Chapter 20 Terrorism and Homeland Security, Chapter 18 Drug-Related and Organized Crime, CH 17, CJC 221 - Chapter 15, Chapter 14 Larceny/Theft CJ 1340, Chapter 13 Burglary CJ 1340, Chapter 12, Criminal Investigation Chapter 12, Criminal Investigation…

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/271

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:35 AM on 4/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

272 Terms

1
New cards

The primary destruction resulting from a dirty bomb is usually a result of

panic.

2
New cards

NIMS stands for

National Incident Management System.

3
New cards

The group HAMAS is

a militant Palestinian Islamic movement in the West Bank and Gaza Strip.

4
New cards

Weapons of mass destruction (WMDs) can contain

all of these choices

(biological elements,

nuclear agents,

chemical agents.)

5
New cards

The Al-Aqsa Martyrs Brigades are

a group formed in the refugee camps in the West Bank of Israel.

6
New cards

Certain experts believe that because of the difficulty in obtaining materials, the least likely type of terrorism to occur is

bioterrorism.

7
New cards

Which of the following is not one of the ways in which the USA PATRIOT Act significantly improved the nation's counterterrorism efforts?

allowing for political assassinations with presidential approval

8
New cards

"Terrorism that initiates, or threatens to initiate, the exploitation or attack on information systems" is the FBI's definition of which type of terrorism?

cyberterrorism

9
New cards

What did members of Aum Shinrikyu, a new-age cult, release into the Tokyo subway system, killing 12 and sending 5,000 to the hospital?

sarin gas

10
New cards

Which of the following is not a type of chemical weapon?

immune agents

11
New cards

A sleeper cell is

a group of terrorists who blend into a community until called to action

12
New cards

What does ALF stand for?

Animal Liberation Front

13
New cards

Which of the following crimes is not normally associated with funding terrorism?

contract killing

14
New cards

The "contagion effect" refers to

the fact that the coverage of terrorism inspires more terrorism.

15
New cards

The FBI categorizes terrorism in the United States as either

domestic or international.

16
New cards

Which was a case of domestic terrorism?

bombing of the Alfred P. Murrah Federal Building in Oklahoma City in 1985

17
New cards

The Earth Liberation Front (ELF) is an example of what type of organization?

ecoterrorist

18
New cards

A common tactic that enables a weaker state or nonstate entity, such as a terrorist group, to achieve an advantage over a stronger adversary is known as what?

asymmetric warfare

19
New cards

The term intifada means

uprising

20
New cards

At the federal level, what is the name of the lead agency for responding to acts of domestic terrorism?

Homeland Security/FEMA

21
New cards

The number one priority in any terrorist-preparedness plan should be

communication between local, state and federal law enforcement agencies.

22
New cards

Which of the following is not one of the four common types of chemical weapons?

"knockout" agents

23
New cards

The Army of God is

a pro-life, antiabortion group in the United States.

24
New cards

The method most likely to be used by terrorists is

explosives.

25
New cards

Which toxin is both a biological and a chemical weapon, is more than 1,000 times as poisonous as cyanide and, in its purest form, can kill an adult in an amount no bigger than a grain of table salt?

ricin

26
New cards

Using restrictive restraint devices and procedures, such as handcuffing subjects behind their back and placing them facedown, can lead to

positional asphyxia.

27
New cards

Examples of physical evidence of possession or use of controlled substances include

all of these choices.

(the drugs and the apparatus associated with their abuse,

the suspect's appearance and behavior,

blood and urine tests.)

28
New cards

In a drug investigation, officers can avoid charges of entrapment by

making two or more buys.

29
New cards

Drugs can be classified as

depressants, stimulants, narcotics, hallucinogens, cannabis or inhalants.

30
New cards

Which of the following is not a distinctive characteristic of organized crime?

strong ideological foundation

31
New cards

If an officer observes what appears to be a drug buy,

the officer can make warrantless arrest if there is probable cause.

32
New cards

Drug addiction is

a progressive disease.

33
New cards

Organized crime is not involved in which of the following victimless crimes?

None of these choices

34
New cards

Rohypnol is a

Depressant

35
New cards

Barbiturates are classified as

depressants

36
New cards

Which of the following crime networks has been called the fastest-growing criminal organization in the United States?

Eurasian Organized Crime (EOC)

37
New cards

The primary emphasis of the Federal Drug Enforcement Administration is to

stop the flow of drugs

38
New cards

What act did the federal government pass in 1914 that made the sale or use of certain drugs illegal?

the Harrison Narcotics Act

39
New cards

Designer drugs are

all of these choices.

(created by adding something to an existing drug,

created by omitting something from an existing drug,

high-profit drugs for dealers.)

40
New cards

Crack

has 10 times more impact than cocaine

41
New cards

Which of the following provides revenue to law enforcement for antidrug efforts?

asset forfeiture

42
New cards

The major legal evidence in prosecuting drug sale cases is

the actual transfer of the drug from the seller to the buyer.

43
New cards

The RICO Act of 1970 is one of the major federal acts that

make it permissible to use circumstantial rather than direct evidence to enforce conspiracy violations.

44
New cards

Surveillance is used in narcotics investigations to

all of these choices.

(protect the money put up to make the buy,

provide credibility for the buy,

provide information to establish probable cause for an arrest.)

45
New cards

With reference to drugs, OTC stands for

over-the-counter.

46
New cards

Designer drugs, which are illicit drugs that are offshoots of the legal drugs from which they are created, may cause the muscles to stiffen and give the appearance of someone suffering from Parkinson's disease. These illicit drugs are referred to as what type of drugs?

analogs

47
New cards

Drugs found on a person during a legally conducted search

may be seized

48
New cards

Which of the following is not one of the four groups that make up the Mafia?

the Fratelli Gambino

49
New cards

Club drugs, prescription narcotics and ultra-pure forms of DXM, an ingredient found in OTC cough medication,

can all be purchased online and shipped directly to the user's home—transactions that are extremely difficult for law enforcement to detect.

50
New cards

The U.S. Congress has defined a drug addict as

any person who both habitually uses any habit-forming narcotic drug so as to endanger the public morals, health, safety or welfare, and is or has been so far addicted to the use of habit-forming narcotic drugs as to have lost the power of self-control with reference to the addiction.

51
New cards

A malicious program hidden inside an apparently harmless, legitimate program, intended to carry out unauthorized or illegal functions, is called a:

a. salami slice.

b. logic bomb.

c. super-zapper.

d. Trojan horse.

d. Trojan horse.

52
New cards

A secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a:

a. shadow bomb.

b. logic bomb.

c. super-program.

d. turtle.

b. logic bomb.

53
New cards

A virus attack may replace or destroy data on the computer's hard drive and:

a. identify bank accounts and financial records.

b. leave a "back door" open for later entry.

c. obtain one's access codes.

d. defraud the end user.

b. leave a "back door" open for later entry.

54
New cards

A zombie is a computer:

a. used to spoof or falsify IP and e-mail addresses.

b. that has been rendered nonfunctional by a virus.

c. used by hackers to copy other computer programs.

d. that has been taken over by another computer.

d. that has been taken over by another computer.

55
New cards

Common protocol for processing a crime scene involving electronic evidence includes which of the following?

a. photographing and diagramming the placement of all computer terminals

b. holding the IT staff in quarantine until reinforcements arrive

c. obtaining a search warrant

d. unplugging all computers, telephones, and printers

c. obtaining a search warrant

56
New cards

Computer disks should be stored away from:

a. magnetic fields

b. metal.

c. partials.

d. light .

a. magnetic fields

57
New cards

Computer evidence is:

a. next to impossible to destroy.

b. destroyed only by fire or intense heat.

c. easy to destroy.

d. preserved by magnetic fields.

c. easy to destroy.

58
New cards

Cybercrime is:

a. a local problem.

b. a transnational problem.

c. strictly a federal problem.

d. a minor problem.

b. a transnational problem.

59
New cards

Digital evidence is often contained on:

a. printers and scanners.

b. VCRs and GPS devices.

c. hard drives or CDs.

d. telephones and fax machines.

c. hard drives or CDs.

60
New cards

IC3 stands for:

a. International Computer Crime Categorization.

b. International Computer Classification Corporation.

c. Internet Crime Complaint Center.

d. Internet Computer Crime Commission

c. Internet Crime Complaint Center.

61
New cards

Intentionally destroying computer information, programs, or hardware using a logic bomb is classified as:

a. embezzlement.

b. espionage.

c. extortion.

d. sabotage.

d. sabotage.

62
New cards

Most computer crimes are:

a. not reported.

b. reported in excessive amounts to local authorities.

c. reported frequently.

d. reported to the federal government.

a. not reported.

63
New cards

NW3C stands for:

a. North West Computer Crime Center.

b. National White Collar Crime Center.

c. New West Crime Center Corporation.

d. National White Collar Criminological Center.

b. National White Collar Crime Center.

64
New cards

Port scanning is:

a. looking for access into a computer.

b. scanning for a portable computer that is using a wireless system.

c. removing data.

d. linking access codes.

a. looking for access into a computer.

65
New cards

Skimming is defined as:

a. monitoring data traveling along a data network.

b. scavenging through a business's garbage looking for useful information.

c. exploiting the telephone system's vulnerabilities to acquire free access to Internet provider systems.

d. a method in which a device is placed in a card reader to record sensitive information.

d. a method in which a device is placed in a card reader to record sensitive information.

66
New cards

The USA PATRIOT Act, signed by President George W. Bush in 2001, grants:

a. roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.

b. total authority to the FBI for wiretapping the communication lines of any U.S. citizen.

c. total authority to the FBI to arrest any noncitizen who is under suspicion of using communication lines to plan a terrorist attack.

d. roving authority to the FBI for wiretapping the communication lines of any American.

a. roving authority to the FBI and other law enforcement agents to serve orders on communications carriers.

67
New cards

The biggest difference between traditional evidence and computer evidence is the latter's:

a. electronic nature.

b. lack of availability.

c. storage on discs.

d. fragility.

d. fragility.

