e> /JPN <FEFF3053306e8a2d5b9a306f30019ad889e350cf5ea6753b50cf3092542b308000200050004400460020658766f830924f5c62103059308b3068304d306b4f7f75283057307e30593002537052376642306e753b8cea3092670059279650306b4fdd306430533068304c3067304d307e305930023053306e8a2d5b9a30674f5c62103057305f00200050004400460020658766f8306f0020004100630072006f0062006100740020304a30883073002000520065006100640065007200200035002e003000204ee5964d30678868793a3067304d307e30593002> /DEU <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> /PTB <FEFF005500740069006c0069007a006500200065007300740061007300200063006f006e00660069006700750072006100e700f5006500730020007000610072006100200063007200690061007200200064006f00630075006d0065006e0074006f0073002000500044004600200063006f006d00200075006d00610020007200650073006f006c007500e700e3006f00200064006500200069006d006100670065006d0020007300750070006500720069006f0072002000700061007200610020006f006200740065007200200075006d00610020007100750061006c0069006400610064006500200064006500200069006d0070007200650073007300e3006f0020006d0065006c0068006f0072002e0020004f007300200064006f00630075006d0065006e0074006f0073002000500044004600200070006f00640065006d0020007300650072002000610062006500720074006f007300200063006f006d0020006f0020004100630072006f006200610074002c002000520065006100640065007200200035002e0030002000650020007300750070006500720069006f0072002e> /DAN <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> /NLD <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> /ESP <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> /SUO <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> /ITA <FEFF00550073006100720065002000710075006500730074006500200069006d0070006f007300740061007a0069006f006e00690020007000650072002000630072006500610072006500200064006f00630075006d0065006e00740069002000500044004600200063006f006e00200075006e00610020007200690073006f006c0075007a0069006f006e00650020006d0061006700670069006f00720065002000700065007200200075006e00610020007100750061006c0069007400e00020006400690020007300740061006d007000610020006d00690067006c0069006f00720065002e0020004900200064006f00630075006d0065006e00740069002000500044004600200070006f00730073006f006e006f0020006500730073006500720065002000610070006500720074006900200063006f006e0020004100630072006f00620061007400200065002000520065006100640065007200200035002e003000200065002000760065007200730069006f006e006900200073007500630063006500730073006900760065002e> /NOR <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> /SVE <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> /ENU (Use these settings for creating PDF files for submission to The Sheridan Press. These settings configured for Acrobat v6.0 08/06/03.) >> >> setdistillerparams << /HWResolution [2400 2400] /PageSize [612.000 792.000] >> setpagedevice

Ethics In Criminal Justice Research

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

 

 

/

Printed by: Jeguiris-Burgos@berkeleycollege.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher’s prior permission. Violators will be prosecuted.

Crime Scene Investigation

CSI EXAM CHAPTERS 1 THROUGH 4

1. True or False? The analysis and evaluation of physical evidence is “flawless” when compared to testimonial evidence.

2. Fill in the blank. The interpretive value of evidence is a function of and the item’s surroundings.

3. Multiple Choice. A stove burner that is on in a crime scene is an example of:

a. A predictable effect. b. A functional detail. c. A relational detail. d. None of the above.

4. Multiple Choice. The three scene integrity issues are:

a. Addition, destruction and loss of material in the scene. b. Addition, destruction and movement of material in the scene. c. Addition, creation of post incident artifacts and corruption of material in the scene. d. None of the above.

5. True of False. The only agenda a crime scene investigator has is the desire to determine the truth regarding what transpired in the scene and who was involved.

6. True or False. An example of an unpredictable effect is the movement of a weapon in the crime scene by a first responder, which remains unreported and unrecognized by the crime scene team.

7. True or False. Flexibility, as an ingredient of good crime scene examination means the ability to confront odd or unique situations with novel ideas or to handle contradictory and competing needs at the scene without reverting to mere arbitrary compliance with a checklist.

8. Multiple Choice. The forensic linkage triangle considers evidence in relation to which of the following?

a. Suspect(s), victim(s) and motive(s). b. Suspect(s), victim(s) and scene(s). c. Scene(s), opportunity and motive(s). d. None of the above.

 

 

9. True or False? Class characteristics are effective for eliminating an item for inclusion in a group, reducing the necessity of conducting further time or resource consuming examinations.

10. Multiple Choice. Of the available methods for DNA analysis, which of the following is the best for individualization in forensic analysis?

a. RFLP. b. PCR. c. STR. d. mDNA.

11. True of False. The 4R rule for glass fragment examination states that ridge lines are at right angles to the rear of radial fractures.

12. True or False. Cross contamination of serological evidence is never an issue when handling a single item of stained clothing.

13. Multiple Choice. Forensic analysis of a pistol casing includes evaluating:

a. Ejector marks. b. Firing pin marks. c. Breech block marks. d. All of the above. e. A and B.

14. True or False. Fingerprints differ in every individual except identical twins.

15. True or False. Mitochondrial DNA (mDNA) is currently used as a class characteristic that allows a DNA source to be included or excluded in a blood line on the maternal side.

16. True or False. Typical impression evidence includes shoe and tire marks, but also includes evidence such as tool marks.

17. True or False? The actions of the initial responding officer have little overall impact on the successful resolution of an investigation.

18. Multiple Choice. At any critical incident the initial responding officer seeks to:

 

 

a. Identify perpetrators and bring the site under control. b. Bring the site under control and coordinate resources. c. Bring the site under control and release the scene to supervisors. d. None of the above.

19. True of False. Lifesaving is attended to after ensuring the scene is secure and evidence is preserved.

20. True or False. During the approach to the scene the initial responding officer must consider a variety of threats including: man-made hazards, natural hazards and possible on-scene suspects.

21. True of False. It is important to the investigation that Emergency Medical Services (EMS) personnel be interviewed as soon as possible to determine who was there and what action they took in the scene.

22. True or False. In order to preserve fragile evidence, officers generally have the authority to prevent EMS from entering a scene.

23. Multiple Choice. The initial responding officer considers which of the following when defining where to place the initial perimeter:

a. Primary focal points, secondary scenes and body dump sites. b. Primary focal points, avenues of entry and exit and secondary scenes. c. Primary focal points, avenues of entry and exit and the presence or absence of a crowd. d. None of the above.

24. True or False. Controlling the scene perimeter is easily accomplished by mere presence and vocal commands.

25. Multiple Choice. The five objectives of the initial responder at any crime scene include:

a. Document initial information, provide for emergency care, secure and control the scene, provide an initial statement to the media and release the scene to appropriate authorities.

b. Document initial information, provide for emergency care, secure and control the scene, provide an initial statement to the media and conduct a preliminary scene examination.

 

 

c. Document initial information, provide for emergency care, secure and control the scene, not become a casualty and release the scene to appropriate authorities.

d. Document initial information, provide for emergency care, secure and control the scene, conduct a preliminary scene examination and release the scene to appropriate authorities.

26. True of False. Controlling the scene and everyone in it requires cordoning off a section of the immediate scene and having witnesses wait there.

27. True or False? It is the responsibility of the crime scene technician to collect the evidence without altering the crime scene.

28. Multiple Choice. The six basic activities the crime scene technician engages in at the scene are:

a. Assessing, documenting, sketching, searching, collecting and analyzing. b. Assessing, observing, documenting, searching, collecting and analyzing. c. Assessing, sketching, photographing, searching, collecting and analyzing. d. None of the above.

29. True of False. The order or sequence in which processing is completed has no impact on the resulting investigation.

30. True or False. Documenting the scene (which includes photographing, mapping and sketching) is an intrusive act in and of itself, requiring a specific order of activity.

31. True of False. There is only one right way to process the crime scene.

32. True or False. Assessing the scene in the first step taken in the processing methodology and a continuous step.

 

 

33. Multiple Choice. The concept of “going back” in the processing methodology means:

a. Returning to the office to obtain additional resources when required. b. Returning to an earlier step, in order to bring a newly discovered item of evidence to the same level of processing as other items. c. Rechecking areas that have been searched, to ensure no items were overlooked. d. None of the above.

34. True or False. The activity of searching the scene is accomplished in several stages. Initial searches are visual, while later searches are physical.

35. Multiple Choice. During initial observations, the crime scene technician accomplishes an initial scan of the scene, this includes:

a. Looking for victims, central theme items, secondary scenes, avenues of entry or exit and fragile evidence. b. Looking for victims, central theme items and avenues of entry or exit. c. Looking for victims, suspects, secondary scenes and central theme items. d. Looking for victims, suspects, central theme items and fragile evidence.

