4.6 Property, Fraud, Technology, and Government Operations

Key Takeaways

  • BPOC Chapter 8 covers property damage, robbery, burglary, theft, fraud, exploitation, computer crimes, telecommunications crimes, bribery, perjury, obstruction, and abuse of office.
  • Property crimes often turn on owner, consent, entry, value, pecuniary loss, appropriation, deception, and intent to deprive.
  • Government operation offenses protect investigations, custody, public servants, official records, and public trust.
  • Technology and fraud scenarios require evidence preservation and exact statutory matching, not a generic theft label.
Last updated: May 2026

Property and Public Integrity Offense Sorting

BPOC Chapter 8 moves from person offenses into property, fraud, computer, telecommunication, and government-operation offenses. These chapters are broad, so use element families. Ask what was damaged, entered, taken, falsified, accessed, obstructed, or abused.

Offense familyPenal Code source in BPOCSorting facts
Property damagePC Chapter 28Arson, criminal mischief, reckless damage, graffiti, pecuniary loss
RobberyPC Chapter 29Theft plus injury, threat, fear, deadly weapon, serious injury, special victim
Burglary and trespassPC Chapter 30Entry, habitation, vehicle, coin machine, notice, intent
Theft and relatedPC Chapter 31Appropriation, owner, consent, value, vehicle use, retail theft, cargo
Fraud and exploitationPC Chapter 32Forgery, bad check, card abuse, identifying information, elder financial abuse
Computer and telecomPC Chapters 33 and 33AUnauthorized access, online solicitation, impersonation, service theft
Government operationsPC Chapters 36 to 39Bribery, perjury, false report, tampering, resisting, evading, official oppression

Robbery is a common trap because it begins with theft but becomes an offense against the person when injury, threat, or fear occurs during the course of theft. Burglary is not the same as theft; entry and intent matter. Criminal trespass is not the same as burglary; notice and forbidden entry matter.

Fraud and technology offenses require careful evidence thinking. A forged prescription, false loan application, stolen debit card use, online impersonation, deleted business records, or unauthorized telecommunications device may involve documents, digital records, account logs, video, and witness statements. The exam usually wants the offense family and probable cause facts, not a full forensic plan.

Scenario guidance

A store theft becomes robbery when the suspect pushes a clerk to the floor while escaping and causes pain. If the clerk suffers a broken arm or a deadly weapon is used, reassess aggravated robbery. A house entry through a broken window with theft of electronics is burglary analysis, while spray-painted gang symbols on a garage door are graffiti or criminal mischief analysis.

For government operation offenses, identify the official function being obstructed. Giving a false name during a lawful detention with a warrant discovered, running from a uniformed officer's lawful order to stop, chewing suspected evidence, or offering money during a DWI stop each points to a different statutory family.

Exam trap

Do not call every dishonest act theft. Fraud, forgery, credit card abuse, identifying information misuse, deceptive business practices, and exploitation may be better fits depending on the means.

Do not overlook officer misconduct statutes. Abuse of official capacity and official oppression are Penal Code topics in BPOC Chapter 8 and connect back to professionalism, ethics, and constitutional limits.

Test Your Knowledge

A shoplifting suspect pushes a clerk down while fleeing and causes pain. Which offense family should be considered beyond simple theft?

A
B
C
D
Test Your Knowledge

Which fact is most central to distinguishing burglary from ordinary theft?

A
B
C
D
Test Your Knowledge

An officer accepts money to ignore a DWI stop. Which Penal Code family from BPOC Chapter 8 is directly implicated?

A
B
C
D