問題一覧
1
An agent who leaks information to the enemy
Expendable Agent
2
An agent who observes persons and places of operations of interest
Surveillant
3
It deals with hidden or secret writing, relies on different ways to hide or disguise writing
Steganography
4
It gathers and evaluates Information from different sources to predict and prevent organized crime activities
Intelligence Analyst
5
It is an open observation where we deliberately let the target know that surveillance is being conducted.
Overt Surveillance
6
All evaluated materials of every description including those derived from observation, reports, rumors, imagery and other sources from which intelligence is produced
Information
7
Any persons whom the subject picks or deals with while he is under observation and identifies the observer
Contact
8
It depends on alphabetical, numerical, computer-based, or other scrambling methods.
Ciphers
9
An agent who manage and maintain a safe house for clandestine operations like meetings, safe havens, training, briefing and debriefing
Safe House Keeper
10
When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.
Lost
11
when subject under surveillance becomes aware that he is under observation and identifies the observer.
Made
12
The technique of wiring an undercover investigator or cooperative informer in order to secure a record of conversation to which the person wired for sound is a participant
Consensual Electronic Surveillance
13
Used when precaution is taken against losing the subject; constant surveillance is necessary.
Close Tailing
14
It maybe employed in close tailing where two shadowers are needed to maintain constant observation on the subject
Two-man Shadowing
15
An agent who has been recruited within a highly sensitive target
Agent in Place
16
A cover supporting the surveillant who can become a convoy whenever surveillant is burned
Decoy
17
A secret action undertaken in behalf of the government or other friendly forces
Clandestine Operation
18
a.k.a ciphertext, the product of the enciphering process that usually involves an algorithm and a key
Cryptogram
19
An agent who molds the attitudes, opinions and actions of an individual group
Propagandist
20
It refers to those persons who break intercepted codes.
Crypto Analyst
21
An agent who induces an opponent to act to his own detriment
Provocateur
22
It is a term referring to the subject of shadowing and tailing.
Rabbit (Hare)
23
It refers to person or place being watch or surveyed
Subject
24
It refers to the person who conducts the clandestine operations to include principal agents, action agents and support agents
Agent or Asset
25
It is used in cases where the type of shadowing activity is loose or rough.
One-man Shadowinf
26
An agent who clandestinely procures or collects information
Spy
27
An accomplice or associate of the subject used to avoid or elude surveillant
Convoy
28
a.k.a cleartext, it is the original communication to be scrambled or enciphered.
Plaintext
29
A method of listening and recording spoken interactions by using concealed or cooperative devices that gather and amplify sound
Electronic Eavesdropping (Bugging)
30
a technique of using 3 or more shadowers to avoid detection since it enables the surveillance team to take turns in occupying the close contact position thus minimizing the possibility of burn-out
Leap Frogging Technique
31
An agent who is engaged in activities which supports the clandestine operations and or the action agent in his operations
Support Agent
32
An agent who is a member of paramilitary group organized to grass the enemy.
Guerilla
33
It involves shadowing without special precaution. It may be used when the criminal must be observed and is aware that he is being followed
Rough Shadowing
34
The art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key
Cryptography
35
Chronological records of activities that took place in the establishment under surveillance.
Log
36
It involves the interception of telephone (Communication) lines of the subject
Wire Tapping
37
An agent who uses authority to gain information.
Agent of Influence
38
It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his action agent.
Safe House
39
It is the common trick of the subject when he becomes conscious that he is being tailed
Test for Tailing
40
The leader or management agent in clandestine operation usually undertaken by the case officer
Principal Agent
41
It is a surveillance by listening.
Audio Surveillance
42
It can represent phrases and entire sentences with symbols, such as five- letter groups, and is often used more for economy than for secrecy.
Codea
43
An agent who has reached to the enemy, gather information and able to get back without being caught.
Penetration Agent
44
Directs the organization conducting the clandestine activity.
Sponsor
45
A substance that visible when dry but becomes visible when wet, although it is difficult to wash off
Dye Powder
46
An agent who undertake positive actions against unfriendly power resulting in the loss of an article, material or facility
Saboteur
47
It is the surveillance of valuable objects, articles, equipment, and including contraband
Contact Surveillance
48
It is a conference held before a surveillance is conducted.
Pre-surveillance Conference
49
An agent who exert influence from foreign government upon discretion of the sponsor.
Cover Action
50
Suitable sites of operation are stores and hallways, it could be in the form of casing and shake-out
Short-range Surveillance
51
It involves the "eyeing" of a suspected person, vehicle or place. Secret observation is primarily through the eyes
Visual Surveillance
52
Any person is a convenient, secure and unsuspecting place where police undercover men meet his action agent for debriefing or reporting purposes
Drop
53
Excellent position operation are rooftops.
Long-range Surveillance
54
✔To detect evidence of criminal activities; ✔To established the association of the suspect ✔To find a wanted person; ✔To protect a witness; ✔To discover the associates, amusements and habits of an employee who has been proposed for a position of responsibility: ✔To check the loyalty of employees in an establishment where thieves occurred
Moving Surveillance
55
The one who conducts the clandestine operation
Action Agent
56
It refers to a place where agents or informants leave their messages to the other agents.
Live Drop
57
It is simply the surveillance of places
Fixed Surveillance
58
It contains invisible ink for tracer marking of objects such as money or merchandise
Felt Pen or Crayon
59
A person, place or things against which the clandestine activity is to be conducted.
Target or Rabbit
60
A disguised or secret observation of place. person or vehicles for the purpose of obtaining information concerning the identities or activities of the subject or criminals.
Surveillance
61
It is the observation of places or areas from a fixed point.
Stake-out
62
Employed when a general impression of the subjects' habits and associated is required.
Loose Tailing/Shadowing
63
This is the technique of evading a tail or shadow by entering a street-level entrance of a building and leaving the same through the rear, side or basement door
Double Door
64
This is the technique used by the subject to "test if he has grown tail". He does this by ignoring traffic safety devices or by abruptly turning back or changing his direction then cautiously return to his trail
Doubling Back
65
transforming of coded message into plain text also known as "decrypting".
Decoding
66
An an enemy agent, who has been faken into custody, tumed around and sent back where he came from as an agent of his captors.
Double Agent
67
The changing of message from plain clear text to unintelligible form also known as "encrypting".
Coding
68
It is appropriate to use if there are three or more available shadowers.
Team Shadowinf
69
It is the result of Intelligence planning, planning is always ahead of operation although an operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence management
Intelligence Operations
70
It refers to the person who is highly skilled in converting message from clear to unintelligible forms by use of codes and cipher
Cryptographer
71
It is the art of analysing cipher text to extract the plaintext or the key.In other words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers.
Cryptanalysis
72
It is a secretive watch where the target is not aware of the operative's presence or activities
Covert Surveillance
73
An agent who is detailed as securing of clandestine communications.
Communication Agent
74
An agent who undertake, to procure information or things of clandestine operational use,
Investigator
75
A substance available in plastic bottles for puffing tracer on money or any object nor exposed to weather
Marking Powder
76
It refers to person who maintains the surveillance or performs the observation, a person who maintains the secret observation, which is either in the form of person, place or thing
Surveillant
77
An an agent available to provide special protection during dangerous phase of clandestine operations.
Strongman
78
It is a particular method of scrambling a computer program or a written set of instructions The key specifies the actual scrambling process.
Encryption Algorithm
79
A chemical applied to objects exposed to weather, such as fire, alarm boxes, automobiles, and drops used in espionage activity.
Tracer Paste