Cybercrime Test 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

White Power and When did they become more active

  • hate organizations that believe white people are superior to others

  • Become more active in 2008 and 2009

2
New cards

Is law enforcement trained for hate crimes

Police IS NOT trained for hate crimes

3
New cards

What is ANTIFA and What does it stand for

  • Anti Fascism, Anti-Racism, Pro-Anarchism, Pro-Communism

  • Main activities in the US are counter-protests, disruption of gatherings, meetings, or rallies.

4
New cards

What does ALF stand for and where was it developed

  • Animal Liberation Front

  • Established in Great Britain in the 1970s

  • Special interest or single-issue extremist groups

5
New cards

What is ELF and what does it stand for and where was it developed

  • Earth Liberation Front

  • Developed in Arizona in 1980

  • Special interest or single-issue extremist groups

6
New cards

What propaganda was in the vehicle of Timothy McVay

  • materials that expressed his opposition to federal authority

  • his belief in extreme libertarian ideals

7
New cards

What is the CIA and what is it’s duties

  • Relegated to working outside the United States

  • Agents have no arrest powers, and activities are proactive in nature

  • collecting, analyzing, and disseminating foreign intelligence to protect national security

8
New cards

What is law enforcements primary function

  • keep people safe by stopping crimes

  • enforcing laws

  • protecting communities

9
New cards

How did USA agencies combat terrorism

  • making borders and airports safer

  • stopping attacks through intelligence

  • working with other countries

  • cutting off terrorist funding

  • helping communities prevent extremism.

10
New cards

Define Intellegence

information that has been identified as relevant, collected, verified, and interpreted within the context of specific objectives

11
New cards

What is the Patriot Act and Reauthorized Patriot Act (what abilities does it provide Law Enforcement)

  • allows cops to track suspects across devices, search without immediate notice, and access records like bank information

  • Reauthorized Patriot Act kept these powers and added some protections for privacy and other laws for safety.

12
New cards

What are the differences of a court order and a search warrant

  • Search Warrant

    • Legal document signed by judge directing police officers to search specific area for specific person or item of evidence/contraband

    • Document must be based on probable cause

  • Court Order

    • Court document signed by judge that instructs police to perform specific task

    • Subpoena

13
New cards

What is a wire tap

The surreptitious eavesdropping on a third-party conversation by wire, oral, or electronic communication.

14
New cards

What rights do the 4th Amendment provide

  • People have the right to privacy and protection from unreasonable searches or seizures. Warrants can only be issued with probable cause, supported by an oath, and must clearly state what will be searched or taken

15
New cards

What is the fruit of the poisonous tree and what happens when a cope does a flawed search

  • The exclusionary rule applies not only to evidence improperly obtained but also to evidence discovered using the improperly obtained evidence

16
New cards

What is the exclusionary rule

  • to curb police abuse of civil rights and to deter police misconduct

17
New cards

Review the plain view doctrine

  • allows an officer to lawfully seize an item if certain requirements are met

18
New cards

Review search’s to incidents of arrests

  • When someone is arrested, police can search them and the area around them without needing a warrant

  • This ensures safety and helps collect evidence connected to the arrest.

19
New cards

What is the EEA (economic espionage act)

  • enforce penalties for trade secret theft, making it illegal to steal, copy, sketch, download, or communicate them to others without permission

20
New cards

What is the ECPA and what does law enforcement obtain from it

  • regulates how the government can obtain stored account information from network service providers

21
New cards

What is considered best evidence

  • that to prove content of writing, recording, or photograph, the “original” writing, recording, or photograph is ordinarily required

22
New cards

What is the best business recorders expect Hearsay

  • allows certain records to be admitted as evidence in court if they meet specific criteria

  • must be created during regular business activities, made by someone with knowledge, and prepared in a trustworthy manner

23
New cards

What is Hearsay

Hearsay is a statement that is made by a person other than the person who witnessed the act

24
New cards

What are the Laws of the NSA, FTC, Department of Energy, DHS, U.S Immigration and Customs Enforcement, U.S. Secret Service, Postal Service, FBI

  • NSA = Focuses on national security, collecting foreign intelligence, and protecting U.S. communications.

  • FTC = Protects consumers from unfair business practices and ensures fair competition.

  • Department of Energy= Manages energy policies, promotes clean energy, and oversees nuclear safety

  • DHS = Ensures the safety of the U.S. from terrorism, natural disasters, and other threats.

  • ICE = Handles immigration enforcement and combats illegal trade and smuggling.

  • U.S. Secret Service = Protects leaders like the President and investigates financial crimes.

  • Postal Service = Ensures safe and reliable mail delivery while following federal laws.

  • FBI = Investigates federal crimes, protects national security, and supports law enforcement.

25
New cards

What two agencies partner up of internet crime

FBI and the Internet Crime Complaint Center

26
New cards

Who is the chief law enforcement of the federal government

Attorney General

27
New cards

Can local law enforcement handle computer crime

Yes, local police can handle computer crimes (bigger the crime they may work with federal agencies)

28
New cards

Can law enforcement handle the complexity of computer crime

Law enforcement can handle computer crimes, but complicated cases may need special skills

29
New cards

Have state laws kept up with tech only

they often fall behind because tech changes so fast

30
New cards

What are affidavits

application for a search warrant

31
New cards

What is evidence collection

Record or log evidence according to departmental procedures

32
New cards

What is a IP address

Used by a by web sites and devices to communicate

33
New cards

What is the Chain of Command

the order of authority in an organization

34
New cards

What is Digital Evidence of court

the best current practice to minimize the intrusion of network investigations

35
New cards

What are the different scenes

  • Single Scene = Require skills found in trained law enforcement investigators

  • Multiple Scene = Required additional networking and coordination skills

  • Network = Require skills of multiple scene investigators and outside expert assistance

36
New cards

Elements of a search warrant

  1. A Crime

  2. Jurisdictional Venue

  3. Probable Cause

  4. Oath or Affirmation

  5. Sworn before a Judge

37
New cards

Frye Standard

Determines the admissibility of scientific evidence (scientific technique in question be generally accepted within the scientific community)

38
New cards

Daubert Standard

Determines the admissibility of expert scientific testimony (emphasizing the judges role as gatekeeper to evaluate reliability and relevance of evidence)

39
New cards

Major Federal Investigative Agencies

  • FBI (Federal Bureau of Investigations)

  • DEA (Drug Enforcement Administration)

  • ATFE (Bureau of Alcohol, Tobacco, and Explosives)

  • U.S. Marshals Service

  • U.S Bureau of Prisons

40
New cards

Jonson v. United States

  • Point of Fourth Amendment, which often is not grasped by zealous officers

  • Its protection consists in requiring those inferences be drawn by neutral and detached magistrate instead of being judged by officer engaged in often competitive enterprise of ferreting out crime

41
New cards

How to obtain a search warrant

  1. A crime has been committed

  2. Evidence of crime exists

  3. Evidence presently exists in place to be searched

42
New cards

2 defense to exclusionary rule

  1. Independent source of same information can redeem evidence tainted by illegal searches

  2. Tainted evidence mat lead to shortcut, but would otherwise have been obtained

43
New cards

Records pertaining to a subscriber

  • Contents of any relevant logs

  • All basic subscriber information

  • Cell site data for calls made

  • Destinations of outgoing email

  • Any other con-content records

44
New cards