暗記メーカー
ログイン
LEA2
  • Jerome Estacio

  • 問題数 99 • 1/1/2024

    記憶度

    完璧

    14

    覚えた

    38

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    To provide information on modi operandi, procedures, objects, devices and concealment methods used by criminals.

    purple notice

  • 2

    To warn police, public entities and other international organizations about potential threats from disguised weapons, parcel bombs and other dangerous materials.

    orange notice

  • 3

    To seek information on unidentified bodies.

    black notice

  • 4

    To help locate missing persons, often minors, or to help identify persons who are unable to identify themselves.

    yellow notice

  • 5

    To provide warnings and criminal intelligence about persons who have committed criminal offences and are likely to repeat these crimes in other countries

    green notice

  • 6

    To collect additional information about a person’s identity or activities in relation to a crime.

    blue notice

  • 7

    To seek the arrest or provisional arrest of wanted persons with a view to extradition.

    red notice

  • 8

    provides early warning signals of threats and to support decision making in setting priorities to deal with criminal issues

    strategic analysis

  • 9

    aims to achieve a specific law enforcement outcome. Usually, it has immediate benefit

    operation analysis

  • 10

    Criminal intelligence analysis is recognized by the law enforcement community as a valuable tool, helping to provide timely warning of threats and operational police activities.

    analyzing crime data

  • 11

    An important component of INTERPOL’s operational police support is the notice system, of which the Red Notice for wanted persons is the most well-known.

    international alert system

  • 12

    these are experts in a purely advisory capacity, who may be appointed by the Executive Committee and confirmed by the General Assembly.

    advisers

  • 13

    (Lyon, France) operates 24 hours a day, 365 days a year and is run by the Secretary General. It Works with Officials of more than 80 countries side-by-side using four official languages: Arabic, English, French and Spanish. It consists of seven (7) regional offices across the world namely:

    general secretariat

  • 14

    consisting of 13 members elected by the General Assembly and comprises the president, three vice –presidents and nine delegates covering the four regions.

    executive committee

  • 15

    is the supreme governing body of the Interpol, it meets annually and comprises delegates appointed by each member country. The assembly takes all important decisions related to policy, resources, working methods, finances, activities and programs.

    general assembly

  • 16

    is the world’s largest international police organization, with 190 member countries. It exists to help create a safer world by supporting law enforcement agencies worldwide to combat crime.

    interpol

  • 17

    As a state repression, ideological revolutionary activities or Nationalistic Revolutions.

    political

  • 18

    Terrorist who simply engage in all types of crime since they recognize no law.

    criminal

  • 19

    Means “Islamic Congregation”

    jemaah islamiyah

  • 20

    Literally means “Party of Allah” or “Party of God”. ok

    hezbollah

  • 21

    Terrorist who are controlled by and whose actions represent the national interest of a sovereign state.

    international terrorist

  • 22

    Terrorists who operates across national borders, whose actions and political aspirations may affects individual of more than one nationality

    transnational terrorist

  • 23

    Sued to define almost all illegal acts of violence committed for political purpose by clandestine groups.

    national terrorist

  • 24

    This is a mechanism by which a country can outlaw organizations deemed a threat to its national security, generally making it an offense to belong to, to train with, recruit for, fund, or otherwise support a banned organization or individual.

    proscription

  • 25

    as any act "intended to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government or an international organization to do or abstain from doing any act".

    terrorism

  • 26

    The illicit trade in small arms and light weapons occurs in all parts of the globe but is concentrated in areas afflicted by armed conflict, violence, and organized crime, where the demand for illicit weapons is often highest.

    illicit trafficking

  • 27

    The problem of arms trafficking is multidimensional. are manufactured and traded both licitly and illicitly thus making the identification and tracing of illegally manufactured and trafficked firearms very complex.

    firearms trafficking

  • 28

    This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails.

    cyberstalking

  • 29

    As mentioned, many cybercriminals these days are actually state-sponsored groups. Whether it’s the North Koreans, the Iranians, or even the US’s own NSA-affiliated Equation Group, world powers use hacker groups as one weapon in the complicated matrix of global politics.

    cyberspionage

  • 30

    One of the most common forms is ransomware, when hackers infect your computer with malware that encrypts all your files until you pay them a ransom to unlock them

    cyberextortion

  • 31

    is when hackers break into your device and use it to mine cryptocurrency without your knowledge or consent. Cryptominers do this by using JavaScript to infect your device after you visit an infected website.

    cryptojacking

  • 32

    refers to all kinds of online harassment, including stalking, sexual harassment, doxxing (exposing someone’s personal information, like their physical address, online without their consent), and fraping (breaking into someone’s social media and making fake posts on their behalf).

    cyberbullying

  • 33

    If you’re connected to an unsecured, unencrypted public Wi-Fi network, hackers can steal your data by “sniffing” your internet traffic with special tools (unless you have a VPN, of course).

    sniffing

  • 34

    This type of malware (or to be more specific, spyware) secretly logs everything you type, capturing your account information and other personal details.

    keylogging

  • 35

    uses malware to reroute unsuspecting internet surfers to fake versions of websites, where they unknowingly enter their personal details.

    pharming

  • 36

    Cybercrooks use “bait” in the form of fraudulent messages to lure victims to fake sites where they unwittingly enter personal information like usernames, passwords, or bank details.

    phishing

  • 37

    Computer viruses are the granddaddy of cybercrime; probably the first kind of it you became aware of. Viruses infect computer systems, destroying files, messing with the overall functionality, and self-replicating to jump to other devices and systems.

    malware

  • 38

    is vastly growing in the world of tech today. Criminals of the World Wide Web exploit internet users’ personal information for their own gain. They dive deep into the dark web to buy and sell illegal products and services. They even gain access to classified government information.

    cybercrime

  • 39

    manufacture of false money for gain, a kind of forgery in that something is copied so as to defraud by passing it for the original or genuine article. Because of the value conferred on money and the high level of technical skill required to imitate it, counterfeiting is singled out from other acts of forgery and is treated as a separate crime.

    counterfeiting

  • 40

    The third of the stages of money laundering is ‘integration’. The ‘dirty’ money is now absorbed into the economy, for instance via real estate. Once the ‘dirty’ money has been placed and layered, the funds will be integrated back into the legitimate financial system as ‘legal’ tender. Integration is done very carefully from legitimate sources to create a plausible explanation for where the money has come from.

    integration

  • 41

    The second stage in the money laundering process is referred to as ‘layering’. This is a complex web of transactions to move money into the financial system, usually via offshore techniques.

    layering

  • 42

    The first stage of money laundering is known as ‘dirty’ money is placed into the legal, financial systems. After getting hold of illegally acquired funds through theft, bribery and corruption, financial criminals move the cash from its source. This is where the criminal money is ‘washed’ and disguised by being placed into a legitimate financial system, such as in offshore accounts

    placement

  • 43

    is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source. The money from the criminal activity is considered dirty, and the process "launders" it to make it look clean. Money laundering is a serious financial crime that is employed by white collar and street-level criminals alike.

    money laundering

  • 44

    The offering, giving, receiving, or soliciting of something of value for the purpose of influencing the action of an official in the discharge of his or her public or legal duties.

    bribery

  • 45

    is dishonest behavior by those in positions of power, such as managers or government officials.

    corruption and bribery

  • 46

    Under common law, a defendant commits the crime of false pretenses when by making an intentional statement with intent to defraud the victim he obtains title to the personal property of the victim.

    false pretenses

  • 47

    is a false statement of a material fact made by one party which affects the other party's decision in agreeing to a contract.

    financial misrepresentation

  • 48

    referred to as “commercial crimes” or “white collar” crimes are illegal acts that are characterized by fraud, concealment, or a violation of trust and are not dependent upon the application of threat, physical force or violence.

    economic crimes

  • 49

    is the world’s 4th largest criminal enterprise, after drug smuggling, counterfeiting, and human trafficking

    environmental crime

  • 50

    pose a grave threat to our everyday lives, our planet and to future generations. Borders do not restrict environmental crimes, which range from ivory trafficking and overfishing of protected species, to illegal logging and the dumping of hazardous waste.

    environmental criminals

  • 51

    are violations of law that involve more than one country in their planning, execution, or impact. These offenses are distinguished from other crimes in their multinational nature, which poses unique problems in understanding their causes, developing prevention strategies, and in mounting effective adjudication procedures. Transnational crimes are distinct from international crime, which involves crimes against humanity that may or may not involve multiple countries.

    transnational crimes

  • 52

    The law that marks the beginning of the curfew hours, which demanded the closing of the gates of London during sundown

    statute of 1295

  • 53

    A system of policing whereby a group of ten neighboring male residents over twelve years of age were required to guard the town to preserve peace and protect the lives and properties of the people

    frankpledge system

  • 54

    was a policing system during the Norman Period when England was divided into fifty-five (55) military areas, each headed by a ruler called the Rieve (head-man or lieutenant of the army).

    shire rieve

  • 55

    A judicial practice where in the guilt or innocence of the accused is determined by subjecting him to an unpleasant, usually dangerous, experience. (

    trial by ordeal

  • 56

    A village law started in Britain which provided methods of apprehending a criminal by an act of the complainant to shout to call all male residents to assemble and arrest the suspect.

    hue and cry

  • 57

    A system of policing emerged during the Anglo-Saxon period whereby all male residents were required to guard the town (tun) to preserve peace and protect the lives

    tun policing system

  • 58

    a French term which claimed to be the origin of the term Police Officer

    officer de la paix

  • 59

    military bodies who serve as guardians of peace in ancient Rome in which the idea of policing said to have originated

    praetorian guards

  • 60

    is not organizationally separated from deviance control but is performed by regular street police in the country of England and United States.

    civil order control

  • 61

    is the modern police function which primarily involves the mission to reinforce community values and laws. This was adopted by Germany, China and Japan.

    deviance control

  • 62

    states that the yardstick of police proficiency relies on the absence of crime.

    modern police service

  • 63

    states that the yardstick of police proficiency relies on the number of arrest made

    old police service

  • 64

    the theory of police service which states that police officers are servants of the community or the people. This theory prevails in England and United States.

    home rule

  • 65

    is the theory of police service which maintains that police officers are servants of higher authorities. This theory prevails in the continental countries like France, Italy and Spain.

    continental

  • 66

    otherwise known as Islamic Justice. It derives all its procedure and practices from the interpretation of the Koran.

    islamic system

  • 67

    also known as Marxist Leninist Justice. Wherein procedures design to rehabilitate or restraint people into fulfilling their responsibilities to the state.

    socialist system

  • 68

    also known as the Continental Justice or Romano Germanic Justice. This is distinguished by strong inquisitorial system where fewer rights are granted to the accused, and written law are taken as gospel and subject to little interpretation.

    civil law

  • 69

    this is also as Anglo-American Justice. This is distinguished by a strong adversarial system where lawyers interpret and judge are bound by precedent.

    common law system

  • 70

    (The latter being a term referring to social cohesion on values), suggest that progressive lifestyles and norms result in the disintegration of older norms that once held people together.

    anomie and synomie theory

  • 71

    sees the problem as society becoming too complex.

    modernization theory

  • 72

    progress comes along with rising expectations, and people at the bottom develop unrealistic expectations while people at the top do not see themselves rising fast enough.

    deprivation theory

  • 73

    greater numbers of children are being born, because these baby booms grow up, delinquent subcultures develop out of the adolescent identity crisis.

    demographic theory

  • 74

    along with the higher standard of living, victims become more careless of their belongingness and opportunities for committing of crime multiply.

    opportunity theory

  • 75

    crime is a result of unrestrained migration and overpopulation in urban areas such as ghettos and slums.

    economic or migration theory

  • 76

    they report more crime to the police and also demand the police become more effective in solving crime problems.

    alertness to crime theory

  • 77

    smallest of the seven continents.

    Australia

  • 78

    sixth largest continent.

    antarctica

  • 79

    fifth largest continent.

    europe

  • 80

    Fourth largest continent of the world. Contains less than 12% worlds total land area.

    south america

  • 81

    it is twice the size of Europe. It has the largest deposits of important minerals including iron ore, copper, nickel and uranium

    north america

  • 82

    second largest of the continents and it cover 22% of the worlds total land area.

    africa

  • 83

    this is the largest among the seven continents, it covers around 30% of the worlds total land area.

    asia

  • 84

    THE DELIBERATE KILLING OF A LARGE GROUP OF PEOPLE, ESPECIALLY THOSE OF A PERTICULAR ETHNIC GROUP OR NATION.

    genocide

  • 85

    She stated that GLOBALIZATION is the growing inter- penetration of states, markets, communications, and ideas. It is one of the leading characteristics of the contemporary world.

    alyson brysk

  • 86

    It is believed that globalization is a positive development generating more trade and hence welfare of the whole world.

    politics

  • 87

    GLOBALIZATION has made easier or raise finance through individual and firms outside the country.

    finance

  • 88

    with the wide used of internet and other kinds of information technology, it has become much easier and faster to share information world-wide.

    information

  • 89

    With increase of Globalization, people tend to forget their mother tongue and use English instead as there is an idea that it makes them superior in some way.

    language

  • 90

    There has been an increase in the establishments of international courts of justice where someone accused could be dealt with in any part of the world..

    legislation

  • 91

    Globalization means a decrease in the cultural diversity that used to exist in the world earlier.

    culture

  • 92

    The worlds has become a huge market where you can buy and sell things produced in any part of the world. There are a lot of international brands operating worldwide.

    industry

  • 93

    It is the system of interaction among the countries of the world in order to develop the global economy. It refers to the integration of economics and societies all over the world.

    globalization

  • 94

    researcher communicates with a foreign researcher.

    collaborative method

  • 95

    A researcher visits another country

    safari method

  • 96

    It is the process of outlining the similarities and differences of one police system to another in order to discover insights in the field of international policing.

    comparative policing system

  • 97

    Refers to method, orderly combination or arrangement, of one parts or elements into a whole.

    system

  • 98

    Denotes the Degree or grade by which a person, thing, or other entity has a property or quality greater or less in extent than that of another.

    comparative

  • 99

    is one of the most important of the functions undertaken by the every sovereign government. For the state machinery, police is an inevitable organ which would ensure maintenance of law and order, and also the first link in the criminal justice system.

    policing