15.
What is the proper procedure for dealing with sources of information?
A.
Pay all sources for the information they pass on.
B.
Develop sources from all walks of life.
C.
Overlook a source's petty crimes as long as
he
is
supplying
information of a worthwhile nature.
D.
Promise anonymity to all sources who request it.
16.
What names should the CID/MPI source file contain?
A.
Only confidential sources.
B.
Open, confidential, and registered sources especially.
C.
Only paid sources.
D.
Only military sources.
17.
To whom should access to the CID/MPI source file be limited?
A.
Only the detachment's CID personnel.
B.
C.
Only the detachment commander.
D.
Investigators who have a need to know.
2-25
MP0100