Role of the national security agency is to capture criminals


Assignment:

CYBER CRIMES

1. True False "Probable Cause" is required to apply for and obtain a search warrant for a computer and/or computer system".

2. "Exigent circumstances" in a computer related crime, for the search warrant exception, include:

a. Safety of the complaining witness
b. Safety of the victim
c. Security and preservation of the possible evidence
d. All the above

3. Criminal investigators must establish probable cause in an affidavit in a criminal application for a search warrant except for:

a. Computer Systems
b. External Storage Media
c. Handheld Devices and Other Electronic Devices
d. Networking Equipment
e. None of the above

4. True False In order to obtain a search warrant in cyber related crimes, law enforcement must show "reasonable suspicion".

5. In order to obtain a search warrant in cyber related crimes, law enforcement must show probable cause by establishing:

a. A crime has been committed
b. Evidence of a crime exists
c. The evidence presently exists in the place to be searched
d. All the above
e. A & B only

6. True False The "Fruit of the poisonous tree doctrine" does NOT apply to cyber search and seizures.

7. True False The sole purpose of the exclusionary rule with respect to the search, seizure and collection of digital evidence is to assist the police in obtaining the evidence necessary to get a conviction.

8. True False Pieces of evidence gained during a flawed search may be excluded according to the "fruits of the poisonous tree doctrine".

9. A subject giving the consent to search in a cyber-related crime must have:

a. A valid IP

b. An ISP

c. Standing

d. All the above

10. True False The exigent circumstances doctrine allows law enforcement officers to search and/or seize evidence without a warrant if they have probable cause AND there is a pressing need to preserve evidence that is in danger of being destroyed or corrupted.

11. True False The "plain view" exception to the search warrant requirement applies if child pornography is immediately apparent to the officer.

12. True False The "silver platter" doctrine allows evidence collected by members of the public and presented to law enforcement to be admitted as evidence.

13. True False Under the wiretap statute, the provider exception refers to a subscriber authorizing its cellphone provider to turn records over to police.

14. True False Under the wiretap statute, the extension telephone exception means that police and fire dispatch centers can tape phone calls received.

15. True False "Chain of custody" of digital evidence in a computer crime case is not required since the evidence is digital and virtual.

16. True False The Communications Assistance for Law Enforcement Act (CALEA) requires telecommunications companies to allow law enforcement access to information for any investigation.

17. True False In Katz v. United States, the United States Supreme Court decided that, in obtaining communications evidence, constitutional protections do not apply to persons and expectations, but to physical locations or actual techniques used instead.

18. True False Federal law enforcement agencies have formed partnerships with private industries, public companies and law enforcement agencies to collaborate in criminal investigations in the digital and cyber areas.

19. True False One role of the National Security Agency (NSA) is to capture criminals behind serious computer intrusions.

20. Which federal agency is responsible for the prosecution of computer fraud and abuse violations through the Computer Crime and Intellectual Property Sections (CCIPS)?

a. The Federal Bureau of Investigation
b. The Department of Justice
c. The United States Marshal Service
d. The National Security Agency

21. Which federal agency investigates cybercrime and is currently responsible for the management of the Infra-Gard private/public partnership program?

a. The Federal Bureau of Investigation
b. The United States Marshal Service
c. The Federal Trade Commission
d. The United States Postal Service

22. Which agency within the Department of Homeland Security is responsible for managing cyber-critical infrastructure?

a. The Office of Intelligence and Analysis
b. The Directorate for Science and Technology
c. The Federal Bureau of Investigation
d. The National Cyber Security Division

23. Which agency within the Department of Justice focuses on prosecuting cases of hacking, fraud and intellectual?

a. FBI - Cyber Division
b. DOE - Cyber Incident Response Capability
c. DHS - National Cyber Security Division
d. DOJ - Computer Hacking and Intellectual Property unit

24. Local law enforcement agencies have some key needs when it comes to improving their response to computer crimes. Which choice is not included in that list.

a. Equipment
b. Personnel
c. Training
d. Updated Criminal Codes

25. Which agency within the Department of Justice focuses on prosecuting cases of hacking, fraud and intellectual?

a. Computer Crime and Intellectual Property Section
b. National Information and Infrastructure
c. Computer Hacking and Intellectual Property
d. Office of the United States Attorney

26. True False Investigators of electronic crimes can be trained law enforcement officers or experienced investigators.

27. True False "SME's" aka subject matter experts, are charged with maintaining and understanding the full complexities of network architectures.

28. True False A single-location crime scene can involve a complex network system with enormous storage capacity.

29. True False One main rule in obtaining digital evidence at a crime scene is "If it's off, leave it off".

30. True False The media access control (MAC) address is unique hardware address associated with each individual network device.

31. True False An IP address is unique to each computer.

32. True False "Authentication" is encouraged, however, not required in the admission of digital evidence at trial.

33. "Authenticity" of digital evidence challenges at trial includes questions as to whether the digital records were:

a. Altered

b. Manipulated

c. Damaged

d. All the above

e. A & B only

34. True False The Best Evidence Rule states that to prove the content of a writing, recording, or photograph, the "original" writing, recording, or photograph is ordinarily required.

35. True False The analysis of stored data collected in a criminal case is often referred to as a "post mortem" because it is not done on a live network.

36. True False It is not necessary for the prosecutor to prove that digital evidence presented came from the defendant unaltered.

37. True False Digital evidence can be easier to authenticate than physical evidence.

38. True False In the Federal Rules of Evidence (1001 - 3), unaltered digital evidence can be presented as a copy and does not have to be the original seized from the crime scene.

39. True False The goal of forensic analysis of digital evidence is to find incriminating information and to establish elements of the crime.

40. True False Information storage systems are important and allow efficient storage of the data and rapid retrieval when the information is needed.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Role of the national security agency is to capture criminals
Reference No:- TGS03169038

Now Priced at $20 (50% Discount)

Recommended (96%)

Rated (4.8/5)