This theory suggests that crime is viewed as a method to adapt to social pressures.
What is Strain Theory?
Court case that established the "reasonable expectation of privacy" standard.
What is Katz V. United States
The 419 Advanced Fee scam gets its name from here.
What is the Nigerian Criminal Code 419?
Today, the sexual victimization of children occurs primarily in this venue.
What is Social Media?
Data deleted from a computer goes here.
What is Nowhere/Unallocated Space/Drive Free Space?
This theory requires: a motivated offender, a suitable target, and the absence of a capable guardian.
What is Routine Activities Theory?
What exception to the 4th Amendment search warrant requirement allows an officer to conduct a limited protective search for concealed weapons?
What is Stop & Frisk?
The Ponzi scheme was made famous by this now deceased criminal.
Who is Bernie Madoff?
This study found that approximately 80% of CSAM inmates also admitted to committed a hands-on offense.
What is the Butner Study?
The "digital fingerprint" given to something as a result cryptographic algorithm.
What is Hash Value?
This theory resulted in crime control policies that focused on harsh consequences for criminal behavior.
Deterrence Theory
This act protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored on computers.
What is ECPA (Electronic Communications Privacy Act)
These were two common types of embezzlement discussed in class.
What are Siphoning and Salami?
The final stage of the Grooming Process.
What is Exploitation/Face-to-Face Meeting?
The first step involved in the process of seizing digital evidence.
What is Scene Security?
This theory is the basis for the juvenile justice system.
What is Moral Development Theory?
What has occurred when a criminal opens new credit accounts with fraudulently obtained credentials?
What is Identity Theft?
This scam involves the creation of a relationship with the victim and plays on their emotions.
What is a Romance Scam?
Predators takes advantage of a child's natural curiosity during this stage of the grooming process.
What is Breaking Down Barriers?
Today, the seizure of digital devices relies on this strategy or concept?
What is Seize Only the Best/Most Relevant items?
Which criminological theory would best describe social groups like the Hactivists?
What is Subculture Theory?
What exception to the 4th Amendment search warrant requirement allows an officer to seize items of evidence they observe in the open?
What is Plain View?
The act of concealing the source of illegal assets?
What is Money Laundering?
This practice, involving the extorting of money or sexual favors, has seen a recent spike, particularly among teenaged males.
What is Sextortion?
The final and arguably most important phase of digital forensics.