Intel QA Flashcards

(101 cards)

1
Q

1.​It is the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which is significant to police planning.

A

intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.​It is an evaluated material of every description including those derived from observation, reports, rumors, imagery, and other sources from which intelligence are derived.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are intelligence data that are not of an immediate value.

A

strategic intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.​It is the exploration of sources of information by the collection agencies, and the delivery of the information obtained to proper intelligence unit.

A

collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.​It is a repetitive process used to produce intelligence from information.

A

intelligence cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.​The reliability of the source is “highly reliable” and the accuracy of information is “confirmed information’ what will be the evaluation rating of the information.

A

A-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.​He is the father of organized military espionage.

A

Frederick the Great

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.​It is in this phase of intelligence cycle in which information becomes intelligence.

A

processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9.​It includes the systematic exploitation of all sources of information, and it must be methodical, continuous, and carefully controlled.

A

collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10.​Are those items of information regarding criminals or subversives, and that needs to be collected and/or processed in order to meet the intelligence requirements of police executives.

A

priority intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. ​It is the timely conveyance of information and or intelligence in any appropriate form and by any suitable means.
A

dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. ​It is the observation of a person, place or thing, generally—but not necessarily—in unobtrusive manner.
A

surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13.​Also called as a plant or fixed surveillance, here the surveillant remains essentially in one position or locale.

A

stakeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14.​The term roping described this situation, and it is said to be planted

A

shadow??? Or stakeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15.​The subject is kept under constant surveillance, and the aim is not to loose him even at the risk of being made.

A

​close surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16.​ It is a surveillance involving the use of scientific devices to enhance hearing or seeing the subject’s activities.

A

technical surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

17.​To be detected or suspected of being surveillant by the subject.

A

Be made??? Or burnout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

18.​It is a devise which provides a means of systematic arrangement of information by type of subject.

A

intelligence workbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

19.​It is not usually a major factor in prompting an individual to furnish information, but is can be potent at times.

A

gratitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

20.​ It is an individual who openly or secretly obtained or who assist in obtaining information for intelligence and counter-intelligence purposes.

A

informant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

21.​ Individuals who are selected, trained and utilized as continuous covert sources of information concerning specific intelligence aspects.

A

recruited informant​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

22.​ Individuals who are simultaneously employed by two opposing intelligence agencies with one of the agencies aware of his dual role.

A

double agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. ​It is a means by which individual, groups or organization conceals the true nature of its activities and existence from observer.
A

undercover assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

24.​ It is an individual who provides information because of monetary consideration.

