Deck 14: Todays Challenges in Criminal Justice
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
Play
Full screen (f)
Deck 14: Todays Challenges in Criminal Justice
1
Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual who provides "material support or resources" to a "terrorist organization"?
A) Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B) Criminal Justice Model
C) The Liberty Seven
D) USA Patriot Act
A) Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B) Criminal Justice Model
C) The Liberty Seven
D) USA Patriot Act
A
2
A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n):
A) virus.
B) botnet.
C) worm.
D) spam.
A) virus.
B) botnet.
C) worm.
D) spam.
C
3
:The primary purpose of the AEDPA is to fight terrorism by:
A) easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects.
B) creating harsher penalties for those convicted of terrorist acts.
C) cutting off the financial support funneled to terrorist organizations.
D) establishing the Department of Homeland Security.
A) easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects.
B) creating harsher penalties for those convicted of terrorist acts.
C) cutting off the financial support funneled to terrorist organizations.
D) establishing the Department of Homeland Security.
C
4
When the perpetrator uses the Internet or some form of electronic communication to harass and stalk the victim, this is known as:
A) phishing.
B) intellectual property theft.
C) cyberbullying.
D) cyberstalking.
A) phishing.
B) intellectual property theft.
C) cyberbullying.
D) cyberstalking.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
The________ Amendment to the U.S. Constitution states, "A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed."
A) Second
B) Fourth
C) Fifth
D) Sixth
A) Second
B) Fourth
C) Fifth
D) Sixth
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
The ________ has become the lead agency when it comes to white-collar crime, particularly in response to recent financial scandals.
A) FBI
B) CIA
C) FDA
D) DEA
A) FBI
B) CIA
C) FDA
D) DEA
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT one of the designations of being "mentally defective"?
A) is a danger of herself or himself to others
B) lacks the mental capacity to manage his or her own affairs
C) has been found insane or incompetent to stand trial by a criminal or military court
D) has a history of hurting animals
A) is a danger of herself or himself to others
B) lacks the mental capacity to manage his or her own affairs
C) has been found insane or incompetent to stand trial by a criminal or military court
D) has a history of hurting animals
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Any criminal activity occurring via a computer in the virtual community of the Internet is a:
A) cybercrime.
B) white-collar crime.
C) property crime.
D) computer crime.
A) cybercrime.
B) white-collar crime.
C) property crime.
D) computer crime.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
In a military tribunal, there is no right to trial by jury, as guaranteed by the Amendment.
A) Fourth
B) Fifth
C) Sixth
D) Eighth
A) Fourth
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
When a consumer orders an item online and it is never delivered, this is an example of:
A) white-collar crime.
B) cyber theft.
C) online retail fraud.
D) online auction fraud.
A) white-collar crime.
B) cyber theft.
C) online retail fraud.
D) online auction fraud.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
The theft of personal information is known as:
A) cyber theft.
B) cyberstalking.
C) cyber fraud.
D) identity theft.
A) cyber theft.
B) cyberstalking.
C) cyber fraud.
D) identity theft.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is an example of intellectual property?
A) books
B) films
C) music
D) all of these
A) books
B) films
C) music
D) all of these
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
The Antiterrorism and Effective Death Penalty Act was passed in response to:
A) September 11, 2001.
B) the Oklahoma City Bombing.
C) Pearl Harbor.
D) the anthrax mailings.
A) September 11, 2001.
B) the Oklahoma City Bombing.
C) Pearl Harbor.
D) the anthrax mailings.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
What is the preferred method of phishing?
A) hacking
B) spam
C) worms
D) viruses
A) hacking
B) spam
C) worms
D) viruses
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT a characteristic of a white-collar criminal?
A) has legal access to the place where the crime occurs
B) uses physical means to get somewhere he or she should not be
C) is spatially separated from the victim
D) behaves in a manner that is legitimate
A) has legal access to the place where the crime occurs
B) uses physical means to get somewhere he or she should not be
C) is spatially separated from the victim
D) behaves in a manner that is legitimate
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT one of the struggles or exertions (jihad) required of the Muslim faith?
A) the struggle against modernization
B) the struggle against evil in oneself
C) the struggle against nonbelievers
D) the struggle against evil outside of oneself
A) the struggle against modernization
B) the struggle against evil in oneself
C) the struggle against nonbelievers
D) the struggle against evil outside of oneself
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:
A) electronic surveillance.
B) human-source collection.
C) open-source collection.
D) counterintelligence.
A) electronic surveillance.
B) human-source collection.
C) open-source collection.
D) counterintelligence.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
Osama bin Laden's al Qaeda group has its origins in:
A) Iraq.
B) Saudi Arabia.
C) Afghanistan.
D) Pakistan.
A) Iraq.
B) Saudi Arabia.
C) Afghanistan.
D) Pakistan.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
What is also known as "influence peddling" and occurs in the business world when somebody within a company sells influence, power, or information to a person outside the company who can benefit?
A) bribery
B) embezzlement
C) consumer fraud
D) tax evasion
A) bribery
B) embezzlement
C) consumer fraud
D) tax evasion
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Terrorists have evolved into_______ , free of control by or allegiance to any nation, and use violence to further political goals.
A) nonstate actors
B) enemy combatants
C) unlawful combatants
D) al Qaeda
A) nonstate actors
B) enemy combatants
C) unlawful combatants
D) al Qaeda
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
Case 14-2
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
After his first date with Julie, William expressed to Julie that he wants to continue seeing her. Julie told William to call her the next day. William called the next day and left a message for Julie. Julie did not return his phone call. William continued to call Julie several times a day and send her text messages and e-mails. As Julie continues to ignore his calls and messages William becomes angry and starts aggressively harassing her via e-mail and text message. William's behavior is considered to be:
A) cyberstalking.
B) cyberbullying.
C) phishing.
D) piracy.
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
After his first date with Julie, William expressed to Julie that he wants to continue seeing her. Julie told William to call her the next day. William called the next day and left a message for Julie. Julie did not return his phone call. William continued to call Julie several times a day and send her text messages and e-mails. As Julie continues to ignore his calls and messages William becomes angry and starts aggressively harassing her via e-mail and text message. William's behavior is considered to be:
A) cyberstalking.
B) cyberbullying.
C) phishing.
D) piracy.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
Spam is a computer program that can automatically replicate itself over a network and interfere with the normal use of a computer.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
Phishing scams have spread to text messaging and social-networking sites.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
Most cybercrimes are new crimes.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
Case 14-2
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Since James is out of work he is looking for any way to earn money. Besides using Julie to commit crimes against unsuspecting men for profit, James illegally copies online intellectual property such as films, music, and software. James' actions make him guilty of:
A) cyberstalking.
B) cyberbullying.
C) phishing.
D) piracy.
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Since James is out of work he is looking for any way to earn money. Besides using Julie to commit crimes against unsuspecting men for profit, James illegally copies online intellectual property such as films, music, and software. James' actions make him guilty of:
A) cyberstalking.
B) cyberbullying.
C) phishing.
D) piracy.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
White-collar crime is an official category of criminal behavior measured by the federal government in the Uniform Crime Report.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
Federal officials prosecute white-collar crime using the investigatory powers of several different federal law enforcement agencies.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
Case 14-2
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Julie begins corresponding with Bart. Bart becomes very interested in Julie quickly. He wants to meet her for dinner one evening. Julie tells Bart that she does not feel comfortable with Bart driving to her home. She tells him that she will meet him at the restaurant next Saturday. A few days later Julie sends Bart an e-mail and informs him that her car broke down and she does not have the money to repair it. Bart is eager to meet Julie for their planned dinner so he agrees to send Julie the money to fix her car. The misrepresentation that Julie made about her car to deceive Bart is called a(n):
A) cyberfraud.
B) online retail fraud.
C) identity theft.
D) white-collar crime.
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Julie begins corresponding with Bart. Bart becomes very interested in Julie quickly. He wants to meet her for dinner one evening. Julie tells Bart that she does not feel comfortable with Bart driving to her home. She tells him that she will meet him at the restaurant next Saturday. A few days later Julie sends Bart an e-mail and informs him that her car broke down and she does not have the money to repair it. Bart is eager to meet Julie for their planned dinner so he agrees to send Julie the money to fix her car. The misrepresentation that Julie made about her car to deceive Bart is called a(n):
A) cyberfraud.
B) online retail fraud.
C) identity theft.
D) white-collar crime.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
Case 14-2
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Julie's boyfriend James is a computer genius. He used to work as a programmer for a major computer software company but was terminated when he got into a fight with his supervisor. James is angry that he was terminated. He used his computer to break into the database of his old company to get all the information for all the clients. James's actions make him a(n):
A) botnet.
B) cyberstalker.
C) hacker.
D) pirate.
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Julie's boyfriend James is a computer genius. He used to work as a programmer for a major computer software company but was terminated when he got into a fight with his supervisor. James is angry that he was terminated. He used his computer to break into the database of his old company to get all the information for all the clients. James's actions make him a(n):
A) botnet.
B) cyberstalker.
C) hacker.
D) pirate.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
Terrorists have evolved into nonstate actors, free of control by or allegiance to any nation.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
The computer is the instrument of a crime such as when the computer itself is stolen.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
Case 14-2
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Julie eventually meets a man named William for dinner. After they have dinner, William leaves his credit card and driver's license on the table to pay for the meal. William excuses himself to go to the restroom. While William is gone Julie writes down his full name, driver's license number, and date of birth. She also writes down the number of the credit card and the expiration date. When Julie gets home she and her boyfriend James use William's information
To open up a credit card in his name. This crime is a(n):
A) cyberfraud.
B) online retail fraud.
C) identity theft.
D) white-collar crime.
Julie joins an online dating website. She plans on meeting men but not for the purpose of dating them. She already has a boyfriend named James. Julie and James plan to use the online dating website to commit various crimes against the unsuspecting men who respond to Julie's online profile.
Julie eventually meets a man named William for dinner. After they have dinner, William leaves his credit card and driver's license on the table to pay for the meal. William excuses himself to go to the restroom. While William is gone Julie writes down his full name, driver's license number, and date of birth. She also writes down the number of the credit card and the expiration date. When Julie gets home she and her boyfriend James use William's information
To open up a credit card in his name. This crime is a(n):
A) cyberfraud.
B) online retail fraud.
C) identity theft.
D) white-collar crime.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
Case 14-1
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
What law gives law enforcement officers the power to arrest and prosecute Bobby if it is determined that he has provided support to a foreign terrorist organization?
A) Antiterrorism and Effective Death Penalty Act
B) Foreign Intelligence Surveillance Act
C) Homeland Security Act
D) Patriot Act
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
What law gives law enforcement officers the power to arrest and prosecute Bobby if it is determined that he has provided support to a foreign terrorist organization?
A) Antiterrorism and Effective Death Penalty Act
B) Foreign Intelligence Surveillance Act
C) Homeland Security Act
D) Patriot Act
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
Case 14-1
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
What law allows the government to monitor and possibly apprehend Bobby if he is determined to be a suspected terrorist?
A) Antiterrorism and Effective Death Penalty Act
B) Foreign Intelligence Surveillance Act
C) Homeland Security Act
D) Patriot Act
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
What law allows the government to monitor and possibly apprehend Bobby if he is determined to be a suspected terrorist?
A) Antiterrorism and Effective Death Penalty Act
B) Foreign Intelligence Surveillance Act
C) Homeland Security Act
D) Patriot Act
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
About one third of American households possess at least one firearm.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following occurs in a military tribunal? a panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
A) all members of the panel or jury must agree to convict the individual
B) the defendant has a right to a trial by a jury
C)
D) the traditional rules of evidence apply
A) all members of the panel or jury must agree to convict the individual
B) the defendant has a right to a trial by a jury
C)
D) the traditional rules of evidence apply
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
Identity theft existed prior to the Internet.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
Because of federal inaction, it has been left to the individual states to pass stricter gun control measures, if their elected officials choose to do so.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
Case 14-1
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
Bobby ends up traveling overseas with another gentleman, Thomas, from his prayer group. They end up meeting with a terrorist group who want Bobby and Thomas to bomb the stadium during the Super Bowl. The leaders of the terrorist organization delineate the entire plan and tell Bobby and Thomas that $10,000 will be transferred into each of their bank accounts. Unknown to Bobby, Thomas is an undercover agent with the FBI who is there to gain information on Bobby and the terrorist organization. This undercover agent is utilizing what type of intelligence strategy?
A) electronic surveillance
B) human-source collection
C) counterintelligence
D) intelligence sharing
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
Bobby ends up traveling overseas with another gentleman, Thomas, from his prayer group. They end up meeting with a terrorist group who want Bobby and Thomas to bomb the stadium during the Super Bowl. The leaders of the terrorist organization delineate the entire plan and tell Bobby and Thomas that $10,000 will be transferred into each of their bank accounts. Unknown to Bobby, Thomas is an undercover agent with the FBI who is there to gain information on Bobby and the terrorist organization. This undercover agent is utilizing what type of intelligence strategy?
A) electronic surveillance
B) human-source collection
C) counterintelligence
D) intelligence sharing
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
Case 14-1
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
Bobby decides to take a return trip to the Middle East. His parents are very opposed. They express their concern to Bobby but he is intent to make the trip despite their objections. They are concerned that Bobby may decide to commit a terrorist act at the airport. What agency should Bobby's parents contact in order to ensure that he does not cause harm while on the plane?
A) FEMA
B) TSA
C) U.S. Citizenship and Immigration Services
D) U.S. Coast Guard
Bobby was born and raised in the United States. At the age of 16 he converted from Christianity to become a Muslim. At first his parents were not concerned as they wanted him to practice the religion of his choice. After Bobby returned home from a trip to the Middle East, his parents became very concerned about his extreme religious beliefs. Bobby's parents went through his belongings, including his computer, when he was meeting with his religious advisors one evening. They became alarmed because they found bomb-making training manuals and communications with people in the Middle East who appeared to be terrorists.
Bobby decides to take a return trip to the Middle East. His parents are very opposed. They express their concern to Bobby but he is intent to make the trip despite their objections. They are concerned that Bobby may decide to commit a terrorist act at the airport. What agency should Bobby's parents contact in order to ensure that he does not cause harm while on the plane?
A) FEMA
B) TSA
C) U.S. Citizenship and Immigration Services
D) U.S. Coast Guard
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
Sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information such as a password is known as____________ .
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
The goal for many law enforcement agencies is not to solve crimes after they have occurred, but to prevent them from happening.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
The application of computer technology to help find and utilize evidence of cyber crimes is called _______-.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making is
_______________________________.
_______________________________.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
Jihad means holy war.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
An investigation of a person's history to determine whether that person should be allowed a certain privilege, such as the ability to possess a firearm is called a _________.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
The Antiterrorism and Effective Death Penalty Act (AEDPA) was passed in response to the 1995 truck bombing of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
The computer is the_____ of a crime, such as when the computer itself or its software is stolen.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
______________ is the process of encoding information stored in computers in such a way that only authorized parties have access to it.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
___________is the criminal action of being involved in an organized effort to engage in illegal business transactions.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
The Sixth Amendment guarantees only U.S. Citizens the right to due process.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
Intellectual property such as books, films, music, and software is vulnerable to ______, which is the unauthorized copying and use of the property.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
The_______ is a critical legal tool used in efforts to combat terrorism, because it permits law enforcement agents to arrest suspects even though no crime, in the traditional sense of the word, has taken place and no evident harm has been caused.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
The Patriot Act gives intelligence agents more leeway when conducting surveillance.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
A _______is a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
The goal of______ is not prevention or punishment as much as compliance, or the following of regulatory guidelines.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
is a technique used by a white-collar criminal where a dishonest stockbroker steals funds from a client rather than investing those funds in the stock market as promised.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
Terrorists have developed more efficient organizations based on the small-business model.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
___________is fraud committed over the Internet.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign intelligence services.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
A________ is a court that is operated by the military rather than the criminal justice system and is presided over by military officers rather than judges.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
Explain how the Internet has contributed to piracy of intellectual property.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
Identify the four federal regulatory agencies that deal with whitecollar crime.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
Describe botnets, worms, and viruses.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
Identify three main techniques used by white-collar criminals to carry out their crimes.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
Explain how American law enforcement agencies have used "preventive policing" to combat terrorism.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
How are white-collar crimes different from violent or property crime?
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
Explain how the Patriot Act has made it easier for federal agencies to conduct searches and conduct surveillance during terrorism investigations.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA). Why is the AEDPA such an important legal tool against terrorists?
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
With the advent of the Internet, child pornography became much easier to disseminate. Explain the three reasons for this development.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
Identify and discuss three important trends in international terrorism.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck