Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
74 Cards in this Set
- Front
- Back
OPSEC National Security Decision Directive 298 |
Established OPSEC programs in executive depts. and agencies as well as the interagency OPSEC Support Staff |
|
OPSEC What is the goal of OPSEC? |
To control information about our capabilities and intentions IOT keep them from being exploited by our adversaries. |
|
OPSEC Define OPSEC. |
A systematic, proven process to identify, control, and protect generally SBU information about a mission, operation, or activity, and thus, denying or mitigating an adversary’s ability to compromise or interrupt that mission, operation, or activity. |
|
OPSEC What is the OPSEC Process? |
ID critical information; Analyze the threat; Analyze vulnerabilities; Assess risk; Apply countermeasures |
|
Weapons of Mass Destruction - EPO 1 - Identify the threat of weapons of mass destruction - Define 18 U.S. Code § 2332a: Define 'weapons of mass destruction' |
"Any weapon that is designed or intended to cause death or serious bodily injury through the release, dissemination or impact of toxic or poisonous chemicals." |
|
Weapons of Mass Destruction - EPO 1 - Identify the threat of weapons of mass destruction. - What is Homeland Security Presidential Directive (HSPD) 5? |
- Governs US policy on counterterrorism and outlines the US response to terrorist incidents involving a WMD. - It also designates the lead agencies for various parts of the response to a WMD |
|
Weapons of Mass Destruction - EPO 1 - Identify the threat of weapons of mass destruction. - Discuss the agency response criteria to WMD. |
- Crisis Management - The FBI is the lead agency that will coordinate all the law enforcement communities involved in the criminal investigation of a WMD incident - Consequence Management - FEMA is the lead agency that coordinates state and local agencies to bring in heavy equipment, food, medicine, water, communications gear, etc. |
|
Weapons of Mass Destruction - EPO 2 - Identify the physical characteristics and physiological effects of WMD and their agents or materials. - Define Chemical Weapons |
A device that uses toxic chemical substances such that the effects on exposed personnel (by entry through the skin, eyes or through inhalation) results in death or incapacitation. It’s comprised of the (1) agent AND (2) means to deliver it. |
|
Weapons of Mass Destruction- - EPO 2 - Identify the physical characteristics and physiological effects of WMD and their agents or materials. - What is a choking agent (WMD)? |
A chemical weapon agent designed to impede a victim's ability to breathe. They operate by causing a build-up of fluids in the lungs, which then leads to suffocation. EX Chlorine, Phosgene. |
|
Weapons of Mass Destruction- - EPO 2 - Identify the physical characteristics and physiological effects of WMD and their agents or materials. - What is a blistering agent (WMD)? |
A chemical weapon agent designed to cause severe skin, eye, and mucosal pain and irritation. EX Mustard Gas. |
|
Weapons of Mass Destruction- - EPO 2 - Identify the physical characteristics and physiological effects of WMD and their agents or materials. - What is a blood agent (WMD)? |
A chemical weapon agent designed to be absorbed by the blood. Symptoms are immediate and smells of almonds. It causes Impaired respiration, trouble breathing, irritation to nose, throat, and eyes as well as severe headaches. EX CYANIDE GAS. |
|
Weapons of Mass Destruction- - EPO 2 - Identify the physical characteristics and physiological effects of WMD and their agents or materials. - What is a nerve agent (WMD)? |
A chemical weapon agent designed to disrupt the mechanisms by which nerves transfer messages to organs. Symptoms include trouble breathing, vomiting, involuntary twitching, severe seizure, pupil pin-pointing, & runny nose. EX Sarin, VX |
|
Weapons of Mass Destruction
- EPO 2 - Identify the physical characteristics and physiological effects of WMD and their agents or materials. - What is a biological weapon (WMD)? |
A bacterium, virus, protozoan, parasite, or fungus that can be used purposefully as a weapon. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. - What are the two reasons people commit financial crimes? |
(1) Profit (2) Passion |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. - What is the 'net worth' method? |
Assets - Liabilities = X |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. Are 'beginning balance' and 'ending balance' sources or applications? |
'Beginning balance' is always a 'source'. 'Ending balance' is an 'application'.
|
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS
- EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. - What is a financial profile? |
An assessment of what a suspect owes, owns, earns, and spends at a given point in time or over a given period of time.
|
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. - Define sources & applications. |
Funds, usually from legitimate transactions, that a suspect has not attempted to conceal. Recipet
Spending, asset accumulation, and liability reduction. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS
- EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. What is Cash on Hand (COH)? |
Coin & currency in a person's possession. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method. What is the Bank Deposits Method? |
An analysis of bank deposits |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 1 - ID 3 basic methods that can be used by financial investigator to establish a person's financial profile and explain the Sources & Applications Method - What are some common examples of applications? |
Purchase of assets such as jewelry, boats, securities, automobiles, & real property; Personal living expenses; travel and entertainment; gifts or loans; rent and lease payments; |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS- EPO 2 - ID the forms required to be filed to track the movement of currency and monetary instruments as prescribed by the banking secrecy act, comprehensive, rime control act, and USA Patriot Act - what is a Currency Transaction Report (CTR)? |
A report filed by a financial institution which are for deposits, withdrawals, currency exchanges, or other payment or transfer involving transactions of more than $10,000. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 2 - ID the forms required to be filed to track the movement of currency and monetary instruments as prescribed by the banking secrecy act, comprehensive, rime control act, and USA Patriot Act - What is a Report of Foreign Bank and Financial Accounts (FBAR)? |
A United States person that has a financial interest in or signature authority over foreign financial accounts must file an FBAR if the value of the account exceeds $10,000. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 2 - ID the forms required to be filed to track the movement of currency and monetary instruments as prescribed by the banking secrecy act, comprehensive, rime control act, and USA Patriot Act - What is a FinCEN 8300 |
Any person or business who receives more than $10,000 in cash in a single transaction or in related transactions must file this form. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 2 - ID the forms required to be filed to track the movement of currency and monetary instruments as prescribed by the banking secrecy act, comprehensive, rime control act, and USA Patriot Act - What is a Report of International Transportation of Currency or Monetary Instruments (CMIR)? |
A traveler who transports currency, traveler's checks, and certain other monetary instruments in an aggregate amount exceeding $10,000 into or out of the United States must file this form. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 2 - ID the forms required to be filed to track the movement of currency and monetary instruments as prescribed by the banking secrecy act, comprehensive, rime control act, and USA Patriot Act - What is a Suspicious Activity Report (SAR)? |
Financial Institutions must file this form for any suspicious transaction relevant to a possible violation of law or regulation. |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS - EPO 2 - ID the forms required to be filed to track the movement of currency and monetary instruments as prescribed by the banking secrecy act, comprehensive, rime control act, and USA Patriot Act - What are the steps to money laundering? |
Placement - Introducing cash into the financial system by some means Layering - Carrying out complex financial transactions to camouflage the illegal source of the cash Integration - Acquiring wealth generated from the transactions of the illicit funds |
|
FINANCIAL ASPECTS OF CRIMINAL INVESTIGATIONS Discuss 18 U.S. Code § 1956 & 1957 |
18 U.S. Code § 1956 - Prohibits from engaging in financial transactions with proceeds that were generated from certain specific crimes, known as “specified unlawful activities” (SUAs). 18 U.S. Code § 1957 - prohibits spending in excess of $10,000 derived from an SUA, regardless of whether the individual wishes to disguise it. |
|
INFORMANTS EPO 1 Identify informant sources available to FLEO What is an informant? |
A person who assists law enforcement efforts by providing info concerning crime or unlawful activity that may not be provided otherwise, usually in return for monetary compensation or some other form of consideration. |
|
INFORMANTS EPO 1 Identify informant sources available to FLEO What are examples of some names for informants used by various LE agencies? |
Coperating witnesses; Confidential Informant; Cooperating Defendant; Source of Information; Restricted Informant; Source; Identify Protected Witness; Anonymous Source |
|
INFORMANTS EPO 1 Identify informant sources available to FLEO What are the sub-categories of informants? |
1. Anonymous Informant; 2. Non-Confidential Informant; 3. Confidential Informant; 4. Unwitting Informant |
|
INFORMANTS EPO 1 Identify informant sources available to FLEO What are the 4 Types of Informants? |
1. Criminal Associate 2. Professional Informant 3. Informant w/in Regulated Industry 4. Private Citizen |
|
INFORMANTS EPO 1 Identify informant sources available to FLEO What are the special/restricted groups of informants? |
Criminal Defendants; Probationers/parolees; Witness security program participants; persons in USMS/BOP/State Custody; Juveniles; Foreign Nationals/Aliens; Clergy Attorneys, Physicians, Press |
|
INFORMANTS EPO 1 Identify informant sources available to FLEO What are the motivations of informants? |
Fear; Revenge; Mercenary (money); ego/vanity; reform/repentance Also, competition, civic mindedness, jealousy, friendship, perverse |
|
INFORMANTS EPO 2 Identify the development, use, control of informants and the potential problems encountered Define "Informer's Privilege" |
The right of the government to refuse to reveal the identity of an informer. |
|
INFORMANTS EPO 2 Identify the development, use, control of informants and the potential problems encountered Discuss considerations for development, use and control of informants. |
- Treat EVERY PERSON as a possible informant. - Profile potential informants for general suitability. - Recognize motivation; past reliability; intelligence of informant; direct knowledge |
|
INFORMANTS EPO 3 Identify methods of documenting informants and informant contacts Discuss what an Informant File includes and it's sensitivity of dissemination. |
This official record of Informant’s history with LEO includes statements, corroboration, and a copy of the "Informant Agreement" (An agreement between agency and informant which sets out the conditions of informant use). It is often kept secure and generally only accessible by supervisor. |
|
Authentication of ID Documents for LE Personnel Discuss the different types of light used to verify official ID documents. |
1. Transmitted light. Can be used to see through a document 2. UV light. Shows certain chemicals 3. Oblique Light. Held at 45 degrees to show elevation. |
|
Authentication of ID Documents for LE Personnel EPO 1 Recognize the various documents that are acceptable for US citizens and foreign nationals to present officials as proof of identity. What are some forms of ID for US Citizens or Foreign Nationals? |
US Citizen: DL, Passport, Military IDs, Gov IDs, birth certificate Foreign National: Green Card, Passport, Employment authorizations, 551 |
|
Authentication of ID Documents for LE Personnel EPO 1 Recognize the various documents that are acceptable for US citizens and foreign nationals to present officials as proof of identity What are the types fraudulent ID documents? |
1. Genuine 2. Altered 3. Counterfeit 4. Genuine BUT fraudulently obtained |
|
Authentication of ID Documents for LE Personnel EPO 1 Recognize the various documents that are acceptable for US citizens and foreign nationals to present officials as proof of identity Discuss the specific points to look at when analyzing suspected fraudulent ID. |
P - Photo L - Logo E - Expiration A - Age S - Signature E - Evidence |
|
Authentication of ID Documents for LE Personnel EPO 1 Recognize the various documents that are acceptable for US citizens and foreign nationals to present officials as proof of identity. Discuss OVI. |
Optically Variable Ink changes color based on viewing angle |
|
Authentication of ID Documents for LE Personnel
EPO 2 Identify the security features found in the most common types of identity documents What is an integrated photo? |
Printed into the actual id, no raised surfaces Seal - a laminate-like material which seals the document, and may have information printed onto it. If removed, information also must be replacedMicro Line Print - very small printed text which requires magnification to read. Almost impossible to replicateOptically Variable Ink - color shifting ink which changes when viewed at different angles |
|
Authentication of ID Documents for LE Personnel EPO 2 Identify the security features found in the most common types of identity documents What is a Ghost Image? |
A smaller version of photo embedded into ID |
|
Authentication of ID Documents for LE Personnel EPO 2 Identify the security features found in the most common types of identity documents What is a Micro Line Print? |
This is very small printed text on an ID which requires magnification to read and is difficult to replicate. |
|
Authentication of ID Documents for LE Personnel EPO 3 Recognize common methods for altering and counterfeiting identity documents. Discuss common methods for altering and counterfeiting identity documents. |
Impostor Detection - Ensure the bearer is the person ISSUED the document. Others include Hand written additions, Erasure, Cut and Paste, Type-Over, Trace-over, & Ink and Font. |
|
DOCUMENT AND REPORT WRITING EPO 1 Identify the requirements and uses of law enforcement notes. Define Law Enforcement Notes |
Any kind of record or instrument that will enable the investigator to recall the larger body of facts at a later time. |
|
DOCUMENT AND REPORT WRITING EPO 2 Identify the uses and essential elements of narrative reports What are the Five Essential Elements of a LE Narrative |
Accurate Complete Concise Clear Objective/Fair |
|
DOCUMENT AND REPORT WRITING EPO 3 Identify the types of narrative reports and requirements of written statements What is a memo of Interview? |
A narrative report which is prepared by the investigator to record the specifics of an interview. |
|
DOCUMENT AND REPORT WRITING EPO 3 Identify the types of narrative reports and requirements of written statements What is a Memo of Activity? |
A narrative report whichmemorializes LE activities including search warrants, arrest warrants, undercover operations. |
|
DOCUMENT AND REPORT WRITING EPO 3 Identify the types of narrative reports and requirements of written statements What is a Sworn Statement? |
AKA "Affidavit". A written statement of fact made voluntarily and confirmed by oath or affirmation of the party making it, usually before a judge or Investigator having administered the oath. |
|
DOCUMENT AND REPORT WRITING EPO 3 Identify the types of narrative reports and requirements of written statements What are the two most common ways of documenting interviews. |
Memo of Interview or Witness Statement (Agency or AUSA preference). |
|
DOCUMENT AND REPORT WRITING EPO 3 Identify the types of narrative reports and requirements of written statements What federal law covers False Statements? |
18 USC 1001 (False Statements) |
|
Electronic sources of Information EPO 1 Identify select public records maintained by local, state, and federal governments. Define Public Records. |
Records, maintained by the government, which are, by the FOIA 1966, available to the public for review and, as amended by E-FOIA of 1996, made available electronically. |
|
Electronic sources of Information EPO 1 Identify select public records maintained by local, state, and federal governments. What are the exemptions to FOIA (related to LE)? |
1. Could interfere w/ LE proceedings. 2. Potential to deprive of a right to fair trial. 3. Could constitute unwarranted invasion of privacy. 4. Could reasonably identify a confidential informant. 5. Could disclose LE techniques and procedures. 6. Could reasonably endanger someone’s life or safety. |
|
Electronic sources of Information EPO 1 Identify select public records maintained by local, state, and federal governments. What are select public records maintained by local government? |
Building inspector, Coroner/Medical Examiner, County court clerk, Health department, Personnel Department, Public Schools, Licensing bureaus, SurveyorTax, AssessorTax Collector, Welfare Commission |
|
Electronic sources of Information EPO 1 Identify select public records maintained by local, state, and federal governments What are select public records maintained by state government? |
Articles of Incorporation, Uniform Commercial Code, Vital Statistics (births, deaths, etc.) |
|
Electronic sources of Information EPO 1 Identify select public records maintained by local, state, and federal governments What are select public records maintained by Federal government? |
Federal Bankruptcy Court Info, Federal District Court, Postal Service, Bank Examiners, Department of Defense, Department of State, FAA, US Citizen and Immigration, SEC |
|
Electronic sources of Information EPO 2 - Identify investigative techniques for maximizing search capabilities of google Discuss methods of refining Google searches |
AND, OR, +, "" |
|
Electronic sources of Information EPO 3 Identify internet resources used to assist investigative activities. What is a Dun number? |
Assigns a unique 9 digit identifier, referred to as a "DUNS number" to a single business entity. Establishes business credit file, Businesses self-report, Info may be unreliable, Gov Contractors have to use DUNS number. |
|
NCIC/NLETS EPO 1 Define the Acronyms NCIC and NLETS and Describe the role that NCIC and NLETS play in the criminal justice. What is NCIC? |
National Crime Information Center is a computerized database and network system that sserves the nationals CRIM justice organizations in all 50 states, DC, territories, and Canada. It stores a variety of CRIM records and history files as well as other info critical to LE. |
|
NCIC/NLETS EPO 1 Define the Acronyms NCIC and NLETS and Describe the role that NCIC and NLETS play in the criminal justice. What agency maintains NCIC? |
The FBI maintains integrity of this LE Info System though automated computer edits, automated purges, QC, and periodic validation. |
|
NCIC/NLETS EPO 1 Define the Acronyms NCIC and NLETS and Describe the role that NCIC and NLETS play in the criminal justice. What is NLETS? |
National Law Enforcement Telecommunications System. It is an interstate justice and public safety network exchange for law enforcement-, criminal justice-, and public safety-related information. Available to all state, territories, Federal agencies, and international partners. |
|
NCIC/NLETS EPO 2 Identify the types of information accessible to law enforcement through NCIC and NLETS. What is the Originating Agency Identifier File? |
9 digit identifier assigned by NCIC to an agency IOT ID the agency transactions on the NCIC system. |
|
NCIC/NLETS EPO 2 Identify the types of information accessible to law enforcement through NCIC and NLETS.
|
Wanted persons, Temporary Felony Warrants, Immigration Violator, Protective interest file, Missing Persons file, Unidentified Persons file, Amber Alerts, Foreign fugitives, Gang File, Known or Appropriately Suspected Terrorist File, Violent Persons File, Convicted sex offender, NICS Denied Transaction File |
|
NCIC/NLETS EPO 2 Identify the types of information accessible to law enforcement through NCIC and NLETS. Compare and contrast Red, Blue, and Green Interpol Notices. |
Red Notice - To seek the location and arrest of wanted persons with a view to extradition or similar lawful action. Blue Notice - To collect additional information about a person’s identity, location or activities in relation to a crime. Green Notice - To provide warnings and intelligence about persons who have committed criminal offences and are likely to repeat these crimes in other countries. |
|
NCIC/NLETS EPO 2 Identify the types of information accessible to law enforcement through NCIC and NLETS. What is an offline search? |
An NCIC Offline search is a special technique used to obtain info that cannot be obtained from an online inquiry. It searches purged records. |
|
NCIC/NLETS What is a Wanted Person File? |
This file contains the records on individuals for whom a felony, serious misdemeanor, or federal warrant is outstanding, as well as parole and probation violators. |
|
NCIC/NLETS What is a Foreign Fugitive File? |
This file permits the Interpol office in WASHDC to enter records fr fugitives who are wanted in other countries for crimes that would be considered felonies if committed in US and who are subject to Red & Blue notices. |
|
Courtroom Evidence EPO 1 Identify the procedural stages of a criminal trial Define Evidence. |
Anything presented in court from either the prosecution or defense in order to prove or disprove something. |
|
Courtroom Evidence EPO 1 Identify the procedural stages of a criminal trial Describe the different types of Evidence |
1. Testimonial - A witness takes the stand, is placed under oath, and answers questions. 2. Real - Physical items that can be touched or seen. 3. Demonstrative - Evidence that consists of items that demonstrate or illustrate something to the jury, such as models, charts, & graphics. |
|
Courtroom Evidence EPO 1 Identify the procedural stages of a criminal trial What is 'Voir Dire'? |
In this hearing, lawyers from both sides question potential jurors and select juries. |
|
Courtroom Evidence EPO 1 Identify the procedural stages of a criminal trial What is the purpose of the closing argument? |
Lawyers tell the jury what they attempted to convey with the evidence showed. |
|
Courtroom Evidence EPO 1 Identify the procedural stages of a criminal trial What are the stages of a CRIM trial? |
1. Suppression hearings. 2. Voir Dire. 3. Case-in-Chief (prosecution case) 4. Defense Case 5. Rebuttal 6. Closing Argument 7. Jury Instruction/Deliberation/Verdict 8. Sentencing 9. Post-trial proceedings (appeal) |