Deck 14: Technology and Criminal Justice
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/148
Play
Full screen (f)
Deck 14: Technology and Criminal Justice
1
The validity and accuracy o f many forensic science meth ods used by police and prosecutors is beyond dispute.
False
2
The FBI fingerprint database includes fingerprints of both criminals and noncriminals, such as people who work for the federal government.
True
3
The government of North Korea was accused of creating fake U.S. currency in order to create instability in the American economy.
True
4
The Federal Bureau of Prisons obtains DNA through blood samples from all incoming offenders.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
5
When it was first introduced, the electric chair was seen as an example of technological progress towards a more humane method of execution.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
6
The FBI's National Computer Crime Squad is tasked with investigating instances of industrial espionage.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
7
Several hundred people in the United States have died from injuries inflicted by tasers.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
8
Illegally downloading music from the Internet is a federal crime in the United States.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
9
Technological advances have resulted in the ability of all police departments to determine the exact location of cell phones that have dialed 911.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
10
Police have been collecting fingerprint information from offenders for nearly 200 years.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
11
The invention of a new device (or development of a new technology) always benefits actors in the criminal justice system.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
12
Lawbreakers can develop and use technology for the purpose of committing crimes.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
13
Cyber theft involves the theft of social security numbers, credit card numbers, and other information
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
14
In Kyllo v. United States (2001), the Supreme Court asserted that law enforcement officials cannot examine a home with a thermal-imaging device unless they obtain a warrant.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
15
The FBI's National Computer Crime Squad investigates all types of crimes.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
16
Millions of Americans perform illegal downloads every day.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
17
New technologies produce the risks of unanticipated, undesirable risks and consequences.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
18
Most incidents of cyber attacks against businesses are reported to law enforcement authorities.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
19
Polygraph evidence is frequently admissible as evidence in criminal courts.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
20
The most frequent type of data analyzed by forensic crime laboratories is DNA evidence.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
21
Several states have begun collecting DNA samples from individuals arrested, but not yet convicted, of committing a criminal act.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
22
Less-lethal weapons may cause officers to act too quickly when an incident might be handled without force.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
23
Jurors who conduct their own Internet investigations can cause mistrials.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following statements about technology and crime is true?
A) Lawbreakers do not have the capacity to invent their own devices.
B) Lawbreakers will shy away from crime because of the challenge of new technology.
C) Lawbreakers can develop and use technology for the purpose of committing crimes.
D) Lawbreakers will wait for new technology to be invented before they attempt a crime.
E) Technology always gives police the upper hand.
A) Lawbreakers do not have the capacity to invent their own devices.
B) Lawbreakers will shy away from crime because of the challenge of new technology.
C) Lawbreakers can develop and use technology for the purpose of committing crimes.
D) Lawbreakers will wait for new technology to be invented before they attempt a crime.
E) Technology always gives police the upper hand.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
25
Criminal offenders can sometimes be identified through the DNA of family members if their own DNA is not available for testing.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
26
Over 200 people have been freed from prison after DNA testing proved they were actually innocent of the crimes for which they were convicted.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
27
Prior to the invention of the electric chair, the method of execution most often used in the United States was:
A) lethal injection.
B) firing squad.
C) hanging.
D) guillotine.
E) stoning.
A) lethal injection.
B) firing squad.
C) hanging.
D) guillotine.
E) stoning.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
28
James Byrne (2008) classifies devices such as pepper spray as "good technology" and contrasts that with the development of tasers, which he classifies as "bad technology."
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
29
Facial recognition software can quickly identify criminal suspects in crowded areas.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
30
Surveillance cameras that monitor and ticket people who run red lights are potentially in conflict with citizens' civil liberties.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
31
Forensic evidence, such as fingerprints, handwriting, and bite mark analysis have been determined to be reliable through scientific testing.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
32
More money is spent every year on technologically based training and education for prisoners than on security.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
33
Benefits of DNA analysis are that it is inexpensive and results can be generated very quickly.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
34
Who was the first man condemned to execution using the electric chair?
A) William Musafina.
B) William Kemmler.
C) William Douglas.
D) William Saine.
E) William Griffen.
A) William Musafina.
B) William Kemmler.
C) William Douglas.
D) William Saine.
E) William Griffen.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
35
New devices designed specifically to protect property or to assist police will generate ________ behavior by would-be lawbreakers.
A) resentful
B) hesitant
C) adaptive
D) gleeful
E) angry
A) resentful
B) hesitant
C) adaptive
D) gleeful
E) angry
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements about technology and society is true?
A) Technology is moving so fast society is left no alternative but to trust science.
B) Society finds new technology baffling and disruptive.
C) Society presumes scientific advances lead to progress and are always beneficial.
D) Society mistrusts science and are wary of any claims to benefits.
E) Society's trust in science has waver ed over time .
A) Technology is moving so fast society is left no alternative but to trust science.
B) Society finds new technology baffling and disruptive.
C) Society presumes scientific advances lead to progress and are always beneficial.
D) Society mistrusts science and are wary of any claims to benefits.
E) Society's trust in science has waver ed over time .
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
37
In the case of In re Kemmler (1890), the Supreme Court decided that:
A) the death penalty was cruel and unusual.
B) the government could not use heat-sensing technology to search a home.
C) police used excessive force when using pepper spray against Kemmler.
D) the use of the electric chair was a humane method of extinguishing life.
E) Kemmler was required to provide a DNA sample at arrest.
A) the death penalty was cruel and unusual.
B) the government could not use heat-sensing technology to search a home.
C) police used excessive force when using pepper spray against Kemmler.
D) the use of the electric chair was a humane method of extinguishing life.
E) Kemmler was required to provide a DNA sample at arrest.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
38
There has never been a death occurring as a result of the use of rubber bullets by police.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
39
Police use technology in ______ would-be lawbreakers.
A) competition with
B) conjunction with
C) passive response to
D) anticipation of
E) resistance to
A) competition with
B) conjunction with
C) passive response to
D) anticipation of
E) resistance to
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
40
Public defenders have easy access to video technology that allows them to recreate a crime scene with computer-generated images.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
41
In 2008, 19 Americans died as a result of taking counterfeit heparin that had been imported from:
A) North Korea.
B) China.
C) Iran.
D) Thailand.
E) Canada.
A) North Korea.
B) China.
C) Iran.
D) Thailand.
E) Canada.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following statements about technology and crime is true?
A) Computers and other technologies also create opportunities to commit new kinds of crimes, such as cybercrime and counterfeiting.
B) Technology has led to the illegal downloading of software, music, videos, and other copyrighted materials.
C) Cyber criminals use computers to steal information, resources, or funds.
D) Technology has led to the dissemination of child pornography.
E) All of the above are true.
A) Computers and other technologies also create opportunities to commit new kinds of crimes, such as cybercrime and counterfeiting.
B) Technology has led to the illegal downloading of software, music, videos, and other copyrighted materials.
C) Cyber criminals use computers to steal information, resources, or funds.
D) Technology has led to the dissemination of child pornography.
E) All of the above are true.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
43
The theft of social security numbers, credit card numbers, and other information in order to secure items while posing as someone else is called:
A) cyber crime.
B) identify theft.
C) forgery.
D) phishing .
E) uttering.
A) cyber crime.
B) identify theft.
C) forgery.
D) phishing .
E) uttering.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
44
_____ crime involves the use of computers and the Internet to commit acts against people, property, public order, or morality.
A) Victimless
B) Network
C) Cyber
D) Juvenile
E) Computer
A) Victimless
B) Network
C) Cyber
D) Juvenile
E) Computer
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is not a category of cyber crime?
A) Using a computer to steal someone's identity
B) Hacking into a bank computer to withdraw money from someone else's account
C) Soliciting minors online for sex
D) Spamming Internet email accounts for false donations.
E) Solicitation and prostitution.
A) Using a computer to steal someone's identity
B) Hacking into a bank computer to withdraw money from someone else's account
C) Soliciting minors online for sex
D) Spamming Internet email accounts for false donations.
E) Solicitation and prostitution.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
46
In 2009 the National Academy of Sciences (2009) produced a report that:
A) supported the validity and accuracy of many forensic science methods used by police and prosecutors.
B) the police used new technology always in appropriate ways.
C) questioned the validity and accuracy of many forensic science methods used by police and prosecutors.
D) society was distrustful whenever the police used new technologies in their investigations.
E) championed the continued use of technology by the police and prosecutors.
A) supported the validity and accuracy of many forensic science methods used by police and prosecutors.
B) the police used new technology always in appropriate ways.
