Podcast
Questions and Answers
Which social media accounts were targeted?
Which social media accounts were targeted?
What is the victim's account log on ID?
What is the victim's account log on ID?
When did the victim last access the social media account?
When did the victim last access the social media account?
When was the victim unable to access his/her social media account?
When was the victim unable to access his/her social media account?
Signup and view all the answers
Did the victim report the unauthorized access to the social media site (e.g., Facebook)?
Did the victim report the unauthorized access to the social media site (e.g., Facebook)?
Signup and view all the answers
Did the victim download their IP activity?
Did the victim download their IP activity?
Signup and view all the answers
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What is the purpose of the IC3?
What is the purpose of the IC3?
Signup and view all the answers
When should a preservation letter be sent for an Internet Protocol (IP) address?
When should a preservation letter be sent for an Internet Protocol (IP) address?
Signup and view all the answers
What is the purpose of a preservation letter?
What is the purpose of a preservation letter?
Signup and view all the answers
What is the definition of hacking?
What is the definition of hacking?
Signup and view all the answers
What is the purpose of a laptop?
What is the purpose of a laptop?
Signup and view all the answers
Which section of the California Penal Code addresses crimes related to unauthorized computer access?
Which section of the California Penal Code addresses crimes related to unauthorized computer access?
Signup and view all the answers
Which crime is commonly referred to as 'hacking'?
Which crime is commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves tricking the victim through spoofed emails in order to commit theft?
Which crime involves tricking the victim through spoofed emails in order to commit theft?
Signup and view all the answers
Which crime involves willfully and maliciously following or harassing another person through electronic communication?
Which crime involves willfully and maliciously following or harassing another person through electronic communication?
Signup and view all the answers
Which crime involves knowingly impersonating another person through electronic means for harmful purposes?
Which crime involves knowingly impersonating another person through electronic means for harmful purposes?
Signup and view all the answers
Which crime involves using electronic communication to instill fear or harass another person?
Which crime involves using electronic communication to instill fear or harass another person?
Signup and view all the answers
Which of the following is an example of phishing?
Which of the following is an example of phishing?
Signup and view all the answers
What is the purpose of a search engine?
What is the purpose of a search engine?
Signup and view all the answers
What is the difference between secure and non-secure internet access?
What is the difference between secure and non-secure internet access?
Signup and view all the answers
Which of the following is an example of spooling?
Which of the following is an example of spooling?
Signup and view all the answers
What is the function of a web browser?
What is the function of a web browser?
Signup and view all the answers
What are the two most common types of wireless connections?
What are the two most common types of wireless connections?
Signup and view all the answers
Which department has primary investigative responsibility for unauthorized computer accesses?
Which department has primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?
What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?
Signup and view all the answers
What is the subject of Administrative Order No. 4?
What is the subject of Administrative Order No. 4?
Signup and view all the answers
What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers