Intel QA Flashcards
1.It is the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which is significant to police planning.
intelligence
2.It is an evaluated material of every description including those derived from observation, reports, rumors, imagery, and other sources from which intelligence are derived.
information
These are intelligence data that are not of an immediate value.
strategic intelligence
4.It is the exploration of sources of information by the collection agencies, and the delivery of the information obtained to proper intelligence unit.
collection
5.It is a repetitive process used to produce intelligence from information.
intelligence cycle
6.The reliability of the source is “highly reliable” and the accuracy of information is “confirmed information’ what will be the evaluation rating of the information.
A-1
7.He is the father of organized military espionage.
Frederick the Great
8.It is in this phase of intelligence cycle in which information becomes intelligence.
processing
9.It includes the systematic exploitation of all sources of information, and it must be methodical, continuous, and carefully controlled.
collection
10.Are those items of information regarding criminals or subversives, and that needs to be collected and/or processed in order to meet the intelligence requirements of police executives.
priority intelligence
- It is the timely conveyance of information and or intelligence in any appropriate form and by any suitable means.
dissemination
- It is the observation of a person, place or thing, generally—but not necessarily—in unobtrusive manner.
surveillance
13.Also called as a plant or fixed surveillance, here the surveillant remains essentially in one position or locale.
stakeout
14.The term roping described this situation, and it is said to be planted
shadow??? Or stakeout
15.The subject is kept under constant surveillance, and the aim is not to loose him even at the risk of being made.
close surveillance
16. It is a surveillance involving the use of scientific devices to enhance hearing or seeing the subject’s activities.
technical surveillance
17.To be detected or suspected of being surveillant by the subject.
Be made??? Or burnout
18.It is a devise which provides a means of systematic arrangement of information by type of subject.
intelligence workbook
19.It is not usually a major factor in prompting an individual to furnish information, but is can be potent at times.
gratitude
20. It is an individual who openly or secretly obtained or who assist in obtaining information for intelligence and counter-intelligence purposes.
informant
21. Individuals who are selected, trained and utilized as continuous covert sources of information concerning specific intelligence aspects.
recruited informant
22. Individuals who are simultaneously employed by two opposing intelligence agencies with one of the agencies aware of his dual role.
double agents
- It is a means by which individual, groups or organization conceals the true nature of its activities and existence from observer.
undercover assignment
24. It is an individual who provides information because of monetary consideration.
informer
25. It is an inquiry into the specific phases of an individual life history, including to a minimum, national agency check, character reference, and former employers.
national agency check
26.It is an inquiry into the loyalty, integrity, character, morale, and discretion of an individual because of the sensitive position he holds, or is about to assume.
personnel security investigation
27.This is an information or materials whose unauthorized disclosures would cause grave damage to the security.
Top Secret
28.When a surveillant’s behavior causes the subject to surmise or know that he or she is under surveillance.
burn the surveillance
29.This letter represent that the source of intelligence information is from tactical interrogation of captured enemy.
W
30. Information or material in any form, or of any nature, the safeguarding of which is necessary in the interest of national security.
classified matters
31. It is the act of changing the assigned classification of a document or material.
declassify
32. It is the assigning of an information or material to one of the four security classification.
classify
33. A properly trained and cleared individual who assist the head of the department in discharging the responsibilities of safeguarding classified documents and materials.
security officer
- It is the term given to the requirement to those persons whose official duty requires knowledge of possession thereof.
need-to-know
35.It is the granting of access to classified document or information.
compartmentation
37. Information or material the unauthorized disclosure of which would cause administrative embarrassment of unwarranted injury.
confidential
38.Information or material the unauthorized disclosure of which would endanger national security and will cause serious injury.
secret
39.Information or material the unauthorized disclosure of which would cause exceptionally grave damage to the nation.
top secret
40.It is any recorded information regardless of its physical form or characteristics.
document
41.Information or material in any form, the safeguarding of which is necessary in the interest of national security.
A. classified document
42.That aspect of police intelligence activities relating to all security measures, both offensive and defensive.
counter-intelligence
43.Counter intelligence measures that seek to conceal information from enemy.
passive-defensive
44.Counter intelligence measures that seek to block the enemy’s effort to engage in espionage, sabotage or subversion.
active-offensive
45.It encompasses measures taken by an office or group to protect itself against espionage, enemy observation, sabotage, or subversion.
police security
46.It encompasses active and passive counter-intelligence measures affecting civilians permanently or temporarily residing in an area under police or military jurisdictions.
civil security
47.It is the employment of active-counter intelligence techniques and procedures in the conduct of clandestine or covert operations.
special operation
48.It is the control and examination of communications to prevent the transmission of information that may fall to the hand of the enemy.
censorship
49.It includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty.
personnel security
50.It is an inquiry into the character, reputation, discretion and loyalty of an individual.
Personnel Security Investigation
51. It is any position within the government, police, military, the occupant of which could bring about by virtue of the position a material adverse effect to national security.
sensitive position
36.Information and material which requires special protection, and this not anymore required cover sheet.
Restricted
52.This is an investigation of an individual made upon the basis of written information supplied by him in an official inquiry.
national agency check
53.This is a type of investigation which consists of written inquiries sent to appropriate local government agencies.
local agency check
54.This is much more comprehensive investigation.
background investigation?
55.Consist of the investigation on the background of individual, particularly all the circumstances of his personal life.
complete background investigation
56.Consist of the investigation of the background of an individual, but limited only to some of the circumstances of his personal life.
Partial background investigation
57.It is valid for five years unless sooner revoked by the issuing authority.
final???
58.These are the purpose of police intelligence activity
- to reduce error
- to increase accuracy
- to help in decision making
59.It is primarily designed to enable the officer of unit to achieve and maintain a sound and effective security system.
security education.
60.This consists of initial briefing on security, its various aspects, and its importance and it is made to the new personnel and employees.
security indoctrination
61.It is the determination of the pertinence or significance of the information relative to police operations.
evaluation
62.The process of making conclusions from integrated intelligence and/or information.
deduction
63.It is the graphic representation of the current enemy situation.
situation map
63.It is the graphic representation of the current enemy situation.
1
64.A cautious surveillance, because the loss of the subject is preferred to possible exposure.
loose surveillance
65.A surveillance with little or not attempt at concealment, the subject is most likely aware of the surveillance, but must not be lost.
open surveillance
66.The subject is followed so closely that surveillant and subject are almost in lock step.
close surveillance?
67.A form of open surveillance in which the subject’s vehicle is closely followed.
Tail gaiting
68.Its functions is to serve as the intelligence and counter-intelligence operating unit of the Philippine National Police.
NICA?
69.It is a difficult one, in all cases it must be a close one or the person being followed will be lost.
One-man method
70.It is a close tail, with other members of the squad keeping contact with those immediately ahead of them.
Leaf frog method
71.This is close tail, and is necessary only when discovery is preferable to losing the subject.
1
72.It is the visual inspection of an area, installation or building to determine its suitability for operational activities.
Stake out
73.It is one of the principal activities of police intelligence operations, and limited activities on this will usually produce a limited intelligence product.
Iiaison activities
74.The intelligence operatives are being asked about his personal experiences and observations while conducting intelligence operations.
De-briefing
75.It is an important method of gathering intelligence data, and this is an excellent source of highly valuable material.
News clipping
76.Those assigned with the mission of obtaining information within a specific target.
penet informants
77.Those that is available for counter-intelligence mission at all times, and who may derive the major part of their income from their work as informants.
full time informants
78.Individuals who furnish information with no intention of repeating his services or furnishing information on a continuing basis.
incidental informants
79.A cover that is general in nature and relatively permanently adopted to explain the work presence in any given area.
cover for status
80.A cover designed to explain away or allow to perform a given clandestine activity, it may be an extension of cover for status.
cover for action
81.Agent’s must make sure that every public action he takes fits his assumed cover, and that a total picture presented to others accurately reflects his cover.
living one’s over
82.A cover which completely fits the true background and capabilities of the agent.
natural cover
83.Using true or actual personal background to fit for the purpose.
Natural cover
84.A cover using biographical data adopted for the purpose that is fictitious.
Artificial cover
85.It includes provisions for sufficient contact between the undercover agent, and the target of interest to produce worthwhile results.
Continuous contact
86.The cover story must include the material on all aspects of the undercover agent’s previous background, regardless of whether or not it is anticipated that this information will be required.
Mutual interest
87.Two kinds of opportunity must prevail if an individual is to function as an informant, most often and the rest of the time, it is provided by,
- chance
- propinquity
- proximity
88.The undercover agent is required to develop friendship and trust with the target personality for the purposes of obtaining information or evidence.
Personal contact
89.It places the undercover agent in a type of employment where he can observe the activities of the subject at his place of work.
social assignment
90.It is the process of evaluating the person’s suitability for a security clearance.
Adjudication process
91.This is a form required to an individual who is being processed for a security clearance.
personal hist statement
92.Those by virtue of their official positions are expected or obligated to furnish information openly.
Automatic informants
93.Individuals who by social or professional position, posses or has access to information of continuing interest.
Casual informants
94.This is a continuous and systematic program designed to meet the security needs of the office or unit.
Security indoctrination
95.This is a phase of security education program which makes use of security posters, slogans, signs and stickers.
Security reminders
96.This is a motive wherein persons hold belief inimical to their country, and they are of course vulnerable to the approach of the subversive groups or enemies.
Ideological benefits
97.On of the most powerful motivations that make people susceptible to pressure.
Weakness of character
98.It is an individual who accept every story at face value and can see no wrong in anyone, and they fall into this category.
Gullibility
99.Because of this, such a person, approached with the lure of a large sum of money is very vulnerable and a definite security risk.
Serious indebtedness
100.It is someone from the enemy side held as prisoner while the war is going on.
Internee