1/39
LEAF Exam
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Crime Prevention Through Environmental Design (CPTED)
Uses urban and environment management to reduce crime.
Compare Statistics (COMPSTAT)
Crime data system focused on timely & accurate info, rapid deployment, effective tactics, and relentless follow-up.
Data-Driven Approaches to Crime and Traffic Safety (DDACTS)
Uses location-based date (crime, crashes, calls) to guide resource deployment. Place based, evidence-based model.
Problem-Oriented Policing (POP)
Solves underlying problems behind crime, especially in high-crime areas (“hot spots”).
Intelligence-Led Policing (ILP)
Uses intelligence to guide operations and tactics; supports any policing model.
Community Policing
Focuses on community partnerships, organizational transformation, and problem-solving to address crime, disorder, and fear proactively. Pre
Predictive Policing
Analyzes data to forecast and prevent future crimes; focuses on proactive over reactive strategies.
Creative Writing
Focuses on storytelling, characters, and literary techniques; common in fiction and poetry; engages imagination and emotions.
Expository Writing
Explains or informs with facts & evidence'; clear, concise, and focused on delivering information.
Analytical Writing
Examines topics in depth; answers “why?”, '“how”, and “so what?” to show reasoning behind conclusions.
Audience
Tailor tone, style, and detail based on who will read it- experts, public, or students.B
Bias
Personal opinions that affect objectivity; minimize in expository and analytical writing for clarity and fairness.
Errors
Grammatical, factual, or logical mistakes weaken writing.
Bulletin Writing
Brief and clear; prioritizes key info.
Information Organization
Logical flow and clear transitions improve readability and understanding.
Word Processors
Used for drafting and editing.
Presentation Tools
Create visual, interactive presentations to support your message.
SmartArt
Visual tools for showing ideas and data clearly in Word/PowerPoint.
Uniform Crime Reporting (UCR)
FBI program collecting summarized crime data from U.S. law enforcement.
National Incident-Based Reporting System (NIBRS)
Detailed, incident-level crime data including offense, time, location, victim, and offender info.
Be On The Look Out (BOLO)
Alert to officers/public to watch for a specific person, vehicle, or situation.
Computer-Aided Dispatch (CAD)
Manages real-time dispatch and service calls.
Records Management System (RMS)
Stores and manages law enforcement records and reports.Chai
Chain of Command
Defines reporting hierarchy to ensure order, communication, and accountability.
Key Elements of ILP: Executive Commitment & Involvement
Leadership support is critical for successful ILP implementation.
Key Elements of ILP: Collaboration and Coordination
Should occur at all levels of the agency, ensuring seamless communication.
Key Elements of ILP: Tasking and Coordination
Effective planning and resource allocation based on intelligence.
Collection, Planning, and Operation
Systematic gathering of intelligence, planning, and operational execution.
Analytic Capabilities
The ability to analyze intelligence to inform decisions and strategies.
Awareness. Education, and Training
Officers need to be aware of ILP practices and be trained to utilize intelligence effectively.
End-User Feedback
Feedback from those using the intelligence is essential for process improvement.
Reassessment of the Process
Continuous evaluation and adjustment of ILP strategies to maintain effectiveness.
Role of Analysts in ILP
Identifying trends and providing actionable intelligence to guide law enforcement operations. O
Organized Crime
Criminal activities carried out by groups with a structured hierarchy, operating over extended periods.
Human Trafficking
The illegal trade of people, typically of exploitation purposes such as forced labor or sex trafficking. `
Drug Trafficking
Involves the illegal production, transportation, and distribution of controlled substances.
Cybercrime
Refers to illegal activities that are carried out using computers or the internet, such as hacking, identity theft, and online fraud.
Environmental Crime
Illegal activities that harm the environment.
Wildlife Crime
Illegal activities such as poaching, the illegal trade of endangered species, and habitat destruction.
Timber Theft
Refer to the illegal logging of trees, often contributing to deforestation and loss of biodiversity.