1/112
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
All of the following are considered parts of a career-criminal's stages of activity:
break-in period
burnout period
stable period
Ken is a shoplifter who steals items that he then sells for the money. He is a(n) ________.
booster
________ is known as a "cold" crime because there is usually very little physical evidence to link the offender to the offense.
Burglary
In a ________, a person causes their own death, whereas in a ________ a person causes the death of another individual without legal justification.
suicide; criminal homicide
In 2002, ________ led to the loss of 33.6 billion dollars in property.
shoplifting
The increase in demand for crack cocaine is connected with a(n) ________ in robberies and a(n) ________ in burglaries.
increase; decrease
A professional car thief who focuses on luxury vehicles is known as a ________.
jockey
Violent crime can be distinguished from property crime by the focus (whether on a person or a thing), and the
use of force
________ is an example of a crime which can be considered as both a violent crime and a property crime.
Arson
The majority of vehicle theft in the United States occurs while the victim is ________.
asleep
Larceny is different from other types of crimes in that it ________.
does not involve force.
The vast majority of those involved in arson are ________.
juvenile offenders
Laura steals items of small monetary value for her own personal gratification. She is a(n) ________.
shoplifter
________ of household burglaries involve some type of economic loss.
Eighty-five percent
In the context of law enforcement, a fence is ________.
someone who buys and then resells stolen property.
Dustin has been in and out of jail for burglary, auto theft, and other theft-related offenses. Dustin can best be classified as a ________.
persistent thief
Burglary can be differentiated from other forms of theft by the fact that it requires ________ a dwelling or structure in order to commit the crime.
entering
The main difference between violent offenders and property offenders is ________.
both types of crimes have varying levels of planning involved.
Heroin falls into which category of illegal drugs?
narcotics
Which of the following factors reduces criminal penalties associated with the personal possession of a controlled substance?
decriminalization
Manufacturing, distributing, dispensing, importing, and exporting (or possession with intent to do the same) of a controlled substance or a counterfeit substance is called ________.
drug trafficking
Which illicit drug was most commonly used in 2002?
marijuana
Why are cocaine, LSD, and heroin easy to smuggle into the United States?
They are sold in small quantities and mixed with other substances to be sold on the streets.
Research on the correlation between drugs and crime has shown that ________.
crime increases with increased drug-usage.
Which study indicates that lucrative drug profits have the potential to corrupt official agents?
the Mollen Commission (1964)
Which of the following types of substances stimulate the central nervous system, increase the heart rate, elevate blood pressure, and increase mental activity?
stimulants
Most cocaine is brought into the United States using ________.
maritime vessels
What is the focus of the national drug control strategy?
to educate the young people about the dangers of illegal drugs, alcohol, and tobacco
Crimes in which drugs contribute to the offense are known as ________.
drug-related crimes
Which of the following policies do decriminalization and legalization belong to?
the alternative drug policy
During the 1960s and the 1970s drug abuse was linked with ________.
the psychoactive substances associated with the hippie movement
Drug users are more likely to have a criminal record than non-drug users. This indicates ________.
the relationship between drugs and crime
Which act established the office of the National Drug Control Policy?
the Anti Drug Abuse Act
Which program follows heroin trafficking?
heroin signature program
Which of the following types of criminals are generally in the age group of 16-25?
computer criminals
A scam that uses official-looking e-mail messages to steal valuable information is termed as ________.
phishing
What is the primary goal of computer criminals?
access to web sites and computer networks
Equity trading based on confidential information about the important events that may affect the price of the issue being traded is known as ________.
insider trading
Who is usually found to be in control of the most lucrative rackets in their cities?
Mafia leaders
In a technologically advanced age, what needs to be redefined in the context of the First and Fourth Amendments?
right to free speech, papers, communication, and home
One of the federal statutes of relevance to crime committed with or against computer equipment and software is ________.
the Cyber Security Enhancement Act Of 2002
Which of the following are organized criminal activities?
supplying illegal goods and services
Unauthorized and illegal copying of software programs, Internet piracy, and software counterfeiting come under the category of ________.
software piracy
The application of DNA technology is reliant on using information found through a person's ________.
bodily fluids or tissues
In the category of white collar crime, ________ includes commercial loan fraud, check fraud, counterfeit negotiable instruments, mortgage fraud, check kiting, and false credit applications.
financial institution fraud
Who signed the Sarbanes-Oxley corporate reform bill?
President George W. Bush
Internal computer crimes (malware), Internet and telecommunications crimes, support of criminal enterprises computer-manipulation crimes, hardware, software, and information theft are several kinds of ________.
technology crimes
Which of the following criminal groups are involved in loan sharking, large scale drug trafficking, gambling, and prostitution?
organized criminal groups
"Theories about theories and the theorizing process which they suggest may help to meld existing theories." What is defined in above statement?
Metatheories
Who recommended the adoption of victim impact statements?
the President's Task Force on Victims of Crime
Which of the following theories attempts to merge concepts drawn from different sources?
integrated theories
________ will be more oriented toward explaining white collar crimes.
Future crime theories
Neil was found guilty of petit larceny, and as part of his punishment he was ordered to repay the victim for the stolen property. What was the term for Neil's act of repayment?
restitution
A written document which describes the losses, suffering, and trauma experienced by the victim of a crime or survivors of the victim is termed as ________.
victim-impact statement
Which of the following is one of the issues likely to concern crime control policies in the future?
new criminal groups
Which administration developed policy initiatives in the areas of police, courts, and corrections with a focus on improving the justice system practices and reinstating the law's role in civilized governance?
the Hoover Administration
Which of the following is a punishment through imposed responsibility - in particular, payment of compensation by the offender to the victim?
restitution
What idea rests strictly upon the liability theory, government negligence theory, equal protection theory, humanitarian theory, social welfare theory, crime prevention theory, and political motives theory?
victim compensation
Which of the following rights is provided to the victim in the Crime Victims' Rights Act?
right to be reasonably protected from the accused
Which of the following is the earliest legal code describing the requirement of restitution?
Code of Hammurabi
The criminals of the future are expected to have what particular qualities?
Technical sophistication and a systems approach to crime
A professional thief can be characterized by all of the following EXCEPT ________.
spending extended periods of time incarcerated.
Which of the following is NOT considered high risk for burglary?
college campuses
What is the foremost priority of the National Drug-Control Policy?
reducing drug abuse
________ are classified into the following seven categories: stimulants, depressants, cannabis, narcotics, hallucinogens, anabolic steroids, and inhalants.
Controlled substances
Which recent legalization enlists iodine as a controlled substance?
Comprehensive Methamphetamine Control Act (CMCA)
When was drug abuse first associated with artists and fringe groups?
1800s and the early 1900s
Who investigates the violation of the Federal Computer Fraud and Abuse Act of 1984?
National Computer Crime Squad
Which of the following organizations focuses exclusively on the issues raised by computer and intellectual property crime?
Computer Crime and Intellectual Property Section under the U S Department of Justice
In early 20th century, which of the following gangs specialized in the intimidation of Italian immigrants?
the Jewish and Irish gang
Which of the following is the simplest technique to make future predictions based on the projection of existing trends?
trend extrapolation
What type of authority does the Crime Victims' Rights Act provide to the victim?
legal
There is a problem, research is conducted on the problem, recommendations are made based on the research, and recommended actions are taken, are the four assumptions of ________.
criminologists
economic crime
An act committed in violation of the criminal law for the purpose of monetary gain and financial benefits.
blue collar crimes
Traditional common law theft crimes such as larceny, burglary, and arson.
white-collar crimes
Crimes of business enterprise such as embezzlement, price fixing, and bribery.
green collar crimes
Crimes that affect the environment.
Prohibition
The period from 1919 until 1933, when the Eighteenth Amendment to the US Constitution outlawed the sale of alcohol; also known as the "noble experiment."
Cybercrime
the theft and/or destruction of information, resourcse, or funds via computers, computer networks, or the internet
transnational organized crime
Criminal conspiracies that cross national and international borders and involve the planning and execution of illicit ventures by groups or networks of individuals working in more than one country.
cyber theft
The use of computer networks for criminal profits. Copyright infringement, identity theft, and Internet securities fraud are examples of cybertheft.
cyber vandalism
Malicious attacks aimed at disrupting, defacing, and destroying technology.
warez
A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.
salami slice fraud
Illegally removing small sums from the balances of a large number of accounts and converting them for personal use
denial-of-service attack
Extorting money from an Internet service user by threatening to prevent the user from having access to the service. Examples include:
• Attempts to flood a computer network, thereby preventing legitimate network traffic
• Attempts to disrupt connections within a computer network, thereby preventing
access to a service
• Attempts to prevent a particular individual from accessing a service
• Attempts to disrupt service to a specific system or person
pump and dump
Placing deceptive information online to get unsuspecting investors interested in a stock while those spreading the information sell previously purchased stock at an inflated price.
cyber smear
Negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price.
identity theft
Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name and identity.
phishing
The creation of false e-mails or websites that look legitimate but are designed to gain illegal access to a victim's personal information.
etailing fraud
Illegally buying and/or selling merchandise on the Internet.
computer virus
A program that disrupts or destroys existing programs and networks, causing them to perform the task for which the virus was designed.
malware
A malicious software program.
computer worms
Programs that attack computer networks (or the Internet) by self-replicating and sending themselves to other users, generally via e-mail without the aid of the operator.
Trojan horse
A computer program that looks like a benign application but contains illicit codes that can damage the system operations. Though Trojan horses do not replicate themselves like viruses, they can be just as destructive.
logic bomb
A program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal such as a date to appear. Also called a slag code, it is a type of delayed action virus which may be set off when a program user makes certain input that sets it in motion. A logic bomb may cause a variety of problems ranging from displaying or printing a spurious message to deleting or corrupting data.
spam
An unsolicited advertisement or promotional material, typically in the form of an unwanted e-mail message. While e-mail is the most common form of spam, it can also be sent via instant messaging, newsgroup, and mobile phone messaging, among other media.
website defacement
A type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information. Defacement can range from installing humorous graffiti to sabotaging or corrupting the site.
cyberstalking
cyberstalking
Use of the Internet, e-mail, or other electronic communications devices to stalk another person. Some cyberstalkers pursue minors through online chat rooms; others harass their victims electronically.
cyberspying
Illegally using the Internet to gather information that is considered private and confidential.
cyberespionage
Efforts by intelligence agencies to penetrate computer networks of an enemy nation in order to steal important data.