Online Computer Investigations

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What types of Internet crimes are specifically addressed by the Investigative Services Bureau?

  • Online harassment and cyberbullying
  • Phishing and malware distribution
  • Exploitation of minors, fraud, threats, and dissemination of child pornography (correct)
  • Identity theft and hacking

What is the requirement for detectives involved in online investigations regarding their online accounts?

  • They should use online accounts with their real identities
  • They must use online accounts with undercover identities registered and paid for with department funds (correct)
  • They can use personal online accounts if necessary
  • They need to create new online accounts for each investigation

What should detectives avoid when performing online investigations?

  • Engaging with suspects online
  • Using personal online accounts for investigations (correct)
  • Using sterile computers designated by the Department
  • Disclosing their undercover identity to colleagues

What type of computers must be used for online investigations?

<p>Computers designated by the Department and set up as sterile computers (D)</p> Signup and view all the answers

In what manner should detectives maintain their identity while involved in online investigations?

<p>Maintain an undercover identity in accordance with departmental procedures (B)</p> Signup and view all the answers

What is the purpose of using sterilized media in the online investigation?

<p>To prevent contamination of the retrieved information (B)</p> Signup and view all the answers

Why is it imperative to release information only on a need-to-know basis?

<p>To protect the security of employees involved, especially undercover law enforcement officers (D)</p> Signup and view all the answers

Who is allowed to conduct online investigations, according to the text?

<p>Department detectives who have received instruction in conducting online investigations (A)</p> Signup and view all the answers

Under what circumstances can employees utilize fictitious accounts for online activities?

<p>For department-related activities with supervisor approval (B)</p> Signup and view all the answers

What is the purpose of using fictitious accounts in online investigations?

<p>To obtain criminal intelligence information (D)</p> Signup and view all the answers

Why should employees never attempt to communicate with individuals using fictitious accounts without supervisory approval?

<p>To protect their own identity (D)</p> Signup and view all the answers

What is the main reason for time and date stamping and saving all online chat logs during an investigation?

<p>To maintain an accurate record for forensic analysis (D)</p> Signup and view all the answers

Why is it important for employees to log into authorized fictitious accounts only from department-issued devices and Internet connections?

<p>To prevent unauthorized access to sensitive information (A)</p> Signup and view all the answers

What is the purpose of utilizing sterilized media to store information retrieved from a computer’s hard drive?

<p>To maintain the integrity of the retrieved information for forensic analysis (A)</p> Signup and view all the answers

Why should online investigations be conducted in a secure location?

<p>To protect sensitive information from public viewing (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser