Db Ch7

48 Questions | Attempts: 142
Share
Please wait...
Question 1 / 48
0 %
0/100
Score 0/100
1. Criminal intelligence gathering is one of the least understood aspects of criminal investigation and is one of the most valuable and underused resources
Submit
Please wait...
About This Quiz
Company Quizzes & Trivia

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. During a three-officer surveillance, if a street is crowded then all three officers should remain on the same side of the street as the suspect
Submit
3. The RISS projects are funded on a yearly basis by the United States Congress
Submit
4. The dissemination stage sees more breakdown than does any other stage
Submit
5. The preferred method of storing intelligence data is by index cards because of their simplicity and security
Submit
6. Data collection is the hallmark of the intelligence function
Submit
7. Each state in the United States is placed in one of ten RISS regions
Submit
8. Event flow analysis is the most commonly used method of investigating drug kingpins
Submit
9. The heart of the RISS projects is a centralized database
Submit
10. Even the best of intelligence does not produce decisions
Submit
11. The role of intelligence personnel is more of a line function than a staff function
Submit
12. Generally, a stakeout team consists of an inside team and an outside team. The inside team is normally designated as the arrest team.
Submit
13. Data integration is a method of conducting link analysis
Submit
14. The use of an outside auditor is typically the best approach to purging intelligence files.
Submit
15. If a suspect is shot he or she should be disarmed immediately and handcuffed unless he is dead or unconscious

Explanation

Always

Submit
16. Criminal investigators generally use inductive logic, whereas intelligence unit personnel use deductive logic
Submit
17. In regards to a stakeout, _______ should be the maximum allowable response time for the outside team to get to the stakeout
Submit
18. Approximately ________ of all intercepted conversations have been classified as "incriminating"
Submit
19. Which best describes the collation process?
Submit
20. _________ systems measure radiant heat energy and display their readings as thermographs
Submit
21. Which is true regarding the nature of the criminal intelligence function?
Submit
22. ____________ includes personal interaction with people, many of whom are witnesses to crimes, victims of crimes, or the suspects themselves
Submit
23. _______ is the most common and includes a method known as intelligence gathering. This is a process of data collection on criminal acts that have not yet occured but for which the investigator must prepare.
Submit
24. Which is the first step in the intelligence gathering process?
Submit
25. __________ plays a role in the investigation of crimes by providing the investigator with a tool for long-range planning
Submit
26. The ___________ may be of value in locating hideouts or meeting places when the risk of trailing a suspect is too great
Submit
27. _________ is a technique designed to show relationships between individuals and organizations using a graphical visual design. It is used to show graphically transactions or relationships that are too large and confusing for one to assimilate through the reading of reports
Submit
28. The _____ requires that telecommunication carriers ensure law enforcements ability, pursuant to a lawful court order, to intercept communications notwithstanding advanced telecommunications technologies
Submit
29. The Supreme Court underttok a significant change of direction in the area of electronic eavesdropping when it decided the case of _______________
Submit
30. In which way are crimianl and intelligence functions different?
Submit
31. The largest pecentage of terrorist attacks in the United States are bombings by:
Submit
32. ______________ by individual officers is at the heart of any intelligence operation
Submit
33. Which best describes the goal of the RISS projects?
Submit
34. The purpose of ________ is to make fragmented information flow in a logical sequence to make it purposeful to the user
Submit
35. In the 1971 case of ________, the court held that law enforcement officer may intercept electronic information when one of the parties involved in the communication gives his or her consent, even without a warrant
Submit
36. _________ is defined as knowledge of past, present, or future criminal activity that results from the collection of information that, when evaluated, provides the user with a basis for rational decision making
Submit
37. Which best explains the utility of an investigation target?
Submit
38. GPS devices can be accurate, down to the nanosecond and within ______
Submit
39. Which is the best example of the analysis chase?
Submit
40. The _____ requires that investigating officers obtain wiretap-type court orders to eavesdrop on ongoing communications. The use of pen registers and recording devices, however, are specifically excluded by law from court order requirements
Submit
41. ________ requires that officers take every reasonable effort to monitor only those conversations, through the use of phone taps, body bugs, and the like, that are specifically related to criminal activity under investigation
Submit
42. Title ____ of the Telecommunications Act of 1996 made it a federal offense for anyone engaged in interstate or international communications to call someone for the purpose of harassment
Submit
43. __________  targets criminal activity considered to be of immediate importance to the investigator
Submit
44. It appears the intelligence function in the United States was first carried out by large-city police departments when:
Submit
45. A(n) _______ consists of assessing a potential stakeout location and developing an initial tactical plan
Submit
46. Which illegal activities are most likely to be targets of an intelligence operation?
Submit
47. Which kind of organizations may be the subjects of an intelligence operation?
Submit
48. Two types of flowcharts have emerged as the most useful in criminal intelligence collection:
Submit
View My Results

Quiz Review Timeline (Updated): Feb 15, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 15, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 02, 2012
    Quiz Created by
    Carrot_Cake
Cancel
  • All
    All (48)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Criminal intelligence gathering is one of the least understood aspects...
During a three-officer surveillance, if a street is crowded...
The RISS projects are funded on a yearly basis by the United States...
The dissemination stage sees more breakdown than does any other stage
The preferred method of storing intelligence data is by index cards...
Data collection is the hallmark of the intelligence function
Each state in the United States is placed in one of ten RISS regions
Event flow analysis is the most commonly used method of investigating...
The heart of the RISS projects is a centralized database
Even the best of intelligence does not produce decisions
The role of intelligence personnel is more of a line function than a...
Generally, a stakeout team consists of an inside team and an outside...
Data integration is a method of conducting link analysis
The use of an outside auditor is typically the best approach to...
If a suspect is shot he or she should be disarmed immediately and...
Criminal investigators generally use inductive logic, whereas...
In regards to a stakeout, _______ should be the maximum allowable...
Approximately ________ of all intercepted conversations have been...
Which best describes the collation process?
_________ systems measure radiant heat energy and display their...
Which is true regarding the nature of the criminal intelligence...
____________ includes personal interaction with people, many of whom...
_______ is the most common and includes a method known as intelligence...
Which is the first step in the intelligence gathering process?
__________ plays a role in the investigation of crimes by providing...
The ___________ may be of value in locating hideouts or meeting places...
_________ is a technique designed to show relationships between...
The _____ requires that telecommunication carriers ensure law...
The Supreme Court underttok a significant change of direction in the...
In which way are crimianl and intelligence functions different?
The largest pecentage of terrorist attacks in the United States are...
______________ by individual officers is at the heart of any...
Which best describes the goal of the RISS projects?
The purpose of ________ is to make fragmented information flow in a...
In the 1971 case of ________, the court held that law enforcement...
_________ is defined as knowledge of past, present, or future criminal...
Which best explains the utility of an investigation target?
GPS devices can be accurate, down to the nanosecond and within ______
Which is the best example of the analysis chase?
The _____ requires that investigating officers obtain wiretap-type...
________ requires that officers take every reasonable effort to...
Title ____ of the Telecommunications Act of 1996 made it a federal...
__________  targets criminal activity considered to be of...
It appears the intelligence function in the United States was first...
A(n) _______ consists of assessing a potential stakeout location and...
Which illegal activities are most likely to be targets of an...
Which kind of organizations may be the subjects of an intelligence...
Two types of flowcharts have emerged as the most useful in criminal...
Alert!

Advertisement