An undercover investigation is the process used to acquire information without the individual or suspect knowing the true identity of the investigator
Indicate whether the statement is true or false.
True-- Prior to any interaction with a suspect, an investigator will perform reconnaissance on the individual. This background search involves building a profile about the suspect.
Computer Science & Information Technology
You might also like to view...
When you paste data from Word into PowerPoint, PowerPoint is referred to as the destination file
Indicate whether the statement is true or false
Computer Science & Information Technology
A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network ____________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology