Deck 14: Todays Challenges in Criminal Justice

Full screen (f)
exit full mode
Question
Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual who provides "material support or resources" to a "terrorist organization?"

A) Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B) Criminal Justice Model
C) The Liberty Seven
D) USA Patriot Act
Use Space or
up arrow
down arrow
to flip the card.
Question
Which agency handles the "paperwork" side of U.S.immigration law?

A) The U.S.Customs and Border Patrol
B) The Immigration and Naturalization Services
C) The Transportation Security Administration
D) The United States Citizenship and Immigration Services
Question
Prior to the formation of the Department of Homeland Security,disaster management at the federal level was primarily the responsibility of:

A) The Federal Bureau of Investigation (FBI)
B) The Federal Emergency Management Agency (FEMA)
C) The Red Cross
D) The National Guard
Question
Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:

A) Electronic surveillance
B) Human-source collection
C) Open-source collection
D) Counterintelligence
Question
Osama bin Laden's al Qaeda group has its origins in:

A) Iraq
B) Saudi Arabia
C) Afghanistan
D) Pakistan
Question
The intelligence agency that is responsible for protecting U.S.government communications and producing intelligence by monitoring foreign communications is the:

A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) U.S.Secret Service
Question
A document issued by the U.S.State Department that indicates the conditions under which the holder can remain in the United States is a ______________.

A) Passport
B) Identification card
C) Driver's License
D) Visa
Question
Which of the following is NOT one of the struggles or exertions (Jihad)required of the Muslim faith?

A) The struggle against modernization
B) The struggle against evil in oneself
C) The struggle against non-believers
D) The struggle against evil outside of oneself
Question
The primary purpose of the AEDPA is to fight terrorism by

A) Easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects
B) Creating harsher penalties for those convicted of terrorist acts
C) Cutting off the financial support funneled to terrorist organizations
D) Establishing the Department of Homeland Security
Question
The lead federal agency in the investigation of all terrorism related matters is the:

A) U.S.Secret Service
B) Federal Bureau of Investigation
C) National Security Agency
D) Central Intelligence Agency
Question
Terrorists have evolved into ____,free of control by or allegiance to any nation,and use violence to further political goals.

A) Nonstate actors
B) Enemy combatants
C) Unlawful combatants
D) al Qaeda
Question
Because detainees being held at Guantanamo Bay were seized during a military campaign and were not American citizens,the ____ Amendment was not believed to apply to their incarceration.

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Question
Which of the following is NOT a duty of first responders?

A) Securing the scene
B) Investigating reports of terrorist threats
C) Rescuing the injured
D) Retrieving those who have been killed
Question
The amended version of FISA allows the NSA to wiretap Americans for __________days without a court order,if the attorney general has probable cause to believe that the target is linked to terrorism.

A)three
B)seven
C)thirty
D)ninety
Question
Which Amendment protects against unreasonable searches and seizures?

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Question
Each year,an estimated ____ non-U.S.citizens,unable to secure visas,enter the country illegally by crossing the large,unregulated stretches of our borders with Mexico and Canada.

A) Thousands
B) Tens of thousands
C) Hundreds of thousands
D) Millions
Question
The ____ Amendment holds that no person shall be deprived of life,liberty,or property without due process of law.

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Question
The AEDPA was passed in response to:

A) September 11,2001
B) The Oklahoma City Bombing
C) Pearl Harbor
D) The anthrax mailings
Question
The recruitment of foreign agents who have particular knowledge about areas of interest is known as:

A) Human- source collection
B) Open- source collection
C) Counterintelligence
D) Surveillance
Question
Which of the following agencies is NOT part of the Department of Homeland Security?

A) The Federal Bureau of Investigation
B) The U.S.Customs and Border Protection
C) The U.S.Coast Guard
D) The U.S.Secret Service
Question
Terrorists have evolved into nonstate actors,free of control by or allegiance to any nation.
Question
A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n)________________________.

A) Virus
B) Botnet
C) Worm
D) Spam
Question
The theft of personal information is known as _____________.

A) Cyber theft
B) Cyberstalking
C) Cyber fraud
D) Identity theft
Question
____________________ is a legal proceeding in which the U.S.government formally declares that a legal or unauthorized alien has violated immigration law and therefore does not enjoy the right to stay in the United States.

A)Detention
B)Exile
C)Expulsion
D)Removal
Question
In 2011,spam accounted for approximately ____________ of all emails.

A) 7%
B) 44%
C) 75%
D) 97%
Question
The U.S.Constitution gives the power to admit,exclude,or expel non-U.S.citizens to the _____________________ government.

A)County
B)City
C)Federal
D)State
Question
Terrorists have developed more efficient organizations based on the small-business model.
Question
Which of the following is an example of intellectual property?

A)Books
B)Films
C)Music
D)All of these
Question
Any wrongful act that is directed against computers and computer parts or involves the abuse of software is a(n)

A) Cybercrime
B) White collar crime
C) Property crime
D) Computer crime
Question
Since September 11,2001,the Federal Bureau of Investigation (FBI),a branch of the Department of Justice,has been the "lead federal agency" for all terrorism-related matters.
Question
Which of the following is not a characteristic of a white collar criminal?

A)Has legal access to the place where the crime occurs
B)Uses physical means to get somewhere he or she should not be
C)Is spatially separated from the victim
D)Behaves in a manner that is legitimate
Question
Which of the following occurs in a military tribunal?

A) All members of the panel or jury must agree to convict the individual
B) The defendant has a right to a trial by a jury
C) A panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
D) The traditional rules of evidence apply
Question
When a consumer orders an item online and it is never delivered,this is an example of ___________.

A) White collar crime
B) Cyber theft
C) Online retail fraud
D) Online auction fraud
Question
What is the preferred method of phishing?

A)Hacking
B)Spam
C)Worms
D)Viruses
Question
What is also known as "influence peddling" and occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit?

A)Bribery
B)Embezzlement
C)Consumer Fraud
D)Tax Evasion
Question
In a military tribunal,there is no right to trial by jury,as guaranteed by the ____ Amendment.

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Question
When the perpetrator uses the internet or some form of electronic communication to harass and stalk the victim,this is known as ______________________.

A) Phishing
B) Intellectual property theft
C) Cyberbullying
D) Cyberstalking
Question
Criminal activity which occurs via a computer in the virtual community of the Internet is a(n)____________.

A) Cyber crime
B) Computer crime
C) White collar crime
D) Victimless crime
Question
The Antiterrorism and Effective Death Penalty Act (AEDPA)was passed in response to the 1995 truck bombing of the Alfred P.Murrah Federal Building in Oklahoma City,Oklahoma.
Question
Jihad means holy war.
Question
Most cyber crimes are new crimes.
Question
Violations of immigration law are civil infractions,not criminal infractions.
Question
The U.S.government agency that is responsible for collecting and coordinating foreign intelligence operations is the ___________________________________.
Question
The term ___________________ refers to the facilities and systems that provide the daily necessities of modern life,such as electric power,food,water,transportation and communication.
Question
White collar crime is an official category of criminal behavior measured by the federal government in the Uniform Crime Report.
Question
An act of terrorism that is practiced within one's own country is ________________.
Question
The goal for many law enforcement agencies is not to solve crimes after they have occurred,but to prevent them from happening.
Question
Identity theft existed prior to the Internet.
Question
Spam is a computer program that can automatically replicate itself over a network and interfere with the normal use of a computer.
Question
Federal officials prosecute white-collar crime using the investigatory powers of several different federal law enforcement agencies.
Question
Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign intelligence services.
Question
The ____ is a critical legal tool used in efforts to combat terrorism,because it permits law enforcement agents to arrest suspects even though no crime,in the traditional sense of the word,has taken place and no evident harm has been caused.
Question
The Patriot Act gives intelligence agents more leeway when conducting surveillance.
Question
AEDPA amended the law to allow the FBI to obtain warrants for "terrorism" investigations,"chemical weapons" investigations,or "computer fraud and abuse" investigations as long as agents can prove that such actions have a significant purpose.
Question
The Sixth Amendment guarantees only U.S.Citizens the right to due process.
Question
Phishing scams have spread to text messaging and social-networking sites.
Question
The computer is the instrument of a crime such as when the computer itself is stolen.
Question
_______________________ is an umbrella term for the actions taken by governments to prepare for large-scale catastrophic events such as terrorist attacks or environmental disasters.
Question
Today,the non-temporary visa known as a "green card" is still green in color.
Question
First responders are primary local law enforcement officers,firefighters and emergency medical technicians.
Question
Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making is _______________________________.
Question
The _________ Amendment provides that no person shall be deprived of life,liberty,or property without due process of law.
Question
The goal of ____________________________ is not prevention or punishment as much as compliance,or the following of regulatory guidelines.
Question
____________________ is fraud committed over the Internet.
Question
A(n)_______________________ is a document that gives U.S.Immigration and Customs Enforcement custody of an immigration law violator following the disposition of that person's case by the criminal justice system
Question
Sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information such as a password is known as ___________________________.
Question
The process used by the federal government to expel an alien from the United States is ________________________.
Question
Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.What strategies to intelligence agencies rely on to collect information?
Question
Describe the agencies within the Department of Homeland Security in addition to CBP,ICE,and the Secret Service.
Question
Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA).Why is the AEDPA such an important legal tool against terrorists?
Question
Identify and discuss three important trends in international terrorism.
Question
A(n)_______________ is someone who is not a citizen of the country in which he or she is located.
Question
__________________________ is a technique used by a white-collar criminal where a dishonest stockbroker steals funds from a client rather than investing those funds in the stock market as promised.
Question
Explain how American law enforcement agencies have used "preventive policing" to combat terrorism.
Question
An alien who has been granted permission by the U.S.government to live and work in the United States on a permanent basis is a(n)_________________________.
Question
A _______________________ is a court that is operated by the military rather than the criminal justice system and is presided over by military officers rather than judges.
Question
A ___________________ is a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet.
Question
_____________________________ is the criminal action of being involved in an organized effort to engage in illegal business transactions.
Question
The computer is the __________________ of a crime,such as when the computer itself or its software is stolen.
Question
Intellectual property such as books,films,music and software is vulnerable to _____________ which is the unauthorized copying and use of the property.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Todays Challenges in Criminal Justice
1
Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual who provides "material support or resources" to a "terrorist organization?"

A) Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B) Criminal Justice Model
C) The Liberty Seven
D) USA Patriot Act
A
2
Which agency handles the "paperwork" side of U.S.immigration law?

A) The U.S.Customs and Border Patrol
B) The Immigration and Naturalization Services
C) The Transportation Security Administration
D) The United States Citizenship and Immigration Services
D
3
Prior to the formation of the Department of Homeland Security,disaster management at the federal level was primarily the responsibility of:

A) The Federal Bureau of Investigation (FBI)
B) The Federal Emergency Management Agency (FEMA)
C) The Red Cross
D) The National Guard
B
4
Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:

A) Electronic surveillance
B) Human-source collection
C) Open-source collection
D) Counterintelligence
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
Osama bin Laden's al Qaeda group has its origins in:

A) Iraq
B) Saudi Arabia
C) Afghanistan
D) Pakistan
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
The intelligence agency that is responsible for protecting U.S.government communications and producing intelligence by monitoring foreign communications is the:

A) Central Intelligence Agency
B) National Security Agency
C) Federal Bureau of Investigation
D) U.S.Secret Service
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
A document issued by the U.S.State Department that indicates the conditions under which the holder can remain in the United States is a ______________.

A) Passport
B) Identification card
C) Driver's License
D) Visa
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT one of the struggles or exertions (Jihad)required of the Muslim faith?

A) The struggle against modernization
B) The struggle against evil in oneself
C) The struggle against non-believers
D) The struggle against evil outside of oneself
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
The primary purpose of the AEDPA is to fight terrorism by

A) Easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects
B) Creating harsher penalties for those convicted of terrorist acts
C) Cutting off the financial support funneled to terrorist organizations
D) Establishing the Department of Homeland Security
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
The lead federal agency in the investigation of all terrorism related matters is the:

A) U.S.Secret Service
B) Federal Bureau of Investigation
C) National Security Agency
D) Central Intelligence Agency
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
Terrorists have evolved into ____,free of control by or allegiance to any nation,and use violence to further political goals.

A) Nonstate actors
B) Enemy combatants
C) Unlawful combatants
D) al Qaeda
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
Because detainees being held at Guantanamo Bay were seized during a military campaign and were not American citizens,the ____ Amendment was not believed to apply to their incarceration.

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT a duty of first responders?

A) Securing the scene
B) Investigating reports of terrorist threats
C) Rescuing the injured
D) Retrieving those who have been killed
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
The amended version of FISA allows the NSA to wiretap Americans for __________days without a court order,if the attorney general has probable cause to believe that the target is linked to terrorism.

A)three
B)seven
C)thirty
D)ninety
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Which Amendment protects against unreasonable searches and seizures?

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
Each year,an estimated ____ non-U.S.citizens,unable to secure visas,enter the country illegally by crossing the large,unregulated stretches of our borders with Mexico and Canada.

A) Thousands
B) Tens of thousands
C) Hundreds of thousands
D) Millions
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ Amendment holds that no person shall be deprived of life,liberty,or property without due process of law.

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
The AEDPA was passed in response to:

A) September 11,2001
B) The Oklahoma City Bombing
C) Pearl Harbor
D) The anthrax mailings
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
The recruitment of foreign agents who have particular knowledge about areas of interest is known as:

A) Human- source collection
B) Open- source collection
C) Counterintelligence
D) Surveillance
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following agencies is NOT part of the Department of Homeland Security?

A) The Federal Bureau of Investigation
B) The U.S.Customs and Border Protection
C) The U.S.Coast Guard
D) The U.S.Secret Service
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
Terrorists have evolved into nonstate actors,free of control by or allegiance to any nation.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n)________________________.

A) Virus
B) Botnet
C) Worm
D) Spam
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
The theft of personal information is known as _____________.

A) Cyber theft
B) Cyberstalking
C) Cyber fraud
D) Identity theft
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is a legal proceeding in which the U.S.government formally declares that a legal or unauthorized alien has violated immigration law and therefore does not enjoy the right to stay in the United States.

A)Detention
B)Exile
C)Expulsion
D)Removal
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
In 2011,spam accounted for approximately ____________ of all emails.

A) 7%
B) 44%
C) 75%
D) 97%
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
The U.S.Constitution gives the power to admit,exclude,or expel non-U.S.citizens to the _____________________ government.

A)County
B)City
C)Federal
D)State
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
Terrorists have developed more efficient organizations based on the small-business model.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is an example of intellectual property?

A)Books
B)Films
C)Music
D)All of these
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
Any wrongful act that is directed against computers and computer parts or involves the abuse of software is a(n)

A) Cybercrime
B) White collar crime
C) Property crime
D) Computer crime
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
Since September 11,2001,the Federal Bureau of Investigation (FBI),a branch of the Department of Justice,has been the "lead federal agency" for all terrorism-related matters.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not a characteristic of a white collar criminal?

A)Has legal access to the place where the crime occurs
B)Uses physical means to get somewhere he or she should not be
C)Is spatially separated from the victim
D)Behaves in a manner that is legitimate
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following occurs in a military tribunal?

A) All members of the panel or jury must agree to convict the individual
B) The defendant has a right to a trial by a jury
C) A panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
D) The traditional rules of evidence apply
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
When a consumer orders an item online and it is never delivered,this is an example of ___________.

A) White collar crime
B) Cyber theft
C) Online retail fraud
D) Online auction fraud
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
What is the preferred method of phishing?

A)Hacking
B)Spam
C)Worms
D)Viruses
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
What is also known as "influence peddling" and occurs in the business world when somebody within a company sells influence,power,or information to a person outside the company who can benefit?

A)Bribery
B)Embezzlement
C)Consumer Fraud
D)Tax Evasion
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
In a military tribunal,there is no right to trial by jury,as guaranteed by the ____ Amendment.

A) Fourth
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
When the perpetrator uses the internet or some form of electronic communication to harass and stalk the victim,this is known as ______________________.

A) Phishing
B) Intellectual property theft
C) Cyberbullying
D) Cyberstalking
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
Criminal activity which occurs via a computer in the virtual community of the Internet is a(n)____________.

A) Cyber crime
B) Computer crime
C) White collar crime
D) Victimless crime
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
The Antiterrorism and Effective Death Penalty Act (AEDPA)was passed in response to the 1995 truck bombing of the Alfred P.Murrah Federal Building in Oklahoma City,Oklahoma.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
Jihad means holy war.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
Most cyber crimes are new crimes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
Violations of immigration law are civil infractions,not criminal infractions.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
The U.S.government agency that is responsible for collecting and coordinating foreign intelligence operations is the ___________________________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
The term ___________________ refers to the facilities and systems that provide the daily necessities of modern life,such as electric power,food,water,transportation and communication.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
White collar crime is an official category of criminal behavior measured by the federal government in the Uniform Crime Report.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
An act of terrorism that is practiced within one's own country is ________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
The goal for many law enforcement agencies is not to solve crimes after they have occurred,but to prevent them from happening.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
Identity theft existed prior to the Internet.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
Spam is a computer program that can automatically replicate itself over a network and interfere with the normal use of a computer.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
Federal officials prosecute white-collar crime using the investigatory powers of several different federal law enforcement agencies.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign intelligence services.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
The ____ is a critical legal tool used in efforts to combat terrorism,because it permits law enforcement agents to arrest suspects even though no crime,in the traditional sense of the word,has taken place and no evident harm has been caused.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
The Patriot Act gives intelligence agents more leeway when conducting surveillance.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
AEDPA amended the law to allow the FBI to obtain warrants for "terrorism" investigations,"chemical weapons" investigations,or "computer fraud and abuse" investigations as long as agents can prove that such actions have a significant purpose.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
The Sixth Amendment guarantees only U.S.Citizens the right to due process.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
Phishing scams have spread to text messaging and social-networking sites.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
The computer is the instrument of a crime such as when the computer itself is stolen.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
_______________________ is an umbrella term for the actions taken by governments to prepare for large-scale catastrophic events such as terrorist attacks or environmental disasters.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
Today,the non-temporary visa known as a "green card" is still green in color.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
First responders are primary local law enforcement officers,firefighters and emergency medical technicians.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making is _______________________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
The _________ Amendment provides that no person shall be deprived of life,liberty,or property without due process of law.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
The goal of ____________________________ is not prevention or punishment as much as compliance,or the following of regulatory guidelines.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is fraud committed over the Internet.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)_______________________ is a document that gives U.S.Immigration and Customs Enforcement custody of an immigration law violator following the disposition of that person's case by the criminal justice system
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
Sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information such as a password is known as ___________________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
The process used by the federal government to expel an alien from the United States is ________________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.What strategies to intelligence agencies rely on to collect information?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
Describe the agencies within the Department of Homeland Security in addition to CBP,ICE,and the Secret Service.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA).Why is the AEDPA such an important legal tool against terrorists?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
Identify and discuss three important trends in international terrorism.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
A(n)_______________ is someone who is not a citizen of the country in which he or she is located.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
__________________________ is a technique used by a white-collar criminal where a dishonest stockbroker steals funds from a client rather than investing those funds in the stock market as promised.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
Explain how American law enforcement agencies have used "preventive policing" to combat terrorism.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
An alien who has been granted permission by the U.S.government to live and work in the United States on a permanent basis is a(n)_________________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
A _______________________ is a court that is operated by the military rather than the criminal justice system and is presided over by military officers rather than judges.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
A ___________________ is a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
_____________________________ is the criminal action of being involved in an organized effort to engage in illegal business transactions.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
The computer is the __________________ of a crime,such as when the computer itself or its software is stolen.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
Intellectual property such as books,films,music and software is vulnerable to _____________ which is the unauthorized copying and use of the property.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.