Deck 14: Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cyber Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/60
Play
Full screen (f)
Deck 14: Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cyber Crime
1
Which one of the following is not one of the theoretical explanations for terrorism discussed in the text?
A)Social learning
B)Socialization
C)Alienation
D)Psychological
A)Social learning
B)Socialization
C)Alienation
D)Psychological
A
2
Cyber crime appeared on the radar of criminologists approximately ____ years ago.
A)10
B)15
C)20
D)25
A)10
B)15
C)20
D)25
D
3
____ terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views.
A)Revolutionary
B)Political
C)Nationalist
D)Retributive
A)Revolutionary
B)Political
C)Nationalist
D)Retributive
A
4
Which of the following is not a type of internet securities fraud?
A)Identity theft
B)Market manipulation
C)Fraudulent offerings of securities
D)Illegal touting
A)Identity theft
B)Market manipulation
C)Fraudulent offerings of securities
D)Illegal touting
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
5
Cyber crime is challenging because:
A)it is difficult to detect through traditional law enforcement channels.
B)it is rapidly evolving.
C)its control demands that agents of the justice system develop technical skills.
D)All of these
A)it is difficult to detect through traditional law enforcement channels.
B)it is rapidly evolving.
C)its control demands that agents of the justice system develop technical skills.
D)All of these
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
6
____ terrorists fight for a cause with people anywhere whose ideology and/or religion they find objectionable.
A)Revolutionary
B)Political
C)Nationalist
D)Retributive
A)Revolutionary
B)Political
C)Nationalist
D)Retributive
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
7
The term "terror" was associated with unrest in ____ in 1917.
A)France
B)Germany
C)Russia
D)Ireland
A)France
B)Germany
C)Russia
D)Ireland
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
8
About ____ percent of cargo containers entering the United States every day get screened.
A)5
B)15
C)30
D)45
A)5
B)15
C)30
D)45
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
9
According to the text, a(n) ____ uses criminal and violent acts to influence an audience beyond the immediate target.
A)terrorist
B)guerilla
C)insurgent
D)revolutionary
A)terrorist
B)guerilla
C)insurgent
D)revolutionary
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) ____ is the term for an irregular military band located in rural areas that attack military, police, and government targets.
A)terrorist
B)guerilla
C)insurgent
D)revolutionary
A)terrorist
B)guerilla
C)insurgent
D)revolutionary
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
11
There are approximately 130 nuclear research reactors in ____ countries, with two dozen of these having enough highly enriched uranium for one or more nuclear bombs.
A)20
B)30
C)40
D)50
A)20
B)30
C)40
D)50
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
12
The Department of Homeland Security is responsible for securing our nation's borders and transportation systems, which include ____ ports of entry.
A)150
B)250
C)350
D)450
A)150
B)250
C)350
D)450
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
13
Civil libertarians argue that ____ Amendment rights may be violated by the US Patriot Act.
A)First
B)Second
C)Fifth
D)Eighth
A)First
B)Second
C)Fifth
D)Eighth
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
14
____ terrorists promote the interests of a minority ethnic or religious group that believes it has been persecuted under majority rule and wishes to carve out its own independent homeland.
A)Revolutionary
B)Political
C)Nationalist
D)Retributive
A)Revolutionary
B)Political
C)Nationalist
D)Retributive
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
15
____ created the Anti-Terrorism Information Center to divide the state into operational zones and link federal, state, and local information services into one system to combat terrorism.
A)Alabama
B)California
C)Illinois
D)Texas
A)Alabama
B)California
C)Illinois
D)Texas
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
16
____ is the illegal acquisition of personal information such as bank passwords and credit card numbers, by masquerading as a trustworthy person/business in what appears to be an official electronic communication.
A)Etailing fraud
B)Phishing
C)Cyber theft
D)Touting
A)Etailing fraud
B)Phishing
C)Cyber theft
D)Touting
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
17
In what year did Congress pass legislation authorizing the creation of the Department of Homeland Security?
A)1998
B)2000
C)2002
D)2004
A)1998
B)2000
C)2002
D)2004
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
18
Spending on IT and telecommunications will grow by more than 6 percent each year, soon reaching about ____.
A)$200,000
B)$2 million
C)$2 billion
D)$2 trillion
A)$200,000
B)$2 million
C)$2 billion
D)$2 trillion
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is not an aim of the USA Patriot Act?
A)To give sweeping new powers to domestic law enforcement and international intelligence agencies to in an effort to fight terrorism
B)To expand the definition of terrorist activities
C)To alter sanctions for violent terrorism
D)All of the above are aims of the USA Patriot Act.
A)To give sweeping new powers to domestic law enforcement and international intelligence agencies to in an effort to fight terrorism
B)To expand the definition of terrorist activities
C)To alter sanctions for violent terrorism
D)All of the above are aims of the USA Patriot Act.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
20
____ is the use of computer networks for undermining the social, economic, and political system of an enemy through the destruction of infrastructure.
A)Cyber theft
B)Cyber vandalism
C)Cyber terrorism
D)Cyber movement
A)Cyber theft
B)Cyber vandalism
C)Cyber terrorism
D)Cyber movement
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following types of cyber crime was not discussed in the text?
A)Cyber terrorism
B)Phishing
C)Etailing
D)Chiseling
A)Cyber terrorism
B)Phishing
C)Etailing
D)Chiseling
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
22
The Department of Homeland Security is responsible for securing our nation's borders and transportation systems.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
23
Cyber terrorism may result in a battered economy in which the government is forced to spend more on the military and cut back on social programs and education.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
24
It is difficult to detect and control internet pornography. Congress has struggled to create legislation that will restrict usage without violating ____ Amendment rights.
A)First
B)Fourth
C)Sixth
D)Eighth
A)First
B)Fourth
C)Sixth
D)Eighth
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
25
In what type of cyber crime are small amounts of money subtracted from customers' accounts and added to the account of the thief?
A)Phishing
B)Chiseling
C)Salami fraud
D)Trojan Horse
A)Phishing
B)Chiseling
C)Salami fraud
D)Trojan Horse
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
26
The United States Criminal Code provides penalties for a first time illegal copyright offender of ____ years incarceration and a fine of $250,000.
A)3
B)5
C)7
D)10
A)3
B)5
C)7
D)10
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
27
The salami slice is a computer program secretly attached to a company's computer system.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
28
____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.
A)Warez
B)Denial of service attack
C)Market manipulation
D)Cyber theft
A)Warez
B)Denial of service attack
C)Market manipulation
D)Cyber theft
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
29
The view that terrorists suffer psychological abnormality is well accepted by those advocating the psychological view.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
30
According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000. A second-time offender will receive 5 years incarceration.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
31
Since September 11, 2001, biometrics has been implemented in many facets of the security systems of the United States.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
32
Lack of economic opportunity and recessionary economies are positively correlated with terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
33
The term "terrorism" first appeared during the Bolshevik takeover.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
34
There is some concern that the Child Online Protection Act controls free speech.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
35
____ involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies in order to steal important data or to access their defenses.
A)Cyber terrorism
B)Cyber espionage
C)Cyber bullying
D)Cyber stalking
A)Cyber terrorism
B)Cyber espionage
C)Cyber bullying
D)Cyber stalking
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
36
____ is one type of malicious software program that disrupts or destroys existing programs and networks.
A)Computer worm
B)Computer virus
C)Trojan horse
D)Cyber bullying
A)Computer worm
B)Computer virus
C)Trojan horse
D)Cyber bullying
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
37
Which type of cyber vandalism appears as a benign application which actually contains codes that can damage the system operations?
A)Mydoom
B)Trojan horse
C)Malware
D)Dhiseling
A)Mydoom
B)Trojan horse
C)Malware
D)Dhiseling
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
38
____ is the term used to describe the illegal use of the internet to buy or sell merchandise online.
A)Cyber theft
B)Etailing fraud
C)Market manipulation
D)Denial of service attack
A)Cyber theft
B)Etailing fraud
C)Market manipulation
D)Denial of service attack
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
39
Death squads and the use of government troops to destroy political opposition parties are often associated with state-sponsored terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
40
Since 1995, the New York Electronic Crimes Task Force has charged over 1000 individuals with electronic crime losses exceeding ____.
A)$1 million
B)$10 million
C)$1 billion
D)$10 billion
A)$1 million
B)$10 million
C)$1 billion
D)$10 billion
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
41
Explain what New York City's new Counterterrorism Bureau is doing to deal with the threat of terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
43
Elaborate three types of contemporary terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the purposes of the USA Patriot Act and then detail the concern about this Act by civil libertarians.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ is an attack against an enemy nation's technological infrastructure.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss the role of the Department of Homeland Security in the fight against terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss the last twenty years in the history of terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
49
Some policy experts suggest that the way to fight terrorism is to use political solutions. Discuss several political solutions to the fight against terrorism using al Qaeda as an example.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
50
____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
51
Discuss some of the problems with enforcing cyber laws and recent initiatives to attempt to combat cyber crime.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
52
The ____________________ view of terrorism argues that if terrorists suffer psychological deficiencies it is because they have been poorly and improperly socialized.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
53
Discuss the evolving role of law enforcement in fighting terrorism.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
54
The Department of ____________________ is assigned to prevent the importation of nuclear weapons and material.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
55
Compare and contrast two of the prevailing views on the motivation of terrorists.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
56
Select and discuss three types of computer crimes.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
57
On October 26, 2001, Congress passed the ____________________.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
58
The ____________________ is a computer program that appears benign but actually contains something harmful.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
59
The FBI is now charged with coordinating intelligence collection with the Border Patrol, Secret Service, and the ____________________.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
60
The USAPA expands all four traditional tools of surveillance - wiretaps, search warrants, pen/trap orders, and ____________________.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck