Reference no: EM133685581
Questions
1. List the five categories in the FBI's typology of cybercrime and give an example of each.
2. Briefly explain what the AMBER alert is and how it is used.
3. How should officers deal with repeat calls for service which takes up an enormous amount of the police officers time?
4. Compare the basic interview with the information gathering interview and describe the differences.
5. What is the "fruit of the poisonous tree" doctrine and is covered by what Constitutional Amendment?
6. Explain some problems that occur if traffic does not move with maximum efficiency.
7. Discuss the legality of using collision by a law enforcement officer in a traffic pursuit
8. Discuss the ethical problems of police and off-duty employment.
9. Discuss some strategies used to weaken officers' tendency to not report misconduct.
10. What is CALEA and explain the four suggested capabilities it provides?
11. Explain the basic concept of communication.
12. What is the history of crime mapping?
13. Explain how crime mapping can track serial offenders.
14. How does one assess terrorist threats?
15. What is the maritime transportation anti-terrorism act?