Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Intro to CJ Chap 16

Crime and Criminal Justice in the New Millennium

QuestionAnswer
__________ is the process of creating transnational markets and political and legal systems and has shifted the focus of crime from a local to a world perspective. Globalization
Globalization has allowed both ____ and _______ tremendous operational benefits and has reduced the risks of apprehension and punishment. Individual offenders and Criminal Gangs
The term ________ was first used in the late 1930’s and described criminal activities by the rich and powerful White-Collar Crime
As time passed the definition of white-collar crime has expanded to include almost any type of business-related crime and is today referred to as ____________. Corporate Enterprise Crime
Probably one of the most well-known corporate enterprise criminals is Bernard Madoff who orchestrated a huge ____________. Ponzi Scheme
Market manipulation, high yield investment fraud, advance fee fraud, hedge fund fraud, commodities fraud, foreign exchange fraud, broker embezzlement, and late-day trading are all included in ____ schemes. Wall Street Fraud
Scams designed to prey upon people who obtained mortgages and now cannot _____________. Make Payments
These types of scams are designed to prey upon people who have difficulty paying for their home. They include bait and switch, bailout, phantom help. _____ Foreclosure Rescue Scams
________ is where the builders offer an incentive of a mortgage with no down payment in order to get them to buy a house they normally could not afford. Builder-Bailout Schemes
Home builders who engage in fraud in order to __ Unload unsold homes
Sometimes executives in large corporations take advantage of their position to engage in _______________ frauds, which may involve falsifying information for their own financial benefit. Management
The _____________ case, Enron case, WorldCom case are examples of management fraud that has involved some of the nation's largest companies and richest people. Tyco international
__ avoid stigmatizing and shaming businesspeople by focusing on the act, rather than the actor. Civil Law Strategies
Threat to economic sanctions or __________ to control potential violators and gain their compliance with regulations. Civil Penalties
With _______________ the justice system personnel and the general public now consider corporate crimes as more serious than common-law theft offenses and the perpetrators as deserving of severe punishment. Criminal Law Strategies
Rely on the threat of _____________ to deter other would-be violators. Punishment of individual offenders
Enforcement of _________ include the Securities and Exchange Commission oversees the nation's capital markets, protects investors and maintains fair economic markets. Corporate Crime laws
______is a relatively new breed of offenses that can be singular or ongoing. Cybercrime
Involves the ___of information, resources, or funds utilizing computers, computer networks or the Internet. Theft and/or destruction
____, it is difficult to detect through traditional law enforcement channels and to control it, and agents must develop technical skills that match those of the perpetrators. It is rapidly evolving
Three types of cybercrime are: __ Cybertheft, Cyber vandalism and Cyberwarfare__.
_________: Cybercrimes for profit. Cybertheft
Schemes range from ___ protection to using technology to commit traditional theft-based offenses such as larceny and fraud. Illegally copying material under Copyright
Some of the most common methods of Cyber Theft are: Computer Fraud, Copyright Infringement ,Internet Securities Fraud, Identity Theft, ETailing Fraud
for information Hacking
____ it’s copyright protections before posting it on the internet for other members of the group to see. Obtaining software illegally and then “crack”
The ______ material is called _________. Pirated, Warez
Penalties for first-time offenders are incarceration for ____ and a fine of________ 5 years and a fine of __$250,000________.
Involves the use of the internet to intentionally __Manipulate________. the Securities marketplace for profit
The three major types of Internet securities fraud common today are ____ Market Manipulation, fraudulent offerings of securities, and illegal touting.
Identity theft occurs when a person uses the Internet to__________ and/or impersonate the victim to open a new credit card account or conduct some other financial transaction Steal someone’s Identity
Etailing can involve both _______and_____ merchandise illegally on the Internet. Buying and Selling
These can include __________ promised purchases or services as well as substituting cheaper or used material for higher-quality purchases. Failure to deliver
The ______ to free speech makes legal control of pornography quite difficult. First Amendment right
Cyber-vandalism is ___ Cybercrime with Malicious Intent
Cyber-vandalism includes the ___, web defacement and denial-of-service attacks. Introduction of Viruses and Worms
Viruses and Worms are also known as ______. Malware
Trojan Horse is a program that looks like a benign application but it contains illicit codes that can _____ Damage the systems operation
Denial-of- ______Attack. Service
Users of an Internet service are ______ to that service; there are disruption connections within a network, or a disruption of service to a specific system or person Prevented from access
Web __ Defacement
Target the ___ Websites
A computer hacker __________on another person’s website by inserting or substituting codes that expose visitors to the site to misleading or provocative information. Intrudes
___ uses the Internet, email, or other electronic communications devices to Stalk or harass another person. Cyberstalking
The willful and Repeated Harm inflicted through the medium of electronic text is known as ______. Cyberbullying
There are _____ major approaches that cyberbullies employ to harass their victims. 4
Bullies can _____ or instant messages. Send harassing e-mails
They can ____ on social networking sites. Post obscene, insulting, and slanderous messages
They can ___ and disseminate defamatory content. Develop websites to promote
They can _________to the victim via cell phones. Send harassing text messages
______may involve the use of Computer network tools to shut down critical national infrastructures or to coerce or intimidate a government or civilian population. Cyberwarfare
The extent and costs of ____________. Cybercrime
Losses are in the ________ and continue to rise with the growth of e-commerce. Billions
New Laws and enforcement processes have been created to aid in controlling ___________. Cybercrime
Software ___________, the government has actively pursued members of the W rez Community. Piracy
U.S. Criminal Code provides penalties for a first-time illegal copyright offender of five years incarceration and a fine of ____________. $250,000
The ______ Penalty Enhancement Act of 2004 establishes aggravated identity as an offense which have mandatory penalties of an extra two years of prison with no possibility of parole. Identity Theft
Child Online Protection Act bans web postings of material deemed _________. Harmful to minors
Counterfeit Access Device and Computer Fraud and Abuse Law was passed in ____ which established computer-related crimes as distinct federal offenses. 1984
When enforcing laws against cybercrime most of the efforts are at the __________. Federal level
______ are being created to fight cybercrime. Specialized agencies
Use of _________ to gain profit in the global marketplace, typically involving the cross-border sale and distribution of illegal commodities Illegal tactics
Transnational groups use ________ and corruption to achieve their goals. They are also involved in Money laundering, human trafficking, cybercrime, and trafficking of drugs, weapons, endangered species, body parts, or nuclear materials. Systematic violence
Among the best known groups of Transnational Crime groups are Yakuza, Fuk Ching, Triads, Heijin, Jao Pho, and Red Wa, as well as the Russian Mob and the ___ Mexican drug trafficking cartels
With Russian Transnational Crime __________ is common Massive money laundering
An estimated 90% of______ entering the U.S. travels through Mexico. Cocaine
______ is very common. Money laundering
Controlling Transnational crime efforts are typically in the hands of ___ Federal Agencies
__ is federal Legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in 2 or more acts prohibited by 24 existing federal and 8 state laws. RICO
Today, terrorism is difficult to define and separating terrorist acts from _____ Interpersonal crimes of violence is difficult
________ means terrorism involving citizens or the territory of more than one country. International terrorism
Terrorism requires ________ and clandestine operations. Secrecy
There is no _______or behavior pattern that distinguishes the majority of terrorists or sets them apart. Single personality trait
The typical terrorist can be described as an ____ individual who acts out his or her psychoses within the confines of violent groups. Emotionally Disturbed_
Terrorists have been raised to __________, and they learn at an early age that they have been victimized by some oppressor. Hate their opponents
Terrorists hold _______ that prompt their behavior. Extreme ideological beliefs
They believe that they ______ to encourage change. May resort to violence
Terrorist operatives are ________. Not poor or lacking in education
__________ -Groups that use violence to Frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views. Contemporary Terrorist
Political terrorism is directed at people or groups who ______ the terrorists’ political ideology or who are defined by the terrorists as outsiders who must be destroyed. oppose
Nationalist terrorism are groups whose actions promote the interests of a ___________ that has been persecuted under majority rule and/or wishes to crave out its own independence homeland. Minority ethnic or religious group
__ groups that use violence as a method of Influence, Persuasion, or Intimidation in order to force its citizens into obedience, oppress minorities, and stifle political dissent. Retributive terrorism
Cult terrorism are cults whos leaders demand that _______ prove their loyalty through violence or intimidation Followers
Criminal Terrorism groups that become involved in common-law crimes such as _______ or even selling nuclear materials. Drug Dealing and Kidnapping
Category I cases involve violations that are directly related to international terrorism such as the use of weapons or mass destruction, conspiracy to murder overseas, and __________. bombing of public places
Category II cases include defendants charged with violating a variety of other statues where the investigation is linked to _______, such as fraud, immigration, firearms, drugs, false statements, and conspiracy. international terrorism
After _______, the Supreme ruled that the due process clause of the 5th Amendment requires that U.S. citizens be given the opportunity to challenge their confinement. 9/11
The court has also decided that the federal courts have jurisdiction to hear ______ petitions from foreign nationals captured outside the United States. Habeas Corpus
When predicting the future, several organizations are involved in _____and Forecasting. long-range planning
The population is _____. Aging
Surveillance technologies, _____ and DNA analysis will continue to evolve and improve. Biometric tools
93. The number of ___________ continues to grow. Foreign- born Americans
94. This _________ will exert pressures on criminal justice Diversity
___ practices will continue to gain steam as taxpayers increase their efforts to hold the government accountable for Spending Evidence- based
Criminal justice agencies will be required to ______ with less funding. do more
__ will continue to be challenged and international criminal syndicates will continue to pose threats. Boundaries
Emerging industrial nations will continue to vie for ____ Scarce resources
Critical criminologists and ______ have long called attention to a variety of environmental threats that they feel should be deemed criminal. Environmental Activists
__Overdevelopment, population growth, and other changes will continue to bring these issues front and center. Global warming
___ is certain to impact crime and criminal justice. Continued immigration
New laws continue to be passed and challenged concerning the criminal justice system and __________________. Illegal Immigration
Created by: Jalessi
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards