Question
click below
click below
Question
Normal Size Small Size show me how
Criminal Investigati
Criminal Investigation Final
Question | Answer |
---|---|
White smoke results from the burning of which of the following? | Vegetable compounds |
Blue smoke results from the burning of which of the following? | Alcohol |
Black smoke results from the burning of which of the following? | Petroleum |
Yellow or brownish smoke results from the burning of which of the following? | Sulfur, nitric acid or hydrochloric acid |
Matches, candles, lighters or chemical devices can all be used as: | Igniters |
The biggest difference between traditional evidence and computer evidence is the latter’s: | Fragility |
A method of tricking someone into voluntarily providing personal information about someone so that the information can be used illegally is called: | Phishing |
Theft of intellectual property: | Involves the pirating of proprietary information and copyrighted material |
A virus attack may replace or destroy data on the computer’s hard drive and: | Leave a “back door” open to later effect a DoS |
.) A victimless crime is any illegal activity in which al involved are willing participants. | True |
Local patrol officers can provide very limited information concerning organized crime | False |
The U.S. Congress has defined a drug addict as any person who habitually uses any habit-forming narcotic drug so as to endanger the public morals, health, safety, or welfare, or who is or has been so far addicted to the used of habit-forming narcotic drug | True |
pupilometer allows police to check if someone is under the influence of alcohol or drugs by measuring the pupils in their eyes as subject to light | True |
Because of their experience with drugs, drug users are not likely to sell drugs themselves | False |
Occult murders are usually sacrificial shootings. | False |
Black men in interracial relationships are one of the groups at highest risk for hate crime. | False |
Federal legislation creates a blanket standard for hate crime that can be applied anywhere in the United States. | False |
.) Law enforcement agencies do not need to be concerned about records of the monikers (nick names) for gang members. | False |
Rohypnol is one of the ______________ drugs | Club |
_______________________ is the most widely available and most commonly used illicit drug in the United States. | Marijuana |
____________________ is produced by mixing cocaine with baking soda and water. | Crack |
People under the influence of illicit stimulants such as cocaine may exhibit extremely agitated and incoherent behavior, a condition known as excited _____________________. | Delirium |
.) In a cult, the color ____________ may stand for darkness, night, sorrow, evil, or the devil. | black |
.) ________________ incidents involve behavior that, although motivated by bias, is not criminal acts. | Hate |
A(n) _________________________ is a verbal spell. | incantation |
Arson fires usually show the same burn patterns as regular fires | False |
Strikers start fires because of an irresistible urge or passion for fire | False |
Knowing the fire’s point of origin is of little importance to an arson investigator. | False |
.) Evidence of accelerants is a primary form of physical evidence at an arson scene. | True |
Cybercriminals are solitary by nature and do not operate in groups. | False |
A search warrant is not needed to search a computer connected to the internet because there is no expectation of privacy. | False |
When removing a computer from a site, the first thing the investigator should do, for safety, is to turn the machine off and unplug the computer from the wall. | False |
Electronic evidence is fragile` | True |
Cyber-terrorism is a premeditated, politically motivated attack against information, computer systems, computer programs, and data that result in violence against non-combatant targets. | True |
.) In the Model Arson Law, attempting to burn buildings or property is classified as _________-degree arson. | 4th |
A fire in which arson is suspected but proof is lacking is classified as a(n) __________________ fire. | Suspicious |
The most common and accurate types of flammable vapor detectors used by arson investigators are ______________________ combustion detectors. | Catalytic |
The breaking off of surface pieces of concrete or brick due to intense heat is referred to as __________________________. | spalling |
The FBI defines computer crime as “that which involves the addition, deletion, change or theft of __________________ from a computer.” | information |
IP stands for Internet __________________, the address needed to access the Internet. | Protocal |
A computer program such as Internet Explorer that accesses and displays data from the Internet or other networks is called a ____________________. | browser |
In 1914 the federal government passed this act which made the sale or use of certain drugs illegal: | The Harrison Narcotic Act |
With reference to drugs, OTC stands for what type of drugs? | Over-the-counter |
Mescaline and Peyote are | Hallucinigens |
Drugs can be classified as | Depressants, stimulants, narcotics, hallucinogens, cannabis, or inhalants |
Designer drugs are illicit drugs which are an offshoot of the legal drug from which they are created. These resulting illicit drugs may cause muscles to stiffen and give the appearance of someone suffering from Parkinson’s disease. These illicit drugs are | Analogs |
All but one of the below is a sign that a youth may be in a gang. Select the one that in not an indicator | wears baggy jeans with underwear showing |
The Southern Poverty Law Center is a | Watchdog organization for bias and hate crimes |
Which 1990 act encouraged departments to report data on hate crime to the FBI? | Hate Crime Statistics Act |
Which of the following is characteristic of a street gang, as opposed to a drug gang? | Loose leadership |
In what type of interview do you carefully question the victim about the rapist’s behavior, analyze the behavior to ascertain the motivation underlying the assault, and then compile a profile of the individual likely to have committed the crime? | Behavior-oriented interview |
A common date rape drug is? | Rohypnol |
Sex offenses include all but one of the following | Pornography |
The largest number of people illegally trafficked in the U.S. are from | East Asia and the Pacific |
The term that has been substituted for rape in most state statutes is | Illegal Intercourse |
.) Sex offenders, particularly pedophiles – those who abuse young children – are referred to as | Chicken Hawks |
Most reports of child abuse are made by | Third Parties |
.) MSBP stands for | Munchausen’s Syndrome by Proxy |
The most common habitual child sex abuser is the | Pedophile |
Rohypnol is the oldest drug used in date rape crimes and is up to 10 times more powerful than Valium and Halcion in producing a slowing of physical and mental responses, muscle reflexes, and amnesia | True |
The civil commitment of sex offenders has been ruled unconstitutional | False |
Police should allow professional medical personnel to obtain the personal details of a sexual attack | False |
Police should not accept blind reporting because they do not get to investigate the crime | False |
Officers sometimes pose as children online to attract child molesters; however, the courts have ruled that this constitutes entrapment and is not legal | False |
Sexual abuse victims are not significantly more likely to be arrested as adults than their counterparts even after taking into consideration a childhood history characterized by family problems serious enough to have resulted in a dependency hearing | False |
Child abuse and neglect affect a significant proportion of children’s lives, and children who have been abused are more aggressive and have higher levels of impaired social functioning than their counterparts | True |
Child pornography is a highly organized, multimillion dollar industry | True |
An offender’s computer is a good source of information when arresting an individual for child pornography | True |
Additional evidence in date rape cases may include the presence of _________________ in the victims system | Alcohol, drugs or both |
Rapists are classified as __________ rapists and ___________rapists | power, anger |
The police may use _______________ to trace obscene phone calls if given a signed affidavit from the victim stating the facts related to the calls | traps |
The characteristics of excessive force may identify a rapist as a ________________. | anger rapist |
Commercial __________________ of children involves the use of children with monetary or other material gain as a direct or indirect goal. | sexual exploitation |
_______________ Alert is an early-warning network that law enforcement can use to quickly convey key information to the general public via television and radio soon after a child has been abducted. | Amber |
In a ______________ sex ring, pedophiles keep their activities and photographs totally secret. | solo |
Physical evidence at the scene of a robbery might include which of the following? | All of the above |
False robbery reports may be identified by: | All of the above |
Generally, the three elements of a robbery are: | The wrongful taking of personal property, from a person or in the person’s presence, against the person’s will by force or threat of force |
The main elements of robbery include: | force or fear |
Which of the following correctly list priorities at a hostage situation | Preserve life, apprehend the hostage taker, and recover or protect property |
Burglary differs from robbery in that: | Burglars are usually working unseen, while robbers confront their victims |
The elements of the crime of burglary include all but which of the following | during the nighttime |
Most burglary laws increase the severity of the crime of burglary if the burglar possesses: | explosives or weapons |
Most amateur burglars are between the ages of: | 15 and 25 |
Lack of cooperation in the investigation of a robbery is almost absolute proof that the robbery was staged. | False |
Robbers may use various types of disguises to keep from being identified, including ski masks, paper sacks, and other types of clothing. | True |
Officers should rush hostage-takers in order to catch them off-guard. | False |
The Stockholm Syndrome refers to a situation in which hostages attack the hostage-takers since they know they are about to be killed. | False |
Police do not need to obtain a search warrant before inspecting pawn shop records. | True |
Research shows that premises that have previously been burglarized are likely to be burglarized again. | True |
Providing clearly visible addresses on stores and homes helps prevent burglaries | True |
DNA is not important in burglary investigations. | False |
Entering a safe using a sledge and chisels or other instruments to chop a hole in the bottom of a safe is called chopping. | True |
Most robbers are visibly armed with a weapon or dangerous device and make a(n) ________________ demand of the victim. | oral |
___________________ know that many Asian families distrust banks and keep large amounts of cash and jewelry in their homes. | Home invaders |
About eight percent of convenience stores account for more than ____________ percent of all convenience store robberies. | 50 |
The phenomenon in which hostages begin to identify with and sympathize with their captures is known as the ____________________ Syndrome | Stockholm |
A _____________ burglary is one that occurs in buildings, structures or attachments that are used as or are suitable for dwellings. | residential |
Breaking and entering is strong __________________ evidence that a crime is intended, meaning that it provides a reasonable basis for belief that the crime was intended. ` | presumptive |
The opposite method of pulling a safe is ____________________ a safe. | punching |
With reference to art theft, NSAF stands for: | National Stolen Art Files |
Which of the following types of larceny is most frequent? | Theft from motor vehicles |
The most common type of insurance fraud is: | The pocketing of customer payments by insurance agents and brokers |
Which of the following is not a reason why bicycle thefts are difficult to investigate: | Stolen bikes are often altered, dismantled, repainted, and sold |
The elements of larceny/theft are: | The felonious stealing, taking, carrying, leading or driving away, of another’s personal goods or property of value, with the intent to permanently deprive the owner of the property or goods |
Motor vehicle thefts are often associated with: | Joyriding, transportation, commission of another crime, stripping vehicles for parts or accessories, reselling vehicles for profit |
A business that takes stolen cars apart to sell the parts for profit is known as a: | Chop shop |
The elements of motor vehicle theft are: | Intentionally taking or driving a motor vehicle without consent of the owner or the owner's authorized agent |
The elements of interstate transportation of a motor vehicle are: | The motor vehicle was stolen, it was transported in interstate or foreign commerce, the person transporting or causing it to be transported knew it was stolen, and the person receiving, concealing, selling, or bartering it knew it was stolen |
Phony home repairs are a way that confidence people take money from others. | True |
The cost of insurance scams totals over 40 million dollars a year. | True |
Jamming the unauthorized switch of a long-distance carrier, represents the fastest-growing category of complaints to the FCC. | False |
Farmers create a market for stolen pesticides and herbicides by purchasing them at reduced rates. | True |
Installing brighter lights in areas where cars are parked has been successfully used to combat auto theft. | True |
K-9 vehicles are much more likely to be stolen than other police vehicles. | False |
Construction equipment is rarely stolen. | False |
Snowmobiles do not generally have specific identification numbers | False |
One method of improving an officer’s ability to find stolen motor vehicles is by developing a checking system to rapidly determine whether a suspicious vehicle is stolen. | True |
The FBI has jurisdiction in jewel thefts in which the jewels are moved _______________________. | Interstate or by foreign commerce |
The phrase “goods or property” refers to all forms of ___________________ property, real or persona. | Tangible |
The ____________ value at the time of the theft is generally used to determine value of property stolen. | market |
Shoplifting, also known as __________________, involves taking items from retail stores without paying for them. | boosting |
Setting up a ______________ operation is one method of combating motor vehicle theft | sting |
VIN stands for _______________________________________. | vehicle identification number |
NICB stands for National ______________ Crime Bureau. | Insurance |