ログイン

CDI 1 QUIZ 3
92問 • 1年前
  • Adrian Ramirez
  • 通報

    問題一覧

  • 1

    It refers to the element of investigation necessary for gathering and collection of data to include its progress as it moves forward in solving the case.

    Information

  • 2

    Is defined as accusation in writing, charging a person with an offense, subscribed by the fiscal, and filed in court

    Information

  • 3

    This pieces of information is useless ___________________

    without being analyzed and evaluated.

  • 4

    It is an ___________ material of every description including those derived from observation, reports, rumors, imagery, and other sources from which intelligence is derived.

    Evaluated

  • 5

    Refers to collated, analyzed, and evaluated information appropriately acquired for a particular purpose.

    intelligence

  • 6

    is the network of data which can be linked or grouped in order to obtain a concrete and reliable information based on the prevailing need or as the need arises.

    Source of Information

  • 7

    people as a source of information;

    Regular source Cultivated source Grapevine source

  • 8

    gathered through the people who have come directly to the attention of the police commonly the complainant, witness or victim

    regular source

  • 9

    generally taken thorough the use of informant or informer

    Cultivated source

  • 10

    these are gathered from those who are in the underworld criminals or ex-convicts

    Grapevine source

  • 11

    Records as a source of information

    Government source private source internet source

  • 12

    these are source taken from the government agencies or any of its instrumentality.

    government source

  • 13

    these are source taken from the different private entities and business organizations, public utilities such as water or electric bills and all other private sectors.

    private source

  • 14

    this modern source of information is done through searching specific detail by typing the desired key or phrase in the different search engine.

    internet source

  • 15

    It is an individual who openly or secretly obtain or assists in obtaining information for intelligence and counter-intelligence purposes in exchange for some recompense, monetary or otherwise.

    informant

  • 16

    Types of informant:

    anonymous double crosser false informant frightened legitimate mercinary self-aggrandizing women

  • 17

    these are unidentified informants and usually provide information to the police through telephone or cellphones

    anonymous

  • 18

    these are informants who provide information in order also to gain information from the police. Worst, they acquire more information than what they give.

    double crosser

  • 19

    these are those informants who provide false information without bases.

    false informant

  • 20

    an informant who provides information due to panic or anxiety.

    frightened

  • 21

    these are those informants who provide information voluntarily to the police.

    legitimate

  • 22

    these are those informants who provide information in exchange for a reward. Whether money or any other consideration.

    mercenary

  • 23

    an informant who provides exaggerated information to the police in order to gain advantage or attention.

    self-aggrandizing

  • 24

    these are the most dangerous and difficult type of informants against male subjects

    women

  • 25

    informant provides information as a sense of duty an obligation to assist the police.

    civic mindedness

  • 26

    the person gives information due to oppression by enemies or other impending danger.

    fear

  • 27

    informant provides information to obtain a privilege toward the welfare of his family.

    Gratitude or gain

  • 28

    the informant is pushed to provide information to the police due to his resentment to the accomplishment or possessions of another.

    jelousy

  • 29

    a person informs the police for some pecuniary or other material gain he is to receive.

    remuneration

  • 30

    informant provides information as a sign of regret for what he has previously done

    repentance

  • 31

    vengeance or retaliation is the sole purpose of the person in providing information to the police

    revenge

  • 32

    the person wants to gain favorable attention and importance from the police.

    vanity

  • 33

    anti-wiretapping

    Republic Act. 4200

  • 34

    Data privacy act

    Republic act 10173

  • 35

    purpose of intelligence activity;

    increase the probability of accuracy, and reduced the probability of error

  • 36

    simply means as operation conducted openly

    overt investigation

  • 37

    an operation conducted in clandestine manner

    covert investigation

  • 38

    A network of information concerning national policy and national security.

