Download NC BLET STATE EXAM GUIDE 2025 and more Exams Law in PDF only on Docsity!
QUESTIONS; List four way to submit criminal fingerprint cards and final disposition reports to the Identification Section of the State Bureau of Investigation (SBD - ANSWER-Firsi Class Mail Courier Service In Person Electronic Transmission (live-scan) The most reliable form of identification - ANSWER-fingerprints Fingerprints arc the primary source for... - ANSWEF-Criminal Hislory Arcport of disposition and fingerprint cards should be sent to the AOC and then ta the SBI by who? - ANSWERClork of Court or Magistrate The amount of time a repor! of disposition and fingerprint cards should be sent 1a AOC and then to the SBI - ANSWER-60 days When to fingerprint and photograph - ANSWER-arrested or committed to detention facility committed to imprisonment upon conviction of a crime convicted of a felony person arrested for impaired driving or revoked license based on impaired driving and cannot be identified from a valid form of ID You can only photograph a person when... - ANSWER-they are cited for motor vehicle violation who cannot produce a valid ID (must be waist up and destroyed after final dispostion) To search for any fugitive warrants all applicant fingerprints are ran through... - ANSWER. NCIC When can you fingerprint a juvenile?- ANSWER-10+ years old committed a non-divertible offense complaint has been prepared for filing as a petition Juvenile is in custody of LEO or DJJ OR 10+ years old juvenile is adjudicated delinquent for a felony what are the two types of fingerprints taken - ANSWEFR-rolled prints (from nail to nail} plain for fixed impression (all 4 fingers printed at one time) 3 types of fingerprint patters - ANSWER-arch loop whorl 3 purposes of the officer's field notes - ANSWER-report writing evidence reference info for individuals descriptions 4 uses of law enforcement reports - ANSWER-record of officer's knowlede communications with others contains statistical information provides information to be used in other criminal investigations 2 .ypes of narratives - ANSWER-public confidential records not availible to the public - ANSWEF-juvenile records traffic accident reports body worn camera footage dashboard footage What is an interview conducted outside of the law enforcment ageny? (used for identificaiton, prevention and repression of crime and cetralized records of field contact) - ANSWER-field interview The questioning of a suspect IN-CUSTODY to gain cooperation and reveal the truth. - ANSWEF-intcrrogation An interview of person(s) in the arca surrounding a crime scene Lo idenuly potential wilne: ANSWER-canvass interview 6 essential questios that should be asked in every interview you conduct - ANSWER-who what when where why how 2 types of interview questions asked - ANSWEF-apen-ended questions closed ended questions open-ended questions are used to... - ANSWE-promote conversation gain descriptive information gain a narration of events prevent leading the interviewee and revealing case informatino close-ended questions are used to...- ANSWER-clarify particular points reslrick the interviewee’s opportunity Lo Lal requires a specific response when interviewing a suspect focus on... - ANSWER-eliminating or identifying the intrvi a suspect Violations that lead to the uncovering of human trafficking - ANS WER-domestic violence crime labor disputes prostitution and pimping offenses shoplifting cases of assault 2 wees of responses to human trafficking - ANSWER-rcaclive approach proactive approach When an officer uncovers elements of trafficking while ANSWERing other calls. - ANSWER. reaclive approach when an officer takes the initiative to identify places in the community where they suspect trafficking is occuring and begin to build a case against the traffickers in a covert manner. - ANSWER-proacuive approach N.C. G.S. 14-43.11 - ANSWER-Human Trafficking human trafficking victim resources - ANSWER-national human trafficking hotline leagal aid of NC social services T or U visa (must cooperate with law enforcement) local resources for human trafficking - ANSWERNCCAHT dept. of social services dept. of public health dept. of mental health domestic violence ans sexual assault services Law Enforcement recources for human trafficking - ANSWE)trafficking information and referral hotline FBI SBI ICE When law enforcement finds signs of human trafficking indirectly while responding to olher crimes - ANSWER-covert nature Who regulates hazardous waste operations, regulations and emergency response? - ANSWER. OSHA Who regulates lhe transfer and transportalion of hazardons malcrials by air, water, rail and highway? - ANSWER-DOT Routes of entry ( pathways by which hazardous materials get into the human body} - ANSWER- ingestion inhalation injecuon absorption 6 clues when assessing a hazmat scene - ANSWER-occupancy and location Categories of a weapon of mass destruction - ANSWER-B.N.I.C.E biological nuclear incendiary chemical explosive _ % of all terrorist attacks involve explosives - ANSWER- When responding to a bomb threat... - ANSWEF-proceed to the location as fast as possible avoid using radios or cell phones contact the person in charge P.A.S.S method for using a fire extinguisher - ANSWER-Pull Aim Squeeze Sweep When transporting hazardous material avoid... - ANSWER-narrow roads tunnels heavily populate areas crowded areas 3 basic elements to any crash - ANSWER-human vehicle environment When responding to a routine crash - ANSWEF-always emply safe driving technique (due regard for safety) activate lights and sirens uses shortes and quickest rout monitor radio traffic consider a “routine crash” could be the result of a fraudulent act When arriving on the scene of a traffic crash you must - ANSWEFR-protcct the public and scene preserve evidence locate, identify and interview divers, occupants and witnesses identify when additional assistance is needed Acrash is “reportable” if- ANSWER-death or injury to a human total propery damage of $1,000 or more property damage of any amount to a vehicle seized for DWI whild license revoked OR DWI with no license/no insurance Damage caused by direct contact with an object - ANSWER-contact damage damaged caused as a result of a vehicle reacting to being hit in a differnt area - ANSWER- induced damage any evidence reference points When investigating fatalities, homicides or serious personal injury of a traffic crash what information should you gather? - ANSWEF-prior activities of. alcohol use drug use medications illness lack of sleep 3 differenty categories of crowds - ANSWER-physical crowd psychological crowd mob These types of crowds have little to no organization and are characterized by density (usually at the mall or major festival-type events) - ANSWER-physical crowd 2 types of psychological crowds - ANSWER-sightseer or sightseeing crown expressive or agitated crown What are some tactics used for countering influences of crowd behavior? - ANSWER-verbalize the need for the crowd to disperse sock cooperalio explain actions that will be taken if group does not disperse allow a reasonable amount of time for crowd to disperse use photography and video call people by their names let them know the law have a back up team formed What are some lactics uscd for non-violent protestors - ANSWER identify the leader and open communications with them attend group meetings to gain intelligence use informants indentify local and out of town militants types of formations used for crowd management - ANSWERline wedge echelon diamon Special Impact Munitions are also referred to as - ANSWER-kinetic energy munitions highly visible patrol with random movement in marked cars (used to prevent crimes) - ANSWER. conspicuous patrol low visibility patrol in unmarked cars (used to apprehend) - ANSWER-inconspicuous patrol year make body all other info license plate DCIC includes what kinds of files and records - ANSWEF-rceovered vehicle files ne concealed handgun permit files ne scxual offender registration files ne department. of corrections records NCIC maintains files which provide access to...- ANSWER-stolen property recovered property wanted persons missing persons unidentified persons All felony warrents should be entered into - ANSWER-NCIC You have hours Lo submit a “missing person” report lo DCIN - ANSWER2 A “missing person” report is only maintained on not DCIN - ANSWERNCIC The swift and immediate deployment of law enforcement resources to ongoing, life-threatening situations where delayed deployment could otherwise result in death great bodily injury to innocent persons - ANSWEF-rapid deployment Atypes of situations that require immediate deployment - ANSWER-active shooter in a shool active shooter in a business hostage rescure injured officer/civilian rescues what is the mindset of law enforcement when responding to an active shooter - ANSWERsurroud and contain The mindsot of an active shooter - ANSWER-docs not plan to come oul. alive attack is planned history of gun use general motive is revenge many hold a grude idea of causing harm is decided well befor the incident What is the number 1 priority of law enforcement when responding to an active shooter - ANSWER-contain and stop the shoaler This team is responsible for locating, isolating and stopping the threat - ANSWEF-contact team This team is responsible for locating the injured, providing treatment, triage and evacuating if needed - ANSWEF-rescue team The unlawful use, or threatened use, of force or violence against individuals or property to coerce and intimidate governments or societies often to achieve political, religious, or ideological ohjecti The systematic use of terror especially as a means of coercion. A vehicle through which an extreme minority can coerce and challenge a majority that it could t openly on a field of battle. - ANSWERterrorism e of terrorism - ANSWER-to coerce and intimidate a government or its The main obj citizens into doin gwhal the Lerrorisis wants. Modern terrorists can use technology to - ANSWER-gather information on targets and weapons announce and promote their agendas targets and vulnerabilities for Lorrorist - ANS WER-skyscrapers nuclear plants football fields national monuments (Statue of Liberty, Big Ben ete.) jowish organizalions airports major public gatherings targets to cause thousands of deaths enemy personnel places of amusement What is the most vulnerable target for terrorist in NC?- ANSWER-agriculture 6 major threats specific to NC - ANSWER-agriculture military installations transportation infrastructures banking and finacial infrastructures nuclear power plants citizens An alert advisory system that informs the public of potential threats to the community. - ANSWERNTAS National Terrorist Advisory System 2 types of terrorist threats - ANSWER-imminent threat elevated threat. This threat warns of credible, specific and impeding terrorist threat against the US. - ANSWER- imminent threat This threat warns of credible terrorist threat against the US. - ANSWERelevated threat Aspecific date and time the alert expires - ANSWER-sunset provision What are some indicators of terrorist activity - ANSWE?. loitering around sensitive areas theft or unusual sale of large numbers of semiautomatic weapons