Deck 18: High-Technology Crimesnment

Full screen (f)
exit full mode
Question
________ applies scientific techniques to the detection and evaluation of criminal evidence.

A)Profiling
B)Pathology
C)Social engineering
D)Criminalistics
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is an example of an early form of biometric technology used to identify individuals?

A)Voice authentication systems
B)Fingerprinting
C)Body odor sniffers
D)Retinal scanning
Question
________ is a form of high-technology fraud that uses official-looking e-mail messages to steal valuable information by directing victims to phony websites.

A)Phishing
B)Spam
C)Spyware
D)Worm
Question
________ is a system used to match a suspect's fingerprints against stored records.

A)CODIS
B)AFIS
C)METAPOL
D)VICAP
Question
Illegally copying a software program is known as software

A)piracy.
B)attachment.
C)duplication.
D)phishing.
Question
________ includes criminal offenses committed through the use of altered genetic material.

A)WMD
B)Biometrics
C)Biocrime
D)Terrorist crime
Question
In which part of the world does software piracy appear to be most common?

A)The United States
B)Latin America
C)Western Europe
D)Asia
Question
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification?

A)Digital fingerprint analysis
B)Retinal scanning
C)DNA analysis
D)Hand geometry
Question
Which of the following biocrimes would be considered bioterrorism?

A)Illegally harvesting human organs for medical transplantation
B)Human cloning
C)Infecting food crops with toxins
D)Illegally harvesting stem cells
Question
The study of insect behavior to determine the time of death of a corpse is called

A)forensic entomology.
B)evidence pathology.
C)forensic technology.
D)forensic anthropology.
Question
________ is a category of cybercrime that includes stealing trade secrets or copyrighted information.

A)Theft of services
B)Telemarketing fraud
C)Electronic vandalism
D)Information piracy
Question
________ involves recognizing people by physical characteristics and personal traits.

A)DNA profiling
B)Forensic anthropology
C)Ballistics
D)Biometrics
Question
Which of the following is not a condition under which the procedures established by the Innocence Protection Act require a court to order DNA testing?

A)The proposed DNA testing would produce new material evidence supporting an inmate's claim of innocence.
B)The statute of limitations for the underlying offense has not yet expired.
C)The inmate applying for testing asserts that he or she is innocent of a qualifying offense.
D)The testing would create a reasonable probability that the inmate applying for testing did not commit the offense of which he or she was convicted.
Question
Alphonse Bertillon was responsible for creating the first

A)weapon of mass destruction.
B)human clone.
C)modern system of personal identification.
D)application of DNA technology in criminal cases.
Question
A law enforcement agency that wants to compare a DNA profile they obtained from a crime scene with other DNA profiles around the country would use which of the following national database?

A)ViCAP
B)NCIC
C)METAPOL
D)CODIS
Question
Planting a virus is an example of which category of cybercrime?

A)Electronic vandalism
B)Information piracy
C)Telemarketing fraud
D)Theft of services
Question
What was the purpose of the SMILECon conference for police officers?

A)To help develop ways to raise public opinion of the police
B)To train police in the use of social media
C)To make police aware of new high-technology investigative tools
D)To create linkages between police and criminalists
Question
________ is a nontechnical type of cyber intrusion that involves tricking people into breaking security procedures,such as persuading them to give out password details.

A)Criminal engineering
B)Social engineering
C)Hacking
D)Profiling
Question
Which criminalistics technique is used to reconstruct the likeness of a decomposed or dismembered body?

A)Fingerprint analysis
B)Forensic anthropology
C)Medical pathology
D)Forensic entomology
Question
________ includes computer worms and Trojan horses.

A)Technoware
B)Malware
C)Phishing
D)Bioware
Question
Anthrax is a possible bioterrorism agent.
Question
The use of technology in the service of criminal investigation,the application of scientific techniques to the detection and evaluation of criminal evidence is known as the field of criminalistics.
Question
In criminal justice,________ are particularly significant because they may create perceived injustices.

A)sentinel events
B)audit trails
C)technocrimes
D)biometrics
Question
The Council of Europe cybercrime treaty focuses on standardizing cybercrime laws around the world.
Question
Electronic money laundering is a form of information piracy.
Question
________ technology provides users with real-time fact-based information that can be accessed during real-world activity.

A)Cybertechnology
B)Augmented reality
C)Trace detection
D)Nanoreality
Question
Illegally harvesting medical organs for transplantation is a type of biocrime.
Question
A crime that employs advanced or emerging technology in its commission is known as a cybercrime.
Question
The most likely way for a criminal to break through a computer network's security system is by using a hacker with advanced programming skills.
Question
The U.S.has one of the highest rates of software piracy in the world.
Question
Alphonse Bertillion pioneered the use of fingerprints to identify offenders.
Question
Phishing is usually done through texts and calls from cell phones.
Question
The most expensive security incidents involve financial fraud.
Question
A correctional officer is a criminalist.
Question
Social networking technologies can backfire and harm police during tactical situations.
Question
Ransomware is a form of cybercrime.
Question
________ technology is used to search cargo and luggage for particles left behind when narcotics and explosives contraband are packaged and handled.

A)Radiation detection equipment
B)Surveillance drone
C)Trace detection
D)Nanoreality
Question
The Department of Homeland Security is particularly concerned that weapons of mass destruction and other contraband useful to terrorists might enter the U.S.in which way?

A)Airport cargo
B)Illegal border crossings
C)Clandestine trucking operations
D)Seaport shipping containers
Question
Biometrics is an advanced technique designed to help determine the cause of injury or death.
Question
________ attempt(s)to duplicate the decision-making processes used by skilled investigators in evidence analysis and pattern recognition.

A)Expert systems
B)METAPOL
C)Audit trails
D)Augmented reality
Question
The Department of Homeland security is particularly concerned about the possibility that weapons of mass destruction may enter the U.S.through our nation's airports.
Question
The police shooting in Ferguson of teenager Michael Brown is an example of a sentinel event.
Question
SMILECon was a conference designed to help train police in the use of ________.
Question
DNA analysis can prove either guilt or innocence.
Question
CODIS is a DNA database that allows law enforcement agencies to compare DNA profiles to identify suspects or link serial crimes.
Question
________ includes a variety of malicious computer programs,such as viruses,worms,and Trojan horses.
Question
Currently,law enforcement agencies are not permitted to collect DNA samples from criminal suspects who have been arrested for serious crimes until after they have been convicted.
Question
________ involves the application of scientific techniques to the detection and evaluation of criminal evidence.
Question
Augmented reality provides information in real time.
Question
A criminal offense that employs any form of advanced or emerging technology in its commission is called a(n)________.
Question
A criminal offense perpetrated through the use of biologically active substances,including chemicals,toxins,or disease-causing organisms in known as a(n)________.
Question
The anonymous anthrax letters that caused five deaths in 2001 were a type of biocrime known as ________.
Question
The most likely way for a criminal to break into a computer system is through ________.
Question
Forensic entomology techniques may be used to reconstruct the likeness of a decomposed or dismembered body.
Question
________ is the analysis of firearms,ammunition,projectiles,bombs,and explosives.
Question
________ is a form of cybercrime that relies on social engineering by using official-looking email messages to elicit responses from victims.
Question
________ is a form of cybercrime that involves the theft of trade secrets or copyrighted information.
Question
HITMAN is the latest technology used by the FBI to track and capture mafia-related criminals.
Question
Illegally copying software programs is known as ________.
Question
________ is unsolicited commercial email whose primary purpose is to advertise or promote a commercial product or service.
Question
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Spam
Question
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Phishing
Question
The criminal justice system's failure to correct problems that are red-flagged by ________ may be due to the system's tendency to ascribe blame to individuals rather than the system itself.
Question
Explain how and why social media is being used by law enforcement.Also discuss the problems that may result from the adoption of social media by law enforcement agencies.
Question
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Software piracy
Question
________ involves creating useful products at a molecular level,such as microscopic cameras or recording devices.
Question
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Malware
Question
What is biocrime? Discuss the various ways biocrimes may be committed,and include a discussion of bioterrorism.Provide examples of biocrimes and explain why biocrime is a major concern today.
Question
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
Forensic anthropology
Question
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
Forensic entomology
Question
________ systems focus on cargo and luggage and collects and analyzes particles left behind when narcotics and explosives contraband are packaged and handled.
Question
HITMAN and NCVAC are examples of ________ designed to duplicate the decision-making processes of skilled investigators.
Question
The ________ is a volunteer organization that uses DNA technology to investigate and challenge dubious convictions.
Question
Define criminalistics.Explain three methods used to identify individuals.Which of these do you think is the most useful for law enforcement and why?
Question
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
AFIS
Question
Law enforcement practitioners of the future will be aided in their criminalistics work by a number of technologies.List and define three of the new technologies that aid law enforcement in solving crime.Explain which of these technologies you feel is the best and why.
Question
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
Ballistics
Question
When a decomposed body is discovered,a model of the deceased individual may be created by forensic ________.
Question
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Computer virus
Question
What is Augmented Reality (AR)? It is predicted that AR systems will soon be available and that will provide "wired" officers with new capabilities.List and describe three of those new capabilities.Explain your thoughts on the potential benefits and drawbacks to each new technology.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/83
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: High-Technology Crimesnment
1
________ applies scientific techniques to the detection and evaluation of criminal evidence.

A)Profiling
B)Pathology
C)Social engineering
D)Criminalistics
D
2
Which of the following is an example of an early form of biometric technology used to identify individuals?

A)Voice authentication systems
B)Fingerprinting
C)Body odor sniffers
D)Retinal scanning
B
3
________ is a form of high-technology fraud that uses official-looking e-mail messages to steal valuable information by directing victims to phony websites.

A)Phishing
B)Spam
C)Spyware
D)Worm
A
4
________ is a system used to match a suspect's fingerprints against stored records.

A)CODIS
B)AFIS
C)METAPOL
D)VICAP
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
5
Illegally copying a software program is known as software

A)piracy.
B)attachment.
C)duplication.
D)phishing.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
6
________ includes criminal offenses committed through the use of altered genetic material.

A)WMD
B)Biometrics
C)Biocrime
D)Terrorist crime
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
7
In which part of the world does software piracy appear to be most common?

A)The United States
B)Latin America
C)Western Europe
D)Asia
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
8
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification?

A)Digital fingerprint analysis
B)Retinal scanning
C)DNA analysis
D)Hand geometry
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following biocrimes would be considered bioterrorism?

A)Illegally harvesting human organs for medical transplantation
B)Human cloning
C)Infecting food crops with toxins
D)Illegally harvesting stem cells
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
10
The study of insect behavior to determine the time of death of a corpse is called

A)forensic entomology.
B)evidence pathology.
C)forensic technology.
D)forensic anthropology.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
11
________ is a category of cybercrime that includes stealing trade secrets or copyrighted information.

A)Theft of services
B)Telemarketing fraud
C)Electronic vandalism
D)Information piracy
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
12
________ involves recognizing people by physical characteristics and personal traits.

A)DNA profiling
B)Forensic anthropology
C)Ballistics
D)Biometrics
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not a condition under which the procedures established by the Innocence Protection Act require a court to order DNA testing?

A)The proposed DNA testing would produce new material evidence supporting an inmate's claim of innocence.
B)The statute of limitations for the underlying offense has not yet expired.
C)The inmate applying for testing asserts that he or she is innocent of a qualifying offense.
D)The testing would create a reasonable probability that the inmate applying for testing did not commit the offense of which he or she was convicted.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
14
Alphonse Bertillon was responsible for creating the first

A)weapon of mass destruction.
B)human clone.
C)modern system of personal identification.
D)application of DNA technology in criminal cases.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
15
A law enforcement agency that wants to compare a DNA profile they obtained from a crime scene with other DNA profiles around the country would use which of the following national database?

A)ViCAP
B)NCIC
C)METAPOL
D)CODIS
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
16
Planting a virus is an example of which category of cybercrime?

A)Electronic vandalism
B)Information piracy
C)Telemarketing fraud
D)Theft of services
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
17
What was the purpose of the SMILECon conference for police officers?

A)To help develop ways to raise public opinion of the police
B)To train police in the use of social media
C)To make police aware of new high-technology investigative tools
D)To create linkages between police and criminalists
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
18
________ is a nontechnical type of cyber intrusion that involves tricking people into breaking security procedures,such as persuading them to give out password details.

A)Criminal engineering
B)Social engineering
C)Hacking
D)Profiling
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
19
Which criminalistics technique is used to reconstruct the likeness of a decomposed or dismembered body?

A)Fingerprint analysis
B)Forensic anthropology
C)Medical pathology
D)Forensic entomology
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
20
________ includes computer worms and Trojan horses.

A)Technoware
B)Malware
C)Phishing
D)Bioware
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
21
Anthrax is a possible bioterrorism agent.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
22
The use of technology in the service of criminal investigation,the application of scientific techniques to the detection and evaluation of criminal evidence is known as the field of criminalistics.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
23
In criminal justice,________ are particularly significant because they may create perceived injustices.

A)sentinel events
B)audit trails
C)technocrimes
D)biometrics
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
24
The Council of Europe cybercrime treaty focuses on standardizing cybercrime laws around the world.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
25
Electronic money laundering is a form of information piracy.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
26
________ technology provides users with real-time fact-based information that can be accessed during real-world activity.

A)Cybertechnology
B)Augmented reality
C)Trace detection
D)Nanoreality
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
27
Illegally harvesting medical organs for transplantation is a type of biocrime.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
28
A crime that employs advanced or emerging technology in its commission is known as a cybercrime.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
29
The most likely way for a criminal to break through a computer network's security system is by using a hacker with advanced programming skills.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
30
The U.S.has one of the highest rates of software piracy in the world.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
31
Alphonse Bertillion pioneered the use of fingerprints to identify offenders.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
32
Phishing is usually done through texts and calls from cell phones.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
33
The most expensive security incidents involve financial fraud.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
34
A correctional officer is a criminalist.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
35
Social networking technologies can backfire and harm police during tactical situations.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
36
Ransomware is a form of cybercrime.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
37
________ technology is used to search cargo and luggage for particles left behind when narcotics and explosives contraband are packaged and handled.

A)Radiation detection equipment
B)Surveillance drone
C)Trace detection
D)Nanoreality
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
38
The Department of Homeland Security is particularly concerned that weapons of mass destruction and other contraband useful to terrorists might enter the U.S.in which way?

A)Airport cargo
B)Illegal border crossings
C)Clandestine trucking operations
D)Seaport shipping containers
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
39
Biometrics is an advanced technique designed to help determine the cause of injury or death.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
40
________ attempt(s)to duplicate the decision-making processes used by skilled investigators in evidence analysis and pattern recognition.

A)Expert systems
B)METAPOL
C)Audit trails
D)Augmented reality
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
41
The Department of Homeland security is particularly concerned about the possibility that weapons of mass destruction may enter the U.S.through our nation's airports.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
42
The police shooting in Ferguson of teenager Michael Brown is an example of a sentinel event.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
43
SMILECon was a conference designed to help train police in the use of ________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
44
DNA analysis can prove either guilt or innocence.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
45
CODIS is a DNA database that allows law enforcement agencies to compare DNA profiles to identify suspects or link serial crimes.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
46
________ includes a variety of malicious computer programs,such as viruses,worms,and Trojan horses.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
47
Currently,law enforcement agencies are not permitted to collect DNA samples from criminal suspects who have been arrested for serious crimes until after they have been convicted.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
48
________ involves the application of scientific techniques to the detection and evaluation of criminal evidence.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
49
Augmented reality provides information in real time.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
50
A criminal offense that employs any form of advanced or emerging technology in its commission is called a(n)________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
51
A criminal offense perpetrated through the use of biologically active substances,including chemicals,toxins,or disease-causing organisms in known as a(n)________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
52
The anonymous anthrax letters that caused five deaths in 2001 were a type of biocrime known as ________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
53
The most likely way for a criminal to break into a computer system is through ________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
54
Forensic entomology techniques may be used to reconstruct the likeness of a decomposed or dismembered body.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
55
________ is the analysis of firearms,ammunition,projectiles,bombs,and explosives.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
56
________ is a form of cybercrime that relies on social engineering by using official-looking email messages to elicit responses from victims.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
57
________ is a form of cybercrime that involves the theft of trade secrets or copyrighted information.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
58
HITMAN is the latest technology used by the FBI to track and capture mafia-related criminals.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
59
Illegally copying software programs is known as ________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
60
________ is unsolicited commercial email whose primary purpose is to advertise or promote a commercial product or service.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
61
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Spam
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
62
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Phishing
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
63
The criminal justice system's failure to correct problems that are red-flagged by ________ may be due to the system's tendency to ascribe blame to individuals rather than the system itself.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
64
Explain how and why social media is being used by law enforcement.Also discuss the problems that may result from the adoption of social media by law enforcement agencies.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
65
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Software piracy
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
66
________ involves creating useful products at a molecular level,such as microscopic cameras or recording devices.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
67
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Malware
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
68
What is biocrime? Discuss the various ways biocrimes may be committed,and include a discussion of bioterrorism.Provide examples of biocrimes and explain why biocrime is a major concern today.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
69
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
Forensic anthropology
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
70
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
Forensic entomology
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
71
________ systems focus on cargo and luggage and collects and analyzes particles left behind when narcotics and explosives contraband are packaged and handled.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
72
HITMAN and NCVAC are examples of ________ designed to duplicate the decision-making processes of skilled investigators.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
73
The ________ is a volunteer organization that uses DNA technology to investigate and challenge dubious convictions.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
74
Define criminalistics.Explain three methods used to identify individuals.Which of these do you think is the most useful for law enforcement and why?
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
75
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
AFIS
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
76
Law enforcement practitioners of the future will be aided in their criminalistics work by a number of technologies.List and define three of the new technologies that aid law enforcement in solving crime.Explain which of these technologies you feel is the best and why.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
77
Match the biometric technique to its definition.

A)The analysis of firearms and explosives
B)Fingerprinting
C)Studying insects to determine issues such as the time of death
D)Reconstructing the likeness of a decomposed or dismembered body
Ballistics
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
78
When a decomposed body is discovered,a model of the deceased individual may be created by forensic ________.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
79
Match the cybercrime to its definition.

A)Unsolicited commercial bulk email whose primary purpose is to advertise or promote a commercial product or service
B)The use of official-looking email messages to elicit response from victims by directing them to phony websites
C)The illegal transfer of data from one storage medium to another
D)A computer program designed to secretly invade a computer system and modify the way it operates or alter the information stored in the system
E)Malicious computer programs such as worms or Trojan horses
Computer virus
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
80
What is Augmented Reality (AR)? It is predicted that AR systems will soon be available and that will provide "wired" officers with new capabilities.List and describe three of those new capabilities.Explain your thoughts on the potential benefits and drawbacks to each new technology.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 83 flashcards in this deck.