36. True of False. The statement “The call you got isn’t the call you get” simply means that the initial information provided to the police is often incorrect.

37. In class, we learned about the famous case in the UK with the investigation of the murder of two victims – Linda Mann (Age 15) in 1983 and Dawn Ashworth (Age 15) in 1986. In this case, DNA was first used to:

a. Exonerate the wrongfully accused

b. Identify the offender

c. Eliminate thousands of potential suspects

d. All of the above

38. In the above case, what is the name of the scientist who developed the method to be able to utilize DNA for identification of an individual by comparing their DNA profiles?

a. Sir Alec Baldwin

b. Sir Alex Jefferson

c. Sir Alec Jeffreys

d. Sir Adam George

 

 

39. In class, we watched a documentary on the investigation of the murders of Nicole Brown Simpson and Ron Goldman, and the trial of OJ Simpson. Describe one criticism that was made by the defense concerning the collection and storage of physical evidence.

40. In the documentary on the investigation of the murder of Jon Benet Ramsey, we learned that John Mark Carr confessed and was responsible for her murder because his DNA matched DNA collected from the clothing of the victim. True or False

41. In the Jon Benet Ramsey case, they developed a DNA profile from what item of physical evidence.

a. The suitcase under the window in basement

b. The broken glass of the window in basement

c. The victim’s hands/fingernails

d. The railing of the stairway

e. None of the Above

42. This was one of the first major cases in which this type of DNA was collected in 2008 when items of evidence were re-examined:

a. Mitochondrial DNA

b. RFLP

c. Touch DNA

d. Paternal DNA

43. If CSIs had followed a crime scene methodology like that discussed in your book, Jon Benet Ramsey’s body would have been discovered:

a. On December 25 by the parents

b. The next day when they went back to continue processing the scene

c. While dusting for fingerprints and using reagents to locate blood

d. During scene assessment and the initial walkthrough

 

 

45. In the documentary, we learned of the existence of the following physical evidence collected from the scene of the Jon Benet Ramsey investigation:

a. The pad used to write the ransom note was from the house

b. The pen used to write the ransom note was from the house

c. The paint brush tied to the rope around her neck was from the house

d. All of the above

46. In the documentary we watched on the OJ Simpson trial, blood on the rear gate at the crime scene was discovered and collected:

a. On the day of the scene investigation

b. Two days later

c. By a crime scene cleanup crew

d. Three weeks later

47. True or False – Jon Benet Ramsey died as a result of a massive 8” skull fracture.

48. Which of the following are accurate based on the documentary we watched on the Jon Benet Ramsey case? (Circle All That Apply – No Partial Credit)

a. The scene was not secure

b. Friends and family were inside the house washing dishes and using Windex on counter tops

c. The ransom note was carefully placed in evidence packaging immediately by the police and touched by no one

d. Jon Benet Ramsey’s body was located by the local detective and the scene was fully documented before removal of the body

49 – 50. Name two items of forensic evidence recovered and the relevance of each item (i.e., interpretive value) during the investigation into the murders of Nicole Brown Simpson and Ron Goldman. (****Note: Naming “Blood” will not be a correct answer. You must describe blood on what, from whom, and what did it mean to the investigation.)

Holistic Victim Restitution Plan Reflection

This week’s required readings discuss the situations that make it more likely for children and the elderly to become victims of crime and how vulnerabilities as a result of age or ability level contribute to victimization. Reflect on your preparations for your Holistic Victim Restitution Plan that is due in Week Six. Choose at least one area of your research that either made you change a pre-existing position you held about the state of victimology research, or share something that surprised you in the course of your research. To help guide your reflection, consider how your perspective has changed on the following topics: the effectiveness of the criminal justice system in addressing victimology, your understanding of victimology theories, landmark victimology federal court decisions, victimology issues, creation of a socially just society, and potential career opportunities. In your Holistic Victim Restitution Plan Reflection, you must reflect on whether your viewpoints have changed and how you expect to use this new perspective in your current or future career going forward. At a minimum Analyze the rise of victimology. Evaluate empirical data regarding crime victims. Explain the victim’s contribution to crime. Critique the criminal justice system’s response to victimization. Describe your suggestions for a holistic plan of victim restitution. The Holistic Victim Restitution Plan Reflection Must be two double-spaced pages in length (excluding title and references pages) and formatted according to APA style