Db Ch7

48 Questions | Attempts: 142
Share

SettingsSettingsSettings
Company Quizzes & Trivia

Questions and Answers
  • 1. 

    Which is true regarding the nature of the criminal intelligence function?

    • A.

      Overt intelligence collection is more commonly done than is covert intelligence collection

    • B.

      The patrol division is especially useful in conducting covert intelligence activities

    • C.

      Covert methods include the use of surveillance equipment, undercover agents, and informants

    • D.

      Typically, the role of intelligence personnel is to receive information from line personnel

    Correct Answer
    C. Covert methods include the use of surveillance equipment, undercover agents, and informants
  • 2. 

    In which way are crimianl and intelligence functions different?

    • A.

      Criminal investigations tend to be proactive in nature while intelligence ones are reactive

    • B.

      Intelligence personnel tend to use deductive logic while criminal personnel tend to use inductive logic

    • C.

      Criminal personnel are staff functions while intelligence personnel are line functions

    • D.

      Intelligence files are generally closed while criminal files generally are open

    Correct Answer
    D. Intelligence files are generally closed while criminal files generally are open
  • 3. 

    Which best describes the goal of the RISS projects?

    • A.

      To provide tactical intelligence information to guide decision making

    • B.

      To aid state and local law enforcement agencies in sharing criminal intelligence

    • C.

      To create a nation wide, strategic plan for intelligence collation

    • D.

      To ensure a systematic method for data collection and target selection

    Correct Answer
    B. To aid state and local law enforcement agencies in sharing criminal intelligence
  • 4. 

    Which illegal activities are most likely to be targets of an intelligence operation?

    • A.

      Drug trafficking

    • B.

      Bank robbery

    • C.

      Pornography

    Correct Answer(s)
    A. Drug trafficking
    C. Pornography
  • 5. 

    Which is the first step in the intelligence gathering process?

    • A.

      Collection

    • B.

      Dissemination

    • C.

      Target selection

    • D.

      Collation and analysis

    Correct Answer
    C. Target selection
  • 6. 

    Which kind of organizations may be the subjects of an intelligence operation?

    • A.

      Those with dangerous religious beliefs

    • B.

      Those that attempt to control arms shipments

    • C.

      Those that advocate the violent overthrow of the government

    Correct Answer(s)
    B. Those that attempt to control arms shipments
    C. Those that advocate the violent overthrow of the government
  • 7. 

    Which best describes the collation process?

    • A.

      Comparing data by designing charts in sequence

    • B.

      Listing the names of criminals in various crimes

    • C.

      Providing information to different agencies

    • D.

      Deleting data that is not relevant to the objective

    Correct Answer
    A. Comparing data by designing charts in sequence
  • 8. 

    Which best explains the utility of an investigation target?

    • A.

      The value of the investigations findings

    • B.

      The heinousness of the criminals activities

    • C.

      The length of sentence the criminal will probably receive

    • D.

      The amount of money the state will save by prosecuting the criminal

    Correct Answer
    A. The value of the investigations findings
  • 9. 

    Which is the best example of the analysis chase?

    • A.

      A flowchart

    • B.

      A criminal profile

    • C.

      Dissemination of information

    • D.

      Meaningful interpretation of data

    Correct Answer
    D. Meaningful interpretation of data
  • 10. 

    The preferred method of storing intelligence data is by index cards because of their simplicity and security

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 11. 

    Data collection is the hallmark of the intelligence function

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 12. 

    Event flow analysis is the most commonly used method of investigating drug kingpins

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 13. 

    The RISS projects are funded on a yearly basis by the United States Congress

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 14. 

    The heart of the RISS projects is a centralized database

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 15. 

    Each state in the United States is placed in one of ten RISS regions

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 16. 

    The dissemination stage sees more breakdown than does any other stage

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 17. 

    Data integration is a method of conducting link analysis

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 18. 

    It appears the intelligence function in the United States was first carried out by large-city police departments when:

    • A.

      Immigrants first concentrated in urban areas of the country

    • B.

      Prohibition fueled the criminal activities associated with bootlegging

    • C.

      Organized crime began infiltrating police perosonnel

    • D.

      Information gathering began post World-War II on suspected Communist organizations

    Correct Answer
    A. Immigrants first concentrated in urban areas of the country
  • 19. 

    The largest pecentage of terrorist attacks in the United States are bombings by:

    • A.

      Special interest groups against local establishments in urban areas

    • B.

      Lone individuals with anti-government ideals and beliefs

    • C.

      Foreign terrorist groups whose primary purpose is to srike fear into citizens to convince them of the weakness of government

    • D.

      Disgruntled citizens who feel wronged by their government and elected officials

    Correct Answer
    A. Special interest groups against local establishments in urban areas
  • 20. 

    ______________ by individual officers is at the heart of any intelligence operation

    • A.

      Information gathering

    • B.

      Documentation

    • C.

      Criminal intelligence

    • D.

      Informant information

    Correct Answer
    A. Information gathering
  • 21. 

    Even the best of intelligence does not produce decisions

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 22. 

    ____________ includes personal interaction with people, many of whom are witnesses to crimes, victims of crimes, or the suspects themselves

    • A.

      Overt information collection

    • B.

      Covert information collection

    • C.

      Intelligence gathering

    • D.

      Criminal intelligence

    Correct Answer
    A. Overt information collection
  • 23. 

    _______ is the most common and includes a method known as intelligence gathering. This is a process of data collection on criminal acts that have not yet occured but for which the investigator must prepare.

    • A.

      Overt information collection

    • B.

      Covert information collection

    • C.

      Intelligence extraction

    • D.

      Criminal intelligence

    Correct Answer
    B. Covert information collection
  • 24. 

    Criminal intelligence gathering is one of the least understood aspects of criminal investigation and is one of the most valuable and underused resources

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 25. 

    _________ is defined as knowledge of past, present, or future criminal activity that results from the collection of information that, when evaluated, provides the user with a basis for rational decision making

    • A.

      Criminal intelligence

    • B.

      Overt information collection

    • C.

      Analysis

    • D.

      Intelligence information

    Correct Answer
    A. Criminal intelligence
  • 26. 

    The role of intelligence personnel is more of a line function than a staff function

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 27. 

    Criminal investigators generally use inductive logic, whereas intelligence unit personnel use deductive logic

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 28. 

    __________ plays a role in the investigation of crimes by providing the investigator with a tool for long-range planning

    • A.

      Strategic intelligence

    • B.

      Tactical intelligence

    • C.

      Intelligence gathering

    • D.

      Criminal intelligence

    Correct Answer
    A. Strategic intelligence
  • 29. 

    __________  targets criminal activity considered to be of immediate importance to the investigator

    • A.

      Strategic intelligence

    • B.

      Tactical intelligence

    • C.

      Intelligence gathering

    • D.

      Criminal intelligence

    Correct Answer
    B. Tactical intelligence
  • 30. 

    The purpose of ________ is to make fragmented information flow in a logical sequence to make it purposeful to the user

    • A.

      Analysis

    • B.

      Collation

    • C.

      Link analysis

    • D.

      Flowcharts

    Correct Answer
    A. Analysis
  • 31. 

    _________ is a technique designed to show relationships between individuals and organizations using a graphical visual design. It is used to show graphically transactions or relationships that are too large and confusing for one to assimilate through the reading of reports

    • A.

      Link analysis charting

    • B.

      Collation

    • C.

      Flowcharting

    • D.

      Event flow analysis

    Correct Answer
    A. Link analysis charting
  • 32. 

    Two types of flowcharts have emerged as the most useful in criminal intelligence collection:

    • A.

      Event flow analysis

    • B.

      Commodity flow analysis

    • C.

      Stress flow analysis

    • D.

      Link analysis

    • E.

      Probability analysis

    Correct Answer(s)
    A. Event flow analysis
    B. Commodity flow analysis
  • 33. 

    The use of an outside auditor is typically the best approach to purging intelligence files.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 34. 

    During a three-officer surveillance, if a street is crowded then all three officers should remain on the same side of the street as the suspect

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 35. 

    The ___________ may be of value in locating hideouts or meeting places when the risk of trailing a suspect is too great

    • A.

      Progressive or leapfrog method

    • B.

      Two-officer surveillance

    • C.

      Three-officer surveillance

    • D.

      One-officer surveillance

    Correct Answer
    A. Progressive or leapfrog method
  • 36. 

    A(n) _______ consists of assessing a potential stakeout location and developing an initial tactical plan

    • A.

      Advance

    • B.

      Target

    • C.

      Asset

    • D.

      Reconnaissance

    • E.

      Skim

    Correct Answer
    A. Advance
  • 37. 

    Generally, a stakeout team consists of an inside team and an outside team. The inside team is normally designated as the arrest team.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 38. 

    In regards to a stakeout, _______ should be the maximum allowable response time for the outside team to get to the stakeout

    • A.

      15 seconds

    • B.

      30 seconds

    • C.

      1 minute

    • D.

      45 seconds

    Correct Answer
    B. 30 seconds
  • 39. 

    If a suspect is shot he or she should be disarmed immediately and handcuffed unless he is dead or unconscious

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Always

    Rate this question:

  • 40. 

    The Supreme Court underttok a significant change of direction in the area of electronic eavesdropping when it decided the case of _______________

    • A.

      Katz v. U.S.

    • B.

      Berger v. New York

    • C.

      U.S. v Karo

    • D.

      Olmstead v. U.S.

    Correct Answer
    A. Katz v. U.S.
  • 41. 

    In the 1971 case of ________, the court held that law enforcement officer may intercept electronic information when one of the parties involved in the communication gives his or her consent, even without a warrant

    • A.

      U.S. v. White

    • B.

      Katz v. U.S.

    • C.

      Lee v. Florida

    • D.

      U.S. v. Scott

    Correct Answer
    A. U.S. v. White
  • 42. 

    ________ requires that officers take every reasonable effort to monitor only those conversations, through the use of phone taps, body bugs, and the like, that are specifically related to criminal activity under investigation

    • A.

      Minimization

    • B.

      Relevancy

    • C.

      Objectivity

    • D.

      Specific-relative

    Correct Answer
    A. Minimization
  • 43. 

    The _____ requires that investigating officers obtain wiretap-type court orders to eavesdrop on ongoing communications. The use of pen registers and recording devices, however, are specifically excluded by law from court order requirements

    • A.

      ECPA - Electronic Communications Privacy Act

    • B.

      FCC - Federal Communications Commission

    • C.

      FCA - Federal Communications Act

    • D.

      TA - Telecommunications Act

    Correct Answer
    A. ECPA - Electronic Communications Privacy Act
  • 44. 

    Approximately ________ of all intercepted conversations have been classified as "incriminating"

    • A.

      One-half

    • B.

      One-third

    • C.

      One-fourth

    • D.

      Two-thirds

    Correct Answer
    B. One-third
  • 45. 

    The _____ requires that telecommunication carriers ensure law enforcements ability, pursuant to a lawful court order, to intercept communications notwithstanding advanced telecommunications technologies

    • A.

      CALEA - Communications Assistance for Law Enforcement Act

    • B.

      FCC - Federal Communications Commission

    • C.

      FCA - Federal Communications Act

    • D.

      TA - Telecommunications Act

    Correct Answer
    A. CALEA - Communications Assistance for Law Enforcement Act
  • 46. 

    Title ____ of the Telecommunications Act of 1996 made it a federal offense for anyone engaged in interstate or international communications to call someone for the purpose of harassment

    • A.

      III

    • B.

      IV

    • C.

      V

    • D.

      VI

    Correct Answer
    C. V
  • 47. 

    _________ systems measure radiant heat energy and display their readings as thermographs

    • A.

      Forward-looking infrared

    • B.

      Thermal imaging

    • C.

      HGH infrared

    • D.

      Thermal-violet imaging

    Correct Answer
    A. Forward-looking infrared
  • 48. 

    GPS devices can be accurate, down to the nanosecond and within ______

    • A.

      10 feet

    • B.

      20 feet

    • C.

      50 feet

    • D.

      100 feet

    Correct Answer
    B. 20 feet

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 15, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 02, 2012
    Quiz Created by
    Carrot_Cake
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.