Podcast
Questions and Answers
Which social media accounts were targeted?
Which social media accounts were targeted?
When did the victim last access the social media account?
When did the victim last access the social media account?
Did the victim report the unauthorized access to the social media site?
Did the victim report the unauthorized access to the social media site?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU), Commercial Crimes Division (CCD)?
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU), Commercial Crimes Division (CCD)?
Signup and view all the answers
Which section of the California Penal Code addresses crimes involving unauthorized computer access commonly referred to as 'hacking'?
Which section of the California Penal Code addresses crimes involving unauthorized computer access commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves tricking victims into buying/selling/shipping goods, money, or services through spoofed emails?
Which crime involves tricking victims into buying/selling/shipping goods, money, or services through spoofed emails?
Signup and view all the answers
Which crime involves the repeated following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves the repeated following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which of the following is an example of phishing?
Which of the following is an example of phishing?
Signup and view all the answers
What is the purpose of a search engine?
What is the purpose of a search engine?
Signup and view all the answers
What is the difference between secure and non-secure internet access?
What is the difference between secure and non-secure internet access?
Signup and view all the answers
Which of the following is a web browser?
Which of the following is a web browser?
Signup and view all the answers
Which law enforcement agency should a victim of cyberbullying in the City of Los Angeles contact?
Which law enforcement agency should a victim of cyberbullying in the City of Los Angeles contact?
Signup and view all the answers
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the purpose of the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What should a detective do upon being assigned a computer-related crime?
What should a detective do upon being assigned a computer-related crime?
Signup and view all the answers
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Signup and view all the answers