Criminal Justice Pearson Chapter 18

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is the best example of an expert system?

A system that analyzes criminal evidence and creates criminal profiles. An expert system is a system of computer hardware and software that attempts to duplicate the decision-making processes used by skilled investigators in the analysis of evidence and in the recognition of patterns that such evidence might represent. For example, the FBI's National Center for the Analysis of Violent Crime expert system is designed to profile violent serial offenders.

An infrared camera placed on a highway by a police department reads the license plate of a car that was reported stolen five days earlier. This information is immediately sent to the department, leading to the recovery of the vehicle and the apprehension of the thieves. The department used which of the following in this case?

Automatic plate recognition Automatic plate recognition (APR) readers can read over 5,000 license places an hour and can alert officers about stolen vehicles, expired registrations, and so on.

___________ combined physical measurements with the technology of photography to produce an early, effective criminal identification system.

Bertillon's anthropometric system Bertillon's anthropometric system positioned measuring guides beside suspects so that their physical dimensions could be calculated from their photographs and by taking both front views and profiles.

Nexus is an online file-sharing service. On its website, it promotes its services as a way for users to download copyrighted digital content. Blake, a hardcore gamer, downloaded an unauthorized copy of a new video game using Nexus. Blake installs the game on his computer and also sends it to his friend Larry. Which of the following statements regarding this scenario is correct?

Blake has committed software piracy because he downloaded an unauthorized copy of the game from Nexus and sent a copy to Larry. Software piracy involves the unauthorized copying of software programs, which Blake has done.

A police department has obtained DNA evidence from a crime scene. To compare their evidence with DNA samples from around the country, they use which national database?

CODIS CODIS is the Combined DNA Index System. It allows investigators to produce quick matches with DNA samples already on file.

Which of the following statements best describes criminalistics?

Criminalistics refers to the use of technology and scientific techniques in the service of a criminal investigation. Criminalistics is a subfield of criminal justice. Criminalistics applies scientific techniques to the detection and evaluation of criminal evidence in pursuit of a criminal investigation.

________ analysis is increasingly preferred by criminal justice experts as a method of identification because it is nearly infallible from a scientific point of view.

DNA DNA analysis is nearly infallible from a scientific point of view and is increasingly preferred by criminal justice experts as a method of identification. It can prove innocence as well as demonstrate guilt of suspects.

Which of the following best describes expert systems?

Expert systems analyze evidence and recognize patterns. Expert systems are computer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in the analysis of evidence and in the recognition of patterns that such evidence might represent.

Omar lives in New Jersey and wants to give the county sheriff an anonymous tip about a crime he witnessed. To do this, he uses _________.

FaceCrook The Bergen County Sheriff's Office in New Jersey launched "FaceCrook" in 2012. It includes public information on outstanding warrants tied to a Google Maps app as well as anonymous tip feature that allows people to provide anonymous tips via computer and telephone.

Which of the following would constitute an act of bioterrorism?

In 2001, letters containing anthrax were mailed to the offices of several U.S. Senators and to a number of news media offices. Bioterrorism involves the intentional or threatened use of viruses, bacteria, fungi, or toxins from living organisms to produce death or disease. Anthrax is a deadly bacterium. The bioterror attack resulted in five deaths.

Which of the following biocrimes would be classified as bioterrorism?

Infecting food crops with toxins Agroterrorism is a form of bioterrorism that involves biological attacks on agricultural plants and animals.

Jeff illegally obtains access to the computer network of a rival company and steals confidential trade secrets. This is an example of which category of cybercrime?

Information piracy The stealing of trade secrets or copyrighted information is known as information piracy.

Which of the following statements is true of the surface-enhanced Raman spectroscopy (SERS) process?

It can be used to lift latent fingerprints from the skin of crime victims and even from bodies that have been submerged underwater for considerable periods of time. Surface-enhanced Raman spectroscopy (SERS) now makes it possible, in at least some cases, to lift latent fingerprints from the skin of crime victims and even from bodies that have been submerged underwater for considerable periods of time.

Tony received an e-mail asking for his bank details. He opened the e-mail, which stated that his bank account would be frozen if he failed to provide the necessary information within 24 hours. Realizing the e-mail was a hoax, he notified his bank. The operation of his computer was not affected. Tony was a victim of which of the following cybercrimes?

