Criminal Investigation 11Th Ed by Charles Swanson – Test Bank
7
Student: ___________________________________________________________________________
1. Which of the following is not part of the investigative solvability factors as discussed in your text?
A. Is the suspect named?
B. Can the suspect be identified?
C. Is there significant physical evidence?
D. Is there a detailed admission about the suspect?
2. Questions that must be answered by an investigative supervisor in determining whether or not to move
forward on an investigation are referred to as
A. clearance factors.
B. solvability factors.
C. solution factors.
D. ration factors.
3. Some steps in the follow-up investigation include
A. creation of a case file
B. review the incident and any supplemental reports
C. meeting with the chief to determine the best course of investigation
D. A and B only
4. The NCIC contains many database files for use by police. Which of the following is not one of the
database files available from NCIC?
A. Unlocated suspect file.
B. Wanted person file.
C. Stolen boat file.
D. Terrorist file.
5. One source of case information that reveals personal information about the suspect, including his or her
current aliases and health condition is the
A. crime lab reports.
B. traffic reports.
C. incident reports.
D. jail booking reports.
6. Which statement about conducting a lineup is most accurate?
A. The clothing worn by persons in the lineup should be dissimilar.
B. The witness should be given the opportunity to see the defendant prior to the lineup.
C. Include only one suspect in each identification procedure.
D. There should be at least three persons in the lineup including the suspect.
7. With regard to guidelines for photo and live lineups, to the extent possible, which of the following should
not be present?
A. Prosecutor.
B. Patrol officer.
C. Latent investigator.
D. Assigned investigator.
8. Establishing the existence of a violation, obtaining probable cause for a search warrant and preventing
crime are all considered effective uses of
A. an informant.
B. grid maps.
C. crime analysis.
D. surveillance.
9. Which of the following is not correct as it relates to informants?
A. Informants often expect pay or consideration on pending charges against them.
B. Investigators should not accept gifts or other gratuities from an informant.
C. Investigators do need special permission when using juveniles as informants.
D. Investigators should never keep records on their informants.
10. Which statement about security cameras and facial recognition software programs is most accurate?
A. There are not many cameras that can be used.
B. The programs uses mathematical calculations to compare known and unknown photos.
C. Law enforcement agencies are not utilizing this technology.
D. This technology has only been around since 9/11/01.
11. Which of the following is not one of the categories of intelligence as listed in the textbook?
A. Indicative intelligence.
B. Tactical intelligence.
C. Preemptive intelligence.
D. Evidential intelligence.
12. The intelligence/analytical cycle is driven by
A. community needs.
B. end-user needs.
C. the mayor’s needs.
D. the system’s needs.
13. Which step in the intelligence/analytical cycle refers to the gathering and managing of raw data?
A. Scanning.
B. Implementing.
C. Planning.
D. Collection.
14. Which step in the intelligence/analytical cycle does feedback have to be obtained regarding the value of
the intelligence?
A. Planning.
B. Response.
C. Reevaluation.
D. Analysis.
15. The process of using systematic analytical methods to acquire timely information of crime patterns and
trend correlations is
A. tactical analysis.
B. service analysis.
C. crime intelligence.
D. crime analysis.
16. The same type of crime being committed over a short period of time, probably by the same offender, is
referred to as a
A. crime series.
B. crime spree.
C. crime pattern.
D. crime hot spot.
17. The police have noted that a single bar where underage drinkers are served is also the location of
numerous fights. In crime analysis terms this would be considered
A. a spree.
B. a pattern.
C. a hot spot.
D. a trend.
18. One method by which crime analysts can disseminate information is through
A. reward programs.
B. crime stopper signs.
C. staff briefings.
D. mug-shots.
19. A useful techniques for analyzing crime data, that displays events in rough chronological order, is a
A. place-time chart.
B. time-event chart.
C. crime-pattern chart.
D. crime-location chart.
20. The process of studying all the available information on a crime and developing a psychological profile
of the offender is called
A. sketching.
B. crime modeling.
C. character analysis.
D. criminal profiling.
21. The police have been quick to use the internet for
A. investigative purposes
B. public information purposes
C. administrative purposes
D. All of the above are police uses of the internet
22. Which of the following are steps in the scientific method?
A. State the problem
B. Gather relevant data
C. Form a hypothesis
D. All of the above are steps in the scientific method
23. Geographic profiling is an investigative strategy that uses locations of a series of crimes to determine the
most probable area of
A. the next robbery.
B. the most likely escape route.
C. the location of gangs.
D. the offender’s residence.
24. “Cold” cases are unsolved cases that become inactive because
A. there are no more leads to follow
B. witnesses were very cooperative
C. evidence was properly maintained
D. None of the above are reasons
25. Law Enforcement Online (LEO) is a secure intranet system created and maintained as a tool for
communicating, obtaining mission-critical information, providing or participating in online educational
programs, and participating in professional interest or topically focused dialogs. Which agency is
responsible for maintaining LEO?
A. Department of Justice.
B. Drug Enforcement Agency.
C. Federal Bureau of Investigation.
D. Department of Homeland Security.
26. “The follow-up investigation process,” identifies various types of sources of information and their
importance, includes such topics as the incident and supplemental reports, working leads, neighborhood
and vehicle canvasses, reinterviewing victims and witnesses, jail booking reports, and the use of
databases.
True False
27. When a name is written in an incident report, it means that the person committed the crime or had some
involvement in the crime such as aiding and abetting.
True False
28. The neighborhood canvass is used to find other potential witnesses.
True False
29. Although many federal agencies maintain databases to serve their own agents, as well as state and local
law enforcement officers, the National Crime Information Center (NCIC) provides access to the most
comprehensive set of databases.
True False
30. A supplemental report is filled out when patrolling officers identify persons or vehicles that are
suspicious to them but are not connected with any particular offense.
True False
31. Participants in live lineups may appear sequentially or may all appear simultaneously.
True False
32. Whereas surveillance is thought of as “following,” it actually means the continued observance, both overt
and convert, of people, places and things to obtain information of investigative significance.
True False
33. Following 9/11, it was widely concluded that if isolated parcels of information known about the terrorists
and their activities before the attacks had been pooled, then the attacks may have been disrupted,
mitigated, or prevented. As part of the overall response, fusion centers were established and all agencies
were to send their information so the federal agents could evaluate it and provide summaries back to the
state and local agencies.
True False
34. Evidential intelligence, which is gathered and analyzed over time usually confirms new or newly
discovered patterns of criminal activity.
True False
35. Remote sensing involves a officer being at the event to record what happens.
True False
36. General tendencies in the occurrence of crime across large geographic areas over extended periods of
crime are referred to as _______.
________________________________________
37. A ________ is either an individually known offender who is responsible for a large number of crimes or
one victim who reports a large number of crimes.
________________________________________
38. __________ are areas where many incidents occur.
________________________________________
39. _______________ are a category of websites that contain personal profiles and that may offer dating or
other such services that are sometimes useful to police investigations.
________________________________________
40. ________ is an investigative strategy that used the locations of a series of crimes to determine the most
probable area of the offender’s residence.
________________________________________
41. _________________ provide information that is of investigative significance. They may expect to be
paid or to receive consideration on charges pending against them.
________________________________________
42. Operated by the FBI, the National Center for the Analysis of Violent Crime (NCAVC) is organized in
to three components: the Behavioral Analysis Unit; the child Abduction and Serial Murder Investigative
Resources Center; and the _______.
________________________________________
43. _________ are elements of information that have been demonstrated to correlate with higher probabilities
of investigative success.
________________________________________
44. _________________ are filled out when patrolling officers identify persons or vehicles that are
suspicious to them but are not connected with any particular offense.
________________________________________
45. ________ is a secure intranet system created and maintained by the FBI as a tool for communicating,
obtaining mission-critical information, providing or participating in online educational programs, and
participating in professional-interest or topically focused dialogs.
________________________________________
46. Incident reports are screened to determine the presence or absence of solvability factors. Identify at least
nine of these factors.
47. Discuss the photo lineup process.
48. Identify five database files included in NCIC.
49. Why should we check the booking reports of jailed suspects?
50. Name seven things that should be in a surveillance kit.
51. Identify three reasons why there must be periodic evaluations about whether to continue or terminate a
surveillance operation?
52. Briefly discuss the steps in the intelligence/analytical cycle.
53. What are sprees, hot spots, and crimogens?
54. Why are computerized link analyses particularly valuable?
55. State five ways that the Internet can be helpful to investigators.
7 Key
1.
(p. 171-
172)
Which of the following is not part of the investigative solvability factors as discussed in your text?
A. Is the suspect named?
B. Can the suspect be identified?
C. Is there significant physical evidence?
D. Is there a detailed admission about the suspect?
Swanson – Chapter 07 #1
2.
(p. 171)
Questions that must be answered by an investigative supervisor in determining whether or not to move
forward on an investigation are referred to as
A. clearance factors.
B. solvability factors.
C. solution factors.
D. ration factors.
Swanson – Chapter 07 #2
3.
(p. 172-
174)
Some steps in the follow-up investigation include
A. creation of a case file
B. review the incident and any supplemental reports
C. meeting with the chief to determine the best course of investigation
D. A and B only
Swanson – Chapter 07 #3
4.
(p. 178-
180)
The NCIC contains many database files for use by police. Which of the following is not one of the
database files available from NCIC?
A. Unlocated suspect file.
B. Wanted person file.
C. Stolen boat file.
D. Terrorist file.
Swanson – Chapter 07 #4
5.
(p. 175)
One source of case information that reveals personal information about the suspect, including his or
her current aliases and health condition is the
A. crime lab reports.
B. traffic reports.
C. incident reports.
D. jail booking reports.
Swanson – Chapter 07 #5
6.
(p. 184-
186)
Which statement about conducting a lineup is most accurate?
A. The clothing worn by persons in the lineup should be dissimilar.
B. The witness should be given the opportunity to see the defendant prior to the lineup.
C. Include only one suspect in each identification procedure.
D. There should be at least three persons in the lineup including the suspect.
Swanson – Chapter 07 #6
7.
(p. 184)
With regard to guidelines for photo and live lineups, to the extent possible, which of the following
should not be present?
A. Prosecutor.
B. Patrol officer.
C. Latent investigator.
D. Assigned investigator.
Swanson – Chapter 07 #7
8.
(p. 182)
Establishing the existence of a violation, obtaining probable cause for a search warrant and preventing
crime are all considered effective uses of
A. an informant.
B. grid maps.
C. crime analysis.
D. surveillance.
Swanson – Chapter 07 #8
9.
(p. 181-
182)
Which of the following is not correct as it relates to informants?
A. Informants often expect pay or consideration on pending charges against them.
B. Investigators should not accept gifts or other gratuities from an informant.
C. Investigators do need special permission when using juveniles as informants.
D. Investigators should never keep records on their informants.
Swanson – Chapter 07 #9
10.
(p. 193-
194)
Which statement about security cameras and facial recognition software programs is most accurate?
A. There are not many cameras that can be used.
B. The programs uses mathematical calculations to compare known and unknown photos.
C. Law enforcement agencies are not utilizing this technology.
D. This technology has only been around since 9/11/01.
Swanson – Chapter 07 #10
11.
(p. 191)
Which of the following is not one of the categories of intelligence as listed in the textbook?
A. Indicative intelligence.
B. Tactical intelligence.
C. Preemptive intelligence.
D. Evidential intelligence.
Swanson – Chapter 07 #11
12.
(p. 191)
The intelligence/analytical cycle is driven by
A. community needs.
B. end-user needs.
C. the mayor’s needs.
D. the system’s needs.
Swanson – Chapter 07 #12
13.
(p. 192-
193)
Which step in the intelligence/analytical cycle refers to the gathering and managing of raw data?
A. Scanning.
B. Implementing.
C. Planning.
D. Collection.
Swanson – Chapter 07 #13
14.
(p. 193)
Which step in the intelligence/analytical cycle does feedback have to be obtained regarding the value
of the intelligence?
A. Planning.
B. Response.
C. Reevaluation.
D. Analysis.
Swanson – Chapter 07 #14
15.
(p. 194)
The process of using systematic analytical methods to acquire timely information of crime patterns
and trend correlations is
A. tactical analysis.
B. service analysis.
C. crime intelligence.
D. crime analysis.
Swanson – Chapter 07 #15
16.
(p. 194)
The same type of crime being committed over a short period of time, probably by the same offender,
is referred to as a
A. crime series.
B. crime spree.
C. crime pattern.
D. crime hot spot.
Swanson – Chapter 07 #16
17.
(p. 195)
The police have noted that a single bar where underage drinkers are served is also the location of
numerous fights. In crime analysis terms this would be considered
A. a spree.
B. a pattern.
C. a hot spot.
D. a trend.
Swanson – Chapter 07 #17
18.
(p. 195)
One method by which crime analysts can disseminate information is through
A. reward programs.
B. crime stopper signs.
C. staff briefings.
D. mug-shots.
Swanson – Chapter 07 #18
19.
(p. 201-
202)
A useful techniques for analyzing crime data, that displays events in rough chronological order, is
a
A. place-time chart.
B. time-event chart.
C. crime-pattern chart.
D. crime-location chart.
Swanson – Chapter 07 #19
20.
(p. 198)
The process of studying all the available information on a crime and developing a psychological
profile of the offender is called
A. sketching.
B. crime modeling.
C. character analysis.
D. criminal profiling.
Swanson – Chapter 07 #20
21.
(p. 202)
The police have been quick to use the internet for
A. investigative purposes
B. public information purposes
C. administrative purposes
D. All of the above are police uses of the internet
Swanson – Chapter 07 #21
22.
(p. 196)
Which of the following are steps in the scientific method?
A. State the problem
B. Gather relevant data
C. Form a hypothesis
D. All of the above are steps in the scientific method
Swanson – Chapter 07 #22
23.
(p. 200)
Geographic profiling is an investigative strategy that uses locations of a series of crimes to determine
the most probable area of
A. the next robbery.
B. the most likely escape route.
C. the location of gangs.
D. the offender’s residence.
Swanson – Chapter 07 #23
24.
(p. 190)
“Cold” cases are unsolved cases that become inactive because
A. there are no more leads to follow
B. witnesses were very cooperative
C. evidence was properly maintained
D. None of the above are reasons
Swanson – Chapter 07 #24
25.
(p. 180)
Law Enforcement Online (LEO) is a secure intranet system created and maintained as a tool
for communicating, obtaining mission-critical information, providing or participating in online
educational programs, and participating in professional interest or topically focused dialogs. Which
agency is responsible for maintaining LEO?
A. Department of Justice.
B. Drug Enforcement Agency.
C. Federal Bureau of Investigation.
D. Department of Homeland Security.
Swanson – Chapter 07 #25
26.
(p. 172-
174)
“The follow-up investigation process,” identifies various types of sources of information and
their importance, includes such topics as the incident and supplemental reports, working leads,
neighborhood and vehicle canvasses, reinterviewing victims and witnesses, jail booking reports, and
the use of databases.
TRUE
Swanson – Chapter 07 #26
27.
(p. 177)
When a name is written in an incident report, it means that the person committed the crime or had
some involvement in the crime such as aiding and abetting.
FALSE
Swanson – Chapter 07 #27
28.
(p. 173)
The neighborhood canvass is used to find other potential witnesses.
TRUE
Swanson – Chapter 07 #28
29.
(p. 178)
Although many federal agencies maintain databases to serve their own agents, as well as state and
local law enforcement officers, the National Crime Information Center (NCIC) provides access to the
most comprehensive set of databases.
TRUE
Swanson – Chapter 07 #29
30.
(p. 174-
175)
A supplemental report is filled out when patrolling officers identify persons or vehicles that are
suspicious to them but are not connected with any particular offense.
FALSE
Swanson – Chapter 07 #30
31.
(p. 186)
Participants in live lineups may appear sequentially or may all appear simultaneously.
TRUE
Swanson – Chapter 07 #31
32.
(p. 182)
Whereas surveillance is thought of as “following,” it actually means the continued observance, both
overt and convert, of people, places and things to obtain information of investigative significance.
TRUE
Swanson – Chapter 07 #32
33.
(p. 191)
Following 9/11, it was widely concluded that if isolated parcels of information known about the
terrorists and their activities before the attacks had been pooled, then the attacks may have been
disrupted, mitigated, or prevented. As part of the overall response, fusion centers were established
and all agencies were to send their information so the federal agents could evaluate it and provide
summaries back to the state and local agencies.
FALSE
Swanson – Chapter 07 #33
34.
(p. 191)
Evidential intelligence, which is gathered and analyzed over time usually confirms new or newly
discovered patterns of criminal activity.
FALSE
Swanson – Chapter 07 #34
35.
(p. 200)
Remote sensing involves a officer being at the event to record what happens.
FALSE
Swanson – Chapter 07 #35
36.
(p. 194)
General tendencies in the occurrence of crime across large geographic areas over extended periods of
crime are referred to as _______.
trends
Swanson – Chapter 07 #36
37.
(p. 195)
A ________ is either an individually known offender who is responsible for a large number of crimes
or one victim who reports a large number of crimes.
crimogen
Swanson – Chapter 07 #37
38.
(p. 195)
__________ are areas where many incidents occur.
Hot spots
Swanson – Chapter 07 #38
39.
(p. 181)
_______________ are a category of websites that contain personal profiles and that may offer dating
or other such services that are sometimes useful to police investigations.
Social networking sites (SNS)
Swanson – Chapter 07 #39
40.
(p. 200)
________ is an investigative strategy that used the locations of a series of crimes to determine the
most probable area of the offender’s residence.
Geographic profiling
Swanson – Chapter 07 #40
41.
(p. 181)
_________________ provide information that is of investigative significance. They may expect to be
paid or to receive consideration on charges pending against them.
Informants
Swanson – Chapter 07 #41
42.
(p. 180)
Operated by the FBI, the National Center for the Analysis of Violent Crime (NCAVC) is organized
in to three components: the Behavioral Analysis Unit; the child Abduction and Serial Murder
Investigative Resources Center; and the _______.
Violent Criminal Apprehension Program (ViCAP)
Swanson – Chapter 07 #42
43.
(p. 171)
_________ are elements of information that have been demonstrated to correlate with higher
probabilities of investigative success.
Solvability factors
Swanson – Chapter 07 #43
44.
(p. 175)
_________________ are filled out when patrolling officers identify persons or vehicles that are
suspicious to them but are not connected with any particular offense.
Field Interview/Information Report (FIR)
Swanson – Chapter 07 #44
45.
(p. 180)
________ is a secure intranet system created and maintained by the FBI as a tool for communicating,
obtaining mission-critical information, providing or participating in online educational programs, and
participating in professional-interest or topically focused dialogs.
Law Enforcement Online (LEO)
Swanson – Chapter 07 #45
46.
(p. 204-
205)
Incident reports are screened to determine the presence or absence of solvability factors. Identify at
least nine of these factors.
• Is the suspect named?
• Can the suspect be identified?
• Is there a detailed description of the suspect?
• Is there significant physical evidence?
• Are other suspects named, identified, or described in detail?
• If a vehicle is involved, is there a license number or detailed description?
• Does the crime fit an established modus operandi or method of operation?
• Were deadly weapons displayed or used?
• To what extent was the victim physically harmed?
• What similarity is there to recently reported crimes?
• Will the victim be able to identify the suspect?
• Was traceable property taken?
• Are there witnesses?
• Does the nature of the crime (e.g., theft of explosives necessitate a follow-up?
• Can a composite sketch of the suspect(s) be prepared?
Swanson – Chapter 07 #46
47.
(p. 184-
186)
Discuss the photo lineup process.
As a minimum, a photo lineup consists of six photographs—one of the suspect and at least
five “fillers.” Fillers are photographs of the same quality, size, shape, and type (black and white
or color) of individuals who are similar in appearance—for example, sex, age, skin and hair color,
facial hair, height, build, and other characteristics. 15 Although software may be able to make the
background and lightening of photos similar, witness should be told not to attach any weight or
significance to such peripheral differences. The photos are placed in the same position—for instance,
middle of the page, in separate identical file folders that are numbered on the back for recording
keeping purposes and shuffled. The files are also shuffled before each new witness looks at them.
The Innocence Project recommends having four blank files so the administrator doesn’t know what
the next file to be opened contains. If there are several witnesses, each is led separately through the
process by the administrator. If there are multiple suspects, a separate photo lineup must be prepared
for each suspect using different fillers; only one suspect can be in any single line up. If witnesses
cannot be scheduled so they can be processed contemporaneously, without the opportunity for
any personal contact with one another, a new photo lineup for each suspect must be prepared with
different fillers for later witnesses. Even if a witness makes an identification, he/she should be guided
to carefully consider any remaining photos. If a witness wants a second chance to view a photo lineup,
wait at least 48 hours and then use another picture of the suspect wearing different clothes. If the
posture of all the suspect and fillers is not standard, the suspect’s picture should reflect him/her in a
different posture. All new fillers must also be used.
Reviews
There are no reviews yet.