You are on page 1of 5

CHAPTER 9

SOURCES OF INFORMATION AND MISSING PERSONS

QUESTIONS

1. The term ________is used to describe all of the 7. With a mail cover in place, the post office will:
procedures used in consulting the various sources of
information in the search for persons. a. open the subject’s mail if it looks suspicious.
b. open the subject’s mail if it is requested by the
a. intelligence c. interrogation investigator.
b. tracking d. surveillance c. not open the subject’s mail, but will record the return
address and postmarks.
2. Because detectives have ready access to personal d. forward the subject’s mail to the investigator.
interviews, they often have a tendency to rely on them
exclusively and neglect to: 8. A mail cover is usually placed on mail by the post
office for a period of about:
a. telephone or visit the home.
b. contact their confidential informants. a. one year. c. two to four weeks.
c. conduct a research type of investigation. b. two to four months. d. two to four days.
d. canvass the neighborhood.
9. In a criss-cross or reverse directory, telephone
3. An important preliminary step in searching for people subscribers are listed according to their:
is to obtain the information necessary to:
a. first name. c. business address.
a. interrogate them successfully. b. last name. d. street address.
b. establish a mail cover.
c. locate their associates. 10. By looking up the address of the missing person in a
d. identify them beyond question. criss-cross directory or database, the investigator can
quickly compile a list of the names, addresses, and
4. The first action the investigator should take in telephone numbers of all of his:
locating missing or wanted persons is to:
a. relatives. c. friends.
a. telephone their home. c. setup a mail cover. b. neighbors. d. family.
b. visit their home. d. contact their relatives.
11. A pen register is a device that is attached to the
5. When inquiring about missing or wanted persons at telephone line which records:
their homes, it is particularly important to obtain
information concerning their: a. the phone numbers dialed.
b. the phone numbers of the calls received.
a. health. c. habits. c. both the phone numbers dialed and those of the calls
b. state of mind. d. occupation. received.
d. the phone numbers of long distance calls received.
6. By requesting the post office to maintain a mail
cover, the investigator will be able to keep track of the 12. The Federal Bureau of Investigation maintains all of
subject’s: the following sources of information except the:

a. incoming mail. c. incoming and outgoing mail. a. National Crime Information Center.
b. outgoing mail. d. package deliveries. b. National Firearms Tracing Center.
c. Fingerprint and Criminal Identification Files.
d. Known Professional Check Passers File. 19. MO files are maintained for all of the following
reasons except:
13. The National Crime Information Center exchanges
information with ________law enforcement agencies. a. to associate a group of crimes with a single
perpetrator.
a. only federal c. only state b. to predict a possible next target for a criminal.
b. federal and state d. federal, state, and local c. to understand why the criminal commits his crime.
d. to recognize a perpetrator from characteristics of his
14. A ________ is the name given to a computerized file criminal activity.
of instantly available information which can be rapidly
transmitted. 20. The MO file is most effective in crimes involving
personal contact between the criminal and the victim.
a. computer memory c. storage and retrieval system Therefore, it should be least effective against:
b. data bank d. personnel record
a. robbery. c. confidence games.
15. High-speed data retrieval systems are seen as a b. burglary. d. forgery.
threat to an individual’s right to:
21. All of the following were significant elements in the
a. security. c. prosperity. MO file arrangement devised by Atcherly except the:
b. privacy. d. an education.
a. nature of the stolen property in crimes involving
16. All of the following proposals can help provide larceny.
safeguards for the privacy of the individual except: b. verbal description of the criminal.
c. fingerprint and blood evidence from the crime scene.
a. Each person should be given access to his personal d. personal mannerisms and speech characteristics.
file to check for accuracy.
b. Notice should be given to an individual for any 22. A description of the personality and behavioral traits
request for personal information from his file. of a perpetrator (derived from a study of the behavioral
c. Personal data systems whose very existence is secret traits of other criminals who have committed the same
should be maintained. offense and the details of the crime scene) is called:
d. Data collected for one purpose should not be made
available for other purposes. a. the modus operandi. c. the portrait parle’.
b. artificial intelligence. d. the criminal profile.
17. Computer technology can facilitate on-the-street
investigation by quickly delivering information so that 23. The details of the crimes that are considered in
the investigator has: criminal profiling are primarily those that express:
a. personal information about a suspect.
b. an understanding of a suspect’s motivation. a. the attitude of the victim.
c. a legal basis for the apprehension of a suspect. b. the greed of the perpetrator.
d. a list of possible criminal activities of a suspect. c. the lack of concern for the law.
d. the personality of the perpetrator.
18. A summary of the habits, techniques, and
peculiarities of behavior of a criminal is often referred
to as:

a. the modus operandi. c. the criminal profile.


b. the physical description. d. portrait parle’.
24. Crimes that lend themselves to profiling are those in 30. A BOLO is a(an):
which there is extensive contact by the perpetrator with
the crime scene and the victim, and those in which the a. information alert c. wire tap
act itself indicates: b. computer program d. informant

a. a lack of concern for the victim. 31. A pen register records:


b. a psychological disorder.
c. that the perpetrator is violent. a. telephone conversations.
d. a long history of criminal behavior. b. mailing addresses
c. handwriting samples.
25. All of the following criminal activities might be d. numbers dialed from a phone.
suitable for personality profiling except:
32. The content of threatening communications is best
a. sexual homicide. c. contract killings. profiled through:
b. pyromania. d. mutilation.
a. IAFIS. b. psycholinguistic analysis.
26. Of the following criminal activities, which one is c. NCIC. d. crime scene profiling.
most likely to be suit able for profiling the perpetrator?
33. Criminals with organized personalities are likely to
a. assault c. loan sharking be:
b. robbery d. torture
a. socially competent.
27. The personality profiling through the analysis of the b. below average in intelligence.
messages from anonymous letter writers and c. high in birth order status.
threatening telephone callers is called d. living with a partner.
________analysis.
34. IAFIS is:
a. psycholinguistic c. letter pattern
b. psychological d. message pattern a. a national clearinghouse of criminal and civil print
cards.
28. When profiling an anonymous letter writer, the b. the largest biometric database in the world.
investigator is least concerned with: c. a fingerprint database of criminal, military, civilian,
aliens, and others.
a. the word usage and linguistic patterns. d. all of the above.
b. the actual message being communicated.
c. the personality and background of the author. 35. Signature behavior:
d. the frame of mind of the author.
a. varies greatly among crimes of the same individual.
29. After analyzing the crime scene of a sexual homicide b. is more consistent than MO behavior.
and finding it “dis organized,” the investigator would c. is consistent only for organized personalities.
conclude that the perpetrator would probably display d. is less consistent for organized personalities.
many of the personality characteristics of
________murderers. 36. Crime analysis:

a. organized c. either organized or disorganized a. can decipher massive amounts of data and reveal
b. disorganized d. both organized and disorganized patterns and trends.
b. is rarely cost effective.
c. is less effective than MO analysis.
d. is evolving into the more advance science of
anthropometry. 43. Dead persons whose true identities are unknown
37. An offender or victim associate with an unusual and whose friends and relatives cannot be located are
amount of crime is called a: called:

a. hot dot b. hot spot a. unidentified dead. c. unidentified persons.


c. hot product d. hot lead b. unknown dead. d. missing persons.

(ha? Ha? Hakdogg XD hahahaha) 44. A patient suffering from Alzheimer’s disease who
requires police attention, does not know who he is or
38. Approximately ________ of homicide cases will where he lives, and has not been reported missing may
remain unsolved after the first year. be classified as:

a. 1/10 b. 1/3 a. a missing person. c. an unidentified person.


c. 1/2 d. 3/4 b. an unknown person. d. an amnesiac.

39. The Missing Persons Unit is concerned with all of the 45. Suicides are ordinarily motivated by:
following classes of persons except:
a. financial difficulties. c. the desire for change.
a. missing persons eighteen years of age or under. b. boredom. d. a disappointment in love.
b. missing persons over eighteen years of age in full
possession of their faculties. 46. In solving disappearance cases, the investigator
c. unidentified persons. should primarily be concerned with:
d. unidentified dead.
a. discovering possible motives.
40. A person who is sought by the police in connection b. checking out alibis.
with a crime is: c. establishing a corpus delicti.
d. collecting physical evidence.
a. a convict. c. a wanted person.
b. a missing person. d. an unidentified person. 47. A common motive for simulating suicide is:

41. A Missing Persons Unit will be involved in cases a. to evoke sympathy.


where an individual over eighteen years old has b. to evade apprehension.
disappeared and: c. to inflict psychological revenge.
d. to defraud insurance companies.
a. has a tendency to commit crimes.
b. has no close relatives. 48. In simulated suicide cases, it is necessary for the
c. is affected by a serious mental or physical condition. perpetrator to leave clothes for identification in a
d. travels across the country. situation where the absence of a body is plausible. The
preferred method involves:
42. A Missing Persons Unit will be involved in cases
where the circumstances of an adult’s absence a. swimming in the ocean. c. arson.
indicates: b. an accidental explosion. d. hiring a hit man.

a. that he committed a crime. 49. ________ account for a large percentage of


b. that he involuntarily disappeared. disappearances.
c. that he voluntarily disappeared.
d. that he unexpectedly changed jobs. a. Homicides c. Unhappy marriages
b. Suicides d. Simulated suicides
50. The voluntary disappearance of a married adult is
ordinarily not in itself a crime. It can become so if it
involves:

a. abandoning one’s property.


b. not notifying the Motor Vehicle Bureau.
c abandoning a pregnant wife in destitute
circumstances.
d. lying to one’s spouse.

51. When a dead body is recovered, the primary focus


of police attention is on:

a. interrogating the one who found the body.


b. identifying the body.
c. preserving the body.
d. determining the exact time of death.

52. The following are true statements concerning


missing persons except:

a. There are no reliable statistics on missing persons.


b. There are no official sources of information about
missing persons who have changed their name.
c. The FBI does not conduct searches for missing
persons.
d. It is practically impossible to disappear in today’s
society.

You might also like