    National intelligence

  • 39

    Those information regarding military activities which is at the same time essential to the different military operations.

    military intelligence

  • 40

    Collected, analyzed, collated and evaluated information concerning criminal investigation, criminal syndicate, organized crimes, and other police problems

    criminal intelligence

  • 41

    Refers to information needed by all the department agencies in the execution of government plans and programs.

    departmental intelligence

  • 42

    knowledge essential to the prevention of crimes and the investigation, arrest and prosecution of criminal offenders.

    criminal intelligence

  • 43

    knowledge essential to the maintenance of peace and order.

    internal security intelligence

  • 44

    knowledge essential in ensuring the protection of lives and properties.

    public safety intelligence

  • 45

    is a long range in nature and requires a longer period of time before being materialized and fully available.

    strategic intelligence

  • 46

    knowledge that is immediate in nature and can be available or developed within a short period of time.

    line intelligence

  • 47

    It is employed to protect the interest and safeguard lives, property and important information against possible entry or infiltration of enemy forces from being lost, destroyed or stolen.

    counter intelligence

  • 48

    It includes denying and blinding enemy about police operation and giving the police the opportunity in gathering information without being detected.

    counter intelligence

  • 49

    Refers to the stealing of vital information either physical or electronic form

    espionage

  • 50

    Refers to the stealing of properties or destruction of any material in order to hamper or cause delay in the preparation or regular working duties.

    Sabotage

  • 51

    The recruitment of person who is working within an organization or employment of any person to an organization who will work secretly in an attempt to undermine or overthrow its current system

    Subversive activity

  • 52

    An activity that constitutes the value of the CI workload world wide and includes specific investigation of individual and incidence which for the most part are conducted in an OVERT but DISCREET manner.

    counter intelligence operation

  • 53

    seeks to overcome enemy attempts to use human sources to collect information or to conduct sabotage and subversion.

    counter human intelligence

  • 54

    Includes action such as surveillance radar, photo thermal and infrared systems and rely heavily on pattern and movement analysis and evaluation of the enemy

    counter imagery intelligence

  • 55

    Determine enemy SIGINT and related enemy weaknesses, capabilities, and activities, assess friendly operations to identify patterns, profiles, and develop, recommend and analyze counter measures.

    counter signal intelligence

  • 56

    Include protection of classified and sensitive information to the unauthorized individual through secrecy, communication security, and other various safeguards.

    passive CI measures

  • 57

    Are those measures that actively block the enemies' effort to gain information or engage in espionage, subversive and sabotage.

    active CI measures

  • 58

    It is a repetitive process used to produce intelligence from information.

    intelligence cycle

  • 59

    Is defined as the process of determining the extent and scope of the needed preparation which includes the supervision of the collection of information and other requirements based on the standard priorities.

    Planning Phase

  • 60

    refers to any organization, entity, association or individual person that collects and gathers the needed information through an intelligence officer.

    Collecting agency

  • 61

    refers to any organization, entity, association or individual person that collects and gathers the needed information through an intelligence officer.

    Collection phase

  • 62

    Refers to the process involved in evaluating the accuracy and reliability of the information collected.

    Collation Phase

  • 63

    Refers to the action taken to transfer processed information to appropriate persons.

    Dissemination phase

  • 64

    principle means information or those that had already intelligence value should only be passed, handed and disseminated among persons who have the personality to know or acquire the same.

    Need to know

  • 65

    It is an investigative technique in which agent conceal his official identity in order to obtain information from the target organization.

    under cover operation

  • 66

    is the means as to how investigators will hide his original identity

    cover

  • 67

    it is the biographical portrayal of the investigator as to what role he will depict toward criminal syndicate while collecting vital information

    cover story

  • 68

    is the person who provides support to the investigator.

    cover support

  • 69

    Undercover operation is otherwise known as _______ although most of the time I refers to the surveillance of certain activities or events

    roping

  • 70

    done if the undercover agent is modifying his identity based on the current operation or as the case ay require.

    artificial cover

  • 71

    involves the use of different cover that will fit to a given situation.

    Multiple cover

  • 72

    is the person who directs the organization conducting the undercover operation

    head

  • 73

    pertains to any person, place or things against which the undercover operation is to be conducted

    target

  • 74

    refers to a person who conducts the clandestine activity.

    agent

  • 75

    Is a form of extracting information done through an interview with the person who might possess valuable information concerning a person, event, organization or place without his knowledge or suspicion.

    elicitation

  • 76

    it pertains to the manner as to how you will start talking

    approach

  • 77

    refers to the manner how you will keep the person talk.

    probe

  • 78

    refers to the safe place where the investigator or his informant will meet for briefing or debriefing purpose.

    safe house

  • 79

    refers to a person who carries an information to another person.

    courier

  • 80

    the agent merely leave the message

    dead drop

  • 81

    the courier hand over the message directly to the agent.

    live drop

  • 82

    Is defined as the clandestine or secret observation of persons, places or objects to acquire valuable information.

    Surveillance

  • 83

    refers to who or what is being observes which can be any person, place, property, vehicle, group of people, organization or object.

    subject

  • 84

    The person conducting the surveillance.

    surveillant

  • 85

    simply the outline of blueprint as to how surveillance should be conducted.

    surveillance plan

  • 86

    any person whom the subjects picks or deals with while he is under observation.

    contact

  • 87

    is an associate of the subject who follows him to detect surveillance .

    convoy

  • 88

    is a person or object use by the subject in attempt to escape the eyes of surveillant.

    decoy

  • 89

    when the subjects become aware that he is under observation and identifies the observer.

    burn out

  • 90

    when the surveliiant does not know the whereabouts of the subject or the subject had eluded the surveillance.

    lost

  • 91

    It is the chronological record of activities that the subject had or took place in the target area.

    log

  • 92

    refers to the area of operation of surveillance activities.

    target area

  • CLJ1 FINALS

    CLJ1 FINALS

    Adrian Ramirez · 95問 · 2年前

    CLJ1 FINALS

    CLJ1 FINALS

    95問 • 2年前
    Adrian Ramirez

    theories of crime causation

    theories of crime causation

    Adrian Ramirez · 24問 · 1年前

    theories of crime causation

    theories of crime causation

    24問 • 1年前
    Adrian Ramirez

    theories of crime causation

    theories of crime causation

    Adrian Ramirez · 43問 · 1年前

    theories of crime causation

    theories of crime causation

    43問 • 1年前
    Adrian Ramirez

    THEORIES OF CRIME CAUSATION 2

    THEORIES OF CRIME CAUSATION 2

    Adrian Ramirez · 7問 · 1年前

    THEORIES OF CRIME CAUSATION 2

    THEORIES OF CRIME CAUSATION 2

    7問 • 1年前
    Adrian Ramirez

    CDI 1

    CDI 1

    Adrian Ramirez · 70問 · 1年前

    CDI 1

    CDI 1

    70問 • 1年前
    Adrian Ramirez

    cdi (2nd)

    cdi (2nd)

    Adrian Ramirez · 65問 · 1年前

    cdi (2nd)

    cdi (2nd)

    65問 • 1年前
    Adrian Ramirez

    theories of crime causation (2nd quiz)

    theories of crime causation (2nd quiz)

    Adrian Ramirez · 41問 · 1年前

    theories of crime causation (2nd quiz)

    theories of crime causation (2nd quiz)

    41問 • 1年前
    Adrian Ramirez

    CDI CHAPTER 6

    CDI CHAPTER 6

    Adrian Ramirez · 100問 · 1年前

    CDI CHAPTER 6

    CDI CHAPTER 6

    100問 • 1年前
    Adrian Ramirez

    CDI CHAPTER 6 (2)

    CDI CHAPTER 6 (2)

    Adrian Ramirez · 48問 · 1年前

    CDI CHAPTER 6 (2)

    CDI CHAPTER 6 (2)

    48問 • 1年前
    Adrian Ramirez

    CDI CHAPTER 7

    CDI CHAPTER 7

    Adrian Ramirez · 60問 · 1年前

    CDI CHAPTER 7

    CDI CHAPTER 7

    60問 • 1年前
    Adrian Ramirez

    CDI CHAPTPER 8

    CDI CHAPTPER 8

    Adrian Ramirez · 26問 · 1年前

    CDI CHAPTPER 8

    CDI CHAPTPER 8

    26問 • 1年前
    Adrian Ramirez

    CDI chapter 9

    CDI chapter 9

    Adrian Ramirez · 14問 · 1年前

    CDI chapter 9

    CDI chapter 9

    14問 • 1年前
    Adrian Ramirez

    CDI CHAPTER 10-11

    CDI CHAPTER 10-11

    Adrian Ramirez · 41問 · 1年前

    CDI CHAPTER 10-11

    CDI CHAPTER 10-11

    41問 • 1年前
    Adrian Ramirez

    LEA 1 (1st quiz)

    LEA 1 (1st quiz)

    Adrian Ramirez · 15問 · 1年前

    LEA 1 (1st quiz)

    LEA 1 (1st quiz)

    15問 • 1年前
    Adrian Ramirez

    CDI 2 CHAPTER 1-2

    CDI 2 CHAPTER 1-2

    Adrian Ramirez · 49問 · 1年前

    CDI 2 CHAPTER 1-2

    CDI 2 CHAPTER 1-2

    49問 • 1年前
    Adrian Ramirez

    forensic photography (chapter 1)

    forensic photography (chapter 1)

    Adrian Ramirez · 31問 · 1年前

    forensic photography (chapter 1)

    forensic photography (chapter 1)

    31問 • 1年前
    Adrian Ramirez

    Forensic Photography quiz 2

    Forensic Photography quiz 2

    Adrian Ramirez · 71問 · 1年前

    Forensic Photography quiz 2

    Forensic Photography quiz 2

    71問 • 1年前
    Adrian Ramirez

    Lea 1 3rd quiz

    Lea 1 3rd quiz

    Adrian Ramirez · 43問 · 1年前

    Lea 1 3rd quiz

    Lea 1 3rd quiz

    43問 • 1年前
    Adrian Ramirez

    LEA 1 ORAL

    LEA 1 ORAL

    Adrian Ramirez · 42問 · 1年前

    LEA 1 ORAL

    LEA 1 ORAL

    42問 • 1年前
    Adrian Ramirez

    問題一覧

  • 1

    It refers to the element of investigation necessary for gathering and collection of data to include its progress as it moves forward in solving the case.

    Information

  • 2

    Is defined as accusation in writing, charging a person with an offense, subscribed by the fiscal, and filed in court

    Information

  • 3

    This pieces of information is useless ___________________

    without being analyzed and evaluated.

  • 4

    It is an ___________ material of every description including those derived from observation, reports, rumors, imagery, and other sources from which intelligence is derived.

    Evaluated

  • 5

    Refers to collated, analyzed, and evaluated information appropriately acquired for a particular purpose.

    intelligence

  • 6

    is the network of data which can be linked or grouped in order to obtain a concrete and reliable information based on the prevailing need or as the need arises.

    Source of Information

  • 7

    people as a source of information;

    Regular source Cultivated source Grapevine source

  • 8

    gathered through the people who have come directly to the attention of the police commonly the complainant, witness or victim

    regular source

  • 9

    generally taken thorough the use of informant or informer

    Cultivated source

  • 10

    these are gathered from those who are in the underworld criminals or ex-convicts

    Grapevine source

  • 11

    Records as a source of information

    Government source private source internet source

  • 12

    these are source taken from the government agencies or any of its instrumentality.

    government source

  • 13

    these are source taken from the different private entities and business organizations, public utilities such as water or electric bills and all other private sectors.

    private source

  • 14

    this modern source of information is done through searching specific detail by typing the desired key or phrase in the different search engine.

    internet source

  • 15

    It is an individual who openly or secretly obtain or assists in obtaining information for intelligence and counter-intelligence purposes in exchange for some recompense, monetary or otherwise.

    informant

  • 16

    Types of informant:

    anonymous double crosser false informant frightened legitimate mercinary self-aggrandizing women

  • 17

    these are unidentified informants and usually provide information to the police through telephone or cellphones

    anonymous

  • 18

    these are informants who provide information in order also to gain information from the police. Worst, they acquire more information than what they give.

    double crosser

  • 19

    these are those informants who provide false information without bases.

    false informant

  • 20

    an informant who provides information due to panic or anxiety.

    frightened

  • 21

    these are those informants who provide information voluntarily to the police.

    legitimate

  • 22

    these are those informants who provide information in exchange for a reward. Whether money or any other consideration.

    mercenary

  • 23

    an informant who provides exaggerated information to the police in order to gain advantage or attention.

    self-aggrandizing

  • 24

    these are the most dangerous and difficult type of informants against male subjects

    women

  • 25

    informant provides information as a sense of duty an obligation to assist the police.

    civic mindedness

  • 26

    the person gives information due to oppression by enemies or other impending danger.

    fear

  • 27

    informant provides information to obtain a privilege toward the welfare of his family.

    Gratitude or gain

  • 28

    the informant is pushed to provide information to the police due to his resentment to the accomplishment or possessions of another.

    jelousy

  • 29

    a person informs the police for some pecuniary or other material gain he is to receive.

    remuneration

  • 30

    informant provides information as a sign of regret for what he has previously done

    repentance

  • 31

    vengeance or retaliation is the sole purpose of the person in providing information to the police

    revenge

  • 32

    the person wants to gain favorable attention and importance from the police.

    vanity

  • 33

    anti-wiretapping

    Republic Act. 4200

  • 34

    Data privacy act

    Republic act 10173

  • 35

    purpose of intelligence activity;

    increase the probability of accuracy, and reduced the probability of error

  • 36

    simply means as operation conducted openly

    overt investigation

  • 37

    an operation conducted in clandestine manner

    covert investigation

  • 38

    A network of information concerning national policy and national security.

    National intelligence

  • 39

    Those information regarding military activities which is at the same time essential to the different military operations.

    military intelligence

  • 40

    Collected, analyzed, collated and evaluated information concerning criminal investigation, criminal syndicate, organized crimes, and other police problems

    criminal intelligence

  • 41

    Refers to information needed by all the department agencies in the execution of government plans and programs.

    departmental intelligence

  • 42

    knowledge essential to the prevention of crimes and the investigation, arrest and prosecution of criminal offenders.

    criminal intelligence

  • 43

    knowledge essential to the maintenance of peace and order.

    internal security intelligence

  • 44

    knowledge essential in ensuring the protection of lives and properties.

    public safety intelligence

  • 45

    is a long range in nature and requires a longer period of time before being materialized and fully available.

    strategic intelligence

  • 46

    knowledge that is immediate in nature and can be available or developed within a short period of time.

    line intelligence

  • 47

    It is employed to protect the interest and safeguard lives, property and important information against possible entry or infiltration of enemy forces from being lost, destroyed or stolen.

    counter intelligence

  • 48

    It includes denying and blinding enemy about police operation and giving the police the opportunity in gathering information without being detected.

    counter intelligence

  • 49

    Refers to the stealing of vital information either physical or electronic form

    espionage

  • 50

    Refers to the stealing of properties or destruction of any material in order to hamper or cause delay in the preparation or regular working duties.

    Sabotage

  • 51

    The recruitment of person who is working within an organization or employment of any person to an organization who will work secretly in an attempt to undermine or overthrow its current system

    Subversive activity

  • 52

    An activity that constitutes the value of the CI workload world wide and includes specific investigation of individual and incidence which for the most part are conducted in an OVERT but DISCREET manner.

    counter intelligence operation

  • 53

    seeks to overcome enemy attempts to use human sources to collect information or to conduct sabotage and subversion.

    counter human intelligence

  • 54

    Includes action such as surveillance radar, photo thermal and infrared systems and rely heavily on pattern and movement analysis and evaluation of the enemy

    counter imagery intelligence

  • 55

    Determine enemy SIGINT and related enemy weaknesses, capabilities, and activities, assess friendly operations to identify patterns, profiles, and develop, recommend and analyze counter measures.

    counter signal intelligence

  • 56

    Include protection of classified and sensitive information to the unauthorized individual through secrecy, communication security, and other various safeguards.

    passive CI measures

  • 57

    Are those measures that actively block the enemies' effort to gain information or engage in espionage, subversive and sabotage.

    active CI measures

  • 58

    It is a repetitive process used to produce intelligence from information.

    intelligence cycle

  • 59

    Is defined as the process of determining the extent and scope of the needed preparation which includes the supervision of the collection of information and other requirements based on the standard priorities.

    Planning Phase

  • 60

    refers to any organization, entity, association or individual person that collects and gathers the needed information through an intelligence officer.

    Collecting agency

  • 61

    refers to any organization, entity, association or individual person that collects and gathers the needed information through an intelligence officer.

    Collection phase

  • 62

    Refers to the process involved in evaluating the accuracy and reliability of the information collected.

    Collation Phase

  • 63

    Refers to the action taken to transfer processed information to appropriate persons.

    Dissemination phase

  • 64

    principle means information or those that had already intelligence value should only be passed, handed and disseminated among persons who have the personality to know or acquire the same.

    Need to know

  • 65

    It is an investigative technique in which agent conceal his official identity in order to obtain information from the target organization.

    under cover operation

  • 66

    is the means as to how investigators will hide his original identity

    cover

  • 67

    it is the biographical portrayal of the investigator as to what role he will depict toward criminal syndicate while collecting vital information

    cover story

  • 68

    is the person who provides support to the investigator.

    cover support

  • 69

    Undercover operation is otherwise known as _______ although most of the time I refers to the surveillance of certain activities or events

    roping

  • 70

    done if the undercover agent is modifying his identity based on the current operation or as the case ay require.

    artificial cover

  • 71

    involves the use of different cover that will fit to a given situation.

    Multiple cover

  • 72

    is the person who directs the organization conducting the undercover operation

    head

  • 73

    pertains to any person, place or things against which the undercover operation is to be conducted

    target

  • 74

    refers to a person who conducts the clandestine activity.

    agent

  • 75

    Is a form of extracting information done through an interview with the person who might possess valuable information concerning a person, event, organization or place without his knowledge or suspicion.

    elicitation

  • 76

    it pertains to the manner as to how you will start talking

    approach

  • 77

    refers to the manner how you will keep the person talk.

    probe

  • 78

    refers to the safe place where the investigator or his informant will meet for briefing or debriefing purpose.

    safe house

  • 79

    refers to a person who carries an information to another person.

    courier

  • 80

    the agent merely leave the message

    dead drop

  • 81

    the courier hand over the message directly to the agent.

    live drop

  • 82

    Is defined as the clandestine or secret observation of persons, places or objects to acquire valuable information.

    Surveillance

  • 83

    refers to who or what is being observes which can be any person, place, property, vehicle, group of people, organization or object.

    subject

  • 84

    The person conducting the surveillance.

    surveillant

  • 85

    simply the outline of blueprint as to how surveillance should be conducted.

    surveillance plan

  • 86

    any person whom the subjects picks or deals with while he is under observation.

    contact

  • 87

    is an associate of the subject who follows him to detect surveillance .

    convoy

  • 88

    is a person or object use by the subject in attempt to escape the eyes of surveillant.

    decoy

  • 89

    when the subjects become aware that he is under observation and identifies the observer.

    burn out

  • 90

    when the surveliiant does not know the whereabouts of the subject or the subject had eluded the surveillance.

    lost

  • 91

    It is the chronological record of activities that the subject had or took place in the target area.

    log

  • 92

    refers to the area of operation of surveillance activities.

    target area