Chapter 16

Ace your homework & exams now with Quizwiz!

15. Before the Patriot Act, there were no federal laws that addressed the need for surveillance of citizens in the U.S.

False

16. Safe operation of the airline, rail, bus and ferry services is the responsibility of U.S. Customs and Immigration

False

2. Generally wars are considered political actions undertaken by one state or nation against another.

False

5. Today, twenty U.S. states have specialized units that dedicated to combating terrorism.

False

6. Spam is spread by a limited number of individuals.

False

7. Intellectual property is described as items developed through computer assisted design.

False

9. Preventive policing has its goal of apprehending terrorists just as the attempt to commit the terrorist act.

False

21. The primary goal of Antiterrorism and Effective Death Penalty Act of 1996 is: a. "Hamstring terrorist organizations by cutting off funding from outside sources." b. "Temporarily suspend all constitutional safeguards of known terrorists." c. "Strengthen the due process requirements for suspected criminals." d. "Seize all assets of suspected terrorists."

a. "Hamstring terrorist organizations by cutting off funding from outside sources."

20. Osama bin Laden's al Qaeda grew out of a network of volunteers who migrated in the 1980s to: a. Afghanistan b. Egypt c. Iran d. Iraq

a. Afghanistan

15. The danger posed by hackers has increased significantly because of: a. Botnets b. Worms. c. Trojan horses d. Phishing

a. Botnets

13. Nearly 13 percent of all phishing takes place using what? a. Facebook alerts b. Google IM's c. Group e-mail services d. Direct marketing e-mail messages

a. Facebook alerts

4. Relatively speaking, the term "terrorism" has had a short history; in the political context the birth of the term terrorism can be traced to the: a. French Revolution. b. American Revolution. c. WWI. d. Civil War.

a. French Revolution

35. The Patriot Act was result of a strong impulse in Washington D.C. to ________. a. Level the playing field. b. Set up strong guidelines c. Focus on individual governments d. Punish terrorists

a. Level the playing field

11. _____ is a computer program that can automatically replicate itself over a network such as the Internet and interfere with the normal use of a computer. A worm does not need to be attached to an existing file to move from one network to another. a. Worm b. Botnet c. Phish d. Virus

a. Worm

5. How long after 9/11 did President Bush sign the Patriot Act? a. 3 weeks b. 6 weeks c. 7 weeks d. 11 weeks

b. 6 weeks

8. A non-temporary visa is also known as a? a. Student work permit b. Green card c. Resident Alien permit d. Visitation authorization form

b. Green card

33. The PATRIOT Act relaxes restrictions on: a. Information sharing between lobbyists and law enforcement b. Information sharing between U.S. law enforcement and other government departments. c. Information sharing between U.S. citizens and law enforcement. d. Information sharing between military operations and Congress.

b. Information sharing between U.S. law enforcement and other government departments.

1. The Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA) has which of the following provisions? a. It raises the standard of probable cause to beyond a reasonable doubt when requesting an arrest warrant. b. Law enforcement agents have the power to arrest and prosecute any individual who provides material support or resources to a foreign terrorist organization. c. It enhances the power to law enforcement agency granted by the USA PATRIOT Act. d. It eliminates the bureaucratic problems when prosecuting state level terrorists.

b. Law enforcement agents have the power to arrest and prosecute any individual who provides material support or resources to a foreign terrorist organization.

12. White-collar criminals usually do not? a. Have legal access to the place where the crime occurs. b. Live close to their targets c. Are spatially separated from the victim d. Behaves in a manner that is at least superficially legitimate

b. Live close to their targets

19. Which of the following is NOT one of the three major terrorism trends identified by Homeland Security expert, Brian Jenkins? a. Terrorists have exploited new communications technology to mount global campaigns b. Terrorists have developed more efficient ways to kill c. Terrorists have developed more efficient organizations d. Terrorists have developed more efficient methods of financing their operations.

b. Terrorists have developed more efficient organizations

23. The USA PATRIOT Act allows the FBI to obtain search warrants for terrorism and certain other investigations if agents can prove what? a. They have probable cause to believe evidence exists at the search location. b. The actions have a "significant purpose." c. There is a "justifiable need" to conduct the search. d. There is a "reasonable suspicion" that individuals are conducting terrorist activities.

b. The actions have a "significant purpose."

14. Between 2009 and 2011, the FBI completed nearly _____ assessments of people or groups to determine any possible ties to terrorism. a. 20,000 b. 32,000 c. 43,000 d. 81,000

c. 43,000

28. According to the Federal Government what percent of American household have had a victim of identity theft. a. 3 percent b. 5 percent c. 7 percent d. 9 percent

c. 7 percent

2. What is not one of the three main techniques used by white-collar criminals to carry out their crimes? a. Deception b. Abuse of trust c. Extortion d. Concealment and conspiracy

c. Extortion

29. What type of agent makes arrests for immigrations law violations. a. FBI b. CIA c. ICE d. INS

c. ICE

18. What is the significance of being labeled an "enemy combatant?" a. This automatically grants individuals all the protections and safeguards found in the U.S. Constitution. b. Individuals are transferred from military tribunals to civilian criminal courts. c. Individuals can be detained indefinitely without review of their status. d. Individuals fall under the jurisdiction of superior courts.

c. Individuals can be detained indefinitely without review of their status.

31. The Patriot Act makes it easier for agents to collect information about those suspected of committing terrorist acts or have the knowledge of terrorist activities, and then ________. a. try them based upon that information b. detain them based on that information c. Institutionalize the individuals d. sanction their actions

c. Institutionalize the individuals

32. Which is not one of the differences between white-collar crime and violent crimes? a. There is no direct personal contact b. There is a limited number of victims c. There is generally little possibility of physical injury d. All of above

d. All above

30. A ______ is a person who uses one computer to break into another. a. Nester b. Cracker c. Cyber terrorist d. Hacker

d. Hacker

7. Which is not one of the strategies used to collect intelligence information. a. Electronic surveillance b. Human-source collection c. Open-source collection d. Intelligence projections

d. Intelligence projections

16. Which term best describes an entity that plays a role in international affairs but does not represent any established state or nation? a. Non-partisan actor b. Dignity actor c. Non-statesman actor d. Non-state actor

d. Non-state actor

24. The biggest change in U.S. strategy with regard to captured foreign terrorist operatives has been ____ rather than _____. a. Military; political b. Legal; military c. Military; political d. Political; legal

d. Political; legal

17. The world that is used to describe unsolicited junk e-mail a. Cyberstalking b. Cyber-trash c. Botnets d. Spam

d. Spam

3. Why has the Internet changed the face of terrorism? a. No criminal cases have reached the Supreme Court, which ultimately sets the jurisdiction for internet crimes. b. The federal government has jurisdiction over all cyber crimes, thereby negating state and local jurisdictions. c. The law does not specify who has legal jurisdiction over the Internet. d. The Internet allows for direct communication between terrorist operatives at minimal cost and with little danger of detection.

d. The Internet allows for direct communication between terrorist operatives at minimal cost and with little danger of detection.

10. Which of the following is a criticism of military tribunals? a. It is difficult to protect classified information. b. Defendants might be freed on legal technicalities. c. The process will take too long to complete. d. There is a lack of constitutional protections for defendants.

d. There is a lack of constitutional protections for defendants.

9. ______ is a computer program that can replicate itself over a network such as the Internet and interfere with the normal use of a computer. A virus cannot exist as a separate entity and must attach itself to another program to move through a network. a. Work b. Botnet c. Phish d. Virus

d. Virus

27. In 2004, the Supreme Court ruled that Guantanamo detainees could do what? a. Congregate to practice freedom of religion. b. File civil suits against the U.S. Government, claiming their imprisonment constituted "cruel and unusual" punishment. c. Review all the evidence against them. d. File a habeus corpus petition to challenge their imprisonment.

d. file a habeus corpus petition to challenge their imprisonment.

1. The FBI defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a government, civilian population or any segment thereof, in further of political or social objectives.

True

10. The Antiterrorism and Effective Death Penalty Act of 1996 was signed into law in response to the 1995 bombing of the Federal Building in Oklahoma City.

True

11. A military tribunal is court that is operated by the military rather than the criminal justice system and is presided over by military officers rather than judges.

True

12. FEMA is the nation's lead agency for disaster preparation including floods, terrorist attacks and infrastructure concerns.

True

13. Phishing is distinct example of identity theft.

True

14. The Patriot Act limits the ability of federal authorities to conduct surveillance.

True

17. The PATRIOT Act amends the law to allow the FBI or other federal agencies to obtain warrants for "terrorism investigations," "chemical weapons investigations," and "computer fraud/abuse investigations" as long as agents have a reason for conducting the investigation.

True

18. Piracy is unauthorized copying and use of another person's property.

True

19. Botnets are an example of malware.

True

20. According to one expert, cyber-bullying is the number one problem our children face while using the internet.

True

3. Today the dominant strain of terrorism mixes religious affiliations and political goals.

True

4. RICO statutes have been used successfully to prosecute white collar-crimes.

True

8. Enemy combatant is the label used to describe persons suspected of terrorist activities by the U.S. Government.

True

22. Why is it difficult to stop illegal aliens from entering the United States? a. The USA PATRIOT Act has not properly addressed the best method for combating illegal aliens. b. There are not law enforcement agencies specifically charged with preventing the entry of illegal aliens. c. It is impossible to effectively monitor the thousands of unregulated stretches along our borders with our limited resources. d. It is currently the responsibility of local law enforcement agencies to monitor the borders, thereby creating a very ineffective patrol system.

c. It is impossible to effectively monitor the thousands of unregulated stretches along our borders with out limited resources.

26. According to the textbook, terrorists have developed more efficient methods of financing their operations through drug trafficking operations, Internet fund raising, and: a. Covert government grants. b. Arms sales. c. Money Laundering schemes d. Prostitution/sex slavery operations.

c. Money Laundering schemes

25. "Jihad" refers to 3 kinds of struggles or exertions required of the Muslim faithful. The struggle against evil in oneself, the struggle against evil outside of oneself; and the struggle against: a. Poverty b. Violence c. Non-believers d. Military operations

c. Non-believers

34. What prompted Congress to pass the Antiterrorism and Effective Death Penalty Act of 1996? a. World Trade Center bombing b. Attempted bombing of the Sears Tower in Chicago c. Oklahoma City bombing d. Bombing of the U.S.S. Cole

c. Oklahoma City bombing

6. Which act allows law enforcement agents greater freedom in seizing the e-mail records of suspected terrorists? a. Homeland Security Act of 2002 b. AEDPA Act of 1996 c. USA PATRIOT Act 2001 d. Antiterrorism Act of 1998

c. USA PATRIOT Act 2001


Related study sets

Peds - Chapter 22: Nursing Care of the Child With a Neuromuscular Disorder

View Set

Chapter 1 Concept Overview Videos

View Set

Acute Respiratory Distress Syndrome (Sherpath)

View Set

Prepu - Chapter 53: Assessment of Kidney and Urinary Function

View Set

Pharmacy Technician Chpts 4, 14, 15

View Set