Deck 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control

Full screen (f)
exit full mode
Question
What is the basic premise of Michel Foucault's (1977) 'panopticism'?

A) As societies become increasingly more modern, the use of surveillance technology will decrease as societies develop a more neo-liberal approach to governance
B) Surveillance is a key instrument with which modern societies discipline and control populations
C) Technology would eventually act as a catalyst anarchy where the idea of 'surveillance' would eventually collapse
D) Surveillance technology is becoming so ubiquitous that human beings will start to physically integrate monitoring devices onto their person
Use Space or
up arrow
down arrow
to flip the card.
Question
What is Castells (1996) idea of the 'space of flows'?

A) Virtual terrains created by webs of electronic communication which do not exist in any particular place
B) Physical spaces where manufacturers could easily access users' personal information
C) Quasi-virtual realms where artificial intelligence would control and alter materials in the real world
D) Spaces where human beings and technology would be virtually indistinguishable from each other
Question
Individuals leave behind data generated as a by-product of people's online activities in what Zuboff (2015) calls _______________.?

A) 'data clumps'
B) 'digital leftovers'
C) 'digital exhaust'
D) 'data piles'
Question
_______________ are small files created every time a user visits a website.?

A) Brownies
B) Cupcakes
C) Candies
D) Cookies
Question
_______________ are those who specialize in creating datasets of information about individuals which can then be sold.?

A) Data miners
B) Data brokers
C) Data collectors
D) Data analysers
Question
How do most current social media platforms generate revenue?

A) A majority of social media platforms employ a subscription-based business model where users must purchase a monthly subscription to use the service
B) Social media sites run purely on donations from sizable third party organizations to sustain their operations
C) To use social media platforms, users must purchase a one-time entry fee to use the service, but then may upgrade their service at a later time
D) Many accrue revenue from collecting personal information from their users' online activities then selling that information to marketing and advertising companies
Question
What is the 'Going Dark' phenomenon?

A) A catastrophic event where an entire city's power grid is shutdown by hackers
B) A sociological phenomenon where individuals are mentally exhausted from using social media, resulting in the individual closing all of their accounts
C) The inability to overcome a criminal's use of technology to avoid surveillance and apprehension
D) A situation where a company's infrastructure is compromised by hackers who shutdown all operations until a payment is made
Question
This is a method where data is reordered according to a pattern specified by a key where, without access to this key, one does not know how to rearrange and view the content.?

A) Encryption
B) Compression
C) Extension
D) Defragmentation
Question
Government actors have tried to introduce a so-called 'key deposit' or 'key-escrow' system, where _______________.?

A) digital 'keys,' or activation codes, would be publicly available to those who are not able to afford anti-virus software
B) manufacturers of encryption software would have to provide the police with a key to the data being accessed
C) similar to a 'Cloud' system, law enforcement agents could go to a secure website and download declassified state documents from other agencies
D) world leaders would be able to establish a secure connection (or 'key') with other leaders
Question
This individual used to be an employee for the US National Security Agency (NSA) where he leaked to journalists the details of a massive surveillance apparatus operated by the US government.?

A) Edward Snowden
B) Kevin Mitnick
C) Julian Assange
D) Kevin Steinmetz
Question
This was the name of the program that allowed the NSA to access the servers of companies and services like Yahoo!, Google, Facebook, and YouTube for user data.?

A) PRISM
B) 'The Cloud'
C) The 'ECHELON' project
D) 'XKeyscore'
Question
This was an esoteric initiative where a network of satellite interception stations, microwave ground stations, spy satellites, radio listening posts, and secret facilities could examine almost any telephone call, fax transmission, and email around the world, daily.?

A) The 'Total Information Awareness' project
B) The 'MATRIX' project
C) The 'ECHELON' project
D) The 'Alan Parsons' project
Question
What was the purpose in the creation of the European Union's General Data Protection Regulation (GDPR)?

A) This extended the surveillance capabilities of the government across multiple countries
B) This was an attempt to regulate the use of personal information for commercial activities
C) This allowed encryption software companies to sell personal information to third parties
D) This removed an individual's ability to destroy personal data that a company already owned
Question
The first internet surveillance technology was _______________.?

A) PASTRIE
B) PRISM
C) The cookie
D) The sniffer
Question
A _______________ is a person or organization that collects massive amounts of personal data and sells them to companies.?

A) data retailer
B) data broker
C) data bookie
D) data runner
Question
This organization gained and retained data on up to 87 million Facebook users without their permission and are accused of having used that data to engage in "psychographic targeting" advertisements, including during the 2016 Trump presidential campaign.?

A) WikiLeaks
B) Cambridge Analytica
C) Palantir
D) Nielsen Metrics
Question
The USA PATRIOT Act expended the powers provided by this law to conduct electronic searches without probably cause when gathering foreign intelligence.?

A) Foreign Intelligence Surveillance Act
B) Foreign Powers Obstruction Act
C) International Surveillance Act
D) National Security from Foreign Interest Act
Question
A _______________ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break a cipher.?

A) Iterative recombination
B) Shock and awe
C) Overwhelming might
D) Brute force
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
1
What is the basic premise of Michel Foucault's (1977) 'panopticism'?

A) As societies become increasingly more modern, the use of surveillance technology will decrease as societies develop a more neo-liberal approach to governance
B) Surveillance is a key instrument with which modern societies discipline and control populations
C) Technology would eventually act as a catalyst anarchy where the idea of 'surveillance' would eventually collapse
D) Surveillance technology is becoming so ubiquitous that human beings will start to physically integrate monitoring devices onto their person
B
2
What is Castells (1996) idea of the 'space of flows'?

A) Virtual terrains created by webs of electronic communication which do not exist in any particular place
B) Physical spaces where manufacturers could easily access users' personal information
C) Quasi-virtual realms where artificial intelligence would control and alter materials in the real world
D) Spaces where human beings and technology would be virtually indistinguishable from each other
A
3
Individuals leave behind data generated as a by-product of people's online activities in what Zuboff (2015) calls _______________.?

A) 'data clumps'
B) 'digital leftovers'
C) 'digital exhaust'
D) 'data piles'
C
4
_______________ are small files created every time a user visits a website.?

A) Brownies
B) Cupcakes
C) Candies
D) Cookies
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
_______________ are those who specialize in creating datasets of information about individuals which can then be sold.?

A) Data miners
B) Data brokers
C) Data collectors
D) Data analysers
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
How do most current social media platforms generate revenue?

A) A majority of social media platforms employ a subscription-based business model where users must purchase a monthly subscription to use the service
B) Social media sites run purely on donations from sizable third party organizations to sustain their operations
C) To use social media platforms, users must purchase a one-time entry fee to use the service, but then may upgrade their service at a later time
D) Many accrue revenue from collecting personal information from their users' online activities then selling that information to marketing and advertising companies
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
What is the 'Going Dark' phenomenon?

A) A catastrophic event where an entire city's power grid is shutdown by hackers
B) A sociological phenomenon where individuals are mentally exhausted from using social media, resulting in the individual closing all of their accounts
C) The inability to overcome a criminal's use of technology to avoid surveillance and apprehension
D) A situation where a company's infrastructure is compromised by hackers who shutdown all operations until a payment is made
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
This is a method where data is reordered according to a pattern specified by a key where, without access to this key, one does not know how to rearrange and view the content.?

A) Encryption
B) Compression
C) Extension
D) Defragmentation
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
Government actors have tried to introduce a so-called 'key deposit' or 'key-escrow' system, where _______________.?

A) digital 'keys,' or activation codes, would be publicly available to those who are not able to afford anti-virus software
B) manufacturers of encryption software would have to provide the police with a key to the data being accessed
C) similar to a 'Cloud' system, law enforcement agents could go to a secure website and download declassified state documents from other agencies
D) world leaders would be able to establish a secure connection (or 'key') with other leaders
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
This individual used to be an employee for the US National Security Agency (NSA) where he leaked to journalists the details of a massive surveillance apparatus operated by the US government.?

A) Edward Snowden
B) Kevin Mitnick
C) Julian Assange
D) Kevin Steinmetz
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
This was the name of the program that allowed the NSA to access the servers of companies and services like Yahoo!, Google, Facebook, and YouTube for user data.?

A) PRISM
B) 'The Cloud'
C) The 'ECHELON' project
D) 'XKeyscore'
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
This was an esoteric initiative where a network of satellite interception stations, microwave ground stations, spy satellites, radio listening posts, and secret facilities could examine almost any telephone call, fax transmission, and email around the world, daily.?

A) The 'Total Information Awareness' project
B) The 'MATRIX' project
C) The 'ECHELON' project
D) The 'Alan Parsons' project
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
What was the purpose in the creation of the European Union's General Data Protection Regulation (GDPR)?

A) This extended the surveillance capabilities of the government across multiple countries
B) This was an attempt to regulate the use of personal information for commercial activities
C) This allowed encryption software companies to sell personal information to third parties
D) This removed an individual's ability to destroy personal data that a company already owned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
The first internet surveillance technology was _______________.?

A) PASTRIE
B) PRISM
C) The cookie
D) The sniffer
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
A _______________ is a person or organization that collects massive amounts of personal data and sells them to companies.?

A) data retailer
B) data broker
C) data bookie
D) data runner
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
This organization gained and retained data on up to 87 million Facebook users without their permission and are accused of having used that data to engage in "psychographic targeting" advertisements, including during the 2016 Trump presidential campaign.?

A) WikiLeaks
B) Cambridge Analytica
C) Palantir
D) Nielsen Metrics
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
The USA PATRIOT Act expended the powers provided by this law to conduct electronic searches without probably cause when gathering foreign intelligence.?

A) Foreign Intelligence Surveillance Act
B) Foreign Powers Obstruction Act
C) International Surveillance Act
D) National Security from Foreign Interest Act
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
A _______________ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break a cipher.?

A) Iterative recombination
B) Shock and awe
C) Overwhelming might
D) Brute force
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.