A) Influence the statements of witnesses B) Collect evidence for intelligence units C) Ascertain facts to establish truth D) Secure the conviction of the accused
A) Reporting phase B) Initial response phase C) Follow-up phase D) Termination phase
A) Identifying the criminal’s motives only B) Organizing the prosecution panel C) Determining the essential information about a crime D) Drafting an intelligence cycle
A) Individuals present before the incident B) All individuals involved directly or indirectly C) Persons who may testify only D) Only the perpetrators
A) Timeliness B) Secrecy C) Flexibility D) Accuracy
A) Validation B) Interrogation C) Examination D) Interview
A) Collection B) Planning and direction C) Dissemination D) Processing
A) Arrest of suspects B) Deployment of operatives C) Documentation of court records D) Conversion of raw data to usable information
A) Replace interrogation B) Observe activities discreetly C) Establish public visibility D) Create fear among suspects
A) Termination B) Follow-up investigation C) Court prosecution D) Preliminary investigation
A) Secrecy B) Accuracy C) Mobility D) Reliability
A) The “Who” B) The “When” C) The “How” D) The “Why
A) Canvassing B) Photography C) Notes D) Surveillance
A) Prepare defense strategies B) Elicit firsthand observations C) Pressure them for a confession D) Influence their recall
A) Covert collection B) Strategic intelligence C) Overt information D) Operational intelligence
A) Case linkage and further evidence search B) Closing case files C) Securing perimeter D) Arresting without probable cause
A) Witness credibility B) Why C) Where D) Who
A) Accuracy B) Timeliness C) Compatibility D) Secrecy
A) Examination B) Interview C) Sketch D) Note-taking
A) Avoid the need for witnesses B) Provide foundation for prosecution C) Confuse the defense counsel D) Reduce the investigator’s workload
A) Reporting phase B) Termination phase C) Prosecution phase D) Initial response
A) Strategic intelligence B) Overt intelligence C) Operational intelligence D) Counterintelligence
A) Replace photography B) Identify the suspect immediately C) Provide a scale representation of the area D) Make a 3D reconstruction
A) Coordination B) Objectivity C) Accurate reporting D) Unity of direction
A) Arrest timing B) Surveillance planning C) Source evaluation D) Case termination
A) Failure of planning B) Low information value C) Reactive investigative strategy D) Deviation from intelligence doctrine
A) Administrative intelligence B) Operational intelligence C) Strategic intelligence D) Tactical surveillance data
A) Integration B) Prior isolation C) Refutation D) Exclusion
A) Rapid reporting B) Document reproduction C) Analytical risk assessment D) Specialized dissemination
A) Arrest by virtue of citizen’s arrest B) Arrest by search warrant C) Arrest in flagrante delicto D) Arrest by pre-arranged operation
A) Right to silence only B) Right to a speed disposition C) Right to bail D) Right to be informed of the nature and cause of arrest
A) Randomized checking pattern B) Evidence-centered searching C) Coordinated circular movement D) Vertical, overlapping movement
A) R.A. 7438 B) R.A. 9745 – Anti-Torture Act C) R.A. 10022 D) R.A. 9231
A) Outward spiral method B) Wheel search method C) Spotlight method D) Zone search method
A) Hot pursuit doctrine B) Miranda rights under R.A. 7438 C) Costudial remedy rule D) Physical evidence doctrine
A) Baseline method B) Polar coordinates C) Rough sketching D) Triangulation method
A) R.A. 9745 B) Warrantless arrest doctrine C) Search and seizure procedure D) R.A. 7438
A) Contact surveillance B) Tail–relay method C) Visual obstruction tracking D) Direct trailing
A) Substitute formal diagrams B) Establish a quick but accurate representation of the scene C) Replace photography D) Produce a final sketch for court immediately
A) Consent search B) Search incidental to a lawful arrest C) Administrative search D) Search for premises
A) Both A and B B) Only search and seizure rules C) R.A. 7438 D) R.A. 9745
A) The outer boundaries moving inward B) The central point moving outward C) Random points decided by personnel D) The corners of the crime scene
A) Physical integrity doctrine B) Chain of surveillance C) Harmonization D) Chain of custody
A) Gender-nuetrality principle B) Administrative rule for detention C) Necessity of force principle D) Proper search procedure
A) The suspect verbally consented B) The incriminating nature was immediately apparent C) The evidence was in closed storage D) A perimeter search was conducted
A) Consent existed B) Crime scene was already secured C) Probable cause was independently established D) Evidence was already in plain view
A) Whether visibility is limited B) Whether sketches can be made later C) Whether the center is identifiable D) Whether multiple teams are available
A) Reconcile inconsistencies through re-measurement B) Present both sketches and let the court decide C) Rely solely on photographs D) Discard the rough sketch
A) If the suspect already had a lawyer B) Whether the officer recorded the moment C) If the suspect was deceived D) Whether the confession was spontaneous
A) Valid under stop-and-frisk B) Invalid due to lack of overt act C) Valid under warrantless arrest D) Valid under custodial rule
A) Quadrant search should be replaced by strip method B) Additional lighting equipment should be deployed C) The search should be delayed until morning D) Only photographs should be taken
A) Valid if recorded B) Valid if officer witnesses it C) Invalid for lack of counsel D) Valid if voluntary
A) Whether suspect resisted B) Whether officers had a search warrant C) Whether area searched was within immediate control D) Whether consent was implied
A) Random evidence retrieval B) Uncontrolled investigation C) Systematic crime scene search D) Witness-led collection
A) Raw information B) Discarded information C) Finished intelligence D) Classified information
A) Sequence of action B) Underlying motive C) Weapon used D) Suspect identities
A) Provide public entertainment B) Create confidential rumors C) Support decision-making D) Replace investigators
A) Impulsive decision-making B) Overreliance on instincts C) Prioritizing personal judgment D) Observant and systematic
A) Any verbal statement B) Tangible items related to the crim C) Hearsay from neighbors D) Rumors about the suspect
A) Publicly available B) Overt C) Covert D) Strategic
A) Follow-up phase B) Crime scene processing C) Court presentation D) Dissemination phase
A) Every item in the area B) All destroyed evidence C) Personal belongings of witnesses D) Instruments of the crime
A) The suspect B) Proper decision-makers C) Any available personnel D) Only investigators
A) Intelligence gathering B) Crime scene processing C) Neighborhood canvassing D) Surveillance
A) Means B) Opportunity C) Modus operandi D) Motive
A) Secure and isolate the scene B) Conduct interrogation C) Collect fingerprints immediately D) Approach the suspect
A) Structural intelligence B) Operational intelligence C) Strategic intelligence D) Administrative intelligence
A) Weather Conditions B) Evidence collected C) Date and time of occurrence D) Cause of death
A) Replace testimony B) Create Investigation direction C) Locates suspect D) Shows exact appearance
A) Produce intelligence reports B) Avoid filing cases C) Satisfy public demand D) Identify the guilty party
A) Witness credibility B) Suspect C) Confidential materials from adversaries D) Scene integrity
A) Arrest warrant B) Judicial affidavit C) Preliminary hearing D) Interrogation
A) Follow-up B) Processing C) Termination D) Case documentation
A) Surveillance B) Interview C) Interrogation D) Sketching
A) Overt B) Structural C) Strategic D) Administrative intelligence
A) Organizing evidence chronologically B) Evaluating investigative leads C) Initial response D) Conducting termination
A) Reconstruction B) Verification C) Motive analysis D) Scene sketching
A) Collection B) Processing C) Dissemination D) Coordination
A) Accusation formulation B) Witness evaluation C) Case isolation D) Pattern analysis
A) The cardinal points B) Surveillance C) Note-taking D) Deductive reasoning
A) Using direct confrontation B) Maintaining a fixed pace C) Establishing overt presence D) Preserving cover and concealment
A) Dissemination B) Processing C) Direction D) Collection
A) Securing informant identity B) Randomizing interrogation C) Strategic penetration D) Evidence substitution
A) Pattern recognition B) Interrogation technique C) Overt documentation D) Randomized tracking
A) Classification B) Dissemination C) Direction D) Evaluation
A) Danger informant B) Classified agent C) Regular informant D) Accidental source
A) Security labeling B) Raw sorting C) Encoding D) Overclassification
A) Direct trailing B) Visual obstruction tracking C) Contact surveillance D) Tail-relay method
A) Analysis B) Planning and direction C) Reclassification D) Dissemination
A) Source validation B) Surveillance support C) Premature classification D) Tactical manipulation
A) Prioritization of information B) Discarding all sources C) Random selection D) Offensive surveillance
A) Cover selection B) Forced confrontation C) Dual-tracking D) Rational shadowing
A) Background B) Operational C) Strategic D) Administrative
A) Indirect canvassing B) Technical surveillance C) Controlled overt collection D) Witness retrieval
A) Interrogation secrecy B) Information suppression C) Covert misinformation D) Proper document disposal
A) Combined (team) surveillance B) Fragmented tracking C) Improvised surveillance D) Static intelligence
A) Dissemination B) Document security C) Planning clarity D) Source reliability
A) Operational utility vs. security risk B) Whether to reassign the team C) Whether to change the informant’s identity D) If surveillance should be canceled
A) Surveillance coordination B) Compartmentation principle C) Covert collection D) Multi-source evaluation
A) Immediate confrontation B) Hypothetical assumption C) Evidence suppression D) Source cross-validation |