0% found this document useful (0 votes)
204 views18 pages

Mock Board Crim

The document provides definitions and explanations of key concepts in police intelligence and surveillance. It covers topics such as pre-surveillance planning, different types of intelligence collection methods like surveillance and observation, principles of intelligence work, and specific terms used in intelligence operations. The document quizzes the reader with multiple choice questions to test their understanding of intelligence concepts.

Uploaded by

Jason Caballa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
204 views18 pages

Mock Board Crim

The document provides definitions and explanations of key concepts in police intelligence and surveillance. It covers topics such as pre-surveillance planning, different types of intelligence collection methods like surveillance and observation, principles of intelligence work, and specific terms used in intelligence operations. The document quizzes the reader with multiple choice questions to test their understanding of intelligence concepts.

Uploaded by

Jason Caballa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

POLICE INTELLIGENCE

1. A gathering of members for police intelligence operation before the surveillance is conducted.

A. Surveillance team B. Police members

C. Police unit D. Pre-surveillance conference

2. A general type of counter intelligence which seeks to conceal information from the enemy.

A. Active Measures B. Passive Measures

C. Detection Measures D. Denial Measures

3. All of the following are principles of intelligence, except:

A. continuity B. proximity

C. timeliness D. flexibility

4. A method of collection of information wherein the investigator tails or follows the person or vehicle.

A. research B. undercover operation

C. casing D. surveillance

5. A method of collecting information wherein the investigator merely uses his different senses.

A. observation B. casing

C. research D. interrogation

6. An accomplice or associate of the subject used to avoid or elude surveillant.

A. Surveillance plan B. Pre-surveillance conference

C. Convoy D. Safe house

7. A principle of intelligence that the information should be essential and pertinent to the purpose at
hand.

A. Selection B. Usefulness

C. Continuity D. Timeliness

8. A type of surveillance who is the subject is aware that he is under observation.

A. Surveillant B. Made

C. Close D. Contact
9. Disguise or secret observation of places, persons or vehicles for purpose of obtaining information.

A. Evaluation B. Surveillance

C. Elicitation D. Infiltration

10. Fredrick the Great is known as the;

A. Father of Criminology B. Father of Military Espionage

C. Intelligence Father D. Great Intelligence Father

11. He made ciphers to the information to ensure secrecy to the communication.

A. Akbar B. Julius Caesar

C. Hannibal D. Frederick the great

12. Intelligence is under what type of police function?

A. Primary B. Auxiliary

C. Administrative D. Secondary

13. In intelligence, what is meant by C.B.I?

A. Complete Background Investigation

B. Complete Background Investigator

C. Complete Back draft Investigation

D. Competent Background Investigator

14. In stationary surveillance, the following must be observed, EXCEPT

A. avoid eye contact B. never meet subject face to face

C. recognize fellow agent D. if burnt out, drop subject

15. It is an area to determine its suitability for intelligence use or its vulnerability.

A. Info desired casing B. General principle in casing

C. Casing D. Active opposition

16. It is the circumspect inspection of a place to determine its suitability for particular operational
purposes.

A. Inspection B. Survey
C. Surveillance D. Casing

17. It is conducted when the subject is moving from one place to another.

A. Casing B. Lost

C. Made D. Shadowing

18. On many occasions, the bulk of the most valuable information comes from:

A. business world B. an underworld informant

C. newspaper clippings D. communications media

19. Some of the instructions in foot surveillance are the following, EXCEPT

A. stop quickly, look behind

B. drop paper, never mind what happens to the paper

C. window shop, watch reflection

D. retrace steps

20. The procurement of information obtain w/out the knowledge of the subject or target.

A. Deception B. Covert Intelligence

C. Police Intelligence D. Sabotage

21. These are recruited among poor folk, glad to earn a small sum or to accommodate as military officer.

A. Common spies B. Double spies

C. Spies of consequences D. Espionage against their own will

22. The term used for the object of surveillance is a subject while the investigator conducting the
surveillance is:

A. rabbit B. traffic enforcement

C. surveillant D. patrol

23. Which of the following does not belong to the basic to informant recruitment?

A. Selection B. Investigation

C. Evaluation D. Approach

24. Which of the following is contained in the heading of an intelligence report?


A. Reporting unit B. Conclusion

C. Signature of the director D. Assessment of the operation

25. Which of the following is the most common reason why an informer gives information to the police?

A. Monetary Reward B. Wants To Be Known To The Police

C. As Good Citizen D. Revenge

26. It would mean as the total product of intelligence developed by all governmental agencies that
covers the broad aspects of national policy and security.

