Deck 14: Crimes of the New Millennium: Cyber Crime, Technology, and Transnational Organized Crimes
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/88
Play
Full screen (f)
Deck 14: Crimes of the New Millennium: Cyber Crime, Technology, and Transnational Organized Crimes
1
Even the federal government can fall victim to scams as the IRS is expected to lose as much as $21 billion in revenue between 2012 and 2017 due to identity theft.
True
2
It is estimated that revenue generated from adult sites each year is greater than all movie box office sales and the combined income of ABC, NBC, and CBS.
True
3
Cyberstalking refers to the use of the Internet to steal one's identity for profit.
False
4
Online gambling casinos have proven particularly vulnerable to DoS attacks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
5
The concept of phishing is also known as carding or spoofing.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
6
While email is the most common form of spam, many are not aware that viruses and spam can be sent in the form of instant messaging, online forums, social media and even text messaging.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
7
Criminals have become more technologically sophisticated, routinely using the Internet to carry out their criminal conspiracies.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
8
The most typical use of cyberspace for destructive intent comes in the sending or implanting of disruptive programs, called viruses or worms.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
9
Cybercrimes are vast in scope and place a heavy burden on society
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
10
It is estimated that the revenue generated from adult sites each year is greater than all movie box office sales and the combined income of ABC, NBC, and CBS.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
11
Cyberespionage efforts are well-practiced by Chinese organizations, one of which is known as the Titan Rain and has penetrated NASA computers.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
12
While many feel the United States is not vulnerable to cyber attacks, a Chinese espionage ring known as the Titan Rain was able to penetrate a U.S. military base and NASA obtaining the U.S. Army's flight-planning software.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
13
Recent research by Hinduja and Patchin on cyberbullying has found that roughly 46 percent of high school students surveyed had been a victim of cyberbullying and nearly 62 percent reported perpetrating cyberbullying.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
14
The biggest hurdle with deterring file sharing crimes is that the U.S. Criminal Code fails to provide any penalties for first-time offenders in the form of fines or prison time.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
15
In 1998, the United States passed the Identity Theft and Assumption Deterrence Act to meet the threat of phishing and identity theft crimes.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
16
The illegal sale of counterfeit goods and illegal use of intellectual property to commit crime, such as stock manipulation, have been used to support terrorist activities.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
17
ATM skimming involves the use of electronic devices or cameras to copy personal information from a bank card or a bank card's magnetic strip.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
18
Because of strict federal laws, identity theft has decreased at surprising rates over the past few years.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
19
The cyber age has generated an enormous amount of revenue and information sharing, with an estimated 190 billion email messages sent per day.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
20
Defacers are typically members of an extensive social network who are eager to demonstrate their reasons for hacking and often leave calling cards, greetings, and taunts on the webpages they corrupt.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
21
Malicious attacks aimed at disrupting, defacing, and destroying technology.
A) Cybervandalism
B) Cyberwar
C) Cyberterrorism
D) Cyber malware
A) Cybervandalism
B) Cyberwar
C) Cyberterrorism
D) Cyber malware
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
22
A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit.
A) Theft of information
B) Manipulation
C) Corporate espionage
D) Skimming
A) Theft of information
B) Manipulation
C) Corporate espionage
D) Skimming
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
23
One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
24
The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts?
A) Computer Fraud and Abuse Act
B) Federal Lautenberg Act
C) RICO Act
D) Copyright Infringement Act
A) Computer Fraud and Abuse Act
B) Federal Lautenberg Act
C) RICO Act
D) Copyright Infringement Act
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
25
The primary means of income for transnational organized crime groups are by using force to enter into and maximize profits in legitimate businesses.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
26
Organized crime in the United States is a local commodity, controlled by five Mafia families in New York, Pittsburgh, Miami, Chicago, and Seattle.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
27
The Convention on Cybercrime, ratified by the U.S. Senate in 2006, was the first international treaty to address the definition and enforcement of cybercrime.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
28
Spear-phishing attacks have decreased between 2013 and 2014 due to the creation of the U.S. Anti-Trust and Reinforcement Act which penalizes first time offenders with life in prison.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is not true in regard to drug distribution and the Internet?
A) While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy.
B) Often drugs sold on the Internet are adulterated, expired, or the wrong dose.
C) Numerous websites provide prescriptions written by cyber doctors.
D) There are no controls for preventing children from ordering drugs.
A) While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy.
B) Often drugs sold on the Internet are adulterated, expired, or the wrong dose.
C) Numerous websites provide prescriptions written by cyber doctors.
D) There are no controls for preventing children from ordering drugs.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not true about the "cyber age" according to the text?
A) Facebook reached 10 million users in 2015.
B) There are over 500 million tweets a day.
C) Nearly 4 billion industries use email.
D) Over 190 billion email messages are sent daily.
A) Facebook reached 10 million users in 2015.
B) There are over 500 million tweets a day.
C) Nearly 4 billion industries use email.
D) Over 190 billion email messages are sent daily.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
31
Catherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______.
A) Trojan horse
B) salami slice fraud
C) Ponzi scheme
D) warez scheme
A) Trojan horse
B) salami slice fraud
C) Ponzi scheme
D) warez scheme
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
32
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet.
A) Cybercrime
B) Organized crime
C) Connected crime
D) Technology crime
A) Cybercrime
B) Organized crime
C) Connected crime
D) Technology crime
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
33
Efforts to combat transnational organized crime are typically in the hands of federal agencies
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is true about ATM skimming crimes?
A) Devices are typically undetectable
B) Devices are usually placed only for a short time
C) Phony keyboards are sometimes attached
D) All of the above
A) Devices are typically undetectable
B) Devices are usually placed only for a short time
C) Phony keyboards are sometimes attached
D) All of the above
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
35
Transnational organized crime is a conspiratorial activity, involving the coordination of numerous people in the planning and execution of illegal acts or in the pursuit of a legitimate objective by unlawful means.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
36
Based in Fairmont, WV, the Internet Crime Complaint Center is run by the FBI and the National White Collar Crime Center with the goal to analyze fraud-related complaints.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
37
A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.
A) Warez
B) Phishing
C) Suarez
D) Salami slice
A) Warez
B) Phishing
C) Suarez
D) Salami slice
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
38
Even though United States and international law agencies work together, if a transnational group is destroyed and if monetary gain is readily available, it is quickly replaced.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
39
Since the fall of the Soviet Union in 1991, Russian organized crime groups have become almost obsolete.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a form of computer crime?
A) Theft of information
B) Corporate espionage
C) Manipulation of accounts
D) All of the above are computer crimes
A) Theft of information
B) Corporate espionage
C) Manipulation of accounts
D) All of the above are computer crimes
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
41
Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______.
A) cyberespionage
B) cyberspying
C) cybervandalism
D) cyberterrorism
A) cyberespionage
B) cyberspying
C) cybervandalism
D) cyberterrorism
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is true about Asian transnational crime groups?
A) Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian women to Eastern Europe and Thailand for the sex trade
B) The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of methamphetamines
C) The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of the largest growing groups on the west coast of the United States
D) In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics
A) Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian women to Eastern Europe and Thailand for the sex trade
B) The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of methamphetamines
C) The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of the largest growing groups on the west coast of the United States
D) In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
43
David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his $80 million dollar cyber attack in the form of a ______.
A) computer worm
B) Trojan horse
C) slag code
D) logic bomb
A) computer worm
B) Trojan horse
C) slag code
D) logic bomb
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
44
Latin American and Mexican cartels primary method of income is through ______.
A) drug sales and drug smuggling
B) human trafficking
C) gambling
D) loan sharking
A) drug sales and drug smuggling
B) human trafficking
C) gambling
D) loan sharking
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
45
Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy.
A) RICO
B) G.R.E.A.T.
