POLICE INTELLEGENCE
Name: __________________________________________________Score: ________________
INSTRUCTIONS: Select the correct answer in each of the following questions. Mark only one answer on each item by a putting a circle
corresponding to the letter of your choice.
1. It is any position within the government, police, military, the occupant of which could bring about by virtue of the position a material adverse effect
to national security.
a. sensitive position b. confidential agent c. security officer d. intelligence authority
2. This is an investigation of an individual made upon the basis of written information supplied by him in an official inquiry.
a. local agency check c. national agency check
b. partial background investigation d. complete background investigation
3. This is a type of investigation which consists of written inquiries sent to appropriate local government agencies.
a. local agency check c. national agency check
b. partial background investigation d. complete background investigation
4. This is much more comprehensive investigation as compared with National Agency Check (NAC) and Local Agency Check (LAC).
a. local agency check c. background investigation
b. partial background investigation d. complete background investigation
5. Consist of the investigation on the background of individual, particularly all the circumstances of his personal life.
a. local agency check c. national agency check
b. partial background investigation d. complete background investigation
6. Consist of the investigation of the background of an individual, but limited only to some of the circumstances of his personal life.
a. local agency check c. national agency check
b. partial background investigation d. complete background investigation
7. It is a type of security clearance issued after the conduct of personnel security investigation that is valid for five years unless sooner revoked by
the issuing authority.
a. interim clearance c. final clearance
b. security clearance d. none of the above
8. These are the purpose of police intelligence activity, EXCEPT:
a. to reduce error c. to conceal identify
b. to increase accuracy d. to help in decision making
9. It is primarily designed to enable the officer of unit to achieve and maintain a sound and effective security system.
a. security education b. security orientation c. security indoctrination d. security reminders
10. This consists of initial briefing on security, its various aspects, and its importance and it is made to the new personnel and employees.
a. security education b. security orientation c. security indoctrination d. security reminders
11. It is the determination of the pertinence or significance of the information relative to police operations.
a. evaluation b. analysis c. interpretation d. integration
12. The process of making conclusions from integrated intelligence and/or information.
a. integration b. assessment c. evaluation d. deduction
13. It is the graphic representation of the current enemy situation.
a. intelligence journal b. intelligence files c. situation map d. intelligence workbook
14. A cautious surveillance, because the loss of the subject is preferred to possible exposure.
a. close surveillance b. open surveillance c. loose surveillance d. mustard plaster
15. A surveillance with little or no attempt at concealment, the subject is most likely aware of the surveillance, but must not be lost.
a. close surveillance b. open surveillance c. loose surveillance d. mustard plaster
16. The subject is followed so closely that surveillant and subject are almost in lock step.
a. close surveillance b. open surveillance c. loose surveillance d. mustard plaster
17. A form of open surveillance in which the subject’s vehicle is closely followed.
a. technical surveillance b. tailgaiting c. directional finder d. protective custody
18. Its functions are to serve as the intelligence and counter-intelligence operating unit of the Philippine National Police.
a. Intelligence Service, AFP c. Police Intelligence Group
b. National Intelligence Coordinating Agency d. Directorate for Intelligence
19. It is a difficult one, in all cases it must be a close one or the person being followed will be lost.
a. leaf frog method b. one-man method c. group method d. mixed method
20. It is a close tail, with other members of the squad keeping contact with those immediately ahead of them.
a. leaf frog method b. one-man method c. group method d. mixed method
21. This is close tail, and is necessary only when discovery is preferable to losing the subject.
a. leaf frog method b. one-man method c. group method d. mixed method
22. It is the visual inspection of an area, installation or building to determine its suitability for operational activities.
a. surveillance b. casing c. stake out d. mustard plaster
23. It is one of the principal activities of police intelligence operations, and limited activities on this will usually produce a limited intelligence product.
a. news clipping b. liaison program c. de-briefing d. counter-intelligence
24. The intelligence operatives are being asked about his personal experiences and observations while conducting intelligence operations.
a. news clipping b. liaison activities c. de-briefing d. counter-intelligence
25. It is an important method of gathering intelligence data, and this is an excellent source of highly valuable material, it is an overt source of
information, and usually 80% of the intelligence input derived from this collection activities.
a. news clipping b. liaison activities c. de-briefing d. counter-intelligence
26. Those assigned with the mission of obtaining information within a specific target.
a. penetration informants b. full time informants c. ordinary informants d. incidental informants
27. Those that is available for counter-intelligence mission at all times, and who may derive the major part of their income from their work as
informants.
a. penetration informants b. full time informants c. ordinary informants d. incidental informants
28. Individuals who furnish information with no intention of repeating his services on a continuing basis.
a. penetration informants b. full time informants c. ordinary informants d. incidental informants
29. A cover that is general in nature and relatively permanently adopted to explain the presence of the intelligence operatives in any given area.
a. natural cover b. cover for status c. living one’s over d. cover for action
30. A cover designed to explain away or allows the undercover agent in performing a given clandestine activity, and it may be an extension of cover
for status.
a. natural cover b. cover for status c. living one’s over d. cover for action
31. Agent’s must make sure that every public action he takes must fit his assumed cover, and that a total picture presented to others accurately
reflects his cover.
a. natural cover b. cover for status c. living one’s over d. cover for action
32. A cover which completely fits the true background and capabilities of the agent.
a. natural cover b. cover for status c. living one’s over d. cover for action
33. Using true or actual personal background to fit for the purpose in the conduct of cover and undercover operations for purposes of collecting
information.
a. multiple cover b. cover within a cover c. artificial cover d. natural cover
34. A cover using biographical data adopted for the purpose that is fictitious.
a. multiple cover b. cover within a cover c. artificial cover d. natural cover
35. It includes provisions for sufficient contact between the undercover agent, and the target of interest to produce worthwhile results.
a. continuous contact b. complete background c. safe departure d. mutual interest
36. The cover story must include the material on all aspects of the undercover agent’s previous background, regardless of whether or not it is
anticipated that this information will be required.
a. continuous contact b. complete background c. safe departure d. mutual interest
37. This must exist if an individual is to function as an informant—most often and the rest of the time, it is provided by, EXCEPT:
a. motives b. chance c. propinquity d. proximity
38. The undercover agent is required to develop friendship and trust with the target personality for the purposes of obtaining information or evidence.
a. dwelling b. social assignment c. personal contact d. work assignment
39. It places the undercover agent in a type of employment where he can observe the activities of the subject at his place of work.
a. dwelling b. social assignment c. personal contact d. work assignment
40. It is the process of evaluating the person’s suitability for a security clearance.
a. security clearance b. background investigation c. compartmentation d. adjudication process
41. This is a form required to an individual who is being processed for a security clearance.
a. personal data sheet b. bio-data c. curriculum vitae d. personal hist. statement
42. Those by virtue of their official positions are expected or obligated to furnish information openly.
a. automatic informants b. casual informants c. incidental informants d. recruited informants
43. Individuals who by social or professional position, possess or has access to information of continuing interest.
a. automatic informants b. casual informants c. incidental informants d. recruited informants
44. This is a continuous and systematic program designed to meet the security needs of the office or unit.
a. security education b. security orientation c. security indoctrination d. security reminders
45. This is a phase of security education program which makes use of security posters, slogans, signs and stickers, with the aim purpose of
developing security consciousness from among the employees and personnel.
a. security education b. security orientation c. security indoctrination d. security reminders
46. This is a motive wherein persons hold belief inimical to their country, and they are of course vulnerable to the approach of the subversive groups
or enemies.
a. revenge b. material gain c. personal prestige d. ideological beliefs
47. On of the most powerful of motivations that make people susceptible to pressure.
a. jealousy b. gullibility c. weakness of character d. serious indebtedness
48. It is an individual who accept every story at face value and can see no wrong in anyone, and they fall into this category.
a. jealousy b. gullibility c. weakness of character d. serious indebtedness
49. Because of this, such a person, approached with the lure of a large sum of money is very vulnerable, and a definite security risk.
a. jealousy b. gullibility c. weakness of character d. serious indebtedness
50. It is someone from the enemy side held as prisoner while the war is going on.
a. prisoners of war b. enemy intelligence c. internee d. captives
51. It is the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information which is significant to
planning.
a. intelligence b. police intelligence c. information d. military intelligence
52.It is an evaluated material of every description including those derived from observation, reports, rumors, imagery, and other sources from which
intelligence are derived.
a. classified matters b. classified documents c. information d. reports and records
53. These are intelligence data that are not of an immediate value.
a. line intelligence b. strategic intelligence c. false intelligence d. counter-intelligence
54. It is the exploitation of sources of information by the collection agencies, and the delivery of the information obtained to proper intelligence unit.
a. collection b. processing c. dissemination d. direction of collection
55. It is a repetitive process used to produce intelligence from information.
a. intelligence effort b. intelligence activity c. intelligence work d. intelligence cycle
56. The reliability of the source is “highly reliable” and the accuracy of information is “confirmed information,” what is the evaluation rating of the
information.
a. A-1 b. B-2 c. C-3 d. D-4
57. He is considered as the father of organized military espionage.
a. Akbar b. Frederick the Great c. Genghis Khan d. Alexander the Great
58. It is in this phase of intelligence cycle in which information becomes intelligence.
a. collection b. processing c. dissemination d. direction of collection
59. It includes the systematic exploitation of all sources of information, and it must be methodical, continuous, and carefully controlled.
2
a. collection of information b. dissémination of information c. processing of information d. direction of collection effort
60. Are those items of information regarding criminals or subversives, and that needs to be collected or processed to meet the intelligence
requirements of police executives.
a. other information requirements c. priority intelligence requirements
b. orders and request d. intelligence indicator
61. It is the timely conveyance of information and or intelligence in any appropriate form and by any suitable means.
a. collection b. processing c. dissemination d. direction of collection
62. It is the observation of a person, place or thing, generally—but not necessarily—in unobtrusive manner.
a. informant operation b. undercover operation c. surveillance d. intelligence activities
63. Also called as a plant or fixed surveillance, here the surveillant remains essentially in one position or locale.
a. tail gating b. stakeout c. convoy d. undercover
64. The term roping described this situation, and it is said to be planted.
a. undercover b. shadow c. stakeout d. convoy
65. The subject is kept under constant surveillance, and the aim is not to lose the subject even at the risk of being made.
a. close surveillance b. loose surveillance c. open surveillance d. mustard plaster
66. It is a surveillance involving the use of scientific devices to enhance hearing or seeing the subject’s activities.
a. tailgaiting b. stakeout c. mustard plaster d. technical surveillance
67. To be detected or suspected of being surveillant by the subject.
a. be made b. burn out c. shadow d. convoy
68. It is a device in the tools of recording information which provides a means of systematic arrangement of information by type of subject.
a. intelligence journal b. enemy situation map c. intelligence workbook d. order of battle
69. It is not usually a major factor in prompting an individual to furnish information, but it can be potent at times.
a. gratitude b. civic duty c. emotions d. mercenary
70. It is an individual who openly or secretly obtained or who assist in obtaining information for intelligence and counter-intelligence purposes.
a. informants b. source c. eye witness d. intelligence asset
71. Individuals who are selected, trained, and utilized as continuous covert sources of information concerning specific intelligence aspects.
a. casual informant b. recruited informant c. automatic informant d. incidental informant
72. Individuals who are simultaneously employed by two opposing intelligence agencies with one are aware of his dual role.
a. dual agents b. double agents c. informers d. informants
73. It is a means by which individual, groups or organization conceals the true nature of its activities and existence from observer.
a. surveillance b. cover assignment c. intelligence d. undercover assignment
74. It is an individual who provides information because of purely monetary consideration.
a. informer b. source c. eye witness d. informant
75. It is an inquiry into the specific phases of an individual life history, including to a minimum, national agency check, character reference, and
former employers.
a. local agency check c. national agency check
b. partial background investigation d. complete background investigation
76. It is an inquiry into the loyalty, integrity, character, morale, and discretion of an individual because of the sensitive position he holds, or is about to
assume.
a. personnel security investigation c. complete background investigation
b. partial background investigation d. national and local agency checks
77. In police operational intelligence, those who do not meet the requirements of need to know means what?
a. without clearance b. black lists c. outsiders d. outside elements
78. When a surveillant’s behavior causes the subject to surmise or know that he or she is under surveillance.
a. be made b. burn the surveillance c. burn out d. all of the above
79. This letter represent that the source of intelligence information is from tactical interrogation of captured enemy.
a. U b. V c. W d. X
80. Information or material in any form, the safeguarding of which is necessary in the interest of national security.
a. documents b. classified matters c. security clearance d. vital information
81. It is the act of changing the assigned classification of a document or material.
a. classify b. declassify c. classification d. compartmentation
82. It is the assigning of an information or material to one of the four security classifications.
a. classify b. declassify c. classification d. compartmentation
83. A properly trained and cleared individual who assist the head of the department in discharging the responsibilities of safeguarding classified
documents and materials.
a. intelligence operatives b. undercover agent c. security officer c. confidential agents
84. It is the term given to the requirement to those persons whose official duty requires knowledge of possession thereof.
a. compartmentation b. need-to-know c. cleared individuals d. security officer
85. It is the granting of access to classified document or information.
a. compartmentation b. need-to-know c. cleared individual d. security officer
86. Information and material which requires special protection, and this not anymore requires cover sheet.
a. restricted b. confidential c. secret d. top secret
87. Information or material the unauthorized disclosure of which would cause administrative embarrassment or unwarranted injury.
a. restricted b. confidential c. secret d. top secret
88. Information or material the unauthorized disclosure of which would endanger national security and will cause serious injury.
a. restricted b. confidential c. secret d. top secret
89. Information or material the unauthorized disclosure of which would cause exceptionally grave damage to the nation, politically, economically, and
from the security standpoint.
a. restricted b. confidential c. secret d. top secret
90. It is any recorded information regardless of its physical form or characteristics.
a. classified document b. document c. information d. material
91. That aspect of police intelligence activities relating to all security measures, both offensive and defensive intelligence operations activities.
a. counter-intelligence b. line intelligence c. strategic intelligence d. intelligence
3
92. Counter intelligence measures that seek to conceal information from enemy.
a. active-offensive b. passive-defensive c. counter-intelligence d. intelligence
93. Counter intelligence measures that seek to block the enemy’s effort to engage in espionage, sabotage or subversion.
a. active-offensive b. passive-defensive c. counter-intelligence d. intelligence
94. It encompasses measures taken by an office or group to protect itself against espionage, enemy observations, sabotage, or subversion.
a. police security b. civil security c. special operation d. censorship
95. It encompasses active and passive counter-intelligence measures affecting civilians permanently or temporarily residing in an area under police
or military jurisdictions.
a. police security b. civil security c. special operation d. censorship
96. It is the employment of active-counter intelligence techniques and procedures in the conduct of clandestine or covert operations.
a. police security b. civil security c. special operation d. censorship
97. It is the control and examination of communications to prevent the transmission of information that may fall to the hand of the enemy.
a. police security b. civil security c. special operation d. censorship
98. It includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty to be employed in the government,
military or police entities.
a. background investigation b. personnel security c. counter-intelligence d. neighborhood check
99. It is an inquiry into the character, reputation, discretion and loyalty of an individual.
a. Personnel Security Investigation c. Complete Background Investigation
c. Partial Background Investigation d. all the above given answers
100. Individuals who are simultaneously employed by two or more friendly intelligence collection intelligence agencies, and usually motivated by
economic gains.
a. dual agents b. double agents c. informers d. informants
*************************************************************************NOTHING FOLLOWS***********************************************************************