When an identity thief creates false e-mails and/or Web sites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:

a. spamming. b. phishing.
c. mousetrapping. d. warez.


b

Criminal Justice

You might also like to view...

What is the standard for gradation of robbery?

a. value of property taken in robbery b. location of robbery c. time of day of the robbery d. degree of danger and apprehension of the robbery

Criminal Justice

Answer the following statement(s) true (T) or false (F)

1. Status frustration suggests that socioeconomic inequality has a direct effect on community crime rates. 2. Today, classic strain theory is used to examine differences in crime rates and inequality. 3. Mestrovic and Lorenzo (2008) argue that there were high levels of social disorganization or anomie at Abu Ghraib and within the social structures of all of the entities and individuals who interacted with and had responsibility for the prisoners at Abu Ghraib. 4. Anomie and strain theories are only applicable to U.S. societal structures.

Criminal Justice

In Stanley v. Georgia, the United States Supreme Court held that:

A) possession of obscene material even in the privacy of one's own home is criminal. B) possession with the intent to sell obscene material from one's own home is criminal. C) possession of obscene material in the privacy of one's own home cannot be made criminal. D) possession of obscene material in a store with the intent to sell to the public is a crime.

Criminal Justice

Answer the following statement(s) true (T) or false (F)

1. With common law a person could not commit arson on his or her own home. 2. Serial arsonists suffer from serious mental problems. 3. Arson crimes are never committed for profit. 4. White-collar crimes are not violent crimes.

Criminal Justice