Chapter 14 - Today's Challenges in Criminal Justice Flashcards
gun control
efforts by a government to regulate or control the sale of firearms
background checks
an investigation of a person’s history to determine whether that person should be allowed a certain privilege, such as the ability to possess a firearm
nonstate actor
an entity that plays a role in international affairs but does not represent any established state or nation
weapons of mass destruction
a weapon that has the capacity to cause large number of casualties or significant property damage
enemy combatant
an individual who has supported foreign terrorist organizations such as al Qaeda that are engaged in hostilities against the military operations of the United States
military tribunal
a court that is operated by the military rather than the criminal justice system and is presided over by military officers rather than judges
cyberattack
an attempt to damage or disrupt computer systems or electronic networks operated by computers
cyber crime
a crime that occurs online, in the virtual community of the internet, as opposed to in the physical world
cyber fraud
any misrepresentation knowingly made over the Internet with the intention of deceiving another and on which a reasonable person would and does rely to his or her detriment
identity theft
the theft of person information, such as a person’s name, driver’s license number, or Social Security number
Phishing
sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient
cyberstalking
the crime of stalking, committed in cyberspace through the use of e-mail, text messages, or another form of electronic communication
hacker
a person who uses one computer to break into another
botnet
a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet; short for robot network
worm
a computer program that can automatically replicate itself and interfere with the normal use of a computer. A worm does not need to be attached to an existing file to move from one network to another