暗記メーカー
ログイン
CDI1(PREFINAL)2
  • Dotty Tanguilig

  • 問題数 79 • 11/29/2023

    記憶度

    完璧

    11

    覚えた

    31

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    It is the result of Intelligence planning, planning is always ahead of operation although an operation can be made without a plan, it is usually due to sudden and inevitable situations but definitely this is poor intelligence management

    Intelligence Operations

  • 2

    It gathers and evaluates Information from different sources to predict and prevent organized crime activities

    Intelligence Analyst

  • 3

    The art and science of preparing coded or protected communications intended to be intelligible only to the person possessing a key

    Cryptography

  • 4

    It can represent phrases and entire sentences with symbols, such as five- letter groups, and is often used more for economy than for secrecy.

    Codea

  • 5

    It deals with hidden or secret writing, relies on different ways to hide or disguise writing

    Steganography

  • 6

    It depends on alphabetical, numerical, computer-based, or other scrambling methods.

    Ciphers

  • 7

    a.k.a cleartext, it is the original communication to be scrambled or enciphered.

    Plaintext

  • 8

    a.k.a ciphertext, the product of the enciphering process that usually involves an algorithm and a key

    Cryptogram

  • 9

    It is a particular method of scrambling a computer program or a written set of instructions The key specifies the actual scrambling process.

    Encryption Algorithm

  • 10

    It is the art of analysing cipher text to extract the plaintext or the key.In other words, cryptanalysis is the opposite of cryptography. It is the breaking of ciphers.

    Cryptanalysis

  • 11

    It refers to those persons who break intercepted codes.

    Crypto Analyst

  • 12

    It refers to the person who is highly skilled in converting message from clear to unintelligible forms by use of codes and cipher

    Cryptographer

  • 13

    The changing of message from plain clear text to unintelligible form also known as "encrypting".

    Coding

  • 14

    transforming of coded message into plain text also known as "decrypting".

    Decoding

  • 15

    All evaluated materials of every description including those derived from observation, reports, rumors, imagery and other sources from which intelligence is produced

    Information

  • 16

    An agent who uses authority to gain information.

    Agent of Influence

  • 17

    An agent who has been recruited within a highly sensitive target

    Agent in Place

  • 18

    An agent who has reached to the enemy, gather information and able to get back without being caught.

    Penetration Agent

  • 19

    An agent who leaks information to the enemy

    Expendable Agent

  • 20

    An an enemy agent, who has been faken into custody, tumed around and sent back where he came from as an agent of his captors.

    Double Agent

  • 21

    A secret action undertaken in behalf of the government or other friendly forces

    Clandestine Operation

  • 22

    Directs the organization conducting the clandestine activity.

    Sponsor

  • 23

    A person, place or things against which the clandestine activity is to be conducted.

    Target or Rabbit

  • 24

    It refers to the person who conducts the clandestine operations to include principal agents, action agents and support agents

    Agent or Asset

  • 25

    The leader or management agent in clandestine operation usually undertaken by the case officer

    Principal Agent

  • 26

    The one who conducts the clandestine operation

    Action Agent

  • 27

    An agent who clandestinely procures or collects information

    Spy

  • 28

    An agent who molds the attitudes, opinions and actions of an individual group

    Propagandist

  • 29

    An agent who undertake positive actions against unfriendly power resulting in the loss of an article, material or facility

    Saboteur

  • 30

    An agent who is a member of paramilitary group organized to grass the enemy.

    Guerilla

  • 31

    An an agent available to provide special protection during dangerous phase of clandestine operations.

    Strongman

  • 32

    An agent who induces an opponent to act to his own detriment

    Provocateur

  • 33

    An agent who exert influence from foreign government upon discretion of the sponsor.

    Cover Action

  • 34

    An agent who is engaged in activities which supports the clandestine operations and or the action agent in his operations

    Support Agent

  • 35

    An agent who observes persons and places of operations of interest

    Surveillant

  • 36

    An agent who undertake, to procure information or things of clandestine operational use,

    Investigator

  • 37

    An agent who manage and maintain a safe house for clandestine operations like meetings, safe havens, training, briefing and debriefing

    Safe House Keeper

  • 38

    An agent who is detailed as securing of clandestine communications.

    Communication Agent

  • 39

    A disguised or secret observation of place. person or vehicles for the purpose of obtaining information concerning the identities or activities of the subject or criminals.

    Surveillance

  • 40

    It refers to person who maintains the surveillance or performs the observation, a person who maintains the secret observation, which is either in the form of person, place or thing

    Surveillant

  • 41

    It refers to person or place being watch or surveyed

    Subject

  • 42

    Any person is a convenient, secure and unsuspecting place where police undercover men meet his action agent for debriefing or reporting purposes

    Drop

  • 43

    An accomplice or associate of the subject used to avoid or elude surveillant

    Convoy

  • 44

    A cover supporting the surveillant who can become a convoy whenever surveillant is burned

    Decoy

  • 45

    Any persons whom the subject picks or deals with while he is under observation and identifies the observer

    Contact

  • 46

    when subject under surveillance becomes aware that he is under observation and identifies the observer.

    Made

  • 47

    Chronological records of activities that took place in the establishment under surveillance.

    Log

  • 48

    It refers to a place where agents or informants leave their messages to the other agents.

    Live Drop

  • 49

    When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance.

    Lost

  • 50

    It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his action agent.

    Safe House

  • 51

    It is a conference held before a surveillance is conducted.

    Pre-surveillance Conference

  • 52

    It is the observation of places or areas from a fixed point.

    Stake-out

  • 53

    It is a term referring to the subject of shadowing and tailing.

    Rabbit (Hare)

  • 54

    It is the common trick of the subject when he becomes conscious that he is being tailed

    Test for Tailing

  • 55

    It is an open observation where we deliberately let the target know that surveillance is being conducted.

    Overt Surveillance

  • 56

    It is a secretive watch where the target is not aware of the operative's presence or activities

    Covert Surveillance

  • 57

    It involves the "eyeing" of a suspected person, vehicle or place. Secret observation is primarily through the eyes

    Visual Surveillance

  • 58

    It is simply the surveillance of places

    Fixed Surveillance

  • 59

    Excellent position operation are rooftops.

    Long-range Surveillance

  • 60

    Suitable sites of operation are stores and hallways, it could be in the form of casing and shake-out

    Short-range Surveillance

  • 61

    ✔To detect evidence of criminal activities; ✔To established the association of the suspect ✔To find a wanted person; ✔To protect a witness; ✔To discover the associates, amusements and habits of an employee who has been proposed for a position of responsibility: ✔To check the loyalty of employees in an establishment where thieves occurred

    Moving Surveillance

  • 62

    Employed when a general impression of the subjects' habits and associated is required.

    Loose Tailing/Shadowing

  • 63

    It involves shadowing without special precaution. It may be used when the criminal must be observed and is aware that he is being followed

    Rough Shadowing

  • 64

    Used when precaution is taken against losing the subject; constant surveillance is necessary.

    Close Tailing

  • 65

    It is used in cases where the type of shadowing activity is loose or rough.

    One-man Shadowinf

  • 66

    It maybe employed in close tailing where two shadowers are needed to maintain constant observation on the subject

    Two-man Shadowing

  • 67

    It is appropriate to use if there are three or more available shadowers.

    Team Shadowinf

  • 68

    a technique of using 3 or more shadowers to avoid detection since it enables the surveillance team to take turns in occupying the close contact position thus minimizing the possibility of burn-out

    Leap Frogging Technique

  • 69

    This is the technique of evading a tail or shadow by entering a street-level entrance of a building and leaving the same through the rear, side or basement door

    Double Door

  • 70

    This is the technique used by the subject to "test if he has grown tail". He does this by ignoring traffic safety devices or by abruptly turning back or changing his direction then cautiously return to his trail

    Doubling Back

  • 71

    It is a surveillance by listening.

    Audio Surveillance

  • 72

    It involves the interception of telephone (Communication) lines of the subject

    Wire Tapping

  • 73

    A method of listening and recording spoken interactions by using concealed or cooperative devices that gather and amplify sound

    Electronic Eavesdropping (Bugging)

  • 74

    The technique of wiring an undercover investigator or cooperative informer in order to secure a record of conversation to which the person wired for sound is a participant

    Consensual Electronic Surveillance

  • 75

    It is the surveillance of valuable objects, articles, equipment, and including contraband

    Contact Surveillance

  • 76

    A chemical applied to objects exposed to weather, such as fire, alarm boxes, automobiles, and drops used in espionage activity.

    Tracer Paste

  • 77

    A substance available in plastic bottles for puffing tracer on money or any object nor exposed to weather

    Marking Powder

  • 78

    It contains invisible ink for tracer marking of objects such as money or merchandise

    Felt Pen or Crayon

  • 79

    A substance that visible when dry but becomes visible when wet, although it is difficult to wash off

    Dye Powder