Chapter 14 Ais a network of computers that have been appropriated without

subject Type Homework Help
subject Pages 9
subject Words 2349
subject Authors Larry K. Gaines, Roger LeRoy Miller

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
39. Because of federal inaction, it has been left to the individual states to pass stricter gun control measures, if their
elected officials choose to do so.
a. True
b. False
40. Terrorists have evolved into nonstate actors, free of control by or allegiance to any nation.
a. True
b. False
41. Jihad means holy war.
a. True
b. False
42. Terrorists have developed more efficient organizations based on the small-business model.
a. True
b. False
page-pf2
43. The Antiterrorism and Effective Death Penalty Act (AEDPA) was passed in response to the 1995 truck bombing of
the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma.
a. True
b. False
44. Counterintelligence involves placing undercover agents in a position to gain information from hostile foreign
intelligence services.
a. True
b. False
45. The goal for many law enforcement agencies is not to solve crimes after they have occurred, but to prevent them
from happening.
a. True
b. False
46. The Patriot Act gives intelligence agents more leeway when conducting surveillance.
a. True
b. False
page-pf3
47. The Sixth Amendment guarantees only U.S. Citizens the right to due process.
a. True
b. False
48. is a technique used by a white-collar criminal where a dishonest stockbroker
steals funds from a client rather than investing those funds in the stock market as promised.
49. Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making is
_______________________________.
50. The goal of is not prevention or punishment as much as compliance, or the
following of regulatory guidelines.
51. is the criminal action of being involved in an organized effort to engage in
illegal business transactions.
page-pf4
52. is fraud committed over the Internet.
53. Sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive
information such as a password is known as .
54. The computer is the of a crime, such as when the computer itself or its software is stolen.
55. A is a network of computers that have been appropriated without the knowledge of their
owners and used to spread harmful programs via the Internet.
56. ______________ is the process of encoding information stored in computers in such a way that only authorized
parties have access to it.
page-pf5
57. The application of computer technology to help find and utilize evidence of cyber crimes is called .
58. Intellectual property such as books, films, music, and software is vulnerable to , which is the
unauthorized copying and use of the property.
59. An investigation of a persons history to determine whether that person should be allowed a certain privilege, such
as the ability to possess a firearm is called a .
60. The is a critical legal tool used in efforts to combat terrorism, because it permits law
enforcement agents to arrest suspects even though no crime, in the traditional sense of the word, has taken place
and no evident harm has been caused.
61. A is a court that is operated by the military rather than the criminal justice system
and is presided over by military officers rather than judges.
page-pf6
62. Identify the four federal regulatory agencies that deal with white-collar crime.
63. How are white-collar crimes different from violent or property crime?
64. Identify three main techniques used by white-collar criminals to carry out their crimes.
page-pf7
65. With the advent of the Internet, child pornography became much easier to disseminate. Explain the three reasons for
this development.
66. Describe botnets, worms, and viruses.
Hackers use botnets to commit cybercrimes. Botnets are networks of computers
that have been appropriated by hackers without the knowledge of their owners.
Hackers do this by secretly installing a program on thousands of personal
o computer robots that allows the hacker to forward transmissions to an even
larger number of systems. The program attaches itself to the host computer when
page-pf8
67. Explain how the Internet has contributed to piracy of intellectual property.
In the past, copying intellectual products like books, films, and music, was time
o
consuming. Also, the quality of the pirated copies was inferior.
68. Explain how American law enforcement agencies have used preventive policing to combat terrorism.
o The goal for many law enforcement agencies is no longer to solve crimes after
page-pf9
69. Explain how the Patriot Act has made it easier for federal agencies to conduct searches and conduct surveillance
during terrorism investigations.
70. Discuss the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA). Why is the AEDPA such an
important legal tool against terrorists?
Signed into law in 1996, the Antiterrorism and Effective Death Penalty Act
o (AEDPA) was passed in response to the 1995 truck bombing of the Alfred P.
page-pfa
71. Identify and discuss three important trends in international terrorism.
o Terrorists have developed more efficient methods of financing their

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.