Terms Flashcards
Actionable Intelligence
Information that can be acted upon quickly to counter an adversary’s actions, as opposed to information that assists in understanding an adversary’s plans and intentions.
Agent (Communications)
An agent is a person unofficially employed by an intelligence service–often as a
source of information. Communicating with an agent can follow many different procedures to transfer that
information to the intelligence officer(s) with whom that agent has regular, professional contact.
Agent
An individual covertly employed by an intelligence organization to assist in its activities. Often further identified by his or her role in the intelligence operation.
Analysis
The process by which information is transformed into intelligence; a systematic ex-amination of
information to identify significant facts, make judgments, and draw conclusions.
Assessments
Development of forecasts of behavior or recommended courses of action to the leadership of
an organization, based on a wide range of available information sources both overt and covert.
Assessments are developed in response to requirements declared by the leadership to inform decision
making.
Clandestine Collection
Not to be confused with covert collection. The intent of clandestine intelligence collection is to keep the activity hidden from public view. While covert activity is also hidden, it is not necessarily denied if discovered–although the sponsor of the covert action is. No one claims responsibility for it. Clandestine means that the existence of an activity is wholly denied. It is meant to remain
undetected.
Classification
The determination, in the interest of national security, that official information requires a
specific degree of protection against unauthorized disclosure, coupled with a designation signifying that
such a determination has been made; the designation is typically called a “security classification,” which
includes CONFIDENTIAL, SECRET, and TOP SECRET classification levels.
Collection Synergy
How different forms of technical, human, and open intelligence collection interact, and work together, to keep the intelligence/performance cycle moving.
Competitive Analysis
An idea that is based on the belief that by having analysis in several agencies with different backgrounds and perspectives work on the same issue, parochial views more likely will be
countered—if not weeded out—and proximate reality is more likely to be achieved.
Compromise
Not blackmail, in that American intelligence services don’t set people up. However, if we
knew they had made risky or illegal decisions that could put them in danger with the governments in their
countries (unprompted), we might use that information in understanding their motivation or making an approach based on helping get them out of their trouble.
Confidence Levels
are based on the quality of source, describe the amount of confidence an analyst has in his/her judgments. High, moderate, and low.
High Confidence
The information is of high quality, or the nature of the issue makes solid (not
necessarily perfect) judgment possible.
Moderate Confidence
The information is susceptible to
multiple interpretations, or there may be alternative views – credible or plausible, but not totally
corroborated.
Low Confidence
The information is scant, questionable, or fragmented, leading to
difficulties in making “solid analytic inferences,” or the information derived from sources that may be
problematic.
Counterintelligence
1) The protection of sensitive information from all adversaries. In intelligence organizations, this is done defensively through security practices and internal monitoring of activities and offensively by recruiting penetration agents of the adversary to identify and thwart its efforts to obtain this information.
2) Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations or activities.
Countersurveillance
measures undertaken to prevent surveillance, including covert surveillance
EO 12333 Definition of Covert Action
Covert action means an activity or activities of the United States
Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly
Exclusions from EO 12333 Definition of Covert Action
a) Activities the primary purpose of which is to acquire intelligence, traditional
counterintelligence activities, traditional activities to improve or maintain the
operational security of United States Government programs, or administrative
activities;
b) Traditional diplomatic or military activities or routine support to such activities;
c) Traditional law enforcement activities conducted by United States Government law enforcement agencies or routine support to such activities; or
d) Activities to provide routine support to the overt activities (other than activities
described in paragraph (a), (b), or (c)) of other United States Government agencies
abroad.
General Definition of Covert Action
An intelligence activity that seeks to influence the decision making of an adversary through the use of propaganda, political action, or paramilitary activities. Covert action is not acknowledged by the country or service that carries it out. In the American context, covert action is authorized by the White House. Covert action generally falls under four categories (although this is flexible):
a. Propaganda
b. Political action
c. Information warfare (IW) – defined in other Key Terms documents
d. Paramilitary – defined in other Key Terms documents
Cryptography
The development and creation of algorithms (in the modern, computerized context) or codes used to protect information. The end product of cryptography is encryption. (Not to be confused with Cryptanalysis, which is the science of analyzing and breaking encryption schemes.)
Dead Drop
Location where an item is placed in order to separate the physical contact between the agent
and the intelligence officer. For example, the agent places a report in a tin can and leaves it in underbrush
at an agreed-upon site, and a few hours later the intelligence officer retrieves the can.
Dead Drop
Location where an item is placed in order to separate the physical contact between the agent
and the intelligence officer. For example, the agent places a report in a tin can and leaves it in underbrush
at an agreed-upon site, and a few hours later the intelligence officer retrieves the can.
Deception Operation
Allowing an adversary to obtain information, which manipulates its actions to one’s benefit.
Deception
The act of making someone believe something that is not true. Deception is a key tool in espionage and its operations. Sun Tzu, the famed Chinese military strategist, was among the earliest writers
to emphasize its importance to success (for troops and spies) in engagements with enemies.
“Hence, when able to attack, we must seem unable;
When using our forces, we must seem inactive;
When we are near, we must make the enemy believe we are far away;
When far away, we must make him believe we are near.”
Decision Advantage
Provision of intelligence to policy-makers that will give them an advantage over their adversaries.
Denied Area
Areas in which the host government or controlling actor aims to deny intelligence efforts to opposing governments or actors
Encryption
Coding of information or data to make it difficult, or impossible, to read and understand for
those who do not know the coding. EX: Instead of writing the word “enemy”, the word “blue”, or the
number “23” might be substituted.
Estimates
Analytical products that serve two major purposes: Forecasting an issue or a trend over a determined time period; and presentation of the considered judgments of the Intelligence Community on those events or issues.
Executive Orders
Policies specifically prescribed by the White House. Related to intelligence, the issuance of Executive Order 12,333 is the explicit authorizing order for intelligence activities carried out by the United States. Executive orders are deemed to have the force of law unless a court rules their contents (in whole or in part) to be unconstitutional.
Executive Order 12333
Executive Order 12,333 (commonly referred to as ‘twelve triple-three’) was signed by President Reagan on December 4, 1981. It is seen as the basis of explicit authority for all Intelligence Community activities. Although some of its provisions have been changed or updated, 12333 is still regarded as the foundational document detailing the responsibilities of each intelligence organization and what each member of the Intelligence Community is authorized to do.
Foreign Intelligence
Information relating to the capabilities, intentions, or activities or foreign
governments or elements thereof, foreign organizations, or foreign persons. (Warner 15; Quoting the
National Security Act of 1947)
Fusion Center
A collaborative effort of two or more agencies that provide resources, expertise, and
information to a center with the goal of maximizing the ability to detect, prevent, investigate, and respond
to criminal and terrorist activity. State and major urban area fusion centers are recognized as a valuable information-sharing resource. They are the focus, but not exclusive points, within the state and local environments for the receipt and sharing of terrorism information, homeland security information, and law
enforcement information related to terrorism.
Global Coverage
This means that intelligence agencies and officers acknowledge their requirements to cover any and all issues or areas.
Groupthink
The practice of thinking or making decisions as a group in a way that discourages creativity or
individual responsibility and which a common set of assumptions go unstated or even unrecognized.
Indications
In intelligence usage, information in various degrees of evaluation which bear on the intention of a potential enemy to adopt or reject a course of action.
Influence Operation
An operation designed to effectively influence the attitudes and behavior of
particular foreign audiences while minimizing or avoiding combat. This can include elements of public
relations, persuasion (psychological operations, or PSYOPs), or diplomacy.
Information Warfare (IW)
A concept involving the use and management of information and communication technology in pursuit of a competitive advantage over an opponent. While there is no universal definition for IW, the generally accepted one looks like this: “The process of protecting one’s own sources of information and, at the same time, seeking to deny, degrade, corrupt, or destroy the enemy’s sources of information.”
Intelligence
The process by which specific types of information important to national security are requested, collected, analyzed, and provided to policy makers; the products of that process;
the safeguarding of these processes and this information by counterintelligence activities; and the carrying
out of operations as requested by lawful authorities. (Lowenthal 10)
Intelligence Reform and Terrorism Prevention Act (IRTPA)
A 2004 law that reformed parts of the intelligence community. The law created the Office of the Director of National Intelligence (ODNI), the National Counterterrorism Center (NCTC), and the Privacy and Civil Liberties Oversight Board.
Intelligence Requirements
- Any subject, general or specific, upon which there is a need for the collection of information, or the production of intelligence.
- A requirement for intelligence to fill a gap in the command’s knowledge or understanding of the operational environment or threat forces. Also called IR. (JP
International Human Rights Law (IHRL)
The body of international law designed to promote human rights at social, regional, and domestic levels. States that ratify human rights
treaties commit themselves to respecting those rights and ensuring that their domestic law is compatible with international legislation.
International Humanitarian Law (IHL) / Law of Armed Conflict (LOAC)
International humanitarian law is a set of rules which seek, for humanitarian reasons, to limit the effects of armed conflict. It protects persons
who are not or are no longer participating in the hostilities and restricts the means and methods of
warfare.
Strategic
In the context of military operations, strategy develops an idea or set of ideas for employing the instruments of national power in a synchronized and integrated fashion to achieve theater, national, and/or multinational objectives.
Operational
Links the tactical employment of forces to national and military strategic objectives
Tactical
Employment and ordered arrangement of forces in relation to each other. Joint doctrine focuses this term on planning and executing battles, engagements, and activities at the tactical level to achieve military objects assigned to tactical units or task forces
MICE
Money, Ideology, Compromise, Ego. It is a useful way to divide why people spy, but it is not the way to approach a recruitment. CIA doesn’t use this as an operating concept.
Mirror Imaging
assumption that other leaders, states, and groups share motivations or goals similar to those most familiar to the analyst. The statement “It would be irrational to do that, so they won’t,” might be
based on assumptions about how WE would act not our adversary.
Noise versus Signals
Signals, in this context, are clear indications of wanted information that often warn us of threats. Although signals are helpful, picking them from a crowded stream of irrelevant and contradictory information constitutes the noise in which signals are often embedded.