A

informer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
25.​ It is an inquiry into the specific phases of an individual life history, including to a minimum, national agency check, character reference, and former employers.
national agency check
26
26.​It is an inquiry into the loyalty, integrity, character, morale, and discretion of an individual because of the sensitive position he holds, or is about to assume.
personnel security​ investigation
27
27.​This is an information or materials whose unauthorized disclosures would cause grave damage to the security.
Top Secret
28
28.​When a surveillant’s behavior causes the subject to surmise or know that he or she is under surveillance.
burn the surveillance
29
29.​This letter represent that the source of intelligence information is from tactical interrogation of captured enemy.
W
30
30.​ Information or material in any form, or of any nature, the safeguarding of which is necessary in the interest of national security.
classified matters
31
31.​ It is the act of changing the assigned classification of a document or material.
declassify
32
32.​ It is the assigning of an information or material to one of the four security classification.
classify
33
33.​ A properly trained and cleared individual who assist the head of the department in discharging the responsibilities of safeguarding classified documents and materials.
security officer
34
34. ​It is the term given to the requirement to those persons whose official duty requires knowledge of possession thereof.
need-to-know
35
35.​It is the granting of access to classified document or information.
compartmentation
36
37.​ Information or material the unauthorized disclosure of which would cause administrative embarrassment of unwarranted injury.
confidential
37
38.​Information or material the unauthorized disclosure of which would endanger national security and will cause serious injury.
secret
38
39.​Information or material the unauthorized disclosure of which would cause exceptionally grave damage to the nation.
top secret
39
40.​It is any recorded information regardless of its physical form or characteristics.
document
40
41.​Information or material in any form, the safeguarding of which is necessary in the interest of national security.
​A. ​classified document
41
42.​That aspect of police intelligence activities relating to all security measures, both offensive and defensive.
counter-intelligence
42
43.​Counter intelligence measures that seek to conceal information from enemy.
passive-defensive​
43
44.​Counter intelligence measures that seek to block the enemy’s effort to engage in espionage, sabotage or subversion.
active-offensive
44
45.​It encompasses measures taken by an office or group to protect itself against espionage, enemy observation, sabotage, or subversion.
police security
45
46.​It encompasses active and passive counter-intelligence measures affecting civilians permanently or temporarily residing in an area under police or military jurisdictions.
civil security
46
47.​It is the employment of active-counter intelligence techniques and procedures in the conduct of clandestine or covert operations.
special operation
47
48.​It is the control and examination of communications to prevent the transmission of information that may fall to the hand of the enemy.
censorship
48
49.​It includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty.
personnel security
49
50.​It is an inquiry into the character, reputation, discretion and loyalty of an individual.
​Personnel Security Investigation
50
51.​ It is any position within the government, police, military, the occupant of which could bring about by virtue of the position a material adverse effect to national security.
sensitive position
51
36.​Information and material which requires special protection, and this not anymore required cover sheet.
Restricted
52
52.​This is an investigation of an individual made upon the basis of written information supplied by him in an official inquiry.
national agency check
53
53.​This is a type of investigation which consists of written inquiries sent to appropriate local government agencies.
local agency check
54
54.​This is much more comprehensive investigation.
background investigation?
55
55.​Consist of the investigation on the background of individual, particularly all the circumstances of his personal life.
complete background investigation
56
56.​Consist of the investigation of the background of an individual, but limited only to some of the circumstances of his personal life.
Partial background investigation
57
57.​It is valid for five years unless sooner revoked by the issuing authority.
final???
58
58.​These are the purpose of police intelligence activity
- ​to reduce error​​ - to increase accuracy​ - to help in decision making
59
59.​It is primarily designed to enable the officer of unit to achieve and maintain a sound and effective security system.
security education.
60
60.​This consists of initial briefing on security, its various aspects, and its importance and it is made to the new personnel and employees.
security indoctrination
61
61.​It is the determination of the pertinence or significance of the information relative to police operations.
evaluation
62
62.​The process of making conclusions from integrated intelligence and/or information.
deduction
63
63.​It is the graphic representation of the current enemy situation.
situation map
64
63.​It is the graphic representation of the current enemy situation.
1
65
64.​A cautious surveillance, because the loss of the subject is preferred to possible exposure.
loose surveillance
66
65.​A surveillance with little or not attempt at concealment, the subject is most likely aware of the surveillance, but must not be lost.
​open surveillance
67
66.​The subject is followed so closely that surveillant and subject are almost in lock step.
close surveillance?
68
67.​A form of open surveillance in which the subject’s vehicle is closely followed.
Tail gaiting
69
68.​Its functions is to serve as the intelligence and counter-intelligence operating unit of the Philippine National Police.
NICA?
70
69.​It is a difficult one, in all cases it must be a close one or the person being followed will be lost.
One-man method
71
70.​It is a close tail, with other members of the squad keeping contact with those immediately ahead of them.​
Leaf frog method
72
71.​This is close tail, and is necessary only when discovery is preferable to losing the subject.
1
73
72.​It is the visual inspection of an area, installation or building to determine its suitability for operational activities.
Stake out
74
73.​It is one of the principal activities of police intelligence operations, and limited activities on this will usually produce a limited intelligence product.
Iiaison activities
75
74.​The intelligence operatives are being asked about his personal experiences and observations while conducting intelligence operations.
De-briefing
76
75.​It is an important method of gathering intelligence data, and this is an excellent source of highly valuable material.
News clipping
77
76.​Those assigned with the mission of obtaining information within a specific target.
penet informants
78
77.​Those that is available for counter-intelligence mission at all times, and who may derive the major part of their income from their work as informants.
full time informants
79
78.​Individuals who furnish information with no intention of repeating his services or furnishing information on a continuing basis. ​
incidental informants
80
79.​A cover that is general in nature and relatively permanently adopted to explain the work presence in any given area.
cover for status
81
80.​A cover designed to explain away or allow to perform a given clandestine activity, it may be an extension of cover for status.
cover for action
82
81.​Agent’s must make sure that every public action he takes fits his assumed cover, and that a total picture presented to others accurately reflects his cover.
living one’s over​
83
82.​A cover which completely fits the true background and capabilities of the agent.
natural cover
84
83.​Using true or actual personal background to fit for the purpose.
Natural cover
85
84.​A cover using biographical data adopted for the purpose that is fictitious.​
Artificial cover
86
85.​It includes provisions for sufficient contact between the undercover agent, and the target of interest to produce worthwhile results.
Continuous contact
87
86.​The cover story must include the material on all aspects of the undercover agent’s previous background, regardless of whether or not it is anticipated that this information will be required.
Mutual interest
88
87.​Two kinds of opportunity must prevail if an individual is to function as an informant, most often and the rest of the time, it is provided by,
- chance - propinquity - proximity
89
88.​The undercover agent is required to develop friendship and trust with the target personality for the purposes of obtaining information or evidence.
Personal contact
90
89.​It places the undercover agent in a type of employment where he can observe the activities of the subject at his place of work.
social assignment
91
90.​It is the process of evaluating the person’s suitability for a security clearance.
Adjudication process
92
91.​This is a form required to an individual who is being processed for a security clearance.
personal hist statement
93
92.​Those by virtue of their official positions are expected or obligated to furnish information openly.
Automatic informants
94
93.​Individuals who by social or professional position, posses or has access to information of continuing interest.
Casual informants
95
94.​This is a continuous and systematic program designed to meet the security needs of the office or unit.
Security indoctrination
96
95.​This is a phase of security education program which makes use of security posters, slogans, signs and stickers.
Security reminders
97
96.​This is a motive wherein persons hold belief inimical to their country, and they are of course vulnerable to the approach of the subversive groups or enemies.
Ideological benefits
98
97.​On of the most powerful motivations that make people susceptible to pressure.
Weakness of character
99
98.​It is an individual who accept every story at face value and can see no wrong in anyone, and they fall into this category.
Gullibility
100
99.​Because of this, such a person, approached with the lure of a large sum of money is very vulnerable and a definite security risk.
Serious indebtedness
101
100.​It is someone from the enemy side held as prisoner while the war is going on.
Internee