Deck 6: Terrorism and Organized Crime

Full screen (f)
exit full mode
Question
An early evaluation of criminal gangs in New York determined that groups coming together for the sole purpose of committing criminal activity didn't last long if they lacked what?

A) flexible rules and regulations
B) competition
C) money
D) ethnic solidarity
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following federal agencies and offices holds the database of information on potential terrorists and people suspected of narcotics trafficking or other law enforcement violations?

A) Department of State-Consular Lookout and Support System
B) Department of State-TIPOFF Database
C) Federal Bureau of Investigation-Violent Gang and Terrorist Organization File
D) Immigration and Customs Enforcement-Border Inspection System
Question
Which of the following cyberterrorist attacks was employed in Operation Desert Storm?

A) physical attack
B) computer network attack
C) electronic attack
D) electromagnetic attack
Question
Which of the following factors plays a role in the solidification of norms and expectations of the members of an organized crime group?

A) culture and tradition
B) earlier affiliations
C) economy or financial status
D) educational background
Question
Which social network has become a popular site for online communities of al Qaeda sympathizers?

A) Facebook
B) MySpace
C) Tumbler
D) Orkut
Question
Which of the following groups serve as the basis of the formation of organized crime groups?

A) religious fanatics
B) criminal gangs
C) social activists
D) national terrorists
Question
Which of the following was NOT a factor that made Estonia particularly vulnerable to a cyberattack in 2007?

A) Most of the nation's banking transactions and parliamentary elections are affected through the Internet.
B) Main media outlets could be shut down, effectively isolating residents and preventing them from appealing to a global audience.
C) The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet.
D) The country has an extensive network of free Wi-Fi.
Question
Which of the following is an example of monopolization by an organized crime group?

A) the trade and commerce in Madrid
B) the garbage industry in New York
C) the mass media industry in Beijing
D) the food businesses in Rome
Question
What type of terrorism is exemplified by the Irish Republican Army and Euzkadi Ta Askatasuna?

A) religious terrorism
B) political-social terrorism
C) environmental terrorism
D) nationalist terrorism
Question
Who among the following define(s) terrorism as an attempt to communicate messages through the use of orchestrated violence?

A) Schmid and Jongman
B) UN Resolution Language
C) Tsfati and Weimann
D) League of Nations Convention
Question
Which of the following refers to the illegal duplication of credit cards achieved by running the card through a reader that captures information stored in the magnetic strip on the back?

A) skimming
B) hacking
C) spamming
D) carding
Question
Which of the following attacks involve directing conventional weapons against a computer facility for its transmission lines?

A) electronic attacks
B) electromagnetic attacks
C) physical attacks
D) computer network attacks
Question
What did a Western intelligence service seize from Kamel Daoudi, an al Qaeda computer engineer, during his arrest?

A) a codebook to decrypt e-mails and telephone conversations
B) a pile of hard copies of Google maps used by al Qaeda
C) a codebook for making bombs and bulletproof vests sent as ebooks
D) a list of the names foreign officials targeted by al Qaeda
Question
In which of the following points does a strong dissimilarity between terrorism and organized crime manifest?

A) rules and regulation
B) beliefs and motivation
C) adaptability and resilience
D) punishments for noncompliance
Question
Which of the following has been described as a "military-grade cybermissile"?

A) Estonia
B) Orkut
C) Skype
D) Stuxnet
Question
Which of the following facilitated Muhammad Siddique Khan's coordination of the 2005 London bombings?

A) online training videos
B) electronic dead drops
C) satellite imaging
D) online social networking sites
Question
Which of the following types of terrorists often openly embrace and promote human suffering, and glorify violence as divine ordination?

A) political terrorists
B) environmental terrorists
C) national terrorists
D) religious terrorists
Question
What was the basis of the wide acceptance of tyrannicide during the Age of Absolutism?

A) the writings of Juan de Mariana
B) the ideology of conservation of natural resources
C) the staging of anti-royalty plays in public theaters
D) the assassination of Julius Caesar
Question
Which of the following types of justification is employed by terrorists who superficially proclaim an abhorrence of violence and stress the urgency for a diplomatic settlement?

A) "no choice" justifications
B) peaceful, nonviolent rhetoric
C) demonizing and delegitimization justifications
D) emphasis of weakness
Question
What is the nature of the criminal activity undertaken by groups such as Darkprofits and Shadowcrew?

A) selling or sharing information about stolen credit cards and bank account numbers
B) smuggling of humans across international borders
C) printing counterfeit denominations of American currency
D) distribution of pornographic films
Question
Theorists argue that terrorism may be characterized as theater in which the audience is far more important than the actors.
Question
________ is defined as the introduction of illegally obtained funds into the legitimate financial marketplace.

A) Extortion
B) Currency counterfeiting
C) Fencing
D) Money laundering
Question
Directing conventional weapons against a computer facility is an example of a physical attack.
Question
According to Tsfati and Weimann, a resurgence in terrorist rhetoric in Europe has led to a marked increase in both the development of European-based terrorist groups and their presence on the Web.
Question
Which of the following cybercrimes, traditionally involving real estate transactions and straw purchases, now uses contemporary methods like electronic layering, international commodities, and online businesses?

A) fraud
B) money laundering
C) gambling
D) counterfeiting of currency
Question
Which of the following refers to scams designed to delude a victim into thinking that he or she had been singled out to be the beneficiary of millions of dollars being given away by a company or government agency?

A) skimming
B) pump and dump
C) carding
D) 4-1-9
Question
Which of the following, according to a recent report to Congress, has now surpassed international drug trafficking as a terrorist financing enterprise?

A) cargo heists
B) cybercrime
C) weapons manufacturing
D) pornography
Question
The Taliban forbids the use of modern innovations.
Question
A critical data threat involves the compromise of a critical computer system to alter, manipulate, or destroy critical data with the potential of death, destruction, and/or economic turmoil.
Question
The U.S.Border Patrol and the U.S.Customs Service are now under the large umbrella of the Department of State.
Question
Traditional methods of ATM/credit card fraud were largely successful due to the lack of computerized databases and lax security measures.
Question
The word "terror" comes from the Arabic term hashashin, which means "to arouse fear."
Question
The Nigerian Advance Fee Scheme is known internationally as "4-1-9."
Question
The UN Universal Declaration of Human Rights is a document which attempts to ensure equality for all and eradicate terrorist groups.
Question
The success of a terrorist's agenda largely depends upon the size of the audience selected.
Question
All organized crime groups began as criminal gangs.
Question
All of the following are similarities among terrorism and organized crime EXCEPT which?

A) Both have rules and regulations.
B) Both require absolute obedience.
C) Both have formal goals and objectives.
D) Both are politically motivated and economically driven.
Question
One drawback to the use of dead drops is that communications are not anonymous.
Question
Organized crime groups want to remain unrecognized and have no impact within their communities.
Question
Traditional methods of human smuggling involve unsecured border crossings via the use of private transportation.
Question
Explain the difference between the traditional and contemporary methods used by organized crime groups.
Question
Groups of individuals brought together through the Internet which commit nonviolent criminal acts facilitated by the exploitation of networked or interconnected systems are known as ________.
Question
The ________ Act requires all information gathered during a criminal investigation, related to foreign or counterintelligence, be shared with other federal agencies.
Question
________ attacks are those that involve malware, computer or network intrusion, or other cyberattacks on critical computer systems.
Question
The introduction of ________ has vastly expanded the potentiality of organized crime groups and enhanced their methods of operation.
Question
The Chicago Crime Commission's early definition of organized crime in the United States referred to it as ________ crime.
Question
Expound on the points where terrorism and organized crime meet and divert.
Question
The ________ of terror is less important than the emotional or psychological repercussions resulting from the act.
Question
Discuss the justifications used by terrorists to maximize ideological appeal.
Question
________ terrorism is often overlooked in discussions of the phenomenon, as there is a collective perception that they have limited impact and do not constitute a significant threat.
Question
The site of initial infection of ________ was identified as a USB port in Iran.
Question
Organized crime groups enhance their profitability through monopolization, which is possible through their use of violence and ________ racketeering.
Question
Terrorist groups are ideologically or politically motivated while organized crime groups are ________ driven.
Question
To profit from their various criminal schemes, organized crime groups transform commodities into cash, an activity known as ________.
Question
________ is a new type of fraud that uses account numbers and counterfeit identity documents to complete identity theft and defraud banks and retailers.
Question
The ________, formally known as the Senate Permanent Subcommittee on Investigations, helped to prove the existence of the Italian mafia as the international conspiracy trafficking narcotics in the United States.
Question
The practice of ________ to organizational leaders or elders furthers the interests of the organization in the form of political bribery or the support of criminal defense.
Question
A ________ is initiated through an unsolicited electronic communication in which the perpetrators claim to be members of the Nigerian government's unit designed to make restitution to victims of Nigerian scams.
Question
Based on the information presented in the chapter, evaluate the potential future of organized crime in the United States.
Question
Explain the different definitions of terrorism given and analyze which one is most accurate and applicable in today's situation.
Question
Match between columns
environmental tenrorism
an ideology based on the conservation of natural resources
environmental tenrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
environmental tenrorism
claimsto be empowered by some god and justified by some scripture
environmental tenrorism
characterized by groups which share a collective perception of oppression or persecution
environmental tenrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
state-sponsored terrorism
an ideology based on the conservation of natural resources
state-sponsored terrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
state-sponsored terrorism
claimsto be empowered by some god and justified by some scripture
state-sponsored terrorism
characterized by groups which share a collective perception of oppression or persecution
state-sponsored terrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
nationalist terrorism
an ideology based on the conservation of natural resources
nationalist terrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
nationalist terrorism
claimsto be empowered by some god and justified by some scripture
nationalist terrorism
characterized by groups which share a collective perception of oppression or persecution
nationalist terrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
political-social terrorism
an ideology based on the conservation of natural resources
political-social terrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
political-social terrorism
claimsto be empowered by some god and justified by some scripture
political-social terrorism
characterized by groups which share a collective perception of oppression or persecution
political-social terrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
religious teruorism
an ideology based on the conservation of natural resources
religious teruorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
religious teruorism
claimsto be empowered by some god and justified by some scripture
religious teruorism
characterized by groups which share a collective perception of oppression or persecution
religious teruorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
Question
Match between columns
money laundering
skimmers
money laundering
online auction
money laundering
Internet sports wagering
money laundering
electronic layering
money laundering
site defacement
extortion
skimmers
extortion
online auction
extortion
Internet sports wagering
extortion
electronic layering
extortion
site defacement
credit card fraud
skimmers
credit card fraud
online auction
credit card fraud
Internet sports wagering
credit card fraud
electronic layering
credit card fraud
site defacement
fraud
skimmers
fraud
online auction
fraud
Internet sports wagering
fraud
electronic layering
fraud
site defacement
gambling
skimmers
gambling
online auction
gambling
Internet sports wagering
gambling
electronic layering
gambling
site defacement
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Terrorism and Organized Crime
1
An early evaluation of criminal gangs in New York determined that groups coming together for the sole purpose of committing criminal activity didn't last long if they lacked what?

A) flexible rules and regulations
B) competition
C) money
D) ethnic solidarity
D
2
Which of the following federal agencies and offices holds the database of information on potential terrorists and people suspected of narcotics trafficking or other law enforcement violations?

A) Department of State-Consular Lookout and Support System
B) Department of State-TIPOFF Database
C) Federal Bureau of Investigation-Violent Gang and Terrorist Organization File
D) Immigration and Customs Enforcement-Border Inspection System
D
3
Which of the following cyberterrorist attacks was employed in Operation Desert Storm?

A) physical attack
B) computer network attack
C) electronic attack
D) electromagnetic attack
A
4
Which of the following factors plays a role in the solidification of norms and expectations of the members of an organized crime group?

A) culture and tradition
B) earlier affiliations
C) economy or financial status
D) educational background
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which social network has become a popular site for online communities of al Qaeda sympathizers?

A) Facebook
B) MySpace
C) Tumbler
D) Orkut
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following groups serve as the basis of the formation of organized crime groups?

A) religious fanatics
B) criminal gangs
C) social activists
D) national terrorists
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following was NOT a factor that made Estonia particularly vulnerable to a cyberattack in 2007?

A) Most of the nation's banking transactions and parliamentary elections are affected through the Internet.
B) Main media outlets could be shut down, effectively isolating residents and preventing them from appealing to a global audience.
C) The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet.
D) The country has an extensive network of free Wi-Fi.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is an example of monopolization by an organized crime group?

A) the trade and commerce in Madrid
B) the garbage industry in New York
C) the mass media industry in Beijing
D) the food businesses in Rome
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
What type of terrorism is exemplified by the Irish Republican Army and Euzkadi Ta Askatasuna?

A) religious terrorism
B) political-social terrorism
C) environmental terrorism
D) nationalist terrorism
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Who among the following define(s) terrorism as an attempt to communicate messages through the use of orchestrated violence?

A) Schmid and Jongman
B) UN Resolution Language
C) Tsfati and Weimann
D) League of Nations Convention
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following refers to the illegal duplication of credit cards achieved by running the card through a reader that captures information stored in the magnetic strip on the back?

A) skimming
B) hacking
C) spamming
D) carding
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following attacks involve directing conventional weapons against a computer facility for its transmission lines?

A) electronic attacks
B) electromagnetic attacks
C) physical attacks
D) computer network attacks
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
What did a Western intelligence service seize from Kamel Daoudi, an al Qaeda computer engineer, during his arrest?

A) a codebook to decrypt e-mails and telephone conversations
B) a pile of hard copies of Google maps used by al Qaeda
C) a codebook for making bombs and bulletproof vests sent as ebooks
D) a list of the names foreign officials targeted by al Qaeda
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
In which of the following points does a strong dissimilarity between terrorism and organized crime manifest?

A) rules and regulation
B) beliefs and motivation
C) adaptability and resilience
D) punishments for noncompliance
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following has been described as a "military-grade cybermissile"?

A) Estonia
B) Orkut
C) Skype
D) Stuxnet
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following facilitated Muhammad Siddique Khan's coordination of the 2005 London bombings?

A) online training videos
B) electronic dead drops
C) satellite imaging
D) online social networking sites
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following types of terrorists often openly embrace and promote human suffering, and glorify violence as divine ordination?

A) political terrorists
B) environmental terrorists
C) national terrorists
D) religious terrorists
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
What was the basis of the wide acceptance of tyrannicide during the Age of Absolutism?

A) the writings of Juan de Mariana
B) the ideology of conservation of natural resources
C) the staging of anti-royalty plays in public theaters
D) the assassination of Julius Caesar
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following types of justification is employed by terrorists who superficially proclaim an abhorrence of violence and stress the urgency for a diplomatic settlement?

A) "no choice" justifications
B) peaceful, nonviolent rhetoric
C) demonizing and delegitimization justifications
D) emphasis of weakness
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
What is the nature of the criminal activity undertaken by groups such as Darkprofits and Shadowcrew?

A) selling or sharing information about stolen credit cards and bank account numbers
B) smuggling of humans across international borders
C) printing counterfeit denominations of American currency
D) distribution of pornographic films
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
Theorists argue that terrorism may be characterized as theater in which the audience is far more important than the actors.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
________ is defined as the introduction of illegally obtained funds into the legitimate financial marketplace.

A) Extortion
B) Currency counterfeiting
C) Fencing
D) Money laundering
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Directing conventional weapons against a computer facility is an example of a physical attack.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
According to Tsfati and Weimann, a resurgence in terrorist rhetoric in Europe has led to a marked increase in both the development of European-based terrorist groups and their presence on the Web.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following cybercrimes, traditionally involving real estate transactions and straw purchases, now uses contemporary methods like electronic layering, international commodities, and online businesses?

A) fraud
B) money laundering
C) gambling
D) counterfeiting of currency
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following refers to scams designed to delude a victim into thinking that he or she had been singled out to be the beneficiary of millions of dollars being given away by a company or government agency?

A) skimming
B) pump and dump
C) carding
D) 4-1-9
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following, according to a recent report to Congress, has now surpassed international drug trafficking as a terrorist financing enterprise?

A) cargo heists
B) cybercrime
C) weapons manufacturing
D) pornography
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
The Taliban forbids the use of modern innovations.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
A critical data threat involves the compromise of a critical computer system to alter, manipulate, or destroy critical data with the potential of death, destruction, and/or economic turmoil.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
The U.S.Border Patrol and the U.S.Customs Service are now under the large umbrella of the Department of State.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Traditional methods of ATM/credit card fraud were largely successful due to the lack of computerized databases and lax security measures.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
The word "terror" comes from the Arabic term hashashin, which means "to arouse fear."
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
The Nigerian Advance Fee Scheme is known internationally as "4-1-9."
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
The UN Universal Declaration of Human Rights is a document which attempts to ensure equality for all and eradicate terrorist groups.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
The success of a terrorist's agenda largely depends upon the size of the audience selected.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
All organized crime groups began as criminal gangs.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
All of the following are similarities among terrorism and organized crime EXCEPT which?

A) Both have rules and regulations.
B) Both require absolute obedience.
C) Both have formal goals and objectives.
D) Both are politically motivated and economically driven.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
One drawback to the use of dead drops is that communications are not anonymous.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Organized crime groups want to remain unrecognized and have no impact within their communities.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Traditional methods of human smuggling involve unsecured border crossings via the use of private transportation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
Explain the difference between the traditional and contemporary methods used by organized crime groups.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
Groups of individuals brought together through the Internet which commit nonviolent criminal acts facilitated by the exploitation of networked or interconnected systems are known as ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
The ________ Act requires all information gathered during a criminal investigation, related to foreign or counterintelligence, be shared with other federal agencies.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
________ attacks are those that involve malware, computer or network intrusion, or other cyberattacks on critical computer systems.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
The introduction of ________ has vastly expanded the potentiality of organized crime groups and enhanced their methods of operation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
The Chicago Crime Commission's early definition of organized crime in the United States referred to it as ________ crime.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
Expound on the points where terrorism and organized crime meet and divert.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
The ________ of terror is less important than the emotional or psychological repercussions resulting from the act.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the justifications used by terrorists to maximize ideological appeal.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
________ terrorism is often overlooked in discussions of the phenomenon, as there is a collective perception that they have limited impact and do not constitute a significant threat.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
The site of initial infection of ________ was identified as a USB port in Iran.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
Organized crime groups enhance their profitability through monopolization, which is possible through their use of violence and ________ racketeering.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
Terrorist groups are ideologically or politically motivated while organized crime groups are ________ driven.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
To profit from their various criminal schemes, organized crime groups transform commodities into cash, an activity known as ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
________ is a new type of fraud that uses account numbers and counterfeit identity documents to complete identity theft and defraud banks and retailers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
The ________, formally known as the Senate Permanent Subcommittee on Investigations, helped to prove the existence of the Italian mafia as the international conspiracy trafficking narcotics in the United States.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
The practice of ________ to organizational leaders or elders furthers the interests of the organization in the form of political bribery or the support of criminal defense.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
A ________ is initiated through an unsolicited electronic communication in which the perpetrators claim to be members of the Nigerian government's unit designed to make restitution to victims of Nigerian scams.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Based on the information presented in the chapter, evaluate the potential future of organized crime in the United States.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Explain the different definitions of terrorism given and analyze which one is most accurate and applicable in today's situation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
environmental tenrorism
an ideology based on the conservation of natural resources
environmental tenrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
environmental tenrorism
claimsto be empowered by some god and justified by some scripture
environmental tenrorism
characterized by groups which share a collective perception of oppression or persecution
environmental tenrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
state-sponsored terrorism
an ideology based on the conservation of natural resources
state-sponsored terrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
state-sponsored terrorism
claimsto be empowered by some god and justified by some scripture
state-sponsored terrorism
characterized by groups which share a collective perception of oppression or persecution
state-sponsored terrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
nationalist terrorism
an ideology based on the conservation of natural resources
nationalist terrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
nationalist terrorism
claimsto be empowered by some god and justified by some scripture
nationalist terrorism
characterized by groups which share a collective perception of oppression or persecution
nationalist terrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
political-social terrorism
an ideology based on the conservation of natural resources
political-social terrorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
political-social terrorism
claimsto be empowered by some god and justified by some scripture
political-social terrorism
characterized by groups which share a collective perception of oppression or persecution
political-social terrorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
religious teruorism
an ideology based on the conservation of natural resources
religious teruorism
those governments that engage in acts of terror against their own or support and carry out terrorist acts against other governments
religious teruorism
claimsto be empowered by some god and justified by some scripture
religious teruorism
characterized by groups which share a collective perception of oppression or persecution
religious teruorism
perpetrated by groups which are attempting to accomplish an articulable political agenda
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
money laundering
skimmers
money laundering
online auction
money laundering
Internet sports wagering
money laundering
electronic layering
money laundering
site defacement
extortion
skimmers
extortion
online auction
extortion
Internet sports wagering
extortion
electronic layering
extortion
site defacement
credit card fraud
skimmers
credit card fraud
online auction
credit card fraud
Internet sports wagering
credit card fraud
electronic layering
credit card fraud
site defacement
fraud
skimmers
fraud
online auction
fraud
Internet sports wagering
fraud
electronic layering
fraud
site defacement
gambling
skimmers
gambling
online auction
gambling
Internet sports wagering
gambling
electronic layering
gambling
site defacement
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 62 flashcards in this deck.