My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Criminal Investigation 1

Author: WLD
Across
Tiny furrows made by the action of a tool on an object's surface
National broadcast that contains detailed information on suspects and their vehicles
Type of vehicle that does not exist but is insured with a counterfeit title so it can be reported stolen later
An investigation that went unsolved but, due to new technology, has been re-opened
A central nervous system depressant used to commit sexual crimes; mixed into drinks, can cause unconsciousness
Type of skin burn caused by contact with hot liquids
Agents of the Bureau of Internal Revenue
Rolling back the mileage on a car and altering paperwork to support the crime
Thefts of livestock in which the motivation is food rather than profit
A reagent used in field tests to check for the presence of blood
Down
Associated with money laundering in which deposits of under $10,000 are made at various banks to avoid reporting the transactions to federal authorities
Fraudulent practice in which manufacturers use parts from the lowest-cost supplier but do not inform the customers that the parts are nonstandard
The illegal taking or possessing of game, fish, and wildlife
Solid, liquid, sludge, and manufacturing byproducts that are reactive, corrosive, and/or toxic
The assumption of another person's individuality for fraudulent transactions
In arson, the material placed around the ignition device to feed the flame
A computerized-theft in which dollar amounts are rounded down and the differences are diverted into the perpetrator's account
In hypnosis, the subject's fabrication of recollections to fill in the gaps of the actual memory
A state of heightened awareness in which subconscious memories may surface
The illegal programming of cellular phones by overwriting their access codes with the codes of legitimate customers