C) questioned the validity and accuracy of many forensic science methods used by police and prosecutors.
D) society was distrustful whenever the police used new technologies in their investigations.
E) championed the continued use of technology by the police and prosecutors.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is not a responsibility of the FBI's National Computer Crime Squad?
A) Pirated computer software.
B) Major computer network intrusions.
C) Industrial espionage.
D) Network integrity violations.
E) Telebank thefts.
A) Pirated computer software.
B) Major computer network intrusions.
C) Industrial espionage.
D) Network integrity violations.
E) Telebank thefts.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
48
Which socioeconomic group is often hit the hardest by identify theft?
A) The poor
B) The middle class
C) Lower middle class
D) The affluent
E) The tax exempt
A) The poor
B) The middle class
C) Lower middle class
D) The affluent
E) The tax exempt
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
49
________ becomes an element in the interaction, competition, and conflict between human beings who have opposing objectives.
A) Education
B) Criminal intent
C) Technology
D) Money
E) Government
A) Education
B) Criminal intent
C) Technology
D) Money
E) Government
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
50
Why was the U.S. government's effort to avoid monetary counterfeiting in 1996 met with disappointment?
A) A security thread embedded in the paper failed.
B) North Korea purchased the same currency-printing technology that a Swiss company had sold to the U.S. Department of Treasury.
C) A watermark including the portrait of the figure on the bill became smudged.
D) Microprinting technology made it easy to imitate U.S. currency.
E) The optically variable ink was used in smaller denominations only.
A) A security thread embedded in the paper failed.
B) North Korea purchased the same currency-printing technology that a Swiss company had sold to the U.S. Department of Treasury.
C) A watermark including the portrait of the figure on the bill became smudged.
D) Microprinting technology made it easy to imitate U.S. currency.
E) The optically variable ink was used in smaller denominations only.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
51
Credit card fraud cost online merchants close to _____ per year.
A) $1 million
B) $10 million
C) $30 million
D) $60 million
E) $1 billion
A) $1 million
B) $10 million
C) $30 million
D) $60 million
E) $1 billion
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is not a responsibility of the FBI's National Computer Crime Squad?
A) Intrusions of the public switched network (the telephone company).
B) Major computer network intrusions.
C) Threatening emails and cell phone calls.
D) Network integrity violations.
E) Privacy violations.
A) Intrusions of the public switched network (the telephone company).
B) Major computer network intrusions.
C) Threatening emails and cell phone calls.
D) Network integrity violations.
E) Privacy violations.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is the most common type of cyber crime?
A) Industrial espionage.
B) Gun traficking.
C) Money laundering.
D) Counterfeiting.
E) Identity theft.
A) Industrial espionage.
B) Gun traficking.
C) Money laundering.
D) Counterfeiting.
E) Identity theft.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
54
The most common form of identity theft is ____ fraud.
A) credit card
B) bank account
C) tax refund
D) mortgage
E) loans
A) credit card
B) bank account
C) tax refund
D) mortgage
E) loans
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
55
"41 9 scams " offer larg e sum s of mone y i n exchang e fo r payment s fro m thes e targete d frau d victims and i s name d afte r whic h country' s crimina l code?
A) Italy
B) United States
C) Mexico
D) Russia
E) Nigeria
A) Italy
B) United States
C) Mexico
D) Russia
E) Nigeria
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
56
In 1996, the United States had to redesign American currency to combat:
A) bank robbery.
B) money laundering.
C) counterfeiting.
D) cyber crime.
E) embezzlement.
A) bank robbery.
B) money laundering.
C) counterfeiting.
D) cyber crime.
E) embezzlement.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
57
This organization is responsible for controlling counterfeit drugs.
A) FCC
B) FBI
C) FIC
D) FDA
E) FFF
A) FCC
B) FBI
C) FIC
D) FDA
E) FFF
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
58
The FBI's CAT initiative stands for:
A) Counsel at Transition
B) Criminals and Technology
C) Cyber Action Team
D) Crime and Terrorism
E) Creative Assessment of Targets
A) Counsel at Transition
B) Criminals and Technology
C) Cyber Action Team
D) Crime and Terrorism
E) Creative Assessment of Targets
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
59
Because of large profits, organized crime groups have been involved in the counterfeiting of ___________ drugs.
A) illegal.
B) prescription.
C) mainly anti-depressants.
D) over-the-counter drugs.
E) marijuana .
A) illegal.
B) prescription.
C) mainly anti-depressants.
D) over-the-counter drugs.
E) marijuana .
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following statements about technology and crime is false?
A) The acquisition of technology has made drug traffickers less dangerous in battling their rivals and threatening witnesses.
B) Technology has led to the illegal downloading of software, music, videos, and other copyrighted materials.
C) Cyber criminals use computers to steal information, resources, or funds.
D) Technology has led to the dissemination of child pornography.
E) Computers and other technologies also create opportunities to commit new kinds of crimes, such as cyber crime and counterfeiting.
A) The acquisition of technology has made drug traffickers less dangerous in battling their rivals and threatening witnesses.
B) Technology has led to the illegal downloading of software, music, videos, and other copyrighted materials.
C) Cyber criminals use computers to steal information, resources, or funds.
D) Technology has led to the dissemination of child pornography.
E) Computers and other technologies also create opportunities to commit new kinds of crimes, such as cyber crime and counterfeiting.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
61
Impressions of the unique pattern of ridges on the fingertip that are left behind on objects are called:
A) latent fingerprints.
B) latent impressions.
C) residual fingerprints.
D) tell-tale signs.
E) CSI techniques.
A) latent fingerprints.
B) latent impressions.
C) residual fingerprints.
D) tell-tale signs.
E) CSI techniques.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
62
The database containing DNA samples used by law enforcement is:
A) CODIS.
B) GIS.
C) IAFIS.
D) NIJ.
E) NCVS.
A) CODIS.
B) GIS.
C) IAFIS.
D) NIJ.
E) NCVS.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
63
A scientific technique that identifies people through their distinctive gene patterns is:
A) DNA analysis.
B) fingerprint analysis.
C) toxicology analysis.
D) blood splatter analysis.
E) hair/fiber analysis.
A) DNA analysis.
B) fingerprint analysis.
C) toxicology analysis.
D) blood splatter analysis.
E) hair/fiber analysis.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
64
Where would a person's DNA be found?
A) All the cells in an individual's body
B) Skin cells only
C) Blood cells only
D) Hair only
E) Semen only
A) All the cells in an individual's body
B) Skin cells only
C) Blood cells only
D) Hair only
E) Semen only
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
65
The inclusion of _________________ in officer patrol cars has increased the numbers of arrests made by police.
A) pepper spray
B) radios
C) cell phones
D) computers
E) handcuffs
A) pepper spray
B) radios
C) cell phones
D) computers
E) handcuffs
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following statements about the use of new technology in policing is true?
A) Only a few departments can afford new technology.
B) Police departments stand to gain very little from the use of new technology.
C) New technology may raise issues regarding constitutional rights.
D) Police rarely use new technology.
E) None of these statements are true; all are false.
A) Only a few departments can afford new technology.
B) Police departments stand to gain very little from the use of new technology.
C) New technology may raise issues regarding constitutional rights.
D) Police rarely use new technology.
E) None of these statements are true; all are false.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
67
Police departments analyze hot spots, crime trends, and other crime patterns with which of the following technologies?
A) Thermal imaging
B) Call For Assistance Analysis (CFAA)
C) Cell Phone Tower Analysis (CPTA)
D) Geographic Information System (GIS) technology and software
E) Smart Phone Imaging Technology (SPIT)
A) Thermal imaging
B) Call For Assistance Analysis (CFAA)
C) Cell Phone Tower Analysis (CPTA)
D) Geographic Information System (GIS) technology and software
E) Smart Phone Imaging Technology (SPIT)
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
68
The inclusion of _______ on police cars can increase the number of license plates checked by about 80 times the number that can be checked by a police officer.
A) a radar detector
B) a GPS tracking device
C) a camera-computer system
D) a dash camera
E) a laptop computer
A) a radar detector
B) a GPS tracking device
C) a camera-computer system
D) a dash camera
E) a laptop computer
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
69
Weapons that are meant to incapacitate a suspect without inflicting serious injuries are called:
A) soft weapons.
B) subdue and suppress weapons.
C) non-fatal weapons.
D) friendly-fire weapons.
E) less-lethal weapons.
A) soft weapons.
B) subdue and suppress weapons.
C) non-fatal weapons.
D) friendly-fire weapons.
E) less-lethal weapons.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
70
The use of computers inside patrol cars has improved which of the following?
A) Higher expectations of police efficiency
B) Efficiency
C) Electronic communication
D) Less handwriting
E) All of the above have been improved by the use of computers inside patrol cars.
A) Higher expectations of police efficiency
B) Efficiency
C) Electronic communication
D) Less handwriting
E) All of the above have been improved by the use of computers inside patrol cars.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
71
In which court case did the Supreme Court assert that law enforcement officials cannot examine a home with a thermal-imaging device unless they obtain a warrant?
A) Maryland v. King (2013)
B) Riley v. California (2014)
C) United States v. Jones (2012)
D) King v Wells (2013)
E) Kyllo v. United States (2001)
A) Maryland v. King (2013)
B) Riley v. California (2014)
C) United States v. Jones (2012)
D) King v Wells (2013)
E) Kyllo v. United States (2001)
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
72
Databases permit officers to use their computers to check all of the following except:
A) outstanding warrants
B) protection orders
C) driving records
D) divorce records
E) criminal histories
A) outstanding warrants
B) protection orders
C) driving records
D) divorce records
E) criminal histories
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
73
What percentage of departments have patrol cars that have in-vehicle computers?
A) 50
B) 60
C) 70
D) 80
E) 90
A) 50
B) 60
C) 70
D) 80
E) 90
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
74
New technology allows law enforcement to detect these by using sensors strategically placed throughout various neighborhoods.
A) Robberies
B) Gunshots
C) Assaults
D) Car accidents
E) Terrorist cells
A) Robberies
B) Gunshots
C) Assaults
D) Car accidents
E) Terrorist cells
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following would not be a scientific test or procedure performed by a forensic science laboratory?
A) Narcotics testing
B) Firearm testing
C) Fingerprint analysis
D) DNA analysis
E) Autopsy
A) Narcotics testing
B) Firearm testing
C) Fingerprint analysis
D) DNA analysis
E) Autopsy
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
76
The federal government uses a fingerprint data system called:
A) CODIS.
B) GIS.
C) IAFIS.
D) NIJ.
E) NCVS.
A) CODIS.
B) GIS.
C) IAFIS.
D) NIJ.
E) NCVS.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
77
In Lansing, Michigan, police officers can search for warrants on citizens by simply:
A) swiping their driver's license.
B) testing a sample of their saliva.
C) scanning their fingerprints.
D) running a facial recognition program.
E) taking their picture.
A) swiping their driver's license.
B) testing a sample of their saliva.
C) scanning their fingerprints.
D) running a facial recognition program.
E) taking their picture.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
78
In the case of Kyllo v. United States , police used a thermal imaging camera to determine if suspects living in a house were:
A) growing marijuana.
B) forging currency.
C) stealing identities.
D) downloading child pornography.
E) planning terrorist activities.
A) growing marijuana.
B) forging currency.
C) stealing identities.
D) downloading child pornography.
E) planning terrorist activities.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
79
GIS technology is used to:
A) map crime to identify "hot spots."
B) test whether suspects are telling the truth.
C) reduce the likelihood of injury from weapons.
D) limit the number of lawsuits brought against the police.
E) sort and prioritize incoming 911 calls.
A) map crime to identify "hot spots."
B) test whether suspects are telling the truth.
C) reduce the likelihood of injury from weapons.
D) limit the number of lawsuits brought against the police.
E) sort and prioritize incoming 911 calls.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following statements is true about forensic evidence?
A) It can identify offenders accurately, even when mishandled by technicians.
B) Bite marks have been scientifically validated as reliable.
C) As DNA evidence ages it becomes more difficult to use to identify individuals.
D) Ten inmates on death row have been proven to be wrongly incarcerated after DNA evidence was tested.
E) The Supreme Court has ruled that individuals have the right to access the original evidence from their cases for DNA analysis.
A) It can identify offenders accurately, even when mishandled by technicians.
B) Bite marks have been scientifically validated as reliable.
C) As DNA evidence ages it becomes more difficult to use to identify individuals.
D) Ten inmates on death row have been proven to be wrongly incarcerated after DNA evidence was tested.
E) The Supreme Court has ruled that individuals have the right to access the original evidence from their cases for DNA analysis.
Unlock Deck
Unlock for access to all 148 flashcards in this deck.
Unlock Deck
k this deck

