Podcast
Questions and Answers
Which unit has primary investigative responsibility for unauthorized computer accesses?
Which unit has primary investigative responsibility for unauthorized computer accesses?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Which of the following is a program used to access the internet?
Which of the following is a program used to access the internet?
Signup and view all the answers
What is the term for requesting confidential information over the internet under false pretenses?
What is the term for requesting confidential information over the internet under false pretenses?
Signup and view all the answers
What is the term for a website that allows users to be part of a virtual community?
What is the term for a website that allows users to be part of a virtual community?
Signup and view all the answers
What is the term for an Internet connection without a cable or wire?
What is the term for an Internet connection without a cable or wire?
Signup and view all the answers
Which of the following is NOT a question that the text asks about the victim's social media account?
Which of the following is NOT a question that the text asks about the victim's social media account?
Signup and view all the answers
What type of data does the text mention could have been deleted, copied, or altered?
What type of data does the text mention could have been deleted, copied, or altered?
Signup and view all the answers
What is the purpose of asking for the contact information of the company's 'Information Technology (IT)' person?
What is the purpose of asking for the contact information of the company's 'Information Technology (IT)' person?
Signup and view all the answers
Which agency operates the Internet Crime Complaint Center (IC3)?
Which agency operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
Which of the following statements about cyberbullying in California is true?
Which of the following statements about cyberbullying in California is true?
Signup and view all the answers
What action should be taken if a victim of cybercrime lives or works in the City of Los Angeles?
What action should be taken if a victim of cybercrime lives or works in the City of Los Angeles?
Signup and view all the answers
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
Which section of the California Penal Code addresses unauthorized computer access, commonly referred to as 'hacking'?
Which section of the California Penal Code addresses unauthorized computer access, commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?
Which crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?
Signup and view all the answers
Under which section of the California Penal Code is false personation, through electronic means, for the purpose of harming, intimidating, threatening, or defrauding another person considered a misdemeanor?
Under which section of the California Penal Code is false personation, through electronic means, for the purpose of harming, intimidating, threatening, or defrauding another person considered a misdemeanor?
Signup and view all the answers
Which crime involves the use of an electronic communication device to make contact with another person and address them with obscene language or threats?
Which crime involves the use of an electronic communication device to make contact with another person and address them with obscene language or threats?
Signup and view all the answers