Db Ch7

48 Questions | Attempts: 142
Please wait...
Question 1 / 49
🏆 Rank #--
Score 0/100

1. Criminal intelligence gathering is one of the least understood aspects of criminal investigation and is one of the most valuable and underused resources

Submit
Please wait...
About This Quiz
Company Quizzes & Trivia

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. During a three-officer surveillance, if a street is crowded then all three officers should remain on the same side of the street as the suspect

Submit

3. The RISS projects are funded on a yearly basis by the United States Congress

Submit

4. The dissemination stage sees more breakdown than does any other stage

Submit

5. The preferred method of storing intelligence data is by index cards because of their simplicity and security

Submit

6. Data collection is the hallmark of the intelligence function

Submit

7. Each state in the United States is placed in one of ten RISS regions

Submit

8. Event flow analysis is the most commonly used method of investigating drug kingpins

Submit

9. The heart of the RISS projects is a centralized database

Submit

10. Even the best of intelligence does not produce decisions

Submit

11. The role of intelligence personnel is more of a line function than a staff function

Submit

12. Generally, a stakeout team consists of an inside team and an outside team. The inside team is normally designated as the arrest team.

Submit

13. Data integration is a method of conducting link analysis

Submit

14. The use of an outside auditor is typically the best approach to purging intelligence files.

Submit

15. If a suspect is shot he or she should be disarmed immediately and handcuffed unless he is dead or unconscious

Explanation

Always

Submit

16. Criminal investigators generally use inductive logic, whereas intelligence unit personnel use deductive logic

Submit

17. In regards to a stakeout, _______ should be the maximum allowable response time for the outside team to get to the stakeout

Submit

18. Approximately ________ of all intercepted conversations have been classified as "incriminating"

Submit

19. Which best describes the collation process?

Submit

20. _________ systems measure radiant heat energy and display their readings as thermographs

Submit

21. Which is true regarding the nature of the criminal intelligence function?

Submit

22. ____________ includes personal interaction with people, many of whom are witnesses to crimes, victims of crimes, or the suspects themselves

Submit

23. _______ is the most common and includes a method known as intelligence gathering. This is a process of data collection on criminal acts that have not yet occured but for which the investigator must prepare.

Submit

24. Which is the first step in the intelligence gathering process?

Submit

25. __________ plays a role in the investigation of crimes by providing the investigator with a tool for long-range planning

Submit

26. The ___________ may be of value in locating hideouts or meeting places when the risk of trailing a suspect is too great

Submit

27. _________ is a technique designed to show relationships between individuals and organizations using a graphical visual design. It is used to show graphically transactions or relationships that are too large and confusing for one to assimilate through the reading of reports

Submit

28. The _____ requires that telecommunication carriers ensure law enforcements ability, pursuant to a lawful court order, to intercept communications notwithstanding advanced telecommunications technologies

Submit

29. The Supreme Court underttok a significant change of direction in the area of electronic eavesdropping when it decided the case of _______________

Submit

30. In which way are crimianl and intelligence functions different?

Submit

31. The largest pecentage of terrorist attacks in the United States are bombings by:

Submit

32. ______________ by individual officers is at the heart of any intelligence operation

Submit

33. Which best describes the goal of the RISS projects?

Submit

34. The purpose of ________ is to make fragmented information flow in a logical sequence to make it purposeful to the user

Submit

35. In the 1971 case of ________, the court held that law enforcement officer may intercept electronic information when one of the parties involved in the communication gives his or her consent, even without a warrant

Submit

36. _________ is defined as knowledge of past, present, or future criminal activity that results from the collection of information that, when evaluated, provides the user with a basis for rational decision making

Submit

37. Which best explains the utility of an investigation target?

Submit

38. GPS devices can be accurate, down to the nanosecond and within ______

Submit

39. Which is the best example of the analysis chase?

Submit

40. The _____ requires that investigating officers obtain wiretap-type court orders to eavesdrop on ongoing communications. The use of pen registers and recording devices, however, are specifically excluded by law from court order requirements

Submit

41. ________ requires that officers take every reasonable effort to monitor only those conversations, through the use of phone taps, body bugs, and the like, that are specifically related to criminal activity under investigation

Submit

42. Title ____ of the Telecommunications Act of 1996 made it a federal offense for anyone engaged in interstate or international communications to call someone for the purpose of harassment

Submit

43. __________  targets criminal activity considered to be of immediate importance to the investigator

Submit

44. It appears the intelligence function in the United States was first carried out by large-city police departments when:

Submit

45. A(n) _______ consists of assessing a potential stakeout location and developing an initial tactical plan

Submit

46. Which illegal activities are most likely to be targets of an intelligence operation?

Submit

47. Which kind of organizations may be the subjects of an intelligence operation?

Submit

48. Two types of flowcharts have emerged as the most useful in criminal intelligence collection:

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (48)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Criminal intelligence gathering is one of the least understood aspects...
During a three-officer surveillance, if a street is crowded...
The RISS projects are funded on a yearly basis by the United States...
The dissemination stage sees more breakdown than does any other stage
The preferred method of storing intelligence data is by index cards...
Data collection is the hallmark of the intelligence function
Each state in the United States is placed in one of ten RISS regions
Event flow analysis is the most commonly used method of investigating...
The heart of the RISS projects is a centralized database
Even the best of intelligence does not produce decisions
The role of intelligence personnel is more of a line function than a...
Generally, a stakeout team consists of an inside team and an outside...
Data integration is a method of conducting link analysis
The use of an outside auditor is typically the best approach to...
If a suspect is shot he or she should be disarmed immediately and...
Criminal investigators generally use inductive logic, whereas...
In regards to a stakeout, _______ should be the maximum allowable...
Approximately ________ of all intercepted conversations have been...
Which best describes the collation process?
_________ systems measure radiant heat energy and display their...
Which is true regarding the nature of the criminal intelligence...
____________ includes personal interaction with people, many of whom...
_______ is the most common and includes a method known as intelligence...
Which is the first step in the intelligence gathering process?
__________ plays a role in the investigation of crimes by providing...
The ___________ may be of value in locating hideouts or meeting places...
_________ is a technique designed to show relationships between...
The _____ requires that telecommunication carriers ensure law...
The Supreme Court underttok a significant change of direction in the...
In which way are crimianl and intelligence functions different?
The largest pecentage of terrorist attacks in the United States are...
______________ by individual officers is at the heart of any...
Which best describes the goal of the RISS projects?
The purpose of ________ is to make fragmented information flow in a...
In the 1971 case of ________, the court held that law enforcement...
_________ is defined as knowledge of past, present, or future criminal...
Which best explains the utility of an investigation target?
GPS devices can be accurate, down to the nanosecond and within ______
Which is the best example of the analysis chase?
The _____ requires that investigating officers obtain wiretap-type...
________ requires that officers take every reasonable effort to...
Title ____ of the Telecommunications Act of 1996 made it a federal...
__________  targets criminal activity considered to be of...
It appears the intelligence function in the United States was first...
A(n) _______ consists of assessing a potential stakeout location and...
Which illegal activities are most likely to be targets of an...
Which kind of organizations may be the subjects of an intelligence...
Two types of flowcharts have emerged as the most useful in criminal...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!