You are on page 1of 23

Criminal Investigation 11th Edition by Hess

Orthmann Cho ISBN 9781285862613


Download solution manual at:
https://testbankpack.com/p/solution-manual-for-criminal-
investigation-11th-edition-by-hess-orthmann-cho-isbn-
9781285862613/

Download full test bank at :


https://testbankpack.com/p/test-bank-for-criminal-
investigation-11th-edition-by-hess-orthmann-cho-isbn-
9781285862613/

1. Field or show-up identification is on-the-scene identification of a suspect by a victim or witness of a crime. The
show-up must be:
a. close in time to the incident.
b. close in location to the incident.
c. based on a warrant.
d. in conjunction with an attorney’s consent.

ANSWER: a
POINTS: 1
REFERENCES: Identifying Suspects at the Scene
LEARNING OBJECTIVES: CRIM.HESS.17.07.01 - Explain what field identification is, when it is used, and the
rights a suspect has during such an event.
KEYWORDS: Bloom’s: Remember

2. A field identification is also called a:


a. show-up.
b. follow-up.
c. shake-down.
d. hot stops.

ANSWER: a
POINTS: 1
REFERENCES: Identifying Suspects at the Scene
LEARNING OBJECTIVES: CRIM.HESS.17.07.01 - Explain what field identification is, when it is used, and the
rights a suspect has during such an event.
KEYWORDS: Bloom’s: Remember

3. Which method is used to identify suspects?


Cengage Learning Testing, Powered by Cognero Page 1
a. field or show-up identification
b. family empathy
c. pretextual traffic stops
d. hearsay evidence

ANSWER: a
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 2


4. In Whren v. United States (1996), the Supreme Court affirmed that officers could stop vehicles to allay any
suspicions even though they have no evidence of criminal behavior. This type of stop is referred to as a:
a. pretextual stop.
b. silver platter stop.
c. Terry stop.
d. racial profiling stop.

ANSWER: a
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

5. Which of the following can be created using Identi-Kit?


a. composite drawings and sketches
b. physical evidence left at the crime scene
c. information in police files
d. booking photos

ANSWER: a
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

6. Psychological profiling:
a. can help eliminate and develop suspects.
b. is used only in conjunction with a psychic.
c. is 95 percent accurate in all cases.
d. is no longer used in police work.

ANSWER: a
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 3


7. In the DEA smuggling case, United States v. Weaver (1992), what did the Court rule?
a. Race can be considered among other factors to use in developing suspects.
b. Only agents of the same race as a suspect can work undercover to avoid racism charges.
c. Race can never be used as a factor in developing suspects.
d. Racial profiling is always illegal.

ANSWER: a
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

8. Live lineups generally contain:


a. two to four individuals.
b. four to six individuals.
c. 6 to 10 individuals.
d. 5 to 10 individuals.

ANSWER: c
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Remember

9. In United States v. Wade, the Court said that a suspect must be informed of his or her right to have a lawyer
present during what type of process?
a. booking
b. Terry stops
c. invasive searches
d. lineups

ANSWER: d
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 4


10. The objective of surveillance is to:
a. obtain information that can be used to solve narcotics-related crimes.
b. obtain information about people, their associates, and their activities that may help solve a criminal case or
protect a witness.
c. obtain information about anyone or anything.
d. punish the offenders.

ANSWER: b
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

11. Wiretaps are legal when there is probable cause and they are:
a. ordered by the chief of police or sheriff.
b. authorized by the district attorney.
c. reviewed by a grand jury.
d. authorized by a court.

ANSWER: d
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

12. In United States v. Knotts (1983), the Court ruled that installing and monitoring a bird dog tracking device in a public
location:
a. violates a suspect’s rights.
b. is illegal.
c. does not violate a suspect’s rights.
d. is inadmissible.

ANSWER: c
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 5


13. Florida v. Riley (1989) approved the warrantless aerial surveillance, noting that:
a. there had to be at least 10,000 feet between the police airplane and the suspects.
b. there should be no reasonable expectation of privacy from the skies above.
c. this was a test case and was only approved once.
d. it must be in conjunction with a simultaneous ground-level surveillance.

ANSWER: b
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

14. Making a legal arrest, gaining information for warrants, or even preventing crime can all be the result of:
a. criminal profiling.
b. surveillance.
c. entrapment.
d. pretextual traffic stops.

ANSWER: b
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

15. Surveillance, undercover assignments, and raids are used only when:
a. the case is important.
b. the case is a felony.
c. normal methods of continuing the investigation fail to produce results.
d. terrorist activity or drug traffic is suspected.

ANSWER: c
POINTS: 1
REFERENCES: Surveillance, Undercover Assignments, and Raids: The Last Resort
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 6


16. What is one precaution specifically for an undercover agent to keep in mind?
a. Write notes that the subject can read.
b. Carry personal identification in case you need to make an arrest.
c. Ensure that communication with headquarters is covert.
d. Use drugs and alcohol to get in with the gang.

ANSWER: c
POINTS: 1
REFERENCES: Undercover Assignments
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Remember

17. What must be established before an arrest can be made?


a. occurrence of a crime
b. finding of a victim
c. probable cause
d. notification of suspect’s lawyer

ANSWER: c
POINTS: 1
REFERENCES: Legal Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.07 - List the circumstances under which police officers are
authorized to make an arrest.
KEYWORDS: Bloom’s: Remember

18. The requirement of providing counsel to a suspect in a lineup that occurs after indictment or arraignment is known as
the:
a. Miranda rule.
b. Wade-Gilbert rule.
c. exclusionary rule.
d. “fruits of the poisoned tree” rule.

ANSWER: b
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.08 - Identify the elements that constitute an arrest having been
made.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 7


19. On a linear use-of-force continuum, where do “hard empty hand techniques/impact weapon” fall in relation to the
use of a TASER or chemical agent?
a. They fall to the left (i.e., they are less forceful).
b. They fall to the right (i.e., they are more forceful).
c. They are equivalent.
d. They are not on the same use-of-force continuum.

ANSWER: b
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

20. When a person suddenly dies in police custody, it is often called:


a. excited delirium.
b. use of deadly force.
c. de facto arrest.
d. nightcap provision.

ANSWER: a
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

21. Which 2007 case established the use of “ramming” in pursuit as a use-of-force doctrine that the police use today?
a. Mapp v. Ohio
b. Kim Wong Ark v. United States
c. Scott v. Harris
d. United States v. Weeks

ANSWER: c
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 8


22. Which of the following are considered “nonlethal” weapons?
a. narcotics
b. handgun
c. impact weapons
d. ramming maneuver

ANSWER: c
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

23. Force necessary to overcome resistance offered during an arrest is referred to as:
a. extraneous force.
b. reasonable force.
c. the Blue Hammer.
d. extralegal force.

ANSWER: b
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

24. Which 1985 court case eliminated the “fleeing­felon rule,” banning law enforcement officers from shooting to kill a
fleeing felon unless an imminent danger to life exists?
a. Argersinger v. Hamlin
b. Brown v. Mississippi
c. Terry v. Ohio
d. Tennessee v. Garner

ANSWER: d
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 9


25. In Saucier v. Katz (2001), the Supreme Court held that the guide for use of excessive force is that the:
a. officer fears for his or her safety.
b. force is objectively reasonable under Fourth Amendment excessive force analysis.
c. suspect is armed.
d. suspect presents a dangerous risk to the public.

ANSWER: b
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

26. The amount of time it takes to identify a suspect is directly correlated to the length of time it takes to solve a crime.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Identifying Suspects at the Scene
LEARNING OBJECTIVES: CRIM.HESS.17.07.01 - Explain what field identification is, when it is used, and the
rights a suspect has during such an event.
KEYWORDS: Bloom’s: Remember

27. Because race is part of a suspect’s general description, racial profiling has been upheld by the courts as legal and
constitutional.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

28. Investigators should keep in mind that eyewitness identification is highly infallible.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 10


29. A suspect has the right to a lawyer if a photographic lineup is used.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Remember

30. In Schmerber v. California (1966), the Court ruled that suspects may refuse to participate in a lineup, and such
refusal may not be used against them in court.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Remember

31. Investigators should use at least ten people of comparable race, height, weight, age, and general appearance in police
lineups.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 11


32. In Katz v. United States, the Supreme Court reversed the California decision, saying: “The Fourth Amendment
protects people, not places. . . .”
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

33. Stakeout surveillance is used when you know or suspect that a person is at or will come to a known location.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

34. Electronic surveillance and wiretapping are considered forms of search and therefore do not require probable cause
and court order.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

35. As far back as Title III of the Omnibus Crime Control and Safe Streets Act of 1968, the courts authorized court-
ordered electronic surveillance of organized crime figures.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 12


36. Pen registers and trap-and-trace devices are not considered forms of searches and do not need probable cause and
a court order because subscribers waive their rights to privacy when using devices such as cell phones or
telephones.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

37. Through-the-wall surveillance (TWS) technology helps officers to determine if someone is in a room before putting
themselves in harm’s way and to save lives by using motion and images to differentiate between a hostage and a
hostage taker.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

38. The Supreme Court defined entrapment in Sorrells v. United States (1932) as essentially resting on whether or not
the conception and planning of an offense was by an officer, not a suspect.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Undercover Assignments
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Remember

39. Police officers are not authorized to make an arrest for any criminal activity of which they are suspicious.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Raids
LEARNING OBJECTIVES: CRIM.HESS.17.07.07 - List the circumstances under which police officers are
authorized to make an arrest.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 13


40. Gordon v. Warren Consolidated Board of Education (1983) ruled that using undercover officers in high schools
was reasonable and therefore legal.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Undercover Assignments
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Remember

41. Officers working undercover should keep their real first name and date of birth.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Undercover Assignments
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Remember

42. Planning, organizing, and executing a raid are somewhat similar to undertaking a small military attack on a specific
target.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Raids
LEARNING OBJECTIVES: CRIM.HESS.17.07.06 - List the objectives of raids, what to consider before
conducting a raid, and precautions to take when conducting a raid.
KEYWORDS: Bloom’s: Remember

43. Facts gathered after an arrest to justify probable cause are legally admissible as evidence of probable cause.
a. True
b. False

ANSWER: False
POINTS: 1
REFERENCES: Legal Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.08 - Identify the elements that constitute an arrest having been
made.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 14


44. Some officers carry insurance to protect themselves against lawsuits.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

45. Research has found that officers were significantly more likely to use higher levels of force with suspects
encountered in disadvantaged neighborhoods.
a. True
b. False

ANSWER: True
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

46. identification is on-the-scene identification of a suspect by a victim or witness to a crime.

ANSWER: Field
POINTS: 1
REFERENCES: Identifying Suspects at the Scene
LEARNING OBJECTIVES: CRIM.HESS.17.07.01 - Explain what field identification is, when it is used, and the
rights a suspect has during such an event.
KEYWORDS: Bloom’s: Remember

47. The of racial profiling may be bolstered by discussions of pretextual traffic stops.

ANSWER: perception
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

48. Suspects may ______________ to participate in a lineup, but this decision can be used against them in court.

ANSWER: refuse
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 15


49. In ________________ profiling, also known as criminal profiling, an attempt is made to identify an individual’s
mental, emotional, and psychological characteristics.

ANSWER: psychological
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

50. profiling takes place when an officer focuses on an individual as a suspect based solely on that
person’s race.

ANSWER: Racial
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Remember

51. Victims and witnesses should view ______________ shots, as this may help identify a suspect believed to have a
record.

ANSWER: mug
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Remember

52. In moving surveillance, the surveillant may be referred to as a .

ANSWER: tail
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Remember

53. Police powers to arrest or search are restricted by the Amendment.

ANSWER: Fourth
4th
POINTS: 1
REFERENCES: Legal Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.07 - List the circumstances under which police officers are
authorized to make an arrest.
KEYWORDS: Bloom’s: Remember

Cengage Learning Testing, Powered by Cognero Page 16


54. Graham v. Connor held that plaintiffs alleging excessive use of force need only show that the officer’s actions
were under the standards of the Fourth Amendment.

ANSWER: unreasonable
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.07 - List the circumstances under which police officers are
authorized to make an arrest.
KEYWORDS: Bloom’s: Remember

55. Identifying a weapon as less-lethal does not imply that it is ________________ lethal.

ANSWER: never
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Remember

56. If a suspect is at the scene of a crime, what methods can an officer use to identify the suspect at the scene?

ANSWER: If a suspect is at the scene, an officer can use the person’s driver’s license, mobile
identification technology, or field or show-up identification.
POINTS: 1
REFERENCES: Identifying Suspects at the Scene
LEARNING OBJECTIVES: CRIM.HESS.17.07.01 - Explain what field identification is, when it is used, and the
rights a suspect has during such an event.
KEYWORDS: Bloom’s: Apply

57. Describe the uses and value of psychological profiling.

ANSWER: The psychological profile is determined by examining all data and evidence from a
specific crime scene, including, but not only, crime scene photographs, detailed photos
of bodily injuries to victims, photos of any mutilation evidence, information related to the
condition of the victim’s clothing or absence thereof, information regarding whether the
crime scene was altered or unaltered, photos of the area beyond the immediate crime
scene, available maps of the area, the medical examiner’s report and opinion, and any
other relevant information concerning the crime, particularly abnormalities such as
multiple slashings, disembowelment, or dismembering of the body.

Specific information is then categorized to produce predictive information regarding the


suspect’s likely age, sex, race, weight, and height; physical, mental, and psychological
condition; area of residence; whether known to the victim; whether the suspect has a
criminal record; and other details.
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 17


58. Compile a list of some of the key items to ask about when helping a witness describe a suspect.

ANSWER: Rather than simply asking a witness to describe a suspect, ask specific questions about
the suspect’s physical characteristics: gender, height, weight, build, age, race, shape of
face, complexion, hair, forehead, eyebrows, eyes, nose, ears, mustache, mouth, lips,
teeth, beard, chin, neck, distinctive marks, peculiarities, clothing, weapon (if any), and
jewelry.
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Apply

59. Explain how geographic profiling can be used in criminal investigations.

ANSWER:
Geographic profiling can also be helpful in identifying suspects who commit multiple
crimes (serial criminals). Geographic profiling is based on the fact that everyone has a
pattern to their lives, particularly in relation to the geographical areas they frequent.
The serial criminal operates within a comfort zone—near to where he or she lives but
far enough away to remain anonymous and still feel comfortable because he or she
knows the area.
POINTS: 1
REFERENCES: Developing Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.02 - List the various sources commonly accessed for help in
developing a suspect.
KEYWORDS: Bloom’s: Apply

60. How does an officer determine whether photographic identification or lineup identification should be used to identify
a suspect?

ANSWER: Often the victim or witnesses get a good look at the suspect and can make a positive
identification. Use photographic identification when you have a good idea of who
committed a crime but the suspect is not in custody or when a fair lineup cannot be
conducted. Tell witnesses they need not identify anyone from the photographs. Lineup
identification is commonly used when the suspect is in custody and there were
witnesses to the crime. Use lineup identification when the suspect is in custody. Use at
least six individuals of comparable race, height, weight, age, and general appearance.
Ask all to perform the same actions or speak the same words. Instruct those viewing
the lineup that they need not make an identification.
POINTS: 1
REFERENCES: Identifying Suspects
LEARNING OBJECTIVES: CRIM.HESS.17.07.03 - Describe the basic techniques used to identify a suspect,
including what each requires, when they are used, and what rights a suspect has during
each.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 18


61. Briefly outline some of the ways that surveillance can aid an investigation.

ANSWER: Surveillance can aid an investigation in many ways:


• Gain information required for building a criminal complaint.
• Determine an informant’s loyalty.
• Verify a witness’s statement about a crime.
• Gain information required for obtaining and executing a search or arrest warrant,
such as who lives at a property, how many people are there, what the layout of the
property is, etc.
• Gain information necessary for interrogating a suspect.
• Identify a suspect’s associates.
• Observe members of terrorist organizations.
• Find a person wanted for a crime.
• Observe criminal activities in progress.
• Make a legal arrest.
• Apprehend a criminal in the act of committing a crime.
• Prevent a crime.
• Recover stolen property.
• Protect witnesses.
POINTS: 1
REFERENCES: Surveillance
LEARNING OBJECTIVES: CRIM.HESS.17.07.04 - Explain when surveillance is used, what its objectives are, and
the basic types of surveillance commonly deployed in criminal investigation.
KEYWORDS: Bloom’s: Apply

62. Define entrapment.

ANSWER: The Supreme Court defined entrapment in Sorrells v. United States (1932) as “the
conception and planning of an offense by an officer, and his procurement of its
commission by one who would not have perpetrated it except for the trickery,
persuasion or fraud of the officer.”
POINTS: 1
REFERENCES: Undercover Assignments
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 19


63. Outline some of the suggestions discussed in the text for officers who are preparing to go undercover.

ANSWER: Recommendations and precautions for undercover agents include:

• Adopt credible aliases. Keep your real first name and date of birth.
• Whether you’re going to “carry” or not may be a matter of personal preference or an
issue your agency addresses.
• Choose your “garb” based on your assignment. The primary objective is to fit in with
your target group.
• Avoid the draw of the street, which can be overwhelming and even addicting.
• Although many undercover operations require you to appear alone, always have
backup within eye or earshot, either via wire or through direct visual contact.
• Remember who you are. Nothing is worth compromising your integrity as a police
officer (Grossi, 2009).

Additional precautions include:


• Write no notes the subject can read. It is vital that undercover investigators keep
accurate notes during their investigation, yet they must not allow the subject to be
aware of such documentation.
• Carry no identification other than the cover ID.
• Ensure that any communication with headquarters is covert.
• Do not suggest, plan, initiate, or participate in criminal activity.
POINTS: 1
REFERENCES: Undercover Assignments
LEARNING OBJECTIVES: CRIM.HESS.17.07.05 - List the objectives of undercover assignments and the
precautions officers working undercover should take.
KEYWORDS: Bloom’s: Apply

64. What precautions should be taken when conducting raids?

ANSWER: Precautions to take when conducting a raid:

• Ensure that the raid is legal (for example, that warrants are signed and legal).
• Plan carefully (know escape routes, suspect’s history of violence, possible weapons
at the site, suspect’s gang connections, etc.).
• Assign adequate personnel and equipment.
• Thoroughly brief every member of the raiding party.
• Be aware of the possibility of surreptitious surveillance devices or booby traps at the
raid site.

In addition, make sure you have the correct location, that the right people you are after
are present at the location, and that you have established a tight perimeter, allowing a
safe and secure zone to conduct the raid. Many agencies use their local SWAT units to
actually make the initial entry as raids are inherently dangerous. Medical units may be
on standby. Remember that any use of force will have to be justified and documented.
POINTS: 1
REFERENCES: Raids
LEARNING OBJECTIVES: CRIM.HESS.17.07.06 - List the objectives of raids, what to consider before
conducting a raid, and precautions to take when conducting a raid.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 20


65. How do the police establish the legal requirements for staging a raid?

ANSWER: A raid must be the result of a hot pursuit or be under the authority of a no-knock arrest
or search warrant.
POINTS: 1
REFERENCES: Raids
LEARNING OBJECTIVES: CRIM.HESS.17.07.06 - List the objectives of raids, what to consider before
conducting a raid, and precautions to take when conducting a raid.
KEYWORDS: Bloom’s: Apply

66. After arresting a suspect, under what conditions are officers allowed to search the arrestee’s home?

ANSWER: The Supreme Court has ruled on the conditions in three cases:

James v. Louisiana (1965): “A search can be ‘incident to an arrest’ only if it is


substantially contemporaneous with the arrest and is confined to the immediate vicinity
of the arrest.”

Shipley v. California (1969): “The Constitution has never been construed by this Court
to allow the police in the absence of an emergency to arrest a person outside his home
and then take him inside for the purpose of conducting a warrantless search.”

Vale v. Louisiana (1970): “If a search of a house is to be upheld as incident to arrest,


that arrest must take place inside the house. We decline to hold that an arrest on the
street can provide its own exigent circumstance so as to justify a warrantless search of
the arrestee’s house.”

Police do, however, have a right to maintain control over a suspect once he is arrested.
If the suspect is arrested outside his home and requests an opportunity to go back
inside temporarily (such as to obtain bail money or ID, to get a jacket, or tell his family
of his predicament), he is giving police implied consent to accompany him inside. If
officers then see contraband or evidence in plain view, they have a right to seize it.
POINTS: 1
REFERENCES: Legal Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.08 - Identify the elements that constitute an arrest having been
made.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 21


67. At what point should an arrested individual be advised of his or her constitutional rights?

ANSWER: Arrested individuals should be advised of their constitutional rights when they are in a
custodial setting, that is, not free to leave, and when they are being interrogated about a
specific crime where their answers may incriminate them. Note that just because
individuals are arrested, they need not always be Mirandized. They only need to be
Mirandized if the police want to question them while they are in a custodial setting and
when their answers could be incriminating. In other words, a person arrested for
committing a crime in an officer’s presence, such as driving while intoxicated, would
not have to be necessarily Mirandized.
POINTS: 1
REFERENCES: Legal Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.08 - Identify the elements that constitute an arrest having been
made.
KEYWORDS: Bloom’s: Apply

68. Define the term de facto arrest.

ANSWER: In some departments, it is common practice to take a suspect who is not under arrest
to the department for questioning. If bringing someone in for questioning appears to be
an arrest without probable cause, even if the suspect is not told he’s under arrest, and
even if the officers do not personally consider him to be under arrest, the courts are
likely to rule that the officers have, in effect, made an illegal de facto arrest. As a
result, the courts will suppress any evidence so obtained. At minimum, the Supreme
Court has ruled four times that if police take someone involuntarily to a police facility
for investigation, this will be considered a de facto arrest.
POINTS: 1
REFERENCES: Legal Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.08 - Identify the elements that constitute an arrest having been
made.
KEYWORDS: Bloom’s: Apply

69. Define reasonable force.

ANSWER: Reasonable force is the amount of force used by police measured by what a prudent
individual would accept or use themselves in a similar situation.
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 22


70. Briefly outline some of the options available to an officer for controlling someone with nonlethal force.

ANSWER: Whether they are called less-than-lethal, less-lethal, or nonlethal weapons, their
intent is to avoid the use of deadly force. The most commonly used restraint is
handcuffs. Aerosols can also be used: Pepper spray is considered by many to be the
single most significant resistance-control and injury-reduction tool in law enforcement
history. Impact munitions are specially designed projectiles that are made to strike a
subject’s body causing nonlethal blunt trauma and incapacitation. Controlled Electronic
Devices (CEDs) are also called ECDs. These handheld devices operate by causing
neuron-muscular incapacitation (NMI) resulting in a subject’s loss of motor function
and, usually, consequent collapse to the ground. Perhaps the best-known and most
controversial less-lethal weapon is the TASER. Other less-lethal options include
capture nets, which have been an alternative for subduing combative suspects for
decades. A modern version of such a capture net is the Super Talon™ net gun.
POINTS: 1
REFERENCES: Avoiding Civil Liability When Making Arrests
LEARNING OBJECTIVES: CRIM.HESS.17.07.09 - Explain how much force is justified when making an arrest.
KEYWORDS: Bloom’s: Apply

Cengage Learning Testing, Powered by Cognero Page 23

You might also like