FINAL EXAM Flashcards

1
Q

Crime-related information retrieved from an electronic device.

A

Digital evidence:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A cell phone that has voice and
text messaging capabilities but is not able to connect to the Internet. They are called burner phones because they
are inexpensive and thus easily disposable.

A

Burner phone:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device that when connected to a locked smartphone makes repeated guesses at passcodes until it is successful and the phone is unlocked.

A

GrayKey:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A brand of software/hardware used to extract data from the memory of cell phones and other electronic devices.

A

Cellebrite:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An identifying number that is associated with a computer or other device that can access the Internet.

A

Internet Protocol (IP) address:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access to the content of phones requires a search warrant, consent, or exigent circumstances.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cellebrite technology Is most often used to extract data from phones.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cell/smartphones

Digital/video cameras

Desktop and laptop computers

Game consoles (e.g., PlayStation)

File storage (hard drive, thumb drive, optical media)

Internet of things (IoT) devices (e.g., smart home devices, Amazon Alexa)

Wearables (e.g., smartwatches)

A

digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A way by which citizens can provide information about crimes to the police via phone or Internet.

A

tip lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An alert designed to notify citizens of
a child abduction; an acronym
for America’s Missing: Broadcast Emergency Response.

A

AMBER Alert:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An alert designed to notify patrons and shoppers of a missing child in a store or other business.

A

code Adam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security surveillance camera video displayed on a television monitor and often recorded via a digital recorder.

A

Closed circuit television (CCTV):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Persons who assist law enforcement in an active and ongoing capacity, often in drug investigations, and often for some personal benefit.

A

Confidential informants:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Criminal organizations that most often operate in neighborhoods but may be represented nationwide; street gangs are heavily involved in drug trafficking and violent criminal behavior.

A

Street gangs:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizations oriented around the use of motorcycles and criminal conduct.

A

Outlaw motorcycle gangs (OMGs):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The largest crime information network system in the United States; maintained by
the FBI.

A

National Crime Information Center (NCIC):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A national crime information network that contains information on vehicle registrations, criminal records, and sex offender registrations as well as other information.

A

National Law Enforcement Telecommunications System (NLETS):
A national crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The science of mental phenomena relating to ESP, telepathy, etc.; this field is outside the traditional study of psychology.

A

Parapsychology:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Injuries sustained by a victim when attempting to protect or defend himself or herself.

A

defense wounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • Who is the decedent?
  • What was the cause of the death?
  • If the death is the result of a homicide, who is the offender?
A

Three basic questions are relevant in death investigations:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The actions and injuries that led to a person’s death, such as gunshot wounds, stab wounds, and so forth.

A

cause of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

particles that are discharged from a gun when it is fired

A

gunshot residue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cause of death that occurs when a person is prevented from breathing, such as when strangled.

A

Asphyxia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An indicator of strangulation death where small red dots appear in the inner surface of the eyelids, the whites of the eyes, or other skin surfaces

A

Petechial hemorrhages:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
The amount of time that has elapsed from time of death to the discovery of the body.
Postmortem interval (PMI)
25
The cooling of the body upon death.
algor mortis
26
The pooling of blood in a body upon death.
liver mortis
27
The stiffening of muscles upon death.
riger mortis
28
A series of homicides committed by the same offender(s) over time.
serial homicide
29
A group of law enforcement personnel formed to investigate a particular crime or combat a particular crime problem.
task force
30
A sexual assault that is facilitated by an offender through the use of a legal or illegal substance.
Drug-facilitated sexual assault (DFSA):
31
An approach taken when interviewing a sexual assault victim in which documenting the behavior of the offender is a primary goal.
Behavioral- oriented interview:
32
A nurse with special training in forensic matters who conducts physical forensic examinations of sexual assault victims.
Sexual assault nurse examiner (SANE)
33
Sexual offenders who are often “friends” or acquaintances of the victim; their motive is usually their sexual pleasure.
contact rapists
34
Sexual offenders who are most often strangers to their victims; their motive is anger and control.
sexual agressor rapists
35
An allegation made by a person that a rape occurred when in fact it did not.
false rape allegations
36
Although definitions vary, typically refers to violence committed by intimate partners, immediate family members, or other relatives.
domestic violence
37
Order issued by a judge upon request of a victim that requires the respondent (offender) to stay away from and to not have contact with the victim. Violation of a restraining order is a crime.
restraining order
38
Robberies that occur outside in public places, often on the streets or sidewalks.
street robberies
39
A robbery that occurs without the use of a weapon; a mugging is not a formal crime classification.
mugging
39
Confrontations, in which the offender demands money or property from the victim through verbal commands. Violence may follow if compliance is not provided. * Blitzes, in which the offender uses violence first to gain control over the victim. Once this is accomplished, the robbery occurs. * Cons, in which the offender first uses a distraction to then surprise the victim with the robbery demand (e.g., asking the victim for a cigarette before robbing him or her). * Snatch-thefts, in which no communication or interaction occurs before the robbery; the offender simply grabs the property (e.g., purse) and flees.
How the robber approaches the victim
40
Packs tellers place in bags of stolen cash, unbeknownst to bank robbers; dye packs are programmed to explode, causing cash and potentially other items to be stained.
dye packs
41
* Inferences about how and why the perpetrator selected this particular target * The perpetrator’s method of entry * The type of property taken and not taken * The apparent amount of planning that took place prior to the burglary * How the perpetrator searched for property
A burglary offender’s MO
41
Property most likely to be taken in burglaries; property that is concealable, removable, available, valuable, enjoyable, and disposable.
"craved" property
42
A person or business that knowingly buys and sells stolen property.
professional fence
43
Committing motor vehicle theft for fun.
joyriding
44
Technology designed to continuously scan vehicle license plates; used to identify stolen vehicles.
license plate reader (LPR)
45
A method of starting an automobile without a key whereby the ignition wires are accessed by breaking open the steering column or removing the ignition.
peeling
46
A place where stolen cars are disassembled in order to sell their parts.
chop shop
47
Cars used in undercover decoy operations in which investigators provide an opportunity for perpetrators to steal a car that is being monitored; the theft can lead to an arrest.
bait cars
47
Fires classified as caused by arson.
incendiary
48
The place where a fire began.
point of origin
49
An emotional compulsion to start fires; a motive for arson.
Pyromania:
50
Crimes that require the use of a computer or other electronic device in order to commit them.
cybercrime
51
A crime whereby one person steals the personal information of another and uses it without permission
identity theft
52
A method used to perpetrate prescription drug fraud, which involves a person visiting multiple doctors to obtain multiple prescriptions.
doctor shopping
53
Crimes in which a computer system is attacked; usually the intent is to disable it, vandalize it, or steal information from it.
cyberattack
54
Bullying behaviors that occur via the Internet, particularly through social media.
cyberbullying
55
Crimes that often, but not always, involve the use of a computer device in order to commit them.
Computer- facilitated crimes:
56
Involves threats and/or coercion by an offender usually related to the release of sexually oriented photographs of the victim.
sextortion
57
Involves establishing an online relationship with a victim for illegal or deceptive purposes.
catphishing
58
Involves one person masquerading as another through information distortion.
spoofing
59
Closely related to sextortion, usually involves former intimate partners; the offender threatens to make public compromising photos of the victim as revenge for a terminated relationship.
revenge pornogrpahy
60
A way to describe the court process in this country; the prosecution and defense are opponents, each highlighting certain evidence in the case, and the judge is the referee.
Adversarial process:
61
An expression referring to an incorrect judicial outcome; an innocent person is convicted or a guilty person goes free.
Miscarriage of justice:
62
The process of selecting a jury for a trial.
Voir dire:
63
Elicits testimony from a prosecutor’s witness through questioning by the prosecutor or from a defense witness through questioning by the defense attorney.
Direct examination
64
Elicits testimony from a prosecutor’s witness (such as a police officer) through questioning by the defense attorney, or from a defense witness by the prosecuting attorney.
cross- examination
65
To make a witness, or some testimony provided by the witness, unbelievable. It is a goal of the cross- examination.
impeach
66
Questions that are phrased in such a way that an answer is contained in the question (e.g., “Wouldn’t you agree that . . .”); such questions are sometimes used in a cross- examination.
leading questions
67
Defined by the Global Terrorism Database as “the threatened or actual use of illegal force and violence by a non-state actor to attain a political, economic, religious or social goal through fear, coercion or intimidation.”
terrorism
68
Terrorism committed by foreigners or foreign nationals; typically motivated by extreme religious views and/ or hatred toward the United States.
Internationally based terrorism:
69
People who believe in the religious duty of Muslims to spread the religion through militant means.
Jihadists
70
Having learned to accept and believe in extreme ideas that promote the legitimacy of violent actions to accomplish political ends.
Radicalized:
71
Terrorism committed by U.S. citizens; typically motivated by extreme beliefs.
Domestic-based terrorism:
72
Domestic-based terrorism most often motivated by racism or beliefs against the government.
Right-wing extremism:
73
Domestic-based terrorism whose adherents are often described as anarchists.
Left-wing extremism:
74
Domestic-based terrorists often motivated by animal rights and the environment.
Special interest extremism:
75
Terrorists who receive funding, support, training, and/or protection from a government.
State-sponsored terrorists:
76
Terrorists who act on their own without attachment to or help from a terrorist group or a government.
Lone wolf (or lone actor) terrorists:
77
A form of crime analysis that focuses on identifying and predicting who will commit crimes.
Intelligence-led policing:
78
Information readily available to law enforcement without special restrictions; often refers to information from social media sites.
Open source information:
79
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism; a law that went into effect shortly after the terrorist attacks of September 11, 2001. It gave law enforcement agencies additional authority to gather evidence and expanded other powers.
USA PATRIOT Act of 2001:
80
A modified version of the USA PATRIOT Act that went into effect in 2015.
USA Freedom Act:
81
Technologies capable of identifying a person by measuring a feature of that person’s unique physical characteristics.
Biometrics:
82
Systems whereby a facial image can be captured on camera and compared to digital images stored in a reference database.
Facial recognition systems:
83
Technology that detects heat within closed structures.
Thermal imaging:
84
Remotely controlled flying machines that can be used for surveillance, also known as drones.
Unmanned aerial vehicles (UAVs):