Chapter 14 It is estimated that the revenue generated from

subject Type Homework Help
subject Pages 13
subject Words 4520
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
True / False
1. The cyber age has generated an enormous amount of revenue and information sharing, with an estimated 190 billion
email messages sent per day.
a.
True
b.
False
2. Criminals have become more technologically sophisticated, routinely using the Internet to carry out their criminal
conspiracies.
a.
True
b.
False
3. Cybercrimes are vast in scope and place a heavy burden on society
a.
True
b.
False
4. The biggest hurdle with deterring file sharing crimes is that the U.S. Criminal Code fails to provide any penalties for
first-time offenders in the form of fines or prison time.
a.
True
b.
False
5. ATM skimming involves the use of electronic devices or cameras to copy personal information from a bank card or a
bank card's magnetic strip.
a.
True
b.
False
6. It is estimated that revenue generated from adult sites each year is greater than all movie box office sales and the
combined income of ABC, NBC, and CBS.
page-pf2
a.
True
b.
False
7. Online gambling casinos have proven particularly vulnerable to DoS attacks.
a.
True
b.
False
8. Because of strict federal laws, identity theft has decreased at surprising rates over the past few years.
a.
True
b.
False
9. The concept of phishing is also known as carding or spoofing.
a.
True
b.
False
10. In 1998, the United States passed the Identity Theft and Assumption Deterrence Act to meet the threat of phishing and
identity theft crimes.
a.
True
b.
False
11. Even the federal government can fall victim to scams as the IRS is expected to lose as much as $21 billion in revenue
between 2012 and 2017 due to identity theft.
a.
True
b.
False
page-pf3
12. It is estimated that the revenue generated from adult sites each year is greater than all movie box office sales and the
combined income of ABC, NBC, and CBS.
a.
True
b.
False
13. The most typical use of cyberspace for destructive intent comes in the sending or implanting of disruptive programs,
called viruses or worms.
a.
True
b.
False
14. Recent research by Hinduja and Patchin on cyberbullying has found that roughly 46 percent of high school students
surveyed had been a victim of cyberbullying and nearly 62 percent reported perpetrating cyberbullying.
a.
True
b.
False
15. While email is the most common form of spam, many are not aware that viruses and spam can be sent in the form of
instant messaging, online forums, social media and even text messaging.
a.
True
b.
False
16. Defacers are typically members of an extensive social network who are eager to demonstrate their reasons for hacking
and often leave calling cards, greetings, and taunts on the webpages they corrupt.
a.
True
b.
False
page-pf4
17. Cyberstalking refers to the use of the Internet to steal one's identity for profit.
a.
True
b.
False
18. Cyberespionage efforts are well-practiced by Chinese organizations, one of which is known as the Titan Rain and has
penetrated NASA computers.
a.
True
b.
False
19. The illegal sale of counterfeit goods and illegal use of intellectual property to commit crime, such as stock
manipulation, have been used to support terrorist activities.
a.
True
b.
False
20. While many feel the United States is not vulnerable to cyber attacks, a Chinese espionage ring known as the Titan
Rain was able to penetrate a U.S. military base and NASA obtaining the U.S. Army's flight-planning software.
a.
True
b.
False
21. Spear-phishing attacks have decreased between 2013 and 2014 due to the creation of the U.S. Anti-Trust and
Reinforcement Act which penalizes first time offenders with life in prison.
a.
True
b.
False
22. The Convention on Cybercrime, ratified by the U.S. Senate in 2006, was the first international treaty to address the
definition and enforcement of cybercrime.
a.
True
page-pf5
b.
False
23. Based in Fairmont, WV, the Internet Crime Complaint Center is run by the FBI and the National White Collar Crime
Center with the goal to analyze fraud-related complaints.
a.
True
b.
False
24. Transnational organized crime is a conspiratorial activity, involving the coordination of numerous people in the
planning and execution of illegal acts or in the pursuit of a legitimate objective by unlawful means.
a.
True
b.
False
25. Organized crime in the United States is a local commodity, controlled by five Mafia families in New York, Pittsburgh,
Miami, Chicago, and Seattle.
a.
True
b.
False
26. The primary means of income for transnational organized crime groups are by using force to enter into and maximize
profits in legitimate businesses.
a.
True
b.
False
27. Since the fall of the Soviet Union in 1991, Russian organized crime groups have become almost obsolete.
a.
True
b.
False
page-pf6
28. Even though United States and international law agencies work together, if a transnational group is destroyed and if
monetary gain is readily available, it is quickly replaced.
a.
True
b.
False
29. Efforts to combat transnational organized crime are typically in the hands of federal agencies
a.
True
b.
False
30. One of the primary issues for combating transnational drug crime is that the United States has little influence in some
key drug-producing areas, such as Taliban-held Afghanistan and Myanmar.
a.
True
b.
False
31. The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet.
a.
Cybercrime
b.
Organized crime
c.
Connected crime
d.
Technology crime
32. Which of the following is not true about the "cyber age" according to the text?
a.
Facebook reached 10 million users in 2015.
b.
There are over 500 million tweets a day.
c.
Nearly 4 billion industries use email.
d.
Over 190 billion email messages are sent daily.
page-pf7
33. Malicious attacks aimed at disrupting, defacing, and destroying technology.
a.
Cybervandalism
b.
Cyberwar
c.
Cyberterrorism
d.
Cyber malware
34. A term computer hackers and software pirates use to describe a game or application that is made available for use on
35. The federal government has actively pursued members of the warez community through new legislation. Which of the
following is one of these acts?
a.
Computer Fraud and Abuse Act
b.
Federal Lautenberg Act
c.
RICO Act
d.
Copyright Infringement Act
36. Which of the following is a form of computer crime?
a.
Theft of information
b.
Corporate espionage
c.
Manipulation of accounts
d.
All of the above are computer crimes
37. Catherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes
small sums of money from a large number of accounts associated with the department and uses the money to fund her
lavish vacations to the Africa, Asia, and Europe. This is an example of a______.
a.
Trojan horse
b.
salami slice fraud
c.
Ponzi scheme
d.
warez scheme
38. A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking),
including software that is copied for profit.
a.
Theft of information
b.
Manipulation
page-pf8
c.
Corporate espionage
d.
Skimming
39. Which of the following is true about ATM skimming crimes?
a.
Devices are typically undetectable
b.
Devices are usually placed only for a short time
c.
Phony keyboards are sometimes attached
d.
All of the above
40. Which of the following is not true in regard to drug distribution and the Internet?
a.
While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of
Pharmacy.
b.
Often drugs sold on the Internet are adulterated, expired, or the wrong dose.
c.
Numerous websites provide prescriptions written by cyber doctors.
d.
There are no controls for preventing children from ordering drugs.
41. Which of the following is false in regard to denial-of-service (DoS) attacks?
a.
DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party
b.
Even respectable businesspeople have been accused of launching DoS attacks against rival businesses
c.
Online, offshore, gambling sites are particularly vulnerable to DoS attacks
d.
Many U.S organizations have been affected by DoS attacks, including New York City email accounts and
Rutgers University
42. Which of the following would be an example of a cyber smear scam?
a.
Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to
purchase
b.
Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attempt to
make a quick profit
c.
Ryan steals the identity of his biology professors and using his credit card information to purchase his books
for the system; afterward he quickly dumps the card to eliminate the trace
d.
Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior
drug use on Instagram
page-pf9
43. Which of the following best depicts a phishing scheme?
a.
Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after
failing to earn tenure
b.
Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her
colleagues
c.
Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the
season in an attempt to ascertain personal information for his use
d.
Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up
the price, and allowing her to sell her shares at an inflated price
44. Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is
perpetrated as a “one-off kamikaze” fraud.
a.
theft of information
b.
manipulation of accounts
c.
corporate espionage
d.
warez
45. Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to
the service desk to get a refund. Becky has just committed _______.
a.
shoplisting
b.
entail fraud
c.
phishing
d.
mass marketing fraud
46. Extorting money from an Internet service user by threatening to prevent the user from having access to the service is
known as ______.
a.
denial-retrial
b.
Trojan horse
c.
warez
d.
denial-of-service attack
47. The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim’s
personal information
page-pfa
a.
phishing
b.
warez
c.
dumpster diving
d.
spearing
48. David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his $80 million
dollar cyber attack in the form of a ______.
a.
computer worm
b.
Trojan horse
c.
slag code
d.
logic bomb
49. Which of the following is false in regard to cyberbullying?
a.
Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
b.
Adolescent girls are significantly more likely to have experienced cyberbullying than boys.
c.
Cyberbullying can happen via the computer or cellphone.
d.
17 percent of students in a recent survey say they have harassed someone online.
50. The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who
bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are
characterized as ______.
a.
cyberbullying
b.
cyberspying
c.
cyberabuse
d.
cyberstalking
51. Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its
information systems that was thwarted. According to the text, this is an example of _______.
a.
cyberespionage
b.
cyberspying
c.
cybervandalism
d.
cyberterrorism
page-pfb
52. What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law?
a.
It protected classified U.S defense and foreign relations information.
b.
It made identity theft a separate crime against the individual whose identity was stolen.
c.
It created a federal insurance program to assist victims of computer fraud.
d.
All of the above
53. Which of the following is true about the Convention on Cybercrime, ratified in 2006?
a.
It was the first international treaty to address the definition and enforcement of cybercrime
b.
It has been signed by 70 nations
c.
It fails to address a common legal framework to eliminate jurisdictional hurdles
d.
All of the above
54. The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and
which federal agency?
a.
DEA
b.
FBI
c.
CIA
d.
INS
55. Which of the following is false about transnational organized crime?
a.
It usually does not include drug sales but is more inclined to commit business-related crimes.
b.
It is usually structured along hierarchical lines.
c.
Groups are quick and effective in controlling and disciplining members.
d.
They do not include terror organizations.
56. Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional
criminal and civil charges against people whose multiple criminal acts constitute a conspiracy.
a.
RICO
b.
G.R.E.A.T.
c.
Federal Lautenberg
d.
Transnational Anti-Criminal Organization (TACO) Act
page-pfc
57. Which of the following is false in regard to Russian organized crime groups in the United States?
a.
They are involved primarily in frauds and
scams.
b.
They are involved in health care fraud.
c.
They are primary players in drug trafficking.
d.
They are believed to be a major player in credit card
fraud.
58. Latin American and Mexican cartels primary method of income is through ______.
a.
drug sales and drug smuggling
b.
human trafficking
c.
gambling
d.
loan sharking
59. Which of the following is most true about the group known as the Surenos?
a.
They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major
player in the distribution of cocaine and heroin along border towns in Texas.
b.
They are one of the largest groups in the world involved in human trafficking, preying on the young women in
the poorest regions and eventually selling them into sexual slavery.
c.
They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by
selling drugs within prisons.
d.
None of the above
60. Which of the following is true about Asian transnational crime groups?
a.
Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian
women to Eastern Europe and Thailand for the sex trade
b.
The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of
methamphetamines
c.
The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of
the largest growing groups on the west coast of the United States
d.
In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business
sectors and politics
page-pfd
61. Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine
who originated in Thailand?
a.
Red Wa
b.
Jao Pho
c.
Triads
d.
Fuk Ching
62. Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend,
David, and the two are set to graduate next May with degrees in criminal justice. Answer the following questions:
One of Jody’s friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to
participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______.
a.
file sharing
b.
salami slicing
c.
warez
d.
skimming
63. After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide
to use the university listserv to email all students and faculty at the university notifying them that their account has been
hacked and to email their name and password back to the sender. This is an example of ______.
a.
phishing
b.
cyber smear
c.
a pump and dump
d.
spear-phishing
64. Jody and David begin an etailing fraud scam on campus with the rest of Jody’s friends on the volleyball team. Which
of the following scenarios would most likely be considered etailing fraud?
a.
Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at
a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a
full refund
b.
Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same
merchandise and returns the stolen product for cash
c.
Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information
via an online blog about the success of the company, increasing the stock price, and having her friends sell at
an inflated rate
d.
David spread negative information about the university online in an attempt to hold the university ransom
unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information
page-pfe
65. Criminal conspiracies that cross national and international borders and involve the planning and execution of illicit
ventures by groups or networks in more than one country is known as _______.
66. __________________ is defined as the theft or destruction of information, resources, or funds via computers,
computer networks, or the Internet.
67. Malicious attacks aimed at disrupting, defacing, and destroying technology are referred to as _______________.
69. A __________________ involves placing deceptive information online to get unsuspecting investors interested in a
stock while those spreading the information sell previously purchased stock at an inflated price.
70. ___________________ is a term computer hackers and software pirates use to describe a game or application that is
71. Using the Internet to impersonate the victim in order to conduct illicit transactions such as fraud is called
________________
page-pff
72. Illegally removing small sums from the balances of a large number of accounts and converting them for person use is
a term known as _______________________.
73. Extorting money from an Internet service user by threatening to prevent the user from having access to the service is
called a _______________________
74. A ____________ occurs when negative information is spread online about a stock, driving down its price and
enabling people to buy it at an artificially low price.
75. In the case of MGM Studios, INC v. Grokster, Ltd. found that peer-to-peer ______________ sites are another form of
illegal copyright infringement and are punishable by fines and or confinement.
76. ______________ fraud consists of the illegal buying and selling of merchandise on the Internet.
77. A computer program that looks like a benign application but contains illicit codes that can damage the system
operations is called a ______________________
78. Computer _____________ are programs that attack computer networks by self-replicating and sending themselves to
other users, generally via email without the aid of the operator.
page-pf10
79. A malicious software program may also be called _________________
80. A _________________ is a program that is secretly attached to a computer system, monitors the network's work
output, and waits for a particular signal, such as a date, to appear.
81. ___________ includes the willful and repeated harm inflicted through the medium of electronic text.
82. ______________ consists of unsolicited advertisements or promotional material, typically in unwanted emails, but can
also be sent via instant messaging, text messaging, and other forms of media.
83. ________________ includes the illegal use of the Internet to gather information that is considered private and
confidential.
84. ___________________ crime has economic gain as its primary goal, although power and status may also be
motivating factors.
85. ______________ includes efforts by intelligence agencies to penetrate computer networks of an enemy nation in order
to steal important dates.
page-pf11
86. The ___________________________ Act of 1998 became the first federal statute that made identity theft a crime.
87. The ______________ are an underground Asian crime group with criminal societies based in Hong Kong. They
control secret markets and bus routes and are often involved in money laundering and drug trafficking.
88. ________________ now supplies 90 percent of the world's opium.
89. Discuss the concept of cybercrime and why and how it has become important.
90. Distinguish among cybertheft, cybervandalism, and cyberwar.
91. Compare and contrast the different forms of cybercrime for profit.
92. List and describe the primary ways that criminals use phishing and identity theft techniques for monetary gain.
93. Explain etailing fraud, and in your explanation, provide your opinion on why and how technology and the Internet has
made this crime more profitable.
page-pf12
94. Explain how the Internet has increased stalking and bullying into cyberstalking and cyberbullying. What have been the
ramifications of technology on these crimes?
95. List and describe the various forms of worms and viruses.
96. Describe the extent of cybercrime and attempts at controlling it.
97. Explain the role cybercriminals have played in relation to international terrorism.
98. List and describe the characteristics of transnational organized crime.
99. Discuss the activities and the key players involved with transnational organized crime.
100. List and describe some of the way the United States and other nations are combating transnational crime.
page-pf13

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.