CHAPTER G Flashcards

1
Q
  1. WHAT IS THE LARGEST PERCENTAGE OF TERRORIST ATTACKS IN THE US.
A
  1. BOMBINGS BY SPECIAL INTEREST GROUPS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. WHOSE RESPONSIBILITY IS IT TO SUPPORT THE INTELLIGENCE FUNCTION.
A
  1. EVERY LAW ENFORCEMENT OFFICER.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. OVERT INFORMATION COLLECTION
A
  1. A METHOD OF COLLECTING INFORMATION INVOLVING PERSONAL INTERACTION WITH INDIVIDUALS, MANY OR WHOM ARE WITNESSES TO CRIMES, VICTIMS OF CRIMES, OR THE SUSPECTS THEMSELVES.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. COVERT INFORMATION COLLECTION.
A
  1. A CLANDESTINE PROCESS OF DATA COLLECTION ON CRIMINAL ACTS THAT HAVE NOT YET OCCURRED BUT FOR WHICH THE INVESTIGATOR MUST PREPARE.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. WHAT KIND OF INTELLIGENCE COLLECTION METHODS DOES COFERT INTELLIGENCE USE
A
  1. PHYSICAL SURVEILLANCE
  2. ELECTRONIC SURVEILLANCE
  3. INFORMANTS
  4. UNDERCOVER OFFICERS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. WHAT DOES COVERT INFORMATION COLLECTION USE
A
  1. INTELLIGENCE GATHERING.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. WHAT IS INTELLIGENCE GATHERING.
A
  1. THE COVERT PROCESS OF GATHERING INFORMATION ON CRIMINAL ACTIVITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. CRIMINAL INTELLIGENCE
A
  1. DOCUMENTED INFORMATION REGARDING PAST, PRESENT, OR FUTURE CRIMINAL ACTIVITY THAT RESULTS FROM THE COLLECTION OF INFORMATION THAT WHEN EVALUATED, PROVIDES THE USER WITH A BASIS FOR RATIONAL DECISION MAKING.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. WHAT IS THE ROLE OF INTELLIGENCE PERSONNEL

10

A
  1. TO DELIVER INFORMATION TO LINE PERSONNEL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

THE DIFFERENCES BETWEEN CRIMINAL INVESTIGATIONS AND CRIMINAL INTELLIGNCE 4

A
  1. CRIMINAL INVEST ARE USUALLY REACTIVE. CRIMINAL INTELLIGENCE GATHERING IS PROACTIVE.
  2. CRIMINAL INVEST WORK WITH DEDUCTIVE LOGIC. CRIMINAL INTELLIGENCE INVESIGATORS USE INDUCTIVE LOGIC.
  3. CRIMINAL INVESTIGATION FILES ARE CONSIDERED OPEN FILES. CRIMINAL INTELLIGENCE FILES ARE CONSIDERED CLOSED FILES.
  4. INTELLIGENCE FILES ARE KEPT APART FROM CRIMINAL INVESTIGATION FILES TO PREVENT UNAUTHORIZED PERSONAL FROM LOOKING AT DATA.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. OPEN FILES.

2. CLOSED FILES.

A
  1. CRIMINAL INFORMATION DEVELOPED FOR THE PURPOSE OF EVENTUALLY MAKING AN ARREST AND GAINING A CONVICTION IN A COURT OF LAW.
  2. INTELLIGENCE FILES THAT ARE MAINTAINED APART FROM CRIMINAL INVESTIGATION FILES TO PREVENT UNAUTHORIZED INSPECTION OF DATA.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. WHAT ARE THE TWO TYPES OF INTELLIGENCE GATHERING.
A
  1. STRATEGIC INTELLIGENCE

2. TACTICAL INTELLIGENCE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. STRATEGIC INTELLIGENCE
A
  1. INFORMATION THAT PROVIDES THE INVESTIGATOR WITH INFORMATION AS TO THE CAPABILITIES AND INTENTIONS OF TARGET SUBJECTS. IS MOST USEFUL IN LONG RANGE PLANS FOR INTERDICTION IN AREAS OF CRIMINAL ACTIITY OVER EXTENDED PERIODS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. TACTICAL INTELLIGENCE.
A
  1. INFORMATION THAT FURNISHES THE POLICE AGENCY ITH SPECIFICS ABOUT INDIVIDUALS, ORGANIZATIONS, AND DIFFERENT TYPES OF CRIMINAL ACTIVITY. TARGETS CRIMINAL ACTIVITY CONSIDERED TO BE OF IMMEDIATE IMPORTANCE TO THE INVESTIGATOR.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. WHO IS THE LEAD AGENCY FOR PREVENTING AND INVESTIGATING INTELLIGENCE ACTIITIES ON US SOIL
A

THE FBI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. WHAT DOES THE INTELLIGENCE FUNCTION INCLUDE
A
  1. TARGET SELECTION
  2. DATA COLLECTION
  3. DATA COLLATION AND ANALYSIS
  4. DISSEMINATION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. HOW ARE INTELLIGENCE TARGETS SELECTED
A
  1. IN A SYSTEMATIC MANNER.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. WHEN COLLECTING DATA, WHAT IS THE CRITERIA FOR COLLECTING DATA ON INDIVIDUALS.
  2. WHO SHOULD DATA NOT BE COLLECTED ON .
A
  1. THEY MUST PRESENT A CLEAR AND PRESENT DANGER TO SOCIETY.
  2. DATA CHOULD NOT BE COLLECTED ON PEOPLE SOLELY ON RACE, CREED, COLOR, NATIONAL ORIGIN, SEXUAL PREFERENCE, OR POLITICAL OR RELIGIOUS BELIEFS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. COLLATION

20

A
  1. THE PROCESS OF COMPARING TEXTS CAREFULLY TO CLARIFY OR GIVE MEANING TO.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. DISSEMINATION
A
  1. THE PHASE OF INTELLIGENCE PROCESS WHERBY INFORMATION IS SHARED WITH OTHER LAW ENFORCEMENT AGENCIES. THE FINAL STAGE.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. ANALYSIS.

2. WHAT IS THE MOST COMMON METHOD OF DATA DESCRIPTION AND INTEGRATION.

A
  1. A SCIENTIFIC EXAMINATION.

2. LINK ANALYSIS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. LINK ANALYSIS.
A
  1. A CHARTING TECHNIQUE DESIGNED TO SHOW RELATIONSHIPS BETWEEN INDIVIDUALS AND ORGANIZATIONS USING A GRAPHIC VISUAL DESIGN.
23
Q
  1. WHAT IS THE ROLE OF THE INTELLIGENCE ANALYST. 4
A
  1. TO GUIDE DATA COLLECTION
  2. TO SUGGEST OPERATIONAL RECOMMENDATIONS
  3. TO PROVIDE INFORMATION TO DECISION MAKERS
  4. TO ASSUME A POSITION OF NONINVOLVEMENT IN POLICE INFORMATION.
24
Q
  1. FLOWCHARTING.
A
  1. AN INFORMATIONAL TRACKING SYSTEM THAT DEMONSTRATES A CHAIN OF EVENTS OR ACTIVITIES OVER A PERIOD OF TIME.
25
Q
  1. WHAT ARE THE TWO TYPES OF FLOWCHARTING.
A
  1. EVENT FLOW ANALYSIS.

2. COMMODITY FLOW ANALYSIS.

26
Q
  1. EVENT FLOW ANALYSIS
A
  1. A PROCESS WHEREBY EVENTS ARE DOCUMENTED, THEY ARE CONNECTED BY ARROWS TO INDICATE THE DIRECTION OF THE SEQUENCE.
27
Q
  1. COMMODITY FLOW ANALYSIS
A
  1. CHARTING THE LOGICAL FLOW OF SUCH COMMODITIES AS DRUGS, MONEY , AND ILLEGAL ARMS SHIPMENTS.
28
Q
  1. RISS PROJECTS (FEDERAL REGIONAL INFORMATION SHARING SYSTEM)
A
  1. PROVIDES INFORMATION SHARING RESOURCES AND INESTIGATIVE SUPPORT TO COMBAT MULTI JURISDICTIONAL CRIMES INCLUDING VIOLENT CRIME, GANG ACTIVITY, TERRORISM, DRUG ACTIVITY, CYBERCRIME, HUMAN TRAFFICKING, IDENTITY THEFT, AND OTHER PRIORITIES. PROVIDES INFORMATION TO FEDERAL, LOCAT, AND STATE LAW ENFORCEMENT.
29
Q
  1. WHAT DOES RISS PROVIDE ALL LAW ENFORCEMENT AGENCIES

30

A
  1. A CENTRALIZED DATABASE
  2. ANALYSIS OF INTELLIGENCE AND INVESTIGATIVE DATA
  3. SPECIALIZED EQUIPMENT ON LOAN
  4. CONFIDENTIAL FUNDS
  5. TECHNICAL ASSISTANCE
  6. SPECIALIZED TRAINING
  7. ACCESS TO TELECOMMUNICATION SYSTEMS
30
Q
  1. WHAT INTELLIGENCE FILES SHOULD BE PURGED FROM THE SYSTEM.4
A
  1. FILES THAT ARE NO LONGER ACCURATE.
  2. FILES THAT ARE NO LONGER RELEVANT TO THE MISSION
  3. FILES THAT DO NOT PERTAIN TO INVESTIGATIVE INTERESTS AND ACTIITIES.
  4. FILES THAT CONTAIN INSUFFICIENT SUPPORTING DOCUMENTATION.
31
Q
  1. MULTILATERATION
A
  1. A NAVIGATION TECHNIQUE BASED ON THE MEASUREMENT OF THE DIFFERENCE IN DISTANCE TO TWO OR MORE STATIONS AT KNOWN LOCATIONS THAT BROADCAST SIGNALS AT KNOWN TIMES.
32
Q
  1. TRIANGULATION
A
  1. THE PROCESS OF FINDING ONES POSITION ON A GIVEN PLANE WHEN TWO VISUAL LANDMARKS ARE KNOWN
33
Q
  1. ACCORDING TO TITLE 3 OF THE OMNIBUS CRIME CONTROL AND SAFE STREETS ACT, WHEN CAN LAW ENFORCEMENT OFFICERS LISTEN TO ELECTRONIC COMMUNICATIONS
A
  1. WHEN AN OFFICER IS ONE OF THE PARTIES INVOLVED IN THE COMMUNICATION.
  2. WHEN ONE OF THE PARTIES IS NOT THE OFFICER, BUT WILLINGLY DECIDES TO SHARE THE COMMUNICATION WITH THE OFFICER
  3. OR WHEN OFFICERS OBTAIN A WARRANT BASED ON PROBABLE CAUSE.
34
Q
  1. WHO IS THE ONLY PERSON WHO HAS THE AUTHORITY TO PERMIT EAVESDROPPING.
A
  1. THE SENDER OF THE MESSAGE.
35
Q
  1. MINIMIZATION
A
  1. WHEN LAW ENFORCEMENT IS REQUIRED TO LIMIT THEIR MONITORING OF CRIMINAL SUSPECTS.
  2. ITS THE REQUIREMENT THAT OFFICERS TAKE EVERY REASONABLE EFFORT TO MONITOR ONLY THOSE CONVERSATIONS, THROUGH THE USE OF A PHONE TAP, BODY BUGS, AND THE LIKE, THAT ARE SPECIFICALLY RELATED TO THE CRIMINAL ACTIVITY UNDER THE INVESTIGATION.
36
Q
  1. WHAT DOES THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 DEAL WITH 3
A
  1. WIRETAPS AND BUGS, WHICH ENABLE OFFICERS TO LISTEN TO CRIMINAL CONVERSATIONS
  2. PEN REGISTERS, WHICH RECORD NUMBERS DIALED FROM A PHONE
  3. AND TRACING DEVICES, WHICH DETERMINE THE NUMBER FROM WHICH A CALL EMANATES.
37
Q
  1. WHAT DOES THE TELECOMMUNICATIONS ACT OF 1996 DO.
A
  1. MAKES IT A FEDERAL OFFENSE FOR ANYONE ENGAGED IN INTERSTATE OR INTERNATIONAL COMMUNICATIONS TO KNOWINGLY USE A TELECOMMUNICATIONS DEVICE TO CREATE, SOLICIT, OR INITIATE THE TRANSMISSIOON OF ANY COMMENT, REQUEST, SUGGESTION, PROPOSAL, IMAGE, OR OTHER COMMUNICATION WHICH IS AT THE SCENE LEWD, MISCHIEVOUS, FILTHY, OR INDECENT, WITH INTENT TO ANNOY, ABUSE, THREATEN, OR HARASS ANOTHER PERSON. MAKES IT AN OFFNESE FOR ANYONE TO MAKE A CALL WITHOUT DISCLOSING HIS IDENTITY WITH THE INTENT TO ANNOY.
38
Q
  1. FORWARD LOOKING INFRARED.
A
  1. A SUREILLANCE TECHNOLOGY THAT MEASURES RADIANT ENERGY IN THE RADIANT HEAT PORTION AND DISPLAYS READINGS AS THERMOGRAPHS.
39
Q
  1. FOOT SUREILLANCE

40

A
  1. TECHNIQUE USED DURING SHORT DISTANCES TO MAINTAIN CONTACT WITH A SUSPECT AFTER HE HAS LEFT A VEHICLE.
40
Q
  1. 4 PRINCIPAL METHODS FOR CONDUCTING A MOVING SURVEILLANCE ON FOOT.
A
  1. ONE OFFICER SURVEILLANCE.
  2. TWO OFFICER SURVEILLANCE
  3. ABC METHOD.
  4. PROGRESSIVE OR LEAPFROG METHOD
41
Q
  1. ONE OFFICER SURVEILLANCE
A
  1. SINGLE OFFICER DOES SURVEILLANCE. MOST DIFFICULT TO CONDUCT.
42
Q
  1. TWO OFFICER SURVEILLANCE.
A
  1. BOTH OFFICERS REMAIN ON THE SAME SIDE OF THE STREET AS THE SUSPECT. FIRST OFFICER TRAILS THE SUSPECT FAIRLY CLOSE. THE SECOND OFFICER REAMAINS SOME DISTANCE BEHING THE FIRST. ON A LESS CROWDED STREET, ONE OFFICER STAYS ACCORSS THE STREET.
43
Q
  1. ABC METHOD FOR FOOT SURVEILLANCE.
A
  1. THREE OFFICERS. A KEEPS DISTANCE BEHIND SUSPECT. B FOLLOWS A, KEEPING A IN VIEW. C WALKS ON OPPOSITE SIDE OF STREET BEHIND THE SUSPECT.
44
Q
  1. PROGRESSIVE OR LEAPFROG METHOD FOR FOOT SURVEILLANCE.
A
  1. USED FOR SUSPECTS WHO TAKE A HABITUAL ROUTE EACH DAY.
    SURVIELLANCE OFFICER STATIONS HIMSELF AT A FIXED POINT UNTIL THE SUSPECT DISAPPEARS FROM VIEW. OFFICER THEN STATIONS HIMSELF THE NEXT DAY WHERE THE SUSPECT DISAPPEARED. USED FOR LOCATING HIDEOUTS OR MEETING PLACES.
45
Q
  1. SIGNS THAT A SUSPECT KNOWS THEY ARE BEING FOLLOWED.10
A
  1. STOPS TO TIE A SHOELACE, WHOLE LOOKING AROUND
  2. STOPS ABRUPTLY AND LOOKS AROUND AT PEOPLE.
  3. STOPS ABRUPTLY AFTER TURNING A CORNER.
  4. WALKS SLOWLY OR RAPIDLY.
  5. ARRANGES FOR A FRIEND TO WATCH FOR SURVEILLANTS
  6. RIDING SHORT DISTANCES ON BUSES OR TAXIS, OR CIRCLING THE BLOCK
  7. ENTERS A BUILDING AND LEAVE IMMEDIATELY THROUGH ANOTHER EXIT.
  8. WATCHES IN LOBBY MIRRORS TO SEE WHO IS COMING AND GOING
  9. STARTS TO LEAVE LOCATION QUICKLS THEN TURNS AND LOOKS
  10. OPEN AND CLOSES THE HOTEL DOOR TO SEE IF ANYONE LEAVE THEIR ROOM.
46
Q
  1. WHAT ARE THE 4 MOBILE SURVEILLANCE METHODS.
A
  1. ONE CAR SURVEILLANCE
  2. TWO CAR SURVEILLANCE
  3. THREE CAR SURVEILLANCE
  4. THE LEAPFROG METHOD.
47
Q
  1. STAKEOUT
A
  1. A STATIONARY OR FIXED SURVEILLANCE.
48
Q
  1. WHAT TWO OFFICER TEAMS DOES A STAKEOUT CONSIST OF.
A
  1. AN OUTSIDE TEAM

2. AN INSIDE TEAM

49
Q
  1. WHAT IS THE OUTSIDE TEAM

50

A
  1. DESIGNATED AS THE ARREST TEAM IN A SURVEILLANCE.
50
Q
  1. THE INSIDE TEAM
A
  1. RESPONSIBLE FOR BRIEFING OFFICERS CONCERNING THEIR ACTIONS IF A CRIME OCCURS
51
Q
  1. WHAT IS THE FUNCTION AND IMPORTANCE OF INTELLIGENCE GATHERING.
A
  1. IDENTIFY CRIMINAL GROUPS AND PERSONS WHO PARTICIPATE IN THEM
  2. PLAYS AN IMPORTANT ROLE IN THE SUPPORT OF LAW ENFORCEMENT AND THE ULTIMATE PROTECTION OF SOCIETY.
  3. INTELLIGENCE OPERATIONS CAN SHIFT FOCUS BASED ON PERCEIVED NEEDS AND THREATS.
52
Q

1, HOW IS SURVEILLANCE OPERATIONS USEFUL IN CRIMINAL INVESTIGATIONS.

A
  1. THEY CAN BE DIRECTED TOWARD A PERSON, VEHICLE, OR LOCATION FOR THE PURPOSES OF BRINGING AN INVESTIGATION INTO FOCUS. BY IDENTIFYING INDIIDUALS AND OBTAINING INFO ABOUT THEIR ACTIVITIES.
53
Q
  1. WHAT ARE FISHING EXPEDITIONS.
A
  1. INTELLIGENCE GATHERING ON PEOPLE FOR WHOM THERE IS NO REASONABLE SUSPICION OF CRIMINAL ACTIVITY.