Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
217 Cards in this Set
- Front
- Back
- 3rd side (hint)
Information |
Is where intelligence comes from a raw data |
|
|
Intelligence cycle |
process where information becomes intelligence |
|
|
Intelligence |
End product of intelligence cycle |
|
|
Intelligence |
End product of planning, collection, processing and dissemination |
|
|
Numbers 13:17-32 |
bible verse present oldest use of intelligence |
|
|
Sun tzu |
Author of the book, "The art of war" |
|
|
Sun tzu |
Who said "If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know your self but not the enemy every victory gained you will also suffer a defeat. If you know neither the enemy nor your self you will succumb in every battle" |
|
|
Sun tzu |
Who said "All warfare is based on deception" |
|
|
Sun tzu |
Who said the opportunity to defeat the enemy is provided by the enemy himself |
|
|
13 |
How many chapters the art of war |
|
|
Alexander the great |
A renowned greek conqueror had his share of advance information when rumors of discontent circulated from among the ranks of his men. He was able to identify those disloyal ones by Ordering the communication letters opened (interceptions) an was successful in curtailing the decline of esprit de corps and morale of his men |
|
|
Woman |
The most dangerous informant |
|
|
Karl schulmeister |
Know as the spymaster of napoleon bonaparte and he is aka "napoleon's eye", he was credited for establishing counter intelligence conducted againts spies. He was a master of all deceit and blackmailing to obtain vital information pertaining to the personality and identity of the enemies of napoleon during 18th century |
|
|
Akbar |
Know as "great mogul" and wise master of hindustan employed 4000 agents for sole purpose of bringing him the truth that his throne might rest upon it |
|
|
Antisius |
The first police surgeon in "legal med" said julius caesar has 23 stabs but killed by Brutus through chest cavity. |
|
|
Julius caesar |
know for "speculators and carrier pegeon", during his time, the staff of each legion includes ten "speculators" who serve as an information collecting agency. Military success of the roman was aided by communication system. Made use of carrier pigeons, which made possible the amazing speed with which intelligence of the imperial rome was transmitted. |
|
|
Speculators |
One person directly upcoming to julius caesar |
|
|
Napoleon bonaparte |
Who said "one spy in the right place is worth 20,000 men in the field" |
|
|
Sir Francis Walsingham of England |
The first great spymaster. The protector of Queen Elizabeth I who organized the secret police and established a spy network (intelligence network) to detect fleer movement of enemies of the British Empire particular the portuguese |
|
|
George washington |
The first president of the USA and one of its founding father |
|
|
Alfred Redl |
Homosexual double spy |
|
|
Hannibal |
Disguises as a beggar to gather firsthand information |
|
|
Herbert Yardly |
American cryptologist who know for the book "the american black chamber" |
|
|
Frederick the great |
The father of organized military Espionage Divided his agents into four classes; Common spy Double spy Spies of consequences Person who are forced to undertake espionage against their will |
|
|
Australian secret intelligence service |
Australian Intelligence: responsible for collecting foreign intelligence mainly from ASIA and Pacific, it's main purpose is to protect the country from political and economic interest. |
ASIS |
|
Research and Analysis Wing |
India Intelligence; primary function is to collect external intelligence, counter terrorism and covert operations, it is also responsible for obtaining and collecting intelligence to advise policy makers |
RAW |
|
Federal Security Service or Federal Division |
Russia Intelligence; responsible for internal security of the state; |
FSS |
|
Bundesnachrichtendienst |
Germany Intelligence; it depends on wiretapping and electronic surveillance of international communication; it acts as an early warning system to alert the german government from threats; it gathers both military and civil intelligence. |
BND |
|
Ministry of State Security |
China intelligence; it has the Authority to arrest or detain people as a regular police; gathering information from foreign intelligence |
MSS |
|
Central Intelligence Agency |
America Intelligence; it directly reports to the director of national intelligence; it is responsible for the national security intelligence assessment for policy makers; it is the largest I intelligence agency and the most advanced intelligence agency in the world; it was formerly known as the Office of strategic services (OSS 1942) but was renamed in (1947) |
|
|
Secret Intelligence Service MI6 |
United Kingdom intelligence, Her majesty's (british part of UK) MI5 is a Internal Security Service MI6 is foreign intelligence |
SIS |
|
MOSSAD |
Israel Intelligence; responsible for intelligence collection and covert operations; Aman (MI) Military intelligence Shin bet (IS) Internal security |
|
|
Inter-Service intelligence |
Pakistan Intelligence; the best known intelligence so far on the scale of records; it has the highest number of agents worldwide - 10,000 members |
ISI |
|
national intelligence coordinating agency |
