 |  Criminal Investigation, 8/e Charles R. Swanson,
University of Georgia Neil C. Chamelin,
Assistant State Attorney, Second Judicial Circuit Leonard Territo,
University of South Florida- Tampa
Larceny and Fraud
Chapter Objectives
1) Explain the four categories of credit card fraud |
 |  |  | 2) Be familiar with check fraud schemes and organizations |
 |  |  | 3) Understand the process of cellular phone cloning |
 |  |  | 4) Describe the classifications of shoplifters and the patterns of professional shoplifting groups |
 |  |  | 5) Explain the most common types of confidence games |
 |  |  | 6) Identify several forms of mail fraud |
 |  |  | 7) Outline various techniques to launder money |
 |  |  | 8) Describe identity theft |
 |  |  | 9) Discuss the looting of archeological sites |
|