A) Influence the statements of witnesses B) Ascertain facts to establish truth C) Collect evidence for intelligence units D) Secure the conviction of the accused
A) Termination phase B) Reporting phase C) Initial response phase D) Follow-up phase
A) Drafting an intelligence cycle B) Identifying the criminal’s motives only C) Organizing the prosecution panel D) Determining the essential information about a crime
A) All individuals involved directly or indirectly B) Individuals present before the incident C) Persons who may testify only D) Only the perpetrators
A) Flexibility B) Secrecy C) Accuracy D) Timeliness
A) Examination B) Interview C) Validation D) Interrogation
A) Planning and direction B) Collection C) Dissemination D) Processing
A) Arrest of suspects B) Conversion of raw data to usable information C) Deployment of operatives D) Documentation of court records
A) Establish public visibility B) Create fear among suspects C) Observe activities discreetly D) Replace interrogation
A) Follow-up investigation B) Termination C) Court prosecution D) Preliminary investigation
A) Secrecy B) Mobility C) Accuracy D) Reliability
A) The “Why B) The “Who” C) The “How” D) The “When”
A) Notes B) Surveillance C) Photography D) Canvassing
A) Elicit firsthand observations B) Pressure them for a confession C) Prepare defense strategies D) Influence their recall
A) Operational intelligence B) Strategic intelligence C) Covert collection D) Overt information
A) Closing case files B) Arresting without probable cause C) Case linkage and further evidence search D) Securing perimeter
A) Where B) Who C) Witness credibility D) Why
A) Timeliness B) Accuracy C) Secrecy D) Compatibility
A) Examination B) Interview C) Note-taking D) Sketch
A) Provide foundation for prosecution B) Confuse the defense counsel C) Reduce the investigator’s workload D) Avoid the need for witnesses
A) Termination phase B) Initial response C) Reporting phase D) Prosecution phase
A) Operational intelligence B) Counterintelligence C) Strategic intelligence D) Overt intelligence
A) Make a 3D reconstruction B) Provide a scale representation of the area C) Identify the suspect immediately D) Replace photography
A) Unity of direction B) Objectivity C) Accurate reporting D) Coordination
A) Case termination B) Arrest timing C) Source evaluation D) Surveillance planning
A) Deviation from intelligence doctrine B) Low information value C) Reactive investigative strategy D) Failure of planning
A) Tactical surveillance data B) Administrative intelligence C) Strategic intelligence D) Operational intelligence
A) Prior isolation B) Integration C) Refutation D) Exclusion
A) Specialized dissemination B) Rapid reporting C) Analytical risk assessment D) Document reproduction
A) Arrest by search warrant B) Arrest by pre-arranged operation C) Arrest by virtue of citizen’s arrest D) Arrest in flagrante delicto
A) Right to be informed of the nature and cause of arrest B) Right to silence only C) Right to bail D) Right to a speed disposition
A) Evidence-centered searching B) Coordinated circular movement C) Vertical, overlapping movement D) Randomized checking pattern
A) R.A. 7438 B) R.A. 9231 C) R.A. 9745 – Anti-Torture Act D) R.A. 10022
A) Spotlight method B) Outward spiral method C) Zone search method D) Wheel search method
A) Physical evidence doctrine B) Costudial remedy rule C) Hot pursuit doctrine D) Miranda rights under R.A. 7438
A) Baseline method B) Polar coordinates C) Rough sketching D) Triangulation method
A) Warrantless arrest doctrine B) Search and seizure procedure C) R.A. 7438 D) R.A. 9745
A) Tail–relay method B) Visual obstruction tracking C) Direct trailing D) Contact surveillance
A) Substitute formal diagrams B) Produce a final sketch for court immediately C) Establish a quick but accurate representation of the scene D) Replace photography
A) Search for premises B) Search incidental to a lawful arrest C) Consent search D) Administrative search
A) R.A. 7438 B) R.A. 9745 C) Both A and B D) Only search and seizure rules
A) The corners of the crime scene B) Random points decided by personnel C) The central point moving outward D) The outer boundaries moving inward
A) Chain of custody B) Harmonization C) Chain of surveillance D) Physical integrity doctrine
A) Gender-nuetrality principle B) Necessity of force principle C) Administrative rule for detention D) Proper search procedure
A) The suspect verbally consented B) The evidence was in closed storage C) A perimeter search was conducted D) The incriminating nature was immediately apparent
A) Consent existed B) Crime scene was already secured C) Probable cause was independently established D) Evidence was already in plain view
A) Whether the center is identifiable B) Whether multiple teams are available C) Whether visibility is limited D) Whether sketches can be made later
A) Discard the rough sketch B) Rely solely on photographs C) Reconcile inconsistencies through re-measurement D) Present both sketches and let the court decide
A) Whether the confession was spontaneous B) If the suspect was deceived C) Whether the officer recorded the moment D) If the suspect already had a lawyer
A) Invalid due to lack of overt act B) Valid under stop-and-frisk C) Valid under warrantless arrest D) Valid under custodial rule
A) Additional lighting equipment should be deployed B) Quadrant search should be replaced by strip method C) The search should be delayed until morning D) Only photographs should be taken
A) Valid if recorded B) Invalid for lack of counsel C) Valid if officer witnesses it D) Valid if voluntary
A) Whether suspect resisted B) Whether consent was implied C) Whether officers had a search warrant D) Whether area searched was within immediate control
A) Random evidence retrieval B) Systematic crime scene search C) Uncontrolled investigation D) Witness-led collection
A) Discarded information B) Classified information C) Raw information D) Finished intelligence
A) Suspect identities B) Sequence of action C) Weapon used D) Underlying motive
A) Support decision-making B) Provide public entertainment C) Create confidential rumors D) Replace investigators
A) Prioritizing personal judgment B) Overreliance on instincts C) Impulsive decision-making D) Observant and systematic
A) Hearsay from neighbors B) Any verbal statement C) Rumors about the suspect D) Tangible items related to the crim
A) Publicly available B) Covert C) Strategic D) Overt
A) Court presentation B) Crime scene processing C) Dissemination phase D) Follow-up phase
A) Every item in the area B) All destroyed evidence C) Instruments of the crime D) Personal belongings of witnesses
A) The suspect B) Proper decision-makers C) Any available personnel D) Only investigators
A) Surveillance B) Neighborhood canvassing C) Intelligence gathering D) Crime scene processing
A) Means B) Opportunity C) Modus operandi D) Motive
A) Conduct interrogation B) Collect fingerprints immediately C) Approach the suspect D) Secure and isolate the scene
A) Operational intelligence B) Structural intelligence C) Administrative intelligence D) Strategic intelligence
A) Evidence collected B) Date and time of occurrence C) Cause of death D) Weather Conditions
A) Replace testimony B) Shows exact appearance C) Create Investigation direction D) Locates suspect
A) Avoid filing cases B) Identify the guilty party C) Produce intelligence reports D) Satisfy public demand
A) Confidential materials from adversaries B) Scene integrity C) Witness credibility D) Suspect
A) Judicial affidavit B) Arrest warrant C) Preliminary hearing D) Interrogation
A) Follow-up B) Termination C) Processing D) Case documentation
A) Interrogation B) Interview C) Sketching D) Surveillance
A) Structural B) Administrative intelligence C) Overt D) Strategic
A) Evaluating investigative leads B) Organizing evidence chronologically C) Conducting termination D) Initial response
A) Reconstruction B) Motive analysis C) Verification D) Scene sketching
A) Collection B) Processing C) Coordination D) Dissemination
A) Witness evaluation B) Pattern analysis C) Case isolation D) Accusation formulation
A) Surveillance B) Note-taking C) The cardinal points D) Deductive reasoning
A) Using direct confrontation B) Maintaining a fixed pace C) Establishing overt presence D) Preserving cover and concealment
A) Collection B) Processing C) Direction D) Dissemination
A) Randomizing interrogation B) Evidence substitution C) Securing informant identity D) Strategic penetration
A) Randomized tracking B) Interrogation technique C) Pattern recognition D) Overt documentation
A) Direction B) Evaluation C) Classification D) Dissemination
A) Regular informant B) Danger informant C) Classified agent D) Accidental source
A) Security labeling B) Overclassification C) Raw sorting D) Encoding
A) Tail-relay method B) Visual obstruction tracking C) Contact surveillance D) Direct trailing
A) Reclassification B) Dissemination C) Analysis D) Planning and direction
A) Surveillance support B) Premature classification C) Source validation D) Tactical manipulation
A) Random selection B) Offensive surveillance C) Discarding all sources D) Prioritization of information
A) Rational shadowing B) Dual-tracking C) Forced confrontation D) Cover selection
A) Operational B) Strategic C) Background D) Administrative
A) Indirect canvassing B) Witness retrieval C) Controlled overt collection D) Technical surveillance
A) Information suppression B) Interrogation secrecy C) Proper document disposal D) Covert misinformation
A) Improvised surveillance B) Fragmented tracking C) Static intelligence D) Combined (team) surveillance
A) Dissemination B) Document security C) Source reliability D) Planning clarity
A) If surveillance should be canceled B) Whether to reassign the team C) Operational utility vs. security risk D) Whether to change the informant’s identity
A) Covert collection B) Compartmentation principle C) Multi-source evaluation D) Surveillance coordination
A) Source cross-validation B) Hypothetical assumption C) Immediate confrontation D) Evidence suppression |