Deck 9: Information From the Public, Social Media, Information Networks, Digital Devices, and Other Sources
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 9: Information From the Public, Social Media, Information Networks, Digital Devices, and Other Sources
1
The AMBER plan relates to ______.
A) identity theft
B) child abduction
C) runaways
D) serial murder
A) identity theft
B) child abduction
C) runaways
D) serial murder
child abduction
2
With regard to NCIC, it ______.
A) is a computerized information network operated by the FBI
B) became operational in the past 10 years
C) is designed to combat serial murder
D) includes data on all unsolved homicides in the United States
A) is a computerized information network operated by the FBI
B) became operational in the past 10 years
C) is designed to combat serial murder
D) includes data on all unsolved homicides in the United States
is a computerized information network operated by the FBI
3
NCIC, NLETS, and CIS are examples of ______.
A) crime analysis systems
B) geographical profiling systems
C) psychological profiling systems
D) interdepartmental databases
A) crime analysis systems
B) geographical profiling systems
C) psychological profiling systems
D) interdepartmental databases
interdepartmental databases
4
Vehicle registration information is available through ______.
A) ViCAP
B) INTERPOL
C) NLETS
D) CIS
A) ViCAP
B) INTERPOL
C) NLETS
D) CIS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Nearly all of the cases shown on America's Most Wanted involve ______.
A) serious violent crimes
B) cases where the police have no idea who committed it
C) cold cases
D) cases that have been solved
A) serious violent crimes
B) cases where the police have no idea who committed it
C) cold cases
D) cases that have been solved
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following information is NOT included in the NCIC system?
A) wanted persons
B) stolen vehicles
C) missing persons
D) sex offender registrations
A) wanted persons
B) stolen vehicles
C) missing persons
D) sex offender registrations
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
The ______ is modeled after the alerts that are used to notify people of impending severe weather.
A) tip line
B) AMBER alert
C) FaceCrook
D) "Have you seen me?" photos in the media provided by the NCMEC
A) tip line
B) AMBER alert
C) FaceCrook
D) "Have you seen me?" photos in the media provided by the NCMEC
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
______ are most often used by the police in ongoing undercover investigations.
A) Lay witnesses
B) Expert witnesses
C) Informers
D) Confidential informants
A) Lay witnesses
B) Expert witnesses
C) Informers
D) Confidential informants
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a type of informant?
A) the hammered informant
B) the mercenary informant
C) the victim informant
D) the vengeful informant
A) the hammered informant
B) the mercenary informant
C) the victim informant
D) the vengeful informant
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
This type of informant is coerced by the police to provide information.
A) the hammered informant
B) the mercenary informant
C) the victim informant
D) the police buff informant
A) the hammered informant
B) the mercenary informant
C) the victim informant
D) the police buff informant
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT a feature gangs often have in common?
A) They are a group.
B) Members use symbols.
C) They are the same in every city.
D) The group is involved in high levels of criminal activity.
A) They are a group.
B) Members use symbols.
C) They are the same in every city.
D) The group is involved in high levels of criminal activity.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
What is the largest crime information network system in the United States operated by the FBI?
A) NCIC
B) NLETS
C) ICTS
D) CIS
A) NCIC
B) NLETS
C) ICTS
D) CIS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
What is one of the problems of the investigative use of social media?
A) People these days barely use social media.
B) The target group of investigations barely uses social media.
C) Posts can take on a life of their own.
D) Police can't release information fast enough through social media.
A) People these days barely use social media.
B) The target group of investigations barely uses social media.
C) Posts can take on a life of their own.
D) Police can't release information fast enough through social media.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
What is not one of the advantages social media could have for criminal investigations?
A) Information can be released quickly.
B) The information can be released unfiltered by other media outlets.
C) Many people worldwide can be reached.
D) Law enforcement can possibly lose control of the information.
A) Information can be released quickly.
B) The information can be released unfiltered by other media outlets.
C) Many people worldwide can be reached.
D) Law enforcement can possibly lose control of the information.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
An investigator is obtaining information from a crime suspect by creating a fake account and searching this suspects account. What is this method called?
A) pulling in
B) pushing out
C) account searching
D) data collection
A) pulling in
B) pushing out
C) account searching
D) data collection
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
What is not part of pulling in information from social media?
A) creation of an alias account and requesting to be friends with someone
B) subpoenas
C) the release of information
D) creation of an anonymous account
A) creation of an alias account and requesting to be friends with someone
B) subpoenas
C) the release of information
D) creation of an anonymous account
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which is the major source for digital evidence?
A) cell phones
B) digital cameras
C) laptops
D) external hard drives
A) cell phones
B) digital cameras
C) laptops
D) external hard drives
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
What is not an objective for the use of electronic devices in investigations?
A) confirmation of a link between a device and an internet site
B) investigators take cell phones away from suspects so they can't call anyone
C) tracking of a device
D) investigators use it to document the content
A) confirmation of a link between a device and an internet site
B) investigators take cell phones away from suspects so they can't call anyone
C) tracking of a device
D) investigators use it to document the content
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
What is not true regarding electronic devices in investigations?
A) They are the most common source of digital evidence these days.
B) Investigators don't need a search warrant since they are not searching a place but a device.
C) The place where the electronic device was found should be treated as a crime scene.
D) Investigators will need a search warrant to be able to search these.
A) They are the most common source of digital evidence these days.
B) Investigators don't need a search warrant since they are not searching a place but a device.
C) The place where the electronic device was found should be treated as a crime scene.
D) Investigators will need a search warrant to be able to search these.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which step should NOT be taken when seizing an electronic device?
A) The device should always be left on to avoid having to hack passwords.
B) The location where the device was found should be treated like a crime scene.
C) Information from the owner of the device should be obtained.
D) The device should be placed in a paper bag.
A) The device should always be left on to avoid having to hack passwords.
B) The location where the device was found should be treated like a crime scene.
C) Information from the owner of the device should be obtained.
D) The device should be placed in a paper bag.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
What is correct in regard to seizing electronic devices?
A) It is not necessary to have trained digital evidence experts direct how computers should be handled.
B) Seized cell phones should be turned off to preserve cell tower location information.
C) Seized cell phones should be left on so messages and calls of potential suspects could be received.
D) Electronic devices should be packed into plastic bags so one could see what the bag contains.
A) It is not necessary to have trained digital evidence experts direct how computers should be handled.
B) Seized cell phones should be turned off to preserve cell tower location information.
C) Seized cell phones should be left on so messages and calls of potential suspects could be received.
D) Electronic devices should be packed into plastic bags so one could see what the bag contains.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
In which scenario should an AMBER Alert be issued?
A) A 9-year-old child went missing from home 30 minutes ago. No one knows where the child is or where he/she went. A potential captor is not known.
B) An 18-year-old did not come home after going out the night before. The parents are concerned and would like their child to come home.
C) A 5-year-old was seen being carried into the car of an unknown person at the park, while his mother was there with him. Witnesses could see the car and remember the license plate.
D) After spending the weekend with his daughter, a father did not drop her off at her mother's house again, because he wanted to spend one more day with her. The father has never been aggressive or otherwise dangerous.
A) A 9-year-old child went missing from home 30 minutes ago. No one knows where the child is or where he/she went. A potential captor is not known.
B) An 18-year-old did not come home after going out the night before. The parents are concerned and would like their child to come home.
C) A 5-year-old was seen being carried into the car of an unknown person at the park, while his mother was there with him. Witnesses could see the car and remember the license plate.
D) After spending the weekend with his daughter, a father did not drop her off at her mother's house again, because he wanted to spend one more day with her. The father has never been aggressive or otherwise dangerous.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
What is not correct in regards to research about child abductions and AMBER Alerts?
A) In the majority of cases where an AMBER Alert was issued, the child was found.
B) In cases where the child is abducted by a stranger a recovery is less likely.
C) In most cases the AMBER Alert itself was the reason for the recovery of the child.
D) The more often an AMBER Alert is issued, the more likely people will ignore them.
A) In the majority of cases where an AMBER Alert was issued, the child was found.
B) In cases where the child is abducted by a stranger a recovery is less likely.
C) In most cases the AMBER Alert itself was the reason for the recovery of the child.
D) The more often an AMBER Alert is issued, the more likely people will ignore them.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What is not correct in regards to street gangs?
A) They mostly operate in specific neighborhoods.
B) They are known to mostly commit burglaries and drug-related crimes.
C) They are becoming more aggressive in their threats towards law enforcement while the number of attacks stayed relatively stable.
D) Their technology and social media use has significantly increase.
A) They mostly operate in specific neighborhoods.
B) They are known to mostly commit burglaries and drug-related crimes.
C) They are becoming more aggressive in their threats towards law enforcement while the number of attacks stayed relatively stable.
D) Their technology and social media use has significantly increase.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is NOT considered an interdepartmental database?
A) ICTS
B) NCIC
C) Milwaukee PD database
D) NLETS
A) ICTS
B) NCIC
C) Milwaukee PD database
D) NLETS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
One of the problems with tip lines is that people may call to falsely report the conduct of friends or associates.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
One of the problems with telephone tip lines set up for specific high-profile crimes is that they usually receive very few calls.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Facebook is not useful to investigators because they have to "Friend" the person they are investigating, and that person rarely accepts.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
NCIC and NLETS are examples of interdepartmental databases.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Gangs have identifiers, such as colors or symbols, which are worn or shown through the use of graffiti, tattoos, clothing, and hand symbols.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
The public display of identifiers by gangs has increased in recent years to boast to the police that gangs are seemingly untouchable.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Gang members are disproportionately involved in crime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Task forces have been developed that specifically focus on gathering gang intelligence.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
The mercenary informant is motivated by money to provide information to the police.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
The use of a confidential informant is a controversial practice but it is viewed as a necessary evil.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
What are the limitations of AMBER alerts?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
What criteria need to be satisfied to send out an AMBER alert?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Define and discuss confidential informants.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Name the criteria that are used to define a gang.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
What is the difference between intradepartmental databases and interdepartmental agencies?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck