Deck 18: The Future of Criminal Justice

Full screen (f)
exit full mode
Question
Which of the following is a form of high-technology fraud that uses official-looking e-mail messages to elicit responses from victims,directing them to phony websites?

A)Phishing
B)Spam
C)Spyware
D)Worm
Use Space or
up arrow
down arrow
to flip the card.
Question
Which criminalistics technique is used to reconstruct the likeness of a decomposed or dismembered body?
a.Fingerprint analysis
b.Forensic anthropology
c.Medical pathology
d.DNA testing
Question
In 2011,the California Highway Patrol created _____________ for each of its divisions to join the social media network to inform the public of what they do.

A)Facebook
B)Twitter pages
C)E-mail accounts
D)Public service announcements.
Question
The science of recognizing people by physical characteristics and personal traits is called:

A)DNA profiling.
B)Criminalistics.
C)Ballistics.
D)Biometrics.
Question
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another is:

A)Software piracy.
B)Software attachment.
C)Software duplication.
D)Software malware.
Question
Which refers to the use of technology in the service of criminal investigation,the application of scientific techniques to the detection and evaluation of criminal evidence?

A)Criminalistics
B)Forensic entomology
C)DNA profiling
D)Social engineering
Question
In 2013,which police department hosted the SMILE national conference for police officers to discuss ways of using social media to their advantage?

A)New York City PD
B)Los Angeles PD
C)Kansas City PD
D)Omaha PD
Question
A chemical,biological,or nuclear weapon that has the potential to cause severe casualties is referred to as:

A)Bioterrorism.
B)Biometrics.
C)Forensic terrorism.
D)A weapon of mass destruction.
Question
A police crime-scene analyst or laboratory worker versed in processing evidence is a:

A)DNA profiler.
B)Criminalist.
C)Medical examiner.
D)Pathologist.
Question
The real-time and accurate overlay of digital information on a user's real-world experience,through visual,aural,and/or tactile interfaces is known as:

A)Cybertechnology.
B)Technocrime.
C)Augmented reality.
D)Nanoreality.
Question
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another is known as:

A)Spam.
B)Phishing.
C)Malware.
D)Software piracy.
Question
The study of insect behavior to determine the time of death of a corpse is called:

A)Forensic entomology.
B)Evidence pathology.
C)Forensic technology.
D)Criminalistics.
Question
A computer worm is also called:

A)Technoware.
B)Malware.
C)Phishing.
D)Bioware.
Question
__________ analysis is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification.

A)Fingerprint
B)Human genome
C)DNA
D)Blood
Question
Alphonse Bertillon created the first:

A)Weapon of mass destruction.
B)Human clone.
C)"Modern" system of personal identification.
D)DNA profile.
Question
Crimes that employ advanced or emerging technologies in their commission are referred to as:

A)Malware.
B)Forensic anthropology.
C)Technocrimes.
D)Biocrime.
Question
A criminal offense perpetrated through the use of biologically active substances,including chemicals and toxins,disease-causing organisms,altered genetic material,and organic tissues and organs is called a:

A)Technocrime.
B)Weapon of mass destruction.
C)Biocrime.
D)Terrorist crime.
Question
This nontechnical type of cyber intrusion relies on persuading or tricking administrators or others to give details of passwords or other information by pretending to be staff,suppliers,police officers,or other trusted individuals.

A)Criminal engineering
B)Social engineering
C)Hacker
D)Profiling
Question
The 2012,Department of Homeland Security report to Congress was very concerned with weapons of mass destruction and other contraband entering the United States through:

A)Airport cargo.
B)Illegal border crossings.
C)Clandestine trucking operations.
D)Seaport shipping containers.
Question
The Computer Institute and FBI survey of 2010/2011 found the number-one security targeted attack against companies involved:

A)Financial fraud.
B)Software piracy.
C)Corporate hardware information.
D)Personal information fraud.
Question
Augmented reality (AR)is the real-time and accurate overlay of digital information on a user's real-world experience,through visual,aural,and/or tactile interfaces.
Question
The use of technology in the service of criminal investigation,the application of scientific techniques to the detection and evaluation of criminal evidence is known as the field of criminalistics.
Question
HITMAN is the latest technology used by the FBI to track and capture mafia-related criminals.
Question
Malware is malicious computer programs such as viruses,worms,and Trojan horses.
Question
The FaceCrook is an example law enforcement use of social media to get their message across through a Twitter account.
Question
Bioterrorism is the intentional or threatened use of viruses,bacteria,fungi,or toxins from living organisms to produce death or disease in humans,animals,or plants.
Question
A criminal offense that employs advanced or emerging technology in its commission is known as a cybercrime.
Question
______________ is the unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service.
Question
Forensic entomology is the study of insects to determine such matters as a person's time of death.
Question
The intentional or threatened use of viruses,bacteria,fungi,or toxins from living organisms to produce death or disease in humans,animals,or plants is known as __________________.
Question
Biocrime is a criminal offense perpetrated through the use of biologically active substances,but does not include chemicals and toxins.
Question
Forensic entomology is the study of insects as a scientific tool used in solving criminal cases.
Question
Ballistics is the science of recognizing people by physical characteristics and personal traits.
Question
A computer virus is a program designed to secretly invade systems and either modify the way in which they operate or alter the information they store.
Question
The use of biological residue found at the scene of a crime for genetic comparisons in aiding in the identification of criminal suspects is ___________profiling.
Question
CODIS allows law enforcement agencies to compare DNA profiles in their possession with other DNA profiles that have been entered into local,state,and national databases in order to identify a suspect or to link serial crimes.
Question
Biometrics is a modern criminalistics technique used to determine the cause of injury or death.
Question
IAFIS is the latest improvement to DNA sampling.
Question
______________ applies scientific techniques to the detection and evaluation of criminal evidence.
Question
_____________ is the analysis of firearms,ammunition,projectiles,bombs,and explosives.
Question
Forensic _________________ is the use of anthropological principles and techniques in criminal investigation.
Question
Law enforcement practitioners of the future will be aided in their criminalistics work by a number of technologies.List and define three of the new technologies that aid law enforcement in solving crime.Explain which of these technologies you feel is the best and why.
Question
The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system's operators.Which term is most commonly used to identify these computer models,and why? List and comment on the three components that make up these computer models and give an example of each.
Question
Computerized information systems and the personnel who operate them are an integral part of most police departments today.ViCAP and METAPOL are two examples of online _____________.
Question
A criminal offense perpetrated through the use of biologically active substances,including chemicals,toxins,or disease-causing organisms in known as a(n)__________________.
Question
Several police departments have joined the technology age by using the social media to combat crime and get their messages out to the public.Explain what three of these police agencies are doing with their social media policing programs.
Question
A criminal offense that employs advanced or emerging technology in its commission is called a(n)___________________.
Question
What is Augmented Reality (AR)? It is predicted that AR systems will soon be available and that will provide "wired" officers with new capabilities.List and describe three of those new capabilities.Explain your thoughts on the potential benefits and drawbacks to each new technology.
Question
The DNA Sexual Assault Justice Act of 2004 and the Innocence Protection Act of 2004-both of which are parts of the Justice for All Act of 2004-was signed into law in 2004.What was the purpose of this Act? Analyze why was it needed,and name the three procedures established by this law.Give your opinion concerning the impact of this Act on the police and courts.
Question
Define and explain criminalistics.Explain three of the traditional methods used to gather evidence in the fight against crime before the new technologies were introduced.Which of these is the most useful for law enforcement?
Question
A(n)___________ is a computer hobbyist or professional,generally with advanced programming skills.This skill has taken on a sinister connotation,referring to hobbyists who are bent on illegally accessing the computers of others or who attempt to demonstrate their technological prowess through computerized acts of vandalism.
Question
Match between columns
Ballistics
The science of recognizing people by physical characteristics and personal traits
Ballistics
The use of anthropological principles and techniques in criminal investigation
Ballistics
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Ballistics
The study of insects to determine such matters as a person’s time of death
Ballistics
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Ballistics
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Ballistics
Malicious computer programs such as viruses, worms, and Trojan horses
Ballistics
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Ballistics
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Ballistics
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Malware
The science of recognizing people by physical characteristics and personal traits
Malware
The use of anthropological principles and techniques in criminal investigation
Malware
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Malware
The study of insects to determine such matters as a person’s time of death
Malware
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Malware
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Malware
Malicious computer programs such as viruses, worms, and Trojan horses
Malware
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Malware
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Malware
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Software piracy
The science of recognizing people by physical characteristics and personal traits
Software piracy
The use of anthropological principles and techniques in criminal investigation
Software piracy
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Software piracy
The study of insects to determine such matters as a person’s time of death
Software piracy
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Software piracy
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Software piracy
Malicious computer programs such as viruses, worms, and Trojan horses
Software piracy
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Software piracy
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Software piracy
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Computer virus
The science of recognizing people by physical characteristics and personal traits
Computer virus
The use of anthropological principles and techniques in criminal investigation
Computer virus
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Computer virus
The study of insects to determine such matters as a person’s time of death
Computer virus
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Computer virus
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Computer virus
Malicious computer programs such as viruses, worms, and Trojan horses
Computer virus
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Computer virus
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Computer virus
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Forensic anthropology
The science of recognizing people by physical characteristics and personal traits
Forensic anthropology
The use of anthropological principles and techniques in criminal investigation
Forensic anthropology
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Forensic anthropology
The study of insects to determine such matters as a person’s time of death
Forensic anthropology
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Forensic anthropology
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Forensic anthropology
Malicious computer programs such as viruses, worms, and Trojan horses
Forensic anthropology
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Forensic anthropology
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Forensic anthropology
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Augmented reality (AR)
The science of recognizing people by physical characteristics and personal traits
Augmented reality (AR)
The use of anthropological principles and techniques in criminal investigation
Augmented reality (AR)
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Augmented reality (AR)
The study of insects to determine such matters as a person’s time of death
Augmented reality (AR)
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Augmented reality (AR)
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Augmented reality (AR)
Malicious computer programs such as viruses, worms, and Trojan horses
Augmented reality (AR)
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Augmented reality (AR)
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Augmented reality (AR)
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Forensic entomology
The science of recognizing people by physical characteristics and personal traits
Forensic entomology
The use of anthropological principles and techniques in criminal investigation
Forensic entomology
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Forensic entomology
The study of insects to determine such matters as a person’s time of death
Forensic entomology
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Forensic entomology
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Forensic entomology
Malicious computer programs such as viruses, worms, and Trojan horses
Forensic entomology
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Forensic entomology
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Forensic entomology
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Spam
The science of recognizing people by physical characteristics and personal traits
Spam
The use of anthropological principles and techniques in criminal investigation
Spam
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Spam
The study of insects to determine such matters as a person’s time of death
Spam
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Spam
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Spam
Malicious computer programs such as viruses, worms, and Trojan horses
Spam
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Spam
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Spam
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Biometrics
The science of recognizing people by physical characteristics and personal traits
Biometrics
The use of anthropological principles and techniques in criminal investigation
Biometrics
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Biometrics
The study of insects to determine such matters as a person’s time of death
Biometrics
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Biometrics
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Biometrics
Malicious computer programs such as viruses, worms, and Trojan horses
Biometrics
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Biometrics
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Biometrics
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
DNA profiling
The science of recognizing people by physical characteristics and personal traits
DNA profiling
The use of anthropological principles and techniques in criminal investigation
DNA profiling
The analysis of firearms, ammunition, projectiles, bombs, and explosives
DNA profiling
The study of insects to determine such matters as a person’s time of death
DNA profiling
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
DNA profiling
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
DNA profiling
Malicious computer programs such as viruses, worms, and Trojan horses
DNA profiling
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
DNA profiling
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
DNA profiling
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/52
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: The Future of Criminal Justice
1
Which of the following is a form of high-technology fraud that uses official-looking e-mail messages to elicit responses from victims,directing them to phony websites?

A)Phishing
B)Spam
C)Spyware
D)Worm
A
2
Which criminalistics technique is used to reconstruct the likeness of a decomposed or dismembered body?
a.Fingerprint analysis
b.Forensic anthropology
c.Medical pathology
d.DNA testing
b
Objective Describe the field of criminalistics,including the contribution of evolving technology.
Page number: 606
3
In 2011,the California Highway Patrol created _____________ for each of its divisions to join the social media network to inform the public of what they do.

A)Facebook
B)Twitter pages
C)E-mail accounts
D)Public service announcements.
B
4
The science of recognizing people by physical characteristics and personal traits is called:

A)DNA profiling.
B)Criminalistics.
C)Ballistics.
D)Biometrics.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
5
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another is:

A)Software piracy.
B)Software attachment.
C)Software duplication.
D)Software malware.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
6
Which refers to the use of technology in the service of criminal investigation,the application of scientific techniques to the detection and evaluation of criminal evidence?

A)Criminalistics
B)Forensic entomology
C)DNA profiling
D)Social engineering
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
7
In 2013,which police department hosted the SMILE national conference for police officers to discuss ways of using social media to their advantage?

A)New York City PD
B)Los Angeles PD
C)Kansas City PD
D)Omaha PD
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
8
A chemical,biological,or nuclear weapon that has the potential to cause severe casualties is referred to as:

A)Bioterrorism.
B)Biometrics.
C)Forensic terrorism.
D)A weapon of mass destruction.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
9
A police crime-scene analyst or laboratory worker versed in processing evidence is a:

A)DNA profiler.
B)Criminalist.
C)Medical examiner.
D)Pathologist.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
10
The real-time and accurate overlay of digital information on a user's real-world experience,through visual,aural,and/or tactile interfaces is known as:

A)Cybertechnology.
B)Technocrime.
C)Augmented reality.
D)Nanoreality.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
11
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another is known as:

A)Spam.
B)Phishing.
C)Malware.
D)Software piracy.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
12
The study of insect behavior to determine the time of death of a corpse is called:

A)Forensic entomology.
B)Evidence pathology.
C)Forensic technology.
D)Criminalistics.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
13
A computer worm is also called:

A)Technoware.
B)Malware.
C)Phishing.
D)Bioware.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
14
__________ analysis is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification.

A)Fingerprint
B)Human genome
C)DNA
D)Blood
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
15
Alphonse Bertillon created the first:

A)Weapon of mass destruction.
B)Human clone.
C)"Modern" system of personal identification.
D)DNA profile.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
16
Crimes that employ advanced or emerging technologies in their commission are referred to as:

A)Malware.
B)Forensic anthropology.
C)Technocrimes.
D)Biocrime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
17
A criminal offense perpetrated through the use of biologically active substances,including chemicals and toxins,disease-causing organisms,altered genetic material,and organic tissues and organs is called a:

A)Technocrime.
B)Weapon of mass destruction.
C)Biocrime.
D)Terrorist crime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
18
This nontechnical type of cyber intrusion relies on persuading or tricking administrators or others to give details of passwords or other information by pretending to be staff,suppliers,police officers,or other trusted individuals.

A)Criminal engineering
B)Social engineering
C)Hacker
D)Profiling
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
19
The 2012,Department of Homeland Security report to Congress was very concerned with weapons of mass destruction and other contraband entering the United States through:

A)Airport cargo.
B)Illegal border crossings.
C)Clandestine trucking operations.
D)Seaport shipping containers.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
20
The Computer Institute and FBI survey of 2010/2011 found the number-one security targeted attack against companies involved:

A)Financial fraud.
B)Software piracy.
C)Corporate hardware information.
D)Personal information fraud.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
21
Augmented reality (AR)is the real-time and accurate overlay of digital information on a user's real-world experience,through visual,aural,and/or tactile interfaces.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
22
The use of technology in the service of criminal investigation,the application of scientific techniques to the detection and evaluation of criminal evidence is known as the field of criminalistics.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
23
HITMAN is the latest technology used by the FBI to track and capture mafia-related criminals.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
24
Malware is malicious computer programs such as viruses,worms,and Trojan horses.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
25
The FaceCrook is an example law enforcement use of social media to get their message across through a Twitter account.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
26
Bioterrorism is the intentional or threatened use of viruses,bacteria,fungi,or toxins from living organisms to produce death or disease in humans,animals,or plants.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
27
A criminal offense that employs advanced or emerging technology in its commission is known as a cybercrime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
28
______________ is the unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
29
Forensic entomology is the study of insects to determine such matters as a person's time of death.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
30
The intentional or threatened use of viruses,bacteria,fungi,or toxins from living organisms to produce death or disease in humans,animals,or plants is known as __________________.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
31
Biocrime is a criminal offense perpetrated through the use of biologically active substances,but does not include chemicals and toxins.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
32
Forensic entomology is the study of insects as a scientific tool used in solving criminal cases.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
33
Ballistics is the science of recognizing people by physical characteristics and personal traits.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
34
A computer virus is a program designed to secretly invade systems and either modify the way in which they operate or alter the information they store.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
35
The use of biological residue found at the scene of a crime for genetic comparisons in aiding in the identification of criminal suspects is ___________profiling.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
36
CODIS allows law enforcement agencies to compare DNA profiles in their possession with other DNA profiles that have been entered into local,state,and national databases in order to identify a suspect or to link serial crimes.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
37
Biometrics is a modern criminalistics technique used to determine the cause of injury or death.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
38
IAFIS is the latest improvement to DNA sampling.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
39
______________ applies scientific techniques to the detection and evaluation of criminal evidence.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
40
_____________ is the analysis of firearms,ammunition,projectiles,bombs,and explosives.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
41
Forensic _________________ is the use of anthropological principles and techniques in criminal investigation.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
42
Law enforcement practitioners of the future will be aided in their criminalistics work by a number of technologies.List and define three of the new technologies that aid law enforcement in solving crime.Explain which of these technologies you feel is the best and why.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
43
The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system's operators.Which term is most commonly used to identify these computer models,and why? List and comment on the three components that make up these computer models and give an example of each.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
44
Computerized information systems and the personnel who operate them are an integral part of most police departments today.ViCAP and METAPOL are two examples of online _____________.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
45
A criminal offense perpetrated through the use of biologically active substances,including chemicals,toxins,or disease-causing organisms in known as a(n)__________________.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
46
Several police departments have joined the technology age by using the social media to combat crime and get their messages out to the public.Explain what three of these police agencies are doing with their social media policing programs.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
47
A criminal offense that employs advanced or emerging technology in its commission is called a(n)___________________.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
48
What is Augmented Reality (AR)? It is predicted that AR systems will soon be available and that will provide "wired" officers with new capabilities.List and describe three of those new capabilities.Explain your thoughts on the potential benefits and drawbacks to each new technology.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
49
The DNA Sexual Assault Justice Act of 2004 and the Innocence Protection Act of 2004-both of which are parts of the Justice for All Act of 2004-was signed into law in 2004.What was the purpose of this Act? Analyze why was it needed,and name the three procedures established by this law.Give your opinion concerning the impact of this Act on the police and courts.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
50
Define and explain criminalistics.Explain three of the traditional methods used to gather evidence in the fight against crime before the new technologies were introduced.Which of these is the most useful for law enforcement?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
51
A(n)___________ is a computer hobbyist or professional,generally with advanced programming skills.This skill has taken on a sinister connotation,referring to hobbyists who are bent on illegally accessing the computers of others or who attempt to demonstrate their technological prowess through computerized acts of vandalism.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
52
Match between columns
Ballistics
The science of recognizing people by physical characteristics and personal traits
Ballistics
The use of anthropological principles and techniques in criminal investigation
Ballistics
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Ballistics
The study of insects to determine such matters as a person’s time of death
Ballistics
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Ballistics
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Ballistics
Malicious computer programs such as viruses, worms, and Trojan horses
Ballistics
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Ballistics
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Ballistics
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Malware
The science of recognizing people by physical characteristics and personal traits
Malware
The use of anthropological principles and techniques in criminal investigation
Malware
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Malware
The study of insects to determine such matters as a person’s time of death
Malware
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Malware
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Malware
Malicious computer programs such as viruses, worms, and Trojan horses
Malware
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Malware
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Malware
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Software piracy
The science of recognizing people by physical characteristics and personal traits
Software piracy
The use of anthropological principles and techniques in criminal investigation
Software piracy
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Software piracy
The study of insects to determine such matters as a person’s time of death
Software piracy
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Software piracy
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Software piracy
Malicious computer programs such as viruses, worms, and Trojan horses
Software piracy
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Software piracy
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Software piracy
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Computer virus
The science of recognizing people by physical characteristics and personal traits
Computer virus
The use of anthropological principles and techniques in criminal investigation
Computer virus
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Computer virus
The study of insects to determine such matters as a person’s time of death
Computer virus
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Computer virus
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Computer virus
Malicious computer programs such as viruses, worms, and Trojan horses
Computer virus
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Computer virus
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Computer virus
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Forensic anthropology
The science of recognizing people by physical characteristics and personal traits
Forensic anthropology
The use of anthropological principles and techniques in criminal investigation
Forensic anthropology
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Forensic anthropology
The study of insects to determine such matters as a person’s time of death
Forensic anthropology
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Forensic anthropology
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Forensic anthropology
Malicious computer programs such as viruses, worms, and Trojan horses
Forensic anthropology
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Forensic anthropology
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Forensic anthropology
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Augmented reality (AR)
The science of recognizing people by physical characteristics and personal traits
Augmented reality (AR)
The use of anthropological principles and techniques in criminal investigation
Augmented reality (AR)
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Augmented reality (AR)
The study of insects to determine such matters as a person’s time of death
Augmented reality (AR)
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Augmented reality (AR)
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Augmented reality (AR)
Malicious computer programs such as viruses, worms, and Trojan horses
Augmented reality (AR)
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Augmented reality (AR)
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Augmented reality (AR)
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Forensic entomology
The science of recognizing people by physical characteristics and personal traits
Forensic entomology
The use of anthropological principles and techniques in criminal investigation
Forensic entomology
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Forensic entomology
The study of insects to determine such matters as a person’s time of death
Forensic entomology
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Forensic entomology
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Forensic entomology
Malicious computer programs such as viruses, worms, and Trojan horses
Forensic entomology
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Forensic entomology
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Forensic entomology
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Spam
The science of recognizing people by physical characteristics and personal traits
Spam
The use of anthropological principles and techniques in criminal investigation
Spam
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Spam
The study of insects to determine such matters as a person’s time of death
Spam
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Spam
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Spam
Malicious computer programs such as viruses, worms, and Trojan horses
Spam
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Spam
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Spam
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Biometrics
The science of recognizing people by physical characteristics and personal traits
Biometrics
The use of anthropological principles and techniques in criminal investigation
Biometrics
The analysis of firearms, ammunition, projectiles, bombs, and explosives
Biometrics
The study of insects to determine such matters as a person’s time of death
Biometrics
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
Biometrics
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
Biometrics
Malicious computer programs such as viruses, worms, and Trojan horses
Biometrics
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
Biometrics
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
Biometrics
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
DNA profiling
The science of recognizing people by physical characteristics and personal traits
DNA profiling
The use of anthropological principles and techniques in criminal investigation
DNA profiling
The analysis of firearms, ammunition, projectiles, bombs, and explosives
DNA profiling
The study of insects to determine such matters as a person’s time of death
DNA profiling
The use of biological residue, found at the scene of a crime, for genetic comparisons in aiding in the identification of criminal suspects
DNA profiling
The real-time and accurate overlay of digital information on a user’s real-world experience, through visual, aural, and/or tactile interfaces
DNA profiling
Malicious computer programs such as viruses, worms, and Trojan horses
DNA profiling
Unsolicited commercial bulk e-mail whose primary purpose is the advertisement or promotion of a commercial product or service
DNA profiling
The unauthorized duplication of software or the illegal transfer of data from one storage medium to another
DNA profiling
A computer program designed to secretly invade systems and either modify the way in which they operate or alter the information they store
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 52 flashcards in this deck.