A) Ascertain facts to establish truth B) Secure the conviction of the accused C) Collect evidence for intelligence units D) Influence the statements of witnesses
A) Termination phase B) Initial response phase C) Follow-up phase D) Reporting phase
A) Identifying the criminal’s motives only B) Drafting an intelligence cycle C) Organizing the prosecution panel D) Determining the essential information about a crime
A) All individuals involved directly or indirectly B) Only the perpetrators C) Persons who may testify only D) Individuals present before the incident
A) Timeliness B) Flexibility C) Secrecy D) Accuracy
A) Interrogation B) Validation C) Examination D) Interview
A) Planning and direction B) Processing C) Collection D) Dissemination
A) Documentation of court records B) Conversion of raw data to usable information C) Deployment of operatives D) Arrest of suspects
A) Replace interrogation B) Observe activities discreetly C) Establish public visibility D) Create fear among suspects
A) Court prosecution B) Termination C) Preliminary investigation D) Follow-up investigation
A) Accuracy B) Reliability C) Secrecy D) Mobility
A) The “Who” B) The “Why C) The “How” D) The “When”
A) Notes B) Surveillance C) Canvassing D) Photography
A) Pressure them for a confession B) Influence their recall C) Prepare defense strategies D) Elicit firsthand observations
A) Operational intelligence B) Covert collection C) Strategic intelligence D) Overt information
A) Arresting without probable cause B) Securing perimeter C) Closing case files D) Case linkage and further evidence search
A) Who B) Where C) Witness credibility D) Why
A) Compatibility B) Timeliness C) Accuracy D) Secrecy
A) Examination B) Note-taking C) Interview D) Sketch
A) Reduce the investigator’s workload B) Avoid the need for witnesses C) Provide foundation for prosecution D) Confuse the defense counsel
A) Initial response B) Reporting phase C) Prosecution phase D) Termination phase
A) Counterintelligence B) Overt intelligence C) Strategic intelligence D) Operational intelligence
A) Provide a scale representation of the area B) Make a 3D reconstruction C) Identify the suspect immediately D) Replace photography
A) Accurate reporting B) Objectivity C) Coordination D) Unity of direction
A) Case termination B) Source evaluation C) Surveillance planning D) Arrest timing
A) Failure of planning B) Deviation from intelligence doctrine C) Reactive investigative strategy D) Low information value
A) Tactical surveillance data B) Strategic intelligence C) Administrative intelligence D) Operational intelligence
A) Prior isolation B) Exclusion C) Refutation D) Integration
A) Document reproduction B) Specialized dissemination C) Analytical risk assessment D) Rapid reporting
A) Arrest by virtue of citizen’s arrest B) Arrest in flagrante delicto C) Arrest by pre-arranged operation D) Arrest by search warrant
A) Right to a speed disposition B) Right to silence only C) Right to be informed of the nature and cause of arrest D) Right to bail
A) Coordinated circular movement B) Evidence-centered searching C) Vertical, overlapping movement D) Randomized checking pattern
A) R.A. 10022 B) R.A. 7438 C) R.A. 9745 – Anti-Torture Act D) R.A. 9231
A) Zone search method B) Wheel search method C) Spotlight method D) Outward spiral method
A) Hot pursuit doctrine B) Costudial remedy rule C) Miranda rights under R.A. 7438 D) Physical evidence doctrine
A) Triangulation method B) Rough sketching C) Polar coordinates D) Baseline method
A) R.A. 9745 B) Search and seizure procedure C) Warrantless arrest doctrine D) R.A. 7438
A) Contact surveillance B) Direct trailing C) Tail–relay method D) Visual obstruction tracking
A) Substitute formal diagrams B) Establish a quick but accurate representation of the scene C) Produce a final sketch for court immediately D) Replace photography
A) Consent search B) Administrative search C) Search incidental to a lawful arrest D) Search for premises
A) Both A and B B) Only search and seizure rules C) R.A. 7438 D) R.A. 9745
A) The central point moving outward B) The outer boundaries moving inward C) Random points decided by personnel D) The corners of the crime scene
A) Chain of surveillance B) Physical integrity doctrine C) Harmonization D) Chain of custody
A) Necessity of force principle B) Proper search procedure C) Administrative rule for detention D) Gender-nuetrality principle
A) The suspect verbally consented B) The evidence was in closed storage C) A perimeter search was conducted D) The incriminating nature was immediately apparent
A) Crime scene was already secured B) Consent existed C) Evidence was already in plain view D) Probable cause was independently established
A) Whether sketches can be made later B) Whether the center is identifiable C) Whether multiple teams are available D) Whether visibility is limited
A) Reconcile inconsistencies through re-measurement B) Rely solely on photographs C) Present both sketches and let the court decide D) Discard the rough sketch
A) Whether the confession was spontaneous B) If the suspect already had a lawyer C) If the suspect was deceived D) Whether the officer recorded the moment
A) Valid under custodial rule B) Valid under warrantless arrest C) Valid under stop-and-frisk D) Invalid due to lack of overt act
A) The search should be delayed until morning B) Quadrant search should be replaced by strip method C) Additional lighting equipment should be deployed D) Only photographs should be taken
A) Valid if recorded B) Valid if officer witnesses it C) Invalid for lack of counsel D) Valid if voluntary
A) Whether area searched was within immediate control B) Whether suspect resisted C) Whether officers had a search warrant D) Whether consent was implied
A) Witness-led collection B) Uncontrolled investigation C) Random evidence retrieval D) Systematic crime scene search
A) Finished intelligence B) Discarded information C) Classified information D) Raw information
A) Suspect identities B) Sequence of action C) Weapon used D) Underlying motive
A) Support decision-making B) Create confidential rumors C) Replace investigators D) Provide public entertainment
A) Overreliance on instincts B) Prioritizing personal judgment C) Impulsive decision-making D) Observant and systematic
A) Tangible items related to the crim B) Any verbal statement C) Hearsay from neighbors D) Rumors about the suspect
A) Publicly available B) Overt C) Strategic D) Covert
A) Crime scene processing B) Follow-up phase C) Court presentation D) Dissemination phase
A) All destroyed evidence B) Instruments of the crime C) Every item in the area D) Personal belongings of witnesses
A) Only investigators B) Proper decision-makers C) Any available personnel D) The suspect
A) Crime scene processing B) Surveillance C) Intelligence gathering D) Neighborhood canvassing
A) Opportunity B) Modus operandi C) Means D) Motive
A) Conduct interrogation B) Secure and isolate the scene C) Collect fingerprints immediately D) Approach the suspect
A) Administrative intelligence B) Structural intelligence C) Operational intelligence D) Strategic intelligence
A) Date and time of occurrence B) Weather Conditions C) Evidence collected D) Cause of death
A) Replace testimony B) Locates suspect C) Create Investigation direction D) Shows exact appearance
A) Satisfy public demand B) Produce intelligence reports C) Identify the guilty party D) Avoid filing cases
A) Suspect B) Confidential materials from adversaries C) Witness credibility D) Scene integrity
A) Judicial affidavit B) Arrest warrant C) Interrogation D) Preliminary hearing
A) Case documentation B) Processing C) Termination D) Follow-up
A) Interrogation B) Interview C) Surveillance D) Sketching
A) Administrative intelligence B) Overt C) Strategic D) Structural
A) Evaluating investigative leads B) Organizing evidence chronologically C) Conducting termination D) Initial response
A) Scene sketching B) Reconstruction C) Motive analysis D) Verification
A) Processing B) Collection C) Dissemination D) Coordination
A) Case isolation B) Witness evaluation C) Accusation formulation D) Pattern analysis
A) Surveillance B) Deductive reasoning C) Note-taking D) The cardinal points
A) Establishing overt presence B) Using direct confrontation C) Preserving cover and concealment D) Maintaining a fixed pace
A) Processing B) Collection C) Dissemination D) Direction
A) Randomizing interrogation B) Evidence substitution C) Strategic penetration D) Securing informant identity
A) Randomized tracking B) Pattern recognition C) Overt documentation D) Interrogation technique
A) Dissemination B) Classification C) Direction D) Evaluation
A) Classified agent B) Danger informant C) Accidental source D) Regular informant
A) Encoding B) Raw sorting C) Overclassification D) Security labeling
A) Visual obstruction tracking B) Contact surveillance C) Direct trailing D) Tail-relay method
A) Planning and direction B) Reclassification C) Analysis D) Dissemination
A) Surveillance support B) Premature classification C) Tactical manipulation D) Source validation
A) Prioritization of information B) Random selection C) Discarding all sources D) Offensive surveillance
A) Rational shadowing B) Cover selection C) Dual-tracking D) Forced confrontation
A) Administrative B) Operational C) Background D) Strategic
A) Witness retrieval B) Indirect canvassing C) Controlled overt collection D) Technical surveillance
A) Interrogation secrecy B) Covert misinformation C) Proper document disposal D) Information suppression
A) Static intelligence B) Fragmented tracking C) Combined (team) surveillance D) Improvised surveillance
A) Source reliability B) Dissemination C) Planning clarity D) Document security
A) Operational utility vs. security risk B) Whether to change the informant’s identity C) Whether to reassign the team D) If surveillance should be canceled
A) Surveillance coordination B) Multi-source evaluation C) Covert collection D) Compartmentation principle
A) Evidence suppression B) Source cross-validation C) Immediate confrontation D) Hypothetical assumption |