Deck 15: Terrorism, Technology, Accountability, and the Future of American Policing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/68
Play
Full screen (f)
Deck 15: Terrorism, Technology, Accountability, and the Future of American Policing
1
The FBI defines ______ as the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof in furtherance of political or social objectives.
A) assault
B) terrorism
C) extortion
D) warfare
A) assault
B) terrorism
C) extortion
D) warfare
terrorism
2
During this "era of policing," politicians controlled virtually every aspect of policing and officers were corrupt and generally inef?cient.
A) the political era of policing
B) the professional era of policing
C) the problem-solving era of policing
D) the homeland security era of policing
A) the political era of policing
B) the professional era of policing
C) the problem-solving era of policing
D) the homeland security era of policing
the political era of policing
3
______ involves attacks on computer systems in order to steal information or to disrupt infrastructure operations, such as utility or transportation systems.
A) Techno-crime
B) White-collar crime
C) Cyberterrorism
D) Infowars
A) Techno-crime
B) White-collar crime
C) Cyberterrorism
D) Infowars
Cyberterrorism
4
The September 11, 2001 attacks against the United States by Al-Qaeda are examples of ______.
A) right-wing extremism
B) domestic terrorism
C) international terrorism
D) lone wolf terrorism
A) right-wing extremism
B) domestic terrorism
C) international terrorism
D) lone wolf terrorism
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
5
A person who believes in the religious duty of Muslims to spread the religion through militant means is called a ______.
A) jainist
B) right-wing extremist
C) lone wolf terrorist
D) jihadist
A) jainist
B) right-wing extremist
C) lone wolf terrorist
D) jihadist
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is an example of a right-wing extremist group?
A) Al-Qaeda
B) the Japanese Red Army
C) Aryan Nations
D) ISIS
A) Al-Qaeda
B) the Japanese Red Army
C) Aryan Nations
D) ISIS
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
7
Terrorists who act on their own without attachment to, or help from, a terrorist group or a government are called ______.
A) state-sponsored terrorists
B) lone wolf terrorists
C) jihadists
D) right-wing extremists
A) state-sponsored terrorists
B) lone wolf terrorists
C) jihadists
D) right-wing extremists
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
8
This database is maintained by the University of Maryland and contains data on terrorist incidents from 1970 to 2017.
A) global terrorism database
B) RAND database of worldwide terror incidents
C) world terror index
D) political unrest database
A) global terrorism database
B) RAND database of worldwide terror incidents
C) world terror index
D) political unrest database
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a characteristic of terrorist cells?
A) They are usually geographically concentrated in one area or city
B) The members of the cell know the names and locations of other cells
C) Usually have about 40 members
D) Each cell plays a specific role in the purpose of the overall mission
A) They are usually geographically concentrated in one area or city
B) The members of the cell know the names and locations of other cells
C) Usually have about 40 members
D) Each cell plays a specific role in the purpose of the overall mission
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
10
According to the global terrorism database, from 1970 to 2017, approximately ______ terrorist attacks took place in the United States.
A) 5,000
B) 315
C) 900
D) 2,800
A) 5,000
B) 315
C) 900
D) 2,800
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
11
What will most likely be the center of technology-related legal challenges in the future?
A) ownership
B) accuracy
C) privacy
D) reliability
A) ownership
B) accuracy
C) privacy
D) reliability
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
12
What limitations should the police consider when it comes to technology?
A) its limited capabilities
B) its costs
C) privacy concerns
D) all of these
A) its limited capabilities
B) its costs
C) privacy concerns
D) all of these
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
13
______ is a type of software that is unknowingly downloaded that takes control of a computer, or renders it inoperable, until payment is made to the person responsible for the attack.
A) Spyware
B) Phishing
C) Ransomware
D) Malware
A) Spyware
B) Phishing
C) Ransomware
D) Malware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
14
______ involves obtaining usernames, passwords, and other personal information through trickery.
A) Phishing
B) Hacking
C) Sextortion
D) Spyware
A) Phishing
B) Hacking
C) Sextortion
D) Spyware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
15
______ involves the infiltration of a computer or computer system to gain control over that system in order to steal user information or other sensitive information.
A) Spoofing
B) Hacking
C) Phishing
D) Spyware
A) Spoofing
B) Hacking
C) Phishing
D) Spyware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
16
______ is a type of software that collects and transmits information about computer usage to another person or computer without the computer user's consent.
A) Spoofing
B) Hacking
C) Phishing
D) Spyware
A) Spoofing
B) Hacking
C) Phishing
D) Spyware
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
17
The USA Patriot Act of 2001 has been modified over the years and today exists as the ______.
A) USA Freedom Act
B) USA Liberty Act
C) Freedom of Information Act
D) Expanded Police Powers Act
A) USA Freedom Act
B) USA Liberty Act
C) Freedom of Information Act
D) Expanded Police Powers Act
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
18
Holding police officers responsible for their conduct is called ______.
A) justice
B) punishment
C) accountability
D) reliability
A) justice
B) punishment
C) accountability
D) reliability
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
19
______ is the nationwide DNA network that includes DNA samples from convicted offenders and crime scenes.
A) NCIC
B) CODIS
C) PRAXIS
D) IAFIS
A) NCIC
B) CODIS
C) PRAXIS
D) IAFIS
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
20
Accountability of the police may be enhanced through the use of ______.
A) body-worn cameras
B) militarization
C) DNA analysis
D) police use of robots
A) body-worn cameras
B) militarization
C) DNA analysis
D) police use of robots
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
21
______ are technologies that are capable of identifying a person by measuring a feature of a person's unique physical characteristics.
A) Biometrics
B) Jurimetrics
C) Biodynamics
D) Phenometrics
A) Biometrics
B) Jurimetrics
C) Biodynamics
D) Phenometrics
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
22
______ is an electronic system that stores and monitors data on police officer performance and can be used to identify potentially problematic performance.
A) Early intervention systems
B) Behavior identification systems
C) Behavior modification systems
D) Performance evaluation systems
A) Early intervention systems
B) Behavior identification systems
C) Behavior modification systems
D) Performance evaluation systems
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
23
What form of terrorism have the police departments in the U.S. identified to be of most concern?
A) right-wing extremism
B) international terrorism
C) radicals
D) cyberterrorism
A) right-wing extremism
B) international terrorism
C) radicals
D) cyberterrorism
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
24
The DNA technology, whereby physical characteristics of individuals can be determined on the basis of a DNA profile, is called DNA ______.
A) stereotyping
B) miniaturization
C) strand analysis
D) phenotyping
A) stereotyping
B) miniaturization
C) strand analysis
D) phenotyping
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
25
______ technology can detect heat from closed structures thus allowing one to "see" through walls.
A) DNA phenotyping
B) Thermal imaging
C) UAVs
D) Gunshot detection
A) DNA phenotyping
B) Thermal imaging
C) UAVs
D) Gunshot detection
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
26
______ can capture a facial image on camera and compare it to digital images stored in a reference database.
A) UAVs
B) Thermal imaging
C) Facial recognition systems
D) IAFIS
A) UAVs
B) Thermal imaging
C) Facial recognition systems
D) IAFIS
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following technologies would likely increase police accountability and transparency?
A) thermal imaging
B) body cameras
C) UAVs
D) biometrics
A) thermal imaging
B) body cameras
C) UAVs
D) biometrics
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
28
A DNA profile cannot identify ______.
A) eye color
B) sex
C) race
D) age
A) eye color
B) sex
C) race
D) age
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
29
Historically, crisis is what has led to change in policing styles.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
30
Because of its unique advantages, most experts believe that the community problem-solving era of policing will last forever.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
31
Thanks in large part to international law, there is only one definition of terrorism.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
32
Many new demands have been placed on the police, including dealing with the threat posed by terrorism.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
33
The Ku Klux Klan is an example of an international terrorist organization.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
34
Al-Qaeda is an example of a jihadist organization.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
35
Cyberterrorism involves attacks on computer systems in order to steal information or to disrupt infrastructure operations, such as utility or transportation systems.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
36
Most police departments in the U.S. have identified right-wing terrorism as a top terrorist threat.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
37
A lone wolf terrorist is someone who acts on their own in planning and carrying out a terrorist act.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
38
Terrorists who receive funding, support, training, or protection from a government are called state-sponsored terrorists.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
39
The terrorist attacks of September 11, 2001 were the last terrorist attacks in the United States.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
40
It is most likely that the police of the future will be less militaristic.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
41
Research has shown that body-worn cameras have potential as a tool of police accountability.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
42
Most far-right extremist terrorist attacks are committed by terrorist groups, not so-called "lone wolves."
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
43
Regardless of their actual effect on police accountability, the adoption of body-worn cameras shows a commitment to police accountability and transparency.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
44
Terrorist cells are small groups of individuals who play a limited role in the operation of the greater terrorist organization.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
45
Spyware is software that collects and transmits information about computer usage to another person or computer without the computer user's consent.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
46
The police are likely to remain controversial even with the use of body-worn cameras.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
47
Sextortion refers to the use of the internet or other electronic means to coerce an individual into a sexual relationship or behaviors.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
48
Spoofing involves a person misrepresenting his or her identity through an e-mail in order to obtain user information.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
49
"Militarization of the Police" refers specifically to the practice of hiring former members of the armed forces as police officers.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
50
Owing to strong international laws, policing is likely to become less global in the future.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
51
The USA Patriot Act expanded the power of the police.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
52
Accountability is the process of holding the police responsible for their conduct.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
53
CODIS is a nationwide DNA network that includes DNA samples from convicted offenders and crime scenes.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
54
Assess the role of crisis and change in police history.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
55
Identify at least three of the new demands on the police.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
56
Define terrorism and identify at least three variations.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
57
Explain the concept of radicalization and describe how one becomes radicalized.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
58
Explain the difference between state-sponsored and lone wolf terrorism and provide examples of each.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
59
Discuss three of the predictions about the changes that police might have to face in the future.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
60
Discuss the challenges posed by terrorism for law enforcement.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
61
Discuss technology as a new demand on the police.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
62
Identify and explain at least four types of common cyberattacks or crimes.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
63
Explain what is meant by the term "militarization of the police."
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
64
Identify and evaluate two types of technology that may increase officer accountability.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
65
Identify and assess at least two technologies available to the police that aid in identification of offenders.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
66
Identify and assess at least two technologies available to police that aid in "seeing" or detecting crime.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
67
Identify at least two types of technologies for computer and internet applications available to law enforcement and discuss how these technologies may be used.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck
68
Discuss the consequences of technology on policing and the law.
Unlock Deck
Unlock for access to all 68 flashcards in this deck.
Unlock Deck
k this deck

