Deck 10: Violent Crime and Digital Evidence
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 10: Violent Crime and Digital Evidence
1
A thief who has programmed and released a virus to roam a network looking for victim passwords used for online banking is an example of what offense behavior?
A) Power assertive
B) Profit oriented
C) Power reassurance
D) Anger retaliatory
A) Power assertive
B) Profit oriented
C) Power reassurance
D) Anger retaliatory
B
2
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
A) Diagram the crime scene
B) Create a timeline of events from digital evidence
C) Create a threat assessment report
D) None of the above
A) Diagram the crime scene
B) Create a timeline of events from digital evidence
C) Create a threat assessment report
D) None of the above
B
3
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
A) Lay out all the evidence so it can be viewed in its entirety
B) Work with the crime scene technicians so that a better understanding of the crime is achieved
C) Construct a timeline of events from digital evidence
D) Begin the process of converting field notes to a final report
A) Lay out all the evidence so it can be viewed in its entirety
B) Work with the crime scene technicians so that a better understanding of the crime is achieved
C) Construct a timeline of events from digital evidence
D) Begin the process of converting field notes to a final report
C
4
Data from Internet service providers used by the victim or suspect can help determine their activities around the time of the crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Crime scenes fall into two categories - primary and .
A) Remote
B) Secondary
C) Ancillary
D) Theoretical
A) Remote
B) Secondary
C) Ancillary
D) Theoretical
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Victimology is the assessment of the offender as he relates to the crime scene, the incident, and the criminal justice system.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Although crime scenes are typically photographed, it is a good idea to create diagrams of the crime scene because:
A) Diagramming is a common crime scene technician's skill; however, it requires continual practice.
B) The process of creating a diagram can result in a digital investigator noticing an important item of evidence that would otherwise have been missed.
C) The quality of photographs taken at the crime scene is not known until the film is developed.
D) None of the above.
A) Diagramming is a common crime scene technician's skill; however, it requires continual practice.
B) The process of creating a diagram can result in a digital investigator noticing an important item of evidence that would otherwise have been missed.
C) The quality of photographs taken at the crime scene is not known until the film is developed.
D) None of the above.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
The case of a Michigan bank robber requiring tellers to undress so he could photograph them is an example of:
A) Deviant aberrant behavior
B) Criminal humor
C) Crime scene characteristics
D) Investigative reconstruction
A) Deviant aberrant behavior
B) Criminal humor
C) Crime scene characteristics
D) Investigative reconstruction
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
When swift action is needed, law enforcement personnel may be permitted to conduct searches without a warrant. Searches of this kind are permitted under:
A) Exigent circumstances
B) Eminent domain
C) Mens rea
D) USA PATRIOT ACT
A) Exigent circumstances
B) Eminent domain
C) Mens rea
D) USA PATRIOT ACT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
The assessment of the victim as they relate to the offender, the crime scene, the incident, and the criminal justice system is known as:
A) Threat assessment methodology
B) Signature behaviors
C) Behavioral evidence analysis
D) Victimology
A) Threat assessment methodology
B) Signature behaviors
C) Behavioral evidence analysis
D) Victimology
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
Computers and mobile devices are treated as__________ crime scenes in violent crime investigations.
A) Temporary
B) Immediate
C) Remote
D) Secondary
A) Temporary
B) Immediate
C) Remote
D) Secondary
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
How the offender approaches and obtains control of a victim or target is significant because it exposes the offender's:
A) Motives
B) Choice of weapons
C) Modus operandi
D) Signature behaviors
A) Motives
B) Choice of weapons
C) Modus operandi
D) Signature behaviors
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
Every violent crime investigation should incorporate digital evidence because digital evidence may reveal:
A) Investigative leads
B) Likely suspects
C) Previously unknown crimes
D) All the above
A) Investigative leads
B) Likely suspects
C) Previously unknown crimes
D) All the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Given the scope and consequences of violent crimes, when collecting digital evidence it is advisable to:
A) Collect only that digital evidence that is clearly connected to the offense
B) Focus only on the primary crime scene, as searching the offender's home and workplace requires additional authorization
C) Seek out and preserve all available digital evidence
D) Focus only on the offender's digital evidence, as the victim's digital evidence is usually of little value
A) Collect only that digital evidence that is clearly connected to the offense
B) Focus only on the primary crime scene, as searching the offender's home and workplace requires additional authorization
C) Seek out and preserve all available digital evidence
D) Focus only on the offender's digital evidence, as the victim's digital evidence is usually of little value
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Digital investigators can use information gleaned from many forms of digital evidence to find likely suspects and develop leads.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
The Federal statute that has a provision allowing Internet service providers to disclose subscriber information to law enforcement in exigent circumstances is:
A) ECPA
B) CCPA
C) The Privacy Act
D) FCRA
A) ECPA
B) CCPA
C) The Privacy Act
D) FCRA
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
The key to any investigation is luck, which has value only when it is properly acted upon.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
Mobile devices may contain information about communications as well as audio or video recordings relating to an offense.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
When processing the digital crime scene in a violent crime investigation it is important to have_________ to ensure that all digital evidence and findings can hold up under close scrutiny.
A) A good supply of electrostatic bags for holding sensitive electronic components
B) More than one reliable camera for photographing the crime scene
C) Standard operating procedures for processing a digital crime scene
D) A good supply of nitrile gloves
A) A good supply of electrostatic bags for holding sensitive electronic components
B) More than one reliable camera for photographing the crime scene
C) Standard operating procedures for processing a digital crime scene
D) A good supply of nitrile gloves
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
One reason not to put too much trust into those who run the company's computers is that:
A) There has always been an antagonism between system administrators and law enforcement.
B) They are typically too busy to take the time to answer your questions.
C) They are usually not authorized to answer questions.
D) They may be the offenders.
A) There has always been an antagonism between system administrators and law enforcement.
B) They are typically too busy to take the time to answer your questions.
C) They are usually not authorized to answer questions.
D) They may be the offenders.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
When investigating a violent crime, it is important to obtain proper authorization to examine the primary crime scene; however, secondary crime scenes are typically covered under that authorization.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
The investigator reconstruction process involves pulling all evidence together and letting it speak for itself.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
It is safe to place your trust in an organization's IT staff, since forensic training is a basic requirement in most IT departments.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
A Mincey warrant, which is easier to obtain, is an option when investigators really believe there is some emergency.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
When reconstructing evidence surrounding a violent crime, it is helpful to create a timeline of events from digital evidence.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Computers and mobile devices are treated as primary crime scenes in violent crime investigations.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
When investigating suspects of a violent crime, it is important to look for behaviors that leave digital traces.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Privately owned networks are usually a poor source of information when investigating violent crimes.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
What an offender does at a crime scene typically reveals little useful information to digital investigators.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck