4.6 Property, Fraud, Technology, and Government Operations
Key Takeaways
- BPOC Chapter 8 covers property damage, robbery, burglary, theft, fraud, exploitation, computer crimes, telecommunications crimes, bribery, perjury, obstruction, and abuse of office.
- Property crimes often turn on owner, consent, entry, value, pecuniary loss, appropriation, deception, and intent to deprive.
- Government operation offenses protect investigations, custody, public servants, official records, and public trust.
- Technology and fraud scenarios require evidence preservation and exact statutory matching, not a generic theft label.
Property and Public Integrity Offense Sorting
BPOC Chapter 8 moves from person offenses into property, fraud, computer, telecommunication, and government-operation offenses. These chapters are broad, so use element families. Ask what was damaged, entered, taken, falsified, accessed, obstructed, or abused.
| Offense family | Penal Code source in BPOC | Sorting facts |
|---|---|---|
| Property damage | PC Chapter 28 | Arson, criminal mischief, reckless damage, graffiti, pecuniary loss |
| Robbery | PC Chapter 29 | Theft plus injury, threat, fear, deadly weapon, serious injury, special victim |
| Burglary and trespass | PC Chapter 30 | Entry, habitation, vehicle, coin machine, notice, intent |
| Theft and related | PC Chapter 31 | Appropriation, owner, consent, value, vehicle use, retail theft, cargo |
| Fraud and exploitation | PC Chapter 32 | Forgery, bad check, card abuse, identifying information, elder financial abuse |
| Computer and telecom | PC Chapters 33 and 33A | Unauthorized access, online solicitation, impersonation, service theft |
| Government operations | PC Chapters 36 to 39 | Bribery, perjury, false report, tampering, resisting, evading, official oppression |
Robbery is a common trap because it begins with theft but becomes an offense against the person when injury, threat, or fear occurs during the course of theft. Burglary is not the same as theft; entry and intent matter. Criminal trespass is not the same as burglary; notice and forbidden entry matter.
Fraud and technology offenses require careful evidence thinking. A forged prescription, false loan application, stolen debit card use, online impersonation, deleted business records, or unauthorized telecommunications device may involve documents, digital records, account logs, video, and witness statements. The exam usually wants the offense family and probable cause facts, not a full forensic plan.
Scenario guidance
A store theft becomes robbery when the suspect pushes a clerk to the floor while escaping and causes pain. If the clerk suffers a broken arm or a deadly weapon is used, reassess aggravated robbery. A house entry through a broken window with theft of electronics is burglary analysis, while spray-painted gang symbols on a garage door are graffiti or criminal mischief analysis.
For government operation offenses, identify the official function being obstructed. Giving a false name during a lawful detention with a warrant discovered, running from a uniformed officer's lawful order to stop, chewing suspected evidence, or offering money during a DWI stop each points to a different statutory family.
Exam trap
Do not call every dishonest act theft. Fraud, forgery, credit card abuse, identifying information misuse, deceptive business practices, and exploitation may be better fits depending on the means.
Do not overlook officer misconduct statutes. Abuse of official capacity and official oppression are Penal Code topics in BPOC Chapter 8 and connect back to professionalism, ethics, and constitutional limits.
A shoplifting suspect pushes a clerk down while fleeing and causes pain. Which offense family should be considered beyond simple theft?
Which fact is most central to distinguishing burglary from ordinary theft?
An officer accepts money to ignore a DWI stop. Which Penal Code family from BPOC Chapter 8 is directly implicated?