Introduction to Criminology Ch 14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When did Congress first pass the Racketeer Influenced and Corrupt Organizations (RICO) Act, which has been used against white collar criminals?

1970

The Internet Crime Complaint Center receives over ________________ complaints per year, which represents losses of close to $500 million.

300K

Cyberwarfare

An effort by enemy forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world

Which of the following is not considered a prominent transnational gang cluster?

Australian Crime Group

Fuk Ching.

Chinese organized criminal group in the United States. They have been involved in smuggling, street violence, and human trafficking.

_______________ can be viewed as a type of enterprise crime employing sophisticated technology to achieve illegal profits.

Cybercrime

Discuss the concept of cybercrime and why it has become important.

Cybercrime is a relatively new breed of offenses that involves the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, and the Internet. Cybercrime presents a challenge for the justice system because it is rapidly evolving, it is difficult to detect through traditional law enforcement channels, and its control demands that agents of the justice system develop technical skills that match those of the perpetrators. Cybercrime has grown because information technology (IT) has become part of daily life in industrialized societies.

According to your text, all of the following are true except: a. The cyber age has generated an enormous amount of revenue. b. The Internet opened up a broad avenue for illegal activity cybercrime has become a feature of the new millennium. c. Cybercrimes are easy to detect through traditional law enforcement channels. d. The IT revolution has increased the scope of organized criminal enterprises.

Cybercrimes are easy to detect through traditional law enforcement channels.

What is the most common form of spam?

Email

Traditional ____________ gangs are being replaced by transnational mega gangs.

Euro centric

The next war may be conducted in cyberspace.

FACT There have already been a number of cyberattacks on military installations in the United States and abroad.

The Central European Working Group is part of a project that brings together the _____ and Central European law enforcement agencies to combat organized crime.

FBI

Organized crime in the United States is still a local commodity, controlled by five Mafia families in New York City and a few other allied groups in Chicago, Los Angeles, and Miami.

Fiction Traditional organized crime families are in decline, being replaced by transnational crime groups originating in Europe, Asia, and Latin and South America.

Which is the Chinese organized criminal group based in the United States that is involved in smuggling, street violence, and human trafficking?

Fuk Ching

Red Wa.

Gangsters from Thailand. They are involved in manufacturing and trafficking methamphetamine.

Who are the Taiwanese gangsters who are often executives in large companies and are involved in white collar crimes such as illegal stock trading and bribery?

Heijin

Yakuza

Japanese criminal group. Often involved in multinational criminal activities, including human trafficking, gambling, prostitution, and undermining licit businesses.

What city has had the most success regarding developing partnerships between the U.S. Secret Service and a host of other public safety agencies and private corporations to combat cybercrime?

New York

Jao Pho.

Organized crime group in Thailand. They are often involved in illegal political and business activity.

Trace the evolution of organized crime.

Organized criminals were traditionally white ethnics, but today other groups have become involved in organized crime activities. The old-line "families" are now more likely to use their criminal wealth and power to buy into legitimate businesses. The most common view of organized crime today is an ethnically diverse group of competing gangs dedicated to extortion or to providing illegal goods and services. Efforts to control organized crime have been stepped up by the federal government, which has used antiracketeering statutes to arrest syndicate leaders.

What is the term used to describe illegally removing small sums from the balances of a large number of accounts and converting them for personal use?

Salami slice fraud

Distinguish among cybertheft, cybervandalism, and cyberterrorism.

Some cybercrimes use modern technology to accumulate goods and services (cybertheft). Cybervandalism involves malicious attacks aimed at disrupting, defacing, and destroying technology that the attackers find offensive. Cyberterrorism is aimed at undermining the social, economic, and political system of an enemy nation by destroying its electronic infrastructure and disrupting its economy.

Heijin

Taiwanese gangsters who are often executives in large corporations. They are often involved in white-collar crimes, such as illegal stock trading and bribery, and sometimes run for public office.

Discuss efforts to control cybercrime.

The growth of cybercrime and its cost to the economy has created the need for new laws and enforcement processes specifically aimed at controlling its emerging formulations. Congress has treated computer-related crime as a distinct federal offense since passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984. Existing laws sometimes are inadequate to address the problem of cybercrime. Therefore new legislation has been drafted to protect the public from this new breed of criminal. Specialized enforcement agencies have been created to crack down on cybercriminals.

Describe the various types of cybercrimes, such as computer frauds, illegal copyright infringement, and identity theft.

There are a number of methods that hackers use to commit cybercrimes. Warez refers to groups of individuals who work together to illegally obtain software and then "crack" or "rip" its copyright protections before posting it on the Internet for other members of the group to use. Another type of illegal copyright infringement involves file-sharing programs that allow Internet users to download music and other copyrighted material without paying the artists and record producers their rightful royalties. Identity theft occurs when a person uses the Internet to steal someone's identity and/or impersonate the victim to open a new credit card account or conduct some other financial transaction. Phishing involves the creation of false emails and websites that look legitimate but are designed to gain illegal access to a victim's personal information.

Triads

Underground criminal societies based in Hong Kong. They control secret markets and bus routes and are often involved in money laundering and drug trafficking.

Cybervandalism

Use of cyberspace for revenge, destruction, and to achieve a malicious intent

Cybertheft

Use of cyberspace to distribute illegal goods and services or to defraud people for quick profits

Discuss the activities of transnational organized crime.

With the aid of the Internet and instant communications, transnational groups are operating on a global scale to traffic drugs and people, launder money, and sell arms. Eastern European crime families are active abroad and in the United States. Russian organized crime has become a major problem for law enforcement agencies. Mexican and Latin American groups are quite active in the drug trade. Asian crime families are involved in smuggling and other illegal activities.

A well known Asian crime group that is Japanese and is involved in human trafficking, gambling, and prostitution is the ___________.

Yakuza

Which of the following is not listed as a cybercrime?

cybersex

The use of computer networks for criminal profits that include copyright infringement, identity theft, and internet securities fraud is called __________.

cybertheft

Malicious attacks aimed at disrupting, defacing, and destroying technology are known as _______________.

cybervandalism

What type of cybercrime includes politically motivated attacks designed to compromise the electronic infrastructure of an enemy nation and disrupt its economy?

cyberwar

According to the United States Criminal Code, first time offenders who illegally share files and download music can receive a ___________________________________.

five year prison sentence and a fine of $250,000.

Transnational organized crime is usually structured along _________ lines.

hierarchical

Cybercriminals are considered ____________ thieves, vandals, and warriors.

high tech

Placing deceptive information online to get unsuspecting investors interested in a stock while those spreading the information sell previously purchased stock at an inflated price is known as _______________.

pump and dump

What is considered an unsolicited advertisement or promotion material?

spam

Spear phishing is defined as:

targeting specific victims by using personal information gleaned from social media and then sending them messages that convince them to open tainted emails or go to a tainted website.

Transnational organized crime groups do not include ____________ organizations.

terror

All of the following are examples of cybertheft except:

webface defacement


Set pelajaran terkait

Chapter 53 Drugs for Seizure Prep U

View Set

questions de compréhensions du Diner des cons

View Set

Ocean Trenches and Mid-Ocean Ridges

View Set

CIS 2337 Final Fill in the Blank and Questions

View Set