A) Influence the statements of witnesses B) Secure the conviction of the accused C) Collect evidence for intelligence units D) Ascertain facts to establish truth
A) Termination phase B) Initial response phase C) Reporting phase D) Follow-up phase
A) Organizing the prosecution panel B) Drafting an intelligence cycle C) Determining the essential information about a crime D) Identifying the criminal’s motives only
A) All individuals involved directly or indirectly B) Individuals present before the incident C) Only the perpetrators D) Persons who may testify only
A) Flexibility B) Accuracy C) Secrecy D) Timeliness
A) Interview B) Examination C) Validation D) Interrogation
A) Collection B) Planning and direction C) Dissemination D) Processing
A) Conversion of raw data to usable information B) Deployment of operatives C) Arrest of suspects D) Documentation of court records
A) Establish public visibility B) Create fear among suspects C) Observe activities discreetly D) Replace interrogation
A) Follow-up investigation B) Court prosecution C) Termination D) Preliminary investigation
A) Secrecy B) Accuracy C) Mobility D) Reliability
A) The “When” B) The “Why C) The “How” D) The “Who”
A) Surveillance B) Photography C) Notes D) Canvassing
A) Pressure them for a confession B) Elicit firsthand observations C) Prepare defense strategies D) Influence their recall
A) Overt information B) Covert collection C) Strategic intelligence D) Operational intelligence
A) Closing case files B) Securing perimeter C) Arresting without probable cause D) Case linkage and further evidence search
A) Who B) Why C) Witness credibility D) Where
A) Timeliness B) Compatibility C) Accuracy D) Secrecy
A) Note-taking B) Sketch C) Interview D) Examination
A) Reduce the investigator’s workload B) Avoid the need for witnesses C) Confuse the defense counsel D) Provide foundation for prosecution
A) Initial response B) Termination phase C) Prosecution phase D) Reporting phase
A) Strategic intelligence B) Counterintelligence C) Operational intelligence D) Overt intelligence
A) Replace photography B) Provide a scale representation of the area C) Make a 3D reconstruction D) Identify the suspect immediately
A) Coordination B) Objectivity C) Accurate reporting D) Unity of direction
A) Surveillance planning B) Arrest timing C) Source evaluation D) Case termination
A) Failure of planning B) Low information value C) Reactive investigative strategy D) Deviation from intelligence doctrine
A) Administrative intelligence B) Strategic intelligence C) Tactical surveillance data D) Operational intelligence
A) Exclusion B) Refutation C) Integration D) Prior isolation
A) Analytical risk assessment B) Rapid reporting C) Specialized dissemination D) Document reproduction
A) Arrest by virtue of citizen’s arrest B) Arrest by search warrant C) Arrest in flagrante delicto D) Arrest by pre-arranged operation
A) Right to be informed of the nature and cause of arrest B) Right to a speed disposition C) Right to silence only D) Right to bail
A) Evidence-centered searching B) Coordinated circular movement C) Vertical, overlapping movement D) Randomized checking pattern
A) R.A. 7438 B) R.A. 10022 C) R.A. 9231 D) R.A. 9745 – Anti-Torture Act
A) Outward spiral method B) Zone search method C) Spotlight method D) Wheel search method
A) Costudial remedy rule B) Physical evidence doctrine C) Miranda rights under R.A. 7438 D) Hot pursuit doctrine
A) Triangulation method B) Rough sketching C) Baseline method D) Polar coordinates
A) Warrantless arrest doctrine B) R.A. 7438 C) Search and seizure procedure D) R.A. 9745
A) Direct trailing B) Tail–relay method C) Visual obstruction tracking D) Contact surveillance
A) Establish a quick but accurate representation of the scene B) Substitute formal diagrams C) Replace photography D) Produce a final sketch for court immediately
A) Search incidental to a lawful arrest B) Search for premises C) Administrative search D) Consent search
A) R.A. 9745 B) Both A and B C) R.A. 7438 D) Only search and seizure rules
A) Random points decided by personnel B) The corners of the crime scene C) The central point moving outward D) The outer boundaries moving inward
A) Physical integrity doctrine B) Chain of surveillance C) Harmonization D) Chain of custody
A) Necessity of force principle B) Administrative rule for detention C) Gender-nuetrality principle D) Proper search procedure
A) The evidence was in closed storage B) The suspect verbally consented C) The incriminating nature was immediately apparent D) A perimeter search was conducted
A) Consent existed B) Crime scene was already secured C) Evidence was already in plain view D) Probable cause was independently established
A) Whether sketches can be made later B) Whether the center is identifiable C) Whether multiple teams are available D) Whether visibility is limited
A) Reconcile inconsistencies through re-measurement B) Present both sketches and let the court decide C) Discard the rough sketch D) Rely solely on photographs
A) If the suspect already had a lawyer B) If the suspect was deceived C) Whether the confession was spontaneous D) Whether the officer recorded the moment
A) Valid under warrantless arrest B) Valid under stop-and-frisk C) Invalid due to lack of overt act D) Valid under custodial rule
A) Only photographs should be taken B) Quadrant search should be replaced by strip method C) Additional lighting equipment should be deployed D) The search should be delayed until morning
A) Invalid for lack of counsel B) Valid if officer witnesses it C) Valid if voluntary D) Valid if recorded
A) Whether consent was implied B) Whether area searched was within immediate control C) Whether suspect resisted D) Whether officers had a search warrant
A) Systematic crime scene search B) Random evidence retrieval C) Witness-led collection D) Uncontrolled investigation
A) Discarded information B) Finished intelligence C) Classified information D) Raw information
A) Weapon used B) Suspect identities C) Sequence of action D) Underlying motive
A) Provide public entertainment B) Create confidential rumors C) Replace investigators D) Support decision-making
A) Prioritizing personal judgment B) Overreliance on instincts C) Observant and systematic D) Impulsive decision-making
A) Any verbal statement B) Tangible items related to the crim C) Hearsay from neighbors D) Rumors about the suspect
A) Publicly available B) Strategic C) Covert D) Overt
A) Follow-up phase B) Crime scene processing C) Dissemination phase D) Court presentation
A) Personal belongings of witnesses B) Instruments of the crime C) All destroyed evidence D) Every item in the area
A) The suspect B) Any available personnel C) Proper decision-makers D) Only investigators
A) Surveillance B) Crime scene processing C) Neighborhood canvassing D) Intelligence gathering
A) Motive B) Opportunity C) Modus operandi D) Means
A) Collect fingerprints immediately B) Secure and isolate the scene C) Approach the suspect D) Conduct interrogation
A) Strategic intelligence B) Operational intelligence C) Administrative intelligence D) Structural intelligence
A) Cause of death B) Evidence collected C) Date and time of occurrence D) Weather Conditions
A) Locates suspect B) Shows exact appearance C) Replace testimony D) Create Investigation direction
A) Produce intelligence reports B) Identify the guilty party C) Avoid filing cases D) Satisfy public demand
A) Scene integrity B) Witness credibility C) Confidential materials from adversaries D) Suspect
A) Arrest warrant B) Preliminary hearing C) Judicial affidavit D) Interrogation
A) Case documentation B) Follow-up C) Termination D) Processing
A) Sketching B) Interview C) Surveillance D) Interrogation
A) Strategic B) Administrative intelligence C) Overt D) Structural
A) Evaluating investigative leads B) Conducting termination C) Initial response D) Organizing evidence chronologically
A) Motive analysis B) Verification C) Scene sketching D) Reconstruction
A) Processing B) Dissemination C) Collection D) Coordination
A) Pattern analysis B) Case isolation C) Witness evaluation D) Accusation formulation
A) Note-taking B) Surveillance C) The cardinal points D) Deductive reasoning
A) Maintaining a fixed pace B) Using direct confrontation C) Establishing overt presence D) Preserving cover and concealment
A) Dissemination B) Direction C) Collection D) Processing
A) Securing informant identity B) Randomizing interrogation C) Evidence substitution D) Strategic penetration
A) Pattern recognition B) Interrogation technique C) Overt documentation D) Randomized tracking
A) Dissemination B) Classification C) Direction D) Evaluation
A) Regular informant B) Danger informant C) Classified agent D) Accidental source
A) Security labeling B) Encoding C) Raw sorting D) Overclassification
A) Tail-relay method B) Direct trailing C) Contact surveillance D) Visual obstruction tracking
A) Reclassification B) Dissemination C) Analysis D) Planning and direction
A) Source validation B) Surveillance support C) Tactical manipulation D) Premature classification
A) Offensive surveillance B) Prioritization of information C) Random selection D) Discarding all sources
A) Dual-tracking B) Cover selection C) Forced confrontation D) Rational shadowing
A) Strategic B) Background C) Administrative D) Operational
A) Controlled overt collection B) Indirect canvassing C) Technical surveillance D) Witness retrieval
A) Covert misinformation B) Proper document disposal C) Interrogation secrecy D) Information suppression
A) Improvised surveillance B) Fragmented tracking C) Static intelligence D) Combined (team) surveillance
A) Planning clarity B) Dissemination C) Source reliability D) Document security
A) Whether to change the informant’s identity B) If surveillance should be canceled C) Operational utility vs. security risk D) Whether to reassign the team
A) Multi-source evaluation B) Surveillance coordination C) Covert collection D) Compartmentation principle
A) Immediate confrontation B) Evidence suppression C) Hypothetical assumption D) Source cross-validation |