Deck 14: Criminal Justice in the New Millennium

Full screen (f)
exit full mode
Question
Bernie Madoff, the mastermind behind the largest criminal conspiracy in history, has been sentenced to death and is currently awaiting execution in a New York prison.
Use Space or
up arrow
down arrow
to flip the card.
Question
Many computer crimes are prosecuted under traditional criminal statutes such as larceny and fraud.
Question
It is estimated that more than half of all logging activities in the most vulnerable forest regions are conducted illegally.
Question
Cyber terrorism may result in a battered economy, requiring the government to spend more on the military and cut back on social programs and education.
Question
The Environmental Protection Agency (EPA) is the major enforcement agency against environmental crimes.
Question
Cyber vandalism occurs when a perpetrator carefully skims small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection
Question
Market manipulation is one of the three major types of Internet securities fraud that is common today.
Question
Civil libertarians are concerned that the USAPA permits investigations of a broad range of activities involving legitimate political dissent, not just terroristic activity.
Question
Law enforcement and the courts have traditionally been reluctant to throw corporate executives in jail.
Question
The conflict in the Ukraine between the Russian-backed separatists and government forces is an example of revolutionary terrorism.
Question
According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000, and a second-time offender will be incarcerated for 15 years.
Question
Retributive terrorism promotes the interests of a minority ethnic or religious group that believes it has been persecuted under majority or colonial rule.
Question
Carding and spoofing are concepts associated with mortgage fraud.
Question
To be considered illegal dumping, the wastes being dumped have to contain hazardous materials.
Question
In the case of the massive BP oil spill, the government had to show that company officials knew in advance that their actions would lead to the explosion/oil spill and chose to ignore the danger to prove a felony.
Question
The simplest way to define terrorism is to equate it with political goals.
Question
Large-scale investment growth has led to significant increase in the amount of fraud and misconduct on Wall Street.
Question
A Trojan horse is a benign application that contains illicit codes that can damage system operations.
Question
The USAPA expands the use of racial and ethnic profiling in transportation hubs such as airports and train stations.
Question
Cyberstalking usually pertains to threatening or harassing e-mail messages, instant messages, or blog entries that involve less threat of violence than cyber harassment.
Question
Human trafficking is a global problem, with an estimated 12 million adults and children in forced labor, bonded labor, and commercial sexual servitude at any given time.
Question
Illegal fishing can cause which of the following consequences?

A) Reduces the number of fish in a population before they can replenish themselves
B) Avoids appropriate processing fees, so it costs the government money
C) Discharges toxic materials back into the waterways, harming local wildlife
D) Destroys the chances for other fisherman to share in the profits
Question
Worldwide estimates for illegal logging activities account for products worth at least ______ per year.

A) $1 billion
B) $5 billion
C) $10 billion
D) $15 billion
Question
Demand for drugs by wealthy urban residents of east Asia has fueled and revitalized organized crime in that part of the world.
Question
__________ terrorism uses violence as a method of influence, persuasion, or intimidation to get people to accept their social, religious, or political views.

A) Revolutionary
B) Political
C) National
D) Retributive
Question
Enforcement of environmental laws, such as the Clean Water Act of 1972, is done by:

A) local governmental environmental agencies.
B) the US Environmental Protection Agency (EPA).
C) nonprofit environmental agencies.
D) the Public Works Administration (PWA).
Question
Efforts to control transnational organized crime are typically handled by local and state agencies working together.
Question
Asian transnational crime gangs have direct access to a vast majority of the world's heroin production.
Question
The Revolutionary Armed Forces of Colombia (FARC) represent the goals of what kind of terrorism?

A) Nationalist terrorism
B) Revolutionary terrorism
C) Cult terrorism
D) Criminal terrorism
Question
__________ terrorism uses violence to frighten those in power and their supporters and seeks to replace the existing government with a regime that holds acceptable political or religious views.

A) Revolutionary
B) Political
C) National
D) Retributive
Question
The process of creating a global economy through transnational markets and political and legal systems is referred to as transnationalism.
Question
_______are violations of existing criminal laws designed to protect people, the environment, or both.

A) Denial-of-service attacks
B) Habitat violations
C) Green crimes
D) Mortgage fraud schemes
Question
Globalization can be a device for criminal cartels to avoid prosecution and regulation and expand their markets and profits.
Question
Bernard Madoff, Enron, and Volkswagen all have committed this type of crime.

A) Globalization
B) Transnational
C) Green
D) Corporate enterprise
Question
The Racketeer Influenced and Corrupt Organizations (RICO) Act is designed to limit patterns of organized criminal activity by prohibiting involvement in acts intended to derive income from racketeering.
Question
The detection and enforcement of large-scale corporate crime is primarily in the hands of the:

A) US Securities and Exchange Commission (SEC).
B) US Postal Service (USPS).
C) Drug Enforcement Administration (DEA).
D) US Secret Service (USSS).
Question
Shifting alliances, change of location, and willingness of transnational gangs to use violence make the fight against global crime difficult.
Question
A _______ is an investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors.

A) Ponzi scheme
B) RICO scheme
C) Phishing scheme
D) denial-of-service attack
Question
Cyberbullying removes the protection of physical distance victims can use when they are bullied in person.
Question
Russian crime groups make extensive use of the state governmental apparatus to protect and promote their illegal activities.
Question
Which of the following is not a type of Internet securities fraud?

A) Identity theft
B) Market manipulation
C) Fraudulent offerings of securities
D) Illegal touting
Question
One reason it has proven difficult for law enforcement to combat drug cartels is because:

A) they work in conjunction with transnational crime groups like the Russian mob.
B) the properties where drugs are grown are disguised as migrant farms.
C) destroying the drug trade undermines the economies of third-world nations.
D) the RICO Act has backfired on the US government.
Question
Which of the following is not a form of cybervandalism?

A) Denial-of-service attack
B) Phishing
C) Web defacement
D) Trojan horse
Question
____ is the term used to describe the illegal use of the Internet to buy or sell merchandise online.

A) Cybertheft
B) E-tailing fraud
C) Market manipulation
D) Denial-of-service attack
Question
Which working group addresses the transnational aspects of Eurasian organized crime that impacts members' countries and the international community in general?

A) Eurasian Organized Crime Working Group
B) Southeast European Cooperative Initiative
C) Central European Working Group
D) None of the above
Question
Transnational crime groups are often involved in:

A) human trafficking.
B) gambling.
C) prostitution.
D) all of these.
Question
Congress has struggled to create legislation that will restrict objectionable use of Internet pornography without violating _____ Amendment freedoms.

A) First
B) Fifth
C) Sixth
D) Eighth
Question
Federal legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in two or more acts prohibited by 24 existing federal and 8 state laws is termed _________.

A) the enhancement penalty
B) RICO
C) the Travel Act
D) the Federation
Question
____is the illegal acquisition of personal information such as bank passwords and credit card numbers by masquerading as a trustworthy person/business in what appears to be an official electronic communication.

A) E-tailing fraud
B) Phishing
C) Cybertheft
D) Touting
Question
The United Nations estimates that immigrant smugglers earn about ____ per year smuggling an estimated 3 million people.

A) $7 million
B) $70 million
C) $7 billion
D) $70 billion
Question
Cybercrime is challenging because:

A) it is difficult to detect through traditional law enforcement channels.
B) it is rapidly evolving.
C) its control demands that agents of the justice system develop technical skills.
D) All of these make cybercrime challenging.
Question
Which of the following has been one of the most successful federal efforts to enforce cyber laws?

A) Digital Millennium Copyright Act
B) Counterfeit Access Device and Computer Fraud and Abuse Law
C) New York Electronic Crimes Task Force
D) The Interagency Telemarketing and Internet Fraud Working Group
Question
____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.

A) Warez
B) Denial-of-service attack
C) Market manipulation
D) Computer fraud
Question
Cyber ____ involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies to steal important data or to access their defenses.

A) terrorism
B) espionage
C) bullying
D) stalking
Question
A ____ is one type of malicious software program that disrupts or destroys existing programs and networks.

A) computer worm
B) computer virus
C) Trojan horse
D) cyberbully
Question
Crime groups from this country are believed to be the main perpetrators of credit card fraud in the United States.

A) Japan
B) Nigeria
C) Mexico
D) Russia
Question
Which type of cybervandalism appears as a benign application that actually contains codes that can damage the system operations?

A) Mydoom
B) Trojan horse
C) Malware
D) Chiseling
Question
The United States Criminal Code provides penalties for a first-time illegal copyright offender of ____ years incarceration and a fine of $250,000.

A) 3
B) 5
C) 7
D) 10
Question
Cyber ____ would shut down a critical national infrastructure to intimidate a government or civilian population.

A) theft
B) vandalism
C) warfare
D) espionage
Question
Large populations of ethnic Nigerians in India, Pakistan, and Thailand have given Nigerian criminal enterprises direct access to ____ percent of the world's heroin.

A) 60
B) 70
C) 80
D) 90
Question
Examples of ______ include illegal dumping, polluting, illegal fishing, and illegal logging.
Question
Laura picked up her phone one evening to find that the Microsoft help desk was calling. Her computer had been running slowly for a while, but she hadn't yet contacted Microsoft to get help. She was pleased to hear that they had found malware on her computer and were calling to assist her in removing it. Laura had previously been a victim of a phishing scheme, so she knew not to give any personal information, but they didn't ask for her credit card information or social security number so she figured they were really going to help. The Microsoft Help desk has asked Laura to go to a website and verify her information so they can help fix her computer. She sees all of her information on the page even though she hasn't given them any information. What type of crime has Laura become a victim of?

A) E-tailing fraud
B) Trojan horse
C) Phishing
D) Warez
Question
Hamas is an example of _____ terrorism.
Question
Lone wolves fall into the category of ______ terrorists.
Question
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people who had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper. If Abraham's father is back in touch with the people who have ties to Al Qaeda, and may even be working with them, with which goal of terrorism do they most likely align?

A) Retributive terrorism
B) Nationalist terrorism
C) State-sponsored terrorism
D) Revolutionary terrorism
Question
____________________ is cybercrime with malicious intent, to satisfy the desire for revenge, and to inflict wanton destruction.
Question
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people who had ties to Al Qaeda, but he doesn't speak with them anymore. Before Abraham was born his father came to the United States for a job with Microsoft. His father remembers when he was a youth the death squads and the terror that was felt by all where he grew up. What type of terrorism did Abraham's father likely experience?

A) State-sponsored terrorism
B) Evolutionary terrorism
C) Nationalist terrorism
D) Political terrorism
Question
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people who had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper. Abraham knows the Federal Bureau of Investigation (FBI) is tailing him, but he doesn't know why and believes it is illegal. What recourse does he have as an American citizen?

A) He can file a petition that his Fourth Amendment rights have been violated.
B) None. Conducting surveillance of "lone wolves" is legal under the USAPA.
C) Confront the FBI. USAPA is only allowed to monitor computers and phones.
D) File a complaint with the police and get a restraining order.
Question
____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Question
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms with their current salary, there was little documentation required, and everybody won. The buyers got their house and QXQ got paid. Steve and Jennie got a stated income loan in 2008 from QXQ. As it turns out, they lied on their application and said they made more money than they actually do. Just a couple of months later they couldn't make their payments and defaulted on their mortgage. Who or what is at fault?

A) Steve and Jennie
B) Securitization
C) Management fraud
D) QXQ, the mortgage company
Question
______________ is a type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information.
Question
____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.
Question
The USAPA was passed in ____ to give sweeping new powers to domestic law enforcement and international intelligence to fight terrorism.
Question
_______________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.
Question
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms with their current salary, there was little documentation required, and everybody won. The buyers got their house and QXQ got paid. Andrew works for QXQ as an investor. He only takes clients who have at least $500,000 to invest. He has been touting this new hedge fund that he himself has invested in. It is promising 20 percent returns every year. He just signed up the Jones family. If this scenario turns out to be a Ponzi scheme, what will likely happen to the Jones's money?

A) It will be invested.
B) It will be used to pay previous investors.
C) It will be used for securitization.
D) It has just provided QXQ a big kickback.
Question
The ____________________ is a computer program that appears benign but actually contains something harmful.
Question
Individuals committing identity fraud while engaged in crimes involving terrorism will receive a mandatory sentence enhancement of ________ years.
Question
About a month ago, Laura ordered an autographed Star Wars poster from a memorabilia website, but she hasn't received it yet despite checking with the company and inquiring with United Parcel Service (UPS). The company says they shipped the poster. What type of crime might Laura be a victim of?

A) Phishing
B) E-tailing fraud
C) E-piracy
D) Cyber war
Question
Laura just got a new laptop but was unaware that it didn't come loaded with Microsoft Office. Her boyfriend gives her access to his employee homepage and suggests that she use one of the licenses from his office because sometimes he does work at home. What crime has Laura committed?

A) Identity theft
B) Software piracy
C) Copyright infringement
D) Internet fraud
Question
Global criminal conspiracies designed to obtain power and influence or monetary gains that cross nation states and legal jurisdictions are termed ____________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/102
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Criminal Justice in the New Millennium
1
Bernie Madoff, the mastermind behind the largest criminal conspiracy in history, has been sentenced to death and is currently awaiting execution in a New York prison.
False
2
Many computer crimes are prosecuted under traditional criminal statutes such as larceny and fraud.
True
3
It is estimated that more than half of all logging activities in the most vulnerable forest regions are conducted illegally.
True
4
Cyber terrorism may result in a battered economy, requiring the government to spend more on the military and cut back on social programs and education.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
5
The Environmental Protection Agency (EPA) is the major enforcement agency against environmental crimes.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
6
Cyber vandalism occurs when a perpetrator carefully skims small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
7
Market manipulation is one of the three major types of Internet securities fraud that is common today.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
8
Civil libertarians are concerned that the USAPA permits investigations of a broad range of activities involving legitimate political dissent, not just terroristic activity.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
9
Law enforcement and the courts have traditionally been reluctant to throw corporate executives in jail.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
10
The conflict in the Ukraine between the Russian-backed separatists and government forces is an example of revolutionary terrorism.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
11
According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000, and a second-time offender will be incarcerated for 15 years.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
12
Retributive terrorism promotes the interests of a minority ethnic or religious group that believes it has been persecuted under majority or colonial rule.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
13
Carding and spoofing are concepts associated with mortgage fraud.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
14
To be considered illegal dumping, the wastes being dumped have to contain hazardous materials.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
15
In the case of the massive BP oil spill, the government had to show that company officials knew in advance that their actions would lead to the explosion/oil spill and chose to ignore the danger to prove a felony.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
16
The simplest way to define terrorism is to equate it with political goals.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
17
Large-scale investment growth has led to significant increase in the amount of fraud and misconduct on Wall Street.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
18
A Trojan horse is a benign application that contains illicit codes that can damage system operations.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
19
The USAPA expands the use of racial and ethnic profiling in transportation hubs such as airports and train stations.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
20
Cyberstalking usually pertains to threatening or harassing e-mail messages, instant messages, or blog entries that involve less threat of violence than cyber harassment.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
21
Human trafficking is a global problem, with an estimated 12 million adults and children in forced labor, bonded labor, and commercial sexual servitude at any given time.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
22
Illegal fishing can cause which of the following consequences?

A) Reduces the number of fish in a population before they can replenish themselves
B) Avoids appropriate processing fees, so it costs the government money
C) Discharges toxic materials back into the waterways, harming local wildlife
D) Destroys the chances for other fisherman to share in the profits
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
23
Worldwide estimates for illegal logging activities account for products worth at least ______ per year.

A) $1 billion
B) $5 billion
C) $10 billion
D) $15 billion
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
24
Demand for drugs by wealthy urban residents of east Asia has fueled and revitalized organized crime in that part of the world.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
25
__________ terrorism uses violence as a method of influence, persuasion, or intimidation to get people to accept their social, religious, or political views.

A) Revolutionary
B) Political
C) National
D) Retributive
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
26
Enforcement of environmental laws, such as the Clean Water Act of 1972, is done by:

A) local governmental environmental agencies.
B) the US Environmental Protection Agency (EPA).
C) nonprofit environmental agencies.
D) the Public Works Administration (PWA).
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
27
Efforts to control transnational organized crime are typically handled by local and state agencies working together.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
28
Asian transnational crime gangs have direct access to a vast majority of the world's heroin production.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
29
The Revolutionary Armed Forces of Colombia (FARC) represent the goals of what kind of terrorism?

A) Nationalist terrorism
B) Revolutionary terrorism
C) Cult terrorism
D) Criminal terrorism
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
30
__________ terrorism uses violence to frighten those in power and their supporters and seeks to replace the existing government with a regime that holds acceptable political or religious views.

A) Revolutionary
B) Political
C) National
D) Retributive
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
31
The process of creating a global economy through transnational markets and political and legal systems is referred to as transnationalism.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
32
_______are violations of existing criminal laws designed to protect people, the environment, or both.

A) Denial-of-service attacks
B) Habitat violations
C) Green crimes
D) Mortgage fraud schemes
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
33
Globalization can be a device for criminal cartels to avoid prosecution and regulation and expand their markets and profits.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
34
Bernard Madoff, Enron, and Volkswagen all have committed this type of crime.

A) Globalization
B) Transnational
C) Green
D) Corporate enterprise
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
35
The Racketeer Influenced and Corrupt Organizations (RICO) Act is designed to limit patterns of organized criminal activity by prohibiting involvement in acts intended to derive income from racketeering.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
36
The detection and enforcement of large-scale corporate crime is primarily in the hands of the:

A) US Securities and Exchange Commission (SEC).
B) US Postal Service (USPS).
C) Drug Enforcement Administration (DEA).
D) US Secret Service (USSS).
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
37
Shifting alliances, change of location, and willingness of transnational gangs to use violence make the fight against global crime difficult.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
38
A _______ is an investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors.

A) Ponzi scheme
B) RICO scheme
C) Phishing scheme
D) denial-of-service attack
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
39
Cyberbullying removes the protection of physical distance victims can use when they are bullied in person.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
40
Russian crime groups make extensive use of the state governmental apparatus to protect and promote their illegal activities.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is not a type of Internet securities fraud?

A) Identity theft
B) Market manipulation
C) Fraudulent offerings of securities
D) Illegal touting
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
42
One reason it has proven difficult for law enforcement to combat drug cartels is because:

A) they work in conjunction with transnational crime groups like the Russian mob.
B) the properties where drugs are grown are disguised as migrant farms.
C) destroying the drug trade undermines the economies of third-world nations.
D) the RICO Act has backfired on the US government.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not a form of cybervandalism?

A) Denial-of-service attack
B) Phishing
C) Web defacement
D) Trojan horse
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
44
____ is the term used to describe the illegal use of the Internet to buy or sell merchandise online.

A) Cybertheft
B) E-tailing fraud
C) Market manipulation
D) Denial-of-service attack
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
45
Which working group addresses the transnational aspects of Eurasian organized crime that impacts members' countries and the international community in general?

A) Eurasian Organized Crime Working Group
B) Southeast European Cooperative Initiative
C) Central European Working Group
D) None of the above
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
46
Transnational crime groups are often involved in:

A) human trafficking.
B) gambling.
C) prostitution.
D) all of these.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
47
Congress has struggled to create legislation that will restrict objectionable use of Internet pornography without violating _____ Amendment freedoms.

A) First
B) Fifth
C) Sixth
D) Eighth
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
48
Federal legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in two or more acts prohibited by 24 existing federal and 8 state laws is termed _________.

A) the enhancement penalty
B) RICO
C) the Travel Act
D) the Federation
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
49
____is the illegal acquisition of personal information such as bank passwords and credit card numbers by masquerading as a trustworthy person/business in what appears to be an official electronic communication.

A) E-tailing fraud
B) Phishing
C) Cybertheft
D) Touting
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
50
The United Nations estimates that immigrant smugglers earn about ____ per year smuggling an estimated 3 million people.

A) $7 million
B) $70 million
C) $7 billion
D) $70 billion
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
51
Cybercrime is challenging because:

A) it is difficult to detect through traditional law enforcement channels.
B) it is rapidly evolving.
C) its control demands that agents of the justice system develop technical skills.
D) All of these make cybercrime challenging.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following has been one of the most successful federal efforts to enforce cyber laws?

A) Digital Millennium Copyright Act
B) Counterfeit Access Device and Computer Fraud and Abuse Law
C) New York Electronic Crimes Task Force
D) The Interagency Telemarketing and Internet Fraud Working Group
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
53
____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.

A) Warez
B) Denial-of-service attack
C) Market manipulation
D) Computer fraud
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
54
Cyber ____ involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies to steal important data or to access their defenses.

A) terrorism
B) espionage
C) bullying
D) stalking
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
55
A ____ is one type of malicious software program that disrupts or destroys existing programs and networks.

A) computer worm
B) computer virus
C) Trojan horse
D) cyberbully
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
56
Crime groups from this country are believed to be the main perpetrators of credit card fraud in the United States.

A) Japan
B) Nigeria
C) Mexico
D) Russia
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
57
Which type of cybervandalism appears as a benign application that actually contains codes that can damage the system operations?

A) Mydoom
B) Trojan horse
C) Malware
D) Chiseling
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
58
The United States Criminal Code provides penalties for a first-time illegal copyright offender of ____ years incarceration and a fine of $250,000.

A) 3
B) 5
C) 7
D) 10
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
59
Cyber ____ would shut down a critical national infrastructure to intimidate a government or civilian population.

A) theft
B) vandalism
C) warfare
D) espionage
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
60
Large populations of ethnic Nigerians in India, Pakistan, and Thailand have given Nigerian criminal enterprises direct access to ____ percent of the world's heroin.

A) 60
B) 70
C) 80
D) 90
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
61
Examples of ______ include illegal dumping, polluting, illegal fishing, and illegal logging.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
62
Laura picked up her phone one evening to find that the Microsoft help desk was calling. Her computer had been running slowly for a while, but she hadn't yet contacted Microsoft to get help. She was pleased to hear that they had found malware on her computer and were calling to assist her in removing it. Laura had previously been a victim of a phishing scheme, so she knew not to give any personal information, but they didn't ask for her credit card information or social security number so she figured they were really going to help. The Microsoft Help desk has asked Laura to go to a website and verify her information so they can help fix her computer. She sees all of her information on the page even though she hasn't given them any information. What type of crime has Laura become a victim of?

A) E-tailing fraud
B) Trojan horse
C) Phishing
D) Warez
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
63
Hamas is an example of _____ terrorism.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
64
Lone wolves fall into the category of ______ terrorists.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
65
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people who had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper. If Abraham's father is back in touch with the people who have ties to Al Qaeda, and may even be working with them, with which goal of terrorism do they most likely align?

A) Retributive terrorism
B) Nationalist terrorism
C) State-sponsored terrorism
D) Revolutionary terrorism
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ is cybercrime with malicious intent, to satisfy the desire for revenge, and to inflict wanton destruction.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
67
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people who had ties to Al Qaeda, but he doesn't speak with them anymore. Before Abraham was born his father came to the United States for a job with Microsoft. His father remembers when he was a youth the death squads and the terror that was felt by all where he grew up. What type of terrorism did Abraham's father likely experience?

A) State-sponsored terrorism
B) Evolutionary terrorism
C) Nationalist terrorism
D) Political terrorism
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
68
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people who had ties to Al Qaeda, but he doesn't speak with them anymore. Recently, Abraham's father seems to do a lot of business on the computer and telephone at night. One day as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week, he notices some kind of tracking device hanging from the underside of the car bumper. Abraham knows the Federal Bureau of Investigation (FBI) is tailing him, but he doesn't know why and believes it is illegal. What recourse does he have as an American citizen?

A) He can file a petition that his Fourth Amendment rights have been violated.
B) None. Conducting surveillance of "lone wolves" is legal under the USAPA.
C) Confront the FBI. USAPA is only allowed to monitor computers and phones.
D) File a complaint with the police and get a restraining order.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
70
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms with their current salary, there was little documentation required, and everybody won. The buyers got their house and QXQ got paid. Steve and Jennie got a stated income loan in 2008 from QXQ. As it turns out, they lied on their application and said they made more money than they actually do. Just a couple of months later they couldn't make their payments and defaulted on their mortgage. Who or what is at fault?

A) Steve and Jennie
B) Securitization
C) Management fraud
D) QXQ, the mortgage company
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
71
______________ is a type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
73
The USAPA was passed in ____ to give sweeping new powers to domestic law enforcement and international intelligence to fight terrorism.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
74
_______________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
75
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms with their current salary, there was little documentation required, and everybody won. The buyers got their house and QXQ got paid. Andrew works for QXQ as an investor. He only takes clients who have at least $500,000 to invest. He has been touting this new hedge fund that he himself has invested in. It is promising 20 percent returns every year. He just signed up the Jones family. If this scenario turns out to be a Ponzi scheme, what will likely happen to the Jones's money?

A) It will be invested.
B) It will be used to pay previous investors.
C) It will be used for securitization.
D) It has just provided QXQ a big kickback.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
76
The ____________________ is a computer program that appears benign but actually contains something harmful.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
77
Individuals committing identity fraud while engaged in crimes involving terrorism will receive a mandatory sentence enhancement of ________ years.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
78
About a month ago, Laura ordered an autographed Star Wars poster from a memorabilia website, but she hasn't received it yet despite checking with the company and inquiring with United Parcel Service (UPS). The company says they shipped the poster. What type of crime might Laura be a victim of?

A) Phishing
B) E-tailing fraud
C) E-piracy
D) Cyber war
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
79
Laura just got a new laptop but was unaware that it didn't come loaded with Microsoft Office. Her boyfriend gives her access to his employee homepage and suggests that she use one of the licenses from his office because sometimes he does work at home. What crime has Laura committed?

A) Identity theft
B) Software piracy
C) Copyright infringement
D) Internet fraud
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
80
Global criminal conspiracies designed to obtain power and influence or monetary gains that cross nation states and legal jurisdictions are termed ____________.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 102 flashcards in this deck.