CDI1(PREFINAL)2

CDI1(PREFINAL)2
79問 • 2年前
  • Dotty Tanguilig
  • 通報

    問題一覧

  • 1

    It is the result of Intelligence planning, planning is always ahead of operation although an operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence management

    Intelligence Operations

  • 2

    It gathers and evaluates Information from different sources to predict and prevent organized crime activities

    Intelligence Analyst

  • 3

    The art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key

    Cryptography

  • 4

    It can represent phrases and entire sentences with symbols, such as five- letter groups, and is often used more for economy than for secrecy.

    Codea

  • 5

    It deals with hidden or secret writing, relies on different ways to hide or disguise writing

    Steganography

  • 6

    It depends on alphabetical, numerical, computer-based, or other scrambling methods.

    Ciphers

  • 7

    a.k.a cleartext, it is the original communication to be scrambled or enciphered.

    Plaintext

  • 8

    a.k.a ciphertext, the product of the enciphering process that usually involves an algorithm and a key

    Cryptogram

  • 9

    It is a particular method of scrambling a computer program or a written set of instructions The key specifies the actual scrambling process.

    Encryption Algorithm

  • 10

    It is the art of analysing cipher text to extract the plaintext or the key.In other words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers.

    Cryptanalysis

  • 11

    It refers to those persons who break intercepted codes.

    Crypto Analyst

  • 12

    It refers to the person who is highly skilled in converting message from clear to unintelligible forms by use of codes and cipher

    Cryptographer

  • 13

    The changing of message from plain clear text to unintelligible form also known as "encrypting".

    Coding

  • 14

    transforming of coded message into plain text also known as "decrypting".

    Decoding

  • 15

    All evaluated materials of every description including those derived from observation, reports, rumors, imagery and other sources from which intelligence is produced

    Information

  • 16

    An agent who uses authority to gain information.

    Agent of Influence

  • 17

    An agent who has been recruited within a highly sensitive target

    Agent in Place

  • 18

    An agent who has reached to the enemy, gather information and able to get back without being caught.

    Penetration Agent

  • 19

    An agent who leaks information to the enemy

    Expendable Agent

  • 20

    An an enemy agent, who has been faken into custody, tumed around and sent back where he came from as an agent of his captors.

    Double Agent

  • 21

    A secret action undertaken in behalf of the government or other friendly forces

    Clandestine Operation

  • 22

    Directs the organization conducting the clandestine activity.

    Sponsor

  • 23

    A person, place or things against which the clandestine activity is to be conducted.

    Target or Rabbit

  • 24

    It refers to the person who conducts the clandestine operations to include principal agents, action agents and support agents

    Agent or Asset

  • 25

    The leader or management agent in clandestine operation usually undertaken by the case officer

    Principal Agent

  • 26

    The one who conducts the clandestine operation

    Action Agent

  • 27

    An agent who clandestinely procures or collects information

    Spy

  • 28

    An agent who molds the attitudes, opinions and actions of an individual group

    Propagandist

  • 29

    An agent who undertake positive actions against unfriendly power resulting in the loss of an article, material or facility

    Saboteur

  • 30

    An agent who is a member of paramilitary group organized to grass the enemy.

    Guerilla

  • 31

    An an agent available to provide special protection during dangerous phase of clandestine operations.

    Strongman

  • 32

    An agent who induces an opponent to act to his own detriment

    Provocateur

  • 33

    An agent who exert influence from foreign government upon discretion of the sponsor.

    Cover Action

  • 34

    An agent who is engaged in activities which supports the clandestine operations and or the action agent in his operations

    Support Agent

  • 35

    An agent who observes persons and places of operations of interest

    Surveillant

  • 36

    An agent who undertake, to procure information or things of clandestine operational use,

    Investigator

  • 37

    An agent who manage and maintain a safe house for clandestine operations like meetings, safe havens, training, briefing and debriefing

    Safe House Keeper

  • 38

    An agent who is detailed as securing of clandestine communications.

    Communication Agent

  • 39

    A disguised or secret observation of place. person or vehicles for the purpose of obtaining information concerning the identities or activities of the subject or criminals.

    Surveillance

  • 40

    It refers to person who maintains the surveillance or performs the observation, a person who maintains the secret observation, which is either in the form of person, place or thing

    Surveillant

  • 41

    It refers to person or place being watch or surveyed

    Subject

  • 42

    Any person is a convenient, secure and unsuspecting place where police undercover men meet his action agent for debriefing or reporting purposes

    Drop

  • 43

    An accomplice or associate of the subject used to avoid or elude surveillant

    Convoy

  • 44

    A cover supporting the surveillant who can become a convoy whenever surveillant is burned

    Decoy

  • 45

    Any persons whom the subject picks or deals with while he is under observation and identifies the observer

    Contact

  • 46

    when subject under surveillance becomes aware that he is under observation and identifies the observer.

    Made

  • 47

    Chronological records of activities that took place in the establishment under surveillance.

    Log

  • 48

    It refers to a place where agents or informants leave their messages to the other agents.

    Live Drop

  • 49

    When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.

    Lost

  • 50

    It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his action agent.

    Safe House

  • 51

    It is a conference held before a surveillance is conducted.

    Pre-surveillance Conference

  • 52

    It is the observation of places or areas from a fixed point.

    Stake-out

  • 53

    It is a term referring to the subject of shadowing and tailing.

    Rabbit (Hare)

  • 54

    It is the common trick of the subject when he becomes conscious that he is being tailed

    Test for Tailing

  • 55

    It is an open observation where we deliberately let the target know that surveillance is being conducted.

    Overt Surveillance

  • 56

    It is a secretive watch where the target is not aware of the operative's presence or activities

    Covert Surveillance

  • 57

    It involves the "eyeing" of a suspected person, vehicle or place. Secret observation is primarily through the eyes

    Visual Surveillance

  • 58

    It is simply the surveillance of places

    Fixed Surveillance

  • 59

    Excellent position operation are rooftops.

    Long-range Surveillance

  • 60

    Suitable sites of operation are stores and hallways, it could be in the form of casing and shake-out

    Short-range Surveillance

  • 61

    ✔To detect evidence of criminal activities; ✔To established the association of the suspect ✔To find a wanted person; ✔To protect a witness; ✔To discover the associates, amusements and habits of an employee who has been proposed for a position of responsibility: ✔To check the loyalty of employees in an establishment where thieves occurred

    Moving Surveillance

  • 62

    Employed when a general impression of the subjects' habits and associated is required.

    Loose Tailing/Shadowing

  • 63

    It involves shadowing without special precaution. It may be used when the criminal must be observed and is aware that he is being followed

    Rough Shadowing

  • 64

    Used when precaution is taken against losing the subject; constant surveillance is necessary.

    Close Tailing

  • 65

    It is used in cases where the type of shadowing activity is loose or rough.

    One-man Shadowinf

  • 66

    It maybe employed in close tailing where two shadowers are needed to maintain constant observation on the subject

    Two-man Shadowing

  • 67

    It is appropriate to use if there are three or more available shadowers.

    Team Shadowinf

  • 68

    a technique of using 3 or more shadowers to avoid detection since it enables the surveillance team to take turns in occupying the close contact position thus minimizing the possibility of burn-out

    Leap Frogging Technique

  • 69

    This is the technique of evading a tail or shadow by entering a street-level entrance of a building and leaving the same through the rear, side or basement door

    Double Door

  • 70

    This is the technique used by the subject to "test if he has grown tail". He does this by ignoring traffic safety devices or by abruptly turning back or changing his direction then cautiously return to his trail

    Doubling Back

  • 71

    It is a surveillance by listening.

    Audio Surveillance

  • 72

    It involves the interception of telephone (Communication) lines of the subject

    Wire Tapping

  • 73

    A method of listening and recording spoken interactions by using concealed or cooperative devices that gather and amplify sound

    Electronic Eavesdropping (Bugging)

  • 74

    The technique of wiring an undercover investigator or cooperative informer in order to secure a record of conversation to which the person wired for sound is a participant

    Consensual Electronic Surveillance

  • 75

    It is the surveillance of valuable objects, articles, equipment, and including contraband

    Contact Surveillance

  • 76

    A chemical applied to objects exposed to weather, such as fire, alarm boxes, automobiles, and drops used in espionage activity.

    Tracer Paste

  • 77

    A substance available in plastic bottles for puffing tracer on money or any object nor exposed to weather

    Marking Powder

  • 78

    It contains invisible ink for tracer marking of objects such as money or merchandise

    Felt Pen or Crayon

  • 79

    A substance that visible when dry but becomes visible when wet, although it is difficult to wash off

    Dye Powder

  • CJS1

    CJS1

    Dotty Tanguilig · 22問 · 3年前

    CJS1

    CJS1

    22問 • 3年前
    Dotty Tanguilig

    Pre Final CJS

    Pre Final CJS

    Dotty Tanguilig · 52問 · 2年前

    Pre Final CJS

    Pre Final CJS

    52問 • 2年前
    Dotty Tanguilig

    CJS

    CJS

    Dotty Tanguilig · 63問 · 2年前

    CJS

    CJS

    63問 • 2年前
    Dotty Tanguilig

    CJS finals

    CJS finals

    Dotty Tanguilig · 28問 · 2年前

    CJS finals

    CJS finals

    28問 • 2年前
    Dotty Tanguilig

    INTRO TO CRIM

    INTRO TO CRIM

    Dotty Tanguilig · 13問 · 2年前

    INTRO TO CRIM

    INTRO TO CRIM

    13問 • 2年前
    Dotty Tanguilig

    CDI1

    CDI1

    Dotty Tanguilig · 76問 · 2年前

    CDI1

    CDI1

    76問 • 2年前
    Dotty Tanguilig

    LEA1

    LEA1

    Dotty Tanguilig · 19問 · 2年前

    LEA1

    LEA1

    19問 • 2年前
    Dotty Tanguilig

    CDI1 TAO TAO

    CDI1 TAO TAO

    Dotty Tanguilig · 24問 · 2年前

    CDI1 TAO TAO

    CDI1 TAO TAO

    24問 • 2年前
    Dotty Tanguilig

    THEORIES

    THEORIES

    Dotty Tanguilig · 24問 · 2年前

    THEORIES

    THEORIES

    24問 • 2年前
    Dotty Tanguilig

    GenChem

    GenChem

    Dotty Tanguilig · 16問 · 2年前

    GenChem

    GenChem

    16問 • 2年前
    Dotty Tanguilig

    Rizal

    Rizal

    Dotty Tanguilig · 16問 · 2年前

    Rizal

    Rizal

    16問 • 2年前
    Dotty Tanguilig

    GENCHEM

    GENCHEM

    Dotty Tanguilig · 7問 · 2年前

    GENCHEM

    GENCHEM

    7問 • 2年前
    Dotty Tanguilig

    Filipino

    Filipino

    Dotty Tanguilig · 11問 · 2年前

    Filipino

    Filipino

    11問 • 2年前
    Dotty Tanguilig

    Ang retorika bilang sining

    Ang retorika bilang sining

    Dotty Tanguilig · 6問 · 2年前

    Ang retorika bilang sining

    Ang retorika bilang sining

    6問 • 2年前
    Dotty Tanguilig

    Saklaw ng Retorika

    Saklaw ng Retorika

    Dotty Tanguilig · 5問 · 2年前

    Saklaw ng Retorika

    Saklaw ng Retorika

    5問 • 2年前
    Dotty Tanguilig

    Tungkulin ng Retorika

    Tungkulin ng Retorika

    Dotty Tanguilig · 5問 · 2年前

    Tungkulin ng Retorika

    Tungkulin ng Retorika

    5問 • 2年前
    Dotty Tanguilig

    Roles of Police

    Roles of Police

    Dotty Tanguilig · 9問 · 2年前

    Roles of Police

    Roles of Police

    9問 • 2年前
    Dotty Tanguilig

    Theories

    Theories

    Dotty Tanguilig · 12問 · 2年前

    Theories

    Theories

    12問 • 2年前
    Dotty Tanguilig

    Global History of Police

    Global History of Police

    Dotty Tanguilig · 12問 · 2年前

    Global History of Police

    Global History of Police

    12問 • 2年前
    Dotty Tanguilig

    CDI2

    CDI2

    Dotty Tanguilig · 44問 · 2年前

    CDI2

    CDI2

    44問 • 2年前
    Dotty Tanguilig

    LEA2

    LEA2

    Dotty Tanguilig · 45問 · 2年前

    LEA2

    LEA2

    45問 • 2年前
    Dotty Tanguilig

    CDI1(PREFINAL)

    CDI1(PREFINAL)

    Dotty Tanguilig · 71問 · 2年前

    CDI1(PREFINAL)

    CDI1(PREFINAL)

    71問 • 2年前
    Dotty Tanguilig

    ADGE (PREFINAL)

    ADGE (PREFINAL)

    Dotty Tanguilig · 38問 · 2年前

    ADGE (PREFINAL)

    ADGE (PREFINAL)

    38問 • 2年前
    Dotty Tanguilig

    MASINING (PREFINAL)

    MASINING (PREFINAL)

    Dotty Tanguilig · 21問 · 2年前

    MASINING (PREFINAL)

    MASINING (PREFINAL)

    21問 • 2年前
    Dotty Tanguilig

    CDI1(FINAL)3

    CDI1(FINAL)3

    Dotty Tanguilig · 91問 · 2年前

    CDI1(FINAL)3

    CDI1(FINAL)3

    91問 • 2年前
    Dotty Tanguilig

    LEA1

    LEA1

    Dotty Tanguilig · 71問 · 2年前

    LEA1

    LEA1

    71問 • 2年前
    Dotty Tanguilig

    CA (Q1)

    CA (Q1)

    Dotty Tanguilig · 22問 · 2年前

    CA (Q1)

    CA (Q1)

    22問 • 2年前
    Dotty Tanguilig

    HBV (Q2)

    HBV (Q2)

    Dotty Tanguilig · 30問 · 2年前

    HBV (Q2)

    HBV (Q2)

    30問 • 2年前
    Dotty Tanguilig

    FP

    FP

    Dotty Tanguilig · 19問 · 2年前

    FP

    FP

    19問 • 2年前
    Dotty Tanguilig

    Front

    Front

    Dotty Tanguilig · 21問 · 2年前

    Front

    Front

    21問 • 2年前
    Dotty Tanguilig

    REAR

    REAR

    Dotty Tanguilig · 15問 · 2年前

    REAR

    REAR

    15問 • 2年前
    Dotty Tanguilig

    TOP

    TOP

    Dotty Tanguilig · 10問 · 2年前

    TOP

    TOP

    10問 • 2年前
    Dotty Tanguilig

    Settings

    Settings

    Dotty Tanguilig · 7問 · 2年前

    Settings

    Settings

    7問 • 2年前
    Dotty Tanguilig

    CFLM

    CFLM

    Dotty Tanguilig · 25問 · 2年前

    CFLM

    CFLM

    25問 • 2年前
    Dotty Tanguilig

    CA

    CA

    Dotty Tanguilig · 45問 · 2年前

    CA

    CA

    45問 • 2年前
    Dotty Tanguilig

    CA1

    CA1

    Dotty Tanguilig · 6問 · 2年前

    CA1

    CA1

    6問 • 2年前
    Dotty Tanguilig

    CA2

    CA2

    Dotty Tanguilig · 6問 · 2年前

    CA2

    CA2

    6問 • 2年前
    Dotty Tanguilig

    CA3

    CA3

    Dotty Tanguilig · 5問 · 2年前

    CA3

    CA3

    5問 • 2年前
    Dotty Tanguilig

    HBV2

    HBV2

    Dotty Tanguilig · 33問 · 2年前

    HBV2

    HBV2

    33問 • 2年前
    Dotty Tanguilig

    INDUSTRIAL

    INDUSTRIAL

    Dotty Tanguilig · 38問 · 2年前

    INDUSTRIAL

    INDUSTRIAL

    38問 • 2年前
    Dotty Tanguilig

    PI

    PI

    Dotty Tanguilig · 23問 · 2年前

    PI

    PI

    23問 • 2年前
    Dotty Tanguilig

    MARKSMANSHIP

    MARKSMANSHIP

    Dotty Tanguilig · 30問 · 2年前

    MARKSMANSHIP

    MARKSMANSHIP

    30問 • 2年前
    Dotty Tanguilig

    CDI2

    CDI2

    Dotty Tanguilig · 24問 · 2年前

    CDI2

    CDI2

    24問 • 2年前
    Dotty Tanguilig

    CFLM

    CFLM

    Dotty Tanguilig · 10問 · 2年前

    CFLM

    CFLM

    10問 • 2年前
    Dotty Tanguilig

    CA

    CA

    Dotty Tanguilig · 6問 · 2年前

    CA

    CA

    6問 • 2年前
    Dotty Tanguilig

    PI2

    PI2

    Dotty Tanguilig · 23問 · 2年前

    PI2

    PI2

    23問 • 2年前
    Dotty Tanguilig

    Marksmanship2

    Marksmanship2

    Dotty Tanguilig · 14問 · 2年前

    Marksmanship2

    Marksmanship2

    14問 • 2年前
    Dotty Tanguilig

    CVE3

    CVE3

    Dotty Tanguilig · 5問 · 2年前

    CVE3

    CVE3

    5問 • 2年前
    Dotty Tanguilig

    HBV3

    HBV3

    Dotty Tanguilig · 19問 · 2年前

    HBV3

    HBV3

    19問 • 2年前
    Dotty Tanguilig

    HBV

    HBV

    Dotty Tanguilig · 24問 · 2年前

    HBV

    HBV

    24問 • 2年前
    Dotty Tanguilig

    Personality Disorder

    Personality Disorder

    Dotty Tanguilig · 11問 · 2年前

    Personality Disorder

    Personality Disorder

    11問 • 2年前
    Dotty Tanguilig

    CFLM

    CFLM

    Dotty Tanguilig · 16問 · 2年前

    CFLM

    CFLM

    16問 • 2年前
    Dotty Tanguilig

    (2)

    (2)

    Dotty Tanguilig · 24問 · 1年前

    (2)

    (2)

    24問 • 1年前
    Dotty Tanguilig

    (3)

    (3)

    Dotty Tanguilig · 5問 · 1年前

    (3)

    (3)

    5問 • 1年前
    Dotty Tanguilig

    CDI3

    CDI3

    Dotty Tanguilig · 24問 · 1年前

    CDI3

    CDI3

    24問 • 1年前
    Dotty Tanguilig

    Inherent Powers of the State

    Inherent Powers of the State

    Dotty Tanguilig · 20問 · 1年前

    Inherent Powers of the State

    Inherent Powers of the State

    20問 • 1年前
    Dotty Tanguilig

    Three Branches of the Government

    Three Branches of the Government

    Dotty Tanguilig · 11問 · 1年前

    Three Branches of the Government

    Three Branches of the Government

    11問 • 1年前
    Dotty Tanguilig

    Executive Department

    Executive Department

    Dotty Tanguilig · 40問 · 1年前

    Executive Department

    Executive Department

    40問 • 1年前
    Dotty Tanguilig

    Q1

    Q1

    Dotty Tanguilig · 20問 · 1年前

    Q1

    Q1

    20問 • 1年前
    Dotty Tanguilig

    RA 9514

    RA 9514

    Dotty Tanguilig · 53問 · 1年前

    RA 9514

    RA 9514

    53問 • 1年前
    Dotty Tanguilig

    問題一覧

  • 1

    It is the result of Intelligence planning, planning is always ahead of operation although an operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence management

    Intelligence Operations

  • 2

    It gathers and evaluates Information from different sources to predict and prevent organized crime activities

    Intelligence Analyst

  • 3

    The art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key

    Cryptography

  • 4

    It can represent phrases and entire sentences with symbols, such as five- letter groups, and is often used more for economy than for secrecy.

    Codea

  • 5

    It deals with hidden or secret writing, relies on different ways to hide or disguise writing

    Steganography

  • 6

    It depends on alphabetical, numerical, computer-based, or other scrambling methods.

    Ciphers

  • 7

    a.k.a cleartext, it is the original communication to be scrambled or enciphered.

    Plaintext

  • 8

    a.k.a ciphertext, the product of the enciphering process that usually involves an algorithm and a key

    Cryptogram

  • 9

    It is a particular method of scrambling a computer program or a written set of instructions The key specifies the actual scrambling process.

    Encryption Algorithm

  • 10

    It is the art of analysing cipher text to extract the plaintext or the key.In other words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers.

    Cryptanalysis

  • 11

    It refers to those persons who break intercepted codes.

    Crypto Analyst

  • 12

    It refers to the person who is highly skilled in converting message from clear to unintelligible forms by use of codes and cipher

    Cryptographer

  • 13

    The changing of message from plain clear text to unintelligible form also known as "encrypting".

    Coding

  • 14

    transforming of coded message into plain text also known as "decrypting".

    Decoding

  • 15

    All evaluated materials of every description including those derived from observation, reports, rumors, imagery and other sources from which intelligence is produced

    Information

  • 16

    An agent who uses authority to gain information.

    Agent of Influence

  • 17

    An agent who has been recruited within a highly sensitive target

    Agent in Place

  • 18

    An agent who has reached to the enemy, gather information and able to get back without being caught.

    Penetration Agent

  • 19

    An agent who leaks information to the enemy

    Expendable Agent

  • 20

    An an enemy agent, who has been faken into custody, tumed around and sent back where he came from as an agent of his captors.

    Double Agent

  • 21

    A secret action undertaken in behalf of the government or other friendly forces

    Clandestine Operation

  • 22

    Directs the organization conducting the clandestine activity.

    Sponsor

  • 23

    A person, place or things against which the clandestine activity is to be conducted.

    Target or Rabbit

  • 24

    It refers to the person who conducts the clandestine operations to include principal agents, action agents and support agents

    Agent or Asset

  • 25

    The leader or management agent in clandestine operation usually undertaken by the case officer

    Principal Agent

  • 26

    The one who conducts the clandestine operation

    Action Agent

  • 27

    An agent who clandestinely procures or collects information

    Spy

  • 28

    An agent who molds the attitudes, opinions and actions of an individual group

    Propagandist

  • 29

    An agent who undertake positive actions against unfriendly power resulting in the loss of an article, material or facility

    Saboteur

  • 30

    An agent who is a member of paramilitary group organized to grass the enemy.

    Guerilla

  • 31

    An an agent available to provide special protection during dangerous phase of clandestine operations.

    Strongman

  • 32

    An agent who induces an opponent to act to his own detriment

    Provocateur

  • 33

    An agent who exert influence from foreign government upon discretion of the sponsor.

    Cover Action

  • 34

    An agent who is engaged in activities which supports the clandestine operations and or the action agent in his operations

    Support Agent

  • 35

    An agent who observes persons and places of operations of interest

    Surveillant

  • 36

    An agent who undertake, to procure information or things of clandestine operational use,

    Investigator

  • 37

    An agent who manage and maintain a safe house for clandestine operations like meetings, safe havens, training, briefing and debriefing

    Safe House Keeper

  • 38

    An agent who is detailed as securing of clandestine communications.

    Communication Agent

  • 39

    A disguised or secret observation of place. person or vehicles for the purpose of obtaining information concerning the identities or activities of the subject or criminals.

    Surveillance

  • 40

    It refers to person who maintains the surveillance or performs the observation, a person who maintains the secret observation, which is either in the form of person, place or thing

    Surveillant

  • 41

    It refers to person or place being watch or surveyed

    Subject

  • 42

    Any person is a convenient, secure and unsuspecting place where police undercover men meet his action agent for debriefing or reporting purposes

    Drop

  • 43

    An accomplice or associate of the subject used to avoid or elude surveillant

    Convoy

  • 44

    A cover supporting the surveillant who can become a convoy whenever surveillant is burned

    Decoy

  • 45

    Any persons whom the subject picks or deals with while he is under observation and identifies the observer

    Contact

  • 46

    when subject under surveillance becomes aware that he is under observation and identifies the observer.

