Intelligence and Surveillance Operations Flashcards

1
Q

3 Phases of operations

A
  • Phase 1: intel is target operations
  • Phase 2: Data collection
  • Phase 3: data collation and analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Link Analysis

A

most common method of data description and interrogation:

using graphical visual design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which foot surveillance method is the best if the risk of trailing the suspect is too great?

A

progressive or leapfrog surveillance: suspect is observed intermittently as they move along a habitual route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

US lacks intelligence on terroristic attacks due to

A

lack of information particularly on domestic terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Overt information

A

personal interaction with people ( patrol instrumental in overt collection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Covert information

A

data collection on criminal acts not yet occurred, obtained via surveillance, electronic surveillance, informants and undercover operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Strategic intelligence

A

long range planning, capabilities and intentions of target subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tactical intelligence

A

criminal activity of immediate importance to the investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

intelligent phases

A
  • target selection
  • data collection
  • analysis
  • dissemination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

flowcharting

A

demonstrates a chain of evens or activities over a period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Commodity flow analysis

A

charts logic flow of such commodities ( drugs, money, illegal arms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to purge intelligence files

A

use of an outside auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Method of foot surveillance: two officer

A

crowded streets both on same side as suspect, uncrowded one on either side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

method of foot surveillance: Mobile surveillance ( vehicle)

A

one, two, three car and leapfrog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stake out

A

surveillance from a fixed position or vantage point. Tactical deployment of officers in anticipation of the commission of a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TRANSMITTERS ON VEHICLE

A

US Supreme Court authorized planting transmitters on vehicles without a warrant and track them as long as the vehicle do not enter a private property

17
Q

Katz VS US 1967

A

Phone booth case- needed a warrant to bug the public phone booth which had expectation of privacy inside

18
Q

Omnibus crime control and safe streets act of 1968

A

allows officers to listen to electronic communications if:

  • one of the involved parties is the officer
  • one of the involved parties willingly decided to share with officers
  • officer has a warrant
19
Q

GPS

A

receives signals from 4 or more satellites

20
Q

internet surveillance words or phrases

A

go through internet traffic and report to human investigators:

  • trigger words or phases
  • communications with suspicious individual or groups

email, web traffic, instant messaging etc…

21
Q

CALEA- Communications assistance for law enforcement act

A

requires all telephones and VoIP be made available for real time wire-tapping by federal LE and intelligence

22
Q

Biometric surveillance

A

tech that analyzes physical and or behavioral characteristics for authentication, identification or screening purposes

DNA FINGER PRINTS FACIAL PATTERNS ETC

23
Q

Surveillance on public roadway

A

does not ordinarily require a warrant