An undercover investigation is the process used to acquire information without the individual or suspect knowing the true identity of the investigator

Indicate whether the statement is true or false.

True-- Prior to any interaction with a suspect, an investigator will perform reconnaissance on the individual. This background search involves building a profile about the suspect.

Computer Science & Information Technology

You might also like to view...

When you paste data from Word into PowerPoint, PowerPoint is referred to as the destination file

Indicate whether the statement is true or false

Computer Science & Information Technology

A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology