chapter iv - intelligence - army the promotional examinations (promex) reviewer is one of the effort...

43
CHAPTER IV INTELLIGENCE The intelligence promotional exams cover topics taken-up during the Intelligence Basic and Advance NCO Career Course. It presents matters pertaining to Intelligence as a trade. It also covers duties and responsibilities of the intelligence personnel in his assigned organization. It is our objective that this reviewer would ignite the enthusiasm of the intelligence personnel to endeavor for more greater tasks. MAJ FELIX LAUDEMER S KAHULUGAN JR (CAV) PA Career Adviser for Intelligence

Upload: vuonghanh

Post on 12-Aug-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

CHAPTER IV

INTELLIGENCE

The intelligence promotional exams cover topics taken-up during the

Intelligence Basic and Advance NCO Career Course. It presents matters pertaining to Intelligence as a trade. It also covers duties and responsibilities of the intelligence personnel in his assigned organization.

It is our objective that this reviewer would ignite the enthusiasm of the intelligence personnel to endeavor for more greater tasks.

MAJ FELIX LAUDEMER S KAHULUGAN JR (CAV) PA Career Adviser for Intelligence

INDORSEMENT

The Promotional Examinations (PROMEX) Reviewer is one of the effort of the headquarters to professionalize and improve not only the soldier but also our systems and procedures. As such, I am honored to be part of this reviewer as the Chief of Intelligence.

I am indorsing the PROMEX for Intelligence so that our Intelligence personnel in the field may be guided on what they should know and do in support of operations.

May the intelligence personnel be not only intelligent but also skilled in his craft.

AFPOS: IntelligenceRank: Corporal

Topics for Review

1. General Duties and Responsibilities of an NCO and the NCO Support Channel 2. The CPP-NPA Barangay Module3. VIP Protection4. The 3-Staged Insurgency Strategy5. Introduction to Clandestine Activity6. Major Types of Sabotage7. Counter Sabotage8. Document and Information Security9. Intelligence Task10. SIGINT Operations and Security11. The History of World Communism12. Tools of Clandestine Operator13. Physical Security14. The History of the CPP15. CPP Agitation and Propaganda16. The Means of Clandestine Communication17. Personnel Security18. Security Education Program19. Military Intelligence20. Cover and Undercover21. Clandestine Organization22. Map Tracking23. Analysis on the Area of Operation24. Intelligence Cycle25. Methods of Surveillance26. GESCON27. The Islamic Extremists28. CPP-NPA Organization29. Elicitation

Sample Questions

A. GENERAL DUTIES AND RESPONSIBILITIES OF AN NCO AND THE NCO SUPPORT CHANNEL

1. Leaders who are personally responsible for each soldier’s health, welfare and safety because they live and work with their soldiers day in and day out?

a. F/Sgt c. Platoon Sgtb. Squad, Section and Tm Leader d. Platoon Leader

2. As an NCO, the ranks of corporal and sergeant are considered as __.

a. Staff NCO c. Senior NCOb. Junior NCO d. All of the above

B. THE CPP-NPA BARANGAY MODULE

3. They compose the core of disciplined, well-trained and highly motivated party members deployed in the countryside to mobilize the peasantry.

a. Militia c. Insurgentsb. Party cadres d. Front organization

4. Before a party cadre enters a target barangay, he is required to conduct an exhaustive background investigation known as preliminary social investigation and class analysis.

a. True b. False

C. VIP PROTECTION

5. This is done through threat of publishing things capable of harming the VIP or his policy.

a. Assault c. Kidnappingb. Threats d. Blackmail

6. Guards in civilian clothes, mingling with people surrounding the VIP or the installation without drawing any attention to them affect this.

a. Secret protection c. Over protectionb. Blackmail d. None of the above

D. THE 3-STAGED INSURGENCY STRATEGY

7. Phase in insurgency where insurgents begin to organize.

a. Guerilla warfare c. War of movementb. Strategic defensive d. Strategic stalemate

8. Phase in insurgency where balance of forces is more or less even.

a. Guerilla warfare c. Strategic stalemateb. Strategic defensive d. Strategic stalemate

E. INTRODUCTION TO CLANDESTINE ACTIVITY 9. A clandestine activity is the performance or accomplishment of a secret task in spite of opposition.

a. True b. False

10. The sponsor can deny any responsibility if the activity is uncovered.

a. True b. False

F. MAJOR TYPES OF SABOTAGE

11. One of the major type of sabotage that is combat in nature and is not difficult to control because it deals with intangibles and takes advantage of normal human frailties.

a. Psychological b. Mechanicalb. Incendiary c. Explosive

12. One of the major type of sabotage that is usually directed against industries, railroads, and ships.

a. Mechanical c. Psychologicalb. Incendiary d. Explosive

G. COUNTER SABOTAGE

13. The aspect of Intel, which comprises civil and military measures to counter and prevent sabotage and subversive activities.

a. Counter Attack c. Counter Measuresb. Counter Propaganda d. Counter Intel

H. DOCUMENT AND INFORMATION SECURITY

14. It applies to information and material. The unauthorized disclosure of which would cause exceptionally grave damage or danger to the nation.

a. Top Secret c. Secretb. Confidential d. Restricted

15. The unauthorized disclosure of these information materials endangers national security, cause serious injury to the nation or would be of great advantage to a foreign nation.

a. Restricted c. Confidentialb. Top Secret d. Secret

I. INTELLIGENCE TASK

16. The assignment of intelligence task is categorized into ______.

a. Political and Economic c. Military and Civilb. Non-intervention and Intervention d. Foreign Military

17. ITG is a commonly used acronym in intelligence that stands for ______.

a. Information Tactics Group c. Intelligence Task Groupb. Intelligence Tactical Group d. Intelligence Tactics Group

J. SIGINT OPERATIONS AND SECURITY

18. It includes the provision of secure communications systems as well a sound and practicable communications security operating procedures.

a. Physical Security c. Communication Securityb. Cryptographic Security d. Transmission Security

19. Includes all measures designed to protect transmissions from unauthorized interception, traffic analysis and imitative communications deception.

a. Physical Security c. Communication Securityb. Cryptographic Security d. Transmission Security

K. THE HISTORY OF WORLD COMMUNISM

20. A policy of government to rule a weaker country through military occupation.

a. Colonialism c. Socialismb. Hegemonism d. Capitalism

21. It is an economic theory or system based on the ownership of all property by the community as a whole.

a. Colonialism c. Communismb. Hegemonism d. Capitalism

L. TOOLS OF CLANDESTINE OPERATOR

22. It is a complete awareness by an individual of his surroundings, achieved through maximum employment of the senses.

a. Description c. Perceptionb. Observation d. None of the above

23. It is the ability to understand facts to which attention has been drawn.

a. Observation c. Attentionb. Description d. Perception

M. PHYSICAL SECURITY

24. A solid fence denies visual observation of the installation by an intruder.

a. True b. False

25. It is directly responsible for the physical security and proper accounting of “crypto” materials.

a. Library Custodian c. Crypto Custodianb. Record Custodian d. All of the above

N. THE HISTORY OF THE CPP

26. It joined with the USAFFE to fight the Japanese Imperial Army in the Philippines.

a. PKP c. KUMINTANGb. NPA d. HUKBALAPHAP

27. ________, founding Chairman of the Communist Party of the Philippines and currently Chief Political Consultant of the National Democratic Front of the Philippines, has been put on the list of "terrorists" by the US and the Dutch government.

a. Jose Maria Sison c. Rodolfo Salasb. Luis Taruc d. Bernabe Buscayno

O. CPP AGITATION AND PROPAGANDA

28. Agitation/Propaganda is the twin effort of conducting ideological indoctrinationand unifying the recipients around that ideology.

a. True b. False

29. One of the weapons of subversion is to deceive or distort ideas or doctrines used in an attempt to move a group to action in order to achieve goals.

a. Propaganda c. Agitationb. Fronts d. Infiltration

P. THE MEANS OF CLANDESTINE COMMUNICATION

30. It is a face-to-face contact between two or more members of a clandestine net.

a. Live Drop c. Personal Meetingb. Dead drop d. Debriefing

31. It is a person in a clandestine operation who accepts information or material from one agent and surrenders it to another.

a. Dead drop c. Moving dead dropb. Live drop d. None of the above

Q. PERSONNEL SECURITY

32. Personnel security includes all measures designed to prevent unsuitable individuals of doubtful loyalty to the government from gaining access to classified matters on security facilities.

a. True b. False

33. The objective of personnel security program is to deny individuals who can be considered as threat to the security of the government.

a. True b. False

R. SECURITY EDUCATION PROGRAM

34. A position whose duties include handling classified matter.

a. Security position c. Security guardb. Security post d. Security program

35. It is a person, thing or activity from which the information is originally obtained.

a. Source c. Agencyb. Informant d. None of the above

S. MILITARY INTELLIGENCE

36. It pertains to the study and analysis of weather, enemy and terrain.

a. Political Intel c. Combat Intelb. Military Intel d. None of the above

37. To obtain a clear picture of our situation and to see where we stand in relation to it.

a. Types of requirements c. Purpose of Intel requirementsb. Analysis of the situation d. None of the above

T. COVER AND UNDERCOVER

38. A type of cover, which is designed to withstand close scrutiny by the opposition.

a. Light Cover c. Deep Coverb. Unofficial Cover d. Official Cover

39. An investigative technique in which the investigator conceals his true identity and status and adopt an assumed role.

a. Concealment c. Coverb. Undercover d. All of the above

U. CLANDESTINE ORGANIZATION

40. It is an agent that engages in activities, which support the clandestine operations.

a. Principal Agent c. Support Agentb. Action Agent d. Action Agent

41. It is an individual who serves as cut-outs whose function is mainly to draw distinction between the human cut-out and the device used.

a. Intermediaries c. Moving dead dropsb. Dead drops d. None of the above

V. MAP TRACKING

42. Common point is a point or place in which the interrogator and interrogee is both familiar with.

a. True b. False

43. It is a tool of interrogation to locate exact enemy locations and installations through the use of maps.

a. Debriefing c. Map Trackingb. Interview d. Elicitation

W. ANALYSIS ON THE AREA OF OPERATION

44. It is a larger area of concern to the Commander.

a. Area of Influence c. Area of Conflictb. Area of Interest d. Area of Operations

45. AAO is a commonly used acronym in intelligence that stands for ______.

a. Analysis of the Area of Operation b. Annual Accomplishment Report c. Analysis and Observation of the Aread. Analysis of Actual Operation

X. INTELLIGENCE CYCLE

46. It is the timely transmission of information and/or in an appropriate form by any suitable means to those who need it.

a. Processing c. Disseminationb. Evaluation d. Collection

47. The first step in the intelligence cycle is _____________.

a. Mission c. Collection of Informationb. Planning the Collection Effort d. Processing of Information

Y. METHODS OF SURVEILLANCE

48. A method of surveillance where the surveillant observes the subject from a fixed point.

a. Mobile surveillance b. Foot surveillanceb. Stationary surveillance c. Combination of a & b

49. It provides data through observation of personnel and places relevant to or of significance to the operation.

a. Propagandist c. Surveillanceb. Diversionist d. Investigator

Z. GESCON

50. Provides historical cumulative information to trends and patterns of insurgency activity.

a. Incident Map c. Population status map b. Insurgent map d. None of the above

51. It is a temporary graphic display of current enemy disposition of activities.

a. Friendly Forces Overlay c. Situation Mapb. Journal d. Logbook

AA. THE ISLAMIC EXTREMISTS

52. This Islamic extremist group came into prominence in the mid 1995 when they kidnapped one from the ‘Biel’ family. Presently, they have strong links with the Jemaah Islamia of Indonesia. The name means ‘Bearer of the Sword”.

a. MILF c. MNLFb. NPA d. Abu Sayaff Group

53. The fight of the Southern Philippines Seccessionist Group which is to establish a separate Islamic state is termed as ______.

a. Secession c. Independenceb. Belligerency d. Terrorism

BB. CPP- NPA ORGANIZATION

54. It is the basic party organization of the CPP. It can be established whenever at least 3 but not more than 15 party members that can work together collectively according to place of residence, work or study.

a. Front committee c. White Area Committeeb. Party Branch d. Party Group

55. It is a secret party organ created in labor and mass organizations of peasants, youths, students, women, cultural workers and the like where there are at least three (3) party members.

a. Party Branch c. Party Groupb. White Area Committee d. Front Committee

CC. ELICITATION

56. The indirect form of interrogation which is characterized by obtaining information through deception.

a. Interview c. Elicitationb. Provocation d. Interrogation

57. The purpose of elicitation is to acquire information which is unattainable through other channels.

a. True b. False

--GOOD LUCK--

AFPOS: IntelligenceRank: Sergeant

Topics for Review

1. Intelligence Operational Cycle2. Tactical Interrogation3. Intro to Intel4. Operational Cycle5. Document Security6. Intel Priorities (EEIS and OIRS)7. The Determination and Selection of Collection of Agencies8. Analysis of the Area of Operation9. Area Study10. Intelligence Cycle11. Organization of Intelligence Section12. The CPP-NPA Barangay Module13. Subversion and Insurgency14. 3-Staged Insurgency Strategy15. Clandestine Activity16. SIGINT Operations17. Physical Security18. CPP Agitation and Propaganda19. Physical Security20. 3-General Phases of Insurgency According to Levels of Intensity21. Clandestine Communication22. Muslim Secessionist Groups23. History of CPP-NPA24. CPP United Front25. CPP-NPA Logistics and Sources of Funds26. Graphical Estimate of the Situation in Counter-Insurgency27. Threats to National Security28. Intro to CI 29. Sabotage30. Intel Annex to OPORD/OPLAN31. Cover and Undercover

Sample Questions

A. INTELLIGENCE OPERATIONAL CYCLE

1. The agent is given a non-existent target to cover, or he is assigned to a mission about which the sponsor has complete knowledge in order to determine his honesty in reporting is the _________.

a. Disposition c. Operational testingb. Training d. None of the above.

2. The agent is actually sent to get information. This may be accomplished by facts, by air or by sea, depending on where the target is, time factor and other operational consideration.

a. Dispatch c. Recruitingb. Investigating d. Spotting

B. TACTICAL INTERROGATION

3. In the planning and preparation phase of interrogation, the source circumstances of capture is not important to the interrogator.

a. True b. False

4. It is used to exploit a topic of interest. Questions usually flow from one to another based on the answer to previous question.

a. Leading questions c. Control questionsb. Repeated questions d. Follow-up questions

C. INTRO TO INTEL

5. Intelligence activity can be broadly classified into two (2) categories.

a. Overt and open c. Secret and overtb. Covert and overt d. None of the above

D. OPERATIONAL CYCLE

6. Aspects in the evacuation of the interrogee.

a. Speed and security c. Secure and efficientb. Efficient and timely d. All of the above

.

7. The systematic withdrawal from the agent of all the information he has acquired, consciously or unconsciously, while he is on the mission.

a. Spotting c. Trainingb. Debriefing d. Briefing

E. DOCUMENT SECURITY

8. Communication and cryptographic documents are classified as ________.

a. Secret c. Restrictedb. Confidential d. None of the above

9. Usually applies to information and material. The unauthorized disclosure of which would result to serious damage to the nation.

a. Top Secret c. Secretb. Confidential d. Restricted

F. INTEL PRIORITIES (EEIS AND OIRS)

10. The two (2) general categories to determine Intel priorities.

a. BIN/SOT c. DASE/DAMEb. EEI/OIR d. All of the above

11. These are critical items of information needed at a particular time to permit the commander to make a logical decision.

a. EEI c. SOTb. OIR d. None of the above

G. THE DETERMINATION AND SELECTION OF COLLECTION OF AGENCIES

12. In selecting collection agencies, an agency must be physically capable of providing the desired information.

a. Suitability c. Balanceb. Capability d. Multiplicity

13. It is a consideration given to the primary mission and location of any agency. When assigned a collection mission, only the agencies best suited to furnish the desired information are used.

a. Multiplicity c. Balanceb. Suitability d. Capability

H. ANALYSIS OF THE AREA OF OPERATION

14. It is a detailed comprehensive study with emphasis on weather and terrain data designed to enable the commander to determine the effects of the area of operation on the general courses of action that the enemy and friendly forces may adapt.

a. Analysis of the Area of Operation c. Area of Interestb. Area Study d. None of the above

I. AREA STUDY

15. The collection and compilation of information covering every aspect of an area or local environment.

a. CORAS c. Analysis of the Area of Operationb. Area Study d. None of the above

J. INTELLIGENCE CYCLE

16. It is the collection, processing, evaluation and dissemination of information.

a. Intel SOP c. Intel Cycleb. Interpretation d. None of the above

17. It is the timely transmission of information and/or in an appropriate form by any suitable means to those who need it.

a. Processing c. Collectionb. Evaluation d. Dissemination

K. ORGANIZATION OF INTELLIGENCE SECTION

18. In the Battalions and Brigades, the ______ is staff officer responsible for producing combat intelligence, counterintelligence matters and intelligence training.

a. S1 c. S4b. S3 d. S2

19. A branch of intel section that accomplishes functions which encompass the entire spectrum of the intelligence cycle.

a. Admin Brach c. CI Branchb. Operations Branch d. G2 Recon and Surveillance

L. THE CPP-NPA BARANGAY MODULE

20. They compose the core of disciplined, well trained and highly motivated party

members deployed in the countryside to mobilize the peasantry.

a. Militia c. Party cadresb. Front organization d. Insurgents

M. SUBVERSION AND INSURGENCY

21. It is a communist weapon for subversion intended to stimulate people’s ideas and activities, which will serve the communist cause.

a. Propaganda c. Frontsb. Agitation d. Infiltration

22. One of the weapons of subversion is to deceive or distort ideas or doctrines used in an attempt to move a group to action in order to achieve goals.

a. Propaganda c. Frontsb. Agitation d. Infiltration

N. 3-STAGED INSURGENCY STRATEGY

23. The 3-staged insurgency strategy are strategic defensive, strategic stalemate and strategic offensive.

a. True b. False

24. It is in this stage where the guerilla war becomes a conspicuous tug of war on strategic towns, cities and large areas.

a. Strategic Defensive c. Strategic Offensiveb. Strategic Stalemate d. None of the above

O. CLANDESTINE ACTIVITY

25. A clandestine activity is the performance or accomplishment of a secret task in spite of opposition.

a. True b. False

26. The sponsor can plausibly claim any responsibility if the activity is uncovered.

a. True b. False

P. SIGINT OPNS

27. It is the product resulting from the collection, evaluation, analysis, integration and interpretation of information derived from intercepted electromagnetic emissions.

a. ELINT c. SIGINTb. FISINT d. COMINT

28. It consists of information derived from intercepting, monitoring and locating the enemy’s communications systems.

a. ELINT c. SIGINTb. FISINT d. COMINT

Q. PHYSICAL SECURITY

29. A solid fence denies visual observation of the installation by an intruder.

a. True b. False

30. One concept of Physical Security is that “Enemy Agents must have access”.

a. True b. False

R. CPP AGITATION AND PROPAGANDA

31. Agitation and propaganda is the twin effort of conducting ideological indoctrination and unifying the recipients around that ideology.

a. True b. False

32. The CPP/NPA pursues a propaganda of agitation to agitate the people into hating, thus fighting the government.

a. True b. False

S. PHYSICAL SECURITY

33. As one of the basic policies of personnel security, no person shall be entitled to security clearance solely by virtue of his grade, position or knowledge or possession of classified matters.

a. True b. False

34. The objective of personnel security program is to deny individuals who can be considered as threat to the security of the government.

a. True b. False

T. 3-GENERAL PHASES OF INSURGENCY ACCORDING TO LEVELS OF INTENSITY

35. It is in this phase where subversive incidents occur with frequency in an organized pattern.

a. Phase I – Latent or Incipientb. Phase II – Guerilla Warfarec. Phase III - War of Movementd. None Of The Above

36. It is in this phase where subversive movement has gained sufficient local or external support and can initiate organized guerilla warfare or related forms of violence against the established authority.

a. PHASE I –Latent or Incipientb. PHASE II –Guerilla Warfarec. PHASE III -War of Movementd. None Of The Above

U. CLANDESTINE COMMUNICATION

37. Secret employment of trained personnel, communication equipments and other devices in enemy territories. It refers to the establishment of ________.

a. Sponsor c. Targetb. Clandestine communication d. None of the above

38. A person may be witting or unwitting on the nature of his act, who accepts info from another agent and surrenders it to the other. This is referred to as ____.

a. Dead drop c. Live dropb. Accommodation d. None of the above

V. MUSLIM SECESSIONIST GROUPS

39. This group is a result of the rift between Nur Misuari and Hashim Salamat.

a. MILF c. ASGb. ICC d. MISM

40. The Islamic extremist group associated with the Jemaah Islamiah. The name means ‘bearer of the sword.”

a. Abu Sayaff Group c. MIMb. MILF d. MNLF

W. HISTORY OF CPP-NPA

41. Lenin had once said that one hundred well organized men can easily defeat one thousand who are not organized.

a. True b. False

42. The united front according to the CPP is the unity of all revolutionary forces and strata against imperialism, feudalism and bureaucrat capitalism.

a. True b. False

X. CPP UNITED FRONT

43. The leadership of the national united front is under the Communist Party of the Philippines.

a. True b. False

44. The united front is designed as a broad based social pyramid consisting of several CPP mass organizations.

a. True b. False

Y. CPP-NPA LOGISTICS AND SOURCES OF FUNDS

45. Delivery of basic government services to the remote barangays is one way on how to overcome revolutionary taxation.

a. True b. False

46. Procurement of logistical requirements through revolutionary activities is one purpose of revolutionary tax.

a. True b. False

Z. GRAPHICAL ESTIMATE OF THE SITUATION IN COUNTER-INSURGENCY

47. It is defined as a systematic, continuous, integrated and comprehensive analysis on the effects of factors on operation.

a. GESCON c. CORASb. Area Study d. INTSUM

48. It is a GESCON template that focuses on population as the significant features.

a. Opposing Forces template c. Events Templateb. Terrain and Weather Template d. Community Situation Template

AA. THREATS TO NATIONAL SECURITY

49. State or condition wherein the people’s way of life and institutions, their territorial integrity and sovereignty, as well as their welfare are protected and enhanced.

a. National Identity c. National Consciousnessb. National Security d. National Unity

50. Aspect of National Security relating to the defense of the government against hostile local elements seeking replacement with their own system.

a. External Aspect c. International Aspectb. Peripheral Aspect d. Internal Aspect

BB. INTRO TO CI

51. All activities that block the enemy’s attempts to gain information or to engage in sabotage or subversion are active CI measures.

a. True b. False

52. Secrecy discipline is one of the measures under Military Security.

a. True b. False

CC. SABOTAGE

53. Effective weapon designed to damage or destroy a nation’s capacity to defend itself.

a. Subversion c. Sabotageb. Tactical target d. Value

54. Type of saboteur who is recruited, trained and directed to sabotage and is carefully selected and trained for all types of missions.

a. Espionage c. Enemy agentb. Accessibility d. Independent Saboteur

DD. INTEL ANNEX TO OPORD/OPLAN

55. An intelligence Annex normally accompanies an Operation Order issued by the Division or higher echelon.

a. True b. False

56. An Intelligence Annex is being made to ensure that the Operation Order is bulky.

a. True b. False

EE. COVER AND UNDERCOVER

57. The training which helps the agent conceal his true identity.

a. Security training b. Basic military trainingb. Cover training c. None of the above

58 Crossing at a legal border point utilizing false documentation.

a. Gray method c. Gray area methodb. Black area method d. All of the above

--GOOD LUCK--

AFPOS: IntelligenceRank: Staff Sergeant

Topics for Review

1. Intro to Intelligence2. Responsibilities of a Range Direction Finder (RDF) Operator3. Agent Handling4. Intro to Counter-Intelligence5. Agitation and Propaganda6. CPP Strategy and Tactics7. Subversion8. Information and Intelligence9. Intel Organization10. Counter-Insurgency Related Area Study11. OB Intelligence12. Document Exploitation13. Intelligence Dissemination and Use14. Intel Operational Cycle15. Method of Acquiring Information through Interview, Provocation, Elicitation.16. Graphical Estimate of the Situation in Counter-Insurgency17. Barangay Info Net18. Espionage and Counter-Espionage19. Personnel Security20. Casing21. Clandestine Activity22. Interrogation23. Observation and Description24. SIGINT Operations25. Document Security26. Protection of VIPs27. Communications Security28. Physical Security29. Security Education Program30. Agent Handling31. Cover and Undercover32. Intro to CI33. Sabotage and Counter-Sabotage34. CPP-NPA Organization35. Map Tracking

Sample Questions

A. INTRO TO INTELLIGENCE

1. It is the end product resulting from the evaluation, analysis, integration and interpretation of information.

a. Tactics c. Intersectionb. Intelligence d. Operation

2. It encompasses those measures taken by a command to protect itself from espionage, hostile observation, subversion or sabotage.

a. Tactical operations c. Security programb. Military security d. Military operations

B. RESPONSIBILITIES OF A RANGE DIRECTION FINDER (RDF) OPERATOR

3. He exercises control, supervision and authority over personnel assigned at the TICO.

a. Commo Operator c. Cryptanalystb. Interceptor d. Chief of TICO

4. His responsibility is to record the enemy signals using VOR’s.

a. Interceptor c. Commo Operatorb. Cryptanalyst d. Chief

C. AGENT HANDLING

5. In controlling an agent, the most preferred and productive is the

a. Blackmail c. Positive controlb. Negative control d. None of the above

6. The agent must be allowed to run the case or operation.

a. True b. False

D. INTRO TO COUNTER INTELLIGENCE

7. A CI measure activity that blocks the enemy’s attempt to gain information or to engage in sabotage or subversion.

a. Counter-sabotage c. Counter-subversionb. Active d. None of the above

8. Information, which reflects unfavorably on the character, integrity or reliability of an individual.

a. Morality c. Loyaltyb. Character d. Derogatory Information

E. AGITATION AND PROPAGANDA

9. The propaganda line of the CPP/NPA aims to discredit the established government.

a. True b. False

10. Agitation is one of the communist weapons for subversion.

a. True b. False

F. CPP STRATEGY AND TACTICS

11. The CPP/NPA general strategy for the war as a whole is __________.

a. Protracted War c. Guerilla Warfareb. Political Warfare d. Partisan Warfare

12. United Front Commission is in-charge of the winning over and mobilizing the support of the majority of the people for the armed struggle and the revolutionary mass movement in the area.

a. True b. False

G. SUBVERSION

13. Subversion is an activity carried out by individuals or group of individuals, which seek to alter the form of government thru unconstitutional means.

a. True b. False

14. RA 1700 is commonly known as the anti-subversion law and was repealed by ____________.

a. RA 1500 c. RA 7676b. RA 1800 d. RA 1600

H. INFORMATION AND INTELLIGENCE

15. These are persons, things or actions from which information about the enemy, weather or terrain is derived.

a. Recording c. Sources of information

b. Collection Agency d. Processing of Information

16. This term includes all facts, documents, materials, photographs, diagrams, maps and reports of observation of any kind. It maybe true or false, accurate or inaccurate, positive or negative, organized or unorganized. It is a raw material, which has not been processed.

a. Intel cycle c. Informationb. Intelligence d. None of the above

I. INTEL ORGANIZATION

17. The _______ is responsible for all intelligence activities of his command.

a. Commander c. S2b. S3 d. Both 1 & 2

18. The S-2 of the battalion is responsible for the preparation of the Intelligence Annex in the BN OPLAN or OPORD.

a. True b. False

J. COUNTER-INSURGENCY RELATED AREA STUDY

19. CORAS stands for ___________.

a. Counter Insurgency Related Area Study c. Counter Insurgency b. Counter Insurgency Oriented Area Study d. None of the above

20. When a political organization has been organized in the area, although no militia exists yet but people are sympathetic to the communist and give material support to roving regular insurgent bands, it is considered ________.

a. Insurgent-influenced c. Insurgent – infiltratedb. Insurgent targeted d. None of the above

K. OB INTELLIGENCE

21. It is defined as the identification, strength, command structure and disposition of the personnel, units and equipment of any enemy force.

a. Processing of Information c. Collection Planb. Journal d. Order of Battle

22. In insurgency situation, the element “Personalities” is added which is usually included under “Miscellaneous” in a conventional situation.

a. True b. False

L . DOCUMENT EXPLOITATION

23. It is defined as any piece of recorded information regardless of form. It may be typed, handwritten, printed, engraved or drawn materials.

a. Information c. Documentb. Report d. None of the above

24. Documents will normally be evacuated to the echelons from the elements currently holding them. From the Infantry companies to the Battalion ______.

a. Line companies c. S2b. S3 d. Both 1 & 2

M. INTELLIGENCE DISSEMINATION AND USE

25. It is defined as the timely transmission of information and / or intelligence in an appropriate form and by any suitable means to those who need it.

a. Processing c. Collectionb. Dissemination d. None of the above

26. Intelligence documents are the most rapid means of dissemination.

a. True b. False

N. INTEL OPERATIONAL CYCLE

27. Is the chronological development of intelligence activities from receipt of the basic requirement to the final product.

a. Intel cycle c. Agent handlingb. Operational cycle d. None of the above

28. It is a consideration of how to obtain the necessary agent(s) who would be able to answer the requirement within the framework of the preliminary operational plan.

a. Investigating c. Spottingb. Recruiting d. Training

O. METHOD OF ACQUIRING INFORMATION THROUGH INTERVIEW, PROVOCATION AND ELICITATION

29. Information is obtained from another person who is aware that he is giving wanted information.

a. Provocation c. Interviewb. Elicitation d. All of the above

30. A method of acquiring information from another person who is unaware that he is giving the wanted information.

a. Provocation c. Elicitationb. Interview d. All of the above

P. GRAPHICAL ESTIMATE OF THE SITUATION IN COUNTER-INSURGENCY

31. It is the analysis of effects of the opposing forces, community situation, terrain and weather, events and economic situation.

a. GESCON c. Area Studyb. Situation Map d. All of the above

32. Of all the forms of Intel records and files, it is the Situation Map, that is easiest to prepare.

a. True b. False

Q. BARANGAY INFO NET

33. BIN stands for __________.

a. Barangay Intel Net c. Barrio Intel Netb. Barangay Information Net d. None of the above

34. An intelligence coordinating body required to conduct periodic intelligence training to selected town or barangay officials, CAFGU’s, PNP personnel and other trusted individuals.

a. Intel Task Group c. ISGb. G2, PASAFP d. none of the above

R. ESPIONAGE AND COUNTER-ESPIONAGE

35. The removal of personnel or units from areas under enemy control by stealth, deception, surprise or clandestine means ____________.

a. Penetration c. Exfiltrationb. Infiltration d. None of the above

36. A counter-intelligence service to assist commanders in determining security measures required to protect key installation from possible sabotage, espionage, subversion and unauthorized disclosure, or access to classified defense information or material contained therein.

a. Security Survey c. Both 1 & 2b. Security Inspection d. None of the above

S. PERSONNEL SECURITY

37. It is an inquiry into specific phases of an individual life history.

a. Interrogation c. Casingb. Background Investigation d. Surveillance

38. Information, which reflect unfavorably on the character, integrity or reliability of an individual.

a. Morality c. Loyaltyb. Character d. Derogatory Information

T. CASING

39. It is defined as ocular examination of a particular place to determine its suitability for a particular operational purpose.

a. Surveillance c. Interrogationb. Background Investigation d. Casing

40. Careful planning is necessary in the conduct of casing.

a. True b. False

U. CLANDESTINE ACTIVITY

41. A form of investigation activity which consists of keeping under physical observation any person, place or things of operational interest.

a. Description b. Interrogationb. Surveillance c. Casing

42. It is the group, which through its headquarters, supports and directs the organization conducting the clandestine activity.

a. Sponsor c. Targetb. Agent d. None of the above

V. INTERROGATION

43. Is the art of questioning and examining a source to obtain the maximum amount of usable information?

a. Elicitation c. Interviewb. Provocation d. Interrogation

44. A personal quality of an interrogator who adapts himself to the many varied personalities, which he encounters.

a. Objectivity b. Perseveranceb. Alertness c. Adaptability

W. OBSERVATION AND DESCRIPTION

45. The cornerstone of the investigation system of describing a person _____.

a. Reporting c. Portrait Parleb. Memory Training d. None of the above

46. The actual and factual reporting of one’s own observation.

a. Interview c. Elicitationb. Interrogation d. Observation Report

X. SIGINT OPERATIONS

47. Wire transmission is more secure than radio transmission.

a. True b. False

48. His obligation is to see to it that the communication line with all intercept sites are always accessible and secured.

a. Traffic Analyst c. Communication Operatorb. Cryptanalyst d. Interceptor

Y. DOCUMENT SECURITY

49. It applies to information and material. The unauthorized disclosure of which would cause exceptionally grave damage or danger to the nation.

a. Confidential c. Secretb. Top Secret d. Restricted

50. Methods of destruction of documents.

a. Shredding c. Both a and bb. Burning and pulping d. None of the above

Z. PROTECTION OF VIPS

51. The places the VIP stays in, both in his official and his private life should be _______.

a. Casing c. Photographb. Kept secret d. Known to everybody

52. The easiest method of VIP protection.

a. Physical protection c. Controlb. Secrecy d. Intelligence

AA. COMMUNICATION SECURITY

53. It is the protection resulting from all measures designed to deny unauthorized person of information of value, which might be derived from the possession, and study of telecommunication.

a. Document Security c. Communication Securityb. Personnel Security d. Physical Security

54. It is a communication security designed to protect transmission from interception, traffic analysis, and imitative deception.

a. Cryptographic Security c. Transmission Securityb. Physical Security d. None of the above

BB. PHYSICAL SECURITY

55.It is defined as system of barriers placed between the potential intruder and the matter to be protected.

a. Document Security c. Physical Securityb. Communication Security d. Personnel Security

56. Example of structural barriers is/are:

a. Fence c. Rivers, cliffb. Dogs d. Both b and c

CC. SECURITY EDUCATION PROGRAM

57. The weakest link in a military program.

a. Equipment c. Manb. Document d. None of the above

58. Secrecy Discipline is an example of __________.

a. Active Measures c. Technical measuresb. Passive Measures d. None of the above

DD. AGENT HANDLING

59. It is the art of directing, guiding, motivating, training, testing, supporting, rewarding, controlling, communicating with, and if necessary, disciplining and/or terminating the agent relationship.

a. Agent handling c. Operational cycleb. Undercover d. None of the above

60. It is the “doer” of the clandestine task.

a. Case Officer c. Agentb. Principal Agent d. None of the above

EE. COVER AND UNDERCOVER

61. It is a means by which an individual, group or organization conceals the true nature of his acts and/or its existence from the observer.

a. Surveillance c. Coverb. Security d. None of the above

62. Cover for status means assuming fake identity.

a. True b. False

FF. INTRO TO CI

63. It consists of all activities done in peace and in war concerned with the prevention, detection, neutralization, and destruction of the intelligence activities of a real or potential enemy, by planning and developing suitable countermeasures to thwart such hostile activities.

a. Sabotage c. Counter-intelligenceb. Espionage d. None of the above

64. It denies information to the enemy, increases the security of the command, and aids in achieving surprise.

a. Military Intelligence c. Strategic intelligenceb. Counter-intelligence d. Combat Intelligence

GG. SABOTAGE AND COUNTER-SABOTAGE

65. It is a willful and overt act by one who conspires with any other persons to

overthrow the government or any of its potential subdivision by force or violence, etc.

a. Espionage c. Counter-intelligenceb. Sabotage d. None of the above

66. A CI measure activity that blocks the enemy’s attempt to gain information or to engage in sabotage.

a. Counter-sabotage c. Counter-subversionb. Active measures d. None of the above

HH. CPP-NPA ORGANIZATION

67. Militia is a unit that defends the masses in the rural areas, specifically the respective barrios, without separating themselves from the daily productive work.

a. True b. False

68. Executive Committee is the implementing body of the POLITBURO.

a. True b. False

II. MAP TRACKING

69. Maps allow the interrogator to become familiar with the topography of a particular area.

a. True b. False

--GOOD LUCK--

AFPOS: IntelligenceRank: Technical Sergeant

Topics for Review

1. Agent Handling2. Military Security3. Sabotage and Counter-Sabotage4. Tools of Clandestine Operation5. Intel Task Allocation6. CPP-NPA Tactics7. CPP-NPA Agrarian Revolution8. Subversion and Counter-Subversion9. Intelligence Cycle10. Processing of Information11. Agitation and Propaganda12. History of World Communism13. RDF Operations14. History of Philippine Insurgents15. Area Study16. Intro to CI17. Intelligence Operational Cycle18. Intelligence Organization19. EEIS and OIRS20. Source of Information21. CPP-NPA Barangay Module22. Interrogation23. Techniques of Interrogation24. Map Tracking25. Intel Annex26. CPP-NPA-NDF Organization27. Intelligence Project Proposal and Plan28. CPP-NPA Strategy and Tactics

Sample Questions

A. AGENT HANDLING

1. The agent must be allowed to run the case or operation.

a. True b. False

2. Is the art of directing, guiding, motivating, training, testing, tasking, supporting, awarding, controlling, communicating with and if necessary, disciplining and or terminating an agent relationship.

a. Agent handling c. Case officer b. Principal agent d. None of the above

B. MILITARY SECURITY

3. It encompasses those measures taken by a command to protect itself from espionage, hostile observation, subversion or sabotage.

a. Tactical operations c. Military securityb. Security program d. Military operations

4. Maintenance of ________ assures the maximum protection of classified material from time of production to time of destruction.

a. Physical Security c. Cryptographic Securityb. Communication Security d. Transmission Security

C. SABOTAGE AND COUNTER-SABOTAGE

5. A CI measure activity that blocks the enemy’s attempt to gain information or to engage in sabotage.

a. Counter-sabotage c. Counter- subversionb. Active d. None of the above

6. It is an effective weapon of war designed to damage or destroy a nation’s capacity to defend itself.

a. Counter-sabotage c. Sabotageb. Espionage d. Counter-espionage

D. TOOLS OF CLANDESTINE OPERATION

7. It is the individual’s awareness of his surroundings, achieved through maximum employment of his sense of _____________.

a. Casing c. Interrogationb. Surveillance d. Observation

8. It is a form of investigation, which consists of keeping a person, place or thing under constant physical observation.

a. Surveillance c. Leapfrogb. Casing d. All of the above

E. INTEL TASK ALLOCATION

9. Shall supervise the implementation of BIN plan.

a. ISG c. ITGb. ITU d. ISU

10. The operating arm of the Division G2 is MI Battalion while in the Battalion S2 is the ______.

a. Special Opns Branch c. Intel Platoonb. Intel Team d. Both a & b

F. CPP-NPA TACTICS

11. Normal operations to execute tasks such as liquidation and agaw-armas.

a. Regular Opns c. Partisan Opnsb. Special Opns d. Combat Opns

12. In Sparrow operations, there are several stages. The first is _______.

a. Personnel c. Organizationb. Execution d. Preparation

G. CPP-NPA AGRARIAN REVOLUTION

13. _______ is considered as an CPP-NPA socio-economic activity.

a. Benefit Dance c. Agrarian Revolutionb. Fiesta d. Gintong Alay

H. SUBVERSION AND COUNTER-SUBVERSION

14. Conspiracy and proposal to commit ________ are consummated by committing actual treason against own country.

a. Treason c. Rebellionb. Subversion d. Insurgency

15. Activity carried out by an individual or group of individuals, which seek to alter the form of government through unconstitutional means.

a. Insurgency c. Subversionb. Treason d. Rebellion

I. INTELLIGENCE CYCLE

16. It is the phase in intelligence in which information becomes intelligence.

a. Planning the collection effort c. Processing of informationb. Document analysis d. collection of information

17. The first step in the intelligence cycle is the _______________.

a. Mission c. Collection of Informationb. Planning the Collection Effort d. Processing of Information

J. PROCESSING OF INFORMATION

18. The determination of pertinence, reliability and accuracy of information.

a. Recording c. Evaluationb. Interpretation d. Processing

19. The essential step in processing of information.

a. Evaluation & Interpretation c. Recording and Collectingb. Planning and Directing d. Analysis and Processing

K. AGITATION AND PROPAGANDA 20. Deceptive idea to move a group to action in order to achieve goals.

a. Insurrection c. Agitationb. Propaganda d. Subversion

21. Agitation is one of the communist weapons for subversion.

a. True b. False

L. HISTORY OF WORLD COMMUNISM

22. Aims to overthrow the government through legal and parliamentary struggle.

a. Maoist actionb. Marxist-Leninist factionc. Party list Hukbong Mapagpalaya ng Bayan

d. None of the above

M. RDF OPERATIONS

23. A surface wave is a wave that is subject to refraction in the atmosphere between the transmitter and receiver.

a. True b. False

24. Instructions, practice and drills, both oral and written, are major factors in achieving efficiency and security in ___________ operations

a. physical c. cryptographicb. communication d. transmission

N. HISTORY OF PHILIPPINE INSURGENTS

25. It is an insurgency, which aims to establish an autonomous region over the province of Minsupala, Basilan and Tawi-tawi.

a. Communism c. Secessionistb. Subversion d. Ultra-Rightist

26. The Local Communist Movement in the Philippines adopts Marxist-Leninist-Mao Tse Tung Thought (MLMTT).

a. True b. False

O. AREA STUDY

27. It is an important factor to be studied and analyzed when engaging in counter-insurgency operations.

a. Politics c. Economyb. Religion d. People

28. Area Study is not considered as Intel file.

a. True b. False

P. INTRO TO CI

29. It denies information to the enemy, increases the security of the command, and aids in achieving surprise.

a. Military Intelligence c. Counter-intelligenceb. Strategic Intelligence d. Combat Intelligence

Q. INTELLIGENCE OPERATIONAL CYCLE

30. A kind of training the recruited agent undergoes that provides him basic knowledge in concealing the true identity.

a. Military training c. Security trainingb. Cover training d. INCOBC

31. It is the consideration of how to obtain the necessary agent or agents who would be able to answer the requirement within the framework of the preliminary operational plan.

a. Spotting c. Investigationb. Intelligence Summary d. None of the above

R. INTELLIGENCE ORGANIZATION

32. At any level of command, he is a staff responsible for producing combat intelligence.

a. Intel Officer c. Supply Officerb. Admin Officer d. Mess Officer

S. EEIS AND OIRS

33. The first step in the collection planning is the determination of the _____.

a. Collection Agencies c. Intel Prioritiesb. Intel Requirements d. Indicators

34. Is used as guide in preparing Collection Plan and in evaluating information by making known the Commander’s highest priority intel needs.

a. Intel estimat c. Intel SOPb. EEIs d. None of the above

T. SOURCE OF INFORMATION

35. It is a person, thing or activity from which information is originally obtained.

a. Agency c. Informant b. Source d. All of the above

U. CPP-NPA BARANGAY MODULE

36. The barangay people who form the Organizing Committee undergo a practical training on ___.

a. Leadership c. Propagandab. Military Tactics d. Political strategy

37. It is considered as the extortion group within the barangay when Semi-Legal Team (SLT) members of the NPA organize sectorally the farmers, women and youth.

a. Organizing Group c. Mass organizationb. Barrio Liaison Group d. Organizing Committee

V. INTERROGATION

38. It is the principle of interrogation where the interrogator is constantly aware that his job is to obtain information, not to impart information.

a. Initiative c. Accuracyb. Objective d. Security

39. It is an approach used to persuade the interogee to cooperate with the interrogator and to make believe that it is useless to resist.

a. Incentive Approach c. Futility Approachb. Emotional Approach d. None of the above

W. TECHNIQUES OF INTERROGATION

40. It is an approach of kindness and harshness by another that eliminates the will to resist of the interogee and makes him cooperate with the interrogator.

a. Incentive Approach c. Carrot and stick approachb. Emotional Approach d. None of the above

X. MAP TRACKING

41. During the conduct of interrogation, the interrogee should be allowed to use map to point out enemy location since he/she is familiar with the terrain over which he/she was captured.

a. True b. False

42. Maps allow the interrogator to become familiar with the topography of a particular area.

a. True b. False

Y. INTEL ANNEX

43. An Intelligence Annex normally accompanies an Operation Order issued by the Division or higher echelon.

a. True b. False

Z. CPP-NPA-NDF ORGANIZATION

44. The CPP-NPA Regional Operational Command is responsible for the execution of national and inter-regional military policies and plans.

a. True b. False

45. Regional Mobile Force is the fighting unit of the NPA in the region, under the command and supervision of the party organ in the region.

a. True b. False

AA. INTELLIGENCE PROJECT PROPOSAL AND PLAN

46. Intelligence plan has similar format with that of Intelligence Annex.

a. True b. False

BB. CPP-NPA STRATEGY AND TACTICS

47. “Encirclement of the cities from the countryside strategy” means fighting an insurgent war from the hinterlands moving towards the cities.

a. True b. False

48. For the CPP, Concept of Force refers to a social environment, which is sympathetic and supportive to their cause.

a. True b. False

49. The key in the CPP-NPA-NDF “Protracted struggle” is ‘time’. Meaning, the longer the struggle continuous the greater is their chance of winning.

a. True b. False

--GOOD LUCK--

ANSWER KEY

CHAPTER IV - INTELLIGENCE

Cpl Sgt SSgt TSgt1.

b47. b 1. c 47. a 1. b 47. a 1. b 47. a

2. b 48. b 2. a 48. d 2. b 48. c 2. a 48. a3. b 49. c 3. b 49. b 3. d 49. b 3. c 49. a4. a 50. a 4. d 50. d 4. a 50. c 4. a5. d 51. c 5. b 51. a 5. c 51. b 5. a6. a 52. d 6. a 52. a 6. b 52. b 6. c7. b 53. a 7. b 53. c 7. a 53. c 7. d8. c 54. b 8. a 54. c 8. d 54. c 8. a9. a 55. c 9. c 55. a 9. a 55. c 9. c

10. a 56. c 10. b 56. b 10. a 56. a 10. c11. a 57. a 11. a 57. b 11. a 57. c 11. c 12. a 12. b 58. a 12. a 58. b 12. d13. a 13. b 13. a 59. a 13. c14. a 14. a 14. c 60. c 14. a15. d 15. b 15. c 61. c 15. c16. c 16. c 16. c 62. a 16. c17. c 17. d 17. a 63. c 17. b18. b 18. d 18. a 64. b 18. c19. d 19. b 19. a 65. b 19. a20. b 20. c 20. c 66. a 20. b21. c 21. b 21. d 67. a 21. a22. b 22. a 22. a 68. a 22. b23. d 23. a 23. c 69. a 23. a24. a 24. b 24. c 24. c25. c 25. a 25. b 25. c26. d 26. a 26. b 26. a27. a 27. a 27. b 27. d28. a 28. d 28. c 28. b29. a 29. a 29. c 29. c30. c 30. a 30. c 30. b31. b 31. a 31. a 31. a32. a 32. a 32. b 32. a33. a 33. a 33. b 33. b34. b 34. a 34. a 34. b35. a 35. a 35. c 35. b36. b 36. b 36. c 36. a37. b 37. b 37. b 37. a38. c 38. c 38. d 38. d39. b 39. a 39. d 39. c40. c 40. a 40. a 40. c41. a 41. a 41. b 41. b42. a 42. a 42. a 42. a

43. c 43. a 43. d 43. a44. b 44. a 44. c 44. a45. a 45. a 45. c 45. a46. c 46. a 46. d 46. a