Deck 14: Crimes in the 21st Century

Full screen (f)
exit full mode
Question
Which statement best summarizes the challenges associated with creating a typology of high-tech crime?

A) The crimes are so complicated it is difficult for others to understand.
B) There are so few types of high-tech crimes that it is difficult to derive enough categories.
C) The crimes are complex and contain many elements making it difficult to create distinct categories.
D) The crimes are so similar to white-collar crime that it is difficult to create a unique typology that is distinct from existing typologies.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which global system is information technology (IT) the key to?

A) business
B) Internet
C) economic
D) social
Question
Cybercrime presents a compelling challenge for the justice system and law enforcement community. Which statement does NOT accurately describe the challenge cybercrime creates?

A) Cybercrime is rapidly evolving with new schemes being created daily.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Question
What type of cybercriminal is motivated by the desire to commit technological destruction?

A) cyberterrorist
B) cybervandal
C) cybertheft
D) cyberspy
Question
Why is it difficult to calculate an accurate computer crime rate?

A) Computer crime is often not reported by companies.
B) Most companies exaggerate the amount of computer crime.
C) Most companies are involved in computer crime and do not want to implicit themselves.
D) Police are not interested in computer crime because it is a private matter.
Question
What percentage of attacks on businesses is estimated to be in the e-commerce area?

A) 4
B) 16
C) 55
D) 61
Question
What term refers to the situation in which pornography websites send consumers to other sites involuntarily?

A) tripping
B) mousetrapping
C) slagging
D) ping-ponging
Question
What type of computer crime uses a computer to reprogram another for illicit purposes; for example, telling a bank computer to put deposits in the criminal's accounts?

A) salami slice
B) super zapping
C) Trojan horse
D) logic bomb
Question
What term refers to the use of a maintenance subroutine to supersede an antitheft program?

A) salami slicing
B) super-zapping
C) interroutining
D) program redundancy
Question
A virus program is secretly attached to the company's computer system. What type of computer crime is this an example of?

A) computer voyeurism
B) data leakage
C) the logic bomb
D) super-zapping
Question
What type of computer program disrupts or destroys existing programs and networks?

A) logic bomb
B) trap door
C) virus
D) Trojan horse
Question
In 1986, the first bootable PC virus was released. What was the virus called?

A) Melissa macro
B) Hacker's haven
C) the Brain
D) Morris worm
Question
In 2003, which Internet "worm" infected hundreds of thousands of computers as the fastest spreading worm in history?

A) Trojan
B) Morris
C) Slammer
D) Earth
Question
In 2004, the first webworm was launched which used Google to find new targets. What was the worm called?

A) Sony
B) Daprosy
C) Laroux
D) Santy
Question
What term is used to describe the intentional manipulation of the securities marketplace through the use of the Internet for the purposes of profit?

A) Internet fraud
B) Internet manipulation
C) e-fraud
D) electronic fraud
Question
George posts negative information about a particular company in an attempt to reduce stock price. Once the price has lowered, George purchases the stock before the company is able to reverse the negative damage and re-inflate the stock price. What crime has George committed?

A) fraudulent stock exchange
B) illegal touting
C) illegal infringement
D) market manipulation
Question
Identity theft is a type of cybercrime that has grown at surprising rates over the past few years. Which statement does NOT accurately describe identity theft?

A) Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B) Opening new lines of credit is the most common goals of credit card thieves.
C) Some identity theft schemes are extremely elaborate.
D) Much is known about the extent of identity theft.
Question
Which of the following is NOT a common phishing scam?

A) account verification scams in which the victim is directed to a bogus website by clicking the legitimate-looking address
B) the Nigerian 419 scam in which an alleged representative of a foreign government asking the victim to help move money from one account to another
C) a free credit report through Experian, TransUnion, and Equifax
D) an e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling
Question
Which term refers to phishing; that is, the act of setting up phony websites to gain access to personal information?

A) e-hooking
B) e-tailing
C) vishing
D) spoofing
Question
What is the purpose of phishing?

A) to make connections in order launder money
B) to protect against potential internet scams
C) to gain access to personal information
D) to fence illegal goods
Question
What term refers to the use of computer networks to illegally acquire privileged information?

A) e-tailing fraud
B) cyberterrorism
C) cyberwar
D) cyberespionage
Question
What is a method used by terrorist groups to acquire funds to carry out operations?

A) collecting donations using fraudulent charities websites
B) threatening existing organizations with a denial-of-service attack
C) using profits from illegal touting scams
D) using profits from selling illegal goods on the Internet
Question
Why is international cooperation required for the control of cybercrime?

A) It is too expensive to combat cybercrime on the national level.
B) Cybercrime can operate from anywhere in the world making it a global matter to control.
C) International efforts are required to detect cybercrime.
D) Recognizing cybercrime at the international level will act as more of a deterrent to cybercriminals.
Question
What is the name of the first international treaty that was created to address the cybercrime?

A) the Internet Crime Treaty
B) the Convention on Cybercrime
C) the Treaty of Cybercrime Enforcement
D) the Declaration of Cybercrime Prevention
Question
What is type of crime is website damage or defacement?

A) cybervandalism
B) cyberterrorism
C) cyberespionage
D) cybertheft
Question
What generally motivates cybervandals?

A) thrill
B) need
C) greed
D) malice
Question
Which reason often motivates Internet crimes?

A) revenge against an enemy
B) a need to exhibit technical skills and prowess
C) a need to spy on other people's private information
D) a need to make cash with computer ransom
Question
What type of threat is represented by Titan Rain?

A) cyberfraud
B) cyberterrorism
C) cyberespionage
D) cyberstalking
Question
Which of the following led to the emergence of a national gang syndicate?

A) the advent of the Internet
B) the implementation of prohibition
C) changing values in society
D) weak law enforcement strategies
Question
Besides narcotics distribution and Internet pornography, what generates most organized crime income?

A) charitable funds
B) terrorism
C) human trafficking
D) labour unions
Question
What term best describes international covert crime activities that involve large networks of people?

A) national crime organizations
B) the Mafia
C) international crime groups
D) transnational organized crime
Question
What term is used to describe a crime that is committed in more than one state by the same criminal organization?

A) international
B) transnational
C) regional
D) intercontinental
Question
Which statement does NOT describe the decline of Mafia power?

A) Reigning family heads are quite old.
B) The code of silence is now regularly broken by younger members.
C) Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D) Younger members are not as educated as earlier generations.
Question
Which statement best describes the current state of traditional organized crime syndicates?

A) They are thriving and gaining "membership."
B) They are eroding and in decline.
C) They are maintaining stability but only in large city "territories.
D) They are virtually nonexistent having been replaced by newer ethnic gangs.
Question
What is a main goal for transnational organized crime?

A) political change
B) economic gain
C) social transformation
D) exporting terrorism
Question
What has enabled the recent success of transnational organized crime?

A) social change
B) economic turmoil
C) tools of the internet
D) traditional forms of organization
Question
What type of crime have organized crime cartels recently become involved in?

A) pirating software
B) securities fraud
C) cyberespionage
D) cybertrafficking
Question
What is characteristic of a nation in which a transnational crime syndicate is most likely to develop?

A) a weak government with no effective methods of opposition
B) a corrupt government who is willing to work with the organization for a cut of the profits
C) areas with a stable economy and disposable income
D) areas with few existing crime syndicates to limit competition
Question
What is the main focus of eastern European gangs?

A) Internet securities fraud
B) political terrorism
C) drug smuggling
D) human trafficking
Question
In contrast to other international organizations, what crime is Russian organized crime more involved with?

A) money laundering
B) drug smuggling
C) human trafficking
D) illegal arms sales
Question
What crime is Russian organized crime less likely to be involved with?

A) human trafficking
B) healthcare fraud
C) drug trafficking
D) extortion
Question
How much in illegal drug proceeds do Mexican gangs annually smuggle in for laundering?

A) $10 million to $100 million
B) $100 million to $1 billion
C) $1 billion to $5 billion
D) $8 billion to $25 billion
Question
What crimes are Asian transnational organized gangs notorious for?

A) political corruption
B) illegal arms sales and terrorism
C) drug smuggling and human trafficking
D) corruption in industrial construction
Question
What kind of crime must carry with it the intent to disrupt and change the government and must not be a simple common-law crime committed for reasons of greed or egotism?

A) political crime
B) Marxist revolution
C) workplace violence
D) computer theft
Question
How do most political criminals characterize themselves?

A) vengeful
B) greedy
C) selfless
D) frustrated
Question
An individual who threatens an adversary in response to a difference in political opinion is engaging in what method to achieve their political goal?

A) oppression
B) coercion
C) bullying
D) intimidation
Question
What term is used to describe a political criminal who does not view their actions as criminal but rather in the best interest of society?

A) decisive
B) conviction
C) purposeful
D) intimidation
Question
What term is used to describe a political criminal whose actions are criminally motivated but disguises these motivations by presenting the actions as selfless and beneficial to society?

A) pseudo-conviction
B) pseudo-criminal
C) false-conviction
D) imitation-crime
Question
What term refers to the act of an individual or group who engages in actions with the purpose to topple the current government and replace it with their leader of choice?

A) revolution
B) democracy
C) equality
D) political harmony
Question
What type of election fraud is vandalizing a polling station in an attempt to scare individuals and to prevent individuals from voting an example of?

A) neutralization
B) espionage
C) intimidation
D) terrorism
Question
What term describes acts that are specifically designed to scare individuals away from polling stations to prevent them from casting their vote?

A) coercion
B) intimidation
C) anarchism
D) preventative tactics
Question
What type of election fraud is the circulation of incorrect information regarding the location of polling stations to voters registered with the opposing party in an attempt to prevent them from casting their vote?

A) misinformation
B) registration fraud
C) false advertising
D) disruption
Question
In the eighteenth century, what political crime was considered to be most serious?

A) election fraud
B) espionage
C) treason
D) desertion
Question
What term refers to the covert practice of obtaining confidential information from organizations without their knowledge?

A) treason
B) espionage
C) corruption
D) voyeurism
Question
What political crime was former FBI agent, Robert Hanssen, convicted of?

A) espionage
B) election fraud
C) transnational crimes
D) securities fraud
Question
What type of espionage is deliberately inserting an individual into a corporation with the purpose of extracting confidential information without the corporation's knowledge an example of?

A) economic
B) political
C) industrial
D) military
Question
What does the crime of terrorism emphasize in order to promote change?

A) rationality
B) violence
C) demonstrations
D) spying
Question
What is the purpose of terrorism?

A) to acquire profits for personal use
B) to demonstrate superiority over a competitor
C) to expose a vulnerability in a rival
D) to evoke change in the political party in power
Question
What distinguishes terrorism from conventional warfare?

A) Terrorism does not involve excessive war-like violence.
B) Terrorism requires secrecy and operations to exert control over large populations.
C) Terrorism is not a very organized crime.
D) Terrorism is less political in its nature than conventional warfare.
Question
The word "assassin" is derived from an Arabic term. What does it mean?

A) crazy man
B) hashish eater
C) political prisoner
D) killer of men
Question
In which historical period was terrorism more pervasive?

A) Elizabethan
B) Post Modern
C) Victorian
D) Middle Ages
Question
When did the word "terrorist" first become popular?

A) during the Second World War
B) during the Spanish Inquisition
C) during the French Revolution
D) during the plague in England
Question
Which of the following is characteristic of insurgents?

A) They engage in actions to maintain and promote the existing government.
B) The underlying motivation of any insurgent action is economic gain.
C) They engage in actions to oppose and undermine the existing government.
D) The purpose of insurgent action is to promote and maintain peace within the nation.
Question
What kind of terrorism has, as its ultimate goal, replacing an existing government with a regime that holds acceptable political views?

A) political
B) revolutionary
C) nationalistic
D) individualistic
Question
What kind of terrorist group is the Ku Klux Klan an example of?

A) non-political
B) nationalistic
C) political
D) state-sponsored
Question
Which type of terrorism is designed to promote the interests of minority ethnic groups or religious groups that believe they have been persecuted under majority rule?

A) state-sponsored
B) non-political
C) nationalistic
D) revolutionary
Question
Which of the following is the best-known nationalistic terrorist group from Ireland?

A) the Irish Battalion of the Poor
B) the Provisional Irish Republican Army
C) the Liberation Front of Ireland
D) the Irish Nationalists
Question
What kind of terrorism is exemplified by anti-abortion groups sponsoring demonstrations at abortion clinics, attacking clinics, and killing doctors with bombs?

A) justifiable
B) non-political
C) nationalistic
D) state-sponsored
Question
What kind of terrorism is represented by a repressive government regime forcing its citizens into obedience, oppressing minorities, and stifling political dissent?

A) nationalistic
B) state-sponsored
C) political
D) non-political
Question
State-sponsored terrorism includes a type of violence which involves physical harm caused by the unequal distribution of wealth. What is this type of violence called?

A) feministic
B) structural
C) patriarchal
D) unstructured
Question
What is the most extreme form of state-sponsored terrorism?

A) hijacking
B) genocide
C) structural
D) catastrophic
Question
What kind of terrorism involves individuals engaging in acts of violence as a way to demonstrate their loyalty to a group leader?

A) non-political
B) political
C) cult
D) patriotic
Question
How do leaders of cult terror groups ensure obedience from group members?

A) severe discipline
B) positive reinforcement
C) cultivating a supportive environment
D) engaging in open dialogue
Question
What organization uses the acronym "ALF"?

A) Albanian Liberation Front
B) Armenian Liberty Foundation
C) Animal Liberation Front
D) Activism, Liberty, and Freedom
Question
What is NOT a condition that has preceded genocide in Western societies?

A) authority orientation
B) "just world" thinking
C) new ideology
D) high levels of mental illness
Question
What term refers to the organizational structure of a group in which the group is subdivided into smaller independent groups as a means to enhance security?

A) insurgent cell
B) militant cell
C) terror cell
D) guerrilla cell
Question
Which of the following factors may influence the formation of a terror cell?

A) socioeconomic status
B) personality type
C) educational background
D) family membership
Question
What term refers to loosely organized groups with diverse leadership who are dispersed across a range of locations?

A) networks
B) webs
C) colonies
D) districts
Question
Which statement describes a characteristic of terrorist networks?

A) They follow a hierarchical model of leadership.
B) Most members are inexperienced.
C) They have access to vast amount of resources.
D) They are very well funded.
Question
Terrorists may be motivated by feelings of alienation. What do they feel?

A) lost in the complexities of modern society
B) secure in their violent role
C) that their actions are wrong, but necessary
D) fearful to begin their actions
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/110
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Crimes in the 21st Century
1
Which statement best summarizes the challenges associated with creating a typology of high-tech crime?

A) The crimes are so complicated it is difficult for others to understand.
B) There are so few types of high-tech crimes that it is difficult to derive enough categories.
C) The crimes are complex and contain many elements making it difficult to create distinct categories.
D) The crimes are so similar to white-collar crime that it is difficult to create a unique typology that is distinct from existing typologies.
The crimes are complex and contain many elements making it difficult to create distinct categories.
2
Which global system is information technology (IT) the key to?

A) business
B) Internet
C) economic
D) social
economic
3
Cybercrime presents a compelling challenge for the justice system and law enforcement community. Which statement does NOT accurately describe the challenge cybercrime creates?

A) Cybercrime is rapidly evolving with new schemes being created daily.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Cybercrime necessitates a lighter sentence due to limited state and federal laws.
4
What type of cybercriminal is motivated by the desire to commit technological destruction?

A) cyberterrorist
B) cybervandal
C) cybertheft
D) cyberspy
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
5
Why is it difficult to calculate an accurate computer crime rate?

A) Computer crime is often not reported by companies.
B) Most companies exaggerate the amount of computer crime.
C) Most companies are involved in computer crime and do not want to implicit themselves.
D) Police are not interested in computer crime because it is a private matter.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
6
What percentage of attacks on businesses is estimated to be in the e-commerce area?

A) 4
B) 16
C) 55
D) 61
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
7
What term refers to the situation in which pornography websites send consumers to other sites involuntarily?

A) tripping
B) mousetrapping
C) slagging
D) ping-ponging
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
8
What type of computer crime uses a computer to reprogram another for illicit purposes; for example, telling a bank computer to put deposits in the criminal's accounts?

A) salami slice
B) super zapping
C) Trojan horse
D) logic bomb
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
9
What term refers to the use of a maintenance subroutine to supersede an antitheft program?

A) salami slicing
B) super-zapping
C) interroutining
D) program redundancy
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
10
A virus program is secretly attached to the company's computer system. What type of computer crime is this an example of?

A) computer voyeurism
B) data leakage
C) the logic bomb
D) super-zapping
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
11
What type of computer program disrupts or destroys existing programs and networks?

A) logic bomb
B) trap door
C) virus
D) Trojan horse
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
12
In 1986, the first bootable PC virus was released. What was the virus called?

A) Melissa macro
B) Hacker's haven
C) the Brain
D) Morris worm
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
13
In 2003, which Internet "worm" infected hundreds of thousands of computers as the fastest spreading worm in history?

A) Trojan
B) Morris
C) Slammer
D) Earth
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
14
In 2004, the first webworm was launched which used Google to find new targets. What was the worm called?

A) Sony
B) Daprosy
C) Laroux
D) Santy
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
15
What term is used to describe the intentional manipulation of the securities marketplace through the use of the Internet for the purposes of profit?

A) Internet fraud
B) Internet manipulation
C) e-fraud
D) electronic fraud
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
16
George posts negative information about a particular company in an attempt to reduce stock price. Once the price has lowered, George purchases the stock before the company is able to reverse the negative damage and re-inflate the stock price. What crime has George committed?

A) fraudulent stock exchange
B) illegal touting
C) illegal infringement
D) market manipulation
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
17
Identity theft is a type of cybercrime that has grown at surprising rates over the past few years. Which statement does NOT accurately describe identity theft?

A) Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B) Opening new lines of credit is the most common goals of credit card thieves.
C) Some identity theft schemes are extremely elaborate.
D) Much is known about the extent of identity theft.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a common phishing scam?

A) account verification scams in which the victim is directed to a bogus website by clicking the legitimate-looking address
B) the Nigerian 419 scam in which an alleged representative of a foreign government asking the victim to help move money from one account to another
C) a free credit report through Experian, TransUnion, and Equifax
D) an e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
19
Which term refers to phishing; that is, the act of setting up phony websites to gain access to personal information?

A) e-hooking
B) e-tailing
C) vishing
D) spoofing
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
20
What is the purpose of phishing?

A) to make connections in order launder money
B) to protect against potential internet scams
C) to gain access to personal information
D) to fence illegal goods
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
21
What term refers to the use of computer networks to illegally acquire privileged information?

A) e-tailing fraud
B) cyberterrorism
C) cyberwar
D) cyberespionage
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
22
What is a method used by terrorist groups to acquire funds to carry out operations?

A) collecting donations using fraudulent charities websites
B) threatening existing organizations with a denial-of-service attack
C) using profits from illegal touting scams
D) using profits from selling illegal goods on the Internet
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
23
Why is international cooperation required for the control of cybercrime?

A) It is too expensive to combat cybercrime on the national level.
B) Cybercrime can operate from anywhere in the world making it a global matter to control.
C) International efforts are required to detect cybercrime.
D) Recognizing cybercrime at the international level will act as more of a deterrent to cybercriminals.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
24
What is the name of the first international treaty that was created to address the cybercrime?

A) the Internet Crime Treaty
B) the Convention on Cybercrime
C) the Treaty of Cybercrime Enforcement
D) the Declaration of Cybercrime Prevention
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
25
What is type of crime is website damage or defacement?

A) cybervandalism
B) cyberterrorism
C) cyberespionage
D) cybertheft
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
26
What generally motivates cybervandals?

A) thrill
B) need
C) greed
D) malice
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
27
Which reason often motivates Internet crimes?

A) revenge against an enemy
B) a need to exhibit technical skills and prowess
C) a need to spy on other people's private information
D) a need to make cash with computer ransom
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
28
What type of threat is represented by Titan Rain?

A) cyberfraud
B) cyberterrorism
C) cyberespionage
D) cyberstalking
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following led to the emergence of a national gang syndicate?

A) the advent of the Internet
B) the implementation of prohibition
C) changing values in society
D) weak law enforcement strategies
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
30
Besides narcotics distribution and Internet pornography, what generates most organized crime income?

A) charitable funds
B) terrorism
C) human trafficking
D) labour unions
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
31
What term best describes international covert crime activities that involve large networks of people?

A) national crime organizations
B) the Mafia
C) international crime groups
D) transnational organized crime
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
32
What term is used to describe a crime that is committed in more than one state by the same criminal organization?

A) international
B) transnational
C) regional
D) intercontinental
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
33
Which statement does NOT describe the decline of Mafia power?

A) Reigning family heads are quite old.
B) The code of silence is now regularly broken by younger members.
C) Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D) Younger members are not as educated as earlier generations.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
34
Which statement best describes the current state of traditional organized crime syndicates?

A) They are thriving and gaining "membership."
B) They are eroding and in decline.
C) They are maintaining stability but only in large city "territories.
D) They are virtually nonexistent having been replaced by newer ethnic gangs.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
35
What is a main goal for transnational organized crime?

A) political change
B) economic gain
C) social transformation
D) exporting terrorism
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
36
What has enabled the recent success of transnational organized crime?

A) social change
B) economic turmoil
C) tools of the internet
D) traditional forms of organization
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
37
What type of crime have organized crime cartels recently become involved in?

A) pirating software
B) securities fraud
C) cyberespionage
D) cybertrafficking
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
38
What is characteristic of a nation in which a transnational crime syndicate is most likely to develop?

A) a weak government with no effective methods of opposition
B) a corrupt government who is willing to work with the organization for a cut of the profits
C) areas with a stable economy and disposable income
D) areas with few existing crime syndicates to limit competition
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
39
What is the main focus of eastern European gangs?

A) Internet securities fraud
B) political terrorism
C) drug smuggling
D) human trafficking
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
40
In contrast to other international organizations, what crime is Russian organized crime more involved with?

A) money laundering
B) drug smuggling
C) human trafficking
D) illegal arms sales
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
41
What crime is Russian organized crime less likely to be involved with?

A) human trafficking
B) healthcare fraud
C) drug trafficking
D) extortion
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
42
How much in illegal drug proceeds do Mexican gangs annually smuggle in for laundering?

A) $10 million to $100 million
B) $100 million to $1 billion
C) $1 billion to $5 billion
D) $8 billion to $25 billion
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
43
What crimes are Asian transnational organized gangs notorious for?

A) political corruption
B) illegal arms sales and terrorism
C) drug smuggling and human trafficking
D) corruption in industrial construction
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
44
What kind of crime must carry with it the intent to disrupt and change the government and must not be a simple common-law crime committed for reasons of greed or egotism?

A) political crime
B) Marxist revolution
C) workplace violence
D) computer theft
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
45
How do most political criminals characterize themselves?

A) vengeful
B) greedy
C) selfless
D) frustrated
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
46
An individual who threatens an adversary in response to a difference in political opinion is engaging in what method to achieve their political goal?

A) oppression
B) coercion
C) bullying
D) intimidation
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
47
What term is used to describe a political criminal who does not view their actions as criminal but rather in the best interest of society?

A) decisive
B) conviction
C) purposeful
D) intimidation
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
48
What term is used to describe a political criminal whose actions are criminally motivated but disguises these motivations by presenting the actions as selfless and beneficial to society?

A) pseudo-conviction
B) pseudo-criminal
C) false-conviction
D) imitation-crime
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
49
What term refers to the act of an individual or group who engages in actions with the purpose to topple the current government and replace it with their leader of choice?

A) revolution
B) democracy
C) equality
D) political harmony
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
50
What type of election fraud is vandalizing a polling station in an attempt to scare individuals and to prevent individuals from voting an example of?

A) neutralization
B) espionage
C) intimidation
D) terrorism
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
51
What term describes acts that are specifically designed to scare individuals away from polling stations to prevent them from casting their vote?

A) coercion
B) intimidation
C) anarchism
D) preventative tactics
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
52
What type of election fraud is the circulation of incorrect information regarding the location of polling stations to voters registered with the opposing party in an attempt to prevent them from casting their vote?

A) misinformation
B) registration fraud
C) false advertising
D) disruption
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
53
In the eighteenth century, what political crime was considered to be most serious?

A) election fraud
B) espionage
C) treason
D) desertion
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
54
What term refers to the covert practice of obtaining confidential information from organizations without their knowledge?

A) treason
B) espionage
C) corruption
D) voyeurism
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
55
What political crime was former FBI agent, Robert Hanssen, convicted of?

A) espionage
B) election fraud
C) transnational crimes
D) securities fraud
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
56
What type of espionage is deliberately inserting an individual into a corporation with the purpose of extracting confidential information without the corporation's knowledge an example of?

A) economic
B) political
C) industrial
D) military
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
57
What does the crime of terrorism emphasize in order to promote change?

A) rationality
B) violence
C) demonstrations
D) spying
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
58
What is the purpose of terrorism?

A) to acquire profits for personal use
B) to demonstrate superiority over a competitor
C) to expose a vulnerability in a rival
D) to evoke change in the political party in power
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
59
What distinguishes terrorism from conventional warfare?

A) Terrorism does not involve excessive war-like violence.
B) Terrorism requires secrecy and operations to exert control over large populations.
C) Terrorism is not a very organized crime.
D) Terrorism is less political in its nature than conventional warfare.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
60
The word "assassin" is derived from an Arabic term. What does it mean?

A) crazy man
B) hashish eater
C) political prisoner
D) killer of men
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
61
In which historical period was terrorism more pervasive?

A) Elizabethan
B) Post Modern
C) Victorian
D) Middle Ages
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
62
When did the word "terrorist" first become popular?

A) during the Second World War
B) during the Spanish Inquisition
C) during the French Revolution
D) during the plague in England
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is characteristic of insurgents?

A) They engage in actions to maintain and promote the existing government.
B) The underlying motivation of any insurgent action is economic gain.
C) They engage in actions to oppose and undermine the existing government.
D) The purpose of insurgent action is to promote and maintain peace within the nation.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
64
What kind of terrorism has, as its ultimate goal, replacing an existing government with a regime that holds acceptable political views?

A) political
B) revolutionary
C) nationalistic
D) individualistic
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
65
What kind of terrorist group is the Ku Klux Klan an example of?

A) non-political
B) nationalistic
C) political
D) state-sponsored
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
66
Which type of terrorism is designed to promote the interests of minority ethnic groups or religious groups that believe they have been persecuted under majority rule?

A) state-sponsored
B) non-political
C) nationalistic
D) revolutionary
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is the best-known nationalistic terrorist group from Ireland?

A) the Irish Battalion of the Poor
B) the Provisional Irish Republican Army
C) the Liberation Front of Ireland
D) the Irish Nationalists
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
68
What kind of terrorism is exemplified by anti-abortion groups sponsoring demonstrations at abortion clinics, attacking clinics, and killing doctors with bombs?

A) justifiable
B) non-political
C) nationalistic
D) state-sponsored
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
69
What kind of terrorism is represented by a repressive government regime forcing its citizens into obedience, oppressing minorities, and stifling political dissent?

A) nationalistic
B) state-sponsored
C) political
D) non-political
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
70
State-sponsored terrorism includes a type of violence which involves physical harm caused by the unequal distribution of wealth. What is this type of violence called?

A) feministic
B) structural
C) patriarchal
D) unstructured
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
71
What is the most extreme form of state-sponsored terrorism?

A) hijacking
B) genocide
C) structural
D) catastrophic
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
72
What kind of terrorism involves individuals engaging in acts of violence as a way to demonstrate their loyalty to a group leader?

A) non-political
B) political
C) cult
D) patriotic
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
73
How do leaders of cult terror groups ensure obedience from group members?

A) severe discipline
B) positive reinforcement
C) cultivating a supportive environment
D) engaging in open dialogue
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
74
What organization uses the acronym "ALF"?

A) Albanian Liberation Front
B) Armenian Liberty Foundation
C) Animal Liberation Front
D) Activism, Liberty, and Freedom
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
75
What is NOT a condition that has preceded genocide in Western societies?

A) authority orientation
B) "just world" thinking
C) new ideology
D) high levels of mental illness
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
76
What term refers to the organizational structure of a group in which the group is subdivided into smaller independent groups as a means to enhance security?

A) insurgent cell
B) militant cell
C) terror cell
D) guerrilla cell
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following factors may influence the formation of a terror cell?

A) socioeconomic status
B) personality type
C) educational background
D) family membership
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
78
What term refers to loosely organized groups with diverse leadership who are dispersed across a range of locations?

A) networks
B) webs
C) colonies
D) districts
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
79
Which statement describes a characteristic of terrorist networks?

A) They follow a hierarchical model of leadership.
B) Most members are inexperienced.
C) They have access to vast amount of resources.
D) They are very well funded.
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
80
Terrorists may be motivated by feelings of alienation. What do they feel?

A) lost in the complexities of modern society
B) secure in their violent role
C) that their actions are wrong, but necessary
D) fearful to begin their actions
Unlock Deck
Unlock for access to all 110 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 110 flashcards in this deck.