Intel Reviewer Flashcards

1
Q

Accuracy ofInformation

A
1 - Confirmed By Other Sources
2 - Probably True
3 - Possibly True
4 - Doubtfully True
5 - Improbable
6 - Truth Can Not Be Judged
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • A Greek Conqueror, was able to identify those who are disloyal to him by ordering the opening of communication
    letter of his men and was successful in uplifting the esprit de corps and morale of his men.
A

AlexanderThe Great

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Primary responsibility is gathering intelligence from mainly Asian and Pacific interest using agents stationed in wide variety of areas. Its main purpose like other most agencies is to protect the country’s political and economic interest and ensure the safety of its citizens against national threats.
A

ASIS-

Australian Secret IntelligenceService

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • is the foreign intelligence agency of the German government, the BND act as the early warning system to alert the German government against threats to its interest coming from abroad.
A

Bundesnachrichtendienst- BND, Federal IntelligenceService

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Categoriesof Intelligence

A
  1. National Intelligence
  2. Departmental Intelligence
  3. Military Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • integrated product of intelligence developed by all government departments concerning the broad aspect of national policy and national security.
A
  1. National Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • the intelligence required by the department or agencies of the government to execute its mission and discharge its responsibilities.
A
  1. Departmental Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • refers to the knowledge by the military institution essential in the preparation and execution of military plans, policies and programs.
A
  1. Military Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • is the civilian intelligence agency

of the USA. It is the largest intelligence agency in the world.

A

CIA -Central Intelligence Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classificationsof Documents

A
  1. Top Secret
  2. Secret
  3. Confidential
  4. Restricted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • calls for the utmost degree of protection, Unauthorized revelation of this materials andinformationwill cause extremely severe damage to the nation, politically, economically, or militarily.
A
  1. Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • unauthorized disclosure of this documents or things may put at risk the national security, cause serious injury to the reputation of the nation.
A
  1. Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Unauthorized revelation of which may be injurious to the reputation of the nation or governmental activity or will cause administrative humiliation or unnecessary injury
A
  1. Confidential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • this areinformationwhich should not be published or communicated to anyone except for official purposes. These records are daily files, routine in nature even if lost or destroyed will not affect operation or administration.
A
  1. Restricted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Classificationof Sources ofInformation

A
  1. Open Sources- 99% of the information collected are coming from open sourcesor obtained from overt operation.
  2. Close Sources - only 1% ofinformationare obtained from covert operation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Elements of Clandestine Operation

A
  1. Sponsor
  2. Target
  3. Agent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • directs the organization conducting the clandestine activity.
A
  1. Sponsor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • person, place or things against which the clandestine activity is to be conducted.
A
  1. Target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • refers to a person who conducts the clandestine operations,includesprincipal agents, action agents, and support agents.
A
  1. Agent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • leader or management agent in clandestine operation usually undertaken by the case officer.
A

Principal Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • one who conducts the clandestine operation thatincludes:
    a. EspionageAgent - agent who clandestinely procure or collectinformation.
    b. Propagandist - agents who molds the attitudes, opinions and actions of an individual group or nation.
A

Action Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • agent who is engaged in activities which supports the clandestine operations thatincludesthe ff:
    a. Surveillant - agent who observes persons and places of operation of interest.
    b. Investigator - agent who undertakes to procure informationor things of clandestine operation.
A

Support Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • agent who obtains money when needed for operational use.
A

Procurer of Funds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • agents who manages and maintains a safe house for clandestine operations like meetings, safe heavens, training, briefing and debriefing.
A

Safe House Keeper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • agent who is detailed to secure clandestine communications.
A

Communication Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • the changing of message from plain clear text to unintelligible
    form, also known as encrypting.
A

Coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • transforming of coded message into plain text, also known as decrypting.
A

Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  • phase of intelligence covering the activity devoted in destroying the effectiveness of hostile foreign activities and the protection ofinformationagainstespionage, subversion and sabotage.
A

Counter Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Types of Counter Intelligence

A
  1. Passive CI Measures

2. ActiveCI Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • protection of classified and sensitive informationagainst unauthorized access through secrecy, communication security and other safeguard
A
  1. Passive CI Measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • are those measures which seek actively to block enemies effort to gaininformationor engage in espionage, subversion and sabotage.
A

2.ActiveCI Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Categoriesof Counter Intelligence Operations

A
  1. Military Security
  2. Port Boundary and Travel Security
  3. Civil Security
  4. Special Operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  • it encompasses the measures taken by command to protect itself againstespionage, enemy operation, sabotage, subversion, or surprise.
A
  1. Military Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  • application of both military and civil security measures for counter-intelligence control at point of entry and departure, international borders and boundaries.
A
  1. Port Boundary and Travel Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

-activeand passive counter-intelligence measures affecting the non-military nationals permanently or temporarily residing in an area under military jurisdiction.

A
  1. Civil Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  • counter subversion, sabotage andespionage.
A
  1. Special Operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Objectives of Counter-Intelligence

A
  1. It deniesinformationto the enemy
  2. It reduces the risk of a command
  3. Aid in achieving surprises
  4. Increases the security of the command
  5. Decrease the ability of the enemy to createinformationabout he forces.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Functions/Activities of Counter-Intelligence

A
  1. Protection ofInformationagainstespionage
  2. Protection of personnel against subversion
  3. Protection of installations and materials against sabotage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  • arts and science of codes and ciphers.
A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  • refers to those persons who break intercepted codes.
A

Crypto Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  • refers to a person who is highly skilled in converting message from clear to unintelligible forms by use of codes and ciphers.
A

Cryptographer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  • a biblical personality, she was able to gaininformation
    by using her beauty and charm, she was responsible for the fall of
    Samson, a known Israelite leader and enemy of the Philistines.
A

Delilah

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  • Father of organized militaryespionage.
A

Frederick The Great

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

is the main domestic security agency of the Russian Federation, and the main successor of the Cheka, NKVD and the KGB.

A

FSD- Federal SecurityServiceof the Russian Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  • France external intelligence agency, operating under the direction of the french Ministry of Defense.
A

General Directorate For External Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
  • any person who hand overinformationto the agents which is relevant to the subject.
A

Informants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Type of Informants

A
  1. Anonymous - unidentified or unknown informants.
  2. False Informant-revealsinformationof no consequences or value.
  3. Frightened Informants - weakest link in criminal chain, motivated by anxiety.
  4. Self-Aggrandizing - moves around the the center of criminals delight in surprising the police about bits ofinformation.
  5. Mercenary -informationfor sale, needed something for exchange ofinformation.
  6. Double Crosser - wants to get moreinformationfrom the police more than what he gives.
  7. Women Informant - most dangerous type of informant.
  8. Legitimate - operators of business.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
  • unidentified or unknown informants.
A
  1. Anonymous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

-revealsinformationof no consequences or value.

A
  1. False Informant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  • weakest link in criminal chain, motivated by anxiety.
A
  1. Frightened Informants
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  • moves around the the center of criminals delight in surprising the police about bits ofinformation.
A
  1. Self-Aggrandizing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

-informationfor sale, needed something for exchange ofinformation.

A
  1. Mercenary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  • wants to get moreinformationfrom the police more than what he gives.
A
  1. Double Crosser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
  • most dangerous type of informant.
A
  1. Women Informant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
  • operators of business.
A
  1. Legitimate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Motives of Informants

A
  1. Vanity - conceited act/character of the criminal resulting to self betrayal or tantamount to guilt, gaining favorable attention and importance by the police.
  2. Civic-Mindedness - sense of duty and obligation to assist the police.
  3. Fear - a person under an illusion of oppression by enemies or of other impending danger.
  4. Repentance - one who has a change of heart and wishes to report a crime that is preying on his conscience.
  5. Gratitude or Gain - an expression of appreciation to obtain a privilege or an interest in the welfare of his family during his detention
  6. Revenge - to settle a grudge due to settle a previous injury.
  7. Jealousy - envious of the accomplishments or possessions of another and wishes to humiliate him.
  8. Remuneration - a person who informs solely for the pecuniary or other material gain he is to receive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
  • conceited act/character of the criminal resulting to self betrayal or tantamount to guilt, gaining favorable attention and importance by the police.
  • Motives of Informants
A
  1. Vanity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
  • sense of duty and obligation to assist the police.

- Motives of Informants

A
  1. Civic-Mindedness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
  • a person under an illusion of oppression by enemies or of other impending danger.
  • Motives of Informants
A
  1. Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
  • one who has a change of heart and wishes to report a crime that is preying on his conscience.
  • Motives of Informants
A
  1. Repentance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
  • an expression of appreciation to obtain a privilege or an interest in the welfare of his family during his detention
  • Motives of Informants
A
  1. Gratitude or Gain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
  • to settle a grudge due to settle a previous injury.

- Motives of Informants

A
  1. Revenge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
  • envious of the accomplishments or possessions of another and wishes to humiliate him.
  • Motives of Informants
A
  1. Jealousy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
  • a person who informs solely for the pecuniary or other material gain he is to receive.
  • Motives of Informants
A
  1. Remuneration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
  • refers to any person who provides information to the agents
    in a regular basis regarding a subject, they are paid either on a regular or case to case basis.
A

Informers

66
Q
  • the organized effort to collect information, to assist it Little by little, and piece it together until it forms larger and clear pattern.
A

(intelligence as an activity)

67
Q
  • the end product resulting from the collection, evaluation, analysis, integration and interpretation of all available information which may have immediate or potential significance to the development and execution of plan, policies and programs of the user.
A

(intelligence as a product)

68
Q
  • an institution composed of person who prepares a plan

or formulating policies.

A

(intelligence as an institution)

69
Q

Intelligence Cycle

A
  1. Planning
  2. Collection
  3. Processing
  4. Dissemination
70
Q
  • the intelligence officer must have a thorough knowledge of the available sources of information, the collecting agencies and type of information the latter can provide.
A

Planning

71
Q
  • the intelligence officer must have thorough knowledge of the available sources of information and collecting agencies and the type of information they can provide and consider the following:
    a. Determine collecting agency
    b. Send orders or request
    c. Supervise collection efforts
    d. Use tools or techniques in collection
    e. Ensure timely collection
A

Collection

72
Q

Factors in Choosing Collection Agents

A

a. Capability - agents placement or access to target
b. Multiplicity - more agents
c. Balance

73
Q

Processing - Five Steps

A
  1. Recording - is the reduction of information in writing or other form of graphical representation and arranging the information into groups of related items.
  2. Evaluation - is the determination of the pertinence of the information to the operation, reliability of the source or agency and the accuracy of the information.
    Pertinence - does it holds some value to current operation.
    Reliability - judging the source of information or agency
    Credibility - truth of information
  3. Analysis - is the stage in which the collected information is subjected to review in order to satisfy significant facts and derive conclusions there from.
  4. Integration - the combination of the elements isolated analysis with other known information related to the operation.
  5. Interpretation - process of determining the significance of new information and its meaning.
74
Q
  • is the reduction of information in writing or other form of graphical representation and arranging the information into groups of related items.
A
  1. Recording
75
Q
  • is the determination of the pertinence of the information to the operation, reliability of the source or agency and the accuracy of the information.
A
  1. Evaluation

Pertinence - does it holds some value to current operation.
Reliability - judging the source of information or agency
Credibility - truth of information

76
Q
  • is the stage in which the collected information is subjected to review in order to satisfy significant facts and derive conclusions there from.
A
  1. Analysis
77
Q
  • the combination of the elements isolated analysis with other known information related to the operation.
A
  1. Integration
78
Q
  • process of determining the significance of new information and its meaning.
A
  1. Interpretation
79
Q
  • processed information or intelligence data are disseminated to end users, common methods of disseminating intel data are conferences, briefing and person to person exchanges. In this process, consider the factors of timeliness, correctness and security.
A

Dissemination

80
Q

Pakistan’s premier intelligence

agency. It was established in 1948. Its office is located in Islamabad.

A

ISI- Inter-Services Intelligence

81
Q
  • in his time, the staff of each legion includes ten speculators who served as an information collecting agency. The Speculators were the first intelligence personnel to appear in military organization. Military success of the Romans was aided by the communication system. Made use of pigeons as carrier which made
    intelligence transmittal very fast.
A

Julius Caesar

82
Q
  • known as Napoleon’s Eye, he was credited for establishing counter-intelligence against spies. He is a master of deceit who used black mail to obtain vital information to identify
    the enemy’s of Napoleon.
A

Karl Schulmeister

83
Q

Kinds of Covert Operation

A
  1. Surveillance - is the covert, discreet observation of people and places for the purpose of obtaining information concerning the identities or activities of subjects.
  2. Casing - it is the careful inspection of a place to determine its suitability for a particular operational purpose.
  3. Elicitation - the process of extracting information from a person believe to be in possession of vital information without his knowledge or suspicion.
  4. Employment of Technical Means
    Bugging - the use of an equipment or tool to listen and record discreetly conversation of other people.
    Wiretapping - a method of collecting information through interception of telephone conversation.
  5. Tactical Interrogation - it is the process or method of obtaining information from a captured enemy who is reluctant to divulge information.
  6. Observation and Description - it is a method of collecting information by just merely using the different senses.
84
Q
  • is the covert, discreet observation of people and places for the purpose of obtaining information concerning the identities or activities of subjects.
A
  1. Surveillance
85
Q
  • is the plainclothes investigator assigned to make the observation.
A

Surveillant

86
Q
  • can be a person, place, property and vehicle, group of people, organization, or object.
A

Subject

87
Q
  • refers to place where agents meet each other for purposes of debriefing and reporting.
A

Safe house

88
Q
  • refers to a place where agents or informants leave their messages to the other agents.
A

Live Drop

89
Q
  • a person or object used by the subject in an attempt to elude the surveillant.
A

Decoy

90
Q
  • an associate of the subject who follows him to detect surveillance.
A

Convoy

91
Q
  • chronological records of activities that took place in the establishment under surveillance.
A

Log

92
Q

Methods of Surveillance

A
  1. Stationary Surveillance - also referred to as Fixed or Stakeout Surveillance - is used when you know or suspect that a person is at or will come to a known location, when you suspect that stolen goods are to be dropped or when informants have told you that a crime is going to be committed.
  2. Moving Surveillance/Shadowing/Tailing - simply the act of following a person.
93
Q
  • is used when you know or suspect that a person is at or will come to a known location, when you suspect that stolen goods are to be dropped or when informants have told you that a crime is going to be committed.
A
  1. Stationary Surveillance - also referred to as Fixed or Stakeout Surveillance
94
Q
  • simply the act of following a person.
A
  1. Moving Surveillance/Shadowing/Tailing
95
Q

Forms of Shadowing/Tailing

A
  1. Loose Tail - employed where a general impression of the subject’s habits and associates is required.
  2. Rough Shadowing - employed without special precautions, subject maybe aware of the surveillance, employed also when the subject is a material witness and must be protected from harm or other undesirable influences.
  3. Close Tail - extreme precautions are taken against losing the subject is employed where constant surveillance is necessary
96
Q
  • employed where a general impression of the subject’s habits and associates is required.
A
  1. Loose Tail
97
Q
  • employed without special precautions, subject maybe aware of the surveillance, employed also when the subject is a material witness and must be protected from harm or other undesirable influences.
A
  1. Rough Shadowing
98
Q
  • extreme precautions are taken against losing the subject is employed where constant surveillance is necessary
A
  1. Close Tail
99
Q
  • it is the careful inspection of a place to determine its suitability for a particular operational purpose.
A
  1. Casing
100
Q
  • the process of extracting information from a person believe to be in possession of vital information without his knowledge or suspicion.
A
  1. Elicitation
101
Q
  • the use of an equipment or tool to listen and record discreetly conversation of other people.
A
  1. Employment of Technical Means Bugging
102
Q
  • a method of collecting information through interception of telephone conversation.
A

Wiretapping

103
Q
  • it is the process or method of obtaining information from a captured enemy who is reluctant to divulge information.
A
  1. Tactical Interrogation
104
Q
  • it is a method of collecting information by just merely using the different senses.
A
  1. Observation and Description
105
Q
  • all evaluated materials of every description including those derived from observation, reports, rumors, imagery and other sources from which intelligence is produced.
A

Information

106
Q

Types of Agents Used in Collecting Information

A
  1. Agent of Influence - agent who uses authority to gain information
  2. Agent in Place - agent who has been recruited within a highly sensitive target
  3. Penetration Agent - agent who have reached the enemy, gather information and able to get back without being caught.
  4. Expendable Agent - agent who leaks false information to the enemy.
  5. Double Agent - an enemy agent who has been taken into custody turned around and sent back where he came from as an agent of his captors.
107
Q
  • agent who uses authority to gain information
A
  1. Agent of Influence
108
Q
  • agent who has been recruited within a highly sensitive target
A
  1. Agent in Place
109
Q
  • agent who have reached the enemy, gather information and able to get back without being caught.
A
  1. Penetration Agent
110
Q
  • agent who leaks false information to the enemy.
A
  1. Expendable Agent
111
Q
  • an enemy agent who has been taken into custody turned around and sent back where he came from as an agent of his captors.
A
  1. Double Agent
112
Q

supplies the British government

of foreign intelligence.

A

MI6- Secret Intelligence Service

113
Q

is the security agency of the

Peoples Republic of China

A

MSS- Ministry of State Security

114
Q

Tasked with monitoring an
organization or individual. A _____ can spend years in the same place
only responding to missions when assigned. They are trained to be visible but to keep their motives unknown.

A

Mole- also known as sleeper agent.

115
Q

is responsible for the intelligence collection and covert operation of
the Israel government, Its Director reports directly to the Israel Prime Minister. It is one of the entities of the Israeli
intelligence community along with AMAN (Military Intelligence) and SHIN BET (Internal Security)

A

Mossad- Institute for Intelligence and Special Operations

116
Q
  • sent 12 scouts to the land of Canaan to survey the land,

the people, their location and the nature of their cities.

A

Moses

117
Q

the primary intelligence gathering arm of the Philippines. Its motto is Knowledge is Safety. It is headed by a Director General and is assisted by a Deputy Director General. The Director General reports directly to the President of the Philippines.

A

NICA- National Intelligence Coordinating Agency

118
Q

______issued on February 1, 2006, ordered the NICA to activate the National Maritime Aerial Reconnaissance and Surveillance Center or NMARSC. The NMARSC shall serve as the primary intel provider for the Philippine intelligence community. Under the supervision and oversight of the National Security Adviser, the NICA-NMARSC will operate unmanned aerial vehicles or UAV’s to cater to the imagery intelligence demands of various government agencies.

A

EO 492

119
Q
  • the end product resulting from the collection, evaluation, analysis, integration and interpretation of all available
    information regarding the activities of criminals and other law violators for the purpose of effecting their arrest, obtaining evidence
    and prevent plan to commit crimes.
A

Police Intelligence

120
Q

Categories of Police Intelligence

A
  1. Strategic Intelligence - knowledge pertaining to the capabilities and vulnerabilities of a foreign nation which is required by the national planners for the formulation of an adequate national defense. Intelligence is for long range
  2. Counter-Intelligence - preparation and execution of plans and programs to neutralize or prevent any activities undesirable to the police organization.
  3. Line or Tactical Intelligence - intelligence information directly contributes to the accomplishment of specific objectives and immediate in nature and necessary for more effective police planning and operation.
121
Q
  • knowledge pertaining to the capabilities and vulnerabilities of a foreign nation which is required by the national planners for the formulation of an adequate national defense. Intelligence is for long range
A
  1. Strategic Intelligence
122
Q
  • preparation and execution of plans and programs to neutralize or prevent any activities undesirable to the police organization.
A
  1. Counter-Intelligence
123
Q
  • intelligence information directly contributes to the accomplishment of specific objectives and immediate in nature and necessary for more effective police planning and operation.
A
  1. Line or Tactical Intelligence
124
Q

Components of Strategic Intelligence

A
  1. Political Intelligence - deals with domestic and foreign affairs and relations of government operations.
  2. Economic Intelligence - deals with the extent and utilization of natural and human resources to the industrial potential of the nation.
  3. Transportation and Telecommunication intelligence - concerned with the operations and facilities of the military and civilians.
125
Q
  • deals with domestic and foreign affairs and relations of government operations.
A
  1. Political Intelligence
126
Q
  • deals with the extent and utilization of natural and human resources to the industrial potential of the nation.
A
  1. Economic Intelligence
127
Q
  • concerned with the operations and facilities of the military and civilians.
A
  1. Transportation and Telecommunication intelligence
128
Q

Functional Classification of Police Intelligence

A
  1. Criminal Intelligence - refers to the knowledge essential to the prevention of crimes and the investigation, arrest and prosecution of criminal offenders.
  2. Internal Security Intelligence - refers to the knowledge essential to the maintenance of peace and order.
  3. Public Safety Intelligence - refers to the knowledge essential to ensure the protection of lives and properties.
129
Q
  • refers to the knowledge essential to the prevention of crimes and the investigation, arrest and prosecution of criminal offenders.
A
  1. Criminal Intelligence
130
Q
  • refers to the knowledge essential to the maintenance of peace and order.
A
  1. Internal Security Intelligence
131
Q
  • refers to the knowledge essential to ensure the protection of lives and properties.
A
  1. Public Safety Intelligence
132
Q

Principles of Intelligence

A
  1. Intelligence and Operation are interdependent
  2. Intelligence is continuous
  3. Intelligence must be useful
  4. Intelligence operation requires imagination and foresight
  5. intelligence must be available on time
  6. Intelligence must be flexible
  7. Intelligence requires continuous security measures
133
Q
  • is India’s external intelligence
    agency. Its primary function is collection of external intelligence,
    counter-terrorism and covert operations.
A

RAW- Research and Analysis Wing

134
Q

Reliability of Information

A
A - Completely Reliable
B - Usually Reliable
C - Fairly Reliable
D - Not Usually Reliable
E - Unreliable
F - Reliability Can Not Be Judge
135
Q
  • is a certification by a responsible authority that the person described is clear to access and classify matters at appropriate levels.
A

Security Clearance

Interim Clearance - effective for 2 years.
Final Clearance - effective for 5 years.

136
Q

Security Measures and Operations in Relation To Intelligence

A
  1. Physical Security - the broadest type of security that is concerned with the physical measures designed to safeguard personnel and prevent unauthorized access to equipment, facilities, materials, documents and to protect them from espionage, sabotage, damage, or theft.
  2. Communication Security - the protection resulting from the application of various measures which prevent or delay the enemy or unauthorized person in gaining information through communication. This includes transmission, cryptographic and physical security.
  3. Documentary Security - protection of documents, classified matters and vital records from loss, access to unauthorized persons, damage, theft and compromise through proper storage and procedure.
  4. Personnel security - the sum total procedures followed, inquiries conducted and criteria applied to determine the work suitable to a particular applicant or the retention or transfer of a particular employee.
137
Q
  • the broadest type of security that is concerned with the physical measures designed to safeguard personnel and prevent unauthorized access to equipment, facilities, materials, documents and to protect them from espionage, sabotage, damage, or theft.
A
  1. Physical Security
138
Q
  • the protection resulting from the application of various measures which prevent or delay the enemy or unauthorized person in gaining information through communication. This includes transmission, cryptographic and physical security.
A
  1. Communication Security
139
Q
  • protection of documents, classified matters and vital records from loss, access to unauthorized persons, damage, theft and compromise through proper storage and procedure.
A
  1. Documentary Security
140
Q
  • the sum total procedures followed, inquiries conducted and criteria applied to determine the work suitable to a particular applicant or the retention or transfer of a particular employee.
A
  1. Personnel security
141
Q
  • is an inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual in order to determine a person’s suitability for appointment and access to classified matters.
A

Personnel Security Investigation

142
Q

Types of PSI

A
  1. Local Agency Check - refers to the investigation of the records and files of agency in the area of principal residence of the individual being investigated: Mayor, Police, Fiscal where the individual is a resident.
  2. National Agency Check - it consist of LAC supplemented by investigation of the records and files of the following agencies: PNP. ISAFP, NBI, CSC, Bureau of Immigration and other agencies.
  3. Background Investigation - a check made on an individual usually seeking employment through subject’s records in the police files, educational institutions, place of residence and former employers.
143
Q
  • refers to the investigation of the records and files of agency in the area of principal residence of the individual being investigated: Mayor, Police, Fiscal where the individual is a resident.
A
  1. Local Agency Check
144
Q
  • it consist of LAC supplemented by investigation of the records and files of the following agencies: PNP, ISAFP, NBI, CSC, Bureau of Immigration and other agencies.
A
  1. National Agency Check
145
Q
  • a check made on an individual usually seeking employment through subject’s records in the police files, educational institutions, place of residence and former employers.
A
  1. Background Investigation
146
Q
  • a type of BI which is more comprehensive, it consist of detailed information regarding the subject.
A

Complete Background Investigation

147
Q
  • investigation of the background of an individual but limited only to some of the circumstances.
A

Partial Background Investigation

148
Q
  • author of the art of war.
A

Sun Tzu

149
Q
  • is disguising one’s
    own identity or using an assumed identity for the purpose of gaining the trust of an individual or organization to learn secret information or to gain the trust of targeted individuals in order to gain information or evidence.
A

Undercover Operation- also called Roping

150
Q
  • it refers to the changing, forging, or falsifying agent’s real personality including but not limited to things, location, job and others that will be used in undercover assignments.
A

Cover

151
Q

Types of Cover

A
  1. Artificial -altering the background that will correspond to the operation.
  2. Multiple - includes different cover
  3. Natural - actual or true background
152
Q

-altering the background that will correspond to the operation.

A
  1. Artificial cover
153
Q
  • includes different cover
A
  1. Multiple cover
154
Q
  • actual or true background
A
  1. Natural cover
155
Q

Hazards of Undercover Operations

A
  1. Reintegration back to normal duty

2. Maintenance of identity

156
Q

Uses and Types of Undercover Assignment

A
  1. Residential Assignment - it is related to the neighborhood of the subject, where the agent will live as a new resident without making any suspicion. His mission is to make friends within its neighborhood and gather information regarding the subject and possibly getting closer to the subject.
  2. Social Assignment - the agent will gain access to the subject by going to the different hangout places of the subject and gather information like knowing how to drink socially without getting drunk.
  3. Work Assignment - the agent will be employed where the subject work to acquire information. The agent must know his work and focus his mind set and habit to his work assignment
  4. Subversive Organization - this is the most dangerous of all the undercover assignment, the agent will join the organization of the subject itself, he must know the ideologies of the group and the actions while inside should conform to the organization to avoid any suspicion.
157
Q
  • it is related to the neighborhood of the subject, where the agent will live as a new resident without making any suspicion. His mission is to make friends within its neighborhood and gather information regarding the subject and possibly getting closer to the subject.
A
  1. Residential Assignment
158
Q
  • the agent will gain access to the subject by going to the different hangout places of the subject and gather information like knowing how to drink socially without getting drunk.
A
  1. Social Assignment
159
Q
  • the agent will be employed where the subject work to acquire information. The agent must know his work and focus his mind set and habit to his work assignment
A
  1. Work Assignment
160
Q
  • this is the most dangerous of all the undercover assignment, the agent will join the organization of the subject itself, he must know the ideologies of the group and the actions while inside should conform to the organization to avoid any suspicion.
A
  1. Subversive Organization