Criminology MOD 13

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/186

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

187 Terms

1
New cards

David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his $80 million dollar cyber attack in the form of a ______.

​computer worm

2
New cards

Ethan Nadelmann argues that drugs should be legalized because ______.

the use of mood-altering substances is customary in almost all human societies

3
New cards

​T/F Opium was first discovered in 1887 by Josef Mendelson as a derivative for the harsh medications used for relaxation at the time.

False

4
New cards

​Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.

manipulation of accounts

5
New cards

​The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information

phishing

6
New cards

T/F One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar. ​

True

7
New cards

The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______. ​

​cyberstalking

8
New cards

​The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet.

Cybercrime

9
New cards

​Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?

​Red Wa

10
New cards

Which of the following is false in regard to cyberbullying?

Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.

11
New cards

Which of the following would be an example of a cyber smear scam?

​Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase

12
New cards

Which of the following is not true about the "cyber age" according to the text?

Facebook reached 10 million users in 2015.

13
New cards

Malicious attacks aimed at disrupting, defacing, and destroying technology.

Cybervandalism

14
New cards

A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.

Warez

15
New cards

The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts?

Computer Fraud and Abuse Act

16
New cards

Which of the following is a form of computer crime?

ALL OF THE ABOVE ARE COMPUTER CRIMES: Theft of information, Corporate espionage, Manipulation of accounts

17
New cards

atherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______.

Salami slice faud

18
New cards

A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit.

Theft of information

19
New cards

Which of the following is true about ATM skimming crimes?

ALL OF THE ABOVE: Devices are typically undetectable, Devices are usually placed only for a short time, Phony keyboards are sometimes attached

20
New cards

Which of the following is not true in regard to drug distribution and the Internet?

While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy.

21
New cards

Which of the following is FALSE in regard to denial-of-service (DoS) attacks?

DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party

22
New cards

Which of the following would be an example of a cyber smear scam?

Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase

23
New cards

Which of the following best depicts a phishing scheme?

Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use

24
New cards

Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.

Manipulation of accounts

25
New cards

Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______.

Shoplisting

26
New cards

Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______.

Denial of service attack

27
New cards

The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information

Phishing

28
New cards

Which of the following is false in regard to cyberbullying?

Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.

29
New cards

The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______.

Cyberstalking

30
New cards

Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______.

Cyber espionage

31
New cards

What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law?

It protected classified U.S defense and foreign relations information.

32
New cards

Which of the following is TRUE about the Convention on Cybercrime, ratified in 2006?

It was the first international treaty to address the definition and enforcement of cybercrime

33
New cards

The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency?

FBI

34
New cards

Which of the following is FALSE about transnational organized crime?

It usually does not include drug sales but is more inclined to commit business-related crimes.

35
New cards

Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy.

RICO

36
New cards

Which of the following is FALSE in regard to Russian organized crime groups in the United States?

They are primary players in drug trafficking

37
New cards

Latin American and Mexican cartels primary method of income is through ______.

Drug sales and drug smuggling

38
New cards

Which of the following is most true about the group known as the Surenos?

They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons.

39
New cards

Which of the following is true about Asian transnational crime groups?

In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics

40
New cards

Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?

Red Wa

41
New cards

Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. ANSWER the following questions:
One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______.

File sharing

42
New cards

After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______.

Phishing

43
New cards

Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud?

Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund

44
New cards

According to the video on academic doping, there is an epidemic of prescription misuse in academic settings. Which concept below, from the article by Mui, Sales and Murphy, was most prevalent in the video?

B and D

45
New cards

T/F The traditional sources means of income for transnational organized crimes groups are derived from providing illicit materials and from using force to enter into and maximize profits in legitimate businesses

True

46
New cards

T/F Terrorist organizations recruit new members and disseminate information via the internet.

True

47
New cards

T?F Although email is the most common form of spam, many are not aware that viruses and spam can be sent in the form of instant messaging, online forums, social media, and even text messaging.

True

48
New cards

Which of the following is a form of cybertheft?

All of these are cyber theft

49
New cards

T/F Cyberthieves are motivated less by profit than cyber vandals.

False

50
New cards

True or False, criminals are more technologically sophistocated, using the internet to carry out their crimes.

True

51
New cards

True or False, Cyberstalking refers to the use of the internet to steal one's identity for profit

False

52
New cards

The first step in motivation to become a political criminal is the feeling that, _____.

its not right

53
New cards

T/F Defacers are typically members of an extensive social network who are eager to demonstrate their reasons for hacking and often leave calling cards, greetings, and taunts on the web pages they corrupt.

True

54
New cards

T/F Because of strict federal laws, identity theft has decreased at surprising rates over the past few years.

False

55
New cards

According to the class lecture (embedded video on Colonial Pipeline attack), what type of power arrangement is best to help prevent an attack on the US energy structure?

A smart grid

56
New cards

Which of the following statements about transnational organized crime is FALSE?


it usually does not include drug sales but is more inclined to commit business-related crimes

57
New cards

T?F Efforts to combat transnational organized crime are typically in the hands of federal agencies.

True

58
New cards

T/F Shoplisting is a form of etailing fraud in which a person purchases a legitimate store receipt, takes an identical item off the store shelf, and "returns" the item for cash of store credit.

True

59
New cards

Cassandra receives an email telling her that a friend suggested her for a work-from-home job. The email contains enough personal information that Cassandra believes the offer is legitimate and opens the attachments, which, unbeknownst to her, allow malware to harvest her personal information. Cassandra was a victim of ______.

Spear phishing

60
New cards

T/F Cyberstalking refers to the use of the internet to steal one's identity for profit.

False

61
New cards

Chinese hackers used a phishing email to breach a contractor for the US office of Personnel Management, which exposed the records of 21 million civil service employees. This is an example of ______.

Cyber espionage

62
New cards

According to class lecture (embedded video on colonial pipeline), the Aurora vulnerability showed what could happen with a simple piece of computer code as it relates to the US energy grind?

Key pumps could be told to misfire until they explode

63
New cards

Which act is not considered a form of cybercrime?

Cyber violence

64
New cards

About ________ of US companies report being hit by computer network attacks each year.

60 percent

65
New cards

_____________ refers to the process by which thieves place an electronic device on a card that steals personal information and customer account information.

ATM Skimming

66
New cards

You access a website you think gives you the scores of your favorite team, but a pop-up message from the FBI shows that you have violated some federal law and that your computer will remain locked until you pay a fine. This is an example of (a) ___________.

Ransomware

67
New cards

Warez is ________.

a term that describes hacking a game or application that has copyright protection.

68
New cards

Thieves acquire a legitimate receipt from a store, either by buying something or taking one from the trash, and then return to the store and take an identical item to the return department. This is sometimes known as ____________.

Shoplisting

69
New cards

The process of calling 911 and faking an emergency is called _______.

Swatting

70
New cards

Which of the following occurs when cyberbullies want to stalk victims?

Cat fishing

71
New cards

The costs of cybercrime are estimated to be as high as _______________.

$500 Billion

72
New cards

_________ is defined as illegally using the Internet to gather information that is considered private or confidential.

Cyber spying

73
New cards

The ________ is the act that criminalizes the use of recording equipment that makes copies of films while in movie theaters.

Artists rights and theft prevention act

74
New cards

The ________ maintains the Electronic Crimes Task Force, which focuses on identifying and locating international cybercriminals connected to cyber intrusions, bank fraud and other computer-related crimes.

Secret Service

75
New cards

At the start of the second Gulf War, US agents sent emails to Iraqi military officers telling them they would not be harmed if they left their tanks and weapons parked on the side of the road and went home. This would be an example of ____________. ___________.

Cyber War

76
New cards

In 2014, 500 million Yahoo accounts were hacked and personal information was stolen. This act was an example of ___________________. _________.

Cyber Espionage

77
New cards

One recent tactic used by terrorist groups is to _________________.

make contributions through fraudulent charitable organizations to distribute funds

78
New cards

You are asked in a press conference about the differences between transnational organized crime and traditional organized crime, or the Mafia. You answer that ____________.

there are only a few differences between the Mafia and networks of individuals working in more than one state or nation to conduct illegal business ventures

79
New cards

Which of the following is not considered a main activity of transnational organized crime?

burglary

80
New cards

Which transnational gang is not based primarily on ethnicity or family structure, but is instead based on economic necessity?

Russian Gangs

81
New cards

An estimated ________ percent of cocaine entering the United States comes from Mexico.

90 percent

82
New cards

Industry experts estimate that the worldwide criminality of traditional Italian organized crime equals approximately ________annually.

100 billion

83
New cards

You are a federal prosecutor attempting to use the Racketeering Influenced and Corrupt Organization (RICO) Act against an Asian organized crime group THAT operates a legitimate international clothing manufacturer in Brooklyn, New York. What provision of the RICO statutes are you going to use?

acquiring an interest in or control of any enterprise engaged in interstate of foreign commerce

84
New cards

A large part of the problem relating to eradicating transnational organized crime is that _________.

profits are too great for countries to look the other way

85
New cards

One problem with combating cybercrime is that _____________.

existing laws are sometimes inadequate to address the problem

86
New cards

Ethan Nadelmann argues that drugs should be legalized because ______.

the use of mood-altering substances is customary in almost all human societies

87
New cards

T/F One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar. ​

True

88
New cards


an investigation of a person's history to determine whether that person should be allowed a certain privilege such as the ability to possess a firearm

background checks

89
New cards

a network of computers that have been appropriated without the knowledge of their own

botnet

90
New cards


the state of operating in accordance with governmental standards

compliance

91
New cards

physical harm to individuals or the environment that occurs as the result of corporate policies or decision making

corporate violence

92
New cards

an attempt to damage or disrupt computer systems or electronic networks operated by computers

cyber attack

93
New cards

a crime that occurs online, in the virtual community of the internet as opposed to in the physical world

cyber crime

94
New cards

any misrepresentation knowingly made over the internet with the intention of deceiving another and on which a reasonable person would and does rely to his or her detriment

cyber fraud

95
New cards

the crime of stalking, committed in cyberspace through the use of e-mail, text messages, or another form of electronic communication

cyberstalking

96
New cards

an individual who has supported foreign terrorist organizations such as alQaeda that are engaged in hostilities against the military operations of the US

enemy combatant

97
New cards

a person who uses one computer to break into another

hacker

98
New cards

the theft of personal information such as a person's name, driver's license number, or Social Security number

identity theft

99
New cards

property resulting from intellectual, creative processes

intellectual property

100
New cards

an entity that plasy a role in international affairs but does not represent any established state or nation

nonstate actor