Criminal Inv-Chapter 14, Special Investigations Flashcards

1
Q

Asian criminal organization in terms of their possible relationship to other social business groups of the same ethnic composition, are called

A

tongs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ideally, the person to lead a comprehensive investigation into the operation s of organized crime is the

A

local prosecutor or US attorney

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers are , tresspassers- intruders who enter into another computer system w/o authorization. 3 types of hackers

A
  1. crackers- anitsocial misfits who are more comfortable online in front of computer than with people. In it for the challenge.
  2. computer criminals- engage in fraud, sabotage, industrial sabotage and theft. Mercenaries of cyberspace. In it for money
  3. computer vandals- motivated by revenge due to some real or imagined wrong. Seek to destroy database and wreak havoc. Maybe fired employees, animal rights activists.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tools of the vandal include

A

trojan horses
worms
logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

stand-along programs that are disguised as other programs that innocent users pass to one another usually in form of email attachment.

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

like the virus, but they do not replicate. The make duplicates of themselves and steal system resources. Are designed w/intent to bring down the users system

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

programs within programs that perform destructive acts based upon a trigger event.

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

computer virus

A

type of malicious code that replicates itself and insertss copies or versions of itself in other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1999 Melisaa virus

A

unleashed by 31 yr old New Jersy man designed to infect the emails of the first 50 email addresses on the users mailing list. Virus infected additional computers every time an email was forwarded. More than million personal computers in North America were affected. caused more thyan $80 million in damages. over 10,000 viruses are known worldwide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

US govern redesigns its currency every __to __ to include security features that make it more dififcult to counterfeit

A

7 to 10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

types of hit and run operators

A
  1. The apprehensive driver- panic driven, fearful driver
  2. projectionist driver- tries the case; he finds the other at fault, refuses to be a party to the accident and drives off
  3. sneak operator- inflicts minor damage; chalks up the action as the calculated risk shared by all veh owners who place their veh on roadway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly