Deck 12: Public and Private Partnerships for Security

Full screen (f)
exit full mode
Question
A one- person tail, also known as a __________, is the least desirable way of following someone on foot.

A) shadow
B) trailer
C) stalker
D) follower
Use Space or
up arrow
down arrow
to flip the card.
Question
This may be defined as a form of investigation in which the investigator assumes a new identity in order to obtain information.

A) dummy operation
B) subliminal operation
C) undercover operation
D) sequestered operation
Question
In _______________, the investigator generally watches a particular house or building to see who enters and leaves.

A) permanent surveillance
B) limited surveillance
C) stationary surveillance
D) brownstone surveillance
Question
Effective surveillance takes not only skill but also:

A) forecasting
B) preparation
C) leapfrogging
D) concentration
Question
When doing automobile surveillance, it is preferable to have more than one vehicle so the cars can change positions often.This is referred to as?

A) car hopping
B) automobile exchanging
C) leapfrog
D) car switching
Question
This is a deliberate attempt to evade surveillance and often involves prior knowledge that surveillance will occur.

A) convoy
B) evasion
C) protection
D) deceiving
Question
If an undercover investigator's true identity becomes known, s/he was:

A) burned
B) turned
C) made
D) derailed
Question
A fictitious personal history is also known as:

A) a lie
B) a cover story
C) an unethical story
D) closure
Question
In a covert operation, the individual who is being observed or tracked is the:

A) subject
B) defendant
C) operative
D) observant
Question
While you are pretending to be somebody else, you must override your natural inclinations for:

A) associations
B) blending
C) fear of the situation
D) consequences of illegal acts
Question
_______________ is the covert observation of places, persons and vehicles for the purpose of obtaining information.

A) Investigation
B) Subterfuge
C) Surveillance
D) Security operations
Question
Private investigating firms offer _____________ to protective clients, to allow honest employees to report wrongdoings in the work place.

A) witness protection program
B) silent witness program
C) rewards and bonuses for informing
D) man trap programs
Question
The terms "rough tail," "loose tail," "close tail," or "tight tail," all refers to what?

A) physical features of the target
B) aerial stakeouts
C) surveillance
D) close circuit TV monitoring
Question
If an investigator is assuming a role and identity that could be checked through examination of records, those records should be placed at:

A) the Department of Justice
B) the IRS
C) the personnel office
D) the police department
Question
If information needs to be delivered in writing, the undercover investigator should have these prearranged to allow for the dissemination of information?

A) dead-bolts
B) mail drops
C) clotheslines
D) dead drops
Question
When tracking a subject it may be necessary to utilize these systems to allow you to maintain contact with the subject's vehicle.

A) special tires
B) vehicle tracking system
C) live video feed
D) parabolic microphones
Question
When the subject notices the person who has been tailing them, that person has been:

A) found
B) made
C) cased
D) surprised
Question
What is one major problem in working undercover which can have a negative impact on the individual's life if they do not know how to handle it?

A) living a lie
B) extra money from drug deals
C) corruption and graft
D) being unarmed
Question
Private security firms often offer this service to prospective business clients to test the efficiency of the retail operations staff?

A) ghost shoppers
B) mystery shoppers
C) narc's
D) dirty bag shoppers
Question
A private security investigator may use this device that can be placed at a location to transmit conversations.

A) snake
B) bug
C) trapdoor
D) pass-through
Question
_________ allows us to see not only through darkness but also through fog, mist, and smoke.It is especially useful in penetrating many types of camouflaging.

A) Comparison microscopes
B) Stenography
C) Thermal imaging
D) Memetics
Question
The discovery of __________________ wavelengths dates back to the 1800s, when it was discovered that every object emits thermal energy.
Question
These surveillance tools can be equipped with cameras to transmit live video feeds to agents on the ground, miles away.

A) hot air balloons
B) unmanned aerial vehicles (UAV's)
C) slingshot cameras
D) satellites
Question
The quickest way to be identified as a law enforcement officer is to:

A) move too slowly
B) move too fast
C) drink while undercover
D) use drugs while undercover
Question
A common mistake in maintaining surveillances is to make the assumption that a subject has entered a store mall and will leave by another exit.
Question
The word covert means unable to detect or locate.
Question
GPS is a network of twenty-four satellites that are used originally to pinpoint targets and guide bombs.These satellites are equipped with atomic clocks and equally accurate position-measuring telemetry gear.What agency has oversight over them?

A) DOD: Department of Defense
B) FBI: Federal Bureau of Intelligence
C) TSA: Transit Security Authority
D) ASIS: American Satellite Intelligence Systems
Question
In using an automobile for surveillance it should be a distinctive and costly vehicle because the subject would not assume that an investigator would use such a vehicle.
Question
The private investigator should never notify local police so they do not have their cover blown.
Question
One major mistake that investigators can make is parking their vehicle in the same spot for an extended period of time making _______________a high probability.
Question
An effective method of making auto surveillance easier is to place a vehicle __________ system on the subject auto.
Question
In most stationary surveillance cases it would be cost effective to rent a house or an apartment to conduct the surveillance so you can maintain constant observation.
Question
One method that can be used by investigators is to use ________________ foot and auto surveillance to fine- tune their skills.
Question
A convoy is a deliberate attempt to evade surveillance and usually occurs when the subject feels they may be followed.
Question
Most of the time it is not necessary to utilize a cover story because a good investigator does not get that close to the subject of the investigation.
Question
If a surveillant has good reason to believe she has been "made" she should continue the surveillance at a greater distance.
Question
If the surveillance could involve following a person on foot, the surveillant should have a credit card to pay for items and transportation.
Question
Written notes are essential in:

A) dry runs
B) GPS sniffers
C) surveillance
D) "smart" shoes
Question
When using __________ photography, it is necessary to use a variety of authentication methods to assure that the pictures have not been manipulated.
Question
Surveillance is used in many private security non-criminal investigations such as domestic/marital and child custody.
Question
The major difference between a(n) ___________ operation and a surveillance is that, in the former, we may be simply observing and not following any particular subject.
Question
Sir William Herschel discovered the fact that every object emits _____________.
Question
What should you do when planning an undercover operation?
Question
There are three basic types of moving surveillance.List and describe when and how each of these surveillances would be utilized.
Question
Discuss the necessary steps to be prepared for surveillance.
Question
What are the basic steps utilized in recording the data from a surveillance? Describe how each should be completed.
Question
Vehicle tracking systems are also referred to as ___________, bumper beepers, or homing devices.
Question
Private investigating firms use ________________ witness programs for honest employees to report on employee thefts and fraud.
Question
There are various parts of an undercover investigation, and in order for the assignment to be successful an investigator needs to develop stages.List and describe the stages an individual may use as part of an undercover operation.
Question
Almost every major U.S.retail company uses ______________ shoppers to check on the integrity of their operations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Public and Private Partnerships for Security
1
A one- person tail, also known as a __________, is the least desirable way of following someone on foot.

A) shadow
B) trailer
C) stalker
D) follower
A
2
This may be defined as a form of investigation in which the investigator assumes a new identity in order to obtain information.

A) dummy operation
B) subliminal operation
C) undercover operation
D) sequestered operation
C
3
In _______________, the investigator generally watches a particular house or building to see who enters and leaves.

A) permanent surveillance
B) limited surveillance
C) stationary surveillance
D) brownstone surveillance
C
4
Effective surveillance takes not only skill but also:

A) forecasting
B) preparation
C) leapfrogging
D) concentration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
When doing automobile surveillance, it is preferable to have more than one vehicle so the cars can change positions often.This is referred to as?

A) car hopping
B) automobile exchanging
C) leapfrog
D) car switching
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
This is a deliberate attempt to evade surveillance and often involves prior knowledge that surveillance will occur.

A) convoy
B) evasion
C) protection
D) deceiving
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
If an undercover investigator's true identity becomes known, s/he was:

A) burned
B) turned
C) made
D) derailed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A fictitious personal history is also known as:

A) a lie
B) a cover story
C) an unethical story
D) closure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In a covert operation, the individual who is being observed or tracked is the:

A) subject
B) defendant
C) operative
D) observant
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
While you are pretending to be somebody else, you must override your natural inclinations for:

A) associations
B) blending
C) fear of the situation
D) consequences of illegal acts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
_______________ is the covert observation of places, persons and vehicles for the purpose of obtaining information.

A) Investigation
B) Subterfuge
C) Surveillance
D) Security operations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Private investigating firms offer _____________ to protective clients, to allow honest employees to report wrongdoings in the work place.

A) witness protection program
B) silent witness program
C) rewards and bonuses for informing
D) man trap programs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The terms "rough tail," "loose tail," "close tail," or "tight tail," all refers to what?

A) physical features of the target
B) aerial stakeouts
C) surveillance
D) close circuit TV monitoring
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
If an investigator is assuming a role and identity that could be checked through examination of records, those records should be placed at:

A) the Department of Justice
B) the IRS
C) the personnel office
D) the police department
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
If information needs to be delivered in writing, the undercover investigator should have these prearranged to allow for the dissemination of information?

A) dead-bolts
B) mail drops
C) clotheslines
D) dead drops
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
When tracking a subject it may be necessary to utilize these systems to allow you to maintain contact with the subject's vehicle.

A) special tires
B) vehicle tracking system
C) live video feed
D) parabolic microphones
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When the subject notices the person who has been tailing them, that person has been:

A) found
B) made
C) cased
D) surprised
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What is one major problem in working undercover which can have a negative impact on the individual's life if they do not know how to handle it?

A) living a lie
B) extra money from drug deals
C) corruption and graft
D) being unarmed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Private security firms often offer this service to prospective business clients to test the efficiency of the retail operations staff?

A) ghost shoppers
B) mystery shoppers
C) narc's
D) dirty bag shoppers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A private security investigator may use this device that can be placed at a location to transmit conversations.

A) snake
B) bug
C) trapdoor
D) pass-through
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
_________ allows us to see not only through darkness but also through fog, mist, and smoke.It is especially useful in penetrating many types of camouflaging.

A) Comparison microscopes
B) Stenography
C) Thermal imaging
D) Memetics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The discovery of __________________ wavelengths dates back to the 1800s, when it was discovered that every object emits thermal energy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
These surveillance tools can be equipped with cameras to transmit live video feeds to agents on the ground, miles away.

A) hot air balloons
B) unmanned aerial vehicles (UAV's)
C) slingshot cameras
D) satellites
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The quickest way to be identified as a law enforcement officer is to:

A) move too slowly
B) move too fast
C) drink while undercover
D) use drugs while undercover
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A common mistake in maintaining surveillances is to make the assumption that a subject has entered a store mall and will leave by another exit.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The word covert means unable to detect or locate.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
GPS is a network of twenty-four satellites that are used originally to pinpoint targets and guide bombs.These satellites are equipped with atomic clocks and equally accurate position-measuring telemetry gear.What agency has oversight over them?

A) DOD: Department of Defense
B) FBI: Federal Bureau of Intelligence
C) TSA: Transit Security Authority
D) ASIS: American Satellite Intelligence Systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In using an automobile for surveillance it should be a distinctive and costly vehicle because the subject would not assume that an investigator would use such a vehicle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The private investigator should never notify local police so they do not have their cover blown.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
One major mistake that investigators can make is parking their vehicle in the same spot for an extended period of time making _______________a high probability.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
An effective method of making auto surveillance easier is to place a vehicle __________ system on the subject auto.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
In most stationary surveillance cases it would be cost effective to rent a house or an apartment to conduct the surveillance so you can maintain constant observation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
One method that can be used by investigators is to use ________________ foot and auto surveillance to fine- tune their skills.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A convoy is a deliberate attempt to evade surveillance and usually occurs when the subject feels they may be followed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Most of the time it is not necessary to utilize a cover story because a good investigator does not get that close to the subject of the investigation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
If a surveillant has good reason to believe she has been "made" she should continue the surveillance at a greater distance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
If the surveillance could involve following a person on foot, the surveillant should have a credit card to pay for items and transportation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Written notes are essential in:

A) dry runs
B) GPS sniffers
C) surveillance
D) "smart" shoes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When using __________ photography, it is necessary to use a variety of authentication methods to assure that the pictures have not been manipulated.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Surveillance is used in many private security non-criminal investigations such as domestic/marital and child custody.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
The major difference between a(n) ___________ operation and a surveillance is that, in the former, we may be simply observing and not following any particular subject.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Sir William Herschel discovered the fact that every object emits _____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What should you do when planning an undercover operation?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
There are three basic types of moving surveillance.List and describe when and how each of these surveillances would be utilized.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss the necessary steps to be prepared for surveillance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What are the basic steps utilized in recording the data from a surveillance? Describe how each should be completed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Vehicle tracking systems are also referred to as ___________, bumper beepers, or homing devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Private investigating firms use ________________ witness programs for honest employees to report on employee thefts and fraud.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
There are various parts of an undercover investigation, and in order for the assignment to be successful an investigator needs to develop stages.List and describe the stages an individual may use as part of an undercover operation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Almost every major U.S.retail company uses ______________ shoppers to check on the integrity of their operations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.