Deck 14: Technology Review: Uses the Good, concerns the Bad, and Legislation

Full screen (f)
exit full mode
Question
How does the new TASER CAM provide increased protection for police officers?

A) It significantly reduces the risk of cardiac arrest as a result of TASER use.
B) It allows the suspect's behavior prior to TASER use to be recorded.
C) It has multishot capability, reducing the risk of suspects reacting violently and injuring the officer.
D) It can engage multiple targets, protecting the officer from attack from other suspects.
Use Space or
up arrow
down arrow
to flip the card.
Question
A geographic information system:

A) informs police about crimes by time of day
B) maps the names and addresses of suspects whose method of operation fits the crimes being investigated
C) provides information concerning crimes in foreign countries that are similar to those being investigated in the United States
D) includes grant funds for police travel to investigate crimes outside of their jurisdictions
Question
The majority of states have passed laws:

A) allowing police to access cell phone location data
B) allowing the use of smartphone apps by police
C) legalizing the use of cell phones in motor vehicles
D) criminalizing texting while driving
Question
The 2012 Supreme Court ruling regarding the use of GPS devices by the police states that:

A) the police may not attach a GPS device to a suspect's vehicle without the suspect's permission
B) the police may not attach a GPS device to a suspect's vehicle without a search warrant
C) the police may attach a GPS device to a suspect's vehicle without a search warrant if they have probable cause
D) the police may attach a GPS device to a suspect's vehicle at any time
Question
The exfiltration stage of the kill chain involves:

A) reading company websites and identifying social network participation of likely targets
B) downloading tools and moving laterally from the target network to other hosts
C) compromising the host machine and installing malware
D) weaponizing an attack payload and delivering it to the target
Question
During a cyberattack,the ____________ serves as the national response center for the United States.

A) National Cybersecurity and Communications Integration Center
B) Center for Internet Security
C) Department of Homeland Security
D) Security Operations Center of INTERPOL
Question
Which of the following is not possible using San Diego's ARJIS interactive crime mapping system?

A) Learning about crime in one's local area
B) Getting information about citizen patrol
C) Getting personal information about patrol officers
D) Learning about crime data for certain days of the week
Question
UAVs are designed to:

A) carry human operators
B) carry lethal weapons for use in military operations
C) carry nonlethal payloads for reconnaissance missions
D) uses a localized air supply for fuel and ammo
Question
Some police agencies have begun using ____________________ during collision investigations to determine details such as vehicle location and damage,elevation,and critical speed.

A) accident scene systems
B) car accident investigation systems
C) central positioning systems
D) global positioning systems
Question
San Diego County's Automated Regional Justice Information System makes _______________ available to the public on the Internet.

A) information on patrol officers
B) surveys about crime rates
C) interactive crime maps
D) tips on child safety
Question
Robots are now fitted with all but which of the following?

A) Video capability, including night vision
B) A camera
C) A TASER ECD
D) Lethal weapons
Question
The _______________ stage of the kill chain involves an attacker compromising the host machine and installing malware allowing the attacker to execute commands.

A) reconnaissance
B) exfiltration
C) weaponization
D) exploitation
Question
The TASER is an example of a(n):

A) bot
B) UAV
C) ECD
D) MDT
Question
The "total station" system used by some police agencies for traffic crash investigation includes all but which of the following components?

A) A base station
B) An on-scene satellite dish
C) A data collector
D) A prism to reflect an infrared laser beam
Question
_________________is used to locate serial offenders.

A) Investigative technique
B) Geographic profiling
C) Computer-aided dispatch
D) Forensics
Question
The International Association of Chiefs of Police recommends that:

A) the police significantly expand use of UAVs for monitoring and investigation
B) police obtain a search warrant before using a UAV for investigative purposes
C) police officers operating UAVs should be licensed pilots to reduce ricks of civil liability
D) UAVs carrying nonlethal weapons should be used by the police when apprehending dangerous suspects
Question
To obtain electronic messages greater than 180 days old,the Stored Communications Act requires police to have:

A) a warrant
B) probable cause
C) facts showing the messages are material to an ongoing investigation
D) All of the above are required.
Question
Computerized crime mapping uses all but which of the following sources of information?

A) Demographic data from the Census Bureau
B) Crime statistics from the department's CAD system
C) Offense data from the FBI UCR.
D) Geographic information from global positioning satellites
Question
Which of the following is not a concern about the use of social media by the police?

A) It increases officers' community exposure.
B) It serves as a force multiplier.
C) It permits cop-baiting.
D) It releases information without adequate filtering.
Question
Using laptop computers,officers can do all but which of the following?

