Deck 14: Wiretaps
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 14: Wiretaps
1
Call content information is the substance of the message. In a conversation it is the voices, in an email it is the body of the message.
True
2
A pen registry allows law enforcement officers access to call content information.
False
3
A police officer often gathers information about the community wherein they work by looking for changes to the community.
True
4
Electronic surveillance involves only intercepting call content information.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
The concept that that the government cannot seize our personal electronic communications without probable cause is a relatively recent development of the previous century.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
There are situations wherein a police officer can electronically record telephone conversations without a warrant.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
The Communications Assistance for Law Enforcement Act (CALEA) clarified the debate on packet information in Internet-based communications.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Operational security in electronic intercepts refers only to the steps taken by law enforcement officials to ensure that the targets or unauthorized persons do not become aware of the electronic surveillance.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
Because of the intrusive nature of wiretaps, the legal requirements for judicial authorization are often more stringent than other types of warrants.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Carnivore (DCS 1000) is a software tool designed to facilitate the interception of electronic communications on the Internet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
________ is actually a computer virus program developed by the Federal Bureau of Investigation (FBI). It is sent to a target's computer and once operational it sends ________ usage to the FBI. One of it's purposes is to defeat offender encryption efforts.
A) Magic Lantern; keyboard
B) Carnivore; printer
C) Magic Lantern; printer
D) Carnivore; keyboard
A) Magic Lantern; keyboard
B) Carnivore; printer
C) Magic Lantern; printer
D) Carnivore; keyboard
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
The Foreign Intelligence Service Act includes a secret court of ________ federal judges who review requests for secret searches and covert electronic surveillance.
A) ten
B) eleven
C) seven
D) six
A) ten
B) eleven
C) seven
D) six
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
Before the USA PATRIOT Act, court orders for electronic intercepts were only valid in the jurisdiction of the ________.
A) court
B) United States
C) offender
D) law enforcement agency
A) court
B) United States
C) offender
D) law enforcement agency
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Gathering information from ________ without their knowledge is the definition of ________.
A) offenders; covert surveillance
B) victims; covert surveillance
C) victims; overt surveillance
D) offenders; overt surveillance
A) offenders; covert surveillance
B) victims; covert surveillance
C) victims; overt surveillance
D) offenders; overt surveillance
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Electronic surveillance for the purpose of gather ________ from a telephone is commonly called a ________.
A) identifying information; wiretap
B) content information; warrant
C) identifying information; warrant
D) content information; wiretap
A) identifying information; wiretap
B) content information; warrant
C) identifying information; warrant
D) content information; wiretap
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Prior to the court decision, ________, as long as law enforcement officials did not trespass onto private property in order to conduct electronic surveillance, the information gained was not protected by the Fourth Amendment.
A) Griswold v. Connecticut
B) Gideon v. Wainwright
C) Miranda v. Arizona
D) the USA PATRIOT Act
A) Griswold v. Connecticut
B) Gideon v. Wainwright
C) Miranda v. Arizona
D) the USA PATRIOT Act
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
The Communications Assistance for Law Enforcement Act (CALEA) requires that ________ develop equipment, facilities and services that enable electronic surveillance by law enforcement officials.
A) state and local agencies
B) commercial carriers
C) federal agencies
D) none of the above
A) state and local agencies
B) commercial carriers
C) federal agencies
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
For local law enforcement officials, the justification for a wiretap warrant ________ that the purpose of the wiretap focus on ________.
A) requires; gaining evidence
B) may require; gaining evidence or criminal intelligence
C) requires; gaining evidence or criminal intelligence
D) may require; gaining evidence
A) requires; gaining evidence
B) may require; gaining evidence or criminal intelligence
C) requires; gaining evidence or criminal intelligence
D) may require; gaining evidence
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
For state and local law enforcement officials, they must supply to the judicial authority every ________ a recapitulation of the wiretap.
A) 15 days
B) 30 days
C) 7 days
D) 5 days
A) 15 days
B) 30 days
C) 7 days
D) 5 days
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
A ________ is a device used today to record and decode the electronic signal that identifies the number someone dialed.
A) Dialed Telephone Recorder (DTR)
B) Offender Number Recorder (ONR)
C) Dialed Number Recorder (DNR)
D) Offender Telephone Recorder (OTR)
A) Dialed Telephone Recorder (DTR)
B) Offender Number Recorder (ONR)
C) Dialed Number Recorder (DNR)
D) Offender Telephone Recorder (OTR)
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is NOT a technological means of capturing electronic information?
A) Traps
B) Epic
C) Pen Registry
D) Magic Lantern
A) Traps
B) Epic
C) Pen Registry
D) Magic Lantern
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
A system developed during the Cold War to routinely monitor global communications best describes:
A) Tap Dance
B) Carnivore
C) Echelon
D) Magic Lantern
A) Tap Dance
B) Carnivore
C) Echelon
D) Magic Lantern
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is NOT an aspect of the USA PATRIOT Act?
A) The Aspect of roving electronic intercepts
B) The right to counsel prior to a custodial interview during which accusatory questions are asked
C) Lowering the threshold for obtaining permission to intercept electronic communications
D) Clarifications to the interception of Internet-based communications
A) The Aspect of roving electronic intercepts
B) The right to counsel prior to a custodial interview during which accusatory questions are asked
C) Lowering the threshold for obtaining permission to intercept electronic communications
D) Clarifications to the interception of Internet-based communications
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Law enforcement information can be gathered from:
A) Witness
B) Offenders
C) The observations of police officers
D) all of the above
A) Witness
B) Offenders
C) The observations of police officers
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is NOT an instance wherein a police officer can record a conversation without a warrant?
A) Surreptitiously recorded conversations during a routine traffic stop
B) When law enforcement officials have a victim contact an offender via telephone and have the victim attempt to illicit incriminating statements
C) While offenders are handcuffed in the back seat of a police vehicle
D) none of the above
A) Surreptitiously recorded conversations during a routine traffic stop
B) When law enforcement officials have a victim contact an offender via telephone and have the victim attempt to illicit incriminating statements
C) While offenders are handcuffed in the back seat of a police vehicle
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is an aspect of operational security?
A) Preventing unauthorized disclosure
B) Ensuring transparency
C) Restricting knowledge to as few people as possible
D) all of the above
A) Preventing unauthorized disclosure
B) Ensuring transparency
C) Restricting knowledge to as few people as possible
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
The general rules for monitoring a wiretap state that the official has how long to determine if the call is related to the investigation?
A) Two Minutes
B) 30 Seconds
C) One Minute
D) There is no such requirement.
A) Two Minutes
B) 30 Seconds
C) One Minute
D) There is no such requirement.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
A software tool developed by the Federal Bureau of Investigation designed to facilitate the interception of electronic communications on the Internet best describes:
A) Carnivore
B) Tap Dance
C) Echelon
D) Magic Lantern
A) Carnivore
B) Tap Dance
C) Echelon
D) Magic Lantern
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Software that can detect and select a defined subset of traffic on an Internet-based network is called:
A) Spider
B) Magic Lantern
C) Sniffer
D) Sphinx
A) Spider
B) Magic Lantern
C) Sniffer
D) Sphinx
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Device identifying information is captured through which of the following?
A) Traces
B) Pen registers
C) Traps
D) all of the above
A) Traces
B) Pen registers
C) Traps
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck