CHAPTER G Flashcards Preview

detective test > CHAPTER G > Flashcards

Flashcards in CHAPTER G Deck (53)
Loading flashcards...
0
Q
  1. WHAT IS THE LARGEST PERCENTAGE OF TERRORIST ATTACKS IN THE US.
A
  1. BOMBINGS BY SPECIAL INTEREST GROUPS.
1
Q
  1. WHAT ARE FISHING EXPEDITIONS.
A
  1. INTELLIGENCE GATHERING ON PEOPLE FOR WHOM THERE IS NO REASONABLE SUSPICION OF CRIMINAL ACTIVITY.
2
Q
  1. WHOSE RESPONSIBILITY IS IT TO SUPPORT THE INTELLIGENCE FUNCTION.
A
  1. EVERY LAW ENFORCEMENT OFFICER.
3
Q
  1. OVERT INFORMATION COLLECTION
A
  1. A METHOD OF COLLECTING INFORMATION INVOLVING PERSONAL INTERACTION WITH INDIVIDUALS, MANY OR WHOM ARE WITNESSES TO CRIMES, VICTIMS OF CRIMES, OR THE SUSPECTS THEMSELVES.
4
Q
  1. COVERT INFORMATION COLLECTION.
A
  1. A CLANDESTINE PROCESS OF DATA COLLECTION ON CRIMINAL ACTS THAT HAVE NOT YET OCCURRED BUT FOR WHICH THE INVESTIGATOR MUST PREPARE.
5
Q
  1. WHAT KIND OF INTELLIGENCE COLLECTION METHODS DOES COFERT INTELLIGENCE USE
A
  1. PHYSICAL SURVEILLANCE
  2. ELECTRONIC SURVEILLANCE
  3. INFORMANTS
  4. UNDERCOVER OFFICERS.
6
Q
  1. WHAT DOES COVERT INFORMATION COLLECTION USE
A
  1. INTELLIGENCE GATHERING.
7
Q
  1. WHAT IS INTELLIGENCE GATHERING.
A
  1. THE COVERT PROCESS OF GATHERING INFORMATION ON CRIMINAL ACTIVITY
8
Q
  1. CRIMINAL INTELLIGENCE
A
  1. DOCUMENTED INFORMATION REGARDING PAST, PRESENT, OR FUTURE CRIMINAL ACTIVITY THAT RESULTS FROM THE COLLECTION OF INFORMATION THAT WHEN EVALUATED, PROVIDES THE USER WITH A BASIS FOR RATIONAL DECISION MAKING.
9
Q
  1. WHAT IS THE ROLE OF INTELLIGENCE PERSONNEL

10

A
  1. TO DELIVER INFORMATION TO LINE PERSONNEL
10
Q

THE DIFFERENCES BETWEEN CRIMINAL INVESTIGATIONS AND CRIMINAL INTELLIGNCE 4

A
  1. CRIMINAL INVEST ARE USUALLY REACTIVE. CRIMINAL INTELLIGENCE GATHERING IS PROACTIVE.
  2. CRIMINAL INVEST WORK WITH DEDUCTIVE LOGIC. CRIMINAL INTELLIGENCE INVESIGATORS USE INDUCTIVE LOGIC.
  3. CRIMINAL INVESTIGATION FILES ARE CONSIDERED OPEN FILES. CRIMINAL INTELLIGENCE FILES ARE CONSIDERED CLOSED FILES.
  4. INTELLIGENCE FILES ARE KEPT APART FROM CRIMINAL INVESTIGATION FILES TO PREVENT UNAUTHORIZED PERSONAL FROM LOOKING AT DATA.
11
Q
  1. OPEN FILES.

2. CLOSED FILES.

A
  1. CRIMINAL INFORMATION DEVELOPED FOR THE PURPOSE OF EVENTUALLY MAKING AN ARREST AND GAINING A CONVICTION IN A COURT OF LAW.
  2. INTELLIGENCE FILES THAT ARE MAINTAINED APART FROM CRIMINAL INVESTIGATION FILES TO PREVENT UNAUTHORIZED INSPECTION OF DATA.
12
Q
  1. WHAT ARE THE TWO TYPES OF INTELLIGENCE GATHERING.
A
  1. STRATEGIC INTELLIGENCE

2. TACTICAL INTELLIGENCE.

13
Q
  1. STRATEGIC INTELLIGENCE
A
  1. INFORMATION THAT PROVIDES THE INVESTIGATOR WITH INFORMATION AS TO THE CAPABILITIES AND INTENTIONS OF TARGET SUBJECTS. IS MOST USEFUL IN LONG RANGE PLANS FOR INTERDICTION IN AREAS OF CRIMINAL ACTIITY OVER EXTENDED PERIODS.
14
Q
  1. TACTICAL INTELLIGENCE.
A
  1. INFORMATION THAT FURNISHES THE POLICE AGENCY ITH SPECIFICS ABOUT INDIVIDUALS, ORGANIZATIONS, AND DIFFERENT TYPES OF CRIMINAL ACTIVITY. TARGETS CRIMINAL ACTIVITY CONSIDERED TO BE OF IMMEDIATE IMPORTANCE TO THE INVESTIGATOR.
15
Q
  1. WHO IS THE LEAD AGENCY FOR PREVENTING AND INVESTIGATING INTELLIGENCE ACTIITIES ON US SOIL
A

THE FBI

16
Q
  1. WHAT DOES THE INTELLIGENCE FUNCTION INCLUDE
A
  1. TARGET SELECTION
  2. DATA COLLECTION
  3. DATA COLLATION AND ANALYSIS
  4. DISSEMINATION
17
Q
  1. HOW ARE INTELLIGENCE TARGETS SELECTED
A
  1. IN A SYSTEMATIC MANNER.
18
Q
  1. WHEN COLLECTING DATA, WHAT IS THE CRITERIA FOR COLLECTING DATA ON INDIVIDUALS.
  2. WHO SHOULD DATA NOT BE COLLECTED ON .
A
  1. THEY MUST PRESENT A CLEAR AND PRESENT DANGER TO SOCIETY.
  2. DATA CHOULD NOT BE COLLECTED ON PEOPLE SOLELY ON RACE, CREED, COLOR, NATIONAL ORIGIN, SEXUAL PREFERENCE, OR POLITICAL OR RELIGIOUS BELIEFS.
19
Q
  1. COLLATION

20

A
  1. THE PROCESS OF COMPARING TEXTS CAREFULLY TO CLARIFY OR GIVE MEANING TO.
20
Q
  1. DISSEMINATION
A
  1. THE PHASE OF INTELLIGENCE PROCESS WHERBY INFORMATION IS SHARED WITH OTHER LAW ENFORCEMENT AGENCIES. THE FINAL STAGE.
21
Q
  1. ANALYSIS.

2. WHAT IS THE MOST COMMON METHOD OF DATA DESCRIPTION AND INTEGRATION.

A
  1. A SCIENTIFIC EXAMINATION.

2. LINK ANALYSIS.

22
Q
  1. LINK ANALYSIS.
A
  1. A CHARTING TECHNIQUE DESIGNED TO SHOW RELATIONSHIPS BETWEEN INDIVIDUALS AND ORGANIZATIONS USING A GRAPHIC VISUAL DESIGN.
23
Q
  1. WHAT IS THE ROLE OF THE INTELLIGENCE ANALYST. 4
A
  1. TO GUIDE DATA COLLECTION
  2. TO SUGGEST OPERATIONAL RECOMMENDATIONS
  3. TO PROVIDE INFORMATION TO DECISION MAKERS
  4. TO ASSUME A POSITION OF NONINVOLVEMENT IN POLICE INFORMATION.
24
Q
  1. FLOWCHARTING.
A
  1. AN INFORMATIONAL TRACKING SYSTEM THAT DEMONSTRATES A CHAIN OF EVENTS OR ACTIVITIES OVER A PERIOD OF TIME.
25
Q
  1. WHAT ARE THE TWO TYPES OF FLOWCHARTING.
A
  1. EVENT FLOW ANALYSIS.

2. COMMODITY FLOW ANALYSIS.

26
Q
  1. EVENT FLOW ANALYSIS
A
  1. A PROCESS WHEREBY EVENTS ARE DOCUMENTED, THEY ARE CONNECTED BY ARROWS TO INDICATE THE DIRECTION OF THE SEQUENCE.
27
Q
  1. COMMODITY FLOW ANALYSIS
A
  1. CHARTING THE LOGICAL FLOW OF SUCH COMMODITIES AS DRUGS, MONEY , AND ILLEGAL ARMS SHIPMENTS.
28
Q
  1. RISS PROJECTS (FEDERAL REGIONAL INFORMATION SHARING SYSTEM)
A
  1. PROVIDES INFORMATION SHARING RESOURCES AND INESTIGATIVE SUPPORT TO COMBAT MULTI JURISDICTIONAL CRIMES INCLUDING VIOLENT CRIME, GANG ACTIVITY, TERRORISM, DRUG ACTIVITY, CYBERCRIME, HUMAN TRAFFICKING, IDENTITY THEFT, AND OTHER PRIORITIES. PROVIDES INFORMATION TO FEDERAL, LOCAT, AND STATE LAW ENFORCEMENT.
29
Q
  1. WHAT DOES RISS PROVIDE ALL LAW ENFORCEMENT AGENCIES

30

A
  1. A CENTRALIZED DATABASE
  2. ANALYSIS OF INTELLIGENCE AND INVESTIGATIVE DATA
  3. SPECIALIZED EQUIPMENT ON LOAN
  4. CONFIDENTIAL FUNDS
  5. TECHNICAL ASSISTANCE
  6. SPECIALIZED TRAINING
  7. ACCESS TO TELECOMMUNICATION SYSTEMS
30
Q
  1. WHAT INTELLIGENCE FILES SHOULD BE PURGED FROM THE SYSTEM.4
A
  1. FILES THAT ARE NO LONGER ACCURATE.
  2. FILES THAT ARE NO LONGER RELEVANT TO THE MISSION
  3. FILES THAT DO NOT PERTAIN TO INVESTIGATIVE INTERESTS AND ACTIITIES.
  4. FILES THAT CONTAIN INSUFFICIENT SUPPORTING DOCUMENTATION.
31
Q
  1. MULTILATERATION
A
  1. A NAVIGATION TECHNIQUE BASED ON THE MEASUREMENT OF THE DIFFERENCE IN DISTANCE TO TWO OR MORE STATIONS AT KNOWN LOCATIONS THAT BROADCAST SIGNALS AT KNOWN TIMES.
32
Q
  1. TRIANGULATION
A
  1. THE PROCESS OF FINDING ONES POSITION ON A GIVEN PLANE WHEN TWO VISUAL LANDMARKS ARE KNOWN
33
Q
  1. ACCORDING TO TITLE 3 OF THE OMNIBUS CRIME CONTROL AND SAFE STREETS ACT, WHEN CAN LAW ENFORCEMENT OFFICERS LISTEN TO ELECTRONIC COMMUNICATIONS
A
  1. WHEN AN OFFICER IS ONE OF THE PARTIES INVOLVED IN THE COMMUNICATION.
  2. WHEN ONE OF THE PARTIES IS NOT THE OFFICER, BUT WILLINGLY DECIDES TO SHARE THE COMMUNICATION WITH THE OFFICER
  3. OR WHEN OFFICERS OBTAIN A WARRANT BASED ON PROBABLE CAUSE.
34
Q
  1. WHO IS THE ONLY PERSON WHO HAS THE AUTHORITY TO PERMIT EAVESDROPPING.
A
  1. THE SENDER OF THE MESSAGE.
35
Q
  1. MINIMIZATION
A
  1. WHEN LAW ENFORCEMENT IS REQUIRED TO LIMIT THEIR MONITORING OF CRIMINAL SUSPECTS.
  2. ITS THE REQUIREMENT THAT OFFICERS TAKE EVERY REASONABLE EFFORT TO MONITOR ONLY THOSE CONVERSATIONS, THROUGH THE USE OF A PHONE TAP, BODY BUGS, AND THE LIKE, THAT ARE SPECIFICALLY RELATED TO THE CRIMINAL ACTIVITY UNDER THE INVESTIGATION.
36
Q
  1. WHAT DOES THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 DEAL WITH 3
A
  1. WIRETAPS AND BUGS, WHICH ENABLE OFFICERS TO LISTEN TO CRIMINAL CONVERSATIONS
  2. PEN REGISTERS, WHICH RECORD NUMBERS DIALED FROM A PHONE
  3. AND TRACING DEVICES, WHICH DETERMINE THE NUMBER FROM WHICH A CALL EMANATES.
37
Q
  1. WHAT DOES THE TELECOMMUNICATIONS ACT OF 1996 DO.
A
  1. MAKES IT A FEDERAL OFFENSE FOR ANYONE ENGAGED IN INTERSTATE OR INTERNATIONAL COMMUNICATIONS TO KNOWINGLY USE A TELECOMMUNICATIONS DEVICE TO CREATE, SOLICIT, OR INITIATE THE TRANSMISSIOON OF ANY COMMENT, REQUEST, SUGGESTION, PROPOSAL, IMAGE, OR OTHER COMMUNICATION WHICH IS AT THE SCENE LEWD, MISCHIEVOUS, FILTHY, OR INDECENT, WITH INTENT TO ANNOY, ABUSE, THREATEN, OR HARASS ANOTHER PERSON. MAKES IT AN OFFNESE FOR ANYONE TO MAKE A CALL WITHOUT DISCLOSING HIS IDENTITY WITH THE INTENT TO ANNOY.
38
Q
  1. FORWARD LOOKING INFRARED.
A
  1. A SUREILLANCE TECHNOLOGY THAT MEASURES RADIANT ENERGY IN THE RADIANT HEAT PORTION AND DISPLAYS READINGS AS THERMOGRAPHS.
39
Q
  1. FOOT SUREILLANCE

40

A
  1. TECHNIQUE USED DURING SHORT DISTANCES TO MAINTAIN CONTACT WITH A SUSPECT AFTER HE HAS LEFT A VEHICLE.
40
Q
  1. 4 PRINCIPAL METHODS FOR CONDUCTING A MOVING SURVEILLANCE ON FOOT.
A
  1. ONE OFFICER SURVEILLANCE.
  2. TWO OFFICER SURVEILLANCE
  3. ABC METHOD.
  4. PROGRESSIVE OR LEAPFROG METHOD
41
Q
  1. ONE OFFICER SURVEILLANCE
A
  1. SINGLE OFFICER DOES SURVEILLANCE. MOST DIFFICULT TO CONDUCT.
42
Q
  1. TWO OFFICER SURVEILLANCE.
A
  1. BOTH OFFICERS REMAIN ON THE SAME SIDE OF THE STREET AS THE SUSPECT. FIRST OFFICER TRAILS THE SUSPECT FAIRLY CLOSE. THE SECOND OFFICER REAMAINS SOME DISTANCE BEHING THE FIRST. ON A LESS CROWDED STREET, ONE OFFICER STAYS ACCORSS THE STREET.
43
Q
  1. ABC METHOD FOR FOOT SURVEILLANCE.
A
  1. THREE OFFICERS. A KEEPS DISTANCE BEHIND SUSPECT. B FOLLOWS A, KEEPING A IN VIEW. C WALKS ON OPPOSITE SIDE OF STREET BEHIND THE SUSPECT.
44
Q
  1. PROGRESSIVE OR LEAPFROG METHOD FOR FOOT SURVEILLANCE.
A
  1. USED FOR SUSPECTS WHO TAKE A HABITUAL ROUTE EACH DAY.
    SURVIELLANCE OFFICER STATIONS HIMSELF AT A FIXED POINT UNTIL THE SUSPECT DISAPPEARS FROM VIEW. OFFICER THEN STATIONS HIMSELF THE NEXT DAY WHERE THE SUSPECT DISAPPEARED. USED FOR LOCATING HIDEOUTS OR MEETING PLACES.
45
Q
  1. SIGNS THAT A SUSPECT KNOWS THEY ARE BEING FOLLOWED.10
A
  1. STOPS TO TIE A SHOELACE, WHOLE LOOKING AROUND
  2. STOPS ABRUPTLY AND LOOKS AROUND AT PEOPLE.
  3. STOPS ABRUPTLY AFTER TURNING A CORNER.
  4. WALKS SLOWLY OR RAPIDLY.
  5. ARRANGES FOR A FRIEND TO WATCH FOR SURVEILLANTS
  6. RIDING SHORT DISTANCES ON BUSES OR TAXIS, OR CIRCLING THE BLOCK
  7. ENTERS A BUILDING AND LEAVE IMMEDIATELY THROUGH ANOTHER EXIT.
  8. WATCHES IN LOBBY MIRRORS TO SEE WHO IS COMING AND GOING
  9. STARTS TO LEAVE LOCATION QUICKLS THEN TURNS AND LOOKS
  10. OPEN AND CLOSES THE HOTEL DOOR TO SEE IF ANYONE LEAVE THEIR ROOM.
46
Q
  1. WHAT ARE THE 4 MOBILE SURVEILLANCE METHODS.
A
  1. ONE CAR SURVEILLANCE
  2. TWO CAR SURVEILLANCE
  3. THREE CAR SURVEILLANCE
  4. THE LEAPFROG METHOD.
47
Q
  1. STAKEOUT
A
  1. A STATIONARY OR FIXED SURVEILLANCE.
48
Q
  1. WHAT TWO OFFICER TEAMS DOES A STAKEOUT CONSIST OF.
A
  1. AN OUTSIDE TEAM

2. AN INSIDE TEAM

49
Q
  1. WHAT IS THE OUTSIDE TEAM

50

A
  1. DESIGNATED AS THE ARREST TEAM IN A SURVEILLANCE.
50
Q
  1. THE INSIDE TEAM
A
  1. RESPONSIBLE FOR BRIEFING OFFICERS CONCERNING THEIR ACTIONS IF A CRIME OCCURS
51
Q
  1. WHAT IS THE FUNCTION AND IMPORTANCE OF INTELLIGENCE GATHERING.
A
  1. IDENTIFY CRIMINAL GROUPS AND PERSONS WHO PARTICIPATE IN THEM
  2. PLAYS AN IMPORTANT ROLE IN THE SUPPORT OF LAW ENFORCEMENT AND THE ULTIMATE PROTECTION OF SOCIETY.
  3. INTELLIGENCE OPERATIONS CAN SHIFT FOCUS BASED ON PERCEIVED NEEDS AND THREATS.
52
Q

1, HOW IS SURVEILLANCE OPERATIONS USEFUL IN CRIMINAL INVESTIGATIONS.

A
  1. THEY CAN BE DIRECTED TOWARD A PERSON, VEHICLE, OR LOCATION FOR THE PURPOSES OF BRINGING AN INVESTIGATION INTO FOCUS. BY IDENTIFYING INDIIDUALS AND OBTAINING INFO ABOUT THEIR ACTIVITIES.

Decks in detective test Class (121):