Deck 8: Surveillance

Full screen (f)
exit full mode
Question
A countermeasure to determine whether a subject is under surveillance is known as a

A) tail
B) stakeout
C) shadow
D) convoy
E) none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
A surveillance wherein the subject is most likely aware of the surveillance, but must not be lost, is called

A) discreet surveillance
B) a fixed surveillance
C) a technical surveillance
D) an open surveillance
E) none of the above
Question
Open surveillance in which the subject's vehicle is closely followed is known as

A) a mustard plaster
B) a direct surveillance
C) a tight surveillance
D) a moving surveillance
E) none of the above
Question
A surveillance involving the use of scientific devices to enhance hearing or seeing the subject's activities is known as a(n)

A) discreet surveillance
B) fixed surveillance
C) open surveillance
D) technical surveillance
E) direct surveillance
Question
A device that records all numbers dialed on a telephone is known as a

A) pen register
B) beeper
C) bug
D) mustard plaster
E) loop
Question
A 1928 Supreme Court decision held that wiretapping did not constitute search and seizure of telephone messages and therefore did not come under the protection of the

A) First Amendment
B) Second Amendment
C) Fourth Amendment
D) Eighth Amendment
E) Fourteenth Amendment
Question
According to the Court's decision in Katz v. United States, the Fourth Amendment of the United States Constitution protects

A) places
B) free speech
C) property
D) people
E) weapons
Question
A device that facilitates tracking the movement of contraband in vehicles or on persons suspected of engaging in criminal activity is called a(n)

A) bug
B) beeper
C) pen register
D) electronic radar
E) pager
Question
The ________________ regulates the investigative use of beepers and pen registers.

A) Electronic Communications Privacy Act
B) Omnibus Crime Control Act
C) Federal Communications Surveillance Act
D) Fifth Amendment of the United States Constitution
E) none of the above
Question
The person conducting the surveillance is known as a

A) shadow
B) plant
C) tailgater
D) surveillant
E) suspect
Question
_______________ surveillance is used when the objective is to locate a suspect by tailing their relatives and friends.

A) Loose
B) Close
C) Direct
D) Moving
E) Open
Question
The goal of ___________ surveillance is to prevent a crime from occurring or to learn more about the subject's contacts, even at the risk of being detected by the subject.

A) loose
B) close
C) direct
D) moving
E) open
Question
When the objective is to prevent an assault or other crime against an individual, the term ________________ describes the tactic.

A) shadow
B) burn the surveillance
C) tailgating
D) mustard plaster
E) take down
Question
In federal cases, the application for an interception of a wire or oral communication order must be approved by the

A) attorney general or a specific designee
B) principle prosecuting officer
C) federal district judge
D) state appeals court judge
E) state criminal court judge
Question
An order to intercept a wire or oral communication may not remain in effect longer than is necessary to achieve its objectives or for a maximum of _____ days.

A) 10
B) 20
C) 30
D) 60
E) 90
Question
According to the authors, conducting surveillance is generally expensive.
Question
A loose surveillance is considered to be a cautious surveillance because the loss of the subject is preferred to possible exposure.
Question
Surveillance can only be conducted from a stationary position.
Question
Technical surveillance involves the use of electronic and visual enhancement devices to view or overhear suspects in the conduct of their daily affairs.
Question
According to the authors, when considering the use of wiretaps, it is not particularly important for a federal investigator to ascertain the legal status of the practice in the jurisdiction involved.
Question
The pen register neither overhears conversations nor indicates whether a call was completed.
Question
Law enforcement officials claim that the beeper facilitates surveillance by substituting for the human eye and reducing the danger of detection.
Question
In large-scale investigations, surveillance is normally conducted by only one member of the investigative team to prevent detection by the subject.
Question
During a loose surveillance, the surveillance exercises great caution while observing the subject, preferring to drop the tail rather than risk detection.
Question
According to the authors, the success of a surveillance is not necessarily contingent upon the degree of forethought and thoroughness given to the preliminary preparations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Surveillance
1
A countermeasure to determine whether a subject is under surveillance is known as a

A) tail
B) stakeout
C) shadow
D) convoy
E) none of the above
D
2
A surveillance wherein the subject is most likely aware of the surveillance, but must not be lost, is called

A) discreet surveillance
B) a fixed surveillance
C) a technical surveillance
D) an open surveillance
E) none of the above
D
3
Open surveillance in which the subject's vehicle is closely followed is known as

A) a mustard plaster
B) a direct surveillance
C) a tight surveillance
D) a moving surveillance
E) none of the above
E
4
A surveillance involving the use of scientific devices to enhance hearing or seeing the subject's activities is known as a(n)

A) discreet surveillance
B) fixed surveillance
C) open surveillance
D) technical surveillance
E) direct surveillance
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
A device that records all numbers dialed on a telephone is known as a

A) pen register
B) beeper
C) bug
D) mustard plaster
E) loop
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
A 1928 Supreme Court decision held that wiretapping did not constitute search and seizure of telephone messages and therefore did not come under the protection of the

A) First Amendment
B) Second Amendment
C) Fourth Amendment
D) Eighth Amendment
E) Fourteenth Amendment
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
According to the Court's decision in Katz v. United States, the Fourth Amendment of the United States Constitution protects

A) places
B) free speech
C) property
D) people
E) weapons
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
A device that facilitates tracking the movement of contraband in vehicles or on persons suspected of engaging in criminal activity is called a(n)

A) bug
B) beeper
C) pen register
D) electronic radar
E) pager
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The ________________ regulates the investigative use of beepers and pen registers.

A) Electronic Communications Privacy Act
B) Omnibus Crime Control Act
C) Federal Communications Surveillance Act
D) Fifth Amendment of the United States Constitution
E) none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The person conducting the surveillance is known as a

A) shadow
B) plant
C) tailgater
D) surveillant
E) suspect
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
_______________ surveillance is used when the objective is to locate a suspect by tailing their relatives and friends.

A) Loose
B) Close
C) Direct
D) Moving
E) Open
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The goal of ___________ surveillance is to prevent a crime from occurring or to learn more about the subject's contacts, even at the risk of being detected by the subject.

A) loose
B) close
C) direct
D) moving
E) open
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
When the objective is to prevent an assault or other crime against an individual, the term ________________ describes the tactic.

A) shadow
B) burn the surveillance
C) tailgating
D) mustard plaster
E) take down
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
In federal cases, the application for an interception of a wire or oral communication order must be approved by the

A) attorney general or a specific designee
B) principle prosecuting officer
C) federal district judge
D) state appeals court judge
E) state criminal court judge
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
An order to intercept a wire or oral communication may not remain in effect longer than is necessary to achieve its objectives or for a maximum of _____ days.

A) 10
B) 20
C) 30
D) 60
E) 90
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
According to the authors, conducting surveillance is generally expensive.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
A loose surveillance is considered to be a cautious surveillance because the loss of the subject is preferred to possible exposure.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Surveillance can only be conducted from a stationary position.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Technical surveillance involves the use of electronic and visual enhancement devices to view or overhear suspects in the conduct of their daily affairs.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
According to the authors, when considering the use of wiretaps, it is not particularly important for a federal investigator to ascertain the legal status of the practice in the jurisdiction involved.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
The pen register neither overhears conversations nor indicates whether a call was completed.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Law enforcement officials claim that the beeper facilitates surveillance by substituting for the human eye and reducing the danger of detection.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
In large-scale investigations, surveillance is normally conducted by only one member of the investigative team to prevent detection by the subject.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
During a loose surveillance, the surveillance exercises great caution while observing the subject, preferring to drop the tail rather than risk detection.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
According to the authors, the success of a surveillance is not necessarily contingent upon the degree of forethought and thoroughness given to the preliminary preparations.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.