問題一覧
1
It is the result of Intelligence planning, planning is always ahead of operation although an operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence management
Intelligence Operations
2
It gathers and evaluates Information from different sources to predict and prevent organized crime activities
Intelligence Analyst
3
The art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key
Cryptography
4
It can represent phrases and entire sentences with symbols, such as five- letter groups, and is often used more for economy than for secrecy.
Codea
5
It deals with hidden or secret writing, relies on different ways to hide or disguise writing
Steganography
6
It depends on alphabetical, numerical, computer-based, or other scrambling methods.
Ciphers
7
a.k.a cleartext, it is the original communication to be scrambled or enciphered.
Plaintext
8
a.k.a ciphertext, the product of the enciphering process that usually involves an algorithm and a key
Cryptogram
9
It is a particular method of scrambling a computer program or a written set of instructions The key specifies the actual scrambling process.
Encryption Algorithm
10
It is the art of analysing cipher text to extract the plaintext or the key.In other words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers.
Cryptanalysis
11
It refers to those persons who break intercepted codes.
Crypto Analyst
12
It refers to the person who is highly skilled in converting message from clear to unintelligible forms by use of codes and cipher
Cryptographer
13
The changing of message from plain clear text to unintelligible form also known as "encrypting".
Coding
14
transforming of coded message into plain text also known as "decrypting".
Decoding
15
All evaluated materials of every description including those derived from observation, reports, rumors, imagery and other sources from which intelligence is produced
Information
16
An agent who uses authority to gain information.
Agent of Influence
17
An agent who has been recruited within a highly sensitive target
Agent in Place
18
An agent who has reached to the enemy, gather information and able to get back without being caught.
Penetration Agent
19
An agent who leaks information to the enemy
Expendable Agent
20
An an enemy agent, who has been faken into custody, tumed around and sent back where he came from as an agent of his captors.
Double Agent
21
A secret action undertaken in behalf of the government or other friendly forces
Clandestine Operation
22
Directs the organization conducting the clandestine activity.
Sponsor
23
A person, place or things against which the clandestine activity is to be conducted.
Target or Rabbit
24
It refers to the person who conducts the clandestine operations to include principal agents, action agents and support agents
Agent or Asset
25
The leader or management agent in clandestine operation usually undertaken by the case officer
Principal Agent
26
The one who conducts the clandestine operation
Action Agent
27
An agent who clandestinely procures or collects information
Spy
28
An agent who molds the attitudes, opinions and actions of an individual group
Propagandist
29
An agent who undertake positive actions against unfriendly power resulting in the loss of an article, material or facility
Saboteur
30
An agent who is a member of paramilitary group organized to grass the enemy.
Guerilla
31
An an agent available to provide special protection during dangerous phase of clandestine operations.
Strongman
32
An agent who induces an opponent to act to his own detriment
Provocateur
33
An agent who exert influence from foreign government upon discretion of the sponsor.
Cover Action
34
An agent who is engaged in activities which supports the clandestine operations and or the action agent in his operations
Support Agent
35
An agent who observes persons and places of operations of interest
Surveillant
36
An agent who undertake, to procure information or things of clandestine operational use,
Investigator
37
An agent who manage and maintain a safe house for clandestine operations like meetings, safe havens, training, briefing and debriefing
Safe House Keeper
38
An agent who is detailed as securing of clandestine communications.
Communication Agent
39
A disguised or secret observation of place. person or vehicles for the purpose of obtaining information concerning the identities or activities of the subject or criminals.
Surveillance
40
It refers to person who maintains the surveillance or performs the observation, a person who maintains the secret observation, which is either in the form of person, place or thing
Surveillant
41
It refers to person or place being watch or surveyed
Subject
42
Any person is a convenient, secure and unsuspecting place where police undercover men meet his action agent for debriefing or reporting purposes
Drop
43
An accomplice or associate of the subject used to avoid or elude surveillant
Convoy
44
A cover supporting the surveillant who can become a convoy whenever surveillant is burned
Decoy
45
Any persons whom the subject picks or deals with while he is under observation and identifies the observer
Contact
46
when subject under surveillance becomes aware that he is under observation and identifies the observer.
Made
47
Chronological records of activities that took place in the establishment under surveillance.
Log
48
It refers to a place where agents or informants leave their messages to the other agents.
Live Drop
49
When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.
Lost
50
It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his action agent.
Safe House
51
It is a conference held before a surveillance is conducted.
Pre-surveillance Conference
52
It is the observation of places or areas from a fixed point.
Stake-out
53
It is a term referring to the subject of shadowing and tailing.
Rabbit (Hare)
54
It is the common trick of the subject when he becomes conscious that he is being tailed
Test for Tailing
55
It is an open observation where we deliberately let the target know that surveillance is being conducted.
Overt Surveillance
56
It is a secretive watch where the target is not aware of the operative's presence or activities
Covert Surveillance
57
It involves the "eyeing" of a suspected person, vehicle or place. Secret observation is primarily through the eyes
Visual Surveillance
58
It is simply the surveillance of places
Fixed Surveillance
59
Excellent position operation are rooftops.
Long-range Surveillance
60
Suitable sites of operation are stores and hallways, it could be in the form of casing and shake-out
Short-range Surveillance
61
✔To detect evidence of criminal activities; ✔To established the association of the suspect ✔To find a wanted person; ✔To protect a witness; ✔To discover the associates, amusements and habits of an employee who has been proposed for a position of responsibility: ✔To check the loyalty of employees in an establishment where thieves occurred
Moving Surveillance
62
Employed when a general impression of the subjects' habits and associated is required.
Loose Tailing/Shadowing
63
It involves shadowing without special precaution. It may be used when the criminal must be observed and is aware that he is being followed
Rough Shadowing
64
Used when precaution is taken against losing the subject; constant surveillance is necessary.
Close Tailing
65
It is used in cases where the type of shadowing activity is loose or rough.
One-man Shadowinf
66
It maybe employed in close tailing where two shadowers are needed to maintain constant observation on the subject
Two-man Shadowing
67
It is appropriate to use if there are three or more available shadowers.
Team Shadowinf
68
a technique of using 3 or more shadowers to avoid detection since it enables the surveillance team to take turns in occupying the close contact position thus minimizing the possibility of burn-out
Leap Frogging Technique
69
This is the technique of evading a tail or shadow by entering a street-level entrance of a building and leaving the same through the rear, side or basement door
Double Door
70
This is the technique used by the subject to "test if he has grown tail". He does this by ignoring traffic safety devices or by abruptly turning back or changing his direction then cautiously return to his trail
Doubling Back
71
It is a surveillance by listening.
Audio Surveillance
72
It involves the interception of telephone (Communication) lines of the subject
Wire Tapping
73
A method of listening and recording spoken interactions by using concealed or cooperative devices that gather and amplify sound
Electronic Eavesdropping (Bugging)
74
The technique of wiring an undercover investigator or cooperative informer in order to secure a record of conversation to which the person wired for sound is a participant
Consensual Electronic Surveillance
75
It is the surveillance of valuable objects, articles, equipment, and including contraband
Contact Surveillance
76
A chemical applied to objects exposed to weather, such as fire, alarm boxes, automobiles, and drops used in espionage activity.
Tracer Paste
77
A substance available in plastic bottles for puffing tracer on money or any object nor exposed to weather
Marking Powder
78
It contains invisible ink for tracer marking of objects such as money or merchandise
Felt Pen or Crayon
79
A substance that visible when dry but becomes visible when wet, although it is difficult to wash off
Dye Powder