Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Counseling
Q:
Yi Qing Chen was convicted in 2011of distributing methamphetamine, trafficking approximately 800,000 cases of counterfeit cigarettes, and conspiring to import Chinese-made shoulder-fired missiles into the U.S. He is now serving a 25-year prison sentence, and his case marks the end of a long-running investigation called Operation Smoking Dragon. Chen was the first person convicted under the nation's first antiterrorism statute that outlaws the importation of missile systems designed to destroy aircraft.Yi Qing Chen was likely a member of aa. transnational organized crime gang. b. terrorist organizatonc. terrorist celld. foreign government
Q:
The actions of Titan Rain are a classic example ofa. cyberespionageb. transnational organized crime c. a denial-of-service attackd. effective cybercrime enforcement
Q:
Responding to these threats, the United States government announced in 2011 that computer sabotage by another countrya. could constitute an act of warb. would be investigated by Interpolc. would be brought before the UN Security Council d. would be prosecuted in US courts
Q:
Illegally gaining access to a computer or computer network, as Titan Rain did, is called a. hackingb. worming c. breaching d. skulking
Q:
Members of Titan Rain, if arrested, would be charged with what crime?a. espionageb. website defacement c. cyberspyingd. cyberterrorism
Q:
In 2005, agents of the Chinese group known as Titan Rain were able to penetrate computers, enter hidden sections of a hard drive, zip up as many files as possible, and transmit the data to way stations in South Korea, Hong Kong, or Taiwan before sending them to mainland China. Titan Rain was able to penetrate the Redstone Arsenal military base and NASA and the U.S. Army's flightplanning software was electronically stolen. The Pentagon has issued a report on China, acknowledging that hackers in China had penetrated the Pentagon's computer system severaltimes.Likely employed by the Chinese Government, members of Titan Rain, on behalf of China, engaged ina. cyberwarfareb. cybervandalism c. cybertheftd. cyberterrorism
Q:
Given the nature and location of the crime, which agency likely arrested Griffin?a. Federal Bureau of Investigation b. Georgia State Policec. Interpold. the Cybercrimes Division of the Department of Justice
Q:
Griffin would not have been guilty of which of the following crimes?a. computer security breach b. fraudc. cyber theftd. theft of electronic property
Q:
Griffin was most likely motivated to cybercrime for which reason?a. profitb. revenge c. politics d. ideology
Q:
Given the description in the preface, Catherine Griffin would have been charged witha. computer fraud b. etailingc. website defacement d. identity theft
Q:
In 2011 a Georgia woman named Catherine Griffin was indicted by a federal grand jury on charges of computer fraud by accessing information on government computers for private financial gain. It seems that Catherine was paid to fraudulently obtain the Federal governments "FirstTime Home Buyer Tax Credits" for friends and relatives who were not eligible to receive the credits and had not purchased homes during the eligible time period. How did she do it? Simple, she was hired as a seasonal employee by the IRS which gave her access to the IRS computer system. In exchange for $2000, she used her access to alter her co-conspirators taxpayer information, making them eligible for the government grants. The computer fraud charges each carry a maximum sentence of 5 years in prison and a fine of up to $250,000.Catherine Griffin's actions were not only criminal but also fell under the category of cybercrime becausea. she used a computer to access and alter data b. she worked at a computer stationc. the job required computer skills d. she used the Internet
Q:
Asian based transnational crime groups are quite active in all of the following areas excepta. human traffickingb. narcoticsc. money launderingd. loan sharking
Q:
The development of organized crime in the United States was accelerated by which event?
a. The emergence of Al Capone in the 1920s
b. Federal regulation of all cigarette sales beginning in 1920
c. The mass immigration of ethnic minorities into the United States
d. Prohibition, resulting from passage of the Eighteenth Amendment
Q:
Which of the following is not a characteristic of transnational organized crime?
a. Transnational organized crime has economic gain as its primary goal
b. It involves continuous commitment by primary members
c. Transnational criminal syndicates employ predatory tactics, such as intimidation, violence, and corruption.
d. Transnational organized crime groups include terror organizations.
Q:
One of the most successful federal efforts in combating cybercrime is the
a. New York/ New Jersey Electronic Crimes Task Force (NYECTF)
b. Counterterrorism Joint Task Force (CJTF)
c. Internet Crime Watch Bureau (ICWB)
d. Electronic Crimes Northeast Regional Office (ECNRO)
Q:
The first and most important international treaty dealing with cybercrime is thea. Convention on Cybercrimeb. UN Treaty on Internet-based Crimec. International Accord on Computer Crime d. Interpol's Anti-piracy Law
Q:
Piracy rates are highest in which group of countries?a. Those with emerging economies b. Advanced industrial countriesc. The poorest countriesd. Economic status has no role in piracy rates
Q:
Cyber terrorists have many advantages. Which is not one of those advantages?a. Cyber terrorists target Western nations, who have the resources to respond aggressively.b. There are no borders of legal control, making it difficult for prosecutors to apply laws to some crimes. c. Criminals can operate from countries where cyber laws barely exist.d. Terrorists can commit crimes from anyplace in the world and the costs are minimal.
Q:
Which is not a cyber technique terrorists use to fund their groups?a. smugglingb. the use of bogus companies to receive and distribute money c. funding through fraudulent charitable organizationsd. intellectual property (IP) crime
Q:
An effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world is the definition ofa. cyberterrorism b. cyberwarfarec. cyberespionage d. cybervandalism
Q:
Perhaps the most active country attempting cyberespionage against the United States isa. Chinab. Hong Kong c. Taiwand. Russia
Q:
When a Trojan horse is opened it spreads in the computer system.a. virusesb. wormsc. logic bombsd. spam
Q:
The willful and repeated harm inflicted through the medium of electronic text is calleda. cyberbullying b. cyberwarfare c. cyberspying d. cyberstalking
Q:
When a computer hacker intrudes on another person's website by inserting or substituting codes that expose
visitors to the site to misleading or provocative information is called
a. a denial-of-service attack
b. cyberwarfare
c. Internet sabotage
d. website defacement
Q:
All of the following are examples of etail fraud excepta. reshipping b. shoplisting c. buyer fraudd. copyright infringement
Q:
Phishing e-mails and websites have become even more of a problem because of all of the following excepta. criminals can easily copy brand names.b. the look is so authentic that victims believe the e-mail comes from the advertised company. c. some of those recipients will have accounts with the company that they are impersonating. d. companies have failed to imprint design tags into their logos.
Q:
Once phishers have a victim's personal information they can do three things. Which of the following is not one of them?a. They can gain access to preexisting accounts, banking, credit cards, and buy things using those accounts.b. Phishers can use the information to open brand new banking accounts and credit cards without the victim's knowledge.c. Phishers can implant viruses into their software that forwards the phishing e-mail to other recipients.d. They can implant malware that may destroy the computers data and drives.
Q:
Loading programs into the computers of financial organizations such as banks that skim small sums from each transaction is calleda. "salami" slicing fraud b. automatic teller fraud c. file sharing fraudd. uploading fraud
Q:
Cyber crime consists of three categories of crime which includes all of the following excepta. cyber commerce b. cyber theftc. cyber vandalism d. cyber terrorism
Q:
One important contemporary change in organized crime is a. the degree of violence being used.b. the new "softer" approach of the current organized crime syndicates. c. the use of the Internet to support criminal activities.d. the declining involvement in drug trafficking.
Q:
______organized crime groups are believed to be the main purveyors of credit card fraud in the United States. a. Russianb. Chinese c. Siciliand. Mexican
Q:
Which of the following statement is not accurate regarding organized crime?
a. Organized crime is synonymous with the Mafia.
b. Organized crime is conspiratorial activity.
c. Organized crime has economic gain as its primary goal.
d. Organized crime does not include terrorists dedicated to political change.
Q:
The evolution of organized crime has led to the_____, a FBI investigation tool that focuses on criminal enterprise and investigates the structure of criminal enterprise groups. a. enterprise theory of investigationb. RICO theory of investigationc. formation theory of investigation d. Mafia theory of investigation
Q:
Which factor has NOT contributed to the alleged erosion of Mafia power in the United States?a. the skilled younger generation of mob leadersb. the aging of reigning mob leaders c. government enforcement policies d. changing values in US society
Q:
What is the difference between a computer worm and a Trojan horse?a. Computer worms self-replicate, Trojan horses do not. b. Trojan horses self-replicate, computer worms do not.c. Trojan horses deface websites, computer worms do not. d. Computer worms deface websites, Trojan horses do not.
Q:
Cyber criminals who engage in cyber vandalism are often motivated bya. revenge b. greedc. profit d. fear
Q:
Some identity theft thieves create emails that look legitimate but are designed to gain access to a victim's personalinformation. This is a/an scheme. a. phishingb. etailingc. slamming d. hooking
Q:
When someone illegally obtains software and then "cracks" or "rips" it and posts it on the Internet for others to use,the resulting pirated software is called a. warezb. split c. slash d. ripez
Q:
While power in traditional bullying is the result of physical (stature) or social (competency or popularity) factors, power in cyber bullying stems froma. net proficiencyb. physical distance c. manipulationd. fear
Q:
Your friend committed a when he flooded an internet site with emails and made the website "crash"
because the company refused to pay him a bribe.
a. denial-of-service attack
b. "oneoffkamikaze" attack
c. manipulation-of-service attack
d. phishing attack
Q:
Which is not a reason why cyber crime is particularly challenging?a. Because cyber crime is rapidly evolving.b. Because cyber crime limits the geographic location of victims.c. Because cyber crime allows criminals to operate more efficiently and effectively. d. Because cyber crime is difficult to detect through law enforcement channels.
Q:
Mexican and Latin American groups are quite active in the sex trade.
a. True
b. False
Q:
Transnational organized crime has power and status as its primary goal, although economic gain may also be motivating factors.
a. True
b. False
Q:
Because of the openness of the platform, gang members avoid using social networking Internet sites such as YouTube, and Facebook as well as personal web pages to communicate and boast about their gang membership and related activities.
a. True
b. False
Q:
The Convention on Cybercrime, ratified by the U.S. Senate in August 2006, was the first international treaty that addresses the definition and enforcement of cyber crime.
a. True
b. False
Q:
Before October 30, 1998, when the Identity Theft and Assumption Act of 1998 became law, there was no federal statute that made identity theft a crime.
a. True
b. False
Q:
Congress has treated computer-related crime as a state and local offense rather than federalizing it.
a. True
b. False
Q:
The cost of phishing and identity theft now runs in the billions in the United States.
a. True
b. False
Q:
Terrorist groups have found using the Internet in order to raise funds to buy arms and carry out operations particularly difficult.
a. True
b. False
Q:
The Internet offers cyber terrorists many advantages.
a. True
b. False
Q:
Cyber defense can be seen as an effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world.
a. True
b. False
Q:
Computer fraud can be prosecuted as a larceny or under special laws that criminalize the theft of electronic and/or magnetic impulse property.
a. True
b. False
Q:
The Trojan horse looks like a benign application but contains illicit codes that can damage the system operations.
a. True
b. False
Q:
Public order crime can be viewed as a type of enterprise crime employing sophisticated technology to achieve illegal profits.
a. True
b. False
Q:
File sharing is another form of computer fraud.
a. True
b. False
Q:
Computer voyeurism involves cyber vandals bent on destroying computer security systems because they believe in a philosophy of open access to systems and programs.
a. True
b. False
Q:
Phishing emails and websites have become greater problems because cyber criminals can easily copy brand names and corporate insignia into their emails and websites
a. True
b. False
Q:
Pilferage refers to efforts of organized groups to download and sell copyrighted software in violation of the
software's licensing.
a. True
b. False
Q:
Organized crime has become multi-ethnic and now includes Asian, Latin, and European groups. a. Trueb. False
Q:
Cyber bullying, like all other forms of bullying, is achieved through an imbalance of power.
a. True
b. False
Q:
Cyber crime presents a compelling challenge because it is difficult to detect through traditional law enforcement channels.
a. True
b. False
Q:
Having five or more drinks on a single occasion is the definition of .
Q:
The effort in the early 1900s to remove alcohol from the public and private sphere and culminated in Prohibition was called the ______.
Q:
The _____Amendment guarantees free speech.
Q:
_____are materials that violate community standards of morality or decency and has no redeeming social value.
Q:
_____are prostitutes who work the street in plain sight of the police.
Q:
_____is the payment to a prostitute in return for a sexual act.
Q:
Deriving sexual pleasure by exposing genitals to the shock or surprise of a stranger is called_____ .
Q:
______is the word used to describe bizarre or abnormal sexual practices that may involve nonhuman objects, humiliation, or children.
Q:
____marriage is one example of a current moral crusade.
Q:
A person who creates a unique moral rule is referred to as a______ .
Q:
A number of different drug control strategies have been tried with varying degrees of success. Discuss these various strategies and their effectiveness.
Q:
There are many different views on the cause of drug use. Explain the subcultural and psychological views of substance abuse causation.
Q:
Explain the origin of the words "pornography" and "obscenity" and discuss the current legal meanings of these
terms.
Q:
Discuss the issue of legalized prostitution, presenting the viewpoints of advocates for and against legalization.
Q:
The term "prostitute" encompasses a variety of categories. Identify and discuss the various types of prostitute that
exist in the United States today.
Q:
Describe the conditions necessary in a commercial sexual transaction (i.e., prostitution) and the current trend in arrests for prostitution.
Q:
Some sexual practices cause social harm and are outlawed and subject to state control. Identify and discuss these outlawed forms of deviant sexuality.
Q:
Using anti-smut or anti-gay marriage campaigns as your example, explain how moral crusaders seek to shape the law.
Q:
Explain the concept of social harm and discuss the contention by some scholars that public order crimes are not necessarily victimless offenses.