A) Influence the statements of witnesses B) Secure the conviction of the accused C) Ascertain facts to establish truth D) Collect evidence for intelligence units
A) Follow-up phase B) Termination phase C) Initial response phase D) Reporting phase
A) Identifying the criminal’s motives only B) Organizing the prosecution panel C) Determining the essential information about a crime D) Drafting an intelligence cycle
A) Only the perpetrators B) All individuals involved directly or indirectly C) Persons who may testify only D) Individuals present before the incident
A) Secrecy B) Accuracy C) Flexibility D) Timeliness
A) Validation B) Interrogation C) Examination D) Interview
A) Processing B) Planning and direction C) Collection D) Dissemination
A) Arrest of suspects B) Conversion of raw data to usable information C) Deployment of operatives D) Documentation of court records
A) Observe activities discreetly B) Create fear among suspects C) Replace interrogation D) Establish public visibility
A) Preliminary investigation B) Termination C) Court prosecution D) Follow-up investigation
A) Accuracy B) Secrecy C) Mobility D) Reliability
A) The “When” B) The “Who” C) The “Why D) The “How”
A) Notes B) Photography C) Surveillance D) Canvassing
A) Pressure them for a confession B) Prepare defense strategies C) Influence their recall D) Elicit firsthand observations
A) Operational intelligence B) Overt information C) Strategic intelligence D) Covert collection
A) Case linkage and further evidence search B) Securing perimeter C) Closing case files D) Arresting without probable cause
A) Who B) Witness credibility C) Why D) Where
A) Accuracy B) Secrecy C) Timeliness D) Compatibility
A) Note-taking B) Interview C) Examination D) Sketch
A) Avoid the need for witnesses B) Confuse the defense counsel C) Provide foundation for prosecution D) Reduce the investigator’s workload
A) Prosecution phase B) Reporting phase C) Termination phase D) Initial response
A) Overt intelligence B) Operational intelligence C) Strategic intelligence D) Counterintelligence
A) Identify the suspect immediately B) Provide a scale representation of the area C) Replace photography D) Make a 3D reconstruction
A) Coordination B) Objectivity C) Unity of direction D) Accurate reporting
A) Arrest timing B) Surveillance planning C) Case termination D) Source evaluation
A) Reactive investigative strategy B) Deviation from intelligence doctrine C) Low information value D) Failure of planning
A) Strategic intelligence B) Administrative intelligence C) Tactical surveillance data D) Operational intelligence
A) Refutation B) Integration C) Exclusion D) Prior isolation
A) Specialized dissemination B) Document reproduction C) Analytical risk assessment D) Rapid reporting
A) Arrest by pre-arranged operation B) Arrest in flagrante delicto C) Arrest by search warrant D) Arrest by virtue of citizen’s arrest
A) Right to silence only B) Right to be informed of the nature and cause of arrest C) Right to a speed disposition D) Right to bail
A) Coordinated circular movement B) Randomized checking pattern C) Vertical, overlapping movement D) Evidence-centered searching
A) R.A. 7438 B) R.A. 9231 C) R.A. 9745 – Anti-Torture Act D) R.A. 10022
A) Zone search method B) Outward spiral method C) Spotlight method D) Wheel search method
A) Miranda rights under R.A. 7438 B) Physical evidence doctrine C) Costudial remedy rule D) Hot pursuit doctrine
A) Polar coordinates B) Triangulation method C) Rough sketching D) Baseline method
A) R.A. 9745 B) R.A. 7438 C) Warrantless arrest doctrine D) Search and seizure procedure
A) Tail–relay method B) Visual obstruction tracking C) Contact surveillance D) Direct trailing
A) Replace photography B) Substitute formal diagrams C) Establish a quick but accurate representation of the scene D) Produce a final sketch for court immediately
A) Search for premises B) Consent search C) Administrative search D) Search incidental to a lawful arrest
A) Only search and seizure rules B) Both A and B C) R.A. 9745 D) R.A. 7438
A) The corners of the crime scene B) The outer boundaries moving inward C) The central point moving outward D) Random points decided by personnel
A) Harmonization B) Physical integrity doctrine C) Chain of custody D) Chain of surveillance
A) Gender-nuetrality principle B) Proper search procedure C) Administrative rule for detention D) Necessity of force principle
A) A perimeter search was conducted B) The evidence was in closed storage C) The suspect verbally consented D) The incriminating nature was immediately apparent
A) Consent existed B) Crime scene was already secured C) Evidence was already in plain view D) Probable cause was independently established
A) Whether multiple teams are available B) Whether sketches can be made later C) Whether the center is identifiable D) Whether visibility is limited
A) Reconcile inconsistencies through re-measurement B) Present both sketches and let the court decide C) Rely solely on photographs D) Discard the rough sketch
A) If the suspect was deceived B) Whether the officer recorded the moment C) Whether the confession was spontaneous D) If the suspect already had a lawyer
A) Valid under warrantless arrest B) Valid under stop-and-frisk C) Valid under custodial rule D) Invalid due to lack of overt act
A) Only photographs should be taken B) The search should be delayed until morning C) Additional lighting equipment should be deployed D) Quadrant search should be replaced by strip method
A) Invalid for lack of counsel B) Valid if recorded C) Valid if officer witnesses it D) Valid if voluntary
A) Whether officers had a search warrant B) Whether area searched was within immediate control C) Whether consent was implied D) Whether suspect resisted
A) Uncontrolled investigation B) Systematic crime scene search C) Random evidence retrieval D) Witness-led collection
A) Classified information B) Finished intelligence C) Raw information D) Discarded information
A) Sequence of action B) Weapon used C) Underlying motive D) Suspect identities
A) Replace investigators B) Provide public entertainment C) Create confidential rumors D) Support decision-making
A) Prioritizing personal judgment B) Impulsive decision-making C) Overreliance on instincts D) Observant and systematic
A) Tangible items related to the crim B) Any verbal statement C) Hearsay from neighbors D) Rumors about the suspect
A) Publicly available B) Strategic C) Covert D) Overt
A) Court presentation B) Crime scene processing C) Follow-up phase D) Dissemination phase
A) Every item in the area B) Personal belongings of witnesses C) All destroyed evidence D) Instruments of the crime
A) Proper decision-makers B) Only investigators C) The suspect D) Any available personnel
A) Intelligence gathering B) Neighborhood canvassing C) Crime scene processing D) Surveillance
A) Motive B) Modus operandi C) Opportunity D) Means
A) Conduct interrogation B) Secure and isolate the scene C) Approach the suspect D) Collect fingerprints immediately
A) Strategic intelligence B) Operational intelligence C) Structural intelligence D) Administrative intelligence
A) Cause of death B) Evidence collected C) Weather Conditions D) Date and time of occurrence
A) Create Investigation direction B) Shows exact appearance C) Locates suspect D) Replace testimony
A) Satisfy public demand B) Produce intelligence reports C) Identify the guilty party D) Avoid filing cases
A) Scene integrity B) Confidential materials from adversaries C) Suspect D) Witness credibility
A) Preliminary hearing B) Interrogation C) Judicial affidavit D) Arrest warrant
A) Follow-up B) Termination C) Case documentation D) Processing
A) Surveillance B) Interrogation C) Interview D) Sketching
A) Overt B) Administrative intelligence C) Strategic D) Structural
A) Evaluating investigative leads B) Initial response C) Organizing evidence chronologically D) Conducting termination
A) Motive analysis B) Reconstruction C) Scene sketching D) Verification
A) Collection B) Dissemination C) Processing D) Coordination
A) Pattern analysis B) Accusation formulation C) Witness evaluation D) Case isolation
A) Deductive reasoning B) Note-taking C) The cardinal points D) Surveillance
A) Maintaining a fixed pace B) Establishing overt presence C) Using direct confrontation D) Preserving cover and concealment
A) Collection B) Direction C) Processing D) Dissemination
A) Evidence substitution B) Strategic penetration C) Randomizing interrogation D) Securing informant identity
A) Pattern recognition B) Interrogation technique C) Overt documentation D) Randomized tracking
A) Evaluation B) Classification C) Dissemination D) Direction
A) Classified agent B) Regular informant C) Accidental source D) Danger informant
A) Security labeling B) Encoding C) Overclassification D) Raw sorting
A) Direct trailing B) Contact surveillance C) Tail-relay method D) Visual obstruction tracking
A) Dissemination B) Planning and direction C) Analysis D) Reclassification
A) Surveillance support B) Premature classification C) Source validation D) Tactical manipulation
A) Random selection B) Offensive surveillance C) Prioritization of information D) Discarding all sources
A) Forced confrontation B) Rational shadowing C) Dual-tracking D) Cover selection
A) Background B) Strategic C) Administrative D) Operational
A) Technical surveillance B) Witness retrieval C) Indirect canvassing D) Controlled overt collection
A) Interrogation secrecy B) Proper document disposal C) Covert misinformation D) Information suppression
A) Fragmented tracking B) Static intelligence C) Combined (team) surveillance D) Improvised surveillance
A) Source reliability B) Document security C) Planning clarity D) Dissemination
A) Whether to reassign the team B) Whether to change the informant’s identity C) Operational utility vs. security risk D) If surveillance should be canceled
A) Surveillance coordination B) Covert collection C) Compartmentation principle D) Multi-source evaluation
A) Evidence suppression B) Source cross-validation C) Hypothetical assumption D) Immediate confrontation |