68
New cards

Theft of intellectual property:

a. involves the theft of ideas, not property.

b. is hacking into a computer and stealing individual programs, not ideas.

c. involves the pirating of proprietary information and copyrighted material.

d. only applies to written material.

c. involves the pirating of proprietary information and copyrighted material.

69
New cards

What type of material should be used when packaging electronic evidence?

a. cellophane

b. aluminum

c. plastic materials

d. paper bags

d. paper bags

70
New cards

Which of the following is one of the three general categories of cybercriminals?

a. pharmer

b. hacker

c. white hat

d. IT professionals

b. hacker

71
New cards

Which of the following specialists are frequently consulted in the team approach to investigating computer crime?

a. mathematicians

b. auditors

c. social media specialists

d. logicians

b. auditors

72
New cards

Which of the following statements about reshipper schemes is correct?

a. These schemes typically involve employees of the U.S. Postal Service, UPS, FedEx, or similar businesses.

b. The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.

c. Scam artists who organize these schemes are frequently charged with sabotage.

d. These schemes involve intercepting a computer, installing spyware, and sending the computer to its destination.

b. The masterminds of reshipper schemes often initiate contact with their victims in chat rooms.

73
New cards

Which of the following statements is true?

a. A static IP address does not fluctuate and is thus more secure.

b. A dynamic IP address fluctuates and is thus more secure.

c. An ISP is a unique number, analogous to a phone number.

d. An IP address is directly linked to the location of the building where the computer can be found.

b. A dynamic IP address fluctuates and is thus more secure.

74
New cards

Which of the following statements is true?

a. Because most police departments have limited reliance on computers, a cyberattack is unlikely to have significant consequences.

b. Security of the police department's computers is basically a nonissue, because most police departments have highly trained computer specialists on staff.

c. Systems that control computer-aided dispatch, records management applications and offender databases are a low priority for security.

d. Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.

d. Any computer in the department that is attached to a phone line is accessible by unauthorized people outside the department.

75
New cards

Which process is often considered synonymous with phishing and involves acquiring unauthorized access to a computer or network through a message using an IP address appearing to be from a trusted host, in an attempt to commit identity theft?

a. snarking

b. spoofing

c. sniping

d. shadowing

b. spoofing

76
New cards

Motor vehicle thefts are often associated with:

stripping vehicles for parts and accessories or reselling vehicles for profit

77
New cards

The profit on stripped auto parts and accessories is:

extremely high

78
New cards

Installing brighter lights in areas where cars are parked has been successfully used to combat auto theft.

True

79
New cards

A possible indication of a stolen vehicle might include which of the following?

a sloppily applied dealer's sticker

80
New cards

When the police use a car to try to trap a car theft suspect by placing it in a high crime area, the vehicle is called a ____ car.

bait

81
New cards

If an officer stops a vehicle, what might suggest that the car is stolen?

wearing gloves in hot weather

82
New cards

What is the name of the program instituted in New York City that gives the police permission to stop any vehicle being driven between 1 A.M. and 5 A.M. if the vehicle has a sticker indicating that the owner of the vehicle participates in this program?

CAT

83
New cards

A crime in which a stolen vehicle assumes the identity of a legally owned, or nonstolen, vehicle of a similar make and model is called:

vehicle cloning

84
New cards

Which agency cooperates with the police in motor vehicle theft?

NICB

85
New cards

The state with the most auto thefts is currently:

California

86
New cards

A business that takes stolen cars apart to sell the parts for a profit is known as a:

chop shop

87
New cards

The most important means of identifying an automobile is its:

VIN

88
New cards

What does NCIC stand for?

National Crime Information Center

89
New cards

A juvenile or young person who takes a car for some "thrills or excitement" may be guilty of:

joyriding

90
New cards

Legitimate ownership of a motor vehicle exists when the vehicle is any EXCEPT which of the following?

being loaned to another

91
New cards

Which type of physical evidence should officers be particularly careful to search for in a vehicle theft case?

evidence that rake and pick guns were used

92
New cards

In order to rule out the possibility of a false report of vehicle theft, officers should check to see if:

someone wanted to provide an alibi for crashing the car

93
New cards

The Vehicle Identification Number of an automobile is:

an unduplicated number assigned by the manufacturer

94
New cards

For purposes of theft, the definition of a motor vehicle includes which of the following?

homemade motor vehicles, such as kit cars

95
New cards

The secure-idle system is a means of preventing the theft of construction vehicles.

False

96
New cards

The elements of motor vehicle theft are:

intentionally taking or driving a motor vehicle without the consent of the owner or the owner's authorized agent

97
New cards

The National Insurance Crime Bureau Web site suggests a four-layered approach to combat auto theft: common sense, visible and audible warning devices, immobilizing devices, and:

tracing devices

98
New cards

Transporting a stolen vehicle across state lines is a violation of what act?

Dyer Act

99
New cards

Which of the following is recommended as a way to improve an officer's ability to recognize stolen vehicles?

Take time to check suspicious persons and vehicles

100
New cards

Someone who needs an alibi or a cover-up for an accident or even for misplacing the car may:

file a false police report