C) Federal Lautenberg
D) Transnational Anti-Criminal Organization (TACO) Act
A) RICO
B) G.R.E.A.T.
C) Federal Lautenberg
D) Transnational Anti-Criminal Organization (TACO) Act
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
46
Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______.
A) denial-retrial
B) Trojan horse
C) warez
D) denial-of-service attack
A) denial-retrial
B) Trojan horse
C) warez
D) denial-of-service attack
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
47
Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______.
A) shoplisting
B) entail fraud
C) phishing
D) mass marketing fraud
A) shoplisting
B) entail fraud
C) phishing
D) mass marketing fraud
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
48
The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency?
A) DEA
B) FBI
C) CIA
D) INS
A) DEA
B) FBI
C) CIA
D) INS
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
49
The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information
A) phishing
B) warez
C) dumpster diving
D) spearing
A) phishing
B) warez
C) dumpster diving
D) spearing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
50
The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______.
A) cyberbullying
B) cyberspying
C) cyberabuse
D) cyberstalking
A) cyberbullying
B) cyberspying
C) cyberabuse
D) cyberstalking
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
51
What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law?
A) It protected classified U.S defense and foreign relations information.
B) It made identity theft a separate crime against the individual whose identity was stolen.
C) It created a federal insurance program to assist victims of computer fraud.
D) All of the above
A) It protected classified U.S defense and foreign relations information.
B) It made identity theft a separate crime against the individual whose identity was stolen.
C) It created a federal insurance program to assist victims of computer fraud.
D) All of the above
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is true about the Convention on Cybercrime, ratified in 2006?
A) It was the first international treaty to address the definition and enforcement of cybercrime
B) It has been signed by 70 nations
C) It fails to address a common legal framework to eliminate jurisdictional hurdles
D) All of the above
A) It was the first international treaty to address the definition and enforcement of cybercrime
B) It has been signed by 70 nations
C) It fails to address a common legal framework to eliminate jurisdictional hurdles
D) All of the above
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
53
Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.
A) theft of information
B) manipulation of accounts
C) corporate espionage
D) warez
A) theft of information
B) manipulation of accounts
C) corporate espionage
D) warez
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following best depicts a phishing scheme?
A) Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after failing to earn tenure
B) Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her colleagues
C) Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use
D) Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up the price, and allowing her to sell her shares at an inflated price
A) Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after failing to earn tenure
B) Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her colleagues
C) Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use
D) Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up the price, and allowing her to sell her shares at an inflated price
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is false in regard to cyberbullying?
A) Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
B) Adolescent girls are significantly more likely to have experienced cyberbullying than boys.
C) Cyberbullying can happen via the computer or cellphone.
D) 17 percent of students in a recent survey say they have harassed someone online.
A) Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
B) Adolescent girls are significantly more likely to have experienced cyberbullying than boys.
C) Cyberbullying can happen via the computer or cellphone.
D) 17 percent of students in a recent survey say they have harassed someone online.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is most true about the group known as the Surenos?
A) They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major player in the distribution of cocaine and heroin along border towns in Texas.
B) They are one of the largest groups in the world involved in human trafficking, preying on the young women in the poorest regions and eventually selling them into sexual slavery.
C) They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons.
D) None of the above
A) They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major player in the distribution of cocaine and heroin along border towns in Texas.
B) They are one of the largest groups in the world involved in human trafficking, preying on the young women in the poorest regions and eventually selling them into sexual slavery.
C) They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons.
D) None of the above
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is false in regard to denial-of-service (DoS) attacks?
A) DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party
B) Even respectable businesspeople have been accused of launching DoS attacks against rival businesses
C) Online, offshore, gambling sites are particularly vulnerable to DoS attacks
D) Many U.S organizations have been affected by DoS attacks, including New York City email accounts and Rutgers University
A) DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party
B) Even respectable businesspeople have been accused of launching DoS attacks against rival businesses
C) Online, offshore, gambling sites are particularly vulnerable to DoS attacks
D) Many U.S organizations have been affected by DoS attacks, including New York City email accounts and Rutgers University
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is false about transnational organized crime?
A) It usually does not include drug sales but is more inclined to commit business-related crimes.
B) It is usually structured along hierarchical lines.
C) Groups are quick and effective in controlling and disciplining members.
D) They do not include terror organizations.
A) It usually does not include drug sales but is more inclined to commit business-related crimes.
B) It is usually structured along hierarchical lines.
C) Groups are quick and effective in controlling and disciplining members.
D) They do not include terror organizations.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is false in regard to Russian organized crime groups in the United States?
A) They are involved primarily in frauds and scams.
B) They are involved in health care fraud.
C) They are primary players in drug trafficking.
D) They are believed to be a major player in credit card fraud.
A) They are involved primarily in frauds and scams.
B) They are involved in health care fraud.
C) They are primary players in drug trafficking.
D) They are believed to be a major player in credit card fraud.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following would be an example of a cyber smear scam?
A) Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase
B) Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attempt to make a quick profit
C) Ryan steals the identity of his biology professors and using his credit card information to purchase his books for the system; afterward he quickly dumps the card to eliminate the trace
D) Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior drug use on Instagram
A) Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase
B) Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attempt to make a quick profit
C) Ryan steals the identity of his biology professors and using his credit card information to purchase his books for the system; afterward he quickly dumps the card to eliminate the trace
D) Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior drug use on Instagram
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
61
A __________________ involves placing deceptive information online to get unsuspecting investors interested in a stock while those spreading the information sell previously purchased stock at an inflated price.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
62
After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______.
A) phishing
B) cyber smear
C) a pump and dump
D) spear-phishing
A) phishing
B) cyber smear
C) a pump and dump
D) spear-phishing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
63
______________ fraud consists of the illegal buying and selling of merchandise on the Internet.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
64
A malicious software program may also be called _________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
65
A computer program that looks like a benign application but contains illicit codes that can damage the system operations is called a ______________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?
A) Red Wa
B) Jao Pho
C) Triads
D) Fuk Ching
A) Red Wa
B) Jao Pho
C) Triads
D) Fuk Ching
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
67
Using the Internet to impersonate the victim in order to conduct illicit transactions such as fraud is called ________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
68
A ____________ occurs when negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
69
In the case of MGM Studios, INC v. Grokster, Ltd. found that peer-to-peer ______________ sites are another form of illegal copyright infringement and are punishable by fines and or confinement.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
70
Malicious attacks aimed at disrupting, defacing, and destroying technology are referred to as _______________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
71
A _________________ is a program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal, such as a date, to appear.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
72
Illegally removing small sums from the balances of a large number of accounts and converting them for person use is a term known as _______________________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
73
The use of computer networks for criminal profits, copyright infringements, identity theft, and Internet securities are examples of cyber-crimes called ___________________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
74
Extorting money from an Internet service user by threatening to prevent the user from having access to the service is called a _______________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
75
Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. Answer the following questions: One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______.
A) file sharing
B) salami slicing
C) warez
D) skimming
A) file sharing
B) salami slicing
C) warez
D) skimming
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
76
Criminal conspiracies that cross national and international borders and involve the planning and execution of illicit ventures by groups or networks in more than one country is known as _______.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
77
Computer _____________ are programs that attack computer networks by self-replicating and sending themselves to other users, generally via email without the aid of the operator.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
78
___________________ is a term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
79
Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud?
A) Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund
B) Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same merchandise and returns the stolen product for cash
C) Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information via an online blog about the success of the company, increasing the stock price, and having her friends sell at an inflated rate
D) David spread negative information about the university online in an attempt to hold the university ransom unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information
A) Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund
B) Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same merchandise and returns the stolen product for cash
C) Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information via an online blog about the success of the company, increasing the stock price, and having her friends sell at an inflated rate
D) David spread negative information about the university online in an attempt to hold the university ransom unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
80
__________________ is defined as the theft or destruction of information, resources, or funds via computers, computer networks, or the Internet.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck