CRJS 241: Quiz 1

0.0(0)
studied byStudied by 1 person
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/178

flashcard set

Earn XP

Description and Tags

Last updated 10:57 PM on 1/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

179 Terms

1
New cards

What are the 3 ways technology is abused or used by criminals?

Technology as a communications medium, a target, and as evidence

2
New cards

What does technology provide for criminal communication?

Anonymity, reach, and efficiency

3
New cards

Technology creates spaces where _______ or _____ behavior can be openly discussed

Stigmatized; illegal

4
New cards

What enables illicit markets that challenge law enforcement?

Online platforms and encryption

5
New cards

_______ form around criminal behavior, reinforcing and spreading knowledge, skills, and techniques to avoid detection

Subcultures

6
New cards

Customers of prostitution networks use web forums and chat rooms to share information about what?

Location of sex workers, services offered, pricing, and police presence in certain areas

7
New cards

Why is communication easier online for prostitution networks?

Social stigma and legal risks discourage open discussion in public, and the Internet offers a faceless, anonymous environment

8
New cards

______ are bought and sold on online marketplaces like Silk Road

Narcotics

9
New cards

What type of market operates mainly on the Dark Web?

Drug markets

10
New cards

How is the drug market on the Dark Web accessible?

Only via specialized encryption software and protocols

11
New cards

What is required to get onto the dark web typically?

TOR

12
New cards

How does having a TOR help you on the dark web?

To mask IP addresses and user locations

13
New cards

What does TOR stand for?

The Onion Router

14
New cards

On the dark web, content is not indexed by ____ ____ like ______

Search engines; Google

15
New cards

Why does law enforcement have difficulty shutting down drug markets?

The hosting source is hidden

16
New cards

What do internet and online communication mediums (CMCs) help do?

Form subcultures based on shared interests, including deviant or criminal ones

17
New cards

What are the features of criminal internet subcultures?

  • Unique values, norms, and rituals separate them from mainstream society

  • Codes of conduct guide interactions within the group

  • Shared goals and beliefs justify criminal activity

  • Specialized skills (ex: programming, hacking) are valued

  • Use of slang or coded language to signal membership and exclude outsiders

18
New cards

_______ can be exploited to attack individuals, businesses, and governments both online and offline

Technology

19
New cards

Many Internet-connected devices like TVs, computers, video game systems, thermostats, security systems contain sensitive data like what?

Shopping habits and username/passwords (bank, email, etc.)

20
New cards

Since devices can communicate with one another, what can hackers do?

Exploit them to steal information

21
New cards

True or False: Hacking always require advanced skills

False

22
New cards

Hacking can include (in terms of minimal hacking skills) what?

Guessing an email or computer password and gaining unauthorized entry into protected systems or data

23
New cards

Research shows ___-___% of college students have attempted to guess someone else’s password

10-25

24
New cards

Once access is gained, hackers can do what?

Commit fraud and engage in theft both online or offline

25
New cards

Hackers sometimes target websites to cause harm or spread _______ _______

Ideological messages

26
New cards

Web Defacement = what?

Online vandalism where hackers replace a site’s HTML code with their own image/message

27
New cards

What is an example of Web defacement politically?

Defacing the White House website with custom content

28
New cards

What are the harms of web defacement?

Embarrassment to the website owner and possible loss of original content if deleted

29
New cards

How can technology play an incidental role in offenses?

Used directly in the crime and used merely as a storage device for evidence (ex: child pornography on a laptop or phone)

30
New cards

Any such information stored or transferred digitally is ____ ____ otherwise known as _____ _____ _____

Digital evidence; binary form data

31
New cards

Forms of digital evidence can be what?

  • Browser history

  • Emails and chat logs

  • Photos and videos on phones or cameras

  • GPS and loT device data

  • Data on tablets, music players, or internet-enabled devices

32
New cards

True or False: Forms of digital evidence are not limited to computers because many modern devices can hold or transmit evidence

True

33
New cards

Cyberdeviance (The difference between misuse and abuse)

Not necessarily illegal but socially frowned upon but not illegal

34
New cards

Cybercrimes

When deviance becomes crime; technology-enabled actions that violate law

35
New cards

Cyberterrorism

Politically or ideologically motivated attacks designed to cause fear and disruption

36
New cards

Technology can serve as both what and what?

A communication medium to connect, share, or organize and a target for attacks like infrastructure, system, or digital data

37
New cards

Deviance

Behavior outside cultural norms, but not always illegal

38
New cards

What are some examples of deviance online?

  • Texting or browsing Facebook in class or during a movie → disruptive, but not criminal

  • Viewing pornography → legal for those 18+, but may be seen as morally wrong in some communities

39
New cards

Cyberdeviance (Term)

Deviant behavior facilitated by technology

40
New cards

What is an example of cybercrime?

Pornography with participants under 18 → illegal under U.S. state and federal law

41
New cards

Cybercrime (Term)

Crimes using special knowledge of cyberspace

42
New cards

Computer Crime (Term)

Crimes using specialized computer knowledge

43
New cards

True or False: Cybercrime and computer crime are not synonymous today due to universal Internet connectivity

False

44
New cards

When did cyberterrorism emerge?

In the mid 1990s as digital technology became central to society

45
New cards

Cyberterrorism is generally known as what?

Use of technology/CMCs to cause harm and drive social or political change

46
New cards

What are the characteristics of cyberterrorism?

  • Target sensitive systems, data, or networks

  • Driven by ideological/political motives

  • Seeks to cause fear in the broader population, not just harm an individual

47
New cards

True or False: Cybercrime and cyberterrorism are difficult to distinguish without context

True

48
New cards

How can a data breach be a cybercrime?

If done for financial gain

49
New cards

How can a data breach by a cyberterror?

If done to embarrass or punish a company for ideological reasons

50
New cards

What is an example of a cyberterrorism group?

Far-left activists (ex: Animal Liberation Front) have conducted hacks framed as ideological protest

51
New cards

Why is cybercrime attractive?

  • Technology as a force multiplier

  • Reduced Risk of Detection

  • Technology is ubiquitous and affordable

  • Ease of Offending

  • Legal and Jurisdictional Challenges

  • “Dark Figure” of Cybercrime/Underreporting

52
New cards

What does it mean that technology is a force multiplier?

Allows one person to impact thousands of victims at once

53
New cards

What is an example of technology being a force multiplier?

Offline robbery = limited to one victim at a time but online fraud = spam emails sent to thousands simultaneously

54
New cards

What does it mean that with cybercrime there’s a reduced risk of detection?

In the physical world, offenders need masks, disguises, and risk being caught on camera

55
New cards

What do offenders benefit from online?

Anonymity (faceless nature of the Internet), fake accounts with false details, and proxy serves/TOR to hide location and identity

56
New cards

How is technology ubiquitous and affordable?

Computers and smartphones are relatively inexpensive and internet access is available almost everywhere

57
New cards

In terms of the ease of offending online, is an example of high-skill crimes?

Creating/disseminating malware

58
New cards

In terms of the ease of offending online, is an example of low-skill crimes?

Downloading pirated media, sending threatening emails

59
New cards

Accessibility → makes offending possible for both _____ ____ and _____ (Ease of Offending)

Technical experts; novices

60
New cards

What are the legal and jurisdictional challenges of cybercrime?

Some countries don’t extradite cybercriminals while others may lack laws against certain offenses which creates safe havens for offenders and makes international cooperation and prosecution difficult

61
New cards

What country doesn’t extradite cybercriminals?

Russia

62
New cards

What is an example of a country that lacks laws against certain offenses?

No malware laws in the Philippines during the ILOVEYOU virus

63
New cards

Why do many victims not report cybercrimes?

  • They don’t realize they’ve been victimized and can’t detect cause of system of failure

  • They’re embarrassed/shamed like romance scam victims

  • They feel police may blame them or not take it seriously

64
New cards

What does the “Dark Figure” of Cybercrime lead to?

Undercounting and difficulty in knowing the true scale of cybercrime

65
New cards

David Wall’s Typology of Cybercrime (2001)

Helps explain the wide range of online deviant and criminal behaviors and how technology creates new forms of harm and subcultures

66
New cards

What are the four typologies of cybercrime according to David Wall?

Cyber-trespass, cyber-theft and deception, cyber-porn and obscenity, and cyber-violence

67
New cards

Cyber-Trespass

Crossing digital boundaries of ownership without permission

68
New cards

What are some examples of Cyber-Trespass?

Unauthorized access to Wi-Fi networks or hacking into systems, email accounts, or protected databases

69
New cards

What are the key points in Cyber-Trespass?

  • Ownership and permission

  • Hackers may cause major financial harm, but not all hackers engage in crime (“ethical” vs. “criminal” divide)

  • Exists within a large online hacking subculture, with ongoing debates about legality and ethics

70
New cards

Cyber-Deception and Theft

Illegally acquiring information or resources online

71
New cards

What are some examples of Cyber-Deception and Theft

Phishing scams, data breaches, and digital piracy

72
New cards

Phishing Scams

Fake emails/websites tricking victims into revealing banking or login details

73
New cards

Data Breaches

Resale of stolen credentials on black markets

74
New cards

Digital Piracy

Illegal copying/distribution of music, movies, software, and games

75
New cards

Cyber-Porn and Obscenity

Creation, distribution, or consumption sexually explicit material online

76
New cards

True or False: Adult pornography (18+) is legal in most countries

True

77
New cards

What is an example of how cyber-porn and obscenity legality depends on jurisdiction?

Certain content (violent, animal related, or child exploitation) is considered criminal

78
New cards

What is considered criminal activity in terms of cyber-porn and obscenity?

Prostitution advertising and coordination via the Internet and pedophiles using forums, messaging apps, and file-sharing to trade images and groom children

79
New cards

Cyber-Violence

Sending or accessing harmful, threatening, or extremist content online

80
New cards

What are the two forms of harm in Cyber-Violence?

Emotional/psychological and physical

81
New cards

Emotional/Psychological Harm in Cyber-Violence

Cyberbullying, harassment, online stalking, and revenge porn

82
New cards

Physical Harm in Cyber-Violence

Suicidal ideation triggered by online abuse

83
New cards

What are some examples of Cyber-Violence?

Posting humiliating videos/images on social media and threatening or sexual messages via email, IM, or text

84
New cards

What is extremism and terrorism in Cyber-Violence?

Extremist groups use the Internet to spread propaganda, recruit, and radicalize

85
New cards

Cyberattacks Examples

DDoS attacks by jihadist groups against governments and corporation; hacker collectives like anonymous staging politically motivated cyber-protests

86
New cards

What is the sequence of a criminal case?

Filing a complaint (no arrest) → arrest → arraignment → preliminary hearing (Waive preliminary hearing or charges dropped) → bound over for trial → pretrial conference (plead guilty → sentencing) → plead not guilty → trial (Not guilty) → guilty → sentencing → appeal (denied or granted → new trial)

87
New cards

First Amendment

Freedom of religion, establishment clause, free exercise clause, freedom of speech, freedom of the press, right to assemble, and right to petition

88
New cards

Fourth Amendment

Protection against unreasonable searches and seizures, requirement for warrants, and privacy rights

89
New cards

Probable Cause

There is a reasonable basis for believing that a crime may have been committed (for an arrest) or when evidence of the crime is present in the place to be searched (for a search)

90
New cards

Fifth Amendment

Right against self-incrimination, double jeopardy protection, due process of law, grand jury indictment, and just compensation for property

91
New cards

Criminal Laws

Moral or behavioral guidelines have been violated, and the state investigates and prosecutes on behalf of the victim

92
New cards

Burden of Proof for Criminal Investigations

Beyond a reasonable doubt

93
New cards

Beyond a Reasonable Doubt

The state must prove their claims with evidence that demonstrates the guilt of the accused beyond a reasonable doubt

94
New cards

What are the three levels of policing?

Local police (municipal) and sheriffs → state police → federal

95
New cards

What are the duties of municipal police?

  • Responding to calls, investigating crimes, arresting offenders

  • Preventing crime, increasing public safety, assisting citizens

  • Many victims first contact local law enforcement for cybercrime issues

96
New cards

Municipal police capabilities vary by _____ ____ and _____

Agency size; resources

97
New cards

True or False: Larger municipal police agencies are more likely to dedicate resources to cybercrime

True

98
New cards

Who do municipal police serve?

Cities and towns

99
New cards

Sheriff’s offices vary by _____

Region

100
New cards

What types of areas do sheriff’s offices patrol?

Some patrol unincorporated or rural areas while others only manage county jails, court security, civil laws like evictions