A. Military intelligence B. Police intelligence

C. National intelligence D. Line intelligence

27. An investigative process in which disguises and pretext cover and deception are used to gain the
confidence of criminal suspects for the purpose of determining the nature and extent of any criminal
activities that maybe contemplating or perpetuating.

A. Cover story B. Surveillance

C. Undercover assignment D. Casing

28. It is the kind of intelligence required by the commander to provide for planning and conduct tactical
and administrative operation in counter insurgency.

A. Strategic intelligence B. Line intelligence

C. Criminal intelligence D. Counter intelligence

29. This kind of intelligence covers the activity devoted in destroying the effectiveness of hostile foreign
activities and to the protection of information against espionage, subversion and sabotage.

A. Line intelligence B. Counter intelligence

C. Police intelligence D. Public safety intelligence

30. An intelligence data that is immediate in nature.

A. Line intelligence B. Strategic intelligence

C. Counter intelligence D. Combat intelligence

31. The organization of raw data and information into usable form; grouping similar items of information
so that they will be readily accessible.

A. Collection B. Collation
C. Dissemination D. Interpretation

32. The single most important feature in the consideration of recruiting the potential informant.

A. Access B. Wide access

C. History D. Physical and mental ability

33. The use of beautiful women in baited situations.

A. Drone trap B. Honey trap

C. Dead drop D. convoy

34. Refers to an accomplice or associate of the subject used to avoid or elude surveillant.

A. Decoy B. Convoy

C. Contact D. Shadow

35. Known as Napoleon’s eye, he conducted counter intelligence against spies, who utilized deceit and
blackmail to gain information.

A. Schulmeister B. Edward I

C. Steiber D. Redl

36. A step by which the intelligence is transformed from raw facts to intelligence data.

A. Collection B. Processing

C. Evaluation D. Dissemination

37. It refers to the combination of all analyzed data to form a logical picture or theory.

A. Integration B. Evaluation

C. Interpretation D. Deduction

38. Wide variety of tactics employed by which a state or person misleads or confuses the enemy;
generally as to its capabilities.

A. Sabotage B. Deception

C. Espionage D. Infiltration

39. Used by any agency to safeguard against espionage, sabotage and subversion.

A. Line intelligence B. Counter - Intelligence C. Police intelligence D. Military


intelligence
40. The importance of cover are the following, except;

A. Secrecy of operation against enemy intelligence

B. Secrecy of operation against friendly agencies who do have the need to know

C. Secrecy of the undercover agents identity

D. Successful accomplishments of the mission

41. The recruitment of action agent inside the target organization.

A. Infiltration B. Recruitment

C. Penetration D. Training

42. The formulation of the conclusion based on the theory developed or the determination of the effect
and meaning of the information.

A. Integration B. Interpretation

C. Evaluation D. Collection

43. The shifting, isolation, or separation of some elements in the information which have significance to
the objective, goal or mission of the unit concerned.

A. Evaluation B. Analysis

C. Collection D. Dissemination

44. The examination of the raw data or information in order to determine the intelligence value, the
pertinence of the information, the reliability of the source or its credibility and the truth of the
information.

A. Dissemination B. Evaluation

C. Analysis D. Integration

45. A Chinese philosopher who wrote the book entitled “The Art of War” in 500 B.C. and became the
successful general by applying the principles of his book.

A. Sun Tzu B. Akbar

C. George Washington D. John Edgar Hoover

46. The exploration or examination of an area to gather information, especially about the strength and
positioning of enemy forces.
A. Undercover work B. Reconnaissance

