click below
click below
Normal Size Small Size show me how
Intro to CJ Chap 16
Crime and Criminal Justice in the New Millennium
| Question | Answer |
|---|---|
| __________ is the process of creating transnational markets and political and legal systems and has shifted the focus of crime from a local to a world perspective. | Globalization |
| Globalization has allowed both ____ and _______ tremendous operational benefits and has reduced the risks of apprehension and punishment. | Individual offenders and Criminal Gangs |
| The term ________ was first used in the late 1930’s and described criminal activities by the rich and powerful | White-Collar Crime |
| As time passed the definition of white-collar crime has expanded to include almost any type of business-related crime and is today referred to as ____________. | Corporate Enterprise Crime |
| Probably one of the most well-known corporate enterprise criminals is Bernard Madoff who orchestrated a huge ____________. | Ponzi Scheme |
| Market manipulation, high yield investment fraud, advance fee fraud, hedge fund fraud, commodities fraud, foreign exchange fraud, broker embezzlement, and late-day trading are all included in ____ schemes. | Wall Street Fraud |
| Scams designed to prey upon people who obtained mortgages and now cannot _____________. | Make Payments |
| These types of scams are designed to prey upon people who have difficulty paying for their home. They include bait and switch, bailout, phantom help. _____ | Foreclosure Rescue Scams |
| ________ is where the builders offer an incentive of a mortgage with no down payment in order to get them to buy a house they normally could not afford. | Builder-Bailout Schemes |
| Home builders who engage in fraud in order to __ | Unload unsold homes |
| Sometimes executives in large corporations take advantage of their position to engage in _______________ frauds, which may involve falsifying information for their own financial benefit. | Management |
| The _____________ case, Enron case, WorldCom case are examples of management fraud that has involved some of the nation's largest companies and richest people. | Tyco international |
| __ avoid stigmatizing and shaming businesspeople by focusing on the act, rather than the actor. | Civil Law Strategies |
| Threat to economic sanctions or __________ to control potential violators and gain their compliance with regulations. | Civil Penalties |
| With _______________ the justice system personnel and the general public now consider corporate crimes as more serious than common-law theft offenses and the perpetrators as deserving of severe punishment. | Criminal Law Strategies |
| Rely on the threat of _____________ to deter other would-be violators. | Punishment of individual offenders |
| Enforcement of _________ include the Securities and Exchange Commission oversees the nation's capital markets, protects investors and maintains fair economic markets. | Corporate Crime laws |
| ______is a relatively new breed of offenses that can be singular or ongoing. | Cybercrime |
| Involves the ___of information, resources, or funds utilizing computers, computer networks or the Internet. | Theft and/or destruction |
| ____, it is difficult to detect through traditional law enforcement channels and to control it, and agents must develop technical skills that match those of the perpetrators. | It is rapidly evolving |
| Three types of cybercrime are: __ | Cybertheft, Cyber vandalism and Cyberwarfare__. |
| _________: Cybercrimes for profit. | Cybertheft |
| Schemes range from ___ protection to using technology to commit traditional theft-based offenses such as larceny and fraud. | Illegally copying material under Copyright |
| Some of the most common methods of Cyber Theft are: | Computer Fraud, Copyright Infringement ,Internet Securities Fraud, Identity Theft, ETailing Fraud |
| for information | Hacking |
| ____ it’s copyright protections before posting it on the internet for other members of the group to see. | Obtaining software illegally and then “crack” |
| The ______ material is called _________. | Pirated, Warez |
| Penalties for first-time offenders are incarceration for ____ and a fine of________ | 5 years and a fine of __$250,000________. |
| Involves the use of the internet to intentionally __Manipulate________. | the Securities marketplace for profit |
| The three major types of Internet securities fraud common today are ____ | Market Manipulation, fraudulent offerings of securities, and illegal touting. |
| Identity theft occurs when a person uses the Internet to__________ and/or impersonate the victim to open a new credit card account or conduct some other financial transaction | Steal someone’s Identity |
| Etailing can involve both _______and_____ merchandise illegally on the Internet. | Buying and Selling |
| These can include __________ promised purchases or services as well as substituting cheaper or used material for higher-quality purchases. | Failure to deliver |
| The ______ to free speech makes legal control of pornography quite difficult. | First Amendment right |
| Cyber-vandalism is ___ | Cybercrime with Malicious Intent |
| Cyber-vandalism includes the ___, web defacement and denial-of-service attacks. | Introduction of Viruses and Worms |
| Viruses and Worms are also known as ______. | Malware |
| Trojan Horse is a program that looks like a benign application but it contains illicit codes that can _____ | Damage the systems operation |
| Denial-of- ______Attack. | Service |
| Users of an Internet service are ______ to that service; there are disruption connections within a network, or a disruption of service to a specific system or person | Prevented from access |
| Web __ | Defacement |
| Target the ___ | Websites |
| A computer hacker __________on another person’s website by inserting or substituting codes that expose visitors to the site to misleading or provocative information. | Intrudes |
| ___ uses the Internet, email, or other electronic communications devices to Stalk or harass another person. | Cyberstalking |
| The willful and Repeated Harm inflicted through the medium of electronic text is known as ______. | Cyberbullying |
| There are _____ major approaches that cyberbullies employ to harass their victims. | 4 |
| Bullies can _____ or instant messages. | Send harassing e-mails |
| They can ____ on social networking sites. | Post obscene, insulting, and slanderous messages |
| They can ___ and disseminate defamatory content. | Develop websites to promote |
| They can _________to the victim via cell phones. | Send harassing text messages |
| ______may involve the use of Computer network tools to shut down critical national infrastructures or to coerce or intimidate a government or civilian population. | Cyberwarfare |
| The extent and costs of ____________. | Cybercrime |
| Losses are in the ________ and continue to rise with the growth of e-commerce. | Billions |
| New Laws and enforcement processes have been created to aid in controlling ___________. | Cybercrime |
| Software ___________, the government has actively pursued members of the W rez Community. | Piracy |
| U.S. Criminal Code provides penalties for a first-time illegal copyright offender of five years incarceration and a fine of ____________. | $250,000 |
| The ______ Penalty Enhancement Act of 2004 establishes aggravated identity as an offense which have mandatory penalties of an extra two years of prison with no possibility of parole. | Identity Theft |
| Child Online Protection Act bans web postings of material deemed _________. | Harmful to minors |
| Counterfeit Access Device and Computer Fraud and Abuse Law was passed in ____ which established computer-related crimes as distinct federal offenses. | 1984 |
| When enforcing laws against cybercrime most of the efforts are at the __________. | Federal level |
| ______ are being created to fight cybercrime. | Specialized agencies |
| Use of _________ to gain profit in the global marketplace, typically involving the cross-border sale and distribution of illegal commodities | Illegal tactics |
| Transnational groups use ________ and corruption to achieve their goals. They are also involved in Money laundering, human trafficking, cybercrime, and trafficking of drugs, weapons, endangered species, body parts, or nuclear materials. | Systematic violence |
| Among the best known groups of Transnational Crime groups are Yakuza, Fuk Ching, Triads, Heijin, Jao Pho, and Red Wa, as well as the Russian Mob and the ___ | Mexican drug trafficking cartels |
| With Russian Transnational Crime __________ is common | Massive money laundering |
| An estimated 90% of______ entering the U.S. travels through Mexico. | Cocaine |
| ______ is very common. | Money laundering |
| Controlling Transnational crime efforts are typically in the hands of ___ | Federal Agencies |
| __ is federal Legislation that enables prosecutors to bring additional criminal or civil charges against people engaged in 2 or more acts prohibited by 24 existing federal and 8 state laws. | RICO |
| Today, terrorism is difficult to define and separating terrorist acts from _____ | Interpersonal crimes of violence is difficult |
| ________ means terrorism involving citizens or the territory of more than one country. | International terrorism |
| Terrorism requires ________ and clandestine operations. | Secrecy |
| There is no _______or behavior pattern that distinguishes the majority of terrorists or sets them apart. | Single personality trait |
| The typical terrorist can be described as an ____ individual who acts out his or her psychoses within the confines of violent groups. | Emotionally Disturbed_ |
| Terrorists have been raised to __________, and they learn at an early age that they have been victimized by some oppressor. | Hate their opponents |
| Terrorists hold _______ that prompt their behavior. | Extreme ideological beliefs |
| They believe that they ______ to encourage change. | May resort to violence |
| Terrorist operatives are ________. | Not poor or lacking in education |
| __________ -Groups that use violence to Frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views. | Contemporary Terrorist |
| Political terrorism is directed at people or groups who ______ the terrorists’ political ideology or who are defined by the terrorists as outsiders who must be destroyed. | oppose |
| Nationalist terrorism are groups whose actions promote the interests of a ___________ that has been persecuted under majority rule and/or wishes to crave out its own independence homeland. | Minority ethnic or religious group |
| __ groups that use violence as a method of Influence, Persuasion, or Intimidation in order to force its citizens into obedience, oppress minorities, and stifle political dissent. | Retributive terrorism |
| Cult terrorism are cults whos leaders demand that _______ prove their loyalty through violence or intimidation | Followers |
| Criminal Terrorism groups that become involved in common-law crimes such as _______ or even selling nuclear materials. | Drug Dealing and Kidnapping |
| Category I cases involve violations that are directly related to international terrorism such as the use of weapons or mass destruction, conspiracy to murder overseas, and __________. | bombing of public places |
| Category II cases include defendants charged with violating a variety of other statues where the investigation is linked to _______, such as fraud, immigration, firearms, drugs, false statements, and conspiracy. | international terrorism |
| After _______, the Supreme ruled that the due process clause of the 5th Amendment requires that U.S. citizens be given the opportunity to challenge their confinement. | 9/11 |
| The court has also decided that the federal courts have jurisdiction to hear ______ petitions from foreign nationals captured outside the United States. | Habeas Corpus |
| When predicting the future, several organizations are involved in _____and Forecasting. | long-range planning |
| The population is _____. | Aging |
| Surveillance technologies, _____ and DNA analysis will continue to evolve and improve. | Biometric tools |
| 93. The number of ___________ continues to grow. | Foreign- born Americans |
| 94. This _________ will exert pressures on criminal justice | Diversity |
| ___ practices will continue to gain steam as taxpayers increase their efforts to hold the government accountable for Spending | Evidence- based |
| Criminal justice agencies will be required to ______ with less funding. | do more |
| __ will continue to be challenged and international criminal syndicates will continue to pose threats. | Boundaries |
| Emerging industrial nations will continue to vie for ____ | Scarce resources |
| Critical criminologists and ______ have long called attention to a variety of environmental threats that they feel should be deemed criminal. | Environmental Activists |
| __Overdevelopment, population growth, and other changes will continue to bring these issues front and center. | Global warming |
| ___ is certain to impact crime and criminal justice. | Continued immigration |
| New laws continue to be passed and challenged concerning the criminal justice system and __________________. | Illegal Immigration |