Lea 4 Review
Lea 4 Review
Lea 4 Review
Sir Tupaz, RC
•
Alexander The Great - A Greek Conqueror,
was able to identify those
who are disloyal to him by ordering the
opening of communication
letter of his men and was successful in
uplifting the esprit de corps
and morale of his men.
• ASIS - Australian Secret Intelligence Service - Primary
responsibility
is gathering intelligence from mainly Asian and Pacific
interest
using agents stationed in wide variety of areas. Its main
purpose like
other most agencies is to protect the country's political and
economic interest and ensure the safety of its citizens
against
national threats.
• Bundesnachrichtendienst - BND, Federal
Intelligence Service, is the
foreign intelligence agency of the German
government, the BND act as
the early warning system to alert the German
government against
threats to its interest coming from abroad.
Categories of Intelligence
• 1. National Intelligence - integrated product of
intelligence
developed by all government departments
concerning the broad
aspect of national policy and national
security.
2. Departmental Intelligence - the intelligence
required by the
department or agencies of the government
to execute his mission
and discharge its responsibilities.
• 3. Military Intelligence - refers to the
knowledge by the military
institution essential in the preparation and
execution of military
plans, policies and programs.
• Functions/Activities of Counter-Intelligence
1. Protection of Information against
espionage
2. Protection of personnel against
subversion
3. Protection of installations and materials
against sabotage
• Cryptography - arts and science of codes and
ciphers.
• Julius Caesar - in his time, the staff of each legion includes ten
speculators who served as an information collecting agency. The
Speculators were the first intelligence personnel to appear in a
military organization. Military success of the Romans was aided
by
the communication system. Made use of pigeons as carrier which
made intelligence transmittal very fast.
• Karl Schulmeister - known as Napoleon's Eye,
he was credited for
establishing counter-intelligence against spies.
He is a master of
deceit who used black mail to obtain vital
information to identify
the enemy's of Napoleon.
• Kinds of Covert Operation
1. Surveillance - is the covert, discreet
observation of people and
places for the purpose of obtaining
information concerning the
identities or activities of subjects.
Surveillant - is the plainclothes
investigator assigned to make the observation.
• Subject - can be a person, place, property
and vehicle, group of people, organization, or
object.
Safe house - refers to place where agents
meet each other for purposes of debriefing
and reporting
• Live Drop - refers to a place where agents or
informants leave their messages to the other
agents.
Decoy - a person or object used by the
subject in an attempt to elude the surveillant.
• Convoy - an associate of the subject who
follows him to detect surveillance
Log - chronological records of activities that
took place in the establishment under
surveillance.
Methods of Surveillance
•
1. Stationary Surveillance - also referred to as Fixed or
Stakeout Surveillance - is used when you know or
suspect
that a person is at or will come to a known location,
when
you suspect that stolen goods are to be dropped or
when
informants have told you that a crime is going to be
committed.
• 2. Moving Surveillance/Shadowing/Tailing -
simply the act of following a person.
• Forms of Shadowing/Tailing
1. Loose Tail - employed where a
general impression
of the subject's habits and associates
is required.
• 2. Rough Shadowing - employed without
special precautions, subject maybe aware of
the surveillance, employed also when the
subject is a material witness and must be
protected from harm or other undesirable
influences.
• 3. Close Tail - extreme precautions are taken
against losing the subject is employed where
constant surveillance is necessary.
•
1. Residential Assignment - it is related to the
neighborhood
of the subject, where the agent will live as a new
resident
without making any suspicion. His mission is to make
friends
within its neighborhood and gather information
regarding
the subject and possibly getting closer to the subject.
• 2. Social Assignment - the agent will gain
access to the subject by going to the different
hangout places of the subject and gather
information like knowing how to drink socially
without getting drunk.
• 3. Work Assignment - the agent will be
employed where the subject work to acquire
information. The agent must know his work
and focus his mind set and habit to his work
assignment
• 4. Subversive Organization - this is the most
dangerous of all the undercover assignment,
the agent will join the organization of the
subject itself, he must know the ideologies of
the group and the actions while inside should
conform to the
organization to avoid any suspicion
• 1. Knowledge of a possible or actual enemy or area
of operations
acquired by the collection,evaluation
and interpretation of
military information.
A. Combat intelligence
B. Police Intelligence
C. Military Intelligence
D. Counter intelligence
• 2. Knowledge of the enemy, weather and the
terrain that is used in the planning and
conduct of tactical operations.
A. Combat intelligence
B. Police intelligence
C. Military Intelligence
D. Counter-intelligence
• 3. Activity pertains to all security control
measures designed to ensure the safeguarding
of information against espionage, personnel
against subversion and installations or
material against sabotage.
A. Combat intelligence
B. Police intelligence
C. Military intelligence
D. Counter intelligence
• 4. Those which seek to conceal information
from the enemy.
A. Passive counter intelligence measures
B. Active counter intelligence measures
C. Strategic intelligence
D. Tactical intelligence
• 5. Those that actively block the enemy's
attempt to gain information
of enemy's effort to engage in sabotage or
subversion.
A. Passive counter intelligence measures
B. Active counter intelligence measures
C. Strategic intelligence
D. Tactical intelligence
• 6. When the source of the information comes from a
police
intelligence officer of long experience and extensive
background,
the evaluation of reliability of information is labeled.
A. A
B. B
C. C
D. D
• 7. When there is no adequate basis estimating
the reliability of an information, the
evaluation of the reliability of the information
is labeled.
A. A
B. F
C. E
D. D
• 8. Knowledge in raw form is known as
A. Intelligence
B. Information
C. Awareness
D. Cognition
• 9.The resolving or separating of a thing into
its component parts.
A. Analysis
B. Evaluation
C. Collation
D. Collection
• Answer
• 1. C
2. A
3. D
4. A
5. B
6. A
7. B
8. B
9. A
• 1. Ancillary materials that are included in a cover
story or deception
operation to help convince the opposition or
casual observers that
what they are observing is genuine.
A. Walk-in
B. Warming room
C. Window Observing
D. Window dressing
• 2. A surveillance team usually assigned to a
specific target.
A. Window observer
B. Window dressing
C. Stake-out team
D. Watcher team
• 3. A location out of the weather where a
surveillance team can
go to keep warm and wait for the target.
A. Warming room
B. Rest room
C. Station room
D. Waiting room
• 4. A defector who declares his intentions by walking into
an official installation, or otherwise making contact with
an opposition government, and asking for political
asylum or volunteering to work in place. Also known as
a volunteer.
A. Enemy traitor
B. Asylum seeker
C. Enemy defector
D. Walk-in
• 5. The methods developed by intelligence
operatives to conduct
their operations.
A. Trade craft
B. Operational technique
C. Trade secret
D. Operational secret
• 6. It focuses on subject or operations and
usually short term.
A. Strategic intelligence
B. Counter intelligence
C. Tactical intelligence
D. Long-term intelligence
• 7. Concerns with the security of
information,personnel,material
and installations.
A. Strategic intelligence
B. Counter intelligence
C. Tactical intelligence
D. Long-term intelligence
• 8. Deals with political,economic,military
capabilities and vulnerabilities
of all nations.
A. Strategic intelligence
B. Counter intelligence
C. Tactical intelligence
D. Long-term intelligence
• 9. Tradecraft techniques for placing drops by
tossing them while
on the move.
A. Tosses
B. Dropping
C. Throwing
D. Drops
• 10.A dead drop that will be retrieved if it is not
picked up by the
intended recipient after a set time.
A. Picked drop
B. Timed drop
C. Abandoned drop
D. Recovered drop
• 1. D
2. D
3. A
4. D
5. A
6. C
7. C
8. A
9. A
10. B
• 1. Technical air sampler sensors designed to
sniff for hostile
substances or parties in a dark tunnel
system.
A. Chemical sniffers
B.Tunnel sniffers
C. Dog sniffers
D. Air sniffers
• 2. A major electronic communications line,
usually made up
of a bundle of cables.
A. Cable line
B. Trunk line
C. Telephone line
D. DSL
• 3. A counter-surveillance ploy in which more than one
target car
or target officer is being followed and they suddenly go
in
different directions, forcing the surveillance team to
make
instant choices about whom to follow.
A. ABC technique
B. Star-burst maneuver
C. AC technique
D. Sudden change maneuver
• 4. A chemical marking compound developed by the KGB
to keep
tabs on the activities of a target officer. Also called
METKA.
The compound is made of nitrophenyl pentadien
(NPPD) and luminol.
A. Spy dust
B. Chemical dust
C. Sulfuric acid
D. Potassium nitrate
• 5. A ploy designed to deceive the observer into
believing that an
operation has gone bad when, in fact, it has been
put into
another compartment.
A. Burned
B. Deceiving
C. Spoofing
D. Misleading
• 6. The special disguise and deception tradecraft
techniques developed
under Moscow rules to help the CIA penetrate
the KGB's security
perimeter in Moscow.
A. Silver bullet
B. Golden bullet
C. Bronze bullet
D. Titanium bullet
• 7. Any form of clandestine tradecraft using a
system of marks,
signs, or codes for signaling between
operatives.
A. Ciphers
B. Signs
C. Signals
D. Code
• 8. Any tradecraft technique employing
invisible messages hidden
in or on innocuous materials. This includes
invisible inks and
microdots, among many other variations.
A. Secret writing
B. Secret message
C. Hidden message
D. Hidden writing
• 9. An apartment, hotel room, or other similar site
considered
safe for use by operatives as a base of operations
or for a
personal meeting.
A. Meeting place
B. Dead drop
C. Drop
D. Safe house
• 10.When an operation goes bad and the agent
is arrested.
A. Rolled up
B. Rolled down
C. Burned out
D. Burned down
• 1. B
2. B
3. B
4. B
5. C
6. A
7. C
8. A
9. D
10. A
Addendum!!
• Terms:
1. Wanted list - It is for crime suspects with
warrant
of arrest.
2. Watch list - It is for those without warrant
of arrest.
3. Target list - It is for organized crime groups.
4. PIR - Priority Intelligence requirement
5. OIR - Other intelligence requirements
6. SOR - Specific order request
• Cryptanalysis - from the Greek word Kryptos-
hidden and Analyein-to loosen or to unite - is
the art of defeating cryptographic security
systems and gaining access to the contents of
encrypted messages without being given
the cryptographic key
• Cryptography - is the practice and study of techniques
for secure communication in the presence of third
parties called adversaries.