Deck 12: Sex Offenders on the Internet

ملء الشاشة (f)
exit full mode
سؤال
"Grooming" refers to the ways that a sexual offender gains control over victims.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When the offender is unknown, the reconstruction process becomes a necessary step to:

A) Reassure the victim that progress is being made
B) Prioritize suspects
C) Accommodate multiple cases
D) Open new lines of investigation
سؤال
Sex offender peer support groups can give offenders access to child pornography, children, and technical knowledge.
سؤال
The reconstruction process becomes a necessity when:

A) There is more than one victim involved
B) There is more than one sex offender involved
C) The victim is unknown
D) The sex offender is unknown
سؤال
It is important to stress that sexual abuse and illegal pornography did not exist before the
Internet.
سؤال
Generalizations regarding investigations are of particular use, even though cases tend to be unique.
سؤال
The Internet enables sexual offenders to commit a crime without ever physically assaulting a victim.
سؤال
Which of the following is an impact of sex offender peer support groups?

A) Enabling offenders to view their behavior as socially acceptable
B) Raising the sex offender's inhibitions to act on impulses
C) A clearinghouse of state and Federal agencies ready to assist the sex offender
D) Trained counselors available 24 hours a day
سؤال
Of Lanning's three general categories of sex offenders, which of the following is NOT a characteristic of the situational category?

A) Generally more power/anger motivated
B) Are compulsive record keepers
C) Generally pick convenient targets
D) None of the above
سؤال
Detailed knowledge of an offender can help investigators:

A) Protect past victims
B) Warn potential victims
C) Communicate with the offender
D) All of the above
سؤال
An offender's choice of location, tools, and actions taken are referred to as:

A) MO
B) Motivation
C) Crime scene characteristics
D) Signature behaviors
سؤال
Which of the following is a reason the Internet is attractive to sex offenders?

A) Greater access to victims.
B) Extending their reach
C) The vast amount of information about potential victims
D) All of the above
سؤال
One of the risks that private citizens take in luring online predators is that:

A) If the subject of the investigation is child pornography, their efforts may cause them to have possession of child pornography and be arrested along with the offender.
B) Should the neighbors find out, they could possibly be forced to move out of their neighborhood.
C) One of their neighbors could be an online predator.
D) The police consider cyber vigilantes to be a nuisance.
سؤال
Victimology can help determine:

A) Why the victim was selected
B) What victim behavior caused the offense
C) To what extent the victim was at fault
D) The offender's modus operandi
سؤال
Typically, children are not used in undercover investigations because:

A) Children, like child actors, can be difficult to control.
B) Parents are not comfortable with their child participating in an undercover operation.
C) There is concern for their welfare.
D) Typically, there are no funds in the budget for undercover investigations using children.
سؤال
Which of the following are reasons that digital evidence may not be preserved properly or at all?

A) Victims may destroy key evidence because they are embarrassed by it.
B) Corporate security professionals may not be aware of proper evidence handling concepts.
C) Poorly trained police officers may overlook important items.
D) All of the above.
سؤال
If an offender's computer reveals a large number of contacts, a good solution is:

A) To pass the contact information to local departments and have them contact the individuals in person
B) To draft a simple form letter summarizing the investigation and listing the suspects' online nicknames and e-mail addresses, and request assistance
C) To reach out to each contact, using the offender's computer and online personas
D) To determine what schools the contacts attend and have their principals call the students and their parents in for consultation
سؤال
The process of correlating evidence through temporal, relational, and functional analysis is known as:

A) Crime scene analysis
B) Offense behavior analysis
C) Investigative reconstruction
D) Victimology
سؤال
Failure to interpret evidence, obtain information from an unknown offender, or apprehend an unknown offender can be caused by:

A) Excessive caseload
B) Scrutiny of the press
C) Negative public opinion
D) Failure to understand the offender's motivation
سؤال
One way that a digital examiner can reduce the likelihood of overlooking or misinterpreting important details is:

A) To always work in pairs, so each examiner can check the other's work
B) Carefully apply the scientific method
C) Videotape the entire examination process so that key areas can be reviewed
D) Take verbal notes with a digital voice recorder
سؤال
Lanning identifies three general categories of sex offenders: situational, preferential, and differential.
سؤال
An accepted method of conducting undercover investigations involves using a minor, especially if the minor is the victim.
سؤال
When dealing with online sexual offenders, it is critically important to take advantage of the Internet as a source of evidence.
سؤال
Confronting the victim with evidence of their abuse is standard practice in sex offender cases.
سؤال
Providing information about an offender's method of approach, attack, or control may help investigators interact with an offender or provide potential victims with protective advice.
سؤال
Given the potential for concealment in sex offender cases, it is important to examine all digital evidence carefully rather than simply searching for a obvious items such as images that are not hidden.
سؤال
Because sex offenders tend to be nonviolent, investigators do not need to take the same precautions when serving warrants on computer-related offenses as they would with other crimes.
سؤال
Sex offenders do not change over time nor do they modify their behavior, simplifying the investigative process.
سؤال
Discuss the responsibility of the digital investigator in bringing charges of sex offense or possession of child pornography against a member of the local community.
سؤال
The initial stage of any investigation is to determine if a crime has actually occurred.
سؤال
The practice of private citizens luring offenders is not recommended for reasons of safety and inadvertent violation of the law.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/31
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Sex Offenders on the Internet
1
"Grooming" refers to the ways that a sexual offender gains control over victims.
True
2
When the offender is unknown, the reconstruction process becomes a necessary step to:

A) Reassure the victim that progress is being made
B) Prioritize suspects
C) Accommodate multiple cases
D) Open new lines of investigation
B
3
Sex offender peer support groups can give offenders access to child pornography, children, and technical knowledge.
True
4
The reconstruction process becomes a necessity when:

A) There is more than one victim involved
B) There is more than one sex offender involved
C) The victim is unknown
D) The sex offender is unknown
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is important to stress that sexual abuse and illegal pornography did not exist before the
Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
6
Generalizations regarding investigations are of particular use, even though cases tend to be unique.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Internet enables sexual offenders to commit a crime without ever physically assaulting a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is an impact of sex offender peer support groups?

A) Enabling offenders to view their behavior as socially acceptable
B) Raising the sex offender's inhibitions to act on impulses
C) A clearinghouse of state and Federal agencies ready to assist the sex offender
D) Trained counselors available 24 hours a day
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
9
Of Lanning's three general categories of sex offenders, which of the following is NOT a characteristic of the situational category?

A) Generally more power/anger motivated
B) Are compulsive record keepers
C) Generally pick convenient targets
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
10
Detailed knowledge of an offender can help investigators:

A) Protect past victims
B) Warn potential victims
C) Communicate with the offender
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
11
An offender's choice of location, tools, and actions taken are referred to as:

A) MO
B) Motivation
C) Crime scene characteristics
D) Signature behaviors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is a reason the Internet is attractive to sex offenders?

A) Greater access to victims.
B) Extending their reach
C) The vast amount of information about potential victims
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
13
One of the risks that private citizens take in luring online predators is that:

A) If the subject of the investigation is child pornography, their efforts may cause them to have possession of child pornography and be arrested along with the offender.
B) Should the neighbors find out, they could possibly be forced to move out of their neighborhood.
C) One of their neighbors could be an online predator.
D) The police consider cyber vigilantes to be a nuisance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
14
Victimology can help determine:

A) Why the victim was selected
B) What victim behavior caused the offense
C) To what extent the victim was at fault
D) The offender's modus operandi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
15
Typically, children are not used in undercover investigations because:

A) Children, like child actors, can be difficult to control.
B) Parents are not comfortable with their child participating in an undercover operation.
C) There is concern for their welfare.
D) Typically, there are no funds in the budget for undercover investigations using children.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following are reasons that digital evidence may not be preserved properly or at all?

A) Victims may destroy key evidence because they are embarrassed by it.
B) Corporate security professionals may not be aware of proper evidence handling concepts.
C) Poorly trained police officers may overlook important items.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
17
If an offender's computer reveals a large number of contacts, a good solution is:

A) To pass the contact information to local departments and have them contact the individuals in person
B) To draft a simple form letter summarizing the investigation and listing the suspects' online nicknames and e-mail addresses, and request assistance
C) To reach out to each contact, using the offender's computer and online personas
D) To determine what schools the contacts attend and have their principals call the students and their parents in for consultation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
18
The process of correlating evidence through temporal, relational, and functional analysis is known as:

A) Crime scene analysis
B) Offense behavior analysis
C) Investigative reconstruction
D) Victimology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
19
Failure to interpret evidence, obtain information from an unknown offender, or apprehend an unknown offender can be caused by:

A) Excessive caseload
B) Scrutiny of the press
C) Negative public opinion
D) Failure to understand the offender's motivation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
20
One way that a digital examiner can reduce the likelihood of overlooking or misinterpreting important details is:

A) To always work in pairs, so each examiner can check the other's work
B) Carefully apply the scientific method
C) Videotape the entire examination process so that key areas can be reviewed
D) Take verbal notes with a digital voice recorder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
21
Lanning identifies three general categories of sex offenders: situational, preferential, and differential.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
22
An accepted method of conducting undercover investigations involves using a minor, especially if the minor is the victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
23
When dealing with online sexual offenders, it is critically important to take advantage of the Internet as a source of evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
24
Confronting the victim with evidence of their abuse is standard practice in sex offender cases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
25
Providing information about an offender's method of approach, attack, or control may help investigators interact with an offender or provide potential victims with protective advice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
26
Given the potential for concealment in sex offender cases, it is important to examine all digital evidence carefully rather than simply searching for a obvious items such as images that are not hidden.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
27
Because sex offenders tend to be nonviolent, investigators do not need to take the same precautions when serving warrants on computer-related offenses as they would with other crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
28
Sex offenders do not change over time nor do they modify their behavior, simplifying the investigative process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
29
Discuss the responsibility of the digital investigator in bringing charges of sex offense or possession of child pornography against a member of the local community.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
30
The initial stage of any investigation is to determine if a crime has actually occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
31
The practice of private citizens luring offenders is not recommended for reasons of safety and inadvertent violation of the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.