Counseling Chapter 14 Most efforts to control cyber crime are at the federal level

subject Type Homework Help
subject Pages 13
subject Words 4537
subject Authors John L. Worrall, Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
True / False
1. Bernie Madoff, the mastermind behind the largest criminal conspiracy in history, has been sentenced to death and is
currently awaiting execution in a New York prison.
a.
True
b.
False
2. Law enforcement and the courts have traditionally been reluctant to throw corporate executives in jail.
a.
True
b.
False
3. To be considered illegal dumping, the wastes have to contain hazardous materials.
a.
True
b.
False
4. One of the largest and fastest growing problems is the disposal of many tons of obsolete high-tech electronics.
a.
True
b.
False
5. In the case of the massive BP oil spill, to prove a felony the government has to show that company officials knew in
advance that their actions would lead to the explosion/oil spill and chose to ignore the danger.
a.
True
b.
False
6. Fraud may occur in both public and private organizations.
a.
True
b.
False
7. Cyber terrorism may result in a battered economy, requiring the government to spend more on the military and cut
back on social programs and education.
page-pf2
a.
True
b.
False
8. Cyber vandalism occurs when a perpetrator carefully skims small sums from the balances of a large number of
accounts in order to bypass internal controls and escape detection
a.
True
b.
False
9. According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000, and a
second-time offender will be incarcerated for 15 years.
a.
True
b.
False
10. Market manipulation is one of the three major types of Internet securities fraud that is common today.
a.
True
b.
False
11. A Trojan horse is a benign application that contains illicit codes that can damage system operations.
a.
True
b.
False
12. Cyber stalking usually pertains to threatening or harassing e-mail messages, instant messages, or blog entries
dedicated solely to tormenting an individual.
a.
True
b.
False
13. Carding and spoofing are concepts associated with mortgage fraud.
a.
True
b.
False
page-pf3
14. The conflict in the Ukraine between the Russian-backed separatists and government forces is an example of
revolutionary terrorism.
a.
True
b.
False
15. The USAPA expands the use of racial and ethnic profiling in transportation hubs such as airports and train stations.
a.
True
b.
False
16. Data shows that since 2000, the number of deaths from terrorism has increased 500 percent.
a.
True
b.
False
17. Retributive terrorism promotes the interests of a minority ethnic or religious group that believes it has been
persecuted under majority or colonial rule.
a.
True
b.
False
18. Civil libertarians are concerned that the USAPA permits investigations of a broad range of activities involving
legitimate political dissent, not just terroristic activity.
a.
True
b.
False
19. It is estimated that more than half of all logging activities in the most vulnerable forest regions is conducted illegally.
a.
True
b.
False
page-pf4
20. Many computer crimes are prosecuted under traditional criminal statutes such as larceny and fraud.
a.
True
b.
False
21. Most efforts to control cyber crime are at the federal level.
a.
True
b.
False
22. The process of creating a global economy through transnational markets and political and legal systems is referred to
as transnationalism.
a.
True
b.
False
23. Globalization can be a device for criminal cartels to avoid prosecution and regulation and expand their markets and
profits.
a.
True
b.
False
24. Human trafficking is a global problem, with an estimated 12 million adults and children in forced labor, bonded labor,
and commercial sexual servitude at any given time.
a.
True
b.
False
25. Yakuza is a prolific African transnational crime gang.
a.
True
b.
False
page-pf5
26. A recent trend among Asian criminal enterprises is cooperation across ethnic and racial lines.
a.
True
b.
False
27. Russian crime groups make extensive use of the state governmental apparatus to protect and promote their illegal
activities.
a.
True
b.
False
28. Efforts to control transnational organized crime are typically handled by local and state agencies working together.
a.
True
b.
False
29. Racketeer Influenced and Corrupt Organizations (RICO) Act is designed to limit patterns of organized criminal
activity by prohibiting involvement in acts intended to derive income from racketeering.
a.
True
b.
False
30. Shifting alliances, change of location, and willingness of transnational gangs to use violence makes the fight against
global crime difficult.
a.
True
b.
False
Multiple Choice
31. Bernard Madoff, Bear Stearn, and Lehman Brothers all have committed this type of crime.
a.
Globalization
b.
Transnational
c.
Green
d.
Corporate Enterprise
page-pf6
32. Approximately ____ percent of all deaths from terrorist attacks occur in Iraq, Afghanistan, Pakistan, Nigeria, and
Syria.
a.
20
b.
40
c.
60
d.
80
33. A _______ is an investment fraud that involves the payment of purported returns to existing investors from funds
contributed by new investors
a.
Ponzi scheme
b.
RICO scheme
c.
Phishing scheme
d.
denial-of-service attack
34. __________ terrorism uses violence to frighten those in power and their supporters and seek to replace the existing
government with a regime that holds acceptable political or religious views.
a.
Revolutionary
b.
Political
c.
National
d.
Retributive
35. __________ terrorism uses violence as a method of influence, persuasion, or intimidation to get people to accept their
social, religious, or political views.
a.
Revolutionary
b.
Political
c.
National
d.
Retributive
36. The detection and enforcement of large-scale corporate crime is primarily in the hands of?
a.
US Securities and Exchange Commission (SEC)
b.
US Postal Service (USPS)
c.
Drug Enforcement Administration (DEA)
d.
US Secret Service (USSS)
page-pf7
37. _______are violations of existing criminal laws designed to protect people, the environment, or both.
a.
Denial-of-service attacks
b.
Habitat violations
c.
Green crimes
d.
Mortgage fraud schemes
38. Worldwide estimates for illegal logging activities account for products worth at least ______ per year?
a.
$1 billion
b.
$5 billion
c.
$10 billion
d.
$15 billion
39. Illegal fishing is criminalized because fishermen are:
a.
catching the fish before they have a chance to reproduce.
b.
not paying the appropriate processing fees for the amount they catch.
c.
discharging toxic materials back into the waterways after catching the fish.
d.
destroying the chances for other fisherman to share in the profits.
40. Enforcement of environmental laws, such as the Clean Water Act of 1972, is done by:
a.
local governmental environmental agencies.
b.
the US Environmental Protection Agency (EPA).
c.
nonprofit environmental agencies.
d.
the Public Works Administration (PWA).
41. Transnational crime groups are often involved in:
a.
human trafficking.
b.
gambling.
c.
prostitution.
d.
all of these.
page-pf8
42. One reason it has proven difficult for law enforcement to combat drug cartels is because:
a.
they work in conjunction with transnational crime groups like the Russian mob.
b.
the property where drugs are grown is disguised as migrant farms.
c.
they employ gangs to protect them and intimidate enemies.
d.
the RICO Act has backfired on the US government.
43. Federal legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in two
or more acts prohibited by 24 existing federal and 8 state laws is termed _____.
a.
the enhancement penalty
b.
RICO
c.
the Travel Act
d.
the Federation
44. _____ are the underground criminal societies based in Hong Kong that control secret markets, bus routes, and are
often involved in money laundering and drug trafficking.
a.
Asian Gangs
b.
Yakuza
c.
Red Dragons
d.
Triads
45. Which United Nations agency is charged with addressing labor standards, employment and social protection issues,
and often finds themselves dealing with human trafficking issues?
a.
International Labor Organization
b.
Global Trafficking Committee
c.
Asian Gangs task force
d.
None of the above
46. An estimated ____ percent of cocaine enters the United States through Mexico.
a.
60
b.
70
c.
80
d.
90
page-pf9
47. The United Nations estimates that immigrant smugglers earn about ____ per year smuggling an estimated 3 million
people.
a.
$7 million
b.
$70 million
c.
$7 billion
d.
$70 billion
48. Cyber crime is challenging because:
a.
it is difficult to detect through traditional law enforcement channels.
b.
it is rapidly evolving.
c.
its control demands that agents of the justice system develop technical skills.
d.
all of these make cyber crime challenging.
49. Cyber ____ is the use of computer networks for undermining the social, economic, and political systems of an enemy
through the destruction of infrastructure.
a.
theft
b.
vandalism
c.
terrorism
d.
movement
50. Which of the following is not a type of Internet securities fraud?
a.
Identity theft
b.
Market manipulation
c.
Fraudulent offerings of securities
d.
Illegal touting
51. ____is the illegal acquisition of personal information such as bank passwords and credit card numbers by
masquerading as a trustworthy person/business in what appears to be an official electronic communication.
a.
E-tailing fraud
b.
Phishing
c.
Cyber theft
page-pfa
d.
Touting
52. A ____ is one type of malicious software program that disrupts or destroys existing programs and networks.
a.
computer worm
b.
computer virus
c.
Trojan horse
d.
cyber bully
53. Which of the following types of cyber crime was not discussed in the text?
a.
Cyber terrorism
b.
Phishing
c.
E-tailing
d.
Chiseling
54. Which type of cyber vandalism appears as a benign application that actually contains codes that can damage the
system operations?
a.
Mydoom
b.
Trojan horse
c.
Malware
d.
Chiseling
55. In what type of cyber crime are small amounts of money subtracted from customers’ bank accounts and added to the
account of the thief?
a.
Phishing
b.
Chiseling
c.
Salami slice fraud
d.
Trojan horse
56. Cyber ____ involves hacking secure computer networks at the enemy’s most sensitive military bases, defense
contractors, and aerospace companies to steal important data or to access their defenses.
a.
terrorism
b.
espionage
page-pfb
c.
bullying
d.
stalking
57. Congress has struggled to create legislation that will restrict objectionable use of Internet pornography without
violating _____ Amendment freedoms.
a.
First
b.
Fifth
c.
Sixth
d.
Eighth
58. ____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of
its license.
a.
Warez
b.
Denial-of-service attack
c.
Market manipulation
d.
Cyber theft
59. ____ is the term used to describe the illegal use of the Internet to buy or sell merchandise online.
a.
Cyber theft
b.
E-tailing fraud
c.
Market manipulation
d.
Denial-of-service attack
60. The United States Criminal Code provides penalties for a first-time illegal copyright offender of ____ years
incarceration and a fine of $250,000.
a.
3
b.
5
c.
7
d.
10
Abraham is an American citizen born to Saudi Arabian parents. His father used to know people that had ties to Al Qaeda,
but he doesn’t speak with them anymore. Recently, Abraham’s father seems to do a lot of business on the computer and
page-pfc
telephone at night, but his uncle has just arrived for a visit so they are probably just catching up with old friends. One day
as Abraham is driving to school, he notices two men in a nondescript car that seems to be following him. The next week,
he notices some kind of tracking device hanging from the underside of the car bumper.
61. If Abraham’s father is back in touch with the people that have ties to Al Qaeda, and may even be working with them,
which goal of terrorism do they most likely align with?
a.
Retributive terrorism
b.
Nationalist terrorism
c.
State-sponsored terrorism
d.
Revolutionary terrorism
62. Before Abraham was born, his father came to the United States for a job with Microsoft. He remembers when he was
a youth the death squads and the terror that was felt by all where he grew up. What type of terrorism did Abraham’s father
likely experience?
a.
State-sponsored terrorism
b.
Evolutionary terrorism
c.
Nationalist terrorism
d.
Political terrorism
63. Abraham knows the Federal Bureau of Investigation (FBI) is tailing him, but he doesn’t know why and believes it is
illegal. What recourse does he have as an American citizen?
a.
He can file a petition that his Fourth Amendment rights have been violated.
b.
None. Conducting surveillance of "lone wolves" is legal under the USAPA.
c.
Confront the FBI. USAPA is only allowed to monitor computers and phones.
d.
File a complaint with the police and get a restraining order.
Laura picked up her phone one evening to find that the Microsoft help desk was calling. She had been having trouble with
a slow running computer for a while but hadn’t yet contacted Microsoft to get help for the problem. She was so pleased to
hear that they saw her IP address online and found malware on her computer and they were calling all of their clients to
assist them in removing it. Laura had previously been a victim of a phishing scheme so she was prepared not to give any
information to the help desk just in case they weren’t legitimate but they didn’t ask for her credit card information or
social security number. She figured they were really going to help.
64. The Microsoft Help desk has asked Laura to go to a Web site and verify her information so they can help fix her
computer. She sees all of her information on that web page and she doesn’t have to give them any information. What type
of crime has Laura become a victim of?
a.
E-tailing fraud
b.
E-piracy
c.
Phishing
d.
Warez
page-pfd
65. About a month ago, Laura ordered an autographed Star Wars poster from a memorabilia Web site but she hasn’t
received it yet despite checking with the company and inquiring with United Parcel Service (UPS). The company says
they shipped the poster. What type of crime might Laura be a victim of?
a.
Phishing
b.
E-tailing fraud
c.
E-piracy
d.
Cyber war
66. Laura just got a new laptop but was unaware that it didn’t come loaded with Adobe reader. Her boyfriend gives her
access to his employee homepage and suggests that she use one of the licenses from his office because sometimes he does
work at home. What crime has Laura committed?
a.
Identity theft
b.
Software piracy
c.
Copyright infringement
d.
Internet fraud
In 2006, QXQ opened their doors to finance home mortgages. One of the easiest loans for potential homeowners to obtain
was called a stated income loan. These loans were money in the bank to QXQ because people just had to fill in the forms
with their current salary, there was little documentation required, and everybody won. The buyers got their house and
QXQ got paid.
67. Steve and Jennie got a stated income loan in 2008 from QXQ. As it turns out, they lied on their application and said
they made more money than they actually do and just a couple of months later they couldn’t make their payments and
defaulted on their mortgage. Who or what is at fault?
a.
Steve and Jennie
b.
Securitization
c.
Management fraud
d.
QXQ, the mortgage company
68. Andrew works for QXQ as an investor. He only takes clients that have at least $500,000 to invest. He has been
touting this new hedge fund that he himself has invested in. It is promising 20 percent returns every year. He just signed
up the Jones family. If this scenario is too good to be true, what will likely happen to the Jones’s money?
a.
It will be invested.
b.
It will be used to pay previous investors.
c.
It will be used for securitization.
d.
It has just provided QXQ a big kickback.
page-pfe
Completion
69. ____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and
processed by computer networks.
70. ____________________ is cyber crime with malicious intent, by the desire for revenge, and to inflict wanton
destruction.
71. ______________ is a type of cyber vandalism that occurs when a computer hacker intrudes on another person’s Web
site by inserting or substituting codes that expose visitors to the site to misleading or provocative information
72. Once subprime loans have been issued, the vendors typically bundle them into large pools and sell them as securities
in a process known as _____________.
73. Examples of ______ include illegal dumping, polluting, illegal fishing, and illegal logging.
74. Global criminal conspiracies designed to obtain power and influence or monetary gains that cross nation states and
legal jurisdictions are termed ____________.
75. Lone wolves fall into the category of ______ terrorists.
76. Hamas is an example of _____ terrorism.
page-pff
77. The USAPA was passed in ____ to give sweeping new powers to domestic law enforcement and international
intelligence to fight terrorism.
78. The ____________________ is a computer program that appears benign but actually contains something harmful.
79. ____________________ occurs when individuals make securities recommendations and fail to disclose that they are
being paid to disseminate their favorable opinions.
80. _______________ is slang for the processes used to acquire personal information used for identifying theft and other
fraudulent activities.
81. As the trade of human organs appears to be growing, desperate victims in developing countries are exploited as their
____________ are purchased for low prices.
82. One of the most successful federal efforts at enforcing cyber laws is the ______________________________.
83. ____________________ kiddie porn was outlawed as part of the PROTECT Act of 2003.
84. Illegal _________________ involves harvesting, processing, and transporting timber or wood products in violation of
existing laws and treaties.
85. Stocks become depleted and species endangered as a result of illegal _____.
page-pf10
86. The ____________ is designed to protect and recover endangered and threatened species of fish, wildlife, and plants
in the United States and beyond.
87. _______ is the process of creating a global economy through transnational markets and political and legal systems.
88. Globalization took off with the fall of the _______.
89. _______ involves the forced labor, bonded labor, and commercial sexual servitude of adults and children.
90. Yakuza is a well-known _____ gang.
91. Discuss fraud on Wall Street
92. Discuss the meaning of a Ponzi scheme
page-pf11
93. Discuss state-level enforcement in responding to the threat of large-scale corporate fraud.
94. Discuss three types of green crime.
95. Through the use of examples, discuss the enforcement of environmental laws.
96. Discuss globalization and how it has increased transnational crime.
page-pf12
97. Discuss cybercrime as a challenge in the contemporary justice system
98. Define and give an example of three types of cybercrime.
99. Discuss the various types of terrorism and the passage of the USAPA.
100. Discuss two specific transnational crime groups and what law enforcement is doing to thwart these syndicates.
page-pf13

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.