A) Collect evidence for intelligence units B) Secure the conviction of the accused C) Influence the statements of witnesses D) Ascertain facts to establish truth
A) Reporting phase B) Initial response phase C) Termination phase D) Follow-up phase
A) Identifying the criminal’s motives only B) Determining the essential information about a crime C) Organizing the prosecution panel D) Drafting an intelligence cycle
A) All individuals involved directly or indirectly B) Only the perpetrators C) Persons who may testify only D) Individuals present before the incident
A) Timeliness B) Flexibility C) Secrecy D) Accuracy
A) Interrogation B) Validation C) Examination D) Interview
A) Dissemination B) Collection C) Planning and direction D) Processing
A) Documentation of court records B) Arrest of suspects C) Conversion of raw data to usable information D) Deployment of operatives
A) Replace interrogation B) Establish public visibility C) Observe activities discreetly D) Create fear among suspects
A) Follow-up investigation B) Termination C) Court prosecution D) Preliminary investigation
A) Reliability B) Mobility C) Secrecy D) Accuracy
A) The “How” B) The “When” C) The “Who” D) The “Why
A) Photography B) Canvassing C) Notes D) Surveillance
A) Elicit firsthand observations B) Prepare defense strategies C) Influence their recall D) Pressure them for a confession
A) Covert collection B) Strategic intelligence C) Operational intelligence D) Overt information
A) Securing perimeter B) Arresting without probable cause C) Closing case files D) Case linkage and further evidence search
A) Witness credibility B) Where C) Who D) Why
A) Compatibility B) Accuracy C) Secrecy D) Timeliness
A) Interview B) Note-taking C) Examination D) Sketch
A) Provide foundation for prosecution B) Reduce the investigator’s workload C) Confuse the defense counsel D) Avoid the need for witnesses
A) Reporting phase B) Termination phase C) Prosecution phase D) Initial response
A) Overt intelligence B) Operational intelligence C) Counterintelligence D) Strategic intelligence
A) Identify the suspect immediately B) Make a 3D reconstruction C) Provide a scale representation of the area D) Replace photography
A) Objectivity B) Coordination C) Unity of direction D) Accurate reporting
A) Case termination B) Source evaluation C) Surveillance planning D) Arrest timing
A) Reactive investigative strategy B) Low information value C) Deviation from intelligence doctrine D) Failure of planning
A) Operational intelligence B) Administrative intelligence C) Strategic intelligence D) Tactical surveillance data
A) Integration B) Exclusion C) Prior isolation D) Refutation
A) Analytical risk assessment B) Rapid reporting C) Specialized dissemination D) Document reproduction
A) Arrest in flagrante delicto B) Arrest by search warrant C) Arrest by virtue of citizen’s arrest D) Arrest by pre-arranged operation
A) Right to a speed disposition B) Right to silence only C) Right to bail D) Right to be informed of the nature and cause of arrest
A) Vertical, overlapping movement B) Coordinated circular movement C) Evidence-centered searching D) Randomized checking pattern
A) R.A. 9745 – Anti-Torture Act B) R.A. 9231 C) R.A. 7438 D) R.A. 10022
A) Wheel search method B) Outward spiral method C) Spotlight method D) Zone search method
A) Costudial remedy rule B) Hot pursuit doctrine C) Miranda rights under R.A. 7438 D) Physical evidence doctrine
A) Rough sketching B) Polar coordinates C) Baseline method D) Triangulation method
A) Search and seizure procedure B) R.A. 9745 C) R.A. 7438 D) Warrantless arrest doctrine
A) Tail–relay method B) Visual obstruction tracking C) Contact surveillance D) Direct trailing
A) Establish a quick but accurate representation of the scene B) Substitute formal diagrams C) Replace photography D) Produce a final sketch for court immediately
A) Search for premises B) Consent search C) Administrative search D) Search incidental to a lawful arrest
A) R.A. 9745 B) R.A. 7438 C) Only search and seizure rules D) Both A and B
A) The corners of the crime scene B) Random points decided by personnel C) The outer boundaries moving inward D) The central point moving outward
A) Chain of surveillance B) Harmonization C) Chain of custody D) Physical integrity doctrine
A) Proper search procedure B) Gender-nuetrality principle C) Necessity of force principle D) Administrative rule for detention
A) The incriminating nature was immediately apparent B) The evidence was in closed storage C) A perimeter search was conducted D) The suspect verbally consented
A) Consent existed B) Evidence was already in plain view C) Crime scene was already secured D) Probable cause was independently established
A) Whether sketches can be made later B) Whether the center is identifiable C) Whether multiple teams are available D) Whether visibility is limited
A) Reconcile inconsistencies through re-measurement B) Discard the rough sketch C) Rely solely on photographs D) Present both sketches and let the court decide
A) Whether the officer recorded the moment B) If the suspect was deceived C) If the suspect already had a lawyer D) Whether the confession was spontaneous
A) Invalid due to lack of overt act B) Valid under stop-and-frisk C) Valid under warrantless arrest D) Valid under custodial rule
A) Only photographs should be taken B) Quadrant search should be replaced by strip method C) The search should be delayed until morning D) Additional lighting equipment should be deployed
A) Valid if officer witnesses it B) Valid if recorded C) Invalid for lack of counsel D) Valid if voluntary
A) Whether suspect resisted B) Whether area searched was within immediate control C) Whether consent was implied D) Whether officers had a search warrant
A) Systematic crime scene search B) Uncontrolled investigation C) Witness-led collection D) Random evidence retrieval
A) Discarded information B) Classified information C) Finished intelligence D) Raw information
A) Underlying motive B) Sequence of action C) Weapon used D) Suspect identities
A) Support decision-making B) Provide public entertainment C) Replace investigators D) Create confidential rumors
A) Prioritizing personal judgment B) Impulsive decision-making C) Overreliance on instincts D) Observant and systematic
A) Hearsay from neighbors B) Tangible items related to the crim C) Rumors about the suspect D) Any verbal statement
A) Publicly available B) Covert C) Strategic D) Overt
A) Court presentation B) Crime scene processing C) Dissemination phase D) Follow-up phase
A) Every item in the area B) Instruments of the crime C) All destroyed evidence D) Personal belongings of witnesses
A) Only investigators B) The suspect C) Any available personnel D) Proper decision-makers
A) Neighborhood canvassing B) Intelligence gathering C) Crime scene processing D) Surveillance
A) Motive B) Opportunity C) Modus operandi D) Means
A) Collect fingerprints immediately B) Conduct interrogation C) Secure and isolate the scene D) Approach the suspect
A) Administrative intelligence B) Structural intelligence C) Strategic intelligence D) Operational intelligence
A) Weather Conditions B) Date and time of occurrence C) Evidence collected D) Cause of death
A) Shows exact appearance B) Replace testimony C) Create Investigation direction D) Locates suspect
A) Satisfy public demand B) Produce intelligence reports C) Avoid filing cases D) Identify the guilty party
A) Suspect B) Scene integrity C) Confidential materials from adversaries D) Witness credibility
A) Arrest warrant B) Judicial affidavit C) Preliminary hearing D) Interrogation
A) Case documentation B) Follow-up C) Processing D) Termination
A) Interview B) Sketching C) Surveillance D) Interrogation
A) Strategic B) Administrative intelligence C) Structural D) Overt
A) Evaluating investigative leads B) Organizing evidence chronologically C) Conducting termination D) Initial response
A) Scene sketching B) Verification C) Motive analysis D) Reconstruction
A) Coordination B) Processing C) Dissemination D) Collection
A) Case isolation B) Pattern analysis C) Witness evaluation D) Accusation formulation
A) Deductive reasoning B) Note-taking C) Surveillance D) The cardinal points
A) Maintaining a fixed pace B) Establishing overt presence C) Preserving cover and concealment D) Using direct confrontation
A) Direction B) Processing C) Dissemination D) Collection
A) Strategic penetration B) Evidence substitution C) Randomizing interrogation D) Securing informant identity
A) Randomized tracking B) Pattern recognition C) Overt documentation D) Interrogation technique
A) Direction B) Evaluation C) Classification D) Dissemination
A) Classified agent B) Accidental source C) Danger informant D) Regular informant
A) Raw sorting B) Overclassification C) Security labeling D) Encoding
A) Tail-relay method B) Contact surveillance C) Direct trailing D) Visual obstruction tracking
A) Analysis B) Reclassification C) Dissemination D) Planning and direction
A) Tactical manipulation B) Source validation C) Premature classification D) Surveillance support
A) Offensive surveillance B) Random selection C) Prioritization of information D) Discarding all sources
A) Cover selection B) Rational shadowing C) Dual-tracking D) Forced confrontation
A) Background B) Operational C) Administrative D) Strategic
A) Controlled overt collection B) Technical surveillance C) Witness retrieval D) Indirect canvassing
A) Covert misinformation B) Information suppression C) Proper document disposal D) Interrogation secrecy
A) Fragmented tracking B) Static intelligence C) Combined (team) surveillance D) Improvised surveillance
A) Planning clarity B) Dissemination C) Document security D) Source reliability
A) If surveillance should be canceled B) Whether to reassign the team C) Operational utility vs. security risk D) Whether to change the informant’s identity
A) Compartmentation principle B) Covert collection C) Surveillance coordination D) Multi-source evaluation
A) Hypothetical assumption B) Evidence suppression C) Source cross-validation D) Immediate confrontation |