Deck 12: Future Directions and Emerging Trends

Full screen (f)
exit full mode
Question
According to Foresight's Crime Prevention Panel, organizations everywhere "are adapting to the opportunities offered by the flexibility of the internet."
Use Space or
up arrow
down arrow
to flip the card.
Question
On a global scale, there appears to be a shared agreement that society is experiencing a period of unprecedented change in both substance and pace.
Question
Human smuggling can occur when victims are taken to another country or are moved from one place to another within the same country.
Question
All computer crime is committed for financial gain.
Question
"Software piracy" refers to the unauthorized and illegal copying of software programs.
Question
Transnational crime refers to unlawful activity undertaken and supported by organized criminal groups operating across provincial boundaries.
Question
The United States military is currently using genetic testing to assign unique identification codes to each of its soldiers.
Question
The automated measurement of human traits and identifiers such as face, finger, and iris recognition is now a wide-spread practice among law enforcement agencies.
Question
According to the findings of Foresight's Crime Prevention Panel, technology offers individuals new opportunities to commit crimes that may be virtually unsolvable.
Question
Futurists are those criminologists who focus specifically on the problem of human trafficking.
Question
In many instances, revisions to legislation ensure that existing offences are defined in such a way as to address the new technological aspects of the crime.
Question
Viruses can spread from one computer to another via modem or high-speed cable and DSL connections and through networks or direct links.
Question
There are two categories of cybercrime recognized by the Canadian Police College - one in which a computer is the tool of the crime and one in which the computer is the object of the crime.
Question
Futurist criminology involves the study of likely futures as they relate to crime and its control.
Question
Biometric technologies are used for two main purposes: to identify individuals in a database and to support identity assurance, meaning that a user of a system is who he or she claims to be.
Question
Foresight's Crime Prevention Panel in Great Britain predicts that future criminal behaviour will become more global in scope.
Question
The globalization of crime has made it even more important for law-enforcement officials to focus only on the crimes occurring in their neighbourhoods.
Question
In the context of the use of biometrics in Canada, biometric technologies are currently being used in many commercial environments such as protection of physical and computer assets, and time and attendance applications.
Question
In 2007, officials of U.S.-based Chiquita Brands International admitted in federal court that executives within the company had paid protection money to Columbian terrorists to help secure their most profitable banana-growing operations.
Question
In response to the increasing risk of cybercrimes, all Canadian police services have implemented a specialized unit which is responsible for the definition, policies, procedures, and investigation of cybercrimes.
Question
Women and children comprise the largest group of victims in the crime of human trafficking.
Question
The ________ concerns itself with research into future crime-prevention and crime-control policies.

A) Society of Police Futurists International (PFI)
B) World Future Society
C) Foresight Criminology Program
D) Canadian Society of Criminological Futurists
E) Society of Future Anti-Social Behaviour
Question
The Convention on CyberCrime treaty, that was signed in 2001, lacks a(n) ________ provision, which means that an act can be investigated by two countries even though it might not be considered an offence in both countries.

A) dual criminality
B) individual criminality
C) mutually agreed upon criminality
D) double criminality
E) single criminality
Question
The task of the futurist is to distinguish effectively between the impending possibilities of multiple futures, assessing the likelihood of each, and _______________________.

A) make unrealistic assumptions about technology
B) making more or less realistic forecasts based on such assessments
C) make realistic arrest forecasts about transnational criminal activities
D) make realistic assumptions about biometric interventions
E) make unrealistic economic forecasts about law enforcement costs
Question
According to the National Institute of Justice (NIJ) in the United States, transnational crime groups have profited more from globalization than ___________________.

A) legitimate business
B) human trafficking groups
C) global food companies
D) computer criminals
E) fraud investigators
Question
A ________ is a computer program that is designed to secretly invade computer systems and either modify the way in which they operate or alter the information they store.

A) macro virus
B) cyber virus
C) system virus
D) computer virus
E) polymorphic virus
Question
Canada is largely a destination and a transit country for women who are trafficked for the purposes of sexual exploitation.
Question
One of the most significant increases in organized transnational crime has been in the area of ________.

A) smuggling and trafficking of narcotics
B) smuggling and trafficking of currency
C) smuggling of persons and human trafficking
D) identity theft
E) smuggling and trafficking of nuclear materials
Question
The Criminal Intelligence Service Canada (CISC) reports that today's organized crime syndicates have become quasi-corporate in their activities and are now involved in all of the following EXCEPT ________.

A) arms dealing
B) globalization
C) environmental crime
D) trafficking and smuggling of humans
E) money laundering
Question
The use of official-looking email messages to steal valuable information such as credit card numbers or user IDs is known as ________.

A) email phreaking
B) email fraud
C) internet piracy
D) phishing
E) softlifting
Question
The three tasks given to the experts who sat on the Foresight's Crime Prevention Panel were: to describe crimes of the near future; to decide what role science and technology will play in future criminality; and ________.

A) to outline the demographic characteristics of future criminals
B) to create successful intervention programs
C) to identify methods to reduce and detect those crimes
D) to predict which members of society will commit crimes
E) to predict which crimes will be the most prevalent
Question
According to the Federal Bureau of Investigation in the United States, having "databases to keep records of illegal client transactions" would be categorized as a(n) ________.

A) internal computer crime
B) crime in support of criminal enterprises
C) internet and telecommunications crime
D) computer-manipulation crime
E) hardware, software, and information theft
Question
Any crime that involves a computer as the object of the crime or as the tool used to commit a material component of the offence is known as ________.

A) Cross-national crime
B) Comparative crime
C) Multi-national crime
D) Cybercrime
E) Cross-cultural crime
Question
According to the United Nations, human smuggling and trafficking have become a worldwide industry that employs millions of people and leads to the annual turnover of _______________.

A) millions of people
B) billions of people
C) millions of dollars
D) billions of dollars
E) trillions of dollars
Question
In 2003, Canada refused to sign the United Nations Convention Against Transnational Organized Crime.
Question
The increasing integration of previously isolated events in all spheres of endeavour, and their overlapping impact on people far and wide, are important aspects of globalization.
Question
Even with the appropriate legislation in place, it is difficult to lay charges for human trafficking as these are not regular criminal cases.
Question
In ________ Canada joined the 100 or so countries around the world that use e-passports, which allow automated facial recognition to positively authenticate that the holder is who he or she claims to be.

A) 2001
B) 2005
C) 2009
D) 2012
E) 1999
Question
All of the following statements indicate different challenges to the prevention and control of cybercrime EXCEPT ________

A) "a criminal can target victims all over the world."
B) "a criminal can store evidence in remote locations."
C) "a criminal can commit a crime from any country in the world."
D) "a criminal can hide his or her identity by using computer systems located in many different countries."
E) "a criminal can commit crimes at any time of the day or night."
Question
The World Future Society brings together ideas, knowledge, and ________ to prepare for the future.

A) criminologists
B) people
C) legal authorities
D) crime statistics
E) demographic information
Question
In Canada, trafficking in humans wasn't recognized as an offence until ___________.

A) November 2001
B) November 2003
C) March 2004
D) March 2008
E) April 2008
Question
What are the four main trends driving biometric technologies to more commonplace applications?
Question
Canada will soon include biometric technologies in its ________________, as the United Kingdom and the United States currently do.

A) Transnational criminal activity system
B) Visa application process
C) Information technology
D) Human trafficking system
E) Cybercrime system
Question
Based on various reports, the Criminal Intelligence Directorate (CID) of the RCMP estimates that anywhere between _________________ persons are trafficked from Canada into the United States each year.

A) 1 000 and 1500
B) 1500 and 2200
C) 2000 and 3000
D) 5000 and 10 000
E) 10 000 and 15 000
Question
According to the FBI, computer-manipulation crimes include all of the following EXCEPT:

A) embezzlement.
B) electronic money laundering.
C) electronic fund transfer fraud.
D) other fraud/phishing.
E) extortion threats/electronic terrorism.
Question
A number of specialized computer programs, such as ImAger and Compusketch assist police artists in rendering composite images of ______________.

A) veins in the face
B) radiant heat from a person's face
C) suspects and missing victims
D) lost pets
E) facial hairs on the chin of the subject
Question
Canada has been operating expedited traveller systems for the last decade, first with the CANPASS border clearance system and more recently with the ________ system for travellers into both Canada and the United States.

A) NextPass
B) CanPort
C) NEXUS
D) NextStop
E) CANUS
Question
The creation and transmission of destructive computer viruses and other malicious forms of programming code are a type of computer crime that is typically committed by ________.

A) adult males
B) adult females
C) young females
D) young males
E) young "disaffected technonerds"
Question
Foresight's Crime Prevention Panel outlines three social characteristics that are relevant to understanding and predicting future forms of criminality. They are: individuality and independence; Information Communication Technology (ITC) usage; and ___________________________.

A) Technology
B) Criminality
C) defensible space
D) Globalization (the increasingly international character of social life)
E) territorial reinforcement
Question
In 2010, Canada committed $8 million in its Cyber Security Strategy to combat cyber crimes. What are the three pillars that this strategy is built upon?
Question
According to Richter H. Moore, Jr., within a few decades, "criminal organizations will be able to afford ______________________."

A) biometric iris scanners
B) global storefront operations
C) their own satellites
D) enculturalization
E) new computers
Question
Biometric technologies typically involve ________ when they are used in the area of crime prevention.

A) Identification
B) Verification
C) hand geometry
D) finger scanning
E) recognition
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/52
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Future Directions and Emerging Trends
1
According to Foresight's Crime Prevention Panel, organizations everywhere "are adapting to the opportunities offered by the flexibility of the internet."
True
2
On a global scale, there appears to be a shared agreement that society is experiencing a period of unprecedented change in both substance and pace.
True
3
Human smuggling can occur when victims are taken to another country or are moved from one place to another within the same country.
False
4
All computer crime is committed for financial gain.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
5
"Software piracy" refers to the unauthorized and illegal copying of software programs.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
6
Transnational crime refers to unlawful activity undertaken and supported by organized criminal groups operating across provincial boundaries.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
7
The United States military is currently using genetic testing to assign unique identification codes to each of its soldiers.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
8
The automated measurement of human traits and identifiers such as face, finger, and iris recognition is now a wide-spread practice among law enforcement agencies.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
9
According to the findings of Foresight's Crime Prevention Panel, technology offers individuals new opportunities to commit crimes that may be virtually unsolvable.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
10
Futurists are those criminologists who focus specifically on the problem of human trafficking.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
11
In many instances, revisions to legislation ensure that existing offences are defined in such a way as to address the new technological aspects of the crime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
12
Viruses can spread from one computer to another via modem or high-speed cable and DSL connections and through networks or direct links.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
13
There are two categories of cybercrime recognized by the Canadian Police College - one in which a computer is the tool of the crime and one in which the computer is the object of the crime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
14
Futurist criminology involves the study of likely futures as they relate to crime and its control.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
15
Biometric technologies are used for two main purposes: to identify individuals in a database and to support identity assurance, meaning that a user of a system is who he or she claims to be.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
16
Foresight's Crime Prevention Panel in Great Britain predicts that future criminal behaviour will become more global in scope.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
17
The globalization of crime has made it even more important for law-enforcement officials to focus only on the crimes occurring in their neighbourhoods.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
18
In the context of the use of biometrics in Canada, biometric technologies are currently being used in many commercial environments such as protection of physical and computer assets, and time and attendance applications.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
19
In 2007, officials of U.S.-based Chiquita Brands International admitted in federal court that executives within the company had paid protection money to Columbian terrorists to help secure their most profitable banana-growing operations.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
20
In response to the increasing risk of cybercrimes, all Canadian police services have implemented a specialized unit which is responsible for the definition, policies, procedures, and investigation of cybercrimes.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
21
Women and children comprise the largest group of victims in the crime of human trafficking.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
22
The ________ concerns itself with research into future crime-prevention and crime-control policies.

A) Society of Police Futurists International (PFI)
B) World Future Society
C) Foresight Criminology Program
D) Canadian Society of Criminological Futurists
E) Society of Future Anti-Social Behaviour
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
23
The Convention on CyberCrime treaty, that was signed in 2001, lacks a(n) ________ provision, which means that an act can be investigated by two countries even though it might not be considered an offence in both countries.

A) dual criminality
B) individual criminality
C) mutually agreed upon criminality
D) double criminality
E) single criminality
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
24
The task of the futurist is to distinguish effectively between the impending possibilities of multiple futures, assessing the likelihood of each, and _______________________.

A) make unrealistic assumptions about technology
B) making more or less realistic forecasts based on such assessments
C) make realistic arrest forecasts about transnational criminal activities
D) make realistic assumptions about biometric interventions
E) make unrealistic economic forecasts about law enforcement costs
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
25
According to the National Institute of Justice (NIJ) in the United States, transnational crime groups have profited more from globalization than ___________________.

A) legitimate business
B) human trafficking groups
C) global food companies
D) computer criminals
E) fraud investigators
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
26
A ________ is a computer program that is designed to secretly invade computer systems and either modify the way in which they operate or alter the information they store.

A) macro virus
B) cyber virus
C) system virus
D) computer virus
E) polymorphic virus
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
27
Canada is largely a destination and a transit country for women who are trafficked for the purposes of sexual exploitation.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
28
One of the most significant increases in organized transnational crime has been in the area of ________.

A) smuggling and trafficking of narcotics
B) smuggling and trafficking of currency
C) smuggling of persons and human trafficking
D) identity theft
E) smuggling and trafficking of nuclear materials
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
29
The Criminal Intelligence Service Canada (CISC) reports that today's organized crime syndicates have become quasi-corporate in their activities and are now involved in all of the following EXCEPT ________.

A) arms dealing
B) globalization
C) environmental crime
D) trafficking and smuggling of humans
E) money laundering
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
30
The use of official-looking email messages to steal valuable information such as credit card numbers or user IDs is known as ________.

A) email phreaking
B) email fraud
C) internet piracy
D) phishing
E) softlifting
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
31
The three tasks given to the experts who sat on the Foresight's Crime Prevention Panel were: to describe crimes of the near future; to decide what role science and technology will play in future criminality; and ________.

A) to outline the demographic characteristics of future criminals
B) to create successful intervention programs
C) to identify methods to reduce and detect those crimes
D) to predict which members of society will commit crimes
E) to predict which crimes will be the most prevalent
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
32
According to the Federal Bureau of Investigation in the United States, having "databases to keep records of illegal client transactions" would be categorized as a(n) ________.

A) internal computer crime
B) crime in support of criminal enterprises
C) internet and telecommunications crime
D) computer-manipulation crime
E) hardware, software, and information theft
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
33
Any crime that involves a computer as the object of the crime or as the tool used to commit a material component of the offence is known as ________.

A) Cross-national crime
B) Comparative crime
C) Multi-national crime
D) Cybercrime
E) Cross-cultural crime
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
34
According to the United Nations, human smuggling and trafficking have become a worldwide industry that employs millions of people and leads to the annual turnover of _______________.

A) millions of people
B) billions of people
C) millions of dollars
D) billions of dollars
E) trillions of dollars
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
35
In 2003, Canada refused to sign the United Nations Convention Against Transnational Organized Crime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
36
The increasing integration of previously isolated events in all spheres of endeavour, and their overlapping impact on people far and wide, are important aspects of globalization.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
37
Even with the appropriate legislation in place, it is difficult to lay charges for human trafficking as these are not regular criminal cases.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
38
In ________ Canada joined the 100 or so countries around the world that use e-passports, which allow automated facial recognition to positively authenticate that the holder is who he or she claims to be.

A) 2001
B) 2005
C) 2009
D) 2012
E) 1999
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
39
All of the following statements indicate different challenges to the prevention and control of cybercrime EXCEPT ________

A) "a criminal can target victims all over the world."
B) "a criminal can store evidence in remote locations."
C) "a criminal can commit a crime from any country in the world."
D) "a criminal can hide his or her identity by using computer systems located in many different countries."
E) "a criminal can commit crimes at any time of the day or night."
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
40
The World Future Society brings together ideas, knowledge, and ________ to prepare for the future.

A) criminologists
B) people
C) legal authorities
D) crime statistics
E) demographic information
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
41
In Canada, trafficking in humans wasn't recognized as an offence until ___________.

A) November 2001
B) November 2003
C) March 2004
D) March 2008
E) April 2008
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
42
What are the four main trends driving biometric technologies to more commonplace applications?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
43
Canada will soon include biometric technologies in its ________________, as the United Kingdom and the United States currently do.

A) Transnational criminal activity system
B) Visa application process
C) Information technology
D) Human trafficking system
E) Cybercrime system
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
44
Based on various reports, the Criminal Intelligence Directorate (CID) of the RCMP estimates that anywhere between _________________ persons are trafficked from Canada into the United States each year.

A) 1 000 and 1500
B) 1500 and 2200
C) 2000 and 3000
D) 5000 and 10 000
E) 10 000 and 15 000
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
45
According to the FBI, computer-manipulation crimes include all of the following EXCEPT:

A) embezzlement.
B) electronic money laundering.
C) electronic fund transfer fraud.
D) other fraud/phishing.
E) extortion threats/electronic terrorism.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
46
A number of specialized computer programs, such as ImAger and Compusketch assist police artists in rendering composite images of ______________.

A) veins in the face
B) radiant heat from a person's face
C) suspects and missing victims
D) lost pets
E) facial hairs on the chin of the subject
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
47
Canada has been operating expedited traveller systems for the last decade, first with the CANPASS border clearance system and more recently with the ________ system for travellers into both Canada and the United States.

A) NextPass
B) CanPort
C) NEXUS
D) NextStop
E) CANUS
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
48
The creation and transmission of destructive computer viruses and other malicious forms of programming code are a type of computer crime that is typically committed by ________.

A) adult males
B) adult females
C) young females
D) young males
E) young "disaffected technonerds"
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
49
Foresight's Crime Prevention Panel outlines three social characteristics that are relevant to understanding and predicting future forms of criminality. They are: individuality and independence; Information Communication Technology (ITC) usage; and ___________________________.

A) Technology
B) Criminality
C) defensible space
D) Globalization (the increasingly international character of social life)
E) territorial reinforcement
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
50
In 2010, Canada committed $8 million in its Cyber Security Strategy to combat cyber crimes. What are the three pillars that this strategy is built upon?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
51
According to Richter H. Moore, Jr., within a few decades, "criminal organizations will be able to afford ______________________."

A) biometric iris scanners
B) global storefront operations
C) their own satellites
D) enculturalization
E) new computers
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
52
Biometric technologies typically involve ________ when they are used in the area of crime prevention.

A) Identification
B) Verification
C) hand geometry
D) finger scanning
E) recognition
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 52 flashcards in this deck.