Chapter 7 Flashcards

1
Q

Information that can be used for achieving investigative goals is:

a. Tips
b. Leads
c. Indication
d. Hint

A

b. leads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NCIC stands for:

a. National Criminal Information Center
b. National Crime Information Center
c. National Crime Intelligence Center
d. National Criminal Intelligence Center

A

b. National Crime information center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a time-consuming and resourceful way of gathering information during a follow-up investigation:

a. Operative
b. Surveillance
c. Examination
d. Inspection

A

b. surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Another name for an assignment is a(n):

a. Operative
b. Project
c. Mission
d. Obligation

A

a. operative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The object of a surveillance activity is called the:

a. Article
b. Item
c. Target
d. Point

A

c. target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After a recon is conducted, all available information should be placed into this type of plan:

a. Operation
b. Surveillance
c. Undercover
d. Organizational

A

b. surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Investigators must always be aware of the subject’s efforts to uncover surveillance operations through:

a. Intelligence
b. Countersurveillance
c. Investigation
d. Stakeout

A

b. countersurveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a person used to divert the investigator from the subject under surveillance.

a. Convoy
b. Distraction
c. Decoy
d. Inducement

A

c. decoy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
This is an individual whose function is to detect surveillance measures directed toward the
target:
a. Convoy
b. Distraction
c. Decoy
d. Inducement
A

a. convoy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is used as a last resort:

a. Initial interview
b. Interrogation
c. Undercover operation
d. Follow-up investigation

A

c. undercover operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of operation is a specialized form of undercover operation that involves enticing
offenders to commit crime in front of undercover operatives:
a. Formalized
b. Informative
c. Sting
d. Operation

A

c. sting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of intelligence is used to develop a long-term big picture of a particular crime type pattern and primarily seeks to gather intelligence:

a. Strategic
b. Tactical
c. Evidential
d. Operational

A

a. strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of intelligence is used to identify and solve an immediate crime or security problem.

a. Strategic
b. Tactical
c. Evidential
d. Operational

A

b. tactical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of intelligence is the gathering of information derived from known specific pieces of evidence that may lead to discovery of other items.

a. Strategic
b. Tactical
c. Evidential
d. Operational

A

c. evidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of evidence focuses on specific large-scale criminal activities over an extended period of time for gathering more detailed information on specific criminal activities, suspects, and their targets.

a. Strategic
b. Tactical
c. Evidential
d. Operational

A

d. operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is considered a clearinghouse to store, coordinate, analyze, and disseminate intelligence information:

a. Evidence locker
b. Fusion center
c. Intelligence center
d. Information locker

A

b. fusion center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This uses the GPS methodology to predict the likely location of an offender’s base of operation:

a. Infrared laser
b. Geoprofiling
c. Caching
d. Fleer

A

b. geoprofiling

18
Q

An investigative lead is a form of information obtained through persons, places, or things that may be of use for achieving investigating goals.

a. True
b. False

A

a. true

19
Q

The most notable technique with regard to investigators addressing crime-related matters
before they occur is proactive investigation.
a. True
b. False

A

a. true

20
Q

All database searches to obtain investigative leads should begin with a query of the NCIC
(National Crime Information Center) data system maintained and operated by the FBI.
a. True
b. False

A

a. true

21
Q

A “Foreign Fugitive File” includes records of criminal aliens whom immigration authorities have deported and aliens with outstanding administrative warrants of removal.

a. True
b. False

A

b. false
- this is an Immigration Violator File

*Foreign fugitive file would be: persons wanted by another country that would be a Felony if committed in the USA

22
Q

Even though it can be a time-consuming and resource-intensive way of gathering information during a follow-up investigation, surveillance usually is the first option.

a. True
b. False

A

b. false

23
Q

The object of surveillance activity, referred to as the target, typically is a person, but can also be a place or a thing.

a. True
b. False

A

a. true

24
Q

If subjects do discover that they are being observed, the investigators have been burnt and all
surveillance activities should be abandoned to keep participating operatives safe.
a. True
b. False

A

a. true

25
Q

Wiretapping, otherwise known as electronic eavesdropping, involves covert interception of
communication content in the furtherance of an investigative effort.
a. True
b. False

A

a. true

26
Q

Surveillance performed using pen/trap devices cannot be authorized by court order without establishing probable cause.

a. True
b. False

A

b. false
* don’t need probable cause..DET just needs to swear under oath that method would provide info material to ongoing investigation. (monitors incoming and outgoing communications, but not the content of such)

27
Q

When all other methods of information gathering about criminal activities have failed or are deemed impractical, undercover operations can be used as a last resort.

a. True
b. False

A

a. true

28
Q

In sequential lineups, suspects and fillers are presented at the same time to witnesses.

a. True
b. False

A

b. false

- this is known as a Simultaneous lineup

29
Q

Simultaneous lineups are when suspects are presented one by one to witnesses.

a. True
b. False

A

b. false

- this is known as a sequential lineup

30
Q

Tactical intelligence is intelligence used to identify and solve an immediate crime or security problem.

a. True
b. False

A

a. true

31
Q

The major operational component of intelligence-led policing is the creation of an agency-based information network based on the Intelligence Cycle.

a. True
b. False

A

a. true

32
Q

Crime ____________ ___________ produces geographic area maps illustrating criminal activity.

A

pattern analysis

33
Q

______ analysis is also referred to as association analysis.

A

linkage

34
Q

The _______ _______ analysis is an appropriate method for documenting a crime that is carried out in stages.

A

event flow

35
Q

The __________ flow analysis is useful for documenting the flow of illegal goods to and from
persons and/or places.

A

commodity

36
Q

________ profiling was conceived as an investigative tool in the United States during the 1970s by the FBI.

A

criminal

37
Q

________ involve thinking things that have no basis in fact.

A

delusions

38
Q

__________ are false sensory perceptions, usually hearing voices or seeing images.

A

hallucinations

39
Q

A ________ offender is someone who commits related crimes.

A

serial

40
Q

_______ offenses are committed for reasons directly related to the offenders need for psychological gratification.

A

instrumental

41
Q

Discuss what is permissible to obtain through pen/trap devices as defined by your text.

A

Incoming calls, outgoing calls, time each call was made, whether a call is connected or goes to voicemail, length of call, e-mail addresses, size of e-mail files, date/time/location where messages are sent.

42
Q

Your book discusses several popular techniques in sting operations. List and discuss a minimum of two of these techniques.

A
  1. False Storefronts: False stores, such as pawnshops, are set up to lure in burglars to sell
    or fence their stolen property. 2.Bait Cars: High-theft model vehicles are used as places under surveillance and/or contain surveillance equipment to capture offenders who are lured to steal them. 3 False Advertising: Ads are placed in newspapers and other media sources containing the names of wanted offenders and stating they have won a prize or the lottery. 4. The Internet: Ads are placed on eBay, Craigslist, or other Internet sites searching for/selling stolen property, providing fencing opportunities for burglars,and enticing child predators.