• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/217

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

217 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Information

Is where intelligence comes from a raw data

Intelligence cycle

process where information becomes intelligence

Intelligence

End product of intelligence cycle

Intelligence

End product of planning, collection, processing and dissemination

Numbers 13:17-32

bible verse present oldest use of intelligence

Sun tzu

Author of the book, "The art of war"

Sun tzu

Who said "If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know your self but not the enemy every victory gained you will also suffer a defeat. If you know neither the enemy nor your self you will succumb in every battle"

Sun tzu

Who said "All warfare is based on deception"

Sun tzu

Who said the opportunity to defeat the enemy is provided by the enemy himself

13

How many chapters the art of war

Alexander the great

A renowned greek conqueror had his share of advance information when rumors of discontent circulated from among the ranks of his men. He was able to identify those disloyal ones by Ordering the communication letters opened (interceptions) an was successful in curtailing the decline of esprit de corps and morale of his men

Woman

The most dangerous informant

Karl schulmeister

Know as the spymaster of napoleon bonaparte and he is aka "napoleon's eye", he was credited for establishing counter intelligence conducted againts spies. He was a master of all deceit and blackmailing to obtain vital information pertaining to the personality and identity of the enemies of napoleon during 18th century

Akbar

Know as "great mogul" and wise master of hindustan employed 4000 agents for sole purpose of bringing him the truth that his throne might rest upon it

Antisius

The first police surgeon in "legal med" said julius caesar has 23 stabs but killed by Brutus through chest cavity.

Julius caesar

know for "speculators and carrier pegeon", during his time, the staff of each legion includes ten "speculators" who serve as an information collecting agency. Military success of the roman was aided by communication system. Made use of carrier pigeons, which made possible the amazing speed with which intelligence of the imperial rome was transmitted.

Speculators

One person directly upcoming to julius caesar

Napoleon bonaparte

Who said "one spy in the right place is worth 20,000 men in the field"

Sir Francis Walsingham of England

The first great spymaster.



The protector of Queen Elizabeth I who organized the secret police and established a spy network (intelligence network) to detect fleer movement of enemies of the British Empire particular the portuguese

George washington

The first president of the USA and one of its founding father

Alfred Redl

Homosexual double spy

Hannibal

Disguises as a beggar to gather firsthand information

Herbert Yardly

American cryptologist who know for the book "the american black chamber"

Frederick the great

The father of organized military Espionage



Divided his agents into four classes;



Common spy


Double spy


Spies of consequences


Person who are forced to undertake espionage against their will

Australian secret intelligence service

Australian Intelligence: responsible for collecting foreign intelligence mainly from ASIA and Pacific, it's main purpose is to protect the country from political and economic interest.

ASIS

Research and Analysis Wing

India Intelligence; primary function is to collect external intelligence, counter terrorism and covert operations, it is also responsible for obtaining and collecting intelligence to advise policy makers

RAW

Federal Security Service or Federal Division

Russia Intelligence; responsible for internal security of the state;

FSS

Bundesnachrichtendienst

Germany Intelligence; it depends on wiretapping and electronic surveillance of international communication; it acts as an early warning system to alert the german government from threats; it gathers both military and civil intelligence.

BND

Ministry of State Security

China intelligence; it has the Authority to arrest or detain people as a regular police; gathering information from foreign intelligence

MSS

Central Intelligence Agency

America Intelligence; it directly reports to the director of national intelligence; it is responsible for the national security intelligence assessment for policy makers; it is the largest I intelligence agency and the most advanced intelligence agency in the world; it was formerly known as the Office of strategic services (OSS 1942) but was renamed in (1947)

Secret Intelligence Service MI6

United Kingdom intelligence, Her majesty's (british part of UK)



MI5 is a Internal Security Service


MI6 is foreign intelligence

SIS

MOSSAD

Israel Intelligence; responsible for intelligence collection and covert operations;



Aman (MI) Military intelligence


Shin bet (IS) Internal security

Inter-Service intelligence

Pakistan Intelligence; the best known intelligence so far on the scale of records; it has the highest number of agents worldwide - 10,000 members

ISI

national intelligence coordinating agency

Philippine intelligence; gathering and analysis arm of the Philippine government

NICA

Knowledge is safety

Motto of nica

Intelligence Agency

Government agency responsible for the intelligence cycle in support of law and policy

ASIS - Australia

Intelligence agency mainly from ASIA

RAW - India

Intelligence agency collect external intelligence

BND - Germany

Intelligence agency depends on wiretapping and electronic surveillance of internal communication

MSS - China

Intelligence agency has the authority to arrest or detain a person as regular police

Office of the strategic services

Old name of CIA

OSS

CIA - America

Most advance intelligence agency

Roscoe Hillenkoetter

First director of CIA

ISI - Pakistan

Highest number of member of intelligence agency with 10,000 people

ISI - Pakistan

Known as best intelligence agency

Intelligence and Operation are interdependence

Principle of Intelligence where they work hand on hand to attain greater degree of success

Intelligence is continuous

Principle of intelligence where Intelligence follow simple Cycle and information is being processed and intelligence is being used

Intelligence must be useful

Principle of Intelligence where intelligence must serve the commanders needs it should be have an application and significance to the operation

Intelligence Operation requires imagination and foresight

Principle of intelligence where personnel are remained to refrain from utilizing criminal elements in an operation

Intelligence must be on time

The most important principle of intelligence, it must be the user in time serve aa basis for appropriate action. Intell days must be disseminated on time because late arrival is as good as useless

Intelligence must be on time

Principle of intelligence where intelligence must be desalinated on time

Intelligence must be flexible

Principle of Intelligence where according to the present situation condition and other factors it must be based in reason of sound judgement

MI6

Secret Intelligence Service old name

National intelligence

Integrated product of Intelligence developed by all government department concerninh the broad aspect of national policies and national security

Departmental intelligence

Intelligence required by a department or agencies of the government to execute it's mission and discharge it's responsibility

Military Intelligence

Knowledge by the military institution is essential to military Institution essential in the preparation and execution of military plans, policies and program

Arrangements of troops

Order of battle

Double agent

An agent who was captured and was sent back as an agent of his captors

Expendable agent

Leaks false information to enemy

Penetration agent

Reached to the enemy gathered information and got out w/out being caught

Open sources (99%)

Gathered from overt acts

Agent in place

Recruited within highly sensitive target

Agent of influence

Uses authority to gain information

Informer

A person who gives information on a regular (reward) basis

Informant

A person who gives information (tip)

Surveillance

It is the close (covert, secret, hidden, descreet) observation of a person, place or thing

Shadowing

It is the close (covert, secret, hidden, descreet) observation of a person

Tailing

It is the close (covert, secret, hidden, descreet) observation of a vehicle

Casing

It is the close (covert, secret, hidden, descreet) observation of a location



Military: reconnaissance


Old: scouting

Stationary surveillance

A person will come to a known location

Technical surveillance

Through the use of communication and gadgets

Preliminary, follow up and conclusive report

3 police reports

Capability

Factors in choosing a collection of agent where placement or access to target

Multiplicity

Factors in choosing a collection of agent where there are more agent

Balance

Factors in choosing a collection of agent where numbers of agents needed in operation

Personal reconnaissance

Methods of casing where most effective method and will produce the most information

Prior information

That those are recorded in a file

Hearsay

Gained by the person operating in the area

Progressive leap frog method

Type of surveillance where it has the disadvantage of broken routine

Elicitation

Process of extracting information without suspicion

Surveillant

The person who makes the observation

Subject

The one who what and where is observe

Log

Chronological records of activities

Safehouse

Place where agents meet each other

Live drop

Place where agents leave their messages to other agents

Convoy

an associate of the subject who follows him to detect surveillance

Decoy

A person or object used to elude the surveillant

Contact

Any person when the subject pick or deal with

Made

The subject becomes aware that he is under observation "burn out"

Tactical interrogation

Intelligence gathered from captured enemy

Reconnaissance

Alternative name of intelligence

Scouting

Oldest name of Intelligence

Casing or surveillance

Modern name or CLE name of Intelligence, in history (bible) the first use of intelligence is in form of surveillance

Greece to India

Lugar na nasakop ni alexander the great

Battle of guagamela

The battle alexander the great lost

Delilah

A biblical personality who was able to gain information by using her beauty and charm, She was responsible for the fall of samson a known israel leader who terrorized the philistines

Napoleon bonaparte

Known as Le Petite Corporal or the small corporal

Intelligence agency

Is a government agency responsible for the collection, analysis or exploitation of information and intelligence in support of law enforcement, national security defense and policy objectives

Admiral Roscoe Hillenkoetter

First director of CIA

Intelligence requires security measures

Principle of intelligence which denies unauthorized personal information. It is the working balance between secrecy and operational convenience

Information

All evaluated materials of every description from which Intelligence is produced

Agent of influence

Agent who uses authority to gain information

Agent in place

Agent who has been recruited within a highly sensitive target

Close source

Only 1% information are obtained from covert operation close covert method

Surveillance

It the covert, discreet observation of people and places for the purpose of obtaining information concerning the identities or activities of subject

Stationary surveillance

Also referred to as to as to fixed and stakeout surveillance - is used when you know or suspect that a person is at or will come to a known location when you suspect that stolen goods are to be dropped or when informants have told you that crime is going to be committed

Technical surveillance

By the use of communications and electronics gadget, system and equipment

Moving surveillance

Simply the act of following a person

Lost

When the surveillant does not know the whereabouts of his subject or the subject had eluded the surveillance

Are target study

Refers to area of operation of surveillance activities

Casing

Is known as reconnaissance in military terms and scouting for old term

External casing

Type of casing in determining location, approaches and exits and it's vicinity

Internal casing

Type of casing determining clear description of the layout of a building

Personal reconnaissance

Method of casing the most effective method and will produced the most info since you know what you're looking for.

Map reconnaissance

Method of casing that may not sufficient but it can produce a certain amount of usable information

Research

Method of casing that has more information can be acquired best used with other methods

Prior Information

Method of casing that those recorded in your file unit that may provide valuable information

Hearsay

Method of casing that information usually gain by the person operating in the are and performing casing job

Loose tail

Employed where a general impression of the subjects habits and associates is required

Close tail

Extreme precautions are taken againts losing the subject is employed where constant surveillance is necessary

Rough shadowing

Employed without special precautions, the subject maybe aware of the surveillance, employed also when the subject is a material witness and must be protected from harm or other undesirable influence

One man

Shadowing extremely difficult and should be avoided, if unavoidable keep subject in view at all times.

Two man

Shadowing with two agents are employed to follow the subject

ABC method

Shadowing reduces the risk of losing the subject affords greater security agents detection

Progressive / leap frog method

Shadowing poor changes of obtaining goods results agents are stations at a fixed point assuming that subject followed that same general route each day

Combined foot-auto surveillance

Shadowing employed of surveillant on foot and agents in an automobile

Progressive / leap frog method

Which of the shadows has a disadvantage of a broken routine

Elicitation

The process of extracting information from a person believes to be in possession of vital information without his knowledge or suspicion

Sponsor

Directs the organization conducting the clandestine activity

Target

Person, place, or things againts which the clandestine activity is to be conducted

Agent

It refers to a person who conducts the clandestine operation to include principal agents, action agents and support agents

Principal agents

Leader or management agent in clandestine operation usually undertaken by the case officer

Action agent

The one who conducts the clandestine operation

Support agents

Agent who is engage in activities which support the clandestine operation and or the action agents in his operation

Bugging

The use of equipment or tool listen and record discreetly conversation of other people.

Wire tapping

A method of collecting information thru interception of telephone conversation

Eaves dropping

Listening discreetly without device

Tactical interrogation

The need for obtaining information the highest degree of credibility taken on the minimum of time can be through interrogation which varies and dependent entirely on the situation (captured enemy/ hostile)

Interrogator

Person who does the questioning

Source

A person who for any reason submits information intelligence interest usually on a voluntary basis

Suspect

A person who for any reason believe to be associated with prohibited activity

Witness

Any person who has direct knowledge of facts concerning an event or activity

Interrogee

Any person who is subjected to the interrogation process in any of its form and phases

Interrogation report

An oral or written statement or information by the questioning of in interrogee

Observation

A complete and accurate observation by an individual of his surrounding and encompasses the use of all the major sense to register and recognized it's operational or intell significance

Description

The actual and factual reporting of one's observation of he reported sensory experience recounted ny another

Approach

Process of setting people to start talking

Probe

To keep the people talking continuously. Is an attempt to obtain more information after the subject gives a vague incomplete general response

ODEX

Observation + Description = ?

Undercover

Is disguising one's own identity or using an assumed identity for the purpose of gaining the trust of an individual or organization to learn secret information or to gain the trust of targeted individuals in order to gain information or evidence

Cover

It refered to the changing forging or falsifying agents real personality including but not limited to things location job and others that will be used in undercover assignment

Cover story

A biographical data through fictional that will portray personality of the agents he assumed a scenario to cover the operation

Cover support

A agent assigned in target areas with the primary mission of supporting the cover story

Artificial

Altering the background that will correspond to the operation

Undercover operation

Also referred as ROPING

Natural

Using of real, actual or true background cover

Multiple

Cover includes different cover

Residential / dwelling assignment

It is related to the neighborhood of the subject where the agent will live as a new resident without making any suspicion. His mission is to make friends within it's neighborhood and gather information regarding the subject and possibly getting closer to the subject

Social assignment

The agent will gain access to the subject by going to the different gang out places of the subject and gather information like knowing how to drink socially without getting drunk

Work assignment

The agent will be employed where the subject work to acquire information. The agent must know his work and focus his mind set and habit to his work assignment

Subversive organization

This is the most dangerous of all the undercover assignment; the agent will join the organization of the subject itself he must know the ideologies of the group and the actions while inside should conform to the organization to avoid any suspicion

Personal contact assignment

The investigator required to develop the friendship and trust of the subject

Multiple assignment

The investigator is tasked to cover two or more of the assignments simultaneously it can produce extensive information with minimum expenses but more prone to compromise

Informant

Any person who hand over information to agents. Information is givenly open

Anonymous informant

Type of Informant which is unidentified or unknown informant

False informant

Type of Informant reveals information of consequences, value or stuff connected with thin air

Frightened informant

Type of Informant weakest link in criminal chain motivated by anxiety

Self aggrandizing informant

Type of Informant moves around the center of criminals delight in surprising the police about buts of information

Mercenary informants

Type of Informant which information for sale needed something for exchange of information

Double crosser informants

Type of Informant wants to get more information from the police more than he gives

Legitimate informants

Type of Informant whom operator of business desire to give information for legitimate

Informer

Refers to any person who provides information in a regular basis

Informant net

Refers to a controlled group of people who worked through the direction of the handler

Selection

Steps in recruitment of Informants to identify and recruit an informant who has access to several subversive organization. Access I'd the valuable factor in recruiting the potential informant

Investigation

Steps in recruitment of Informants it must establish possible existing motives as to this person might assist the officer if necessary conduct a complete background investigation to the possible informant

Approach

Steps in recruitment of Informants it must be done in a place conducive to the possible informant avoid places which might have any probability of compromise approach must be done in a foreign country

Testing

Steps in recruitment of Informants it must commence with limited assignment with a gradual integration into more important mission

Recording

The reduction of information into writing or some other form

Journal

Style of recording, has permanent and chronological record of reports and messages usually 24hrs

Contents of journal

Type of recording An accurate and concise statement of reports notation as to the sender and receipt of dispatch

Intelligence situation map

Type of recording It is the current disposition of enemy and allies, the lastest movement is indicated, or display enemy position, provides comparison, provide background for briefing basis for overlays

Intelligence work book

Type of recording Systematic arrangements by subject heading which aid in the interpretation of information, it is maintained depending on the requirements of the unit

Intelligence file

Type of recording ready to access to all information and not just current ones, they are usually special file that kept by the unit

Evaluation

It is the determination of pertinence, reliability and accuracy of information

Reliability

Judging the source of information or agency

Accuracy

Truth of information

Human intelligence (humint)

Intelligence gather through personal contact

Open source intelligence (opsint)

Intelligence gathered form open sources

Electronic intelligence (elint)

Intelligence gathered through gadgets and technology

Signal intelligence (sigint)

Intelligence gathered through interception of signal

Technical intelligence (techint)

Intelligence gathered from analysis of technology used but foreign countries

Imagery intelligence (imint)

Intelligence gathered through satellite and areal photography

Measurement and signature intelligence (masint)

Intelligence gathered through sensing instrument

Cyber Intelligence

Intelligence gathered from cyberspace

Financial intelligence

Intelligence gathered from monetary deposits and transaction

Analysis

This is the stage in which the collected information is subjected to review in order to satisfy significant facts and derive conclusion there from

Integration

The combination of the elements isolated analysis with other known information related to the operation

Interpretation

Process of determining the significance of new information in the possible alternatives

Dissemination

Intelligence gets into the hands of those who commissioned it and those who needs it

Strategic intelligence

Knowledge pertaining to the capabilities and vulnerability of a foreign nation which is required by the national planners for the formulation of an adequate national defense in peace and forms the basis for, projected. This is intelligence information which is not immediate operational but rather long range

Political intelligence

Components of strategic intelligence deals with domestic and foreign affairs and relation of government

Economic intelligence

Components of strategic intelligence deals with the extent and utilization of natural ang human resources to the industrial potential of the nations

Transportation and telecommucation intelligence

Components of strategic intelligence concerned with the operation and facilities not only the military but also the civilian

Sociological intelligence

Components of strategic intelligence deals with the demographic and psychological aspects of group of people

Biographical intelligence

Components of strategic intelligence deals with individual personalities who have actual possession of power

Geographical intelligence

Components of strategic intelligence deals with the natural as well as man-made feature of the physical environment of man considered from the point in view of military operations

Tactical Intelligence or line intelligence

Directly contributed to the accomplishment of specifics objectives and immediate in nature

People, weather, enemy and terrain (PWET)

Line Intelligence is divided into 4 it is?

Counter intelligence

Destroying the effectiveness of hostile foreign activities, or the phase of intelligence covering the activity devoted in destroying the effectiveness of hostile foreign activities and the protection of information againts espionage, subversion and sabotage

Passive CI measure

Protection of classified and sensitive information to the unauthorized through secrecy communication security and other various safeguards

Active CI measure

Are those measure which seek actively to block the enemies effort to gain information or engage in espionage subversion and sabotage

Detection

Act of knowing the clandestine operation of the enemy

Prevention

Application of CI measure to avoid enemy activities

Neutralization

Act of containing of the enemy activities

Criminal intelligence (crimint)

Refers to the knowledge essential to the prevention of crimes and investigation arrest and prosecution of criminal offenders

Internal security intelligence (insint)

Refers to the knowledge essential to the maintenance of peace and order

Public safety intelligence (pusint)

Refers to the knowledge essential to ensure protection of lives and properties