Sei sulla pagina 1di 94

POLICE

INTELLIGENCE
• Police intelligence - used in the
preparation and execution of police plans,
polices and programs.
• Intelligence - product resulting from the
collection, evaluation analysis, integration
and the interpretation of all available
information.
- is a processed information.
Data + analysis = Intelligence
Information - unprocessed information or
raw data/Knowledge in raw form.
• Principles of Intelligence
1. Intelligence and Operation are
interdependent
2. Intelligence is continuous
3. Intelligence must be useful
4. Intelligence operation requires imagination
and foresight
5. intelligence must be available on time
6. Intelligence must be flexible
7. Intelligence requires continuous security
measures
Four Axioms of intelligence
      1. Intelligence is crucial to intel
security
      2. Intelligence is crucial to all types
of operations
      3. Intelligence is the responsibility
of all intelligence agencies
      4. Intelligence of the government
must be superior to that of the enemy.
HISTORY
• Moses sent spies to canaan in order to know the strength of their
enemy.

• Rahab - assisted Israelite spies by hiding them from the local


authorities. The spies, in return for her protection, promised to
save her and her family during the planned military invasion as
long as she fulfilled her part of the deal by keeping the details of
the contact with them secret and leaving a sign on her residence
that would be a marker for the advancing soldiers to avoid. She
kept her word by hiding the spies when the city guard came to her
house looking for them; the Israelites kept their word by sparing
her family from the general massacre after taking the city: they
recognized Rahab's house by a red cord hanging from her window.
HISTORY
• Delilah was approached by the lords of the Philistines, to discover
the secret of Samson's strength, "and we will give thee every one
of us eleven hundred pieces of silver". Three times she asked
Samson for the secret of his strength, and three times he gave her
a false answer. First he told her "If they bind me with seven green
withes that were never dried, then shall I be weak, and be as
another man.". Then he told her "If they bind me fast with new
ropes that never were occupied, then shall I be weak, and be as
another man.". A third time he told her "If thou weavest the seven
locks of my head with the web". On the fourth occasion he gave
her the true reason: that he did not cut his hair in fulfillment of a
vow to God.
HISTORY

• Sun Tzu was an ancient Chinese military general and


strategist who is traditionally believed to have authored The
Art of War, an influential ancient Chinese book on military
strategy considered to be a prime example of Taoist
thinking. Sun Tzu has had a significant impact on Chinese
and Asian history and culture, both as an author of The Art
of War and through legend. During the 19th and 20th
centuries, Sun Tzu's The Art of War grew in popularity and
saw practical use in Western society, and his work has
continued to influence both Asian and Western culture and
politics.
HISTORY

• Alexander III of Macedon popularly known as Alexander the Great


was a Greek king who created one of the largest empires in
ancient history. Alexander received a classical Greek education
under the tutorship of famed philosopher Aristotle, Alexander is
one of the most famous figures of antiquity, and is remembered
for his tactical ability, his conquests, and for spreading Greek
civilization into the East.

• Frederick the Great – father of organized military espionage.

• State Informers – originated during the reign of Edward I of


England in the 15th century were rewards were given to those
who can report authors seditious writing.
HISTORY
• Walsingham – the father of the national secret
service, as the protector of queen Elizabeth I
• Karl Schulmeister and Demarest – develop the
concept of counter-intelligence or spying the spy.
• Allan Pinkerton – U.S. first Chief of Secret Service.
• Cabeza de Barangay – head of the settlers who
appointed eyes and ears of his community.
• Luke E. Wright – father of Philippine Constabulary
• Col. Henry Allen – first chief of the Philippine
Constabulary
• Rafael Crame – the first head of the intelligence
division of the Philippine Constabulary
• Classification of Sources of Information
1. Open Sources - 99% of the information
collected are coming from open sources or
obtained from overt operation.

2. Close Sources - only 1% of information


are obtained from covert operation.
• Elements of Clandestine Operation
      1. Sponsor - directs the organization conducting the clandestine
         activity.
      2. Target - person, place or things against which the
         clandestine activity is to be conducted.
      3. Agent - refers to a person who conducts the clandestine
         operations, includes principal agents, action agents,
         and support agents.

            Principal Agent - leader or management agent in clandestine


            operation usually undertaken by the case officer.

            Action Agent - one who conducts the clandestine operation


            that includes:
               a. Espionage Agent - agent who clandestinely procure or
                  collect information.

               b. Propagandist - agents who molds the attitudes, opinions


                  and actions of an individual group or nation.
• Support Agent - agent who is engaged in activities which
            supports the clandestine operations that includes the ff:
               a. Surveillant - agent who observes persons and places
                  of operation of interest.
               b. Investigator - agent who undertakes to procure
                  information or things of clandestine operation.

            Procurer of Funds - agent who obtains money when needed


            for operational use.

            Safe House Keeper - agents who manages and maintains a safe


            house for clandestine operations like meetings, safe heavens,
            training, briefing and debriefing.

            Communication Agent - agent who is detailed to secure


            clandestine communications.          
• Coding - the changing of message from plain clear text to unintelligible
form, also known as encrypting.

      Decoding - transforming of coded message into plain text, also


      known as decrypting.

Counter Intelligence - phase of intelligence covering the activity


devoted in destroying the effectiveness of hostile foreign activities
and the protection of information against espionage, subversion and
sabotage.

      Types of Counter Intelligence


      1. Passive CI Measures - protection of classified and sensitive
         information against unauthorized access through secrecy,
         communication security and other safeguards.
      2. Active CI Measures - are those measures which seek actively
         to block enemies effort to gain information or engage in
         espionage, subversion and sabotage.
•       Categories of Counter Intelligence Operations
      1. Military Security - it encompasses the measures taken by a
         command to protect itself against espionage, enemy operation,
         sabotage, subversion, or surprise.
      2. Port Boundary and Travel Security - application of both
         military and civil security measures for counter-intelligence
         control at point of entry and departure, international borders
         and boundaries.
      3. Civil Security - active and passive counter-intelligence
         measures affecting the non-military nationals permanently
         or temporarily residing in an area under military
         jurisdiction.
      4. Special Operations - counter subversion, sabotage and espionage.

      Objectives of Counter-Intelligence
      1. It denies information to the enemy
      2. It reduces the risk of a command
      3. Aid in achieving surprises
      4. Increases the security of the command
      5. Decrease the ability of the enemy to create information
         about he forces.
• Functions/Activities of Counter-Intelligence
      1. Protection of Information against espionage
      2. Protection of personnel against subversion
      3. Protection of installations and materials against
sabotage

• Cryptography - arts and science of codes and ciphers.

Crypto Analyst - refers to those persons who break


intercepted codes.

Cryptographer - refers to a person who is highly skilled in


converting
message from clear to unintelligible forms by use of codes
and ciphers.
• Motives of Informants
      1. Vanity - conceited act/character of the criminal resulting to
         self betrayal or tantamount to guilt, gaining favorable
         attention and importance by the police.
      2. Civic-Mindedness - sense of duty and obligation to assist
         the police.
      3. Fear - a person under an illusion of oppression by enemies or
         of other impending danger.
      4. Repentance - one who has a change of heart and wishes to
         report a crime that is preying on his conscience.
      5. Gratitude or Gain - an expression of appreciation to obtain
         a privilege or an interest in the welfare of his family
         during his detention.
      6. Revenge - to settle a grudge due to settle a previous injury.
      7. Jealousy - envious of the accomplishments or possessions of
         another and wishes to humiliate him.
      8. Remuneration - a person who informs solely for the pecuniary
         or other material gain he is to receive.
• Informers - refers to any person who provides
information to the agents
in a regular basis regarding a subject, they are paid
either on a
regular or case to case basis.      
• Intelligence information - Information gathered or
received which is of intelligence interests.
• Intelligence community - It is an integrated and
neatly organized entity composed of units or
agencies which have intelligence interest and
responsibilities.
• Methods of reporting information
      A. Evaluation of reliability of information - indicated by a
          letter as follows:
           A - completely reliable
           B - usually reliable - informant is of known integrity
           C - fairly reliable
           D - nor usually reliable
           E - Unreliable
           F - reliability not judge - no adequate basis estimating the
                reliability of the source.

      B. Evaluation of accuracy of information - indicated by


          numerals as follows:
         
           1 - confirmed by other agencies
           2 - probably true
           3 - possibly true
           4 - doubtfully true
           5 - improbable
           6 - truth can not be judged
• Methods and Techniques of Collecting Information
  
      Information - all evaluated materials of every description
      including those derived from observation, reports, rumors,
      imagery and other sources from which intelligence is produced.

      Types of Agents Used in Collecting Information


      1. Agent of Influence - agent who uses authority to gain
         information.
      2. Agent in Place - agent who has been recruited within a highly
         sensitive target
      3. Penetration Agent - agent who have reached the enemy, gather
         information and able to get back without being caught.
      4. Expendable Agent - agent who leaks false information to the
         enemy.
      5. Double Agent - an enemy agent who has been taken into custody
         turned around and sent back where he came from as an agent
         of his captors.
• Terms:
      1. Wanted list - It is for crime suspects with
warrant
          of arrest.
      2. Watch list - It is for those without
warrant of arrest.
      3. Target list - It is for organized crime
groups.
      4. PIR - Priority Intelligence requirement
      5. OIR - Other intelligence requirements
      6. SOR - Specific order request
• R.A. 8551 - Placed PNP as support to the
AFP in Counter insurgency operations thru
intelligence gathering.

The intelligence cycle (PNP Directorate for


Intelligence)
      1. Directing
      2. Collecting
      3. Processing
      4. Dissemination and use
• Intelligence Cycle - is the process of developing unrefined data into polished
intelligence for the use of policy makers.
  1. Direction - intelligence requirements are
      determined by a decision maker to meet his/her
      objective.
  2. Collection - is the gathering of raw information
       based on requirements.
  3. Processing - converting the vast amount of
      information collected into a form usable by
      analyst.
  4. Analysis - conversion of raw information into
      intelligence. It includes:
          (1) integrating
          (2) evaluating
          (3) analyzing data and preparing intelligence
               product.
  5. Dissemination - is the distribution of raw or
      finished intelligence to the consumer whose needs
      initiated the intelligence requirement.
  6. Feedback - is received from the decision maker
      and revised requirement issued.
• Categories of Intelligence
1. National Intelligence - integrated product of intelligence developed by all government
departments concerning the broad aspect of national policy and national security.
2. Departmental Intelligence - the intelligence required by the department or agencies of
the government to execute its mission and discharge its responsibilities.
3. Military Intelligence - refers to the knowledge by the military institution essential in the
preparation and execution of military plans, policies and programs.
• CIA - Central Intelligence Agency, is the civilian intelligence agency
of the USA. It is the largest intelligence agency in the world.

• Classifications of Documents
1. Top Secret - calls for the utmost degree of protection, Unauthorized revelation of this
materials and information will cause extremely severe damage to the nation, politically,
economically, or militarily.
2. Secret - unauthorized disclosure of this documents or things may put at risk the national
security, cause serious injury to the reputation of the nation.
3. Confidential - Unauthorized revelation of which may be injurious to the reputation of the
nation or governmental activity or will cause administrative humiliation or unnecessary
injury.
4. Restricted - this are information which should not be published or communicated to
anyone except for official purposes. These records are daily files, routine in nature even if
lost or destroyed will not affect operation or administration.
• Security Clearance - is a certification by a
responsible authority that the person described is
clear to access and classify matters
at appropriate levels.

      Interim Clearance - effective for 2 years.


      Final Clearance - effective for 5 years.
• Security Measures and Operations in Relation To Intelligence
1. Physical Security - the broadest type of security that is concerned with the physical
measures designed to safeguard personnel and prevent unauthorized access to
equipment, facilities, materials, documents and to protect them from espionage,
sabotage, damage, or theft.
2. Communication Security - the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized person in gaining
information through communication. This includes transmission, cryptographic and
physical security.
3. Documentary Security - protection of documents, classified matters and vital records
from loss, access to unauthorized persons, damage, theft and compromise through
proper storage and procedure.
4. Personnel security - the sum total procedures followed, inquiries conducted and
criteria applied to determine the work suitable to a particular applicant or the retention
or transfer of a particular employee.

Personnel Security Investigation - is an inquiry into the


         character, reputation, discretion, integrity, morals and
         loyalty of an individual in order to determine a person's
         suitability for appointment and access to classified matters.
• Types of PSI
         1. Local Agency Check - refers to the investigation of the
            records and files of agency in the area of principal
            residence of the individual being investigated: Mayor,
            Police, Fiscal where the individual is a resident.
         2. National Agency Check - it consist of LAC supplemented by
            investigation of the records and files of the following
            agencies: PNP. ISAFP, NBI, CSC, Bureau of Immigration
            and other agencies.
         3. Background Investigation - a check made on an individual
            usually seeking employment through subject's records in
            the police files, educational institutions, place of
            residence and former employers.

               Complete Background Investigation - a type of BI which


               is more comprehensive, it consist of detailed information
               regarding the subject.

               Partial Background Investigation - investigation of the


               background of an individual but limited only to some of
               the circumstances.
• Undercover Operation - also called Roping - is disguising one's
own identity or using an assumed identity for the purpose of
gaining the trust of an individual or organization to learn secret
information or to gain the trust of targeted individuals in order
to gain information or evidence.

      Cover - it refers to the changing, forging, or falsifying agent's


      real personality including but not limited to things, location,
      job and others that will be used in undercover assignments.

         Types of Cover
         1. Artificial -altering the background that will correspond
            to theh operation.
         2. Multiple - includes different cover
         3. Natural - actual or true background

      Hazards of Undercover Operations


      1. Reintegration back to normal duty
      2. Maintenance of identity
• Kinds of Covert Operation
   1. Surveillance - is the covert, discreet observation of people and
      places for the purpose of obtaining information concerning the
      identities or activities of subjects.

         Surveillant - is the plainclothes investigator assigned to


         make the observation.

         Subject - can be a person, place, property and vehicle,


         group of people, organization, or object.

         Safe house - refers to place where agents meet each other


         for purposes of debriefing and reporting.

         Live Drop - refers to a place where agents or informants


         leave their messages to the other agents.

         Decoy - a person or object used by the subject in an attempt


         to elude the surveillant.

         Convoy - an associate of the subject who follows him to


         detect surveillance.

         Log - chronological records of activities that took place


         in the establishment under surveillance.
         Methods of Surveillance
         1. Stationary Surveillance - also referred to as Fixed or
            Stakeout Surveillance - is used when you know or suspect
            that a person is at or will come to a known location, when
            you suspect that stolen goods are to be dropped  or when
            informants have told you that a crime is going to be
            committed.

         2. Moving Surveillance/Shadowing/Tailing - simply the act


            of following a person.

               Forms of Shadowing/Tailing
               1. Loose Tail - employed where a general impression
                  of the subject's habits and associates is required.
       
               2. Rough Shadowing - employed without special
                  precautions, subject maybe aware of the surveillance,
                  employed also when the subject is a material
                  witness and must be protected from harm or other
                  undesirable influences.
       
               3. Close Tail - extreme precautions are taken against
                  losing the subject is employed where constant
                  surveillance is necessary.
• Kinds of Covert Operation

     
   2. Casing - it is the careful inspection of a place to determine
      its suitability for a particular operational purpose.

   3. Elicitation - the process of extracting information from a person


      believe to be in possession of vital information without his
      knowledge or suspicion.

   4. Employment of Technical Means

            Bugging - the use of an equipment or tool to listen and


            record discreetly conversation of other people.

            Wiretapping - a method of collecting information through


            interception of telephone conversation.

   5. Tactical Interrogation - it is the process or method of obtaining


      information from a captured enemy who is reluctant to divulge
      information.

   6. Observation and Description - it is a method of collecting


      information by just merely using the different senses.
• Uses and Types of Undercover Assignment
 1. Residential Assignment - it is related to the neighborhood
         of the subject, where the agent will live as a new resident
         without making any suspicion. His mission is to make friends
         within its neighborhood and gather information regarding
         the subject and possibly getting closer to the subject.

      2. Social Assignment - the agent will gain access to the subject


         by going to the different hangout places of the subject and
         gather information like knowing how to drink socially
         without getting drunk.

      3. Work Assignment - the agent will be employed where the subject work to
acquire information. The agent must know his work and focus his mind set and
habit to his work assignment

      4. Subversive Organization - this is the most dangerous of all


         the undercover assignment, the agent will join the organization of the subject
itself, he must know the ideologies of the group and the actions while inside
should conform to the organization to avoid any suspicion.
• Definition of Terms:

Intelligence Agency - is a government agency responsible for the


collection,analysis or exploitation of information and intelligence in support of
law enforcement,national security,defense and foreign policy objectives.

Intelligence Officer - is a person employed by an organization to collect, compile


and analyze information which is used to that organization.

Counter Intelligence - refers to effort made by intelligence organizations to


prevent hostile or enemy intelligence organization from successfully gathering
and collecting intelligence against them.

Human Intelligence - category of intelligence derived from information collected


and provided by human sources.

Dead Drop/Dead Letter Box - is a method of espionage trade craft used to pass
items between 2 individuals using a secret location and thus not require to meet
directly.
• Live Drop - 2 persons meet to exchange items or information.

Dead Drop Spike - is a concealment device used to hide


money,maps,documents,microfilm and other items.

Cut-Out - is a mutually trusted intermediary, method or channel of


communication, facilitating the exchange of information between agents.

Espionage/Spying - involves a government or individual obtaining information


that is considered secret of confidential without the permission of the holder
of the information.

Agent Handling - is the management of agents, principal agents and agent


networks by intelligence officers typically known as case officers.

Case Officer - is an intelligence officer who is trained specialist in the


management of agents and agent network.

Agent - acts on behalf of another whether individual, organization or foreign


government, works under the direction of a principal agent or case officer.
Cryptography - is the practice and study of techniques for secure
communication in the presence of third parties called
adversaries.

Eaves Dropping - Is the act of secretly listening to the private


conversation of others without their consent.

Propaganda - is a form of communication that is aimed at


influencing the attitude of a community toward some cause or
position.

Flip - apprehended criminals who turn informants.

Snitches - jail house informants.


Means of Information Gathering
1.Overt
2.Covert
• Evaluation - systematic determination of merit, worth and significance of
something or someone using criteria against a set of standards.

Collation - is the assembly of written information into a standard order.

Crime Triangle
1. the offender
2. the victim
3. the location

Crime Intelligence - information compiled, analyzed and/or disseminated in an


effort to anticipate, prevent, or monitor criminal activity.

Strategic Intelligence - information concerning existing patterns or emerging


trends of criminal activity designed to assist in criminal apprehension and crime
control strategies for both short and long term investigative tools. 

Tactical Intelligence - information regarding a specific criminal event that can


be used immediately by operational units to further a criminal investigation
plan tactical operations and provide for officer safety.
• Open Source - refers to any information that can be legitimately obtained e.
free on request, payment of a fee.

Source - the place or person from which information is obtained.

Intelligence Assessment - is the development of forecasts of behavior or


recommended courses of action to the leadership of an organization based on
a wide range of available information sources both overt and covert.

