Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Intelligence and Secret Service Definition of Terms

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1.

Intelligence and Secret Service Definition of Terms


2. 2 Methods Of Collecting Information
3. Overt/Open – overt info. Are obtained from open and easily available sources like
magazines, reports and files.
4. Covert/Close

5. 3 Defined Objectives Of Police Intelligence


 To assist the commander in the success of the team
 Discover and Identify criminal activities
 To assist in the apprehension of criminals

6. 3 Types Of Channels In Special Communication Systems


 Regular
 Secondary
 Emergency

7. 4 Phases/Steps of Informant Recruitment


 Selection
 Investigation
 Approach
 Testing

8. Area of Interest – subject of information gathering (person,place,things or an


activity)

9. Briefs – the form in which the finished product of intelligence is presented to the
commander in the police department.
10.Bugging – the placement of a hidden microphone in a particular room to obtain
information.
11.Burned – the agent was identified and known.
12.CIA – established in 1946.
13.Ciples – are fundamental guides to action, broad statement of truth from which
others are derived.
14.Classification/Types Of Police Intelligence
 Strategic Intelligence
 Counter Intelligence
 Line Intelligence

15.Coding – is the process of putting the codes and ciphers to plain text message.
16.Collate – to bring together and compare the truthfulness of the information.
17.Collection – to accumulate knowledge on a subject or area of interest.
18.Cooperative Members of the Community - a rich source of information on criminals,
criminal activities and even subversive groups.
19.Criminal Syndicate – it is a stable business with violence applied and directed at
unwelcome competitors.
20.Criminal World – the social organization of criminals having its own social classes.
21.Cryptoanalysis – is the process of putting the plain text message to codes and
cipher.
22.Cryptograph – the art and science of making, devising, inventing, or protecting
codes and cipher.
23.Counter Intelligence – type of intelligence activity which deals with defending the
organization againsts it criminal activities.
24.Counter Intelligence Security Measures
25.Physical Security – a system of barrier placed between the potential intruder and
the material to be protected.
26.Personnel Security – includes all security measures designed to prevent unsuitable
individuals of doubtful loyalty from gaining access to classified matter,securing
facilities and to prevent the appointment, employment, or retention as employees of
such individuals.
27.Operational Security – measures taken in conducting operations or action in a
secure and efficient manner.
28.Security Survey/Inspection – conducted in order to assist the chief of office in
determining the security measures required to protect key installation from
possible sabotage, espionage, subversion and unauthorized disclosure of or access
to classified defense information or materials.
29.Community Security – is the protection resulting from all measures designed to
deny unauthorized person information of value which may be derived from the
possession and study of communications or to mislead unauthorized persons and
the interpretation of the result of such study.

30.Counter Surveillance – if a surveillance team is watched by the supervisor or a


designated unknown individual to know if the team is doing its job as planned or is
being watched by companions of the subject.
31.Covert Operation – if the information is obtained without the knowledge of the
person against whom the information or document may be used or if the method or
procurement is done not in an open manner.
32.Detection of Criminal – the primary purpose of police counter intelligence.
33.Decipher – to reconvert the cipher into plain text message.
34.Documentary Security Classifications
 Top Secret
 Secret
 Confidential
 Restricted

35.Encipher – conversion of plain text message to ciphers.

36.Evaluation – it is the critical appraisal of information as a basis for its subsequent


interpretation which includes determining the pertinence of information and the
reliability of the source.
i. - to judge the information as to its truthfulness or importance.
37.Financial Gain – the most common reason why an informer is giving information.
38.Frederick The Great – father of organized military espionage.
39.Information – are knowledge, data, news, opinion or the like transmitted from one
person to another.
40.Integrate – to make the entire or all the information the subject matter.
41.Interpret – to explain the meaning or to expand the information from the unknown
to known.
42.Intelligence – product resulting from the collecting information concerning an
actual and potential situation and condition relating to foreign activities and to
foreign or enemy held areas.
- product resulting from collection, evaluation, analysis, integration, and
interpretation of available information concerning area of interest.
43.Interpretation – determining the significance of the information with respect to
what is already known and it draws conclusions as to the probable meaning of the
evaluated information.
44.Kinds Of Surveillance
 Surveillance of place
 Tailing or shadowing
 Undercover investigation or Roping
45.Line Intelligence – types of intelligence which is of immediate nature and necessary
for more effective police planning and operation.
46.Method of Casing
 Personal Reconnaissance – the most effective
 Map Reading
 Research Work
 Operational Data Research
47.Military Intelligence – it is an evaluated and interpreted information concerning an
actual or possible enemy or theater of operations including weather and terrain
together with the conclusions drawn therefrom.
48.Need To Know Principle – in intelligence dissemination, even a ranking law enforcer
who has no business on the classified information is not furnished the report.
49.OB File – identification, location, and knowing the intents of criminal syndicates,
notorious characters and even people with subversive desires must be made
available for use.
50.Order Of Battle – an intelligence document describing the identity, strength,
command structure and disposition of the enemy/criminals.
51.Organized crime – it is the combination of two or more persons for the purpose of
establishing criminal activity.
52.Overt Operation – if the information or document are procured openly with out
regard as to whether the subject of the investigation becomes knowledgeable of the
purpose for which it is being gathered.
53.Parker – internal affairs is my defense and intelligence is my offensive arm.
54.Police Counter Intelligence – it is the detection, prevention, or neutralization of any
activity inimical to the harmony and best interest of the police organization.
55.Police Intelligence – an evaluated and interpreted information concerning organized
crime and other major police problems.
56.Reconnaissance – to gather specific or detailed information at a particular time and
place.
57.Roping – undercover assignment, form of investigation in which the investigator
assume a different and unofficial identity/cover story in order to obtain
information.
58.Safe House – a clandestine place where the intelligence agent and his superior
meet.
59.Schulmoister – Napoleon's secret military agent.
60.Security Inspection – conducted in order to determine degree of compliance with
established security policies and procedures.
61.Stool Pidgeon – an individual who sells information to different groups of law
enforcers.
62.Strategic Intelligence – intelligence which is primarily long range in nature with
little or no immediate practical value.
63.Sun Tzu – he was the writer of the book “Art of War”.
64.Surveillance – to gather general information over a wide area and takes a longer
time frame.
65.Tactical Interrogation – a process or method to obtain information from a captured
enemy.
66.Walshingham – protector of queen Elizabeth.
67. Wilhelm Von Stieber – a CIA intelligence officer who spied for soviet union from
1985 – 1994, he had perpetrated the costliest breach of security in the agency's
history.

You might also like