Criminal Investigation final
one hypothesis to explain the relationship between gang and crime is the facilitation model which posit that
...
what percentage of known offenders involved in hate crimes are white?
62%
which of the following crime networks has been called the fastest growing criminal organization in the us
Eruasian organized rime
keystroke logging is a specif maneuver that initiates a denial of service attack
False
prison gangs are not connected to organized crime or drug manufacture or sale
False
the suffixes .com, .gov, and .int are common examples of an ISP?
False
NW3C stands for...
National White Collar Crime Center
a malicious program hidden inside an apparently harmless legitimate program intended to carry out unauthorized or illegal function is called a
Trojan horse
A dynamic IP address fluctuates and is thus more secure
True
an attempt to get victims to disclose personal sensitive information such as passwords and bank account numbers is referred to as fishing
True
many visitors to a residence or place of business particularly at odd hours who stay for a limited amount of time may be indication of drug sales
True
the privacy protection act establishes that investigators are allowed to seize drafts of newsletters or web pages if there is reason to believe that the seizure is necessary in order to prevent death or serious bodily injury
True
a zombie is a
a computer that has been taken over by another computer
Skimming is defined as
a method in which a device is placed in a card reader to record sensitive information
drug addiction is
a progressive disease
designer drugs which are illicit drugs that are offshoots of the legal drugs from which they are created may cause the muscles to stiffen and give the appearance of someone suffering from Parkinson disease these illicit drugs are referees to as what type of drugs
analogs
the us Congress has defined a drug addict as
any person who both habitually use any habit forming narcotic drug so as to endanger the public morals health safety or welfare and is or has been so far addicted to the use of habifoming narcotics drugs as to have lost the power of self control with reference to the addiction
a gangs graffiti can provide all of the following pieces of information about the gang except one which one
arrest records
which of the following provides revenue to law enforcement for anti drug efforts
asset forfeiture
the crips are associated with
blue and purple bandannas
Club drugs prescription narcotics and ultra pure forms of DXM an ingredient found in OTC cough medication
can all be purchase online and shipped directly to the users house, transactions that are extremely difficult for law enforcement to detect .
Designer drugs are
created by adding something to an existing drug created by omitting something from an existing drug high profit drugs for dealers
rohypnol is a
depresant
barbiturates are classified as
depressants
Drugs can be classified as
depressants stimulants narcotics hallucinogenics cannabis inhalants
Computer evidence is
easy to destroy
which of the following is one of the models used to explain the relationship between gangs and crime
enhancement model
Cyber criminals are solitary by nature and do not operate in groups
false
Investigators do not need to be concerned that digital evidence may also contain physical evidence such as dna fingerprints or serology
false
a flashroll is something used by mule to smuggle drugs
false
a search warrant is not needed to search a computer connected to the internet because there is no expectation of privacy
false
add ware is a covert way to advertise on web sites without having to pay a fee
false
capital flight is interchangeable with money laundering and both are illegal
false
crack is a derivative of heroin
false
ecstasy is a commonly used name for MCMA
false
local patrol officers can provide vary limited information concerning organized crime
false
mescaline and peyote are stimulants
false
perverted justice is an internet based organization that is committed to assisting victims of cyber crime
false
spyware is most commonly used to infiltrate national security systems with the ultimate goal or disarming national defense systems
false
the production of LSD involves ingredients such as strong acids and bases flammable solvents and very explosive and poisonous chemicals
false
the term internet and we are basically interchangeable
false
when removing a computer from a site, the first thing the investigator should do for safety is to turn the machine off and unplug the computer from the wall
false
unlike computer hard drives the electronics memory devices within cell phones can be completely erased leaving no possibility of retrieving deleted items
flase
the biggest difference between traditional evidence and computer evidence is the latter's
fragility
a flach mob is and example of
gang behavior that is typical because it involves a large portion of the gang at the same time swarming illegal gang activity
which of the following is not an important type of record to keep in dealing with any gang problem
gang member drug preference file
crack
has 10 times more impact than cocaine
which of the following is not a common purpose of graffiti as used by gangs
informing the general public that they exist
IC3 stands for
internet crime complaint center
Theft of intellectual property
involves the pirating of proprietary information and copyrighted material
a virus attack may replace or destroy data on the computers hard drive and...
leave a back door open for later entry
a secretly attached program that monitors a computer system and waits for an error to occur so that the weakness may be exploited is called a
logic bomb
Port scanning is..
looking for access into a computer
which of the following is a character of a street gang as opposed to a drug gang
loose leaders
the RICO act of 1970 is one of the major federal acts that
make it easier for prosecutors to charge and convict those apprehended in the sale of illegal drugs
in a drug investigation officers can avoid charges of entrapment
making two or more buys
drugs found on a person during a legally conducted search
may be seized
OMGs have become a major distributor of ___________ in the US
methamphetamine
which of the following would not be one of the signs of a ritualistic homicide
missing clothing
organized crime is not involve in which of the following victim less crimes
none of the above
most computer crimes are
not reported
with reference to drug OTC stands for
over the counter
the three pronged approach to address the gang problem uses a balance of which three strategies
penetration suppression and prevention
what type of material should not be used when packaging electronic evidence
plastic materials
using restrictive restraining devices and procedures such as handcuffing subjects behind their back and placing them face down can lead to
positional asphyxiation
Electronic evidence and other computer crime evidence may take the form of
printers and scanners, VCRs adn GPS devices, telephones dn fax machines
Surveillance is use in narcotics investigations to
protect the money put up to make the buy provide credibility for the buy provide information to establish probable cause for an arrest
the majority of hate crimes are based on
race
intentionally destroying computer information programs or hardware a logic bomb is classified ad
sabotage
what are the two most common defenses cited for gang members in court
self defense and being under the influence of alcohol /drugs
which group may be associated with mutilated animals grave robbery and desecration of churches and human remains
stoner gangs
the primary emphasis of the Federal Drug Enforcement Administration is
stop the flow of drugs
which of the following is not a destructive characteristic of organized crime
strong ideological foundation
computer disks should be stored away from
strong light, magnetic fields, dust
what act did the federal government pass in 1914 that dame the sale of certain drugs illegal
the Harrison Narcotics Act
the major legal evidence in prosecution drug sale cases is
the actual transfer of the drug from the seller to the buyer
which of the following may be an important indicator of satanism or cult activity
the book of shadows booby traps painted rocks
examples of physical evidence of possession or use of controlled substances include
the drugs and the apparatus associate with their abuse the suspects appearance and behavior blood and urine tests
investigators dealing with yours they suspect may be engaging in cult related activity should inquire into which of the following?
the music the listened to whether the youths dabbled in astrology whether the youths played with Ouija bords or tarot cards
if an officer observes what appears to be a drug buy
the officer can make warrantless arrest if there is probable cause
cyber crime is
transnational problem
LSD is derived from lysegic acid from a fungus that grows on type and other grains
true
a pupiloeter allows police to check if someone is under the influence of alcohol or drugs by measuring the pupils in their eyes as subject to light
true
a sting is a reverse buy
true
a victimless crime is an illegal activity in which all involved are willing participants
true
autonomous robotics can enhance officers safety in investigation a suspected meth lab and can be important force multiplier
true
because of their experience with drugs drug users are not likely to sell drugs themselves
true
cyber terrorism is a premeditated politically motivated attack against information computer system computer programs and data that results in violence against noncombatant targets
true
head shops sell products that help the end user ingest drugs
true
methamphetamine is a synthetic stimulant that looks like cocaine but is made from toxic chemicals and easily obtained over the counter products
true
most computer crimes are not prosecuted
true
the most gangerous drugs are Schedule 1 drugs
true
the vast majority of hard narcotics users once used marijuana
true
virus attacks rank as the most common crime against t the computer
true
water lines or electrical cords running to a basement or outbuilding are a possible indication of indoor marijuana growing
true
worms are more powerful and destructive than viruses
true
electronic evidence is fragile
ture
a special problem in investigating illegal activities of gangs is the multitude of suspects and the
unreliability or fear of winesses
Which of the fallowing is not one of the three general categories of cyber criminals
vandals
which of the following is not a sign that youth may be in a gang
wears baggy jeans with underwear showing