Last Test Flashcards

(99 cards)

1
Q

Men of Honour

A

One of the most relevant aspects from a communication standpoint. It signifies adherence to a specific behavioural model - loyalty and reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pizzini

A

Small sheets of paper that mobsters used to communicate and exchange information among themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Goal of Internal Communication Forms

A

To stay under the radar and evade police interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How the Italian Cinema Portrays the Mafia

A

The Italian cinema focused more on the mafia’s territorial and original dimensions and its historical values: honour, respect, family, power. The mafia is perceived as an invisible entity capable of controlling and influencing entire communities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How American Cinema Portrays the Mafia

A

The American cinema showcases a specific aesthetic and stereotype of the mobser the “wise guy”. Who is an honourable man portrayed as powerful, an elegant businessman who is simultaneously violent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mythologization of the Mafia

modern representation of the Mafia

A

The modern representation of the mafia tends to renew the mobster’s behaviour and aesthetics. Focusing on material and superficial aspects of power like wealth. Traditional power elements are integrated with symbols of wealth (Rolexs, luxury cars)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Media and the Mafia

A

Social Media is shaping a new generation of criminals who are increasingly attentive to the use of technology. The internet has allowed organized crime groups to demonstrate their power and wealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyber-Banging

A

Criminals exhibiting criminal power, recruiting members or acting directly against their enemies on social networks - can lead to real fights and even death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hyperreality

A

“the generation by models of a real without origin” - the inability of consciousness to distinguish reality from a simulation of reality, where physical and virtual worlds meet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Simulacrum

A

Something which replaces reality with its representations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do OCs use Hashtags and Emojis

A

Emojis and hashtags can articulate direct or indirect threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Violence Online and Offline

A

Some rival gang members now upload videos of themselves chanting slurs in enemy territory. Online aggression can quickly translate into outbreaks of actual violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Drill Music

A

A subculture of hiphop, characterized by dark, gritty beats and lyrics focusing on themes such as street life, violence and survival. “Drill” refers to the aggressive, confrontational style of the music, reflecting the realities of life in marginalized urban communities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TikTok and Organized Crime

A

Organized crime groups use TikTok to position themselves in popular culture as an alternative lifestyle. They can make their own story and do not have to rely on the media to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptophones

A

Secure communication devices are designed to protect the privacy of voice calls and messages through encryption. Primarily used to prevent eavesdropping and unauthorized access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Critical Features of Cryptophones

A
  1. End-to-End Encryption
  2. Security Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

End-to-End Encryption

A

The data is encrypted on the sender’s device and can only be decrypted by the intended recipient, ensuring no one else can listen to the conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security Protocols

A

Cryptophones utilize advanced encryption algorithms and security protocols to safeguard communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyberspace

A

Mass consensual hallucination of computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

History of Cybercrime

A

The first case of cybercrime occured in 1834 in France where two brothers traded government bonds. They bribed a telegraph operator and stole confidential market information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cryptocurrency

A

A form of digital asset based on a network that is distributed across a large number of computers - this allows them to exist outside of government control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Understanding cryptocurrency

A

Cryptocurrencies are digital or virtual currencies underpinned by cryptographic systems. They enable secure online payments without the use of third-party intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Public key

A

The public key encrypts the message, it is shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Private key

A

The private key decrypts the message, it is not shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
# what are they used for Cryptocurrencies and crime
Can be used for criminal purposes such as money laundering, fraud and the online trade of illicit goods and services
26
Definition of Cybercrime
any unauthorized, deviant, or illegal internet activity involving a computer as a tool to commit the activity and another computer as the target of the activity
27
Hackers
individuals who claim to be hackers contend that true hackers are concerned with enhancing computer security
28
Cracker
Suggested to replace the term hacker. This refers to an individual who violates copyright protection
29
Difference between Cybercrime and Organized crime
Cybercrime are hit-and-run groups, while organized crime groups are hit-and-stay groups
30
Identity Theft
The procuring of this false identity regardless of its use. Some times used by criminals and terrorists to establish false identities and escape detection
31
Credit Card Skimming
Offenders steal credit card information from the card scanned through an electronic card reader
32
Shoulder surfing
an offender peers over the victim's shoulder and memorizes the credit card number when the victim pays for their merch
33
Fraudulent Online sales
a significant problem with online auction fraud is when an individual purchases merchandise but never receives the items
34
Advance fee funds
victim being lured into paying money to receive a service or benefit that never occurs
35
Cyberstalking
the use of information and technological communications to support, deliberate, and repeat hostile behaviour by an individual or group intended to harm others
36
Cyber-Extortion
A hacker or malicious individual threatens to release, destroy or withold sensitive data or services unless the victim pays a ransom
37
cyber-terrorism
terrorism planned in cyberspace
38
Cyberheist
The online equivalent of the traditional bank heist is monetary theft carried out through hacking
39
Surface Web
aka the visible web or index web. It is the websites used daily to conduct regular activities, where our daily activities occur and post people consider the internet
40
Deep Web
Web content that is not included as a part of the Surface Web, it is hidden from the outside world
41
The dark web
a division of the deep web, hidden from standard search engines, all data is encrypted. To access it, you need special software, configurations or authorization
42
Marketplaces on the dark web
(1) silk road (2) alphabay market
43
what opportunities have the internet created for criminals
New opportunities, markets, and delivery methods for illegal transactions. These technologies have designed a virtual storefront where organized crime groups and criminal networks can efficiently and anonymously buy, sell, and exchange illegal products
44
Project Oriver
the RMC and Combined Forces Special Enforcement Unit partners discovered an organized crime groups using an off-shore gambling website Platinum Sports Book.com to launder proceeds of crime generated in Canada and make money through illegal gambling
45
Corruption
"exercise of official powers without regard for public interest" and/or "the abuse of public office for private gain - corruption also exists in a purely private setting
46
supply-side corruption
offering an illicit payment or undue advantage
47
demand-side corruption
relates to accepting or soliciting such payment ot benefit
48
Petty corruption
aka bureaucratic corruption. Implies the involvement of public administration officials and non-elected officials. (bribes paid to enforcement officials, customs personnel)
49
Grand corruption
involves higher-ranking government officials and elected officials
50
Why Bill C-95 was Introduced and why it was amended
The federal government introduced the anti-gang legislation in response to the Quebec attorney General's plea for measures to address the Bike War between the Rock Machine and the Hells Angels. The legislation was introduced after the murder of an 11-year-old boy but was amended following the attempted murder of a crime reporter
51
Bill C-95 Offence
Created a new offence: participation in a criminal organization. Meaning any group consisting of five or more persons, formally or informally organized and meeting two requirements
52
Two Requirements for Bill C-95 Offence
(1) the commission of an indictable offence under this or any act of parliament for which the max punishment for 5 years or more (2) any or all of the members of which engage in or have, within the preceding five years, involved in the commission of a series of offences
53
Bill C-24
The definition of criminal organization was amended. The definition was "too complex and too narrow in scope"
54
How was Bill C-24, the definition was amended (in three ways)
(1) reducing the number of people required to contribute to a criminal organization from 5 to 3 (2) removing the previous requirement that at least one member of the organization be involved in committing crimes within the past 5 years (3) extending the scope of offences that define criminal organizations. It was limited to indictable offences punishable by 5 years or more, now includes all serious crimes
55
What does the Criminal Code Explicitly state about Criminal Organizations
A criminal organization does not include individuals who form randomly to commit a single offence
56
Section 467.11
This offence consists of participating in or contributing to any activity of a criminal organization to enhance its ability to facilitate or commit an indictable offence
57
Section 467.12
This offence involves committing an indictable offence for the benefit of, at the direction of, or in association with a criminal organization
58
# for the leaders Section 467.13
The most serious of the three particular criminal organization offences, aimed primarily at the leaders of criminal organizations. This section makes it a criminal offence for a member of a criminal organization to knowingly instruct any person to commit an offence for the benefit of, the direction of, or in association with the organization
59
is membership in a criminal organization an offence
No, membership in a criminal organization an offence
60
what country had criminalized simple membership in criminal organizations
Italy ; the Italian approach (the crime of associating)
61
Lindsay and Bonner v The Queen - Court Case
Lindsay and Bonner was the first case to test the federal government's anti-gang legislation, making it a crime to commit a serious offence for the benefit of a criminal organization. The first time a judge has declared the group, instead of individuals criminal (hells angels)
62
Who were Lindsay and Bonner
two members of the Hell's Angels, accused of trying to extort $75000 from a businessperson and of acting in association with an identifiable criminal group
63
Outcome of Lindsay and Bonner v The Queen
The judge found that the accused had the requisite mens rea for extortion and that they acted in association with a criminal organization. In associated with proven by: wearing jackets bearing the primary symbols of the Hells Angels and referring to “guys” who were “the same kind of mother f—-—as I am.”
64
Mens Rea
Guilty mind - refers to the mental state that generally accompanies a prohibited act before it can legally be considered a crime
65
Amendments
(1) Bill C-10 introduced mandatory minimum sentences for offences relating to the trafficking and production of various controlled sentences (2) The Cannabis Act legalized the possession, sale and production of cannabis
66
R. v. Campbell and Shirose
The Supreme Court of Canada overturned the convictions of Campbell and Shirose for conspiracy to traffic a narcotic and conspiracy to possess a narcotic for trafficking. The RCMP had conducted an illegal "reverse sting" operation by selling 50 kg of hashish to the accused. The court found that the operation was an abuse of process
67
Four Types of Wiretap
(1) General (2) with consent (3) emergency (4) video intercepts
68
Penalty of Wiretap
Wilful interception of a private communication, without authorization is an indictable offence, with a maximum penalty of 5 years
69
Amendment of the Canadian Business Corporations Act
Requires any federally incorporated corporation that meets specific criteria to keep a register of information on beneficial ownership
70
Real Estate GTA
Most companies are privately owned, and their beneficial owners are unknown
71
Cryptolect
Insider code, a secretive dialect designed to keep outsiders out of the group's communicative loop - often based on in group slang
72
Two common types of Cryptolects
(1) Argots (2) Cants
73
Argots
Temporary secret languages used by street criminals
74
Cants
Secret languages used by long-lasting criminal gangs and passed down through generations
75
Cryptography
Secure communications techniques that allow only a message's sender and intended recipient to view its contents
76
Bi-Literary Alphabet
Francis Bacon invented a cipher in which different stretches of a and b represent all the letters of the alphabet - binary code can be written with 0s and 1s in place of two letters
77
Organized crime can be explored from two main perspectives
(1) Ontological (2) Relational
78
Ontological
Concerns the nature of criminal organizations, their existence and structure and how these entities define themselves and perpetuate overtime. Understanding organized crime as a phenomenon with its own identity and internal logic, rooted in historical and cultural traditions determining its form and function within society. A social reality with its structure, internal laws and rules that distinguish it from other forms of criminality
79
Relational
Explores the dynamics between the actors involved in organized crime, the interactions between the members and between these organizations and the institutions, law enforcement, politics and civil society. Organized crime is not a static structure but dynamic, that develops and adapts according to social and political relationships
80
Different Association Theory
Claims that criminal behaviour is learned through constant contact with criminals or criminal groups. This behaviour is not innate but acquired in a social environment where criminals are perceived as having some distinction. Claims criminal behaviour is learned by people who want to imitate it and evolve into criminals
81
Imitation
a form of social learning that involves copying, mimicking or emulating someone else's behaviour
82
Peer pressure
Peers can influence a young person to leave home, join a gang, take drugs etc to display mettle to the peer group
83
Three functions reinforce the tendency to imitate and absorb criminal behaviour in Differential Association Theory
(1) Intensity (2) Frequency (3) Duration of the contact with the group
84
Rational Choice Theory
An individual might make a rational choice to join a gang based on past experiences to calculate the effectiveness of his future behaviours. Making a rational decision among available alternatives - weighing risk and reward
85
Deterrence and Rational Choice Theory
Blames the crime problem on the individual rather than society as a whole. Implies that the criminal must take responsibility and make better choices
86
Social Disorganization Theory
Suggests that criminal associations emerge when access to public resources, employment, adequate education and social mobility are lacking. Therefore, social success is seen as achievable only in gangs. The theory views criminal antisocial behaviour as conditioned by a reaction to the disorganized world in which individuals live because gangs provide the sense of order that individuals seek.
87
Three main premises of Social Disorganization Theory
(1) physical status (2) economic status (3) Differential values
88
Social Control Theory
Those who do not become involved in organized crime possess a stronger bond with the moral order than those who become involved. Delinquent acts result when an individual's bond to society is weak or broken, external and internal restraints determine the strength of this bond
89
Elements of bond in social control theory
Attachment to significant others, institutions and commitment to investment in conventional society and belief in the general values of society
90
External restraints
Social disapproval linked to public shame, social ostracism and fear of punishment. Most are deterred with the possibility of being caught and the punishment that can result
91
Internal Restraints
superego, an unconscious yet powerful conscience-like mechanism that provides a sense of guilt (moral law)
92
Anomie Theory
Claims that some individuals might feel lonely in an impersonal society with a weak moral compass. Deviance depends on society's definition of success and individuals' desires to achieve success through socially defined avenues, criminality becomes attractive when expectations of fulfilling goals by legitimate means cannot be met. Suggests a strain between societal expectations for success and limited opportunity that causes a person to innovate in the form of organized crime
93
Five Ways to Adapt to the Anomie's Strain
(1) Conform to universal goals and try to reach them through legitimate means (2) Innovate and achieve goals using means other than those generally accepted by society (3) Ritualism, rejecting the goals and focusing on the means of achieving them (4) Retreat, altogether rejecting both the goals and the means of society (5) Rebel against a culture that has denied individuals the opportunity for success
94
Subculture Theory
Based on the assumption that all youth share similar goals and economic aspirations. Postulates that lower-class youth create their new subculture to achieve status instead of striving to attain the same goals as middle-class youth. This subculture consists of norms and criteria suitable for a criminal lifestyle: toughness, excitement, fate, autonomy, hostility, achieving recognition through crime and hedonism
95
Ethical Succession
Refers to the emergence of criminal gangs within immigrant ethnic communities motivated by the financial and social hardships that some members of the communities might face
96
Underclass Theory
Considered a social class below the traditional lower class. Employment is neither available or accessible due to isolation of the neighbourhood, inadequate job information networks and poor schooling. Takes the view that gangs and their involvement in crime is a natural response to the harsh influence of street life caused by structural divestment, which limits positive cultural and social opportunities and is interrelated with various social problems
97
Features of Criminal Tribalism
(1) in group loyalty (2) hostility to outsiders (3) endurance (4) resentment of authority outside the gang (5) siege mentality (6) a sense of kinship
98
Adaptability
Adjusting activities and lifestyles to fit new conditions, enhancing survival
99
Bandello Effect
Gangs provide youths with status, recognition, security and opportunities for excitement when conventional social institutions do not meet these needs