Police Intelligence GANDER FC
Police Intelligence GANDER FC
a. MILITARY INTELLIGENCE
b.POLICE INTELLIGENCE
c.SURVEILLANCE INTELLIGENCE
d.COUNTER INTELLIGENCE
3. Refers to output or end product resulting from the
collection, evaluation, analysis, integration and
interpretation of all available facts which concerns
the activities of criminal elements.
a.MILITARY INTELLIGENCE
b.POLICE INTELLIGENCE
c.INTELLIGENCE
d.INFORMATION
4. Refers to facts gathered from different sources like
media, news outlets, underworld organizations, or
people in general.
a.INTELLIGENCE CYCLE
b. INTELLIGENCE
c. INTELLIGENCE GATHERING
d. INFORMATION
5. It is the process of gathering information designed
to disturb and disrupt the enemy’s state of finance and
destroy the stability and foundation of its organization.
a.INTELLIGENCE GATHERING
b.MILITARY INTELLIGENCE
c.STRATEGIC INTELLIGENCE
d.COMBAT INTELLIGENCE
6. what do you call the measures undertaken to deny
the enemy of any information consisting of passive
and active intelligence measures.
a.COUNTER-INTELLIGENCE
b.COMBAT INTELLIGENCE
c.SECURITY INTELLIGENCE
d.COUNTER ESPIONAGE
7. what kind of counter intelligence which utilize
secrecy discipline, camouflage and movement control
and proper handling of information?
a.COUNTER INTELLIGENCE
b.PASSIVE COUNTER INTELLIGENCE
c.ACTIVE COUNTER INTELLIGENCE
d.COUNTER ESPIONAGE
9. Refers to intelligence utilized in designing plans
and conducting tactical and administrative
operation?
a.COMBAT INTELLIGENCE
b.COUNTER INTELLIGENCE
c.MILITARY INTELLIGENCE
d.POLICE INTELLIGENCE
10. A type of intelligence which used processed
information in formulating military plans, programs
and policies. This includes strategic and combat
intelligence.
a.Military intelligence
b.Police intelligence
c.Rangers intelligence
d.Combat intelligence
Types of intelligence
1. Military intelligence – refers to the use of processed
information in formulating military plans, programs and
policies. This include strategic and combat intelligence.
- strategic Intelligence – gives attention to the
capability, vulnerability, and possible course of action.
- combat intelligence – highlights knowledge pertaining
to weather, enemy and terrain.
Types of intelligence
2. Police intelligence – refers to end output or end product
resulting from the collection, evaluation, analysis, integration and
interpretation of all available facts which concerns the activities of
criminal elements. This covers line, strategic and counter
intelligence.
- line intelligence – refers to processed information which is
immediate in nature.
- strategic intelligence – refers to long term or future use of
processed information.
- counter-intelligence – it deals primarily with the building of
the organization against internal enemy’s.
Types of intelligence
3. strategic intelligence – refers to the process of gathering
information designed to disturb and disrupt the enemy’s state
of finances and destroy the stability and foundation of its
organization.
a.Sun Tzu
b.Moses
c.Hannibal
d.Frederick the great
12. The most notable person who contributed to
intelligence. He made the book title art of war.
a. moses
b.Sun Tzu
c.Son Tzu
d.Sun Tzo
13. What do you call the group of person in feudal japan era
who are utilized as spies?
a. ninja
b.Samurai
c.Kempeitai
d.tokkeitai
14. He is a member of Hohenzollern dynasty, he was the
third and last king of Prussia. Regarded as father of military
espionage.
a. schulmeister
b.Francis Walsingham
c.Edward I
d.William Donovan
18. Top 1 intelligence agency in the world.
a.FSB
b.MOSSAD
c.MI6
d.ISI
20. He is the one who established Office of Strategic
Service(OSS).
a.Alfred redl
b.William Donovan
c.Steiber
d. schulmeister
Frey Tomas de Toquemada – master planner who
conducted espionage during the 15th century under the
inquisition wherein purging and ecclesiastical cleansing was
undertaken to fortify and solidify the church.
a.Robert peel
b.John Edgar Hoover.
c.Cesar Nazareno
d. john fielding
23. What law created National Bureau of Investigation?
a.RA 6975
b.PD 1184
c.RA 157
d. Act 175
24. The following are types of police intelligence except:
a.Walk ins
b.Double spies
c.Agent in place
d.mole
28. it is a kind of spy who remain in a position of
confidence with access to highly secret information, but
recruited by a foreign intelligence service is called?
a.Walk ins
b.Double agent
c.Agent in place
d.mole
29. this are spies who simulate to be defecting but in
reality maintain their original loyalty is called?
a. walk ins
b.Double agent
c.Agent in place
d.mole
30. this term is not considered as one of type of spies but
this term is used for people who volunteer to be a spy, they
are cautiously recruited because most of double agents
come from this kind of recruit.
a.Walk ins
b.Double agent
c.Agent in place
d.mole
31. the following are phases of recruitment of intelligence
agent except?
