Terms Flashcards
(122 cards)
Actionable Intelligence
Information that can be acted upon quickly to counter an adversary’s actions, as opposed to information that assists in understanding an adversary’s plans and intentions.
Agent (Communications)
An agent is a person unofficially employed by an intelligence service–often as a
source of information. Communicating with an agent can follow many different procedures to transfer that
information to the intelligence officer(s) with whom that agent has regular, professional contact.
Agent
An individual covertly employed by an intelligence organization to assist in its activities. Often further identified by his or her role in the intelligence operation.
Analysis
The process by which information is transformed into intelligence; a systematic ex-amination of
information to identify significant facts, make judgments, and draw conclusions.
Assessments
Development of forecasts of behavior or recommended courses of action to the leadership of
an organization, based on a wide range of available information sources both overt and covert.
Assessments are developed in response to requirements declared by the leadership to inform decision
making.
Clandestine Collection
Not to be confused with covert collection. The intent of clandestine intelligence collection is to keep the activity hidden from public view. While covert activity is also hidden, it is not necessarily denied if discovered–although the sponsor of the covert action is. No one claims responsibility for it. Clandestine means that the existence of an activity is wholly denied. It is meant to remain
undetected.
Classification
The determination, in the interest of national security, that official information requires a
specific degree of protection against unauthorized disclosure, coupled with a designation signifying that
such a determination has been made; the designation is typically called a “security classification,” which
includes CONFIDENTIAL, SECRET, and TOP SECRET classification levels.
Collection Synergy
How different forms of technical, human, and open intelligence collection interact, and work together, to keep the intelligence/performance cycle moving.
Competitive Analysis
An idea that is based on the belief that by having analysis in several agencies with different backgrounds and perspectives work on the same issue, parochial views more likely will be
countered—if not weeded out—and proximate reality is more likely to be achieved.
Compromise
Not blackmail, in that American intelligence services don’t set people up. However, if we
knew they had made risky or illegal decisions that could put them in danger with the governments in their
countries (unprompted), we might use that information in understanding their motivation or making an approach based on helping get them out of their trouble.
Confidence Levels
are based on the quality of source, describe the amount of confidence an analyst has in his/her judgments. High, moderate, and low.
High Confidence
The information is of high quality, or the nature of the issue makes solid (not
necessarily perfect) judgment possible.
Moderate Confidence
The information is susceptible to
multiple interpretations, or there may be alternative views – credible or plausible, but not totally
corroborated.
Low Confidence
The information is scant, questionable, or fragmented, leading to
difficulties in making “solid analytic inferences,” or the information derived from sources that may be
problematic.
Counterintelligence
1) The protection of sensitive information from all adversaries. In intelligence organizations, this is done defensively through security practices and internal monitoring of activities and offensively by recruiting penetration agents of the adversary to identify and thwart its efforts to obtain this information.
2) Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities.
Countersurveillance
measures undertaken to prevent surveillance, including covert surveillance
EO 12333 Definition of Covert Action
Covert action means an activity or activities of the United States
Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly
Exclusions from EO 12333 Definition of Covert Action
a) Activities the primary purpose of which is to acquire intelligence, traditional
counterintelligence activities, traditional activities to improve or maintain the
operational security of United States Government programs, or administrative
activities;
b) Traditional diplomatic or military activities or routine support to such activities;
c) Traditional law enforcement activities conducted by United States Government law enforcement agencies or routine support to such activities; or
d) Activities to provide routine support to the overt activities (other than activities
described in paragraph (a), (b), or (c)) of other United States Government agencies
abroad.
General Definition of Covert Action
An intelligence activity that seeks to influence the decision making of an adversary through the use of propaganda, political action, or paramilitary activities. Covert action is not acknowledged by the country or service that carries it out. In the American context, covert action is authorized by the White House. Covert action generally falls under four categories (although this is flexible):
a. Propaganda
b. Political action
c. Information warfare (IW) – defined in other Key Terms documents
d. Paramilitary – defined in other Key Terms documents
Cryptography
The development and creation of algorithms (in the modern, computerized context) or codes used to protect information. The end product of cryptography is encryption. (Not to be confused with Cryptanalysis, which is the science of analyzing and breaking encryption schemes.)
Dead Drop
Location where an item is placed in order to separate the physical contact between the agent
and the intelligence officer. For example, the agent places a report in a tin can and leaves it in underbrush
at an agreed-upon site, and a few hours later the intelligence officer retrieves the can.
Dead Drop
Location where an item is placed in order to separate the physical contact between the agent
and the intelligence officer. For example, the agent places a report in a tin can and leaves it in underbrush
at an agreed-upon site, and a few hours later the intelligence officer retrieves the can.
Deception Operation
Allowing an adversary to obtain information, which manipulates its actions to one’s benefit.
Deception
The act of making someone believe something that is not true. Deception is a key tool in espionage and its operations. Sun Tzu, the famed Chinese military strategist, was among the earliest writers
to emphasize its importance to success (for troops and spies) in engagements with enemies.
“Hence, when able to attack, we must seem unable;
When using our forces, we must seem inactive;
When we are near, we must make the enemy believe we are far away;
When far away, we must make him believe we are near.”