A) Influence the statements of witnesses B) Secure the conviction of the accused C) Ascertain facts to establish truth D) Collect evidence for intelligence units
A) Termination phase B) Initial response phase C) Follow-up phase D) Reporting phase
A) Determining the essential information about a crime B) Identifying the criminal’s motives only C) Drafting an intelligence cycle D) Organizing the prosecution panel
A) Persons who may testify only B) Only the perpetrators C) Individuals present before the incident D) All individuals involved directly or indirectly
A) Secrecy B) Timeliness C) Accuracy D) Flexibility
A) Examination B) Validation C) Interrogation D) Interview
A) Dissemination B) Processing C) Collection D) Planning and direction
A) Conversion of raw data to usable information B) Arrest of suspects C) Deployment of operatives D) Documentation of court records
A) Replace interrogation B) Establish public visibility C) Create fear among suspects D) Observe activities discreetly
A) Preliminary investigation B) Follow-up investigation C) Court prosecution D) Termination
A) Reliability B) Mobility C) Secrecy D) Accuracy
A) The “How” B) The “Why C) The “Who” D) The “When”
A) Notes B) Photography C) Canvassing D) Surveillance
A) Influence their recall B) Elicit firsthand observations C) Prepare defense strategies D) Pressure them for a confession
A) Operational intelligence B) Overt information C) Covert collection D) Strategic intelligence
A) Closing case files B) Arresting without probable cause C) Securing perimeter D) Case linkage and further evidence search
A) Who B) Witness credibility C) Where D) Why
A) Compatibility B) Accuracy C) Timeliness D) Secrecy
A) Interview B) Sketch C) Examination D) Note-taking
A) Reduce the investigator’s workload B) Provide foundation for prosecution C) Confuse the defense counsel D) Avoid the need for witnesses
A) Reporting phase B) Termination phase C) Initial response D) Prosecution phase
A) Operational intelligence B) Strategic intelligence C) Overt intelligence D) Counterintelligence
A) Provide a scale representation of the area B) Identify the suspect immediately C) Make a 3D reconstruction D) Replace photography
A) Coordination B) Objectivity C) Accurate reporting D) Unity of direction
A) Surveillance planning B) Arrest timing C) Case termination D) Source evaluation
A) Failure of planning B) Reactive investigative strategy C) Low information value D) Deviation from intelligence doctrine
A) Operational intelligence B) Administrative intelligence C) Strategic intelligence D) Tactical surveillance data
A) Prior isolation B) Integration C) Refutation D) Exclusion
A) Rapid reporting B) Specialized dissemination C) Document reproduction D) Analytical risk assessment
A) Arrest by pre-arranged operation B) Arrest in flagrante delicto C) Arrest by virtue of citizen’s arrest D) Arrest by search warrant
A) Right to a speed disposition B) Right to be informed of the nature and cause of arrest C) Right to bail D) Right to silence only
A) Vertical, overlapping movement B) Coordinated circular movement C) Evidence-centered searching D) Randomized checking pattern
A) R.A. 9745 – Anti-Torture Act B) R.A. 7438 C) R.A. 10022 D) R.A. 9231
A) Zone search method B) Spotlight method C) Wheel search method D) Outward spiral method
A) Hot pursuit doctrine B) Miranda rights under R.A. 7438 C) Physical evidence doctrine D) Costudial remedy rule
A) Polar coordinates B) Rough sketching C) Baseline method D) Triangulation method
A) R.A. 9745 B) Search and seizure procedure C) R.A. 7438 D) Warrantless arrest doctrine
A) Visual obstruction tracking B) Direct trailing C) Contact surveillance D) Tail–relay method
A) Replace photography B) Produce a final sketch for court immediately C) Substitute formal diagrams D) Establish a quick but accurate representation of the scene
A) Administrative search B) Consent search C) Search for premises D) Search incidental to a lawful arrest
A) Only search and seizure rules B) R.A. 9745 C) R.A. 7438 D) Both A and B
A) The corners of the crime scene B) Random points decided by personnel C) The outer boundaries moving inward D) The central point moving outward
A) Chain of custody B) Chain of surveillance C) Harmonization D) Physical integrity doctrine
A) Necessity of force principle B) Proper search procedure C) Administrative rule for detention D) Gender-nuetrality principle
A) A perimeter search was conducted B) The suspect verbally consented C) The evidence was in closed storage D) The incriminating nature was immediately apparent
A) Probable cause was independently established B) Crime scene was already secured C) Evidence was already in plain view D) Consent existed
A) Whether the center is identifiable B) Whether multiple teams are available C) Whether visibility is limited D) Whether sketches can be made later
A) Discard the rough sketch B) Present both sketches and let the court decide C) Reconcile inconsistencies through re-measurement D) Rely solely on photographs
A) If the suspect already had a lawyer B) If the suspect was deceived C) Whether the confession was spontaneous D) Whether the officer recorded the moment
A) Invalid due to lack of overt act B) Valid under warrantless arrest C) Valid under custodial rule D) Valid under stop-and-frisk
A) Additional lighting equipment should be deployed B) Quadrant search should be replaced by strip method C) Only photographs should be taken D) The search should be delayed until morning
A) Invalid for lack of counsel B) Valid if voluntary C) Valid if recorded D) Valid if officer witnesses it
A) Whether officers had a search warrant B) Whether consent was implied C) Whether suspect resisted D) Whether area searched was within immediate control
A) Random evidence retrieval B) Uncontrolled investigation C) Systematic crime scene search D) Witness-led collection
A) Raw information B) Discarded information C) Finished intelligence D) Classified information
A) Underlying motive B) Sequence of action C) Weapon used D) Suspect identities
A) Create confidential rumors B) Replace investigators C) Support decision-making D) Provide public entertainment
A) Observant and systematic B) Impulsive decision-making C) Overreliance on instincts D) Prioritizing personal judgment
A) Any verbal statement B) Hearsay from neighbors C) Rumors about the suspect D) Tangible items related to the crim
A) Strategic B) Covert C) Overt D) Publicly available
A) Follow-up phase B) Court presentation C) Crime scene processing D) Dissemination phase
A) Instruments of the crime B) Every item in the area C) All destroyed evidence D) Personal belongings of witnesses
A) Only investigators B) Any available personnel C) Proper decision-makers D) The suspect
A) Surveillance B) Neighborhood canvassing C) Intelligence gathering D) Crime scene processing
A) Opportunity B) Motive C) Means D) Modus operandi
A) Approach the suspect B) Secure and isolate the scene C) Conduct interrogation D) Collect fingerprints immediately
A) Strategic intelligence B) Administrative intelligence C) Operational intelligence D) Structural intelligence
A) Weather Conditions B) Date and time of occurrence C) Cause of death D) Evidence collected
A) Locates suspect B) Create Investigation direction C) Replace testimony D) Shows exact appearance
A) Satisfy public demand B) Produce intelligence reports C) Avoid filing cases D) Identify the guilty party
A) Witness credibility B) Suspect C) Confidential materials from adversaries D) Scene integrity
A) Interrogation B) Preliminary hearing C) Judicial affidavit D) Arrest warrant
A) Follow-up B) Termination C) Processing D) Case documentation
A) Sketching B) Interview C) Interrogation D) Surveillance
A) Overt B) Strategic C) Structural D) Administrative intelligence
A) Initial response B) Conducting termination C) Evaluating investigative leads D) Organizing evidence chronologically
A) Verification B) Scene sketching C) Reconstruction D) Motive analysis
A) Collection B) Coordination C) Processing D) Dissemination
A) Pattern analysis B) Accusation formulation C) Witness evaluation D) Case isolation
A) Deductive reasoning B) Surveillance C) The cardinal points D) Note-taking
A) Using direct confrontation B) Preserving cover and concealment C) Maintaining a fixed pace D) Establishing overt presence
A) Direction B) Processing C) Collection D) Dissemination
A) Strategic penetration B) Randomizing interrogation C) Securing informant identity D) Evidence substitution
A) Interrogation technique B) Pattern recognition C) Overt documentation D) Randomized tracking
A) Classification B) Direction C) Evaluation D) Dissemination
A) Classified agent B) Danger informant C) Accidental source D) Regular informant
A) Raw sorting B) Encoding C) Security labeling D) Overclassification
A) Direct trailing B) Tail-relay method C) Visual obstruction tracking D) Contact surveillance
A) Dissemination B) Reclassification C) Analysis D) Planning and direction
A) Tactical manipulation B) Premature classification C) Surveillance support D) Source validation
A) Prioritization of information B) Random selection C) Discarding all sources D) Offensive surveillance
A) Rational shadowing B) Dual-tracking C) Cover selection D) Forced confrontation
A) Operational B) Administrative C) Background D) Strategic
A) Witness retrieval B) Controlled overt collection C) Technical surveillance D) Indirect canvassing
A) Information suppression B) Covert misinformation C) Proper document disposal D) Interrogation secrecy
A) Combined (team) surveillance B) Fragmented tracking C) Static intelligence D) Improvised surveillance
A) Document security B) Planning clarity C) Source reliability D) Dissemination
A) Whether to change the informant’s identity B) Operational utility vs. security risk C) Whether to reassign the team D) If surveillance should be canceled
A) Covert collection B) Compartmentation principle C) Multi-source evaluation D) Surveillance coordination
A) Evidence suppression B) Source cross-validation C) Immediate confrontation D) Hypothetical assumption |