Deck 7: Avenues for Prosecution and Government Efforts
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
Play
Full screen (f)
Deck 7: Avenues for Prosecution and Government Efforts
1
Which of the following statements about Carnivore, a sniffing program, is true?
A) It was widely and frequently used by FBI.
B) The rationale for the FBI's use of the program did not need to be disclosed to any court.
C) The interception had to continue after achieving the objective.
D) Probable cause and details of the offense were to be specified before use.
A) It was widely and frequently used by FBI.
B) The rationale for the FBI's use of the program did not need to be disclosed to any court.
C) The interception had to continue after achieving the objective.
D) Probable cause and details of the offense were to be specified before use.
D
2
The Terrorist Surveillance Program requires review and reauthorization of a surveillance every ________ days.
A) 60
B) 30
C) 90
D) 45
A) 60
B) 30
C) 90
D) 45
D
3
Which of the following is a provision of the federal Child Pornography Protection Act of 1996 that the Supreme Court ruled unconstitutional?
A) The definition of child pornography includes wholly artificial images, entirely created through virtual, as opposed to actual, children.
B) Mandatory life sentences shall be imposed on offenders involved in a sex offense against a minor if such offender has had a prior conviction of abuse against a minor.
C) States may not enact blanket prohibitions against visualizations of children engaged in sexual situations.
D) The federal government is empowered to establish a phony child porn Web site in order to entrap pedophiles.
A) The definition of child pornography includes wholly artificial images, entirely created through virtual, as opposed to actual, children.
B) Mandatory life sentences shall be imposed on offenders involved in a sex offense against a minor if such offender has had a prior conviction of abuse against a minor.
C) States may not enact blanket prohibitions against visualizations of children engaged in sexual situations.
D) The federal government is empowered to establish a phony child porn Web site in order to entrap pedophiles.
A
4
If you notify a debt collector that a debt is unknown to you, which of the following measures is required by the Fair and Accurate Credit Transactions Act of 2003?
A) You must be provided with information regarding your rights and dispute handling.
B) The creditor can sell the debt to a third party.
C) You must inform any third-party employers about the debt.
D) The creditor can place the debt in collection.
A) You must be provided with information regarding your rights and dispute handling.
B) The creditor can sell the debt to a third party.
C) You must inform any third-party employers about the debt.
D) The creditor can place the debt in collection.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements is true about the International Association for Computer Investigation Specialists?
A) It is a for-profit professional organization.
B) The certification process requires expensive and mandatory training.
C) The certification test does not require any payment of fees.
D) Individuals are certified as "computer forensic experts."
A) It is a for-profit professional organization.
B) The certification process requires expensive and mandatory training.
C) The certification test does not require any payment of fees.
D) Individuals are certified as "computer forensic experts."
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
The three-tiered approach of the President's Working Group on Unlawful Conduct on the Internet includes all of the following EXCEPT ________.
A) recognition of special needs for investigation of technological crime
B) implementation of enhanced security measures on commercial airlines
C) development of specialized curricula and support for leadership
D) regulation of Internet criminal activity in the spirit of traditional criminal law
A) recognition of special needs for investigation of technological crime
B) implementation of enhanced security measures on commercial airlines
C) development of specialized curricula and support for leadership
D) regulation of Internet criminal activity in the spirit of traditional criminal law
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
What makes New York's identity theft statute unique among the fifty states?
A) It prohibits the use of social security numbers as student identification numbers.
B) It provides for the recovery of indirect costs of victimization including lost wages and credit rehabilitation.
C) It allows individuals to challenge charges if personal identification information was used to illegally purchase alcohol or tobacco.
D) It bars hospitals and health care organizations from selling patient data to foreign-based entities.
A) It prohibits the use of social security numbers as student identification numbers.
B) It provides for the recovery of indirect costs of victimization including lost wages and credit rehabilitation.
C) It allows individuals to challenge charges if personal identification information was used to illegally purchase alcohol or tobacco.
D) It bars hospitals and health care organizations from selling patient data to foreign-based entities.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
The Identity Theft and Assumption Deterrence Act of 1998 authorizes imprisonment of up to ________ years for identity thefts.
A) 20
B) 10
C) 5
D) 25
A) 20
B) 10
C) 5
D) 25
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
The President's Working Group on Unlawful Conduct on the Internet encouraged local agencies to establish a presence on the Net in order to ________.
A) reduce the number of misleading anonymous tips
B) establish a link between the community and the Justice Department
C) buy and maintain user records discarded by ISPs
D) increase anonymity and thus draw criminals to the Net
A) reduce the number of misleading anonymous tips
B) establish a link between the community and the Justice Department
C) buy and maintain user records discarded by ISPs
D) increase anonymity and thus draw criminals to the Net
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
________ is the analysis parameter of data mining which involves finding and visually documenting groups of previously unknown facts.
A) Classification
B) Association
C) Clustering
D) Forecasting
A) Classification
B) Association
C) Clustering
D) Forecasting
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
The NSA's Terrorist Surveillance Program includes ________.
A) in-terminal screening of air travelers
B) license review of commercial airlines
C) collection of telephone call information
D) development of international treaties
A) in-terminal screening of air travelers
B) license review of commercial airlines
C) collection of telephone call information
D) development of international treaties
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT a module of the Automated Targeting System?
A) ATS-Passenger
B) ATS-Nonimmigrant
C) ATS-International
D) ATS-Inbound
A) ATS-Passenger
B) ATS-Nonimmigrant
C) ATS-International
D) ATS-Inbound
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
The Computer Fraud and Abuse Act provides for the punishment of individuals ________.
A) only in offenses committed via computer technology
B) only in offenses that caused damage to computer technology
C) only in offenses involving computer data as the target
D) in all offenses committed in conjunction with or via computer technology
A) only in offenses committed via computer technology
B) only in offenses that caused damage to computer technology
C) only in offenses involving computer data as the target
D) in all offenses committed in conjunction with or via computer technology
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
The airline passenger prescreening program Secure Flight modified CAPPS II by ________.
A) putting greater emphasis on passenger privacy
B) excluding a passenger redress process
C) collecting more personal consumer information
D) outsourcing passenger security checks to foreign companies
A) putting greater emphasis on passenger privacy
B) excluding a passenger redress process
C) collecting more personal consumer information
D) outsourcing passenger security checks to foreign companies
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
The increased use of data mining can be attributed to the ________.
A) decentralization of data
B) absence of advanced algorithms
C) increased availability of data
D) increased storage costs
A) decentralization of data
B) absence of advanced algorithms
C) increased availability of data
D) increased storage costs
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is true about the initiative "Innocent Images"?
A) It investigated cases of interstate travelers for illicit purposes.
B) Its purpose was to provide child pornographers with legal, innocent images as a substitute for pornographic ones.
C) It investigated more than 5,000 cases in a three-year period.
D) It investigated offenses under the Computer Fraud and Abuse Act.
A) It investigated cases of interstate travelers for illicit purposes.
B) Its purpose was to provide child pornographers with legal, innocent images as a substitute for pornographic ones.
C) It investigated more than 5,000 cases in a three-year period.
D) It investigated offenses under the Computer Fraud and Abuse Act.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
The President's Working Group on Unlawful Conduct on the Internet was created to evaluate the ________.
A) prohibition of disclosure of confidential information
B) efficiency of data mining
C) reliability of packet sniffing
D) utility of education and empowerment tools
A) prohibition of disclosure of confidential information
B) efficiency of data mining
C) reliability of packet sniffing
D) utility of education and empowerment tools
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following was recommended by the President's Working Group on Unlawful Conduct on the Internet?
A) Allow ISPs to discard records after 24 hours.
B) Restrict the training of average users, to prevent them from engaging in unlawful activity.
C) Make exclusive use of traditional statutes rather than passing amendments or new legislation.
D) Encourage local agencies to establish a presence on the Net.
A) Allow ISPs to discard records after 24 hours.
B) Restrict the training of average users, to prevent them from engaging in unlawful activity.
C) Make exclusive use of traditional statutes rather than passing amendments or new legislation.
D) Encourage local agencies to establish a presence on the Net.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
What technological development led the FBI in the early 2000s to include a keylogging program in the Cyber Knight project?
A) Advances in data mining allowed terrorist groups to achieve total information awareness relating to Department of Homeland Security projects.
B) Advances in encryption programs made it impossible for officials to descramble files containing criminal evidence.
C) Advances in computer-assisted passenger prescreening systems required increased surveillance of the general public.
D) Advances in cell phone keyboard technology increased the ratio of text-based to voice-based telecommunications.
A) Advances in data mining allowed terrorist groups to achieve total information awareness relating to Department of Homeland Security projects.
B) Advances in encryption programs made it impossible for officials to descramble files containing criminal evidence.
C) Advances in computer-assisted passenger prescreening systems required increased surveillance of the general public.
D) Advances in cell phone keyboard technology increased the ratio of text-based to voice-based telecommunications.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
All of the following are provisions of the Identity Theft Enforcement and Restitution Act EXCEPT ________.
A) recovery of direct funds stolen from victims
B) granting of federal jurisdiction in cases involving same state victimization
C) narrowing the scope of activities to prosecute identity theft
D) recovery of indirect costs of victimization
A) recovery of direct funds stolen from victims
B) granting of federal jurisdiction in cases involving same state victimization
C) narrowing the scope of activities to prosecute identity theft
D) recovery of indirect costs of victimization
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
The Financial Action Task Force revised its recommendations in 2001 to specifically address issues of ________.
A) terrorist financing
B) data transmission
C) copyright infringement
D) child pornography
A) terrorist financing
B) data transmission
C) copyright infringement
D) child pornography
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
Title IV of the Cybercrime Convention relates to the distribution of criminal contraband.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
The regional chapters of the High Tech Computer Investigators Association (HTCIA) are bound by the same rules and covenants, but vary in expertise, personnel, and training.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
The President's Working Group on Unlawful Conduct on the Internet suggested developing mechanisms for tracing online offenders.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following represents the effort of the United Kingdom against cybercriminality?
A) It allows the government to monitor and intercept Internet communications.
B) It promotes private citizens' unrestricted access to encryption programs.
C) It encourages anonymous Internet use and expands traditional notions of privacy.
D) It restricts government agencies' access to encryption keys.
A) It allows the government to monitor and intercept Internet communications.
B) It promotes private citizens' unrestricted access to encryption programs.
C) It encourages anonymous Internet use and expands traditional notions of privacy.
D) It restricts government agencies' access to encryption keys.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
The Identity Theft and Assumption Deterrence Act was enacted to protect consumers' personal financial information held by financial institutions.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
The Drivers Privacy Protection Act permits the disclosure of social security numbers in legal or arbitral proceedings.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
The Regulation of Investigatory Powers Act seriously eroded traditional notions of privacy in the United Kingdom.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
The Computer Emergency Response Team plays the role of an informational clearinghouse for public and private computer networks.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
LawNet is designed to articulate jurisdictional boundaries and procedures for multijurisdictional cases of anti-cybercrime efforts.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
The President's Working Group on Unlawful Conduct on the Internet suggested different kinds of treatment for technological crimes and nontechnological crimes.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
The United Nations Convention against Transnational Organized Crime established categories that focus on illicit manufacturing of firearms.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
The Terrorism Information Awareness Program's effort at achieving total information awareness was a resounding success.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
Using the keystroke logging software Magic Lantern requires an agent to physically enter a premises and install it on a computer.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
The High Terrorist Factor (HTF) mathematical formula was used by the Multi-State Anti-Terrorism Information Exchange Pilot Project (MATRIX) in developing a list of suspicious individuals.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Two top priorities for the international law enforcement agency Interpol are high technology and ________.
A) data manipulation
B) finance
C) language translation
D) data mining
A) data manipulation
B) finance
C) language translation
D) data mining
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
How does the Virtual Global Taskforce attempt to prevent sexual exploitation of children through its Operation Pin initiative?
A) It authorizes electronic eavesdropping on any male aged 18 to 54 who visits the Innocent Images Web site.
B) It implements computer surveillance on anyone who travels more than twice a year to prominent sex-tourism countries such as Thailand.
C) It provides child porn Web sites with advanced computer-assisted technology that transforms real photos of child porn into virtual images.
D) It hosts a phony child porn Web site and forwards to appropriate authorities the identity of anyone who attempts to download images.
A) It authorizes electronic eavesdropping on any male aged 18 to 54 who visits the Innocent Images Web site.
B) It implements computer surveillance on anyone who travels more than twice a year to prominent sex-tourism countries such as Thailand.
C) It provides child porn Web sites with advanced computer-assisted technology that transforms real photos of child porn into virtual images.
D) It hosts a phony child porn Web site and forwards to appropriate authorities the identity of anyone who attempts to download images.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
The Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today Act allows for the pretrial release of persons charged with offenses against children.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Data mining favors nonsynchronous examination of several multidimensional data relationships.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Online copyright infringement has been categorized in ________ of the Cybercrime Convention by the Council of Europe.
A) Title I
B) Title II
C) Title III
D) Title IV
A) Title I
B) Title II
C) Title III
D) Title IV
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the three-tiered approach of the President's Working Group on Unlawful Conduct on the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
________ is the program of the Virtual Global Taskforce which involves a fake child porn Web site.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
________ is the organization developed by the National Infrastructure Protection Center to discuss potential threats.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
The redress process for misidentified passengers is streamlined by the ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
________ attempts to articulate jurisdictional boundaries and procedures for multijurisdictional cases in online child pornography cases.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
The DragonWare Suite surveillance package contained not only Carnivore but also Coolminer and ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
The concerns of privacy advocates were validated when it was revealed that the NSA had contracted with AT&T, Verizon, and BellSouth to collect information about ________ telephone calls.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
The Identity Theft Penalty Enhancement Act provides for a mandatory ________ prison term for identity theft in addition to penalties.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Summarize the Recommendations issued by the Financial Action Task Force.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
The YELLOW color code in the verification of the Computer-Assisted Passenger Prescreening System indicates ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
Carnivore, the now obsolete sniffing program, was designed to run in the ________ platform.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
Analyze the significance of the National Information Infrastructure Protection Act.Also include the subcategories of the act that prosecute Internet crimes.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
The President's Working Group on Unlawful Conduct on the Internet developed a(n) ________-tiered approach for handling Internet crime.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
The Identity Theft and Assumption Deterrence Act officially designated the ________ as the repository for consumer complaints.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
The Select Committee of Experts on Computer-Related Crime of the Council of Europe has established a working group on _______ to reduce political corruption.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
________ was the communication medium of choice for early computer criminals.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
The Financial Action Task Force encourages national governments to enforce laws on money laundering and ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
The Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today Act allows for imprisonment of U.S.citizens engaging in illicit sexual conduct abroad up to ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Describe the different tools of law enforcement agencies for investigating computer crimes and analyze which one is most applicable for current technological developments.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Explain how the role of the High Tech Computer Investigators Association (HTCIA) is different from that of the International Association for Computer Investigation Specialists (IACIS).
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck