Exam 2 Flashcards

(99 cards)

1
Q

OSI command priorities

A
  • Vigorously solve crime
  • Protect secrets
  • Detect & provide early warning of worldwide threats
  • exploit intelligence opportunities
  • operate in cyber
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidential source

A
  • individual whose identity is being protected
  • osi establishes a formal managed relationship
  • osi directed activities result in the gathering of information or testimonial or physical evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open contact

A
  • individual who provides information or assistance to OSI and whose affiliation with OSI is not protected
  • individual with which osi has established a good working relationship, and who freely, openly and regularly provide information, either solicited or unsolicited
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Target selection

A
  • Identified through Crim program

* based upon osi command priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spotting sources

A
  • characteristics
    • access
    • physical description
    • race
    • age
    • intelligence level
    • family history
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control considerations

A
  • needs
  • addictions
  • criminal involvement
  • temperament
  • conscience
  • outside influence or control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recruiting sources

A

Know their background

  • record reviews
  • afosi source bank (asb)
  • le records (ncic, dcii, I2MS, sfmis, local)
  • pif and arms

Briefing/training

  • commplan
  • cover stories
  • what to expect
  • legal issues
  • meet security

Photographs

  • 2 of CS (closeup and full body)
  • 2 of vehicle (front and side)

Complete afosi fm 101 and afosi fm 3 prior to becoming operational

Secure physical items in afosi fm 53 (source folder)
* label 3986 with source id number only and “working copy”

Responsibilities ha/aha

  • id, recruit, manage
  • train, test, Levy
  • validate info
  • expend efunds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recruitment report

A

Target: indicate what CS is expected to collect information on

Background: how CS was identified, details on access, personal info, vehicle info

Motivation: why they are working with osi

Contacting instructions: include detailed information on contacting the source with explicit security precautions for contact in person, by telephone, email, or other methods, frequency, fake names

Reliability: potential control/reliability issues

Agent note: list out who is designated as HA and AHA

Records checks: PIF and ARMS

LE checks: dcii, ncic, asb, I2MS, local, sfmis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5th amendment

A

Cops + custody + questioning

Not offense specific

Valid waiver

  • knowing
  • voluntary
  • intelligent

Applies to custodial interrogation
* arrest or arrest like

Right to silence

Right to counsel

  • clear and unambiguous
  • can attempt to question again if:
    • lawyer is present
    • suspect reinitiates
    • suspect not in custody and you wait 14 days
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Article 31

A

Suspect subject to code + interrogation for le or disciplinary purpose + by someone subject to code or agents + or someone acting in official capacity

Offense specific

Nature of accusation + right to remain silent + any statement made + right to counsel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cleansing statement

A

Should be used when an individual is questioned without properly being warned of rights under article 31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fruit of poisonous tree

A

Any evidence derived from the involuntary statement is inadmissible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

6th amendment

A

Right to counsel triggered for civilians = indictment, information, initial appearance

Right to counsel triggered for Military = preferral of charges

Offense specific

Can still conduct routine booking procedures if member invokes his right to counsel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cognitive interview

A

Specialized interview approach designed to enhance the quantity & quality of information recalled by victims and witnesses

Uses 3 basic psychological processes

  • social dynamics
  • cognitive processes
  • communication processes

When to conduct?
* as soon as you can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phases of cognitive interview

A
Greet & rapport
Free recall/context reinstatement
Follow up questions
Review
Closing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Greet & rapport

A

Develop rapport and communicate empathy

Address victims anxiety

Establish victims role

Promote focused concentration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Free recall/context reinstatement

A

Gain victims mental record of the event

Do not interrupt or ask questions

Goal is to activate memory

Focused retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Follow up questions

A

Begin with broad open ended questions

Prompt for elaboration on specific portions

Funnel

Closed questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Reviewing interview

A

Summarize all relevant information

Inform interviewee to interrupt

Use interviewees words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Closing interview

A

Return victim to a positive mind frame

Open door for recontact

Answer questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Clarification interview

A

Intended to clarify, solidify, and eliminate inconsistencies in victims allegation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Confrontational interview

A

May be appropriate if you develop subjective and substantial information indicating victims initial allegation was purposely inaccurate, misleading, or seemingly false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dd form 2701

A

Mitigate physical, psychological, and financial hardships of victims and witness

Must promptly inform victims

Document for victims in victim interview exception activity

Document for witnesses in exception activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Af imt 1168

A

Always try to obtain statements from interviews

You must review statements to ensure pertinent information provided verbally is contained in the written statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Af form 3985
Accurate reflection of all events during a subject interview
26
Consent to search | Af form 1364
Always attempt to obtain written consent Verbal consent is legally sufficient
27
OSI drug mission
Reduce availability of drugs | Deter drug use by af personnel
28
NTA
Used for collection of drug intelligence against a specific target Includes: * drug availability * price * purity * usage at a particular location * sources or suppliers
29
Jdet
Cooperative efforts between osi & sf
30
Basic drug investigation concept
``` Allegation Initiate investigation Develop investigative plan Logical investigative steps Disposition Case closure ```
31
Liaison
Communication between different groups All liaison must be documented in I2MS via liaison activity
32
Liaison activities
Reciprocal assistance Joint operations Social activities Personal relationships
33
Reciprocal assistance
Responding to a counterparts needs
34
Joint operations
Permits other agencies to see inside each others organizations
35
Social activities
Important to maintaining a good working relationship with counterparts
36
Personal relationships
Knowing key counterparts personally is vital
37
Commodities
Anyone except DoD personnel can receive commodities Gift given to build relationships and establish future cooperation Safeguarded and accounted for
38
Accepting gifts
Afi 51-901 Agents may accept gifts but * Always clear with detco/supt for nominal values * Send to SAF/AA within 60 days for over nominal values * do not solicit gifts * monetary gifts must always be turned in
39
Media queries
* Clearly established protocol/policy * Direct them to HQ AFOSI/PA and/or local wing pa office * Not authorized to answer any media questions unless cleared by AFOSI/PA and wing PA
40
E-funds
AFOSIMAN 71-111 Title 10 USC Ch 3 Sec 127(a) delegates authority to use E-funds to: * SECDEF * DoD/IG or SECAF Who in turn delegates their use/approval to: * detco/saic - up to $1500 * squadron/cc - over $1500, not exceed $5k * region/cc - over $5k, not to exceed $10k * AFOSI/cc - over $10k, not to exceed $25k * saf/ig - over $25k Used to further AFOSI mission Not otherwise prohibited For approval, expenses must meet * other funds are unauthorized to pay for expenses * normal funding compromises security or jeopardizes someone’s safety * waiting for normal funding channels could cost us an investigative/ci opportunity
41
Incentives
Payment to someone (usually CS) for providing information or to encourage cooperation
42
Rewards
Public offers to pay for information leading to apprehension and trial or perpetrator of a criminal offense
43
Justification
* 5 Ws and how * Breakdown of costs involved * Tax and gratuities will be proportionally divided amongst all members except CS * AFOSI and non AFOSI amounts
44
Claims
Document via I2MS on resources tab Submit nlt 10 working days after expense is incurred Must have receipt attached when expense exceeds $100
45
Storage
Do not * store with classified material * store with weapons * commingle with other funds * lose * leave at home
46
Advances
Requested via I2MS | Settled every 90 days
47
Source meet objectives
Collect info/evidence & establish credibility
48
Preparatory activities
* Site & operational location assessment * route planning * general commplan preparation
49
Commplan contains
* Next meeting details * Emergency meeting procedures and location * telephone and internet com rules * methods of contact * contact sites * initial meet location, used to transition to a more secure meet location * brief encounters * initial/brief meet to set up next/more secure meet location * rolling meet/surveillance detection route * CS meet can be conducted in a vehicle
50
Site assessment
Screening * cover that enables you to conduct meetings without being observed Logic * makes sense for you and the source to be there Flow * multiple entrances and exits, minimizes the time you spend with a source at a particular location
51
Meet security
Location Avoid base gates Planned routes with use of contact sites Create cover story Vehicles
52
Pre-meet activities
Identify type of meet Planning Review source file
53
Conducting source meet
Initial contact | * mad minute
54
Source meet management
``` Follow up on levies Train Correct bad behavior Provide/repeat new levies Discuss/plan for future meet date/time Post meet instructions ```
55
Training
``` Determine training requirements Train every meet Record all training in meet reports Legal considerations Conduct reoccurring training to emphasize point ```
56
Documenting source meets
``` Date/location of meet Received tab Levied Trained Agent notes Efunds expenditures ```
57
Masking source information
Use gender change in writing Omit obvious details Make one CS sound like multiple Report details in IDP using only CSs file number
58
Testing source
Establishes credibility Monitors truthfulness Builds confidence/motivation Provides experience
59
Types of tests
Retrieval rest * ask source to get something Comparative test * use two sources to gather information Polygraph test * most reliable Operationally based * have CS do an operation they are target against
60
Surveillance
You watching someone
61
Counter surveillance
Person watching to see if someone is watching you
62
Surveillance detection
Measures used by you to determine if you’re being watched
63
Target study
Complete study and analysis of target to learn everything about target
64
Area casing
Compete study and analysis of the environment
65
Types of surveillance
Classic * a = have, b = backup, c = tail Trigger take method * trigger, have, backup, tail Rural, industrial, urban & suburban
66
Surveillance patterns
Discreet Close Boxing patterns Choke point
67
Methods of surveillance
Fixed point Mobile
68
Surveillance detection route
Carefully crafted route of varying lengths or complexity depending on the operational environment that are timed and pre-planned
69
Surveillance detection methods
Maneuvers to detect if you are being surveilled
70
Principles of surveillance detection
Time/distance Screening Flow Logic
71
Operational planning
Determining what is necessary to conduct a safe and successful operation
72
Types of operations
Controlled deliveries Surveillance Icac Planned apprehension Pso Controlled evidentiary purchase
73
Controlled evidentiary purchase
Maximum control Controlled buy
74
Pre-buy
``` Case location Safety Manpower Subject profile Source issues ``` Search CS and CS vehicle Issue efunds
75
Tech services
AFOSI fm 55, consent to intercept
76
Post op actions w/ source
``` Disable recording device Recover evidence Collect money Searches Debrief/obtain written statement ```
77
Types of UCOs
Group 1: AFOSI/CC is final approval authority * longer than 6 months * cost more than $2500 Group 2: region/cc is final approval authority * does not meet group 1 or group 3 criteria Group 3: region/cc is final approval authority * cyber operations
78
Compromise of test material - article 92
OSI investigates all allegations of test compromise Coordinate with 3 FIS
79
Larceny - article 121
Major theft ``` Over $10,000 Ring type activity Mission impact National security Workload Agent experience level ``` Enter stolen items into ncic/nlets * POC is osi ICON/ICW
80
Larceny, govt property - article 121
Major thefts ``` Significant loss Ring type activity Controlled pharmaceuticals Weapons Ammo Explosive material Classified material ``` Notify FBI and ATF Requires ENR and IG report
81
Burglary - article 129
Breaking and entering a dwelling of another in the nighttime with the intent to commit a crime Must be breaking or movement of an object to enter premise Nighttime Dwelling Intent
82
Housebreaking - article 130
Unlawful entry into a building or other structure with intent to commit crime Time of day is no factor Breaking is not required Intent
83
Unlawful entry
Unauthorized entry into a structure without intent to commit crime OSI typically investigates if entry into sensitive area (SCIF)
84
Military property - sale, loss, damage, destruction - article 108
Intentional damage Aircraft * multiple suspect elimination questionanaire (MSEQ)
85
Arson - article 126
Accused burned or set on fire a dwelling or any other structure Intent (willful and malicious)
86
Forgery - article 123
Intent to defraud with altered documents Counterfeiting * usss has primary jurisdiction Pay and allowance fraud * major offense over $10k * ring activity * rank Aafes * osi is the executive investigative agency
87
Evidence documentation
``` Proper handling Obtaining evidence Recognition of evidence Chain of custody Receipt Disposition ```
88
Acquisition details
Date * when seized Tag no. * from I2MS Case file no. * full I2MS case # Af base or det no. Log page * always I2MS Place * physical location/address where evidence obtained
89
Acquisition method
Received from * walk ins, witnesses, other Leo’s, CS, tradecraft Seized from * plain view scenarios Obtained during search of * conducting searches * where you obtained item * specific location within that address * must include full vehicle description if found in vehicle
90
Description
Description of item Condition Marked for identification purposes
91
Collecting drugs
Loose drugs must be weighed with or without container Pills must be counted and weighed Crystal, liquid and plant like drugs * use approximate weight
92
Chain of custody
Agent who signed the 52 starts the chain of custody
93
Sealing evidence
Mark seal with initials and date I’d seal is broken, create an MFR
94
Storage of evidence
``` Weapons * gsa approved class 5 container ``` Hazmat * separate room High value items * gsa approved security container Classified * cannot be stored with firearms, money or drugs
95
Case agent
``` Prepares tags for evidence Input evidence into I2MS * use exception activity * click evidence tab * click add evidence button Package evidence for shipping Follow up with lab ```
96
Evidence custodian
Receive/store/account for all evidence Accept accepts evidence in I2MS Ensure proper packaging and mailing Ensure proper disposal
97
Usacil
Da fm 4137 - chain of custody | Dd form 2922 - examination request
98
Dcfl
Afmes fm 18 - forensic toxicology analysis request Dcfl fm 1 - forensic service request
99
Disposition
Within 14 days Coordinate with legal Evidence destruction must be witnessed Document on af fm 52 in condition block of chain of custody