Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 84

1.

A product resulting from the collection, analysis,


integration, evaluation and interpretation of all
available information which concerns one or more
aspects of area of operation potentially significant to
planning.
a.INTELLIGENCE CYCLE
b. INTELLIGENCE
c. INTELLIGENCE GATHERING
d. POLICE INTELLIGENCE
2. THE FOLLOWING ARE TYPES OF INTELLIGENCE EXCEPT:

a. MILITARY INTELLIGENCE
b.POLICE INTELLIGENCE
c.SURVEILLANCE INTELLIGENCE
d.COUNTER INTELLIGENCE
3. Refers to output or end product resulting from the
collection, evaluation, analysis, integration and
interpretation of all available facts which concerns
the activities of criminal elements.

a.MILITARY INTELLIGENCE
b.POLICE INTELLIGENCE
c.INTELLIGENCE
d.INFORMATION
4. Refers to facts gathered from different sources like
media, news outlets, underworld organizations, or
people in general.

a.INTELLIGENCE CYCLE
b. INTELLIGENCE
c. INTELLIGENCE GATHERING
d. INFORMATION
5. It is the process of gathering information designed
to disturb and disrupt the enemy’s state of finance and
destroy the stability and foundation of its organization.

a.INTELLIGENCE GATHERING
b.MILITARY INTELLIGENCE
c.STRATEGIC INTELLIGENCE
d.COMBAT INTELLIGENCE
6. what do you call the measures undertaken to deny
the enemy of any information consisting of passive
and active intelligence measures.

a.COUNTER-INTELLIGENCE
b.COMBAT INTELLIGENCE
c.SECURITY INTELLIGENCE
d.COUNTER ESPIONAGE
7. what kind of counter intelligence which utilize
secrecy discipline, camouflage and movement control
and proper handling of information?

a.PASSIVE COUNTER INTELLIGENCE


b.ACTIVE COUNTER INTELLIGENCE
c.COUNTER ESPIONAGE
d.NONE
8. What kind of counter intelligence utilize
reconnaissance, patrolling, espionage, interior guard
duty, sabotage?

a.COUNTER INTELLIGENCE
b.PASSIVE COUNTER INTELLIGENCE
c.ACTIVE COUNTER INTELLIGENCE
d.COUNTER ESPIONAGE
9. Refers to intelligence utilized in designing plans
and conducting tactical and administrative
operation?

a.COMBAT INTELLIGENCE
b.COUNTER INTELLIGENCE
c.MILITARY INTELLIGENCE
d.POLICE INTELLIGENCE
10. A type of intelligence which used processed
information in formulating military plans, programs
and policies. This includes strategic and combat
intelligence.

a.Military intelligence
b.Police intelligence
c.Rangers intelligence
d.Combat intelligence
Types of intelligence
1. Military intelligence – refers to the use of processed
information in formulating military plans, programs and
policies. This include strategic and combat intelligence.
- strategic Intelligence – gives attention to the
capability, vulnerability, and possible course of action.
- combat intelligence – highlights knowledge pertaining
to weather, enemy and terrain.
Types of intelligence
2. Police intelligence – refers to end output or end product
resulting from the collection, evaluation, analysis, integration and
interpretation of all available facts which concerns the activities of
criminal elements. This covers line, strategic and counter
intelligence.
- line intelligence – refers to processed information which is
immediate in nature.
- strategic intelligence – refers to long term or future use of
processed information.
- counter-intelligence – it deals primarily with the building of
the organization against internal enemy’s.
Types of intelligence
3. strategic intelligence – refers to the process of gathering
information designed to disturb and disrupt the enemy’s state
of finances and destroy the stability and foundation of its
organization.

4. combat intelligence - refers to that intelligence utilized in


designing plans and conducting tactical and administrative
operation.
Types of intelligence
5. counter intelligence – measures undertaken to deny the
enemy of any information consisting of passive and active
measures.
Passive counter intelligence – involves secrecy
discipline, movements control, camouflage and proper
handling of information is practiced.
Active counter intelligence – covers reconnaissance,
patrolling, sabotage, espionage, interior guard duty and
fortification of vital facilities.
11. Who is the earliest recorded person that used
intelligence?

a.Sun Tzu
b.Moses
c.Hannibal
d.Frederick the great
12. The most notable person who contributed to
intelligence. He made the book title art of war.

a. moses
b.Sun Tzu
c.Son Tzu
d.Sun Tzo
13. What do you call the group of person in feudal japan era
who are utilized as spies?

a. ninja
b.Samurai
c.Kempeitai
d.tokkeitai
14. He is a member of Hohenzollern dynasty, he was the
third and last king of Prussia. Regarded as father of military
espionage.

a.Frederick the great


b.Alexander the great
c.Hannibal
d.William donovan
15. A renowned greek conqueror, he was able to identify
those disloyal ones by ordering the communication letters
opened.

a. Frederick the great


b.Alexander the great
c.Hannibal
d.William donovan
16. Who is known as father of strategy or regarded as gifted
strategist by conquerors such as Napoleon Bonaparte?

a. Frederick the great


b.Alexander the great
c.Hannibal
d.William donovan
17. He is the protector of queen Elizabeth I who organized
secret police and established a spy networks to detect
fleet movement of enemies of British empire.

a. schulmeister
b.Francis Walsingham
c.Edward I
d.William Donovan
18. Top 1 intelligence agency in the world.

a. inter service intelligence


b.Mossad
c.CIA
d. FSB
19. What intelligence agency was considered as
counterpart of CIA?

a.FSB
b.MOSSAD
c.MI6
d.ISI
20. He is the one who established Office of Strategic
Service(OSS).

a.Alfred redl
b.William Donovan
c.Steiber
d. schulmeister
Frey Tomas de Toquemada – master planner who
conducted espionage during the 15th century under the
inquisition wherein purging and ecclesiastical cleansing was
undertaken to fortify and solidify the church.

Delilah – a biblical personality who was able to gain


information by using her beauty and charm. She was
responsible for the fall of Samson a known Israelite leader
who terrorized philistines.
Edward I – an English monarch who started utilizing state
informants especially to determine sedition writings against
the crown and identity of his enemies. Rewards are given
towards for every information.
Walsingham of England – the protector of queen Elizabeth I
who organized the first national intelligence service and
established a spy network to detect fleet movement of
enemies of the british empire particularly the Portuguese.
RAHAB – 2nd earliest recorded case which use intelligence
in the bible.
Karl Ludwig Schulmeister – renowned as Napoleon’s Eye.
He was credited for establishing counter intelligence
conducted against spies. He is a master of deceit who used
black mail to obtain vital information pertaining to the
personality and identity of the enemies of Napoleon.

Wilhelm Steiber – known as Prussia’s King of Sleuth-


hounds, Bismarcks master spy, as minister of police he
started the use of propaganda and censorship as well as
utilizing statistical intelligence accounting.
Redl – a double spy who while working as intelligence director of
Austria and Hungary and spied for the Russians. He was infamous
person who was responsible for a staggering estimate of the death of
half a million people during his 13 year career.
William J. Donovan – known as Wild Bill Donovan, he headed the
office of strategic service responsible to establishing a centralized
military intelligence for the united states whose valuable contribution
was vital to American Victory in the 2nd World War. Through his laid
down principles the CIA was established for defense purposes
V2 rackets – OSS agents in coordination with british intelligence,
through penetration and technical intelligence discovered
Pneumundo, which is a V2 guided missile research project of Nazi
Germany.
Joseph fouche of france – most respected and feared
intelligent director in history of france. Created the network of
agents. Founded the modern system of spying on spies.

Genghis Khan – founder of the Mongolian empire. Said that


every campaign is based on intelligence. He conquest central
ASIA and he is a threat to China, India, Persia, near east
Russia and eastern Europe.
Romano Sertorius – use of white fawn to gather evidence.
Julius Ceasar – during his time, the staff of each legion
includes ten “speculators” who served as an information-
collecting agency. Uses pigeons to make the communication
faster.
Brahma Kautilya – in ancient india, he overthrew the NANDA
dynasty and established the first MAYURYAN king in the Indian
throne. He recommended that the ruler should strike at his
enemy’s weak points by means of spies.
-intrigues and spies – winning over enemy’s people –
siege and assault.
Herbert Yardley – head of the MI-8, the forerunner of the top secret
national security administration a.k.a. Black chamber, a
cryptanalytic organization.
battle of midway- in June 1942, the turning point of the naval in the
pacific, the victory gained by the American was due to the disrupted
messages from the imperial Japanese navy.
Admiral Isoroku Yamamoto – April 1943, the cryptanalyst
of the US navy communications Intelligence intercepted a top-secret
signal relaying the travel of the admiral. En route he was intercepted
and crashed in the jungles.
Joseph petrosino – member of new York police dept, he was the
head of the Italian squad. Through extensive intelligence network, he
is credited to smash the black society/black hand.
Frederick the great – known as father of military espionage.
Divided his agents into 4 categories:
1. common spies – recruited among poor folk, glad to earn a
small sum or to accommodate a military officer.
2.double spies – the law informers and unreliable renegades of
value, chiefly in spreading false information to the enemy.
3. spies of consequences – couriers and noblemen, staff
officers, and kindred conspirators, invariable requiring a substantial
bribes or bait.
4. forced spies
Sun tzu – divided spies into 5:
1. local spies
2. inward/internal spies
3. converted spies
4. doomed spies
5. surviving spies
CIA – signed by president Harry S. Truman took cudgels from
the OSS. Considered as the largest intelligence agency in the
world.

KGB – komitet Gosudarstvennoy Bezopasnosti, Committee


for State Security. Counterpart of CIA. Russian President
Boris Yeltsin substituted by the Federal Security Service of
the Russian Federation (FSB) Federalnaya Sluzhba
Bezopasnosti.
MI6/SIS – Military Intelligence 6/ Secret Intelligence Service, a
parallel ally and intelligence organization of the western powers.

MOSSAD – an Israeli intelligence agency, short name for (ha-


mossad le-modiin ule-tafkidim meyuhadim) or in English
institute for intelligence and special tasks.

GRU – Glavnoje Razvedyvatel’noje Upravlenije. Under its umbrella


is KGB or FSB, SVR RF(Sluzhba Vneshney Razvedki) or Foreign
Intelligence Service of Russian Federation.
21. What do you call the Scotland yards crime database?

a.Automated crime identification system (ACIS)


b.Automated fingerprint identification system (AFIS)
c. crime analysis and database
d.HOLMES
22. He was the one who organized the metropolitan police
force base at Scotland yard.

a.Robert peel
b.John Edgar Hoover.
c.Cesar Nazareno
d. john fielding
23. What law created National Bureau of Investigation?

a.RA 6975
b.PD 1184
c.RA 157
d. Act 175
24. The following are types of police intelligence except:

a.Police strategic intelligence


b.Police line intelligence
c.Police counter intelligence
d.Police Combat intelligence
25. Such information must be updated; factual and concise
so as to provide effective aids in police operations what
kind of police intelligence is this?

a.Police strategic intelligence


b.Police line intelligence
c.Police counter intelligence
d.Police combat intelligence
26. it is usually used to define, describe the criminals and
their activities as well as provide an insight of their modus
operandi. It determines PWET.

a. police line intelligence


b.Police strategic intelligence
c.Police counter intelligence
d.Police combat intelligence
26. Who is the soviet officer which is codename is hero
because of his genuine defections on the soviet union and
provided important intelligence information to the CIA?

a.A.R Kim Philby


b.Alfred Redl
c.Oleg Vladimirovich Penkovsky
d.Igor Gouzenko
27. what kind of spy is considered to be most valuable?

a.Walk ins
b.Double spies
c.Agent in place
d.mole
28. it is a kind of spy who remain in a position of
confidence with access to highly secret information, but
recruited by a foreign intelligence service is called?

a.Walk ins
b.Double agent
c.Agent in place
d.mole
29. this are spies who simulate to be defecting but in
reality maintain their original loyalty is called?

a. walk ins
b.Double agent
c.Agent in place
d.mole
30. this term is not considered as one of type of spies but
this term is used for people who volunteer to be a spy, they
are cautiously recruited because most of double agents
come from this kind of recruit.

a.Walk ins
b.Double agent
c.Agent in place
d.mole
31. the following are phases of recruitment of intelligence
agent except?

a.Selection
b.Investigation
c.Testing
d.Field operation
32. it is a primary intelligence gathering and analysis arm
of the Philippine Government carrying out overt, covert and
clandestine intelligence program, its motto is kaalaman ay
kaligtasan.

a.NICA
b.ISAF
c.DND
d. J-2 coordinating staff
33. it is the gradual penetration into enemy domain and
territory?

a.Infiltration
b.Surveillance
c.Elicitation
d.penetration
Types of surveilance
discreet surveillance – subject to be watch is unaware that
he is under observation

close surveillance – subject is aware that he is under


observation varied on each occasion

loose surveillance – applied frequently or infrequently,


period of observation varied on each occasion.
34. intelligence cycle is processed in the following order.
1. collection of information
2. processing and analyzing and evaluation of information
3. direction of collection effort
4. dissemination of use of intelligence
a. 1234
b.3124
c.3241
d.1324
35. in intelligence cycle the, the 3rd phase is processing of
information, the following are stages in processing of
information except,

a. collation
b. evaluation
c. interpretation
d. integration
36. it is the determination of the significance of the
intelligence data in relation to other data at hand in order to
draw conclusion.

a. collation
b. evaluation
c. interpretation
d. integration
37. it is one of the stages of processing of information, it
refers to the examination of raw materials in order to
determine its reliability, credibility and relevance to police
operations.

a. collation
b. evaluation
c. interpretation
d. integration
38. interpretation stage have 3 district procedures, which of
the following does not belong to the group.

a.Analysis
b.Integration
c.Deduction
d.evaluation
39. it is done by shifting and sorting of all available
intelligence materials.

a.Analysis
b.Integration
c.Deduction
d.evaluation
39. it is the combination of all analyzed data to form a logical
picture or theory

a.Analysis
b.Integration
c.Deduction
d.evaluation
40. The formulation of conclusion from theories as result of
integration.

a.Analysis
b.Integration
c.Deduction
d.evaluation
41. The following are type of motive of informants except

a.Vanity
b.Fear
c.Perversity
d.Self aggrandizing
42. all but one does not belong to type of informants,
except?

a.Civic minded informant


b.Avenging informant
c.Self aggrandizing informant
d.Informant of renumeration
43. this type of motive of informant is for the purpose of
eliminating competition, set up decoys, learn the nature of
police intelligence and distract the efforts in intelligence
gathering.

a.Jealousy
b.Perversity
c.Revenge
d.repentance
44. this kind of informant gives information in exchange of
money or any financial advances.

a.Double cross informant


b.Mercenary informant
c.Confidential informant
d.Self aggrandizing informants
•KINDS OF OF MOTIVE OF INFORMANT
•VANITY - JEALOUSY
•CIVIC MINDEDNESS - AVOIDANCE OF PUNISHMENT
•FEAR
•REVENGE
•REPENTANCE
•RENUMERATION
•PERVERSITY
•KINDS OF INFORMANT
• ORDINARY INFORMANT
• MERCENARY INFORMANT
• RIVAL ELIMINATION INFORMANT
• DOUBLE CROSS INFORMANT
• VOLUNTARY INFORMANT
• SELF AGGRANDIZING INFORMANT
• CONFIDENTIAL INFORMANT
Two general sources of information

Open source – 99% of the info is collected are coming from


open source
close source – 1% of info from close source
45. it is a permanent official chronological record of the
operations of the intelligence section, unit or agency.

a.Intelligence work book


b.Intelligence journal
c.Situation map
d.intelligence file
46. a recording device that provides a means of systematic
arrangement of information by type or subject, so that
items concerning a particular topic may be group together
for ready reference and comparison.

a.Intelligence journal
b.Intelligence worksheet
c.Situation map
d.intelligence file
47. is a permanent, official and chronological recording of
events, incidents, information, activities being undertaken
by an intelligence

a.Intelligence journal
b.Intelligence worksheet
c.Situation map
d.intelligence file
48. this is the compilation of file of different reports
received by the units.

a.Intelligence journal
b.Intelligence workbook
c.Situation map
d.intelligence file
49. it is the gathering, assembling and accumulation,
securing, getting and obtaining all available information

a.Collection
b.Evalutaion
c.Analysis
d.integration
50. in evaluation code D2T is interpreted as?

a. completely reliable, probably true, direct observation


by the unit commander
b.Unreliable, doubtfully true, a result from interrogation
c.Fairly reliable, probably true, direct observation by the
unit commander
d. not usually reliable, probably true, direct observation
by the unit commander
51. it is done by shifting and sorting of all available
intelligence materials.

a.Analysis
b.Integration
c.Deduction
d.addition
52. this refers to the person being followed by surveillant.

a.Rabbit
b.Prover
c.Target
d.bird
53. this is other term for undercover, investigator that
assumes others identity.

a.Casing
b.Roping
c.Stake out
d.Reconnaisances
54. one of 6 type of agent is this type where he spread false
information to the enemy.

a.Double agent
b.Expandable agent
c. agent of influence
d.Agent provocation
Sexual and non-sexual compromise
MICE – Money, Ideology, Compromise, Ego
SEX falls under compromise category;
heterosexual compromise
-honey trap – use of beautiful woman
-Romeo – use of good looking man
homosexual compromise
-drone-traps
Cambridge spy ring & Geoffrey Prime of KGB
nonsexual
55. unauthorized disclosure of this classified document
may put at risk the national security and cause serious
injury to the reputation of the nation.

a.Top secret
b.Secret
c.confidential
d.Restricted
DOCUMENTS SECURITY CLASSIFICATION
• TOP SECRET – CONSIDERED IRREPLACEABLE OFFICIAL MATTERS, THE
UNAUTHORIZED DISCLOSURE OF WHICH WOULD CAUSE EXCEPTIONALLY GRAVE
DAMAGE TO THE INTEREST OF NATION.
• SECRET -THE UNAUTHORIZED DISCLOSURE OF WHICH WOULD ENDANGER
NATIONAL SECURITY.
• CONFIDENTIAL – THE UNAUTHORIZED DISCLOSURE OF WHICH, WHILE NOT
ENDANGERING THE NATIONAL SECURITY, WOULD BE PREJUDICIAL TO THE
INTEREST OR PRESTIGE OF THE NATION OR CAUSE EMBARRASSMENT TO THE
NATION
• RESTRICTED – SAME AS CONFIDENTIAL BUT REPRODUCTION IS AUTHORIZED THE
TRANSMISSION SHALL BE THROUGH THE NORMAL DISSEMINATION
56. special type of deception and cover to penetrate the
KGB by CIA

a.Silver bullet
b.Spoofing
c.Operation Neptune spear
d.none
57. the earliest recorded person who use code system to
secure the secrecy of an information from the enemies,
found in the bible Jeremiah 25-26.

a.Moses
b.Atbash
c.Mahatma
d.rahab
58. it is a method of writing which substitutes letters or
characters. It uses substitution and transposition method.

a.Code
b.Cipher
c.Cryptogram
d.none
59. the act of maliciously overhearing the private
conversation of other person.

a.Bugging
b.Eavesdropping
c.Wiretopping
d.chismising
60. these are matters that should be passed only to whom it
is necessary for fulfilment of their duties.

a.Need to know principle


b.Transmission
c.Top secret
d.secret.

You might also like