C. Surveillance D. Shadowing

47. The following are the type of surveillance according intensity and sensitivity except;

A. Lose B. Close

C. Discreet D. Loose

48. A job of striking up friendship with the subject.

A. Shadowing B. Rope

C. Tailing D. Surveillance

49. An agent who has reached the enemy, get information and would manage to get back alive.

A. Double agent B. Penetration agent

C. Expandable agent D. Agent of influence

50. An agent who uses influence to gain information.

A. Penetration agent B. Agent of influence

C. Double agent D. Expandable agent


268. A product created through the process of planning, directing,
collecting, collating, and analyzing data, for dissemination as usable
information that typically assesses events, locations of adversaries,
to allow the appropriate deployment of resources to reach a desired
outcome.
a. Police intelligence c. Intelligence report
b. Intelligence d. Strategic Intelligence
269. For covert operatives, intelligence is a “network” while for
dedicated intelligence operative both clandestine and overt,
intelligence is a______________________.
a. Profession or calling c. Game of wits
b. Business and a way of life d. Cult
270. _____________________ is a knowledge formed from the
interpretation of the intelligence developed by all the government
departments which provides the valuable inputs or the formulation of
national policy and the promotion and enhancement of national
security.
a. National Intelligence c. Military Intelligence
b. Departmental Intelligence d. Police Intelligence
271. Knowledge essential to ensuring the protection of lives and
properties is_______________.
a. Police intelligence c. Internal security
b. Criminal Intelligence d. Public safety intelligence
272. Its operational value cannot be readily ascertained. They are
not practical and immediate but rather long range that requires
build - up. It deals with identifying the “intention” of the subject of
intelligence effort and mostly employed in the formulation of policy
and military plans.
a. Order of battle intelligence c. Line/tactical intelligence
b. Strategic intelligence d. Counter-intelligence
273. An assignment of trained intelligence personnel to other agency
in order to obtain information of police intelligence value is
called___________________.
a. Discovery and identification c. Liaison programs
b. Surveillance d. Debriefing
274. Consist of activities designed to protect classified and
sensitive information and other measures which may conceal to
those who doesn’t need to know.
a. Defensive Counter Intelligence Measures
b. Active counter intelligence measures
c. Counter intelligence
d. None of them
275. Offensive counter-intelligence measures pertains to the
activities used to actively block the enemy attempt to gain
information or engage in espionage, subversion or sabotage. This
includes the following except:
a. Detection c. Apprehension or arrest
b. Prevention d. Neutralization.
276. Intelligence is all about advance information is what principle
of intelligence? .
a. Continuity and interdependence c. Flexibility and
foresight
b. Usefulness and security d. Timeliness
277. He wrote the book entitled “Art of War” and the theories he
set down around 490 BC remain remarkably fresh and are required
reading in the practice of intelligence today. It basically postulated
that “If you know the enemy and know yourself, you need not fear
the result of a hundred battles. If you know yourself but not the
enemy, for every victory gained you will also suffer defeat. If you
know neither the enemy and nor yourself, you will succumb in every
battle”.
a. Sun Tzu c. Hannibal
b. Alexander The Great d. Julius Caesar
278. A Prussian General who is regarded by the military historians
as the “Father of Organized Military Espionage”. He divides his
agents into four (4) classes: common spies; double spies; spies of
consequences; and person who undertake espionage against their
will.
a. Genghis Khan c. Frederick The Great
b. Shinobi d. Edward I
279. Regarded as the “Father of British Secret Service” and being
considered as the “First Great Spy Master”, who used information
for national not for personal ends.
a. Sir Francis Walsingham Of England c. Karl Schulmeister
b. George Washington d. Allan Pinkerton
280. Who is considered as the “God Father of Secret Service”?
a. Sir Arthur Wellesley c. Alfred Redl
b. Wilhelm Johann Karl Eduard Steiber d. William
Stephenson
281. Intelligence agency known as the “Institute” is
__________________.
a. Central Intelligence Agency
b. Security Service (MI5) and Secret Intelligence Service (MI6)
c. Komitet Gosudarstvennoy Bezopasnosti
d. Ha Mossad Le modi’in Ule Tafkidim Meyuhadin
282. Intelligence as a line functions, except.
a. Collection of information in the field and Handling of
informants
b. Establishing of contacts
c. Recruitment of informers and informants and execution of
certain intelligence plans
d. Processing of collected information and dissemination of
processed information
283. Process through which intelligence is obtained, produced, and
made available to users.
a. Processing c. Intelligence cycle
b. Evaluation d. Dissemination
284. The act of determining intelligence requirements, preparing a
collection plan, issuing orders and request for information collection
and checking on the productivity of collection entity.
a. Planning and directing c. Processing
b. Collecting d. Disseminating
285. Information needed regarding matters of intelligence interest
that needs to be collected and processed in order to meet the
Priority Intelligence Requirements.
a. Information requirements c. Priority intelligence
requirements
b. Intelligence requirements d. Essential elements
of information
286. Person, things, action or events from which information about
the enemy, weather or terrain is derived. It may or may not be
under friendly control.
a. Informant c. Source
b. Agency d. List
287. Which of the following is not one of the activities in the
production of intelligence?
a. Recording c. Analysis/Interpretation
b. Evaluation d. Dissemination
288. Which of the following is the correct sequence of evaluation
rating of the reliability of the source of information
a. A – Completely reliable b. 1 – Confirmed by
other sources
B – Usually reliable 2 – Probably true
C – Fairly reliable 3 – Possibly true
D – Not usually reliable 4 – Doubtfully true
E – Unreliable 5 – Improbable
F – Reliability cannot be judged 6 – Truth Cannot be
judged

c. A – Confirmed by other source d. T–Direct Observation of


Unit Commander
B – Probably true U – Penetration/ Resident
Agent
C – Possibly true V – Troops involved in
Operation
D – Doubtfully true W – Interrogation
E – Improbable X – Government & Civilian
Employee
F- Truth cannot be judged Y – Members of the
Populace
Z – Documentary
289. Assume that you are a Criminologist-Intelligence Analyst. How
will you present the evaluated information B-3U?
a. The information was reported by a civilian agent who is
unreliable and the information is possibly true.
b. The information was reported by the penetration agent who
is usually reliable and the information is possibly true.
c. The information was obtained from captured enemy
subjected to interrogation.
d. A and B
290. You are an intelligence analyst tasked to interpret collected
pertinent information. Which of the following activities will you not
be engaged in the interpretation of the subject pieces of
information?
a. Assessment c. Evaluation
b. Integration d. Deduction
291. Propriety in the dissemination of intelligence
means____________________.
a. It must reach the user on time to be of value
b. It must be disseminated to the correct user
c. It must be given to the user through personal contacts
such as conferences, briefings and person to person exchanges
d. It must be disseminated through messages such as
Couriers and other secured electrical means
292. The complete awareness by a person of his surroundings which
are achieved through maximum employment of the senses; and the
technique of factually reporting one’s own observations or the
sensory experience recounted by others.
a. Observation and Description c. Casing
b. Elicitation d. Surveillance
293. Person or vehicle use to mislead surveillants as a form of
surveillance evasion is called______________.
a. Convoy c. Surveillant
b. Decoy d. Made
294. One of the basic tradecraft of intelligence operations. It is by
nature inherent with almost all intelligence activities. If conducted
effectively it produces accurate, reliable first hand information
a. Undercover investigation c. Surveillance
b. Tactical interrogation d. Informant
295. The surveillant follows the target from place to place in order
to maintain continuous observation. Movement maybe by foot or any
type of vehicle.
a. Stationary c. Technical
b. Informer d. Mobile
296. Intermittent method of observation of subject, maybe applied
frequently or infrequently with varying period of observation on each
occasion, often employed to spot check activities of known
subversive personalities
a. Discreet c. Close
b. Loose d. rough
297. Which of the following is the correct operational stage of foot
surveillance?
a. Briefing, Pick up, Follow up, Call off, Debriefing and
Reporting
b. Pick up, Follow up, Call off, Debriefing and Reporting
c. Briefing, Pick up, Follow up, Call off, and Reporting
d. Briefing, Pick up, Follow up, Call off, Reporting and
Debriefing
298. Obtaining information by questioning a controlled and witting
source who is normally a willing one is __________________.
a. Eliciting c. Intelligence interview
b. Debriefing d. Tactical interrogation
299. An intelligence technique which the officer conceals his true
identity and adopts an assumed role to accomplish an intelligence
mission and to obtain access to information which would not be
available through other means.
a. Undercover operation c. Covert operations
b. Surveillance d. Undercover intelligence
300. The means by which an individual, group or organization
conceals the true nature of its activities, and/its existence from the
observer.
a. Cover c. Discreet
b. Concealment d. Undercover
301. Intelligence operative, with the cooperation of the university
disguised as a professor so that he can blend to the area where he
will operate.
a. Cover for status c. Official cover
b. Natural or artificial cover d. Cover for action
302. Falsified documents and materials prepared by an undercover
to make his cover story credible.
a. Aging cover c. Artificial cover
b. Cover story d. Backstops
303. Hazards to cover such that the operative may be recognized
by an ex-lover or former classmate while in a place where he is
conducting undercover work.
a. Passive opposition c. Hostile active opposition
b. Friendly opposition d. Unhostile opposition
304. Individuals who by social or professional position, possesses or
has access to information of continuing interest, and who willingly
provides information to the intelligence unit/ group, either in
response to a specific request or his own initiative, ie. Political,
social, economical, security experts, academicians, private analyst,
doctors etc.
a. Incidental informants c. Automatic informants
b. Casual Informants d. Recruited informants
305. A person who maintains covert affiliation with an intelligence
unit who can access the desired information, being part of his/her
daily normal routine activity. They are recruited, trained and put
under operational control of such intelligence unit
a. Ordinary informant c. Full time informant
b. Penetration informant d. Intelligence brokers
306. A person who is highly skilled in converting messages from
clear to unintelligible forms by the use of codes and ciphers.
a. Cryptographer c. Coding
b. Crypto Analyst d. Decoding
307. Information or material in any form or of any nature, the
safeguarding of which is necessary in the interest of national
security.
a. Classified matter c. National security matter
b. Top security document d. Secret matter
307. Cut-out device refers to measures to conceal contact between
two people – usually an agent and a handler, or between personnel
and units in the intelligence organization who do not want to meet
because one or both maybe under enemy observation. A cut – out
can be, except one:
a. Person and accommodating address c. Dead/Live
drop
b. Safe house d. Place
308. Which of the following is not one of the elements of national
security?
a. Moral - spiritual consensus and cultural cohesiveness
b. Economic solidarity and socio-political stability
c. Ecological balance, territorial integrity, and peace and
harmony
d. Strong and credible armed forces and citizens’ readiness to
defend their country
309. At present, the Philippine national security concerns are as
follows are enumerated hereunder. Which of the following must be
included in the group?
a. Global and regional geopolitical issues
b. Overlapping territorial and maritime claims and other
regional concerns
c. Internal armed conflicts, terrorism and weak institutions
d. Regional military build-up and weapons of mass destruction
310. The state of law and order prevailing within a nation.
a. Internal Security c. Crime situation
b. Internal Defense d. Peace and order situation
311. It directs the Philippine National Police (PNP) to undertake
active support to the Armed Forces of the Philippines (AFP) in
internal security operations for the suppression of insurgency and
other serious threats to national security and amends provisions of
series of 1999.
a. Executive Order 546 c. RA 6975
b. Executive Order 110 d. RA 8551
312. Infiltration is a method whereby insurgents move into different
organizations for the purpose of exercising influence for control. If
control is secured, the infiltrated organization becomes the
insurgent’s:
a. Back up c. Representative
a. Front d. Part of the organization
313. Identification of strength, command structure and disposition
of the personnel, units and equipment of any threat force.
a. Order of Battle c. Case Operational Plan
b. Master Plan d. Criminal Intelligence
314. Knowledge about persons or organizations engaged or
contemplating engagement in illegal activities. It may relate to
tactical, strategic and subversive matters.
a. Criminal Intelligence c. Target List
b. Black List d. Police Intelligence
315. Statement no. 1- A profit motivated and highly capable group
of persons or an enterprise organized to undertake widespread,
regular or long term, large scale, high profile and diversified criminal
activities that has high impact to the economy and national security
is an Organized Crime Group; Statement no. 2- A group of two or
more persons who have common identifying signs or symbols and
whose members individually or collectively engaged in or have
engaged in a pattern of criminal activity, creating an atmosphere of
fear and intimidation within the community or a specific area using
violence and intimidation is a Terrorist Group.
a. Statement no. 1 is true while statement no. 2 is false
b. Statement no. 1 is false while statement no. 2 is true
c. Statements no. 1 and 2 are both true
d. Statements no. 1 and 2 are both false
316. It provides a consolidated reference containing data on
organized crime groups for operational purposes.
a. The Target List c. Wanted List
b. Priority List d. Watch List
317. Consider the following statements
I. Watch list contains the identities and locations persons
whose inclinations and attitudes toward the State’s objectives could
not be determined
II. White list list contains the identities and locations of
persons who have been identified as being of intelligence interest
and are expected to be able to provide information or assistance in
existing or new intelligence.
III. Black list contains the listing of actual or potential enemy
collaborators, sympathisers, intelligence suspects and other person
whose presence menaces the security of friendly forces.
Choose the correct answer
a. I, II and III are true c. Only II and III are true
b. Only I and II are true d. Only I and III are true
318. Places where the organized crime groups or criminal gangs
normally store or conceal its armaments, vehicles and other
equipment prior to or immediately after each criminal activity.
a. Main Base c. Safehouses
b. Sanctuary or Haven d. Stashhouses
319. The process of analyzing, interpreting and monitoring crime
trends through geographical representation of critical crime
situations, criminal personalities and crime causations in an area or
community, to evaluate its implication to public safety, and for
planning, formulation and implementation of measures to address
crime problems.
a. Crime Mapping c. Crime Trending
b. Criminal Intelligence d. Crime Analysis
320. NAPOLCOM is to “Police undercover Operators/Operatives”,
PNP Intelligence Community is to:
a. agents c. stool pigeon
b. Mole d. saviour

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy