Deck 8: Surveillance

ملء الشاشة (f)
exit full mode
سؤال
A countermeasure to determine whether a subject is under surveillance is known as a

A) tail
B) stakeout
C) shadow
D) convoy
E) none of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A surveillance wherein the subject is most likely aware of the surveillance, but must not be lost, is called

A) discreet surveillance
B) a fixed surveillance
C) a technical surveillance
D) an open surveillance
E) none of the above
سؤال
Open surveillance in which the subject's vehicle is closely followed is known as

A) a mustard plaster
B) a direct surveillance
C) a tight surveillance
D) a moving surveillance
E) none of the above
سؤال
A surveillance involving the use of scientific devices to enhance hearing or seeing the subject's activities is known as a(n)

A) discreet surveillance
B) fixed surveillance
C) open surveillance
D) technical surveillance
E) direct surveillance
سؤال
A device that records all numbers dialed on a telephone is known as a

A) pen register
B) beeper
C) bug
D) mustard plaster
E) loop
سؤال
A 1928 Supreme Court decision held that wiretapping did not constitute search and seizure of telephone messages and therefore did not come under the protection of the

A) First Amendment
B) Second Amendment
C) Fourth Amendment
D) Eighth Amendment
E) Fourteenth Amendment
سؤال
According to the Court's decision in Katz v. United States, the Fourth Amendment of the United States Constitution protects

A) places
B) free speech
C) property
D) people
E) weapons
سؤال
A device that facilitates tracking the movement of contraband in vehicles or on persons suspected of engaging in criminal activity is called a(n)

A) bug
B) beeper
C) pen register
D) electronic radar
E) pager
سؤال
The ________________ regulates the investigative use of beepers and pen registers.

A) Electronic Communications Privacy Act
B) Omnibus Crime Control Act
C) Federal Communications Surveillance Act
D) Fifth Amendment of the United States Constitution
E) none of the above
سؤال
The person conducting the surveillance is known as a

A) shadow
B) plant
C) tailgater
D) surveillant
E) suspect
سؤال
_______________ surveillance is used when the objective is to locate a suspect by tailing their relatives and friends.

A) Loose
B) Close
C) Direct
D) Moving
E) Open
سؤال
The goal of ___________ surveillance is to prevent a crime from occurring or to learn more about the subject's contacts, even at the risk of being detected by the subject.

A) loose
B) close
C) direct
D) moving
E) open
سؤال
When the objective is to prevent an assault or other crime against an individual, the term ________________ describes the tactic.

A) shadow
B) burn the surveillance
C) tailgating
D) mustard plaster
E) take down
سؤال
In federal cases, the application for an interception of a wire or oral communication order must be approved by the

A) attorney general or a specific designee
B) principle prosecuting officer
C) federal district judge
D) state appeals court judge
E) state criminal court judge
سؤال
An order to intercept a wire or oral communication may not remain in effect longer than is necessary to achieve its objectives or for a maximum of _____ days.

A) 10
B) 20
C) 30
D) 60
E) 90
سؤال
According to the authors, conducting surveillance is generally expensive.
سؤال
A loose surveillance is considered to be a cautious surveillance because the loss of the subject is preferred to possible exposure.
سؤال
Surveillance can only be conducted from a stationary position.
سؤال
Technical surveillance involves the use of electronic and visual enhancement devices to view or overhear suspects in the conduct of their daily affairs.
سؤال
According to the authors, when considering the use of wiretaps, it is not particularly important for a federal investigator to ascertain the legal status of the practice in the jurisdiction involved.
سؤال
The pen register neither overhears conversations nor indicates whether a call was completed.
سؤال
Law enforcement officials claim that the beeper facilitates surveillance by substituting for the human eye and reducing the danger of detection.
سؤال
In large-scale investigations, surveillance is normally conducted by only one member of the investigative team to prevent detection by the subject.
سؤال
During a loose surveillance, the surveillance exercises great caution while observing the subject, preferring to drop the tail rather than risk detection.
سؤال
According to the authors, the success of a surveillance is not necessarily contingent upon the degree of forethought and thoroughness given to the preliminary preparations.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Surveillance
1
A countermeasure to determine whether a subject is under surveillance is known as a

A) tail
B) stakeout
C) shadow
D) convoy
E) none of the above
D
2
A surveillance wherein the subject is most likely aware of the surveillance, but must not be lost, is called

A) discreet surveillance
B) a fixed surveillance
C) a technical surveillance
D) an open surveillance
E) none of the above
D
3
Open surveillance in which the subject's vehicle is closely followed is known as

A) a mustard plaster
B) a direct surveillance
C) a tight surveillance
D) a moving surveillance
E) none of the above
E
4
A surveillance involving the use of scientific devices to enhance hearing or seeing the subject's activities is known as a(n)

A) discreet surveillance
B) fixed surveillance
C) open surveillance
D) technical surveillance
E) direct surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
A device that records all numbers dialed on a telephone is known as a

A) pen register
B) beeper
C) bug
D) mustard plaster
E) loop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
A 1928 Supreme Court decision held that wiretapping did not constitute search and seizure of telephone messages and therefore did not come under the protection of the

A) First Amendment
B) Second Amendment
C) Fourth Amendment
D) Eighth Amendment
E) Fourteenth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
According to the Court's decision in Katz v. United States, the Fourth Amendment of the United States Constitution protects

A) places
B) free speech
C) property
D) people
E) weapons
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
A device that facilitates tracking the movement of contraband in vehicles or on persons suspected of engaging in criminal activity is called a(n)

A) bug
B) beeper
C) pen register
D) electronic radar
E) pager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ________________ regulates the investigative use of beepers and pen registers.

A) Electronic Communications Privacy Act
B) Omnibus Crime Control Act
C) Federal Communications Surveillance Act
D) Fifth Amendment of the United States Constitution
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The person conducting the surveillance is known as a

A) shadow
B) plant
C) tailgater
D) surveillant
E) suspect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
_______________ surveillance is used when the objective is to locate a suspect by tailing their relatives and friends.

A) Loose
B) Close
C) Direct
D) Moving
E) Open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
The goal of ___________ surveillance is to prevent a crime from occurring or to learn more about the subject's contacts, even at the risk of being detected by the subject.

A) loose
B) close
C) direct
D) moving
E) open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
When the objective is to prevent an assault or other crime against an individual, the term ________________ describes the tactic.

A) shadow
B) burn the surveillance
C) tailgating
D) mustard plaster
E) take down
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
In federal cases, the application for an interception of a wire or oral communication order must be approved by the

A) attorney general or a specific designee
B) principle prosecuting officer
C) federal district judge
D) state appeals court judge
E) state criminal court judge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
An order to intercept a wire or oral communication may not remain in effect longer than is necessary to achieve its objectives or for a maximum of _____ days.

A) 10
B) 20
C) 30
D) 60
E) 90
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
According to the authors, conducting surveillance is generally expensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
A loose surveillance is considered to be a cautious surveillance because the loss of the subject is preferred to possible exposure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Surveillance can only be conducted from a stationary position.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Technical surveillance involves the use of electronic and visual enhancement devices to view or overhear suspects in the conduct of their daily affairs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
According to the authors, when considering the use of wiretaps, it is not particularly important for a federal investigator to ascertain the legal status of the practice in the jurisdiction involved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
The pen register neither overhears conversations nor indicates whether a call was completed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Law enforcement officials claim that the beeper facilitates surveillance by substituting for the human eye and reducing the danger of detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
In large-scale investigations, surveillance is normally conducted by only one member of the investigative team to prevent detection by the subject.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
During a loose surveillance, the surveillance exercises great caution while observing the subject, preferring to drop the tail rather than risk detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
According to the authors, the success of a surveillance is not necessarily contingent upon the degree of forethought and thoroughness given to the preliminary preparations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.