Philippine intelligence; gathering and analysis arm of the Philippine government |
NICA |
|
Knowledge is safety |
Motto of nica |
|
|
Intelligence Agency |
Government agency responsible for the intelligence cycle in support of law and policy |
|
|
ASIS - Australia |
Intelligence agency mainly from ASIA |
|
|
RAW - India |
Intelligence agency collect external intelligence |
|
|
BND - Germany |
Intelligence agency depends on wiretapping and electronic surveillance of internal communication |
|
|
MSS - China |
Intelligence agency has the authority to arrest or detain a person as regular police |
|
|
Office of the strategic services |
Old name of CIA |
OSS |
|
CIA - America |
Most advance intelligence agency |
|
|
Roscoe Hillenkoetter |
First director of CIA |
|
|
ISI - Pakistan |
Highest number of member of intelligence agency with 10,000 people |
|
|
ISI - Pakistan |
Known as best intelligence agency |
|
|
Intelligence and Operation are interdependence |
Principle of Intelligence where they work hand on hand to attain greater degree of success |
|
|
Intelligence is continuous |
Principle of intelligence where Intelligence follow simple Cycle and information is being processed and intelligence is being used |
|
|
Intelligence must be useful |
Principle of Intelligence where intelligence must serve the commanders needs it should be have an application and significance to the operation |
|
|
Intelligence Operation requires imagination and foresight |
Principle of intelligence where personnel are remained to refrain from utilizing criminal elements in an operation |
|
|
Intelligence must be on time |
The most important principle of intelligence, it must be the user in time serve aa basis for appropriate action. Intell days must be disseminated on time because late arrival is as good as useless |
|
|
Intelligence must be on time |
Principle of intelligence where intelligence must be desalinated on time |
|
|
Intelligence must be flexible |
Principle of Intelligence where according to the present situation condition and other factors it must be based in reason of sound judgement |
|
|
MI6 |
Secret Intelligence Service old name |
|
|
National intelligence |
Integrated product of Intelligence developed by all government department concerninh the broad aspect of national policies and national security |
|
|
Departmental intelligence |
Intelligence required by a department or agencies of the government to execute it's mission and discharge it's responsibility |
|
|
Military Intelligence |
Knowledge by the military institution is essential to military Institution essential in the preparation and execution of military plans, policies and program |
|
|
Arrangements of troops |
Order of battle |
|
|
Double agent |
An agent who was captured and was sent back as an agent of his captors |
|
|
Expendable agent |
Leaks false information to enemy |
|
|
Penetration agent |
Reached to the enemy gathered information and got out w/out being caught |
|
|
Open sources (99%) |
Gathered from overt acts |
|
|
Agent in place |
Recruited within highly sensitive target |
|
|
Agent of influence |
Uses authority to gain information |
|
|
Informer |
A person who gives information on a regular (reward) basis |
|
|
Informant |
A person who gives information (tip) |
|
|
Surveillance |
It is the close (covert, secret, hidden, descreet) observation of a person, place or thing |
|
|
Shadowing |
It is the close (covert, secret, hidden, descreet) observation of a person |
|
|
Tailing |
It is the close (covert, secret, hidden, descreet) observation of a vehicle |
|
|
Casing |
It is the close (covert, secret, hidden, descreet) observation of a location Military: reconnaissance Old: scouting |
|
|
Stationary surveillance |
A person will come to a known location |
|
|
Technical surveillance |
Through the use of communication and gadgets |
|
|
Preliminary, follow up and conclusive report |
3 police reports |
|
|
Capability |
Factors in choosing a collection of agent where placement or access to target |
|
|
Multiplicity |
Factors in choosing a collection of agent where there are more agent |
|
|
Balance |
Factors in choosing a collection of agent where numbers of agents needed in operation |
|
|
Personal reconnaissance |
Methods of casing where most effective method and will produce the most information |
|
|
Prior information |
That those are recorded in a file |
|
|
Hearsay |
Gained by the person operating in the area |
|
|
Progressive leap frog method |
Type of surveillance where it has the disadvantage of broken routine |
|
|
Elicitation |
Process of extracting information without suspicion |
|
|
Surveillant |
The person who makes the observation |
|
|
Subject |
The one who what and where is observe |
|
|
Log |
Chronological records of activities |
|
|
Safehouse |
Place where agents meet each other |
|
|
Live drop |
Place where agents leave their messages to other agents |
|
|
Convoy |
an associate of the subject who follows him to detect surveillance |
|
|
Decoy |
A person or object used to elude the surveillant |
|
|
Contact |
Any person when the subject pick or deal with |
|
|
Made |
The subject becomes aware that he is under observation "burn out" |
|
|
Tactical interrogation |
Intelligence gathered from captured enemy |
|
|
Reconnaissance |
Alternative name of intelligence |
|
|
Scouting |
Oldest name of Intelligence |
|
|