Intelligence Analysis - is the process of taking known information about


situations and entities of strategic, operational, or tactical importance,
characterizing the known and with appropriate statements of probability. the
future actions in those situations and by those entities.

Cryptanalysis - from the Greek word Kryptos-hidden and Analyein-to loosen


or to unite - is the art of defeating cryptographic security systems and gaining
access to the contents of encrypted messages without being given the
cryptographic key.
Knowledge of a possible or actual enemy or area of
operations acquired by the collection, evaluation
and interpretation of military information.
      A. Combat intelligence                 
      B. Police Intelligence 
      C. Military Intelligence
      D. Counter  intelligence
Knowledge of a possible or actual enemy or area of
operations acquired by the collection, evaluation
and interpretation of military information.
      A. Combat intelligence                 
      B. Police Intelligence 
      C. Military Intelligence
      D. Counter  intelligence
Ancillary materials that are included in a cover
story or deception operation to help convince the
opposition or casual observers that what they are
observing is genuine.
      A. Walk-in                                                   
      B. Warming room 
      C. Window Observing
      D. Window dressing
Ancillary materials that are included in a cover
story or deception operation to help convince the
opposition or casual observers that what they are
observing is genuine.
      A. Walk-in                                                   
      B. Warming room 
      C. Window Observing
      D. Window dressing
Knowledge of the enemy, weather and the terrain
that is used in the planning and conduct of tactical
operations.
      A. Combat intelligence               
      B. Police intelligence
      C. Military Intelligence   
      D. Counter-intelligence
Knowledge of the enemy, weather and the terrain
that is used in the planning and conduct of tactical
operations.
      A. Combat intelligence               
      B. Police intelligence
      C. Military Intelligence   
      D. Counter-intelligence
A surveillance team usually assigned to a specific
target.
      A. Window observer                                  
      B. Window dressing
      C. Stake-out team
      D. Watcher team
A surveillance team usually assigned to a specific
target.
      A. Window observer                                  
      B. Window dressing
      C. Stake-out team
      D. Watcher team
Activity pertains to all security control measures
designed to ensure the safeguarding of information
against espionage,personnel against subversion
and installations or material against sabotage.
      A. Combat intelligence                
      B. Police intelligence   
      C. Military intelligence
      D. Counter intelligence
Activity pertains to all security control measures
designed to ensure the safeguarding of information
against espionage,personnel against subversion
and installations or material against sabotage.
      A. Combat intelligence                
      B. Police intelligence   
      C. Military intelligence
      D. Counter intelligence
A location out of the weather where a surveillance
team can
    go to keep warm and wait for the target.
      A. Warming room                                      
      B. Rest room      
      C. Station room
      D. Waiting room
A location out of the weather where a surveillance
team can
    go to keep warm and wait for the target.
      A. Warming room                                      
      B. Rest room      
      C. Station room
      D. Waiting room
Those which seek to conceal information from the
enemy.
      A. Passive counter intelligence measures  
      B. Active counter intelligence measures 
      C. Strategic intelligence
      D. Tactical intelligence
Those which seek to conceal information from the
enemy.
      A. Passive counter intelligence measures  
      B. Active counter intelligence measures 
      C. Strategic intelligence
      D. Tactical intelligence
A defector who declares his intentions by walking into an
official installation, or otherwise making contact with an
opposition government, and asking for political asylum
or volunteering to work in  place.  Also known as a
volunteer.
      A. Enemy traitor                                         
      B. Asylum seeker 
      C. Enemy defector
      D. Walk-in
A defector who declares his intentions by walking into an
official installation, or otherwise making contact with an
opposition government, and asking for political asylum
or volunteering to work in  place.  Also known as a
volunteer.
      A. Enemy traitor                                         
      B. Asylum seeker 
      C. Enemy defector
      D. Walk-in
Those that actively block the enemy's attempt to
gain information of enemy's effort to engage in
sabotage or subversion.
      A. Passive counter intelligence measures   
      B. Active counter intelligence measures
      C. Strategic intelligence
      D. Tactical intelligence
Those that actively block the enemy's attempt to
gain information of enemy's effort to engage in
sabotage or subversion.
      A. Passive counter intelligence measures   
      B. Active counter intelligence measures
      C. Strategic intelligence
      D. Tactical intelligence
When an operation goes bad and the agent is
arrested.
      A. Rolled up                                              
      B. Rolled down
      C. Burned out
      D. Burned down
When an operation goes bad and the agent is
arrested.
      A. Rolled up                                              
      B. Rolled down
      C. Burned out
      D. Burned down
The methods developed by intelligence operatives
to conduct their operations.  
      A. Trade craft                                            
      B. Operational technique
      C. Trade secret
      D. Operational secret
The methods developed by intelligence operatives
to conduct their operations.  
      A. Trade craft                                            
      B. Operational technique
      C. Trade secret
      D. Operational secret
An apartment, hotel room, or other similar site
considered safe for use by operatives as a base of
operations or for a
    personal meeting.
      A. Meeting place                                        
      B. Dead drop
      C. Drop
      D. Safe house
An apartment, hotel room, or other similar site
considered safe for use by operatives as a base of
operations or for a
    personal meeting.
      A. Meeting place                                        
      B. Dead drop
      C. Drop
      D. Safe house
When the source of the information comes from a police
intelligence officer of long experience and extensive
background, the evaluation of reliability of information is
labeled.
       A. A                                                           
       B. B
       C. C
       D. D
When the source of the information comes from a police
intelligence officer of long experience and extensive
background, the evaluation of reliability of information is
labeled.
       A. A                                                           
       B. B
       C. C
       D. D
Any tradecraft technique employing invisible
messages hidden in or on innocuous materials. This
includes invisible inks and microdots, among many
other variations.
      A. Secret writing                                         
      B. Secret message
      C. Hidden message
      D. Hidden writing
Any tradecraft technique employing invisible
messages hidden in or on innocuous materials. This
includes invisible inks and microdots, among many
other variations.
      A. Secret writing                                         
      B. Secret message
      C. Hidden message
      D. Hidden writing
It focuses on subject or operations and usually
short term.
      A. Strategic intelligence                             
      B. Counter intelligence   
      C. Tactical intelligence
      D. Long-term intelligence
It focuses on subject or operations and usually
short term.
      A. Strategic intelligence                             
      B. Counter intelligence   
      C. Tactical intelligence
      D. Long-term intelligence
Any form of clandestine tradecraft using a system
of marks, signs, or codes for signaling between
operatives.
      A. Ciphers                                                   
      B. Signs
      C. Signals
      D. Code
Any form of clandestine tradecraft using a system
of marks, signs, or codes for signaling between
operatives.
      A. Ciphers                                                   
      B. Signs
      C. Signals
      D. Code
When there is no adequate basis estimating the
reliability of an information, the evaluation of the
reliability of the information is labeled.
       A. A                                                          
       B. F
       C. E
       D. D
When there is no adequate basis estimating the
reliability of an information, the evaluation of the
reliability of the information is labeled.
       A. A                                                          
       B. F
       C. E
       D. D
The special disguise and deception tradecraft
techniques developed under Moscow rules to help
the CIA penetrate the KGB's security perimeter in
Moscow.
      A. Silver bullet                                           
      B. Golden bullet 
      C. Bronze bullet
      D. Titanium bullet
The special disguise and deception tradecraft
techniques developed under Moscow rules to help
the CIA penetrate the KGB's security perimeter in
Moscow.
      A. Silver bullet                                           
      B. Golden bullet 
      C. Bronze bullet
      D. Titanium bullet
Concerns with the security of
information,personnel,material and  installations.
      A. Strategic intelligence                              
      B. Counter intelligence
      C. Tactical intelligence
      D. Long-term intelligence
Concerns with the security of
information,personnel,material and  installations.
      A. Strategic intelligence                              
      B. Counter intelligence
      C. Tactical intelligence
      D. Long-term intelligence
A ploy designed to deceive the observer into
believing that an operation has gone bad when, in
fact, it has been put into another compartment.
      A. Burned                                                    
      B. Deceiving
      C. Spoofing
      D. Misleading
A ploy designed to deceive the observer into
believing that an operation has gone bad when, in
fact, it has been put into another compartment.
      A. Burned                                                    
      B. Deceiving
      C. Spoofing
      D. Misleading
Knowledge in raw form is known as
      A. Intelligence                                            
      B. Information  
      C. Awareness
      D. Cognition
Knowledge in raw form is known as
      A. Intelligence                                            
      B. Information  
      C. Awareness
      D. Cognition
A chemical marking compound developed by the
KGB to keep tabs on the activities of a target officer.
Also called METKA. The compound is made of
nitrophenyl pentadien (NPPD) and luminol.
      A. Spy dust                                                 
      B. Chemical dust
      C. Sulfuric acid
      D. Potassium nitrate
A chemical marking compound developed by the
KGB to keep tabs on the activities of a target officer.
Also called METKA. The compound is made of
nitrophenyl pentadien (NPPD) and luminol.
      A. Spy dust                                                 
      B. Chemical dust
      C. Sulfuric acid
      D. Potassium nitrate
Deals with political,economic,military capabilities
and vulnerabilities of all nations.
      A. Strategic intelligence                               
      B. Counter intelligence 
      C. Tactical intelligence
      D. Long-term intelligence
Deals with political,economic,military capabilities
and vulnerabilities of all nations.
      A. Strategic intelligence                               
      B. Counter intelligence 
      C. Tactical intelligence
      D. Long-term intelligence
A counter-surveillance ploy in which more than one
target car or target officer is being followed and they
suddenly go in different directions, forcing the
surveillance team to make instant choices about whom
to follow.
      A. ABC technique                               
      B. Star-burst maneuver
      C. AC technique
      D. Sudden change maneuver 
A counter-surveillance ploy in which more than one
target car or target officer is being followed and they
suddenly go in different directions, forcing the
surveillance team to make instant choices about whom
to follow.
      A. ABC technique                               
      B. Star-burst maneuver
      C. AC technique
      D. Sudden change maneuver 
The resolving or separating of a thing into its
component parts.
      A. Analysis                                             
      B. Evaluation
      C. Collation
      D. Collection
The resolving or separating of a thing into its
component parts.
      A. Analysis                                             
      B. Evaluation
      C. Collation
      D. Collection
A major electronic communications line, usually
made up of a bundle of cables.
      A. Cable line                                             
      B. Trunk line
      C. Telephone line
      D. DSL
A major electronic communications line, usually
made up of a bundle of cables.
      A. Cable line                                             
      B. Trunk line
      C. Telephone line
      D. DSL
Tradecraft techniques for placing drops by tossing
them while on the move.
      A. Tosses                                                 
      B. Dropping
      C. Throwing
      D. Drops
Tradecraft techniques for placing drops by tossing
them while on the move.
      A. Tosses                                                 
      B. Dropping
      C. Throwing
      D. Drops
Technical air sampler sensors designed to sniff for
hostile substances or parties in a dark tunnel
system.
      A. Chemical sniffers                                    
      B. Tunnel sniffers  
      C. Dog sniffers
      D.  Air sniffers
Technical air sampler sensors designed to sniff for
hostile substances or parties in a dark tunnel
system.
      A. Chemical sniffers                                    
      B. Tunnel sniffers  
      C. Dog sniffers
      D.  Air sniffers
A dead drop that will be retrieved if it is not picked
up by the intended recipient after a set time.
      A.  Picked drop                                           
      B. Timed drop  
      C. Abandoned drop
      D. Recovered drop
A dead drop that will be retrieved if it is not picked
up by the intended recipient after a set time.
      A.  Picked drop                                           
      B. Timed drop  
      C. Abandoned drop
      D. Recovered drop

Potrebbero piacerti anche