a.Selection
b.Investigation
c.Testing
d.Field operation
32. it is a primary intelligence gathering and analysis arm
of the Philippine Government carrying out overt, covert and
clandestine intelligence program, its motto is kaalaman ay
kaligtasan.
a.NICA
b.ISAF
c.DND
d. J-2 coordinating staff
33. it is the gradual penetration into enemy domain and
territory?
a.Infiltration
b.Surveillance
c.Elicitation
d.penetration
Types of surveilance
discreet surveillance – subject to be watch is unaware that
he is under observation
a. collation
b. evaluation
c. interpretation
d. integration
36. it is the determination of the significance of the
intelligence data in relation to other data at hand in order to
draw conclusion.
a. collation
b. evaluation
c. interpretation
d. integration
37. it is one of the stages of processing of information, it
refers to the examination of raw materials in order to
determine its reliability, credibility and relevance to police
operations.
a. collation
b. evaluation
c. interpretation
d. integration
38. interpretation stage have 3 district procedures, which of
the following does not belong to the group.
a.Analysis
b.Integration
c.Deduction
d.evaluation
39. it is done by shifting and sorting of all available
intelligence materials.
a.Analysis
b.Integration
c.Deduction
d.evaluation
39. it is the combination of all analyzed data to form a logical
picture or theory
a.Analysis
b.Integration
c.Deduction
d.evaluation
40. The formulation of conclusion from theories as result of
integration.
a.Analysis
b.Integration
c.Deduction
d.evaluation
41. The following are type of motive of informants except
a.Vanity
b.Fear
c.Perversity
d.Self aggrandizing
42. all but one does not belong to type of informants,
except?
a.Jealousy
b.Perversity
c.Revenge
d.repentance
44. this kind of informant gives information in exchange of
money or any financial advances.
a.Intelligence journal
b.Intelligence worksheet
c.Situation map
d.intelligence file
47. is a permanent, official and chronological recording of
events, incidents, information, activities being undertaken
by an intelligence
a.Intelligence journal
b.Intelligence worksheet
c.Situation map
d.intelligence file
48. this is the compilation of file of different reports
received by the units.
a.Intelligence journal
b.Intelligence workbook
c.Situation map
d.intelligence file
49. it is the gathering, assembling and accumulation,
securing, getting and obtaining all available information
a.Collection
b.Evalutaion
c.Analysis
d.integration
50. in evaluation code D2T is interpreted as?
a.Analysis
b.Integration
c.Deduction
d.addition
52. this refers to the person being followed by surveillant.
a.Rabbit
b.Prover
c.Target
d.bird
53. this is other term for undercover, investigator that
assumes others identity.
a.Casing
b.Roping
c.Stake out
d.Reconnaisances
54. one of 6 type of agent is this type where he spread false
information to the enemy.
a.Double agent
b.Expandable agent
c. agent of influence
d.Agent provocation
Sexual and non-sexual compromise
MICE – Money, Ideology, Compromise, Ego
SEX falls under compromise category;
heterosexual compromise
-honey trap – use of beautiful woman
-Romeo – use of good looking man
homosexual compromise
-drone-traps
Cambridge spy ring & Geoffrey Prime of KGB
nonsexual
55. unauthorized disclosure of this classified document
may put at risk the national security and cause serious
injury to the reputation of the nation.
a.Top secret
b.Secret
c.confidential
d.Restricted
DOCUMENTS SECURITY CLASSIFICATION
• TOP SECRET – CONSIDERED IRREPLACEABLE OFFICIAL MATTERS, THE
UNAUTHORIZED DISCLOSURE OF WHICH WOULD CAUSE EXCEPTIONALLY GRAVE
DAMAGE TO THE INTEREST OF NATION.
• SECRET -THE UNAUTHORIZED DISCLOSURE OF WHICH WOULD ENDANGER
NATIONAL SECURITY.
• CONFIDENTIAL – THE UNAUTHORIZED DISCLOSURE OF WHICH, WHILE NOT
ENDANGERING THE NATIONAL SECURITY, WOULD BE PREJUDICIAL TO THE
INTEREST OR PRESTIGE OF THE NATION OR CAUSE EMBARRASSMENT TO THE
NATION
• RESTRICTED – SAME AS CONFIDENTIAL BUT REPRODUCTION IS AUTHORIZED THE
TRANSMISSION SHALL BE THROUGH THE NORMAL DISSEMINATION
56. special type of deception and cover to penetrate the
KGB by CIA
a.Silver bullet
b.Spoofing
c.Operation Neptune spear
d.none
57. the earliest recorded person who use code system to
secure the secrecy of an information from the enemies,
found in the bible Jeremiah 25-26.
a.Moses
b.Atbash
c.Mahatma
d.rahab
58. it is a method of writing which substitutes letters or
characters. It uses substitution and transposition method.
a.Code
b.Cipher
c.Cryptogram
d.none
59. the act of maliciously overhearing the private
conversation of other person.
a.Bugging
b.Eavesdropping
c.Wiretopping
d.chismising
60. these are matters that should be passed only to whom it
is necessary for fulfilment of their duties.