Deck 7: Criminal Intelligence and Surveillance Operations

Full screen (f)
exit full mode
Question
Which best describes the goal of the RISS projects?

A)To ensure a systematic method for data collection and target selection
B)To provide tactical intelligence information to guide decision making
C)To create a nationwide,strategic plan for intelligence collation
D)To aid state and local law enforcement agencies in sharing criminal intelligence
Use Space or
up arrow
down arrow
to flip the card.
Question
What is the final stage of the intelligence process?

A)Analysis
B)Flowcharting
C)Dissemination of information
D)Data collection
Question
A technique designed to show relationships between individuals and organizations,using a graphical visual design is called:

A)link analysis.
B)flowcharting.
C)visualization.
D)diagramming.
Question
The purpose of _____ is to make fragmented information flow in a logical sequence and make it purposeful to the user.

A)data collection
B)analysis
C)target selection
D)dissemination
Question
Which of the following tactics is most successful both in the prevention of terrorism and in the prevention of other illegal activities?

A)Imposing harsher punishments
B)Increasing security at every level of society
C)Decreasing emergency response times
D)Increasing and improving intelligence gathering efforts
Question
Which best explains the utility of an investigation target?

A) The value or worth of the investigation's findings if successful
B)The amount of money the state will save by prosecuting the criminal
C)The length of sentence the criminal will probably receive
D)The heinousness of the criminal's activities
Question
Satellite surveillance refers to the use of:

A)moonlight on clear nights.
B)the positions of stars and the tracking of criminal suspects.
C)starlight scopes.
D)GPS technology.
Question
Which of the following is LEAST likely to be a valid surveillance activity?

A)Electronic eavesdropping
B)Examination of subject/suspects garbage
C)Use of lineup
D)Robot (automatic)cameras
Question
Which is the first step in the intelligence gathering process?

A)Target selection
B)Collection
C)Dissemination
D)Collation and analysis
Question
Which of the following is true regarding the nature of the criminal intelligence function?

A)The patrol division is especially useful in conducting covert intelligence activities.
B)Overt intelligence collection is more commonly done during undercover operations.
C)Typically,the role of intelligence personnel is to receive information from line personnel,not to deliver information to them.
D) Covert methods include the use of surveillance equipment,undercover officers,and informants.
Question
How are criminal and intelligence functions different?

A)Intelligence personnel tend to use deductive logic while criminal personnel tend to use inductive logic.
B)Criminal investigations tend to be proactive in nature while intelligence ones are reactive.
C) Intelligence files generally are closed while criminal files generally are open.
D)Criminal personnel are staff functions while intelligence personnel are line functions.
Question
Which best describes the collation process?

A)Listing the names of criminals in various crimes
B)Providing information to different agencies
C)Comparing data by designing charts in sequence
D)Deleting data that is not relevant to the objective
Question
Which type of intelligence provides investigators with a tool for long-range planning?

A)Tactical
B)Strategic
C)Distance
D)Future
Question
Surveillance is a process that allows investigators to:

A)make arrests.
B)work undercover.
C)pay an informant by using secret funds.
D) observe a suspect without arousing his/her suspicions.
Question
Which of the following is a method of surveillance?

A)Fixed surveillance
B)Foot surveillance
C)Vehicle surveillance
D) All of the above.
Question
A technique that demonstrates a chain of events or activities over a period of time is called:

A)link analysis.
B)flowcharting.
C)streaming.
D)diagramming.
Question
The public rejection of electronic eavesdropping most likely originates in:

A)a fear of disclosure of hidden crimes.
B)aversion to an invasion of privacy.
C)a lack of knowledge of electronics.
D)the opinion that it is a "dirty business."
Question
Which illegal activities are the LEAST to be the targets of an intelligence operation?

A)Drug trafficking
B)Sexual Assault,vandalism,and theft
C)Pornography,prostitution,and gambling
D)Fraud and extortion
Question
The "core area" of police intelligence process is:

A)review.
B)analysis-interpretation.
C)dissemination.
D)collection.
Question
Information should NOT be gathered about which of the following organizations?

A)Organizations that advocate the use of violence to affect the government
B)Organizations that possess chemical weapons for unlawful purposes
C)Organizations that have unusual political views but do not present a clear and present danger
D)Organizations that finance violent or unlawful activity.
Question
Each state in the United States is its own RISS region.
Question
Event flow analysis is the most commonly used method of investigating drug kingpins.
Question
_____ intelligence provides the investigator with a tool for long-range planning.
Question
The collection gathering stage of the intelligence process is the final stage and is where the process most likely breaks down.
Question
Intelligence operations should not be used to gather information about people solely because of their political views.
Question
The leapfrogging technique is used for following persons under surveillance who are either on foot or in vehicles.
Question
The U.S.Supreme Court has ruled that law enforcement officers may constitutionally break and enter to install listening devices.
Question
Intelligence files should never be purged.
Question
The U.S.Supreme Court has established that eavesdropping and other forms of audio surveillance may be conducted in public places without a warrant.
Question
The single or "one-man surveillance" is the most difficult because the suspect must be kept in view at all times and close contact is required by the officer.
Question
A device that electronically signals the location of automobiles,or other objects to which it is affixed,is known as a bumper beeper and its use has been prohibited by the courts.
Question
_____information collection includes personal interaction with people,many of whom are witnesses,victims,and even suspects.
Question
The dissemination stage of the intelligence process is the process that most commonly breaks down.
Question
The RISS projects are funded on a yearly basis by the United States Congress.
Question
Whenever possible,the surveillance car should be occupied by more than one officer.
Question
Covert information collection is the most common form of intelligence collection and includes a process known as intelligence gathering.
Question
To make sense out of the multitudes of information,a process known as data description and integration is used.
Question
A flowchart illustrates an activity at a single point in time.
Question
______information collection methods include the use of surveillance equipment,undercover officers,and informants.
Question
The primary purpose of the RISS projects is to provide the means to share criminal intelligence among member agencies.
Question
You have been working with a local police department that makes use of their aviation unit's helicopter to conduct thermal imaging operations in seeking out drugs in your community.Discuss and determine why you would choose to ask this organization for assistance with locating marijuana growing in your community.
Question
_______ files are criminal information developed for the purpose of making an arrest and gaining a conviction in a court of law.
Question
_____ intelligence targets criminal activity considered to be of immediate importance to the investigator.
Question
_____ is the secret or clandestine collecting and evaluation of information about crime and criminals not normally available to investigators.
Question
_____ analysis is a technique designed to show relationships between individuals and organizations,using a graphical visual design.
*Link
Question
_____ is the stage of intelligence process in which information is shared with other law enforcement agencies.
Question
Matching
Locate the correct matches from Column 1 to Column 2
Matching Locate the correct matches from Column 1 to Column 2  <div style=padding-top: 35px>
Question
You are preparing to conduct a surveillance operation and will need to be prepared.Determine what information you should have or attempt to obtain prior to conducting the actual surveillance.
Question
The surveillance operation can produce a great deal of needed information for the investigator.Discuss what detailed information can accomplish for the investigator.
Question
Your textbook identifies many items that surveillance officers should possess within their "Surveillance Kit Checklist." Identify a minimum of five of these items.
Question
Intelligence files are ______ files.
Question
_____ demonstrates a chain of events or activities over a period of time.
Question
Match between columns
Strategic intelligence
Worth of event
Strategic intelligence
Graphic visual design
Strategic intelligence
Chosen systematically
Strategic intelligence
Comparing texts
Strategic intelligence
Long range planning
Strategic intelligence
Chain of events
Strategic intelligence
Immediately used
Strategic intelligence
Gives meaning
Tactical intelligence
Worth of event
Tactical intelligence
Graphic visual design
Tactical intelligence
Chosen systematically
Tactical intelligence
Comparing texts
Tactical intelligence
Long range planning
Tactical intelligence
Chain of events
Tactical intelligence
Immediately used
Tactical intelligence
Gives meaning
Utility
Worth of event
Utility
Graphic visual design
Utility
Chosen systematically
Utility
Comparing texts
Utility
Long range planning
Utility
Chain of events
Utility
Immediately used
Utility
Gives meaning
Intelligence targets
Worth of event
Intelligence targets
Graphic visual design
Intelligence targets
Chosen systematically
Intelligence targets
Comparing texts
Intelligence targets
Long range planning
Intelligence targets
Chain of events
Intelligence targets
Immediately used
Intelligence targets
Gives meaning
Collation
Worth of event
Collation
Graphic visual design
Collation
Chosen systematically
Collation
Comparing texts
Collation
Long range planning
Collation
Chain of events
Collation
Immediately used
Collation
Gives meaning
Analysis
Worth of event
Analysis
Graphic visual design
Analysis
Chosen systematically
Analysis
Comparing texts
Analysis
Long range planning
Analysis
Chain of events
Analysis
Immediately used
Analysis
Gives meaning
Link analysis
Worth of event
Link analysis
Graphic visual design
Link analysis
Chosen systematically
Link analysis
Comparing texts
Link analysis
Long range planning
Link analysis
Chain of events
Link analysis
Immediately used
Link analysis
Gives meaning
Flowcharting
Worth of event
Flowcharting
Graphic visual design
Flowcharting
Chosen systematically
Flowcharting
Comparing texts
Flowcharting
Long range planning
Flowcharting
Chain of events
Flowcharting
Immediately used
Flowcharting
Gives meaning
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/53
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Criminal Intelligence and Surveillance Operations
1
Which best describes the goal of the RISS projects?

A)To ensure a systematic method for data collection and target selection
B)To provide tactical intelligence information to guide decision making
C)To create a nationwide,strategic plan for intelligence collation
D)To aid state and local law enforcement agencies in sharing criminal intelligence
D
2
What is the final stage of the intelligence process?

A)Analysis
B)Flowcharting
C)Dissemination of information
D)Data collection
C
3
A technique designed to show relationships between individuals and organizations,using a graphical visual design is called:

A)link analysis.
B)flowcharting.
C)visualization.
D)diagramming.
A
4
The purpose of _____ is to make fragmented information flow in a logical sequence and make it purposeful to the user.

A)data collection
B)analysis
C)target selection
D)dissemination
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following tactics is most successful both in the prevention of terrorism and in the prevention of other illegal activities?

A)Imposing harsher punishments
B)Increasing security at every level of society
C)Decreasing emergency response times
D)Increasing and improving intelligence gathering efforts
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
6
Which best explains the utility of an investigation target?

A) The value or worth of the investigation's findings if successful
B)The amount of money the state will save by prosecuting the criminal
C)The length of sentence the criminal will probably receive
D)The heinousness of the criminal's activities
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
7
Satellite surveillance refers to the use of:

A)moonlight on clear nights.
B)the positions of stars and the tracking of criminal suspects.
C)starlight scopes.
D)GPS technology.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is LEAST likely to be a valid surveillance activity?

A)Electronic eavesdropping
B)Examination of subject/suspects garbage
C)Use of lineup
D)Robot (automatic)cameras
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
9
Which is the first step in the intelligence gathering process?

A)Target selection
B)Collection
C)Dissemination
D)Collation and analysis
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true regarding the nature of the criminal intelligence function?

A)The patrol division is especially useful in conducting covert intelligence activities.
B)Overt intelligence collection is more commonly done during undercover operations.
C)Typically,the role of intelligence personnel is to receive information from line personnel,not to deliver information to them.
D) Covert methods include the use of surveillance equipment,undercover officers,and informants.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
11
How are criminal and intelligence functions different?

A)Intelligence personnel tend to use deductive logic while criminal personnel tend to use inductive logic.
B)Criminal investigations tend to be proactive in nature while intelligence ones are reactive.
C) Intelligence files generally are closed while criminal files generally are open.
D)Criminal personnel are staff functions while intelligence personnel are line functions.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
12
Which best describes the collation process?

A)Listing the names of criminals in various crimes
B)Providing information to different agencies
C)Comparing data by designing charts in sequence
D)Deleting data that is not relevant to the objective
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
13
Which type of intelligence provides investigators with a tool for long-range planning?

A)Tactical
B)Strategic
C)Distance
D)Future
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
14
Surveillance is a process that allows investigators to:

A)make arrests.
B)work undercover.
C)pay an informant by using secret funds.
D) observe a suspect without arousing his/her suspicions.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a method of surveillance?

A)Fixed surveillance
B)Foot surveillance
C)Vehicle surveillance
D) All of the above.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
16
A technique that demonstrates a chain of events or activities over a period of time is called:

A)link analysis.
B)flowcharting.
C)streaming.
D)diagramming.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
17
The public rejection of electronic eavesdropping most likely originates in:

A)a fear of disclosure of hidden crimes.
B)aversion to an invasion of privacy.
C)a lack of knowledge of electronics.
D)the opinion that it is a "dirty business."
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
18
Which illegal activities are the LEAST to be the targets of an intelligence operation?

A)Drug trafficking
B)Sexual Assault,vandalism,and theft
C)Pornography,prostitution,and gambling
D)Fraud and extortion
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
19
The "core area" of police intelligence process is:

A)review.
B)analysis-interpretation.
C)dissemination.
D)collection.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
20
Information should NOT be gathered about which of the following organizations?

A)Organizations that advocate the use of violence to affect the government
B)Organizations that possess chemical weapons for unlawful purposes
C)Organizations that have unusual political views but do not present a clear and present danger
D)Organizations that finance violent or unlawful activity.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
21
Each state in the United States is its own RISS region.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
22
Event flow analysis is the most commonly used method of investigating drug kingpins.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
23
_____ intelligence provides the investigator with a tool for long-range planning.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
24
The collection gathering stage of the intelligence process is the final stage and is where the process most likely breaks down.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
25
Intelligence operations should not be used to gather information about people solely because of their political views.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
26
The leapfrogging technique is used for following persons under surveillance who are either on foot or in vehicles.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
27
The U.S.Supreme Court has ruled that law enforcement officers may constitutionally break and enter to install listening devices.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
28
Intelligence files should never be purged.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
29
The U.S.Supreme Court has established that eavesdropping and other forms of audio surveillance may be conducted in public places without a warrant.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
30
The single or "one-man surveillance" is the most difficult because the suspect must be kept in view at all times and close contact is required by the officer.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
31
A device that electronically signals the location of automobiles,or other objects to which it is affixed,is known as a bumper beeper and its use has been prohibited by the courts.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
32
_____information collection includes personal interaction with people,many of whom are witnesses,victims,and even suspects.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
33
The dissemination stage of the intelligence process is the process that most commonly breaks down.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
34
The RISS projects are funded on a yearly basis by the United States Congress.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
35
Whenever possible,the surveillance car should be occupied by more than one officer.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
36
Covert information collection is the most common form of intelligence collection and includes a process known as intelligence gathering.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
37
To make sense out of the multitudes of information,a process known as data description and integration is used.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
38
A flowchart illustrates an activity at a single point in time.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
39
______information collection methods include the use of surveillance equipment,undercover officers,and informants.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
40
The primary purpose of the RISS projects is to provide the means to share criminal intelligence among member agencies.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
41
You have been working with a local police department that makes use of their aviation unit's helicopter to conduct thermal imaging operations in seeking out drugs in your community.Discuss and determine why you would choose to ask this organization for assistance with locating marijuana growing in your community.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
42
_______ files are criminal information developed for the purpose of making an arrest and gaining a conviction in a court of law.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
43
_____ intelligence targets criminal activity considered to be of immediate importance to the investigator.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
44
_____ is the secret or clandestine collecting and evaluation of information about crime and criminals not normally available to investigators.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
45
_____ analysis is a technique designed to show relationships between individuals and organizations,using a graphical visual design.
*Link
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
46
_____ is the stage of intelligence process in which information is shared with other law enforcement agencies.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
47
Matching
Locate the correct matches from Column 1 to Column 2
Matching Locate the correct matches from Column 1 to Column 2
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
48
You are preparing to conduct a surveillance operation and will need to be prepared.Determine what information you should have or attempt to obtain prior to conducting the actual surveillance.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
49
The surveillance operation can produce a great deal of needed information for the investigator.Discuss what detailed information can accomplish for the investigator.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
50
Your textbook identifies many items that surveillance officers should possess within their "Surveillance Kit Checklist." Identify a minimum of five of these items.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
51
Intelligence files are ______ files.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
52
_____ demonstrates a chain of events or activities over a period of time.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
54
Match between columns
Strategic intelligence
Worth of event
Strategic intelligence
Graphic visual design
Strategic intelligence
Chosen systematically
Strategic intelligence
Comparing texts
Strategic intelligence
Long range planning
Strategic intelligence
Chain of events
Strategic intelligence
Immediately used
Strategic intelligence
Gives meaning
Tactical intelligence
Worth of event
Tactical intelligence
Graphic visual design
Tactical intelligence
Chosen systematically
Tactical intelligence
Comparing texts
Tactical intelligence
Long range planning
Tactical intelligence
Chain of events
Tactical intelligence
Immediately used
Tactical intelligence
Gives meaning
Utility
Worth of event
Utility
Graphic visual design
Utility
Chosen systematically
Utility
Comparing texts
Utility
Long range planning
Utility
Chain of events
Utility
Immediately used
Utility
Gives meaning
Intelligence targets
Worth of event
Intelligence targets
Graphic visual design
Intelligence targets
Chosen systematically
Intelligence targets
Comparing texts
Intelligence targets
Long range planning
Intelligence targets
Chain of events
Intelligence targets
Immediately used
Intelligence targets
Gives meaning
Collation
Worth of event
Collation
Graphic visual design
Collation
Chosen systematically
Collation
Comparing texts
Collation
Long range planning
Collation
Chain of events
Collation
Immediately used
Collation
Gives meaning
Analysis
Worth of event
Analysis
Graphic visual design
Analysis
Chosen systematically
Analysis
Comparing texts
Analysis
Long range planning
Analysis
Chain of events
Analysis
Immediately used
Analysis
Gives meaning
Link analysis
Worth of event
Link analysis
Graphic visual design
Link analysis
Chosen systematically
Link analysis
Comparing texts
Link analysis
Long range planning
Link analysis
Chain of events
Link analysis
Immediately used
Link analysis
Gives meaning
Flowcharting
Worth of event
Flowcharting
Graphic visual design
Flowcharting
Chosen systematically
Flowcharting
Comparing texts
Flowcharting
Long range planning
Flowcharting
Chain of events
Flowcharting
Immediately used
Flowcharting
Gives meaning
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 53 flashcards in this deck.