QC Flashcards
- Define concurrent jurisdiction
Both the federal and state government retain all their legislative authority. If there is a potential conflict of jurisdiction, the federal government prevails under the Supremacy Clause listed in Article VI of the United States Constitution. Security Forces should consult their Staff Judge Advocate (SJA) office for additional guidance.
- Whenever you have doubts concerning rights advisement (Miranda Rights/Article 31 Rights), who or what office should you consult?
Contact Staff Judge Advocate (SJA) for further guidance.
- Who will you release military offenders to?
Supervisor, First Sergeant, Commander, or Designated E07 or above.
- What actions are prohibited when operating radios and what regulation prohibits those actions?
Use of profane or obscene language in radio transmissions. Use of false or deceptive signals or communications. Federal Communication Commission prohibits these actions.
- What form will the Desk Sergeant utilize when a bomb threat is called in over a landline?
AF Form 440, Bomb Threat Aid
- What are two types of duress? Give an example.
Active Duress: Duress word passed or failed authentication
Passive Duress: No response via radio
- What is search incident to apprehension? When does it have to be conducted and who is contacted if there are questions prior to conducting the search?
A U.S. legal principle that allows law enforcement to perform a warrantless search of an arrested person. The search includes the immediate area over which the apprehended person had control. The search must be conducted immediately after securing the suspect. If any questions arise, contact Staff Judge Advocate (SJA).
- Define proprietary jurisdiction
The military exercises the rights of a property owner only. The only federal laws that apply are those that do not rely upon federal jurisdiction. Examples: espionage, bank robbery, tax fraud, counterfeiting
- What is Article 92 of the UCMJ?
Failure to Obey an Order or Regulation
- What gives Security Forces the authority to apprehend individuals?
The Manual for Courts Martial (MCM) Rule 302(b)(1) and Uniform Code of Military Justice (UCMJ) Article 7(b).
- What is an AFVA 31-231?
Air Force Visual Aid 31-231, used for Rights Advisement, use for verbal advisement.
What is a Spontaneous Utterance?
Occurs when an individual you have made contact with, voluntarily makes an incriminating statement.
- What are the general communications standards when using radios?
Use clear, audible verbiage and pro-words when making radio transmissions. During exercises, begin and end all radio transmissions with “EXERCISE”.
- What is Article 31 of the UCMJ?
Prior to asking questions related to the offense under investigation, advise the suspect of their right against self-incrimination in accordance with the Uniform code of Military Justice, Article 31. For active military personnel.
- What actions need to be taken if during an investigation it is discovered that an incriminating statement was made without proper rights advisement?
A cleansing statement needs to be accomplished.
- What type of legislative jurisdiction apply to military installations and facilities?
Exclusive, Concurrent, Proprietary, and Partial.
- Define exclusive jurisdiction.
The federal governments sole authority to legislative jurisdiction for offenses occurring on federal lands.
- Define partial jurisdiction.
Both the federal and state governments have some authority, but neither has exclusive power.
- How will you instruct Security Forces personnel to evacuate personnel from the effected cordon perimeter of a Major Accident/Incident?
Evacuate personnel upwind or crosswind of the affected area/facility and perimeter.
- Who is initially dispatched to a suspicious package incident and what are they determining?
A senior patrolman (other than MWD handlers) or the Flight Chief/Sergeant to visually inspect the object. The person dispatched will determine if the package is suspicious or non-suspicious.
- During a Major Incident, how is the location of the initial ECP determined?
Initially located upwind or crosswind. If upwind is not available, on the perimeter of the cordon, within a 90 degree arc on either side of the current surface wind.
- When a package is determined/confirmed to be suspicious what Quick Reaction Checklist (QRC) will be initiated?
Bomb Threat Procedure QRC
- What is the California Law Enforcement Telecommunications System (CLETS) information considered and who are the only people provided information?
- What information does the California Law Enforcement Telecommunications System (CLETS) provide to the Desk Sergeant and Security Forces members?
California Law Enforcement Telecommunications System (CLETS) provides up-to-date information on officer safety alerts, wants and warrants, restraining orders, weapon and vehicle registration information as well as missing person reports.
- When will the oncoming Flight Chief/Sergeant report for duty and what will they accomplish before relieving off going?
Report for duty 30 minutes prior to guard mount to review blotters from previous 24 hours and receive a briefing from off going Flight Chief/Sergeant.
- List three of the Flight Chief/Sergeants job description/responsibilities?
Responsible for the overall operations of their assigned flight. Conduct guard mount, ensure all personnel are fit to perform their official duties and have not consumed intoxicating substances within eight hours prior to duty and while on duty. Individuals must be mentally and physically capable of performing their assigned duties. Possess required equipment and conduct an open ranks inspection at least once per cycle. Disseminate pass on from previous shift. Current FPCON, duress words, weapons, vehicle, and safety briefings. Random Installation Entry/Exit Vehicle Checks (RIEVC), selective Crime Suppression Movement (CSM) and Random Anti-Terrorism Measure (RAM) schedule.
- Define critical incident response.
Critical incidents are usually unplanned or unanticipated events and those responding are normally security forces, fire, and medical personnel.
- Explain emergency entry procedures into restricted or controlled areas.
Signed countersigns will be used when him and Entry Control Point (ECP) is notified by Based Defense Operations Center (BDOC) that a known emergency exists in a restricted controlled area. Any agency responding to an emergency will notify Based Defense Operations Center (BDOC) via direct line. Information relayed will include nature and location of the emergency, ranking individuals name, type/number of vehicles a number of personnel responding to the incident. Based Defense Operations Center (BDOC) notifies the appropriate Security Forces members of the situation and instructs them to keep responding units under surveillance and/or assist as warranted by the situation.
- What actions will be taken when an individual commits offences against Protection Level (PL) 1, 2, or 3 resources?
Apprehend, handcuff, and remove the suspect from the immediate vicinity of the resource/restricted area, conduct a search of the individual, and attempted to identify the suspect and confirmed the right in need to be in the area. With assistance of owner/user personnel, search the resource and immediate area for weapons or explosives and other unauthorized personnel. The situation is not terminated until they purge of the area is made and a shirt to preserve any evidence found.
- 412th Security Forces Squadron (SFS) Desk Sergeants utilize what communication system/sources to obtain or manage information critical to fulfilling the mission of law enforcement, public safety, and affiliate agencies?
California Law Enforcement Telecommunications System (CLETS) and OpenFox.
- What is the definition of a Protection Level (PL) 1 resource?
Assets for which the loss, theft, misuse, compromise, damage or destruction result in unacceptable mission degradation to the strategic capability of the U.S. or catastrophic consequences for the nation.
- List two examples of a Protection Level (PL) 1 resource.
Nuclear weapons and/ or critical components, command, control, communications, and computer (C4) systems Critical to the success of active nuclear missions, designated critical space and launch resources, or aircraft designated to transport the President of the United States (POTUS) and Senior Executive (SENEX) mission aircraft.
- What is the definition of a Protection Level (PL) 2 resource?
Assets for which the loss come of the, misuse, compromise, damage, or destruction results in significant mission degradation to the warfighting capability of the U.S.
- Who must be notified of incidents involving child abuse?
Family Advocacy sponsors First Sergeant and Air Force Office of Special Investigation (AFOSI). Further reporting procedures will be dictated by your local operating instruction (OI).
- List 2 examples of Protection Level (PL) 2 resources.
Non-nuclear alert forces, expensive, few in number, or one of a kind systems, selected critical command, control and communications facilities, systems, or equipment, vital computer facilities, and equipment, or intelligence gathering systems critical to U.S. operational capability.
- The definition of a Protection Level (PL) 3 resource.
assets for which the loss, theft, misuse, compromise, damage, or destruction results in mission degradation to the warfighting capability of the U.S.
- List two examples of Protection Level (PL) 3 resources.
Weapon systems capable of being on alert status, selected command, controlling communication facilities, systems, and equipment, intelligence gathering systems not critical to U.S. operational capability.
- What is the definition of a PL-4 resource?
Assets that directly or indirectly support power projection assets and the war fighting mission which loss, theft, misuse compromise or destruction would adversely affect mission capability.
- List two examples of PL-4 resources?
Facilities storing any number of Category I, II, or Ill sensitive conventional AA&E and those storing 30 or more types of Category IV AA&E resources, Flight line parking ramps (other than those designated as PL-1, 2, or 3 restricted areas) to include mission support, depot maintenance and other Services’ transient aircraft areas. Mission essential communications facilities and computer centers, radar Approach Control (RAPCON) facilities, to include off installation navigational aids and related resources, control towers, power plants, and environmental control systems critical to operational capability. Petroleum, Oils and Lubricants (POL) and Liquid Oxygen (LOX) Storage Areas. Warehouses storing aircraft or weapons systems spare parts. Financial Services Office vault areas and areas normally storing $100,000 or more. Areas where large volumes of classified material are processed. AF pharmacies and medical logistics vaults. Fixed Site Single Channel Anti-Jam Man Portable (SCAMP) Terminals. Areas storing Biological Select Agents and Toxins (BSAT). Any other area containing mission essential resources affecting operational capability.
- What is Reasonable Belief?
There is reliable information that a reasonable prudent person would rely on that something is true. Reasonable Beliefs are also a logical and rational evaluation of the circumstances of an offense and of the suspect’s connection with the offense.
- What is probable cause?
Reasonable Belief that an offense has been or is being committed and the person to be apprehended committed or is committing it.
- What authority does Article 136(b)(4) and Article 136(b)(6) of the UCMJ give to Security Forces members?
Authority to administer oaths to suspects, subjects, and witnesses as necessary in the course of their official duties.
Crime scenes will be normally established for, but not limited to what? Which form will be used to record the names of people who enter and exit crime scenes?
Deaths, Sexual Assaults, Robbery (completed or attempted), Suicide (completed or attempted), Bomb Threats, Contagious or Bio-Hazard substances, Suspicious Packages (confirmed). The AF Form 1109 Visitor Control Log will be utilized.
- What is an AF Form 1109 and what is it used for?
AF Form 1109, Visitor Register Log, provides a log of visitors/and or personnel entering the area which the entry and/or exit is controlled.
- What is an AF Form 1176 and what is it used for?
AF Form 1176, Authority to Search and Seize, ensure the search and seizure is legal and any evidence found is admissible at a Courts-Martial. AF Form 1176 is used to obtain authorization for a search and seizure. This form is prepared for the signature of the Wing Commander having search authority over a specific area, property or person to be searched.
- What is an AF Form 1364 and what is it used for?
This form is used in the same manner as the AF Form 1176, except the individual freely and voluntarily consents to a search of their person, area under their control or personal possessions. Used to obtain consent in writing.
- What is an AF Form 3545A and what is it used for?
The use of Air Force Justice Information System (AFJIS) AF Form 3545A is mandatory for all incidents that are National Incident Based Reporting system (DIBRS) reportable. Use this form to record facts about an incident or complaint for the proper military authority. Existing stock of hard copy or e-pubs version of AF Form 3545A may be used if an Air Force Justice Information System (AFJIS) outage occurs. AF Form 3545A is required when charging any subject with an offense or when further investigation is required for criminal or suspicious.
- What is an AF Form 3545A and what is it used for?
The use of Air Force Justice Information System (AFJIS) AF Form 3545A is mandatory for all incidents that are National Incident Based Reporting system (DIBRS) reportable. Use this form to record facts about an incident or complaint for the proper military authority. Existing stock of hard copy or e-pubs version of AF Form 3545A may be used if an Air Force Justice Information System (AFJIS) outage occurs. AF Form 3545A is required when charging any subject with an offense or when further investigation is required for criminal or suspicious.
- What is an AF Form 1364 and what is it used for?
This form is used in the same manner as the AF Form 1176, except the individual freely and voluntarily consents to a search of their person, area under their control or personal possessions. Used to obtain consent in writing.
- What is a DD Form 2701 and what is it used for?
Initial Information for Victims and Witnesses of a Crime. This form is issued to all personnel when criminal conduct adversely affects victims or when witnesses provide information regarding criminal activity. If in doubt, issue the form. The form gives the individual information on the Victim/Witness Assistance Program (VWAP) and is self-explanatory.
- What is a Major Traffic Accident?
A Major Traffic Accident is any accident involving a fatality, injury or property damage above the amount established by the installation commanders.
- What is an AF Form 1315 and what is the purpose of the form?
AF FM 1315, Major Accident Report. The AF Form 1315 will be well documented with accurate information to draw conclusions or opinions about how and why the accident occurred to include a supplemental narrative of the accident.
- What is an AF Form 1361 and what is it used for?
Pick up/Restriction Order, this form is used to record facts and provide Security Forces with information about pick-up or restrictions on members of the military services.
- What is an AF Form 3226 and what is it used for?
AF Form 3226 Authority to Apprehend in Private Dwelling, the MCM, Rule 302(e) requires written authority be obtained prior to apprehending a person in a private dwelling.
- What is AF Form 3907 and what is it used for?
Security Forces Field Interview Data Card is used to collect information on suspicious people or individuals contacted during routine operations who do not require any other administrative action
- What is an AF Form 52?
The Security Forces member seizing or otherwise receiving an item of evidential property ensures all such property is immediately recorded on AF Form 52, and ensures the form is affixed to the item(s) of evidence.
- Who is given the property receipt portion of the AF Form 52?
The person relinquishing the property.
- Which forms are used to record traffic violations
DD Form 1408 (Armed Forces Traffic Ticket) and CVB Form 1805 (United States District Violation Notice)
- Who receives the white copy of the DD Form 1408?
It is submitted through channels to the violator’s commander or if the violator is a military family member, to the sponsor’s commander. If the violator is a civilian employee, the white copy is sent to the individual’s commander. The ticket is sent to commanders for action to be taken against the violator.
- What is the yellow of a DD Form 1408 used for?
Used by Security Forces to record pertinent information. It can record details about the instructions issued to the violator, names of witnesses to the offense and vehicle defects.
- Who is given the pink of the DD Form 1408?
Given to the violator or affixed to the vehicle if the vehicle is unattended.
- What is a CVB 1805 and what is it used for?
CVB 1805 United States District Court Violation Notice. This form is used when it is determined an offender will be prosecuted for a minor offense.
- What is a DD Form 1920?
Alcoholic Influence Report which is used to record tests and observations made of someone suspected of being involved in an incident where alcohol or drugs may be a factor.
- What are the phases of a Driving Under the Influence (DUI)?
Vehicle in motion, Personal contact, SFST
- What is the UCMJ article and official charged used for a DUI?
Article 113 Drunken or reckless operation of a vehicle, aircraft, or vessel.
- What is a DD Form 2708 and what is it used for?
DD Form 2708 Receipt for Pre-Trial/ Post-Trial Prisoner or Detained Person used to transfer prisoners between confinement facilities or to release a detained person to their commander or representative.
- When will notifications start being made and how will they be accomplished?
Make appropriate notifications as soon as possible after receiving sufficient information. The Command Post will be promptly informed of all incidents or crimes. Sufficient information will be given during the initial or follow-up calls, so they can make required reports and notify emergency actions. Do not annotate a notification in blotters or reports when, in fact, a notification did not occur. Voicemail and answering machine does not constitute notification. Up channel and down-channel reports as necessary in keeping with the Security Reporting and Alerting System.
- When $25,000 or greater is being transported how many personnel are required?
One carrier, one owner or user, and one SF escort.