Casing or surveillance |
Modern name or CLE name of Intelligence, in history (bible) the first use of intelligence is in form of surveillance |
|
|
Greece to India |
Lugar na nasakop ni alexander the great |
|
|
Battle of guagamela |
The battle alexander the great lost |
|
|
Delilah |
A biblical personality who was able to gain information by using her beauty and charm, She was responsible for the fall of samson a known israel leader who terrorized the philistines |
|
|
Napoleon bonaparte |
Known as Le Petite Corporal or the small corporal |
|
|
Intelligence agency |
Is a government agency responsible for the collection, analysis or exploitation of information and intelligence in support of law enforcement, national security defense and policy objectives |
|
|
Admiral Roscoe Hillenkoetter |
First director of CIA |
|
|
Intelligence requires security measures |
Principle of intelligence which denies unauthorized personal information. It is the working balance between secrecy and operational convenience |
|
|
Information |
All evaluated materials of every description from which Intelligence is produced |
|
|
Agent of influence |
Agent who uses authority to gain information |
|
|
Agent in place |
Agent who has been recruited within a highly sensitive target |
|
|
Close source |
Only 1% information are obtained from covert operation close covert method |
|
|
Surveillance |
It the covert, discreet observation of people and places for the purpose of obtaining information concerning the identities or activities of subject |
|
|
Stationary surveillance |
Also referred to as to as to fixed and stakeout surveillance - is used when you know or suspect that a person is at or will come to a known location when you suspect that stolen goods are to be dropped or when informants have told you that crime is going to be committed |
|
|
Technical surveillance |
By the use of communications and electronics gadget, system and equipment |
|
|
Moving surveillance |
Simply the act of following a person |
|
|
Lost |
When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance |
|
|
Are target study |
Refers to area of operation of surveillance activities |
|
|
Casing |
Is known as reconnaissance in military terms and scouting for old term |
|
|
External casing |
Type of casing in determining location, approaches and exits and it's vicinity |
|
|
Internal casing |
Type of casing determining clear description of the layout of a building |
|
|
Personal reconnaissance |
Method of casing the most effective method and will produced the most info since you know what you're looking for. |
|
|
Map reconnaissance |
Method of casing that may not sufficient but it can produce a certain amount of usable information |
|
|
Research |
Method of casing that has more information can be acquired best used with other methods |
|
|
Prior Information |
Method of casing that those recorded in your file unit that may provide valuable information |
|
|
Hearsay |
Method of casing that information usually gain by the person operating in the are and performing casing job |
|
|
Loose tail |
Employed where a general impression of the subjects habits and associates is required |
|
|
Close tail |
Extreme precautions are taken againts losing the subject is employed where constant surveillance is necessary |
|
|
Rough shadowing |
Employed without special precautions, the subject maybe aware of the surveillance, employed also when the subject is a material witness and must be protected from harm or other undesirable influence |
|
|
One man |
Shadowing extremely difficult and should be avoided, if unavoidable keep subject in view at all times. |
|
|
Two man |
Shadowing with two agents are employed to follow the subject |
|
|
ABC method |
Shadowing reduces the risk of losing the subject affords greater security agents detection |
|
|
Progressive / leap frog method |
Shadowing poor changes of obtaining goods results agents are stations at a fixed point assuming that subject followed that same general route each day |
|
|
Combined foot-auto surveillance |
Shadowing employed of surveillant on foot and agents in an automobile |
|
|
Progressive / leap frog method |
Which of the shadows has a disadvantage of a broken routine |
|
|
Elicitation |
The process of extracting information from a person believes to be in possession of vital information without his knowledge or suspicion |
|
|
Sponsor |
Directs the organization conducting the clandestine activity |
|
|
Target |
Person, place, or things againts which the clandestine activity is to be conducted |
|
|
Agent |
It refers to a person who conducts the clandestine operation to include principal agents, action agents and support agents |
|
|
Principal agents |
Leader or management agent in clandestine operation usually undertaken by the case officer |
|
|
Action agent |
The one who conducts the clandestine operation |
|
|
Support agents |
Agent who is engage in activities which support the clandestine operation and or the action agents in his operation |
|
|
Bugging |
The use of equipment or tool listen and record discreetly conversation of other people. |
|
|
Wire tapping |
A method of collecting information thru interception of telephone conversation |
|
|
Eaves dropping |
Listening discreetly without device |
|
|
Tactical interrogation |
The need for obtaining information the highest degree of credibility taken on the minimum of time can be through interrogation which varies and dependent entirely on the situation (captured enemy/ hostile) |
|
|
Interrogator |
Person who does the questioning |
|
|
Source |
A person who for any reason submits information intelligence interest usually on a voluntary basis |
|
|
Suspect |
A person who for any reason believe to be associated with prohibited activity |
|
|
Witness |
Any person who has direct knowledge of facts concerning an event or activity |
|
|
Interrogee |
Any person who is subjected to the interrogation process in any of its form and phases |
|
|
Interrogation report |
An oral or written statement or information by the questioning of in interrogee |
|
|
Observation |
A complete and accurate observation by an individual of his surrounding and encompasses the use of all the major sense to register and recognized it's operational or intell significance |
|
|
Description |
The actual and factual reporting of one's observation of he reported sensory experience recounted ny another |
|
|
Approach |
Process of setting people to start talking |
|
|
Probe |
To keep the people talking continuously. Is an attempt to obtain more information after the subject gives a vague incomplete general response |
|
|
ODEX |
Observation + Description = ? |
|
|
Undercover |
Is disguising one's own identity or using an assumed identity for the purpose of gaining the trust of an individual or organization to learn secret information or to gain the trust of targeted individuals in order to gain information or evidence |
|
|
Cover |
It refered to the changing forging or falsifying agents real personality including but not limited to things location job and others that will be used in undercover assignment |
|
|
Cover story |
A biographical data through fictional that will portray personality of the agents he assumed a scenario to cover the operation |
|
|
Cover support |
A agent assigned in target areas with the primary mission of supporting the cover story |
|
|
Artificial |
Altering the background that will correspond to the operation |
|
|
Undercover operation |
Also referred as ROPING |
|
|
Natural |
Using of real, actual or true background cover |
|
|
Multiple |
Cover includes different cover |
|
|
Residential / dwelling assignment |
It is related to the neighborhood of the subject where the agent will live as a new resident without making any suspicion. His mission is to make friends within it's neighborhood and gather information regarding the subject and possibly getting closer to the subject |
|
|
Social assignment |
The agent will gain access to the subject by going to the different gang out places of the subject and gather information like knowing how to drink socially without getting drunk |
|
|
Work assignment |
The agent will be employed where the subject work to acquire information. The agent must know his work and focus his mind set and habit to his work assignment |
|
|
Subversive organization |
This is the most dangerous of all the undercover assignment; the agent will join the organization of the subject itself he must know the ideologies of the group and the actions while inside should conform to the organization to avoid any suspicion |
|
|
Personal contact assignment |
The investigator required to develop the friendship and trust of the subject |
|
|
Multiple assignment |
The investigator is tasked to cover two or more of the assignments simultaneously it can produce extensive information with minimum expenses but more prone to compromise |
|
|
Informant |
Any person who hand over information to agents. Information is givenly open |
|
|
Anonymous informant |
Type of Informant which is unidentified or unknown informant |
|
|
False informant |
Type of Informant reveals information of consequences, value or stuff connected with thin air |
|
|
Frightened informant |
Type of Informant weakest link in criminal chain motivated by anxiety |
|
|
Self aggrandizing informant |
Type of Informant moves around the center of criminals delight in surprising the police about buts of information |
|
|
Mercenary informants |
Type of Informant which information for sale needed something for exchange of information |
|
|
Double crosser informants |
Type of Informant wants to get more information from the police more than he gives |
|
|
Legitimate informants |
Type of Informant whom operator of business desire to give information for legitimate |
|
|
Informer |
Refers to any person who provides information in a regular basis |
|
|
Informant net |
Refers to a controlled group of people who worked through the direction of the handler |
|
|
Selection |
Steps in recruitment of Informants to identify and recruit an informant who has access to several subversive organization. Access I'd the valuable factor in recruiting the potential informant |
|
|
Investigation |
Steps in recruitment of Informants it must establish possible existing motives as to this person might assist the officer if necessary conduct a complete background investigation to the possible informant |
|
|
Approach |
Steps in recruitment of Informants it must be done in a place conducive to the possible informant avoid places which might have any probability of compromise approach must be done in a foreign country |
|
|
Testing |
Steps in recruitment of Informants it must commence with limited assignment with a gradual integration into more important mission |
|
|
Recording |
The reduction of information into writing or some other form |
|
|
Journal |
Style of recording, has permanent and chronological record of reports and messages usually 24hrs |
|
|
Contents of journal |
Type of recording An accurate and concise statement of reports notation as to the sender and receipt of dispatch |
|
|
Intelligence situation map |
Type of recording It is the current disposition of enemy and allies, the lastest movement is indicated, or display enemy position, provides comparison, provide background for briefing basis for overlays |
|
|
Intelligence work book |
Type of recording Systematic arrangements by subject heading which aid in the interpretation of information, it is maintained depending on the requirements of the unit |
|
|
Intelligence file |
Type of recording ready to access to all information and not just current ones, they are usually special file that kept by the unit |
|
|
Evaluation |
It is the determination of pertinence, reliability and accuracy of information |
|
|
Reliability |
Judging the source of information or agency |
|
|
Accuracy |
Truth of information |
|
|
Human intelligence (humint) |
Intelligence gather through personal contact |
|
|
Open source intelligence (opsint) |
Intelligence gathered form open sources |
|
|
Electronic intelligence (elint) |
Intelligence gathered through gadgets and technology |
|
|
Signal intelligence (sigint) |
Intelligence gathered through interception of signal |
|
|
Technical intelligence (techint) |
Intelligence gathered from analysis of technology used but foreign countries |
|
|
Imagery intelligence (imint) |
Intelligence gathered through satellite and areal photography |
|
|
Measurement and signature intelligence (masint) |
Intelligence gathered through sensing instrument |
|
|
Cyber Intelligence |
Intelligence gathered from cyberspace |
|
|
Financial intelligence |
Intelligence gathered from monetary deposits and transaction |
|
|
Analysis |
This is the stage in which the collected information is subjected to review in order to satisfy significant facts and derive conclusion there from |
|
|
Integration |
The combination of the elements isolated analysis with other known information related to the operation |
|
|
Interpretation |
Process of determining the significance of new information in the possible alternatives |
|
|
Dissemination |
Intelligence gets into the hands of those who commissioned it and those who needs it |
|
|
Strategic intelligence |
Knowledge pertaining to the capabilities and vulnerability of a foreign nation which is required by the national planners for the formulation of an adequate national defense in peace and forms the basis for, projected. This is intelligence information which is not immediate operational but rather long range |
|
|
Political intelligence |
Components of strategic intelligence deals with domestic and foreign affairs and relation of government |
|
|
Economic intelligence |
Components of strategic intelligence deals with the extent and utilization of natural ang human resources to the industrial potential of the nations |
|
|
Transportation and telecommucation intelligence |
Components of strategic intelligence concerned with the operation and facilities not only the military but also the civilian |
|
|
Sociological intelligence |
Components of strategic intelligence deals with the demographic and psychological aspects of group of people |
|
|
Biographical intelligence |
Components of strategic intelligence deals with individual personalities who have actual possession of power |
|
|
Geographical intelligence |
Components of strategic intelligence deals with the natural as well as man-made feature of the physical environment of man considered from the point in view of military operations |
|
|
Tactical Intelligence or line intelligence |
Directly contributed to the accomplishment of specifics objectives and immediate in nature |
|
|
People, weather, enemy and terrain (PWET) |
Line Intelligence is divided into 4 it is? |
|
|
Counter intelligence |
Destroying the effectiveness of hostile foreign activities, or the phase of intelligence covering the activity devoted in destroying the effectiveness of hostile foreign activities and the protection of information againts espionage, subversion and sabotage |
|
|
Passive CI measure |
Protection of classified and sensitive information to the unauthorized through secrecy communication security and other various safeguards |
|
|
Active CI measure |
Are those measure which seek actively to block the enemies effort to gain information or engage in espionage subversion and sabotage |
|
|
Detection |
Act of knowing the clandestine operation of the enemy |
|
|
Prevention |
Application of CI measure to avoid enemy activities |
|
|
Neutralization |
Act of containing of the enemy activities |
|
|
Criminal intelligence (crimint) |
Refers to the knowledge essential to the prevention of crimes and investigation arrest and prosecution of criminal offenders |
|
|
Internal security intelligence (insint) |
Refers to the knowledge essential to the maintenance of peace and order |
|
|
Public safety intelligence (pusint) |
Refers to the knowledge essential to ensure protection of lives and properties |
|