SlideShare a Scribd company logo
1 of 10
NATIONAL INTELLIGENCE AGENCY OF ISRAEL MOSSAD
Formed on December 13, 1949. As the central institute of coordination. MOSSAD is responsible for: AGENCY OVERVIEW…… ,[object Object]
   Covert operations.
   Paramilitary activities.,[object Object]
Headquarter  in Tel Aviv. Mossad is assumed to consist of 8 different departments. Collection is the largest department. Their field intelligence officers, called KATSAS. ,[object Object],Diplomatic or, Unofficial.
The Political Action and Liaison. They  work with both: Allied foreign intelligence services. Nations that have no normal                           diplomatic relations with Israel.
“Metsada” Special Operations Division. It is involved in: ,[object Object]
Paramilitary operations.
Sabotage.
Psychological warfare.,[object Object]

More Related Content

What's hot

Role of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIARole of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIA
myeasyway
 
Covert action
Covert actionCovert action
Covert action
kelsports
 

What's hot (20)

Role of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIARole of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIA
 
Inter Services Intelligence
Inter Services IntelligenceInter Services Intelligence
Inter Services Intelligence
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
cia
cia cia
cia
 
Trends of crime in pakistan and investigation by forensic and analytical appr...
Trends of crime in pakistan and investigation by forensic and analytical appr...Trends of crime in pakistan and investigation by forensic and analytical appr...
Trends of crime in pakistan and investigation by forensic and analytical appr...
 
Analysis of a Business System - Russian Mafia
Analysis of a Business System - Russian MafiaAnalysis of a Business System - Russian Mafia
Analysis of a Business System - Russian Mafia
 
Forensic science presentation
Forensic science presentationForensic science presentation
Forensic science presentation
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
 
Raw- Research & Analysis Wing
Raw- Research & Analysis WingRaw- Research & Analysis Wing
Raw- Research & Analysis Wing
 
Covert action
Covert actionCovert action
Covert action
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Forensic science as a basis for forensic investigation
Forensic science as a basis for forensic investigationForensic science as a basis for forensic investigation
Forensic science as a basis for forensic investigation
 
Osint primer
Osint primerOsint primer
Osint primer
 
Street crimes
Street crimesStreet crimes
Street crimes
 
Soil ppt
Soil pptSoil ppt
Soil ppt
 
THE PSYCHOLOY OF LYING
THE PSYCHOLOY OF LYINGTHE PSYCHOLOY OF LYING
THE PSYCHOLOY OF LYING
 
Topic 6 - Al-Mawardi
Topic 6 - Al-MawardiTopic 6 - Al-Mawardi
Topic 6 - Al-Mawardi
 

Viewers also liked

Stop motion PowerPoint
Stop motion PowerPointStop motion PowerPoint
Stop motion PowerPoint
JazzieMary
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
JOSE LUIS
 
Mossad
MossadMossad
Mossad
leargo
 

Viewers also liked (20)

La historia secreta del mossad
La historia secreta del mossadLa historia secreta del mossad
La historia secreta del mossad
 
La historia secreta del mossad
La historia secreta del mossadLa historia secreta del mossad
La historia secreta del mossad
 
Nonprofit Fundraising Goes Mobile
Nonprofit Fundraising Goes MobileNonprofit Fundraising Goes Mobile
Nonprofit Fundraising Goes Mobile
 
Stop motion PowerPoint
Stop motion PowerPointStop motion PowerPoint
Stop motion PowerPoint
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creatively
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackers
 
Hacking
HackingHacking
Hacking
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Social media privacy
Social media privacySocial media privacy
Social media privacy
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Mossad
MossadMossad
Mossad
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 

More from ashishmakhija86 (6)

Automobiles
AutomobilesAutomobiles
Automobiles
 
Tata Motors
Tata MotorsTata Motors
Tata Motors
 
Amartya Sen
Amartya SenAmartya Sen
Amartya Sen
 
Amartya Sen
Amartya SenAmartya Sen
Amartya Sen
 
Amartya Sen
Amartya SenAmartya Sen
Amartya Sen
 
Amartya Sen
Amartya SenAmartya Sen
Amartya Sen
 

Mossad