Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CITP EXAM 4 2024 ACTUAL EXAM 100 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES, Exams of Information Technology

CITP EXAM 4 2024 ACTUAL EXAM 100 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES AGRADE

Typology: Exams

2024/2025

Available from 11/11/2024

keith-daniel
keith-daniel 🇺🇸

5

(1)

2.7K documents

1 / 31

Toggle sidebar

Related documents


Partial preview of the text

Download CITP EXAM 4 2024 ACTUAL EXAM 100 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES and more Exams Information Technology in PDF only on Docsity!

CITP EXAM 4 2024 ACTUAL EXAM 100 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES AGRADE Types of electronic surveillance - CORRECT ANSWER >>>>1. Audio Surveillance

  1. Video Surveillance
  2. (Tracking) Electronic Surveillance Define Electronic Surveillance - CORRECT ANSWER >>>>Use of electronic surveillance equipment to monitor/record events, can include video or image capture. 2 types of audio intercepts devices - CORRECT ANSWER >>>>1. Recorder - just records audio primarily used for collecting evidence, but you have to wait until the meet is over to recover the

recording. Body worn, digital, record time, audio quality.

  1. Transmitter - transmits audio to another devie, can also record. Officer safety as they provide real-time transmission. What is Audio Intercept - CORRECT ANSWER

Consensual (one-party) not unlawful for a person acting under color of law to intercept a wire, oral, or electronic communication. define VIDEO SURVEILLANCE and two systems that function this. - CORRECT ANSWER Systems that are both covert and overt, they can be fixed or mobile, wire or wireless. most of the time uses internet / wifi. IP- based video surveillance system, sometimes referred to as POLE CAM In-Place CCTV systems - security systems.

Define surveillance - CORRECT ANSWER >>>>An continuous - ongoing process of monitoring people, place, or things in order to gather intel about case What are some traits of a surveillant - CORRECT ANSWER >>>>Tangible - psychological, good condition, eye sight Intangible - patience, perseverance, adaptation What is MEID - CORRECT ANSWER >>>>Mobile Equipment Identifier What are some cellphone device extraction - CORRECT ANSWER >>>>Physical - most complex Logical - LEO preferred Manuel - lease complex Define Electronic Tracking - CORRECT ANSWER

Ready availability and affordability of these systems allows LEO to efficiently, accurately and

safely track the movement of vehicles, packages or persons. MUST NEED A WARRANT TO INSTALL What are 2 types of Electronic Tracking systems - CORRECT ANSWER >>>>1. GPS - uses cellular

  1. RF/ Beacon - sends out signal via radio waves; receives by device tuned to same frequency. Two types of GPS trackers systems are called - CORRECT ANSWER >>>>1. Memory trackers - records location data, must retrieve to access data.
  • pros: cheap, simple to install, detailed list of movements.
  • cons: can't view on-demand, have to wait for info. Lose the target, lost the tracker.
  1. Live trackers - Transmits location data.
  • pros: real-time data via remote access, some can remotely control target vehicle.
  • cons: pricely, need good cell coverage.

both types need search warrant. Electronic Countermeasures - CORRECT ANSWER

Devices purchased by the bad guys to detect of thwart electronic surveillance. Jammers, RF detectors. Are illegal. Why use Electronic Surveillance Equipment (ESE)

  • CORRECT ANSWER >>>>- enhances sight/sound
  • monitor/record in real-time
  • preserves crime scene
  • sources of irrefutable evidence
  • safety
  • Usually results in guilty pleas rather than trials Purposes of ESE - CORRECT ANSWER >>>>1. gather evidence
  1. protect UC's/Informants
  2. Document crime as it happens what is WTAG - CORRECT ANSWER >>>>Wi-Fi Tools for Analysis and Geolocation - to locate

specific device. (child pornography, terrorism, Human trafficking's cases). Identify some considerations for using ESE - CORRECT ANSWER >>>>- Must tell the the person using the ESE how to work the device. What to do and what not to do

  • Person using it must be aware of potential issues
  • Technical person must do a site survey and ops plans
  • Must be justified, balance vs. cost.
  • PLACE the microphone in the equidistant location "middle of conversation"
  • PLACE the microphone on the chest if its used by person.
  • PLACE antenna VERTICAL.
  • Approval needs to come from head of agency or designee Duress signals. (audio and signal) What is the preamble? - CORRECT ANSWER

when using ESE record information about

what your doing, to include name, location, date and time... etc. but should never identify equipment being used. Friction Ridge Skin is only found on two areas of the skin - CORRECT ANSWER >>>>1. Palmer surface of the hand

  1. Plantar surface of the foot the Human fingerprint - CORRECT ANSWER

the most widely used method of scientific identification in the worldwide criminal justice system. What is AFIS? - CORRECT ANSWER Automated Fingerprint Identification System What is IAFIS - CORRECT ANSWER >>>>Holds the largest biometric database in the world. 72+ million criminal files and 53+ million + civil files.

  • mug shots
  • scars, etc..
  • civil fingerprints and military prints. Red finger print cards are used for who? - CORRECT ANSWER >>>>for criminal processing, have prisoner sign before printing card. Blue finger print cards are used for who? - CORRECT ANSWER >>>>for used for applicants (employment) explain the proper fingerprint print capture "rolled" or machine. - CORRECT ANSWER

Left to right - Nail edge to Nail edge Top to Bottom - Fingertip to 1/4 in below the first joint/crease Fingerprint boxes - CORRECT ANSWER >>>>Rolled impressions - boxes 1- 10 Plain/pressed impressions - bottom 3 boxes name the required fields on FD- 249 - must be

filled in - CORRECT ANSWER >>>>Name ORI #

DOB

Sex Charge Fingerprint Impressions charges - list in simple / literal terms What is an R-84 form? - CORRECT ANSWER

Final Disposition Report - must submit to FBI after final disposition on criminal charges on suspect for who you submitted FD- 249 ID some of the Biometric Databases - CORRECT ANSWER >>>>IDENT - DHS CJIS - FBI CODIS - FBI Major Case Prints explain the process and cards used - CORRECT ANSWER >>>>A systematic recording of the friction ridge detail appearing on the palmar sides of the hands. This includes the extreme sides of the palms, joints, tips, and sides

of the fingers (also known as complete friction ridge exemplars). taking print of the entire hand. 5 total impression cards

  • 1 (249)
  • 2 (884 right and left hand) entire hand roll with a cylinder
  • 2 (884a right and left hand) 45angle, rolled, 45angle, finger tips Collection of the "Major Case Print" - CORRECT ANSWER >>>>Collection - 5 cards per suspect; taken via INK not digital. 1 card of the FD- 249 2 cards of the FD- 884 2 cards of the FD-884a Supplemental finger and palm print (1 hand) FD-884 describe the process - CORRECT ANSWER
  • Ink applied to palm via roller
  • card mounted onto cylindrical object w/ diameter of 3+ inches.
  • Also collect blade of the hand FD-884a describe the process - CORRECT ANSWER

5 impressions of each finger

  • 45 degree left edge
  • flat
  • 45 degree right edge
  • full finger roll (nail edge to nail edge)
  • fingertip roll what is a Buccal Collection Kit used for convicted offenders - CORRECT ANSWER >>>>Used to collect a person's DNA for convicted offenders. the profile analysis is stored in CODIS - FBI database To collect Buccal collection kit explain details - CORRECT ANSWER >>>>Fill out FD-936. DNA entry form - put fingerprints Required Unique Identifier (FABS) FBI

Alien BOP # SSN Scrape in suspects mouth against cheeks for 8 times Types of clandestine labs: - CORRECT ANSWER

  1. Red Phosphorous
  1. Birch Reduction / Nazi Identify chemicals used in the manufacture of methamphetamines - CORRECT ANSWER >>>>- Red Phosphorous (from matches and road flares) produces phosphine gas
  • Iodine
  • Anhydrous ammonia
  • Precursor (Pseudoephedrine and/or ephedrine)
  • acetone, camp fuel, brake cleaner
  • Lithium batteries.

What should you do if you encounter a clandestine lab? - CORRECT ANSWER >>>>Do Not touch, or smell the chemicals observe from distance notify clan lab unit secure the area. 18 USC 3109 - CORRECT ANSWER >>>>knock and announce statue what does the Knock and announce tell you - CORRECT ANSWER >>>>1. Knock

  1. Announce purpose
  2. Demand entry "police search warrant, open the door" when can you force entry into dwelling after 18 usc 3109 - CORRECT ANSWER >>>>if refused entry, but must wait a reasonable amount of time after Knock and announce. Police authorized to use force if entry is refused.

what are some exceptions to 18 USC 3109 - CORRECT ANSWER >>>>1. Danger to LEO or innocent person

  1. Hot Pursuit
  2. Destruction of evidence
  3. Buy-bust with undercover LEO already inside Examples of denial to open the door after 18 USC 3109 - CORRECT ANSWER >>>>anything inside indicating that the police is not welcome regardless of the warrant.
  • go away
  • you hear evidence being destroyed
  • gunfire
  • verbals Who is authorized to issue federal search warrants? - CORRECT ANSWER >>>>1. US Magistrate Judge
  1. US District Court Judge
  2. State judge "court of record" - but talk to AUSA first.
  1. Circuit Court of appeals judge
  2. Supreme Court Justice. Must be a search within their district for them to sign. Search Warrant definition - CORRECT ANSWER

Document issued by a neutral and detached judge authorizing LEO to search what must you have for a Search Warrant known as "Standard for a SW" - CORRECT ANSWER Must have PC - must have for a ________ Who can request a federal search warrant? - CORRECT ANSWER >>>>FED LEO or AUSA may request the fed sw 4th amendment requires that every SW must particularly describe what? - CORRECT ANSWER The place to be searched items to be seized

The layout of a SW contains attachment A, B , and C. describe each - CORRECT ANSWER

Attachment A- WHERE is the SW (describe it very good) B - WHAT are you looking for (be specific but

  1. Danger to LEO or innocent person 2. Hot Pursuit 3. Destruction of evidence 4. Buy-bust with undercover LEO already inside Examples of denial to open the door after 18 USC 3109 - CORRECT ANSWER >>>>anything inside indicating that the police is not welcome regardless of the warrant. - go away - you hear evidence being destroyed - gunfire - verbals Who is authorized to issue federal search warrants? - CORRECT ANSWER >>>>1. US Magistrate Judge 2. US District Court Judge 3. State judge "court of record" - but talk to AUSA first. 4. Circuit Court of appeals judge 5. Supreme Court Justice. Must be a search within their district for them to sign. Search Warrant definition - CORRECT ANSWER >>>>Document issued by a neutral and detached judge authorizing LEO to search what must you have for a Search Warrant known as "Standard for a SW" - CORRECT ANSWER >>>>Must have PC - must have for a ________ Who can request a federal search warrant? - CORRECT ANSWER >>>>FED LEO or AUSA may request the fed sw 4th amendment requires that every SW must particularly describe what? - CORRECT ANSWER >>>>The place to be searched items to be seized The layout of a SW contains attachment A, B , and C. describe each - CORRECT ANSWER >>>>Attachment A- WHERE is the SW (describe it very good) B - WHAT are you looking for (be specific but broad) C - PC and FACTS (facts and circumstances - not conclusions. What is a Telephonic Search Warrant - CORRECT ANSWER >>>>its an issue of time sensitive that this warrant be signed now.
  • Must call FED judge, not state judge
  • Judge records call and authorizes LEO to sign copy for judge
  • LEO prepares the exact duplicate of SW and reads it to the judge.
  • after the SW, LEO signs original warrant When can you serve a Search Warrant - CORRECT ANSWER >>>>- Generally times are from 6am - 10pm (daytime)., unless warrant indicates otherwise
  • Magistrate judge can direct date but search can't exceed longer than 14 days from signature. What can you seize from a SW - CORRECT ANSWER >>>>evidence of crime contraband fruits of the crime anything listed in the SW Describe "TERRY" in a SW op - CORRECT ANSWER

you can detain or frisk those present if in accordance with TERRY. Ok if you believe reasonable suspicion that criminal activity is afoot.

  • reasonable force is okay (objectively reasonable)
  • you can frisk if you believe they are presently armed and dangerous. Explain the Premise Search Warrant pertaining to vehicles. - CORRECT ANSWER >>>>you can search a vehicle if the vehicle is located within the curtilage of the dwelling, but if its on the side

road or outside the curtilage you can't - bc the vehicle may contain evidence.

  • It if belongs to occupants of the house YES!
  • overnight guest YES!
  • Criminal visitor YES! What can LEO do with people present on premise while doing a SW - CORRECT ANSWER

Occupants on premise you can detain (SUMMERS DOCTRINE)

  • prevents flight in case evidence is found
  • minimizes risk of harm to occupants and LEO's
  • includes person who show up at the SW
  • you cant apprehend them at another location and bring them to the SW location. Warrant, when is the LEO officially done with the SW - CORRECT ANSWER >>>>- when the LEO finds everything that was on the SW
  • LEO's search everywhere items could be located
  • there is no time limit (as long as its continuous and ongoing)

explain the process of what to do when the SW is complete - CORRECT ANSWER >>>>- Complete inventory return on back of warrant

  • complete items seized
  • leave copy of items seized with person or conspicuous place Explain the purpose of a protective sweep - CORRECT ANSWER >>>>- sweep of entire premises to secure it for a safe search
  • sweep to may include anywhere a person could hide. if you see something in plain view, you may seize it. What is the Carroll Doctrine? - CORRECT ANSWER

A warrant less search of a motor vehicle by a peace officer who has probable cause to believe the vehicle contains incriminating items subject to seizure.

  • Mobile Conveyance
  • PC evidence inside vehicle
  • Conveyance is in a public place Mobile conveyance must in working order. Carroll vs US 1925 Identify when warrantless searches are allowed during Exigent Circumstances - CORRECT ANSWER
  1. Exigent Circumstances
  1. Destruction of evidence
  2. Hot pursuit
  3. Emergency Scene 3 reasons of why do a SIA - CORRECT ANSWER
  1. Weapons
  1. Prevent destruction of evidence
  2. Discover means of escape Identify the requirements and scope of a search incident to a lawful arrest. - CORRECT ANSWER

SIA = a warrantless search made immediately upon arresting an individual

  1. Lawful arrest
  2. Simultaneously contemporaneous
  3. areas accessible to subject SIA of a person - CORRECT ANSWER >>>>when you make an arrest, you can thoroughly search suspect.
  • in field: (do crush and feel)
  • at station: can do strip search, but not cavity
  • can look inside locked and unlocked containers carried by arrestee
  • search within the area of immediate are of control (lunging area) chimel vs gant applies. Consensual searches, Voluntariness of Search Factors: - CORRECT ANSWER >>>>Age, education, intelligence, Nature of questioning (badgering), Physical punishment, Suspect's cooperation, Alcohol/Drug impairment. Threats/promises/misrepresentations, Knowledge of right to refuse consent

what is actual authority? - CORRECT ANSWER

Individual actually owns or controls an item, i.e., the person has REP in that area, Individual who has mutual use/joint access over an item or area may consent to a search, Property issue is not dispositive, i.e., don't need to own to have REP (rental veh, renting apartments, etc.) Identify the circumstances in which a third party

has the actual or apparent authority to grant consent to search a suspect's property. - CORRECT ANSWER >>>>Person must have authority to give consent

  • husband or wife can consent to search house.
  • child (depends on age)
  • co-users of item of bag (either user can consent)
  • co-tenants may give authority to common areas only. identify the requirement allowing an inventory of lawfully impounded personal property. - CORRECT ANSWER >>>>3 purpose of why to inventory
  • protects LEO
  • protects owner's property
  • eliminates disputes over lost or stolen property must be property lawfully impounded, and must follow policy. inventory should not be a pretext for a search. limited to areas where property is stored, but not in door panels. anything seen in plain view during inventory may be seized under Carroll. While doing an inventory search pertaining to impounded vehicle what is the scope of the search? - CORRECT ANSWER >>>>- Only limited to areas where personal property is stored.
  • Trunk, glove box, suitcase, purse, etc...
  • NOT in door panels, inside gas tank... etc Determine types of technology and the unique identifiers associated with a mobile device - CORRECT ANSWER >>>>- SIM Cards (subscriber identify module - authenticate the handset to be used on the cellular network)
  • ICCID (Integrated Circuit Card Identifier - S/N of sim card)
  • IMEI (International Mobile Equipment Identity - number to identify specific device, this is not the actual phone. This is used by GSM networks)
  • MEID (Mobile Equipment Identifier - used by CDMA networks) GSM and CDMA are two types of: - CORRECT ANSWER >>>>2 types of Cellular networks GSM - Global (IMEI) CDMA - Domestic (MEID) Mobile devices can be broken up into two main classifications: - CORRECT ANSWER >>>>1. Feature Phone - flip phones, very limited on what they can do. (smaller displays, limited storage)
  1. Smart Phone - phone that resemble a personal computer ( i-phone - large screens)

What is a CSP? - CORRECT ANSWER >>>>Call Detail Records (CDR) are those records maintained by CSP - Cellular Service Provider. CSP provide service to customers, they track of certain data. Investigators can obtain with legal authority. What are the things to consider when handling mobile device? - CORRECT ANSWER >>>>1. Make sure you have legal AUTHORITY

  1. DOCUMENT the device - photo of front/back.
  2. ISOLATE the device from the network (FARADAY bag)
  3. ASK Questions - do you have the proper tools
  4. Leave the device as you found it. ON/OFF
  5. Collect cables T/F - Airplane mode Isolates the device from connecting to the network. - CORRECT ANSWER

FALSE - it does not isolate Wi-Fi on "AIRPLANE MODE"