Phishing Phishing is a relatively new form of high-technology fraud that uses official-looking e-mail messages to produce responses from victims. It directs them to illegitimate websites, often seeking information to defraud the computer user/victim. Phishing e-mails typically instruct recipients to validate or update account information before their accounts are canceled.

__________ uses official-looking e-mail messages to elicit responses from victims, directing them to phony websites.

Phishing Phishing is a relatively new form of high technology fraud using e-mail. Phishing e-mails typically instruct individual recipients to validate or update account information before their accounts are canceled.

__________ can lead to perceived injustices and public loss of confidence in the criminal justice system.

Sentinel events A sentinel event is a bad outcome that no one wants repeated and that signals the existence of underlying weaknesses in the system.

_____ is a nontechnical type of cyberintrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

Social engineering Social engineering involves persuading administrators or telephone users to give details of passwords or other things by pretending to be staff, suppliers, or trusted individuals—even police officers.

Sean receives an expensive computer game for his birthday. He makes six copies of the game and gives them to his friends, so they can all play the game together. Sean has committed which type of cybercrime?

Software piracy Software piracy involves the unauthorized and illegal copying of software programs.

Which of the following statements about the National Law Enforcement and Corrections Technology Center (NLECTC) is true?

The NLECTC focuses on identifying and developing new products and technologies designed for criminal justice applications. The NLECTC concentrates on four areas of advancing technology: (1) communications and electronics, (2) forensic science, (3) transportation and weapons, and (4) protective equipment.

Which of the following statements best represents the increasing consensus about the effects of social networking technologies on law enforcement operations?

The use of social media by police is increasing rapidly. Police departments can both benefit and suffer from recent developments in social networking. The adoption of social media by law enforcement agencies is growing exponentially.

To trap automobile thieves, a local police department parks a vehicle in an area with a high rate of auto theft. They outfit the vehicle with equipment that will allow them to shut it down remotely, a GPS device, and a hidden video surveillance camera. Which of the following techniques is being used by the department?

Use of bait cars High-technology bait cars can signal to the police when they have been stolen, send digitized images of perpetrators to investigators, radio their position to officers, be remotely immobilized, and lock their doors on command, trapping thieves inside.

Grant works for a large urban police department. Recently, a group of hikers stumbled across a decaying corpse. In an attempt to determine the identity of the corpse, Grant attempts to reconstruct the likeness of the corpse. Grant is most likely a

forensic anthropologist. Forensic anthropology is the use of anthropological principles and techniques in criminal investigation. Forensic anthropologists may assist the police by reconstructing the likeness of a decomposed or dismembered body.

The study of insects to determine a person's time of death is known as

forensic entomology. Forensic entomology is the study of insects to determine such matters as a person's time of death.

The Department of Homeland Security (DHS) has acknowledged that weapons of mass destruction and other contraband that may be useful to terrorists may enter the country _________.

in shipping containers at seaports The volume of shipping containers entering the United States through its seaports is too high for each to be opened and inspected. Millions of containers enter the country each year from ports around the world. The DHS has noted that shipping containers are extremely vulnerable to exploitation by terrorists.

Mike has created a new computer virus. When a computer is infected with Mike's new virus, the data on the computer is encrypted so that the owner of the computer cannot access it. To unlock the data, the user must pay Mike $1,000. This is an example of

ransomware. Ransomware is a specific type of malware that encrypts data stored on computers, preventing users from accessing it. Ransomware generally demands payments from users to reenable access.

The use of high-tech equipment in airports to inspect baggage for narcotics and explosives without opening luggage involves

trace detection. Trace detection technology is used to search cargo and luggage for particles left behind when narcotics and explosives contraband are packaged and handled.


संबंधित स्टडी सेट्स

Cellular Transport- El transporte celular

View Set

MGMT 330 Quiz Questions (19, 15, 12, 13)

View Set

Chapter 39: Assessment and Management of Patients With Rheumatic Disorders

View Set

Sterile and non sterile compounding Pharmacy tech

View Set

Unit 8: Using References- Informational References

View Set

Intro to Programming - Chapter 2

View Set

Ceramic Materials- Lithium Disilicate vs Zirconia

View Set

the vestibular system (end of chapter 7)

View Set