    Made

  • 47

    Chronological records of activities that took place in the establishment under surveillance.

    Log

  • 48

    It refers to a place where agents or informants leave their messages to the other agents.

    Live Drop

  • 49

    When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.

    Lost

  • 50

    It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his action agent.

    Safe House

  • 51

    It is a conference held before a surveillance is conducted.

    Pre-surveillance Conference

  • 52

    It is the observation of places or areas from a fixed point.

    Stake-out

  • 53

    It is a term referring to the subject of shadowing and tailing.

    Rabbit (Hare)

  • 54

    It is the common trick of the subject when he becomes conscious that he is being tailed

    Test for Tailing

  • 55

    It is an open observation where we deliberately let the target know that surveillance is being conducted.

    Overt Surveillance

  • 56

    It is a secretive watch where the target is not aware of the operative's presence or activities

    Covert Surveillance

  • 57

    It involves the "eyeing" of a suspected person, vehicle or place. Secret observation is primarily through the eyes

    Visual Surveillance

  • 58

    It is simply the surveillance of places

    Fixed Surveillance

  • 59

    Excellent position operation are rooftops.

    Long-range Surveillance

  • 60

    Suitable sites of operation are stores and hallways, it could be in the form of casing and shake-out

    Short-range Surveillance

  • 61

    ✔To detect evidence of criminal activities; ✔To established the association of the suspect ✔To find a wanted person; ✔To protect a witness; ✔To discover the associates, amusements and habits of an employee who has been proposed for a position of responsibility: ✔To check the loyalty of employees in an establishment where thieves occurred

    Moving Surveillance

  • 62

    Employed when a general impression of the subjects' habits and associated is required.

    Loose Tailing/Shadowing

  • 63

    It involves shadowing without special precaution. It may be used when the criminal must be observed and is aware that he is being followed

    Rough Shadowing

  • 64

    Used when precaution is taken against losing the subject; constant surveillance is necessary.

    Close Tailing

  • 65

    It is used in cases where the type of shadowing activity is loose or rough.

    One-man Shadowinf

  • 66

    It maybe employed in close tailing where two shadowers are needed to maintain constant observation on the subject

    Two-man Shadowing

  • 67

    It is appropriate to use if there are three or more available shadowers.

    Team Shadowinf

  • 68

    a technique of using 3 or more shadowers to avoid detection since it enables the surveillance team to take turns in occupying the close contact position thus minimizing the possibility of burn-out

    Leap Frogging Technique

  • 69

    This is the technique of evading a tail or shadow by entering a street-level entrance of a building and leaving the same through the rear, side or basement door

    Double Door

  • 70

    This is the technique used by the subject to "test if he has grown tail". He does this by ignoring traffic safety devices or by abruptly turning back or changing his direction then cautiously return to his trail

    Doubling Back

  • 71

    It is a surveillance by listening.

    Audio Surveillance

  • 72

    It involves the interception of telephone (Communication) lines of the subject

    Wire Tapping

  • 73

    A method of listening and recording spoken interactions by using concealed or cooperative devices that gather and amplify sound

    Electronic Eavesdropping (Bugging)

  • 74

    The technique of wiring an undercover investigator or cooperative informer in order to secure a record of conversation to which the person wired for sound is a participant

    Consensual Electronic Surveillance

  • 75

    It is the surveillance of valuable objects, articles, equipment, and including contraband

    Contact Surveillance

  • 76

    A chemical applied to objects exposed to weather, such as fire, alarm boxes, automobiles, and drops used in espionage activity.

    Tracer Paste

  • 77

    A substance available in plastic bottles for puffing tracer on money or any object nor exposed to weather

    Marking Powder

  • 78

    It contains invisible ink for tracer marking of objects such as money or merchandise

    Felt Pen or Crayon

  • 79

    A substance that visible when dry but becomes visible when wet, although it is difficult to wash off

    Dye Powder