A) Access court documents
B) Communicate with other officers via e-mail instead of on open radio channels
C) Enter license numbers and locate drivers with outstanding warrants
D) Accept traffic fine payments from drivers after giving out traffic tickets
Question
Drone controllers are required to be licensed pilots,to reduce the risk of crashing.
Question
UAVs are used by the police for surveillance and target spotting.
Question
Texting while driving is illegal in the majority of the states today.
Question
________ involve(s)engineering components that are extremely small.

A) Augmented reality
B) Nanotechnology
C) UAVs
D) Drones
Question
Crime mapping requires access to expensive hardware and software and is not yet within the reach of most police departments.
Question
Which of the following is not a possible future use of augmented reality for policing?

A) Facial, voiceprint, and other biometric recognition data of known criminals
B) Real-time language translation and data on cultural customs and traditions
C) Accessibility of scalable 3-D maps
D) The integration of nanotechnology into drug detection devices
Question
Hactivism involves cyberhacking for profit.
Question
California's CALGANG software package contains information about:

A) the places individual gang members frequent and the cars they drive
B) the activities of the Hell's Angels
C) members of China's Tong gang who are expected to migrate to the state in large numbers
D) None of the above
Question
AFIS is designed to:

A) reduce the risk of high-speed pursuits by the police.
B) allow fingerprint records to be shared among departments
C) create a clearinghouse for information on gang members
D) permit officers to use augmented reality for training purposes
Question
Why are gun lobbies expected to oppose a system in which gun manufacturers take "fingerprints" of guns before they leave the factories?

A) It is too easy for criminals to scratch the firing pin.
B) The system is very much like a national gun registry.
C) The process would trace the owner of the gun, not necessarily the user.
D) Any database created would not include guns already in circulation.
Question
Research suggests that TASERS may pose a serious risk of inducing a heart attack.
Question
Social networking is a force multiplier for the police.
Question
It is possible for citizens to anonymously submit crime tips by texting them.
Question
The TASER X3 can engage multiple targets.
Question
The weaponization stage of the kill chain involves installing malware on the host machine that will allow the attacker to command execution.
Question
Using FATS provides officers with training in:

A) high-speed pursuit driving
B) interrogation techniques
C) shoot/don't shoot decisions
D) investigation techniques
Question
Geographic profiling is most effective when used in conjunction with linkage analysis.
Question
The use of robots to search James Egan Holmes' apartment after the shooting at the Aurora,Colorado movie theater significantly reduced the risk of police officer injury in that situation.
Question
The police are not required to get a search warrant before attaching a GPS device to a suspect's vehicle
Question
Which technique to prevent traffic-related crime is least likely to result in personal injuries or significant damage to vehicles?

A) Tire spikes
B) A three-cruiser rolling roadblock
C) The Peacemaker vehicle
D) High-speed pursuits
Question
TASER International,Inc.encourages law enforcement officers to avoid aiming the TASER at the _______.
Question
The ________ vehicle used by the Fort Lauderdale Police Department has been criticized as a violation of privacy.
Question
___________ combines geographic data from GPS satellites,crime statistics from CAD systems,and demographic data from the U.S.Census Bureau.
Question
AFIS permits departments to easily share fingerprint data.
Question
Police are using ______ during collision investigations to determine details such as critical speed,elevation,vehicle location,and damage.
Question
Gun fingerprints are difficult to change or destroy.
Question
Nanotechnology is currently being used in drug detection devices.
Question
Devices that disrupt a vehicle's ignition system can increase the need for high-speed pursuits.
Question
The IACP recommends police secure a(n)___________ before launching drones for investigative purposes.
Question
The most potent weapon state and local governments have against increasingly sophisticated cybercrminals may be _________.
Question
Firearms training systems train police in making judgments about when to shoot and when not to shoot.
Question
The _______ stage of the kill chain involves compromising the host machine and installing malware that allows the attacker to command execution.
Question
Electronic systems to collect data and measurements at traffic collision scenes greatly increase the accuracy of the measurements but also delay the resumption of normal traffic flow because it takes longer to collect data using these systems.
Question
According to the Supreme Court,it is a violation of the _______ Amendment for the police to attach a GPS device to a suspect's vehicle without a search warrant.
Question
Geographic ________ analyzes the geographic of locations in which serial offenders operate to map the most probable location of the suspect's home.
Question
Geographic profiling is most effective when it is used in conjunction with ___________ analysis.
Question
The ________ Act gives police access to electronic messages without having to establish probable cause.
Question
__________ allows fingerprint data to be rapidly shared among law enforcement agencies.
Question
______ involves cyberhacking committed with political and social objectives in mind.
Question
Augmented reality may provide police with the ability to force criminals to describe their crimes in real-time terms.
Question
Explain computerized crime mapping and how it can be used by law enforcement.
Question
________ reality technology uses wearable components to overlay virtual information onto a real-world view.
Question
Discuss the pros and cons of using unmanned aerial vehicles for law enforcement and explain whether police should be permitted to use UAVs.
Question
You work for a large urban police department with a limited budget.You obviously cannot afford all the new technologies available.Identify the three new technologies you think are most important for your agency and explain your choice.
Question
Explain some of the uses of drones for law enforcement and the concerns that have been raised regarding their use by the police.
Question
The addition of a(n)_________ to the basic FATS system increases the realism of the simulation.
Question
Explain augmented reality and nanotechnology and review some of the functions and future benefits that might be realized by the police through the use of augmented reality and nanotechnology.
Question
Explain the steps in the "kill chain" and the best way to prevent these attacks.
Question
Match between columns
Exploitation
Establishing a target, creating an attack payload, and sending it to the target
Exploitation
The attacker downloads tools and moves laterally onto other hosts
Exploitation
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Exploitation
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Exploitation
Installing malware that allows continued access
Command and control
Establishing a target, creating an attack payload, and sending it to the target
Command and control
The attacker downloads tools and moves laterally onto other hosts
Command and control
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Command and control
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Command and control
Installing malware that allows continued access
Exfiltration
Establishing a target, creating an attack payload, and sending it to the target
Exfiltration
The attacker downloads tools and moves laterally onto other hosts
Exfiltration
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Exfiltration
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Exfiltration
Installing malware that allows continued access
Weaponization and delivery
Establishing a target, creating an attack payload, and sending it to the target
Weaponization and delivery
The attacker downloads tools and moves laterally onto other hosts
Weaponization and delivery
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Weaponization and delivery
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Weaponization and delivery
Installing malware that allows continued access
Reconnaissance
Establishing a target, creating an attack payload, and sending it to the target
Reconnaissance
The attacker downloads tools and moves laterally onto other hosts
Reconnaissance
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Reconnaissance
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Reconnaissance
Installing malware that allows continued access
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Technology Review: Uses the Good, concerns the Bad, and Legislation
1
How does the new TASER CAM provide increased protection for police officers?

A) It significantly reduces the risk of cardiac arrest as a result of TASER use.
B) It allows the suspect's behavior prior to TASER use to be recorded.
C) It has multishot capability, reducing the risk of suspects reacting violently and injuring the officer.
D) It can engage multiple targets, protecting the officer from attack from other suspects.
C
2
A geographic information system:

A) informs police about crimes by time of day
B) maps the names and addresses of suspects whose method of operation fits the crimes being investigated
C) provides information concerning crimes in foreign countries that are similar to those being investigated in the United States
D) includes grant funds for police travel to investigate crimes outside of their jurisdictions
B
3
The majority of states have passed laws:

A) allowing police to access cell phone location data
B) allowing the use of smartphone apps by police
C) legalizing the use of cell phones in motor vehicles
D) criminalizing texting while driving
D
4
The 2012 Supreme Court ruling regarding the use of GPS devices by the police states that:

A) the police may not attach a GPS device to a suspect's vehicle without the suspect's permission
B) the police may not attach a GPS device to a suspect's vehicle without a search warrant
C) the police may attach a GPS device to a suspect's vehicle without a search warrant if they have probable cause
D) the police may attach a GPS device to a suspect's vehicle at any time
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
The exfiltration stage of the kill chain involves:

A) reading company websites and identifying social network participation of likely targets
B) downloading tools and moving laterally from the target network to other hosts
C) compromising the host machine and installing malware
D) weaponizing an attack payload and delivering it to the target
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
During a cyberattack,the ____________ serves as the national response center for the United States.

A) National Cybersecurity and Communications Integration Center
B) Center for Internet Security
C) Department of Homeland Security
D) Security Operations Center of INTERPOL
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not possible using San Diego's ARJIS interactive crime mapping system?

A) Learning about crime in one's local area
B) Getting information about citizen patrol
C) Getting personal information about patrol officers
D) Learning about crime data for certain days of the week
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
UAVs are designed to:

A) carry human operators
B) carry lethal weapons for use in military operations
C) carry nonlethal payloads for reconnaissance missions
D) uses a localized air supply for fuel and ammo
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
Some police agencies have begun using ____________________ during collision investigations to determine details such as vehicle location and damage,elevation,and critical speed.

A) accident scene systems
B) car accident investigation systems
C) central positioning systems
D) global positioning systems
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
San Diego County's Automated Regional Justice Information System makes _______________ available to the public on the Internet.

A) information on patrol officers
B) surveys about crime rates
C) interactive crime maps
D) tips on child safety
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
Robots are now fitted with all but which of the following?

A) Video capability, including night vision
B) A camera
C) A TASER ECD
D) Lethal weapons
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
The _______________ stage of the kill chain involves an attacker compromising the host machine and installing malware allowing the attacker to execute commands.

A) reconnaissance
B) exfiltration
C) weaponization
D) exploitation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
The TASER is an example of a(n):

A) bot
B) UAV
C) ECD
D) MDT
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
The "total station" system used by some police agencies for traffic crash investigation includes all but which of the following components?

A) A base station
B) An on-scene satellite dish
C) A data collector
D) A prism to reflect an infrared laser beam
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
_________________is used to locate serial offenders.

A) Investigative technique
B) Geographic profiling
C) Computer-aided dispatch
D) Forensics
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
The International Association of Chiefs of Police recommends that:

A) the police significantly expand use of UAVs for monitoring and investigation
B) police obtain a search warrant before using a UAV for investigative purposes
C) police officers operating UAVs should be licensed pilots to reduce ricks of civil liability
D) UAVs carrying nonlethal weapons should be used by the police when apprehending dangerous suspects
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
To obtain electronic messages greater than 180 days old,the Stored Communications Act requires police to have:

A) a warrant
B) probable cause
C) facts showing the messages are material to an ongoing investigation
D) All of the above are required.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
Computerized crime mapping uses all but which of the following sources of information?

A) Demographic data from the Census Bureau
B) Crime statistics from the department's CAD system
C) Offense data from the FBI UCR.
D) Geographic information from global positioning satellites
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is not a concern about the use of social media by the police?

A) It increases officers' community exposure.
B) It serves as a force multiplier.
C) It permits cop-baiting.
D) It releases information without adequate filtering.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
Using laptop computers,officers can do all but which of the following?

A) Access court documents
B) Communicate with other officers via e-mail instead of on open radio channels
C) Enter license numbers and locate drivers with outstanding warrants
D) Accept traffic fine payments from drivers after giving out traffic tickets
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
Drone controllers are required to be licensed pilots,to reduce the risk of crashing.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
UAVs are used by the police for surveillance and target spotting.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
Texting while driving is illegal in the majority of the states today.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
________ involve(s)engineering components that are extremely small.

A) Augmented reality
B) Nanotechnology
C) UAVs
D) Drones
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
Crime mapping requires access to expensive hardware and software and is not yet within the reach of most police departments.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is not a possible future use of augmented reality for policing?

A) Facial, voiceprint, and other biometric recognition data of known criminals
B) Real-time language translation and data on cultural customs and traditions
C) Accessibility of scalable 3-D maps
D) The integration of nanotechnology into drug detection devices
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
Hactivism involves cyberhacking for profit.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
California's CALGANG software package contains information about:

A) the places individual gang members frequent and the cars they drive
B) the activities of the Hell's Angels
C) members of China's Tong gang who are expected to migrate to the state in large numbers
D) None of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
AFIS is designed to:

A) reduce the risk of high-speed pursuits by the police.
B) allow fingerprint records to be shared among departments
C) create a clearinghouse for information on gang members
D) permit officers to use augmented reality for training purposes
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Why are gun lobbies expected to oppose a system in which gun manufacturers take "fingerprints" of guns before they leave the factories?

A) It is too easy for criminals to scratch the firing pin.
B) The system is very much like a national gun registry.
C) The process would trace the owner of the gun, not necessarily the user.
D) Any database created would not include guns already in circulation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
Research suggests that TASERS may pose a serious risk of inducing a heart attack.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
Social networking is a force multiplier for the police.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
It is possible for citizens to anonymously submit crime tips by texting them.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
The TASER X3 can engage multiple targets.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
The weaponization stage of the kill chain involves installing malware on the host machine that will allow the attacker to command execution.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
Using FATS provides officers with training in:

A) high-speed pursuit driving
B) interrogation techniques
C) shoot/don't shoot decisions
D) investigation techniques
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
Geographic profiling is most effective when used in conjunction with linkage analysis.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
The use of robots to search James Egan Holmes' apartment after the shooting at the Aurora,Colorado movie theater significantly reduced the risk of police officer injury in that situation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
The police are not required to get a search warrant before attaching a GPS device to a suspect's vehicle
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
Which technique to prevent traffic-related crime is least likely to result in personal injuries or significant damage to vehicles?

A) Tire spikes
B) A three-cruiser rolling roadblock
C) The Peacemaker vehicle
D) High-speed pursuits
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
TASER International,Inc.encourages law enforcement officers to avoid aiming the TASER at the _______.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
The ________ vehicle used by the Fort Lauderdale Police Department has been criticized as a violation of privacy.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
___________ combines geographic data from GPS satellites,crime statistics from CAD systems,and demographic data from the U.S.Census Bureau.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
AFIS permits departments to easily share fingerprint data.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
Police are using ______ during collision investigations to determine details such as critical speed,elevation,vehicle location,and damage.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Gun fingerprints are difficult to change or destroy.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Nanotechnology is currently being used in drug detection devices.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
Devices that disrupt a vehicle's ignition system can increase the need for high-speed pursuits.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
The IACP recommends police secure a(n)___________ before launching drones for investigative purposes.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
The most potent weapon state and local governments have against increasingly sophisticated cybercrminals may be _________.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Firearms training systems train police in making judgments about when to shoot and when not to shoot.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
The _______ stage of the kill chain involves compromising the host machine and installing malware that allows the attacker to command execution.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
Electronic systems to collect data and measurements at traffic collision scenes greatly increase the accuracy of the measurements but also delay the resumption of normal traffic flow because it takes longer to collect data using these systems.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
According to the Supreme Court,it is a violation of the _______ Amendment for the police to attach a GPS device to a suspect's vehicle without a search warrant.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
Geographic ________ analyzes the geographic of locations in which serial offenders operate to map the most probable location of the suspect's home.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
Geographic profiling is most effective when it is used in conjunction with ___________ analysis.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
The ________ Act gives police access to electronic messages without having to establish probable cause.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
__________ allows fingerprint data to be rapidly shared among law enforcement agencies.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
______ involves cyberhacking committed with political and social objectives in mind.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
Augmented reality may provide police with the ability to force criminals to describe their crimes in real-time terms.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Explain computerized crime mapping and how it can be used by law enforcement.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
________ reality technology uses wearable components to overlay virtual information onto a real-world view.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
Discuss the pros and cons of using unmanned aerial vehicles for law enforcement and explain whether police should be permitted to use UAVs.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
You work for a large urban police department with a limited budget.You obviously cannot afford all the new technologies available.Identify the three new technologies you think are most important for your agency and explain your choice.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Explain some of the uses of drones for law enforcement and the concerns that have been raised regarding their use by the police.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
The addition of a(n)_________ to the basic FATS system increases the realism of the simulation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
Explain augmented reality and nanotechnology and review some of the functions and future benefits that might be realized by the police through the use of augmented reality and nanotechnology.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
Explain the steps in the "kill chain" and the best way to prevent these attacks.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
Match between columns
Exploitation
Establishing a target, creating an attack payload, and sending it to the target
Exploitation
The attacker downloads tools and moves laterally onto other hosts
Exploitation
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Exploitation
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Exploitation
Installing malware that allows continued access
Command and control
Establishing a target, creating an attack payload, and sending it to the target
Command and control
The attacker downloads tools and moves laterally onto other hosts
Command and control
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Command and control
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Command and control
Installing malware that allows continued access
Exfiltration
Establishing a target, creating an attack payload, and sending it to the target
Exfiltration
The attacker downloads tools and moves laterally onto other hosts
Exfiltration
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Exfiltration
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Exfiltration
Installing malware that allows continued access
Weaponization and delivery
Establishing a target, creating an attack payload, and sending it to the target
Weaponization and delivery
The attacker downloads tools and moves laterally onto other hosts
Weaponization and delivery
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Weaponization and delivery
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Weaponization and delivery
Installing malware that allows continued access
Reconnaissance
Establishing a target, creating an attack payload, and sending it to the target
Reconnaissance
The attacker downloads tools and moves laterally onto other hosts
Reconnaissance
Reading company websites, industry whitepapers, and identifying social network participation of likely targets
Reconnaissance
The attacker compromises the host machine and the delivery mechanism installs malware to allow the attacker to command execution
Reconnaissance
Installing malware that allows continued access
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 69 flashcards in this deck.