Deck 14: Homeland Security and Cyber Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/70
Play
Full screen (f)
Deck 14: Homeland Security and Cyber Crime
1
Osama bin Laden's al Qaeda group has its origins in:
A)Iraq
B)Saudi Arabia
C)Afghanistan
D)Pakistan
A)Iraq
B)Saudi Arabia
C)Afghanistan
D)Pakistan
C
2
Terrorists have evolved into ____, free of control by or allegiance to any nation, and use violence to further political goals such as the formation or destruction of a particular government.
A)Nonstate actors
B)Enemy combatants
C)Unlawful combatants
D)al Qaeda
A)Nonstate actors
B)Enemy combatants
C)Unlawful combatants
D)al Qaeda
A
3
The lead federal agency in the investigation of all terrorism related matters is the:
A)U.S.Secret Service
B)Federal Bureau of Investigation
C)National Security Agency
D)Central Intelligence Agency
A)U.S.Secret Service
B)Federal Bureau of Investigation
C)National Security Agency
D)Central Intelligence Agency
B
4
The AEDPA was passed in response to:
A)September 11, 2001
B)The Oklahoma City Bombing
C)Pearl Harbor
D)The anthrax mailings
A)September 11, 2001
B)The Oklahoma City Bombing
C)Pearl Harbor
D)The anthrax mailings
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
5
Which agency handles the "paperwork" side of U.S.immigration law?
A)The U.S.Customs and Border Patrol
B)The Immigration and Naturalization Services
C)The Transportation Security Administration
D)The United States Citizenship and Immigration Services
A)The U.S.Customs and Border Patrol
B)The Immigration and Naturalization Services
C)The Transportation Security Administration
D)The United States Citizenship and Immigration Services
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
6
According to homeland security expert Brian Jenkins, all of the following are trends in terrorism EXCEPT:
A)Terrorist attacks are becoming more violent
B)Terrorists are becoming more organized
C)The number of nations being controlled by terror groups has risen
D)Terrorist are getting better at mounting global campaigns
A)Terrorist attacks are becoming more violent
B)Terrorists are becoming more organized
C)The number of nations being controlled by terror groups has risen
D)Terrorist are getting better at mounting global campaigns
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
7
Under this model, terrorism is treated like any other crime, and the law enforcement, court, and correctional systems work together to deter terrorist activity through the threat of arrest and punishment:
A)Criminal Justice Model
B)Military Model
C)Intelligence Model
D)War on Terror Model
A)Criminal Justice Model
B)Military Model
C)Intelligence Model
D)War on Terror Model
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
8
The term al Qaeda means:
A)The base
B)The struggle
C)Holy war
D)Terrorist
A)The base
B)The struggle
C)Holy war
D)Terrorist
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
9
The intelligence agency that is responsible for protecting U.S.government communications and producing intelligence by monitoring foreign communications is the:
A)Central Intelligence Agency
B)National Security Agency
C)Federal Bureau of Investigation
D)U.S.Secret Service
A)Central Intelligence Agency
B)National Security Agency
C)Federal Bureau of Investigation
D)U.S.Secret Service
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT a duty of first responders?
A)Securing the scene
B)Investigating reports of terrorist threats
C)Rescuing the injured
D)Retrieving those who have been killed
A)Securing the scene
B)Investigating reports of terrorist threats
C)Rescuing the injured
D)Retrieving those who have been killed
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT one of the struggles or exertions (Jihad) required of the Muslim faith?
A)The struggle against modernization
B)The struggle against evil in oneself
C)The struggle against non-believers
D)The struggle against evil outside of oneself
A)The struggle against modernization
B)The struggle against evil in oneself
C)The struggle against non-believers
D)The struggle against evil outside of oneself
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
12
Placing undercover agents in a position to gain information from hostile foreign intelligence services is a form of:
A)Electronic surveillance
B)Human-source collection
C)Open-source collection
D)Counterintelligence
A)Electronic surveillance
B)Human-source collection
C)Open-source collection
D)Counterintelligence
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ regards terrorist activities as threats to the security of the state rather than as criminal acts.
A)Criminal Justice Model
B)Intelligence Model
C)Military Model
D)War on Terror Model
A)Criminal Justice Model
B)Intelligence Model
C)Military Model
D)War on Terror Model
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
14
The term Jihad means:
A)The base
B)The struggle
C)Holy war
D)Terrorist
A)The base
B)The struggle
C)Holy war
D)Terrorist
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following agencies is NOT part of the Department of Homeland Security?
A)The Federal Bureau of Investigation
B)The U.S.Customs and Border Protection
C)The U.S.Coast Guard
D)The U.S.Secret Service
A)The Federal Bureau of Investigation
B)The U.S.Customs and Border Protection
C)The U.S.Coast Guard
D)The U.S.Secret Service
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
16
Prior to the formation of the Department of Homeland Security, disaster management at the federal level was primarily the responsibility of:
A)The Federal Bureau of Investigation (FBI)
B)The Federal Emergency Management Agency (FEMA)
C)The Red Cross
D)The National Guard
A)The Federal Bureau of Investigation (FBI)
B)The Federal Emergency Management Agency (FEMA)
C)The Red Cross
D)The National Guard
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
17
The recruitment of foreign agents and interviews with people who have particular knowledge about areas of interest is known as:
A)Human- source collection
B)Open- source collection
C)Counterintelligence
D)Surveillance
A)Human- source collection
B)Open- source collection
C)Counterintelligence
D)Surveillance
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
18
Which piece of legislation gives federal law enforcement officers the power to arrest and prosecute any individual who provides "material support or resources" to a "terrorist organization?"
A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
19
The primary purpose of the AEDPA is to fight terrorism by
A)Easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects
B)Creating harsher penalties for those convicted of terrorist acts
C)Cutting off the financial support funneled to terrorist organizations
D)Establishing the Department of Homeland Security
A)Easing the Fourth Amendment requirements of search and seizure to allow federal law enforcement agents quicker access to terror suspects
B)Creating harsher penalties for those convicted of terrorist acts
C)Cutting off the financial support funneled to terrorist organizations
D)Establishing the Department of Homeland Security
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ is a critical legal tool used in efforts to combat terrorism, because it permits law enforcement agents to arrest suspects even though no crime, in the traditional sense of the word, has taken place and no evident harm has been caused.
A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
A)Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
B)Criminal Justice Model
C)The Liberty Seven
D)USA Patriot Act
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following occurs in a military tribunal?
A)All members of the panel or jury must agree to convict the individual
B)The defendant has a right to a trial by a jury
C)A panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
D)The traditional rules of evidence apply
A)All members of the panel or jury must agree to convict the individual
B)The defendant has a right to a trial by a jury
C)A panel of military officers acts in place of the judge and jury and decides questions of "both fact and law"
D)The traditional rules of evidence apply
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
22
In a military tribunal, there is no right to trial by jury, as guaranteed by the ____ Amendment.
A)Fourth
B)Fifth
C)Sixth
D)Eighth
A)Fourth
B)Fifth
C)Sixth
D)Eighth
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
23
Which Amendment protects against unreasonable searches and seizures?
A)Fourth
B)Fifth
C)Sixth
D)Eighth
A)Fourth
B)Fifth
C)Sixth
D)Eighth
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
24
The theft of personal information is known as _____________.
A)Cyber theft
B)Cyberstalking
C)Cyber fraud
D)Identity theft
A)Cyber theft
B)Cyberstalking
C)Cyber fraud
D)Identity theft
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
25
Because detainees being held at Guantanamo Bay were seized during a military campaign and were not American citizens, the ____ Amendment was not believed to apply to their incarceration.
A)Fourth
B)Fifth
C)Sixth
D)Eighth
A)Fourth
B)Fifth
C)Sixth
D)Eighth
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
26
Criminal activity which occurs via a computer in the virtual community of the Internet is a(n) ____________.
A)Cyber crime
B)Computer crime
C)White collar crime
D)Victimless crime
A)Cyber crime
B)Computer crime
C)White collar crime
D)Victimless crime
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
27
The connection between illegal aliens and terrorism in this country is:
A)Minimal
B)Nonexistent
C)Undeniable
D)Weak
A)Minimal
B)Nonexistent
C)Undeniable
D)Weak
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
28
Major differences between criminal courts and military tribunals include all of the following EXCEPT:
A)Military tribunals do not use juries
B)Defendants are not entitled to representation in military tribunals
C)Military tribunals are not bound by the rules of evidence
D)Military tribunals are not required to convict "beyond a reasonable doubt"
A)Military tribunals do not use juries
B)Defendants are not entitled to representation in military tribunals
C)Military tribunals are not bound by the rules of evidence
D)Military tribunals are not required to convict "beyond a reasonable doubt"
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
29
A document issued by the U.S.State Department that indicates the conditions under which the holder can remain in the United States is a ______________.
A)Passport
B)Identification card
C)Driver's License
D)Visa
A)Passport
B)Identification card
C)Driver's License
D)Visa
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
30
Each year, an estimated ____ non-U.S.citizens, unable to secure visas, enter the country illegally by crossing the large, unregulated stretches of our borders with Mexico and Canada.
A)Thousands
B)Tens of thousands
C)Hundreds of thousands
D)Millions
A)Thousands
B)Tens of thousands
C)Hundreds of thousands
D)Millions
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
31
A person who takes part in armed hostilities but who does not belong to the armed forces of a sovereign nation and, therefore, is not afforded protection under the Geneva Conventions is a(n):
A)Terrorist
B)State actor
C)Unlawful combatant
D)Enemy of the state
A)Terrorist
B)State actor
C)Unlawful combatant
D)Enemy of the state
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
32
In 2009, spam accounted for approximately ____________ of all emails.
A)7%
B)44%
C)86%
D)97%
A)7%
B)44%
C)86%
D)97%
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
33
___________ of all global computer attacks originate in the United States.
A)5%
B)18%
C)23%
D)55%
A)5%
B)18%
C)23%
D)55%
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
34
Any wrongful act that is directed against computers and computer parts or involves the abuse of software is a(n)
A)Cybercrime
B)White collar crime
C)Property crime
D)Computer crime
A)Cybercrime
B)White collar crime
C)Property crime
D)Computer crime
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
35
A software program that is capable of reproducing itself as it spreads from one computer to the next is a(n) ________________________.
A)Virus
B)Botnet
C)Worm
D)Spam
A)Virus
B)Botnet
C)Worm
D)Spam
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
36
In 2009, more than _______________ Americans reported victims of identity fraud.
A)250,000
B)1 million
C)3.5 million
D)11 million
A)250,000
B)1 million
C)3.5 million
D)11 million
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
37
For the sake of security, the majority of U.S.citizens favor:
A)The search of people at airports
B)The inspection of mail and other documents
C)The monitoring of phone calls
D)The monitoring of email
A)The search of people at airports
B)The inspection of mail and other documents
C)The monitoring of phone calls
D)The monitoring of email
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
38
When the perpetrator uses the internet or some form of electronic communication to harass and stalk the victim, this is known as ______________________.
A)Phishing
B)Intellectual property theft
C)Cyberbullying
D)Cyberstalking
A)Phishing
B)Intellectual property theft
C)Cyberbullying
D)Cyberstalking
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
39
When a consumer orders an item online and it is never delivered, this is an example of ___________.
A)White collar crime
B)Cyber theft
C)Online retail fraud
D)Online auction fraud
A)White collar crime
B)Cyber theft
C)Online retail fraud
D)Online auction fraud
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ Amendment holds that no person shall be deprived of life, liberty, or property without due process of law.
A)Fourth
B)Fifth
C)Sixth
D)Eighth
A)Fourth
B)Fifth
C)Sixth
D)Eighth
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
41
A botnet is a form of malware that is capable of reproducing itself when attached to an "infested" host file.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
42
The most successful way to protect computer information is to:
A)Avoid placing it on the Internet
B)Create a strong password
C)Encrypt it
D)Back up all data in two locations
A)Avoid placing it on the Internet
B)Create a strong password
C)Encrypt it
D)Back up all data in two locations
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
43
The AEDPA and the Patriot Act are both part of America's criminal justice model response to terrorism.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
44
AEDPA amended the law to allow the FBI to obtain warrants for "terrorism" investigations, "chemical weapons" investigations, or "computer fraud and abuse" investigations as long as agents can prove that such actions have a significant purpose.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
45
Most cyber crimes are new crimes.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
46
Nearly one-third of teens with Internet access report being the victims of cyberbullying.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
47
The Sixth Amendment guarantees only U.S.Citizens the right to due process.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
48
The criminal justice model response to terrorism involves treating terrorist activities as a threat to the security of the state rather than as criminal acts.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
49
Identity theft existed prior to the Internet.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
50
The ___________ has/have the primary responsibility for enforcing all federal criminal statutes involving computer crimes.
A)Secret Service
B)FBI
C)U.S.Marshals
D)ICE
A)Secret Service
B)FBI
C)U.S.Marshals
D)ICE
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
51
The goal for many law enforcement agencies is not to solve crimes after they have occurred, but to prevent them from happening.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
52
Terrorists have evolved into nonstate actors, free of control by or allegiance to any nation.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
53
Since September 11, 2001, the Federal Bureau of Investigation (FBI), a branch of the Department of Justice, has been the "lead federal agency" for all terrorism-related matters.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
54
The Sixth Amendment says that federal crimes should be tried:
A)In the district in which the offense was committed
B)In the district where the defendant resides
C)In the district where the victim resides
D)In Washington, D.C.
A)In the district in which the offense was committed
B)In the district where the defendant resides
C)In the district where the victim resides
D)In Washington, D.C.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
55
The Antiterrorism and Effective Death Penalty Act (AEDPA) was passed in response to the 1995 truck bombing of the Alfred P.Murrah Federal Building in Oklahoma City, Oklahoma.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
56
Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign intelligence services.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
57
The main goal of cyber forensics is to:
A)Gather digital evidence
B)Control the flow of images onto the Internet
C)Prosecute hackers
D)Educate citizens on the power of encryption
A)Gather digital evidence
B)Control the flow of images onto the Internet
C)Prosecute hackers
D)Educate citizens on the power of encryption
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
58
First responders are primary local law enforcement officers, firefighters and emergency medical technicians.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
59
Jihad means holy war.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
60
The application of computer technology to finding and utilizing evidence of cyber crimes is ______________.
A)Digital investigation
B)Cyber forensics
C)High-tech policing
D)Preventive policing
A)Digital investigation
B)Cyber forensics
C)High-tech policing
D)Preventive policing
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
61
Explain how American law enforcement agencies have used "preventive policing" to combat terrorism.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
62
Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA).Why is the AEDPA such an important legal tool against terrorists?
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
63
Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
64
An act of terrorism that is practiced within one's own country is ________________.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
65
Identify and discuss three important trends in international terrorism.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
66
The term ___________________ refers to the facilities and systems that provide the daily necessities of modern life, such as electric power, food, water, transportation and communication.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
67
____________________ is fraud committed over the Internet.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
68
The _________ Amendment provides that no person shall be deprived of life, liberty, or property without due process of law.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
69
Explain how the Patriot Act has made it easier for federal agencies to conduct searches during terrorism investigations.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
70
The ________________is the federal agency that has taken the lead in law enforcement efforts against cyber crime.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck