Criminology
Legal Framework
Financial Cyber Crimes
Online Exploitation of Children
Digital Forensics & Investigations
100

This theory suggests that crime is viewed as a method to adapt to social pressures. 

What is Strain Theory? 

100

Court case that established the "reasonable expectation of privacy" standard.

What is Katz V. United States

100

The 419 Advanced Fee scam gets its name from here.

What is the Nigerian Criminal Code 419?

100

Today, the sexual victimization of children occurs primarily in this venue. 

What is Social Media?

100

Data deleted from a computer goes here. 

What is Nowhere/Unallocated Space/Drive Free Space?

200

This theory requires: a motivated offender, a suitable target, and the absence of a capable guardian. 

What is Routine Activities Theory?

200

What exception to the 4th Amendment search warrant requirement allows an officer to conduct a limited protective search for concealed weapons?

What is Stop & Frisk?

200

The Ponzi scheme was made famous by this now deceased criminal.

Who is Bernie Madoff?

200

This study found that approximately 80% of CSAM inmates also admitted to committed a hands-on offense. 

What is the Butner Study?

200

The "digital fingerprint" given to something as a result cryptographic algorithm.

What is Hash Value?

300

This theory resulted in crime control policies that focused on harsh consequences for criminal behavior.

Deterrence Theory

300

This act protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored on computers.

What is ECPA (Electronic Communications Privacy Act)

300

These were two common types of embezzlement discussed in class. 

What are Siphoning and Salami?

300

The final stage of the Grooming Process.

What is Exploitation/Face-to-Face Meeting?

300

The first step involved in the process of seizing digital evidence. 

What is Scene Security?

400

This theory is the basis for the juvenile justice system.

What is Moral Development Theory?

400

What has occurred when a criminal opens new credit accounts with fraudulently obtained credentials?

What is Identity Theft?

400

This scam involves the creation of a relationship with the victim and plays on their emotions.

What is a Romance Scam?

400

Predators takes advantage of a child's natural curiosity during this stage of the grooming process.

What is Breaking Down Barriers?

400

Today, the seizure of digital devices relies on this strategy or concept?

What is Seize Only the Best/Most Relevant items?

500

Which criminological theory would best describe social groups like the Hactivists?

What is Subculture Theory? 

500

What exception to the 4th Amendment search warrant requirement allows an officer to seize items of evidence they observe in the open?

What is Plain View?

500

The act of concealing the source of illegal assets?

What is Money Laundering?

500

This practice, involving the extorting of money or sexual favors, has seen a recent spike, particularly among teenaged males. 

 What is Sextortion?

500

The final and arguably most important phase of digital forensics.

What is Reporting?