問題一覧
1
It refers to the element of investigation necessary for gathering and collection of data to include its progress as it moves forward in solving the case.
information
2
Is defined as accusation in writing, charging a person with an offense, subscribed by the fiscal, and filed in court
information
3
information is simply the “__________”.
raw data
4
This pieces of information is useless without being _______ and ________
analyzed and evaluated
5
Refers to collated, analyzed, and evaluated information appropriately acquired for a particular purpose
intelligence
6
is the network of data which can be linked or grouped in order to obtain a concrete and reliable information based on the prevailing need or as the need arises
Source of information
7
People as a source of information
regular source cultivated source Grapevine source
8
gathered through the people who have come directly to the attention of the police commonly the complainant, witness or victim
regular source
9
generally taken thorough the use of informant or informer
cultivated source
10
these are gathered from those who are in the underworld criminals or ex-convicts
Grapevine source
11
Records as a source of information
Governments source private source internet source
12
these are source taken from the government agencies or any of its instrumentality.
government source
13
these are source taken from the different private entities and business organizations, public utilities such as water or electric bills and all other private sectors
private source
14
this modern source of information is done through searching specific detail by typing the desired key or phrase in the different search engine.
internet source
15
It is an individual who openly or secretly obtain or assists in obtaining information for intelligence and counter-intelligence purposes in exchange for some recompense, monetary or otherwise.
informant
16
Types of Informant:
1. Anonymous 2. double-crosser 3. false informant 4. frightened 5. legitimate 6. mercenary 7. Self-aggrandizing 8. woman
17
these are unidentified informants and usually provide information to the police through telephone or cellphones
anonymous
18
these are informants who provide information in order also to gain information from the police. Worst, they acquire more information than what they give.
Double crosser
19
these are those informants who provide false information without bases.
false informant
20
an informant who provides information due to panic or anxiety.
frightened
21
these are those informants who provide information voluntarily to the police.
legitimate
22
these are those informants who provide information in exchange for a reward. Whether money or any other consideration.
mercenary
23
an informant who provides exaggerated information to the police in order to gain advantage or attention.
self-aggrandizing
24
these are the most dangerous and difficult type of informants against male subjects
Woman
25
infromant and their motives
1. Civic mindedness 2. Fear 3. Gratitude or Gain 4. Jelousy 5. Remuneration 6. Repentance 7. Revenge 8. Vanity
26
informant provides information as a sense of duty an obligation to assist the police.
civic mindedness
27
the person gives information due to oppression by enemies or other impending danger.
fear
28
informant provides information to obtain a privilege toward the welfare of his family.
Gratitude or gain
29
the informant is pushed to provide information to the police due to his resentment to the accomplishment or possessions of another.
jelousy
30
a person informs the police for some pecuniary or other material gain he is to receive.
remuneration
31
informant provides information as a sign of regret for what he has previously done
repentance
32
vengeance or retaliation is the sole purpose of the person in providing information to the police.
Revenge
33
the person wants to gain favorable attention and importance from the police.
vanity
34
R.A. 4200
anti-Wiretapping
35
R.A. 10173
Data Privacy act
36
used primarily to crack down organized crime, defend from enemy attacks, aid in the progress of covert or overt operation.
intelligence
37
simply means as operation conducted openly
overt investigation
38
is an operation conducted in clandestine manner
covert investigation
39
Scope of intelligence
1. National intelligence 2. Military intelligence 3. Police Intelligence 4. Departmental Intelligence
40
knowledge essential to the prevention of crimes and the investigation, arrest and prosecution of criminal offenders.
Criminal intelligence
41
knowledge essential to the maintenance of peace and order.
Internal security intelligence
42
knowledge essential in ensuring the protection of lives and properties.
public safety intelligence
43
Not a immediate value
Strategic intelligence
44
knowledge that is immediate in nature and can be available or developed within a short period of time. It is required by the commander to provide for planning and conduct tactical and administrative operation in counterinsurgency
line intelligence
45
Refers to the stealing of vital information either physical or electronic form
espionage
46
Refers to the stealing of properties or destruction of any material in order to hamper or cause delay in the preparation or regular working duties.
Sabotage
47
The recruitment of person who is working within an organization or employment of any person to an organization who will work secretly in an attempt to undermine or overthrow its current system
subversive
48
An activity that constitutes the value of the CI workload world wide and includes specific investigation of individual and incidence which for the most part are conducted in an OVERT but DISCREET manner.
Counter Intelligence Operation
49
Three categories of counter Intelligence Operation
counter human intel counter imagery intel counter signal intel
50
seeks to overcome enemy attempts to use human sources to collect information or to conduct sabotage and subversion.
counter human intel
51
Includes action such as surveillance radar, photo thermal and infrared systems and rely heavily on pattern and movement analysis and evaluation of the enemy
counter imagery intel
52
Determine enemy SIGINT and related enemy weaknesses, capabilities, and activities, assess friendly operations to identify patterns, profiles, and develop, recommend and analyze counter measures.
counter signal intel
53
types of counter Intelligence
passive Counter Intelligence measure active counter Intelligence measure
54
Include protection of classified and sensitive information to the unauthorized individual through secrecy, communication security, and other various safeguards
passive CI Measure
55
Are those measures that actively block the enemies' effort to gain information or engage in espionage, subversive and sabotage.
Active CI Measures
56
It is a repetitive process used to produce intelligence from information.
intelligence cycle
57
Is defined as the process of determining the extent and scope of the needed preparation which includes the supervision of the collection of information and other requirements based on the standard priorities.
planning phase
58
Refers to the information gathering done in compliance with established procedure to avoid detection and penetrate successfully.
collection phase
59
Refers to the process involved in evaluating the accuracy and reliability of the information collected.
collation phase
60
means judging the source of information
reliability
61
simply means the level of truthfulness of the information collected.
accuracy
62
refers to the systematic sorting of all documented information and present them either in writing or some other form of presentation so that they can be analyzed and studied for future action.
recording
63
information collected is divided into different components; and isolate those that are relevant o has intelligence value which includes the source of information, truthfulness, and who provides the information.
analysis
64
assessment of information done to determine the reliability of the source and providing judgment in line with accuracy to determine its truthfulness as well as its pertinence to the current situation
evaluation
65
is the combination of all those isolated information from various sources to produce a new information necessary for the success of the mission.
integration
66
is the process involve in providing meaning and significance of new information.
interpretation
67
provide conclusion based on the new information generated in relation to the current situation
synthesis
68
Refers to the action taken to transfer processed information to appropriate persons
dissemination phase
69
means information or those that had already intelligence value should only be passed, handed and disseminated among persons who have the personality to know or acquire the same.
Need to know
70
It is an investigative technique in which agent conceal his official identity in order to obtain information from the target organization.
Undercover Operation
71
is the means as to how investigators will hide his original identity
cover
72
it is the biographical portrayal of the investigator as to what role he will depict toward criminal syndicate while collecting vital information
cover story
73
is the person who provides support to the investigator.
cover support
74
Undercover operation is otherwise known as "_________"
Roping
75
types of cover
Artificial cover Multiple cover
76
done if the undercover agent is modifying his identity based on the current operation or as the case ay require.
artificial cover
77
involves the use of different cover that will fit to a given situation.
Multiple Cover
78
Types of undercover assignment
dwelling/residential assignment work assignment social assignment
79
Is one where the undercover agent established residence in or near the dwelling which houses the subject.
dwelling/residential assignment
80
Places the undercover agent in a type of employment where he can observe the activities of the subject at his place of work.
work assignment
81
It requires the undercover agent to frequent places of social entertainment and amusement known to be habitually visited by target personalities and their associates.
social assignment
82
elements of under cover Operation
Head Target Agent
83
the person who directs the organization conducting the undercover operation
Head
84
pertains to any person, place or things against which the undercover operation is to be conducted
target
85
refers to a person who conducts the clandestine activity.
Agent
86
Is a form of extracting information done through an interview with the person who might possess valuable information concerning a person, event, organization or place without his knowledge or suspicion.
Elicitation
87
it pertains to the manner as to how you will start talking
Approach
88
refers to the manner how you will keep the person talk.
probe
89
refers to the safe place where the investigator or his informant will meet for briefing or debriefing purpose.
safe house
90
refers to a person who carries an information to another person.
courier
91
refers to a secure place where agents or informants give their message to other agents through:
drop
92
the agent merely leave the message
dead drop
93
the courier hand over the message directly to the agent.
live drop
94
Is defined as the clandestine or secret observation of persons, places or objects to acquire valuable information.
surveillance
95
refers to who or what is being observes which can be any person, place, property, vehicle, group of people, organization or object.
subject
96
The person conducting the surveillance
Surveillant
97
simply the outline of blueprint as to how surveillance should be conducted.
surveillant plan
98
any person whom the subjects picks or deals with while he is under observation.
contact
99
is an associate of the subject who follows him to detect surveillance
convoy
100
is a person or object use by the subject in attempt to escape the eyes of surveillant.
decoy