Digital Crime: Test 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

Pen/trap statute

This just covers 'records' of digital communication, not the content of the communication.

2
New cards

Pen/trap device

A tool used in digital crime investigations to record who a suspect communicates with (like phone numbers or IP addresses) without capturing the actual content of the messages.

3
New cards

Application of old law to digital evidence

This old law applies to digital evidence by allowing investigators to collect online communication data, like IP addresses and email headers, instead of just phone numbers.

4
New cards

Digital evidence coverage

For digital evidence, the law has been applied to cover records of digital communications like email addresses, IP addresses, and account information.

5
New cards

Court order for digital records

Allows law enforcement to apply for a court order to get digital records of communication if info is 'relevant to an ongoing criminal investigation' (determined by a judge).

6
New cards

Duration of records collection

You can get up to 60 days of records, then apply for another 60-day extension.

7
New cards

1968 federal wiretap statute

This one involves not just records of communication, but real-time electronic surveillance of the communication of criminal suspects.

8
New cards

Wiretap evidence court use

Wiretap evidence cannot be used in court unless one of the following exceptions applies.

9
New cards

Court order exception

Get approval from DOJ and the US District Court of Appeals. Good for 30 days.

10
New cards

Consent exception

One-party vs two-party consent states; Ohio is a party consent state, so one person involved in communication can consent to surveillance.

11
New cards

Provider exception

Administrators of computer networks are allowed to monitor communications on their networks (not police) and can provide evidence to police.

12
New cards

Trespasser exception

A victim of a computer attack can authorize police to intercept communications.

13
New cards

Extension telephone exception

Covers routine recording of communications through criminal justice facilities like jails/prisons, police departments.

14
New cards

Inadvertently obtained evidence

Evidence obtained by providers and forwarded to police under the silver platter doctrine.

15
New cards

Publicly accessible communications

Unencrypted info broadcast over public networks is not protected (social media).

16
New cards

1986 Electronic Communications Privacy Act

This one regulates how the government can obtain stored account info from internet service providers (ISPs).

17
New cards

Privacy protection categories

Info to be obtained must be specified under one of the three categories: 1. Basic subscriber info (name, address, bills), 2. Subscriber logs (e.g., email destinations), 3. Content of communication.

18
New cards

Internet traffic analysis

The process involves internet traffic analysis by the FBI, CIA, and NSA.

19
New cards

US Patriot Act

The US Patriot Act expanded police power in cases that are 'terroristic offenses.'

20
New cards

FISA court

Approvals often go through the FISA court (the federal intelligence surveillance court).

21
New cards

US of Secrets issue

The tension between national security and individual privacy, the government's collection of vast amounts of digital communications through surveillance programs.

22
New cards

Post-9/11 surveillance context

Post-9/11, the U.S. government expanded surveillance to prevent terrorism; agencies like the NSA collected data from phones, emails, and internet activity.

23
New cards

Thin thread

An NSA program designed to collect and analyze intelligence while protecting Americans' privacy by encrypting personal information.

24
New cards

Trailblazer program

Refers to Trailblazer, which aimed to track communications without the privacy protections of ThinThread; it became expensive, controversial, and less efficient.

25
New cards

Edward Snowden

A former NSA contractor who leaked classified documents in 2013, revealing the extent of government surveillance programs on both Americans and foreign citizens.

26
New cards

DOJ (US Department of Justice)

Headed by the attorney general or the chief law enforcement officer of the United States; the agency is really a bunch of lawyers who are mostly federal prosecutors who work for the U.S. Attorney's office.

27
New cards

CCIPS

Computer crime and intellectual property section; attorneys who specialize in computer crime cases including fraud, theft, and intellectual property crimes.

28
New cards

FBI (Federal Bureau of Investigation)

Investigates any federal crime not designated to another agency, including civil rights crimes, organized crime, and financial crimes.

29
New cards

Cyber Division

A specialized unit of the FBI focused on cyber crimes such as hacking, online sexual predation, and internet fraud involving organized crime groups.

30
New cards

RCFL

Regional Computer Forensics Labs that assist in investigations involving computer crimes.

31
New cards

NW3C

National White Collar Crime Center; a portal for reporting internet fraud and a database that tracks computer crime complaints.

32
New cards

InfraGuard

Facilitates the exchange of information between the government and private businesses on threats to critical infrastructure.

33
New cards

NSA (National Security Agency)

Code breakers in WWII; all work is highly classified, primarily involving computer scientists and software engineers.

34
New cards

FTC (Federal Trade Commission)

Lawyers focused on protecting consumers from business fraud and abuse, with identity theft being a significant concern.

35
New cards

US Postal Service

Mail delivery service established in 1830; US postal inspectors conduct joint investigations with other agencies on crimes involving mail.

36
New cards

DOE (Department of Energy)

Administration of domestic energy production, working with private energy corporations that largely own the infrastructure in the US.

37
New cards

Specialized Units

Created in response to changes in federal response to cybercrime and terror post 9/11 attacks to enhance collaboration and effectiveness.

38
New cards

Collaborative Units

Units that help federal agencies work with other agencies to address cybercrime and terrorism.

39
New cards

Jurisdiction Issues

Problems related to the authority of federal versus state/local agencies in handling cybercrime and terrorism.

40
New cards

Cyber War

Exploiting weaknesses in the cyber systems of other nations, often involving the NSA.

41
New cards

Identity Theft

A significant form of consumer fraud that the FTC focuses on protecting against.

42
New cards

Federal Crimes Involving Mail

Any crime involving mail, such as identity theft, drugs, child pornography, bogus checks, mail theft, and check washing, is considered a federal crime.

43
New cards

CIRC

Cyber incident response capability

44
New cards

DHS

Department of Homeland Security, a post 9/11 agency that coordinates federal agencies.

45
New cards

NCSD

National Cyber Security Division, responsible for risk assessment and resource allocation to protect critical infrastructures.

46
New cards

National Cyber Alert System

Allows local agencies to report threats to federal authorities.

47
New cards

Cyber Cop Portal

Web-based information sharing system used by local police departments in computer crime investigations.

48
New cards

National Vulnerability Database

A clearinghouse/library of software and hardware vulnerabilities.

49
New cards

ICE

Immigration and Customs Enforcement, involved in human trafficking and sex tourism.

50
New cards

C3 Cyber Crimes Center

Focuses on fighting against criminal sexual exploitation of children (CSEC).

51
New cards

Secret Service

Protects the president and addresses counterfeiting and computerized reproduction of financial instruments.

52
New cards

Policing in the US

Local policing involves 15,000 agencies, most of which are small with fewer than 25 officers.

53
New cards

Hacker

An individual with a profound interest in computers who uses this knowledge to access computer systems with or without proper authorization.

54
New cards

Phone Phreaks

Forerunners to modern hackers who broke into landline phone systems in the 70s and 80s.

55
New cards

Software Crackers

Individuals who overcome copyright protections of digital media, including music and games.

56
New cards

Programmers of Malware

Creators of viruses, worms, and DOS attacks.

57
New cards

Script Kiddies

Young, unsophisticated hackers who use pre-designed malware.

58
New cards

Social Engineers

Fraudsters who deceive people into giving away credentials or access to systems.

59
New cards

Hacktivists

Hackers who use their skills to convey a political message.

60
New cards

Dumpster Diving

The practice of searching through garbage for passwords and technical manuals to hack systems.

61
New cards

White Hat

Ethical hackers who engage in software testing and network security.

62
New cards

Gray Hat

Ethical hackers who sometimes violate laws for recreational or profit purposes.

63
New cards

Black Hat

Malicious hackers who operate for profit and are often part of organized criminal groups.