A) Collect evidence for intelligence units B) Secure the conviction of the accused C) Influence the statements of witnesses D) Ascertain facts to establish truth
A) Termination phase B) Reporting phase C) Initial response phase D) Follow-up phase
A) Drafting an intelligence cycle B) Organizing the prosecution panel C) Determining the essential information about a crime D) Identifying the criminal’s motives only
A) Only the perpetrators B) All individuals involved directly or indirectly C) Individuals present before the incident D) Persons who may testify only
A) Flexibility B) Timeliness C) Secrecy D) Accuracy
A) Interrogation B) Validation C) Interview D) Examination
A) Planning and direction B) Dissemination C) Processing D) Collection
A) Deployment of operatives B) Arrest of suspects C) Conversion of raw data to usable information D) Documentation of court records
A) Replace interrogation B) Create fear among suspects C) Establish public visibility D) Observe activities discreetly
A) Preliminary investigation B) Termination C) Court prosecution D) Follow-up investigation
A) Secrecy B) Mobility C) Accuracy D) Reliability
A) The “Why B) The “When” C) The “Who” D) The “How”
A) Surveillance B) Photography C) Notes D) Canvassing
A) Elicit firsthand observations B) Pressure them for a confession C) Prepare defense strategies D) Influence their recall
A) Covert collection B) Strategic intelligence C) Overt information D) Operational intelligence
A) Securing perimeter B) Arresting without probable cause C) Case linkage and further evidence search D) Closing case files
A) Why B) Witness credibility C) Where D) Who
A) Compatibility B) Timeliness C) Secrecy D) Accuracy
A) Sketch B) Note-taking C) Examination D) Interview
A) Avoid the need for witnesses B) Confuse the defense counsel C) Provide foundation for prosecution D) Reduce the investigator’s workload
A) Initial response B) Termination phase C) Prosecution phase D) Reporting phase
A) Overt intelligence B) Strategic intelligence C) Operational intelligence D) Counterintelligence
A) Identify the suspect immediately B) Make a 3D reconstruction C) Replace photography D) Provide a scale representation of the area
A) Objectivity B) Coordination C) Accurate reporting D) Unity of direction
A) Case termination B) Arrest timing C) Surveillance planning D) Source evaluation
A) Failure of planning B) Reactive investigative strategy C) Low information value D) Deviation from intelligence doctrine
A) Operational intelligence B) Strategic intelligence C) Administrative intelligence D) Tactical surveillance data
A) Refutation B) Integration C) Exclusion D) Prior isolation
A) Analytical risk assessment B) Rapid reporting C) Specialized dissemination D) Document reproduction
A) Arrest in flagrante delicto B) Arrest by pre-arranged operation C) Arrest by virtue of citizen’s arrest D) Arrest by search warrant
A) Right to bail B) Right to silence only C) Right to a speed disposition D) Right to be informed of the nature and cause of arrest
A) Evidence-centered searching B) Randomized checking pattern C) Coordinated circular movement D) Vertical, overlapping movement
A) R.A. 9745 – Anti-Torture Act B) R.A. 9231 C) R.A. 7438 D) R.A. 10022
A) Outward spiral method B) Spotlight method C) Zone search method D) Wheel search method
A) Hot pursuit doctrine B) Miranda rights under R.A. 7438 C) Physical evidence doctrine D) Costudial remedy rule
A) Baseline method B) Triangulation method C) Polar coordinates D) Rough sketching
A) R.A. 7438 B) Search and seizure procedure C) R.A. 9745 D) Warrantless arrest doctrine
A) Tail–relay method B) Visual obstruction tracking C) Direct trailing D) Contact surveillance
A) Substitute formal diagrams B) Produce a final sketch for court immediately C) Establish a quick but accurate representation of the scene D) Replace photography
A) Search incidental to a lawful arrest B) Search for premises C) Consent search D) Administrative search
A) Both A and B B) R.A. 9745 C) R.A. 7438 D) Only search and seizure rules
A) Random points decided by personnel B) The corners of the crime scene C) The outer boundaries moving inward D) The central point moving outward
A) Physical integrity doctrine B) Harmonization C) Chain of surveillance D) Chain of custody
A) Necessity of force principle B) Administrative rule for detention C) Gender-nuetrality principle D) Proper search procedure
A) The evidence was in closed storage B) The incriminating nature was immediately apparent C) A perimeter search was conducted D) The suspect verbally consented
A) Evidence was already in plain view B) Consent existed C) Crime scene was already secured D) Probable cause was independently established
A) Whether multiple teams are available B) Whether the center is identifiable C) Whether sketches can be made later D) Whether visibility is limited
A) Rely solely on photographs B) Present both sketches and let the court decide C) Reconcile inconsistencies through re-measurement D) Discard the rough sketch
A) Whether the confession was spontaneous B) If the suspect was deceived C) If the suspect already had a lawyer D) Whether the officer recorded the moment
A) Valid under stop-and-frisk B) Valid under warrantless arrest C) Valid under custodial rule D) Invalid due to lack of overt act
A) The search should be delayed until morning B) Additional lighting equipment should be deployed C) Quadrant search should be replaced by strip method D) Only photographs should be taken
A) Invalid for lack of counsel B) Valid if officer witnesses it C) Valid if voluntary D) Valid if recorded
A) Whether consent was implied B) Whether area searched was within immediate control C) Whether suspect resisted D) Whether officers had a search warrant
A) Witness-led collection B) Systematic crime scene search C) Random evidence retrieval D) Uncontrolled investigation
A) Raw information B) Discarded information C) Finished intelligence D) Classified information
A) Sequence of action B) Underlying motive C) Weapon used D) Suspect identities
A) Create confidential rumors B) Replace investigators C) Provide public entertainment D) Support decision-making
A) Observant and systematic B) Prioritizing personal judgment C) Impulsive decision-making D) Overreliance on instincts
A) Hearsay from neighbors B) Any verbal statement C) Tangible items related to the crim D) Rumors about the suspect
A) Overt B) Strategic C) Covert D) Publicly available
A) Follow-up phase B) Court presentation C) Dissemination phase D) Crime scene processing
A) Instruments of the crime B) All destroyed evidence C) Personal belongings of witnesses D) Every item in the area
A) Any available personnel B) The suspect C) Proper decision-makers D) Only investigators
A) Surveillance B) Crime scene processing C) Neighborhood canvassing D) Intelligence gathering
A) Means B) Motive C) Modus operandi D) Opportunity
A) Collect fingerprints immediately B) Conduct interrogation C) Secure and isolate the scene D) Approach the suspect
A) Structural intelligence B) Strategic intelligence C) Administrative intelligence D) Operational intelligence
A) Weather Conditions B) Date and time of occurrence C) Evidence collected D) Cause of death
A) Replace testimony B) Locates suspect C) Shows exact appearance D) Create Investigation direction
A) Identify the guilty party B) Produce intelligence reports C) Avoid filing cases D) Satisfy public demand
A) Confidential materials from adversaries B) Suspect C) Scene integrity D) Witness credibility
A) Interrogation B) Preliminary hearing C) Judicial affidavit D) Arrest warrant
A) Termination B) Case documentation C) Processing D) Follow-up
A) Sketching B) Surveillance C) Interview D) Interrogation
A) Administrative intelligence B) Structural C) Strategic D) Overt
A) Conducting termination B) Evaluating investigative leads C) Initial response D) Organizing evidence chronologically
A) Reconstruction B) Motive analysis C) Scene sketching D) Verification
A) Processing B) Dissemination C) Coordination D) Collection
A) Case isolation B) Accusation formulation C) Pattern analysis D) Witness evaluation
A) Deductive reasoning B) Note-taking C) Surveillance D) The cardinal points
A) Preserving cover and concealment B) Using direct confrontation C) Maintaining a fixed pace D) Establishing overt presence
A) Dissemination B) Direction C) Collection D) Processing
A) Strategic penetration B) Securing informant identity C) Evidence substitution D) Randomizing interrogation
A) Pattern recognition B) Overt documentation C) Randomized tracking D) Interrogation technique
A) Evaluation B) Classification C) Dissemination D) Direction
A) Regular informant B) Danger informant C) Classified agent D) Accidental source
A) Raw sorting B) Security labeling C) Encoding D) Overclassification
A) Tail-relay method B) Direct trailing C) Visual obstruction tracking D) Contact surveillance
A) Analysis B) Planning and direction C) Reclassification D) Dissemination
A) Tactical manipulation B) Surveillance support C) Premature classification D) Source validation
A) Discarding all sources B) Random selection C) Prioritization of information D) Offensive surveillance
A) Cover selection B) Rational shadowing C) Dual-tracking D) Forced confrontation
A) Operational B) Background C) Administrative D) Strategic
A) Controlled overt collection B) Technical surveillance C) Indirect canvassing D) Witness retrieval
A) Proper document disposal B) Covert misinformation C) Interrogation secrecy D) Information suppression
A) Improvised surveillance B) Static intelligence C) Combined (team) surveillance D) Fragmented tracking
A) Document security B) Dissemination C) Planning clarity D) Source reliability
A) Whether to change the informant’s identity B) If surveillance should be canceled C) Whether to reassign the team D) Operational utility vs. security risk
A) Multi-source evaluation B) Covert collection C) Surveillance coordination D) Compartmentation principle
A) Hypothetical assumption B) Evidence suppression C) Source cross-validation D) Immediate confrontation |