INTELLIGENCE DEFINITIONS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP80M00596A000500020018-1
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
51
Document Creation Date:
December 15, 2016
Document Release Date:
March 10, 2004
Sequence Number:
18
Case Number:
Publication Date:
April 10, 1978
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP80M00596A000500020018-1.pdf | 2.77 MB |
Body:
Approved-ForRelease-2004103/23,:CIA-RDP80M00596A000500020018-1
MEMORInNDUM Members, Foroign I-n-te1ligence F3oard
-SUBJECT: Intelligence Definitions .
REFERENCE: -NF13 24.1/14, Subject: Definition.s of Intellience,
dated 13 September 1927
1. Tao intel1igence Definitions '.-:urking Group, which was established
by the reference, has completed the initial task of deviing definitions
appropriate for inc1usion. in an unclassified intelligence glossary. You
are asked to comment an
The substance of the defiaitions;
Any terms which should he' ird1uded (with proposed
definitions) or any terms which you deem inappropiate
and believe should be omitted;
The draft Preface, NethOdology, and Maintenance
.cheaters i'j,;hich will be part of the puolication
containing the Oossary); and.
The dra'nt list of acronyms and abbreviations.
2. laile this coordination is underway, the Uoricind wil1
continue to .develop supporting ahnexes designed to enhance the glossary
when it is published to include an index of 'other glossacies, grapnic
relationships of words and terms, and Juplicate definitions and sources
of intellige:!ce 'terms). In connectio'n with the latter, 'please bear iv
mind that the definitions in this .glossary may not and need not coincide
precisely with definitions used elsewhere for departantal or special
legal purposes. I welcome any suggestions you which will move the
glossary closer to HPlication.
STANSIELD TURER
Chai'rman
Attachments:
.1. draft Pr.-face:
2. draft Glossary an Intelligence
Terms and Definitions
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
GLOSSARY OF INTELLIGENCE TERMS AND DEFINITIONS
- -2-
Acoustical intelligence (ACOUSTINT): Technical intelligence
information derived from analysis of acoustic waves radiated
either intentionally or unintentionally by the target into
the surrounding medium. (In Naval Usage, the acronym ACINT
is used and usually refers to intelligence derived specifically
from analysis of underwater acoustic waves from ships and
submarines.)
Actionable intelli.gynce: Intelligence information that is
directly useful to customers without having to go through
the full intelligence production process; it may address
strategic or tactical needs, close-support of U.S. nego-
tiating teams, or action elements dealing with such matters
as international terrorism or narcotics.
Administratively controlled information: Privileged but
unclassified material bearing designations such as FOR
OFFICIAL USE ONLY, or LIMITED OFFICIAL USE, to prevent dis-
closure to unauthorized. persons.
Advisory tasking A non-directive statement of intelligence
interest or a request for intelligence information which is
addressed by an, authorized element of the Intelligence
Community to departments or agencies having information
collection capabilities or intelligence assets not a part of
the National Foreign Intelligence Program.
Agent: A person who engages in clandestine intelligence
activity under the direction of an intelligence organization
but who is not an officer, employee, or co-opted worker of
that organization.
Agent of influence: A person who is manipulated by an
intelligence organization to use his position, to, influence
public opinion or decisionmaking in a manner which will
advance the Objective of the country for which that organiza-
tion operates.
Alert memorandum: A document issued by the Director of ,
Central Intelligence to National Security Council-level
policyMakers to warn them of possible developments abroad,
often of a crisis nature, of major concern to the U.S.; it
is coordinated within the Intelligence Community to the
extent time permits.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23: CIA-RDP80M00596A000500020018-1
Analysis: A process in the production step of the intelligence
cycle in which intelligence information is subjected to
review in order to identify significant facts and derive
conclusions therefrom. (See intelligence cycle.)
Assessment: Appraisal of the worth of an intelligence
activity, information, or product in terms of its contribu-
tion to a specific goal, or the credibility, reliability,
pertinency, accuracy, or usefulness of information in terms
of an intelligence need. When used in contrast with evalua-
tion assessment implies a weighing against resource allocation,
expenditure, or risk. (See evaluation.)
Asset: See intelligence asset and national intelligence
asset.
Authentication: (1) A communications security measure de-
signed to provide protection against fraudulent transmission
and hostile imitative communications deception by establish-
ing the validity of a transmission, message, station, or
designator. (2) A means of identifying or verifying the
eligibility of a station, originator, or individual to re-
ceive specific categories of information. .(Also see communi-
cations deception?)
Automatic data processing system security: All of the
technological safeguards and managerial procedures established
and applied to computer hardware, software, and data in
order to ensure the protection of organizational assets and
individual privacy; it includes: all hardware/software
functions, characteristics, and features; operational procedures,
accountability procedures, and access controls at the central
computer facility; remote computer and terminal facilities,
management constraints, physical structures and devices;
and the personnel and communication controls needed to
provide an acceptable level of protection for classified
material to be contained in the computer system.
Basic intelligence: Comprises general reference material of
a factual nature which results from a collection of encyclo-
pedic information relating to the political, economic and
military structure, resources, capabilities and vulnerabilities
of foreign nations.
Biographical intelligence: Foreign intelligence on the
views, traits, habits, skills, importance, relationships and
curriculum vitae of those foreign personalities of actual or
potential interest to the United States Government.
2
Approved For Release 2004/03/23: CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Cartographic intelligence: Into primarily mani-
fested in maps and charts of areas outside the United States
and its territorial waters.
Case officer: A professional employee of an intelligence
organization who is responsible for providing direction for
an agent operation. (See agent.)
Central Intelligence Agency Program (CTAP): See National
Foreign Intelligence Program.
Cipher: A cryptographic system in which the cryptographic
treatment (i.e., the method of transforming plain-text by
predetermined rules to obscure or conceal its meaning) is
applied to plain-text elements such as letters, digits,
polygraphs or bits which either have no intrinsic meaning or
are treated without regard to their meaning in cases where
the element is a natural-language word.
Clandestine: Secret or hidden; conducted with secrecy by
design.
Clandestine activity: Secret or hidden activity conducted
with secrecy by design. (The phrase "clandestine operation"
is preferred. Operations are. pre-planned activities.)
Clandestine collection: The acquisition of intelligence in-
formation in ways designed to assure the secrecy of the
operation.
Clandestine communication: See illicit communication.
Clandestine operation: A pre-planned secret intelligence
information collection activity or covert political, economic,
propaganda or paramilitary activity conducted so as to
assure the secrecy of the operation; encompasses both clan-
destine collection and covert action.
Clandestine services: That portion of the Central Intelli-
gence Agency (CIA) that engages in clandestine operations;
sometimes used as synonymous with the CIA Operations Direc-
torate.
Classification: The determination that official information
requires, in the interest of national security, a specific
degree of protection against unauthorized disclosure, coupled
with a designation signifying that such a determination has
been made; the designation is normally termed a "security -
classification". Also see declassification.
Approved For Release 2004/03/233: CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Classification authority: Those officials within the Executive
Branch who have been authorized pursuant to an Executive
Order to originally classify information or material.
Classified information: Official information which has been
determined to require, in the interests of national security,
protection against unauthorized disclosure and which has
been so designated.
Code: A cryptographic system in which the cryptographic
equivalents (usually called "code groups"), typically con-
sisting of letters or digits (or both) in otherwise meaning-
less combinations, are substituted for plain text elements
such as words, phrases, or sentences.
Code word: Generally, a word or term which conveys a pre
arranged meaning other than the conventional one; specifi-
cally, a word or term chosen to conceal the identity of a'
function or action, as distinguished from a "cover" name
which conceals the identity of a person, organization, or
installation. (See cover.)
CODEWORD: A word or term used with a security classifica-
tion to indicate that the material so classified was derived
from a sensitive source and is therefore accorded limited
distribution.
Collateral: All national security information classified
under the provisions of an Executive Order for which special
Intelligence Community systems of compartmentation (i.e.
sensitive compartmented information) are not formally
established.
Collection See intelligence cycle.
Collection guidance: See guidance.
Collection requirement: An expression of intelligence
information needs which requires collection and carries at
least an implicit authorization to commit resources in
acquiring the needed information. (Also see intelligence
requirement.)
Combat information: Unevaluated sensor data, gathered by or
provided directly to the tactical commander which, due to
its highly perishable nature or the criticality of the
situation, cannot be processed into tactical intelligence in
time to satisfy the user's tactical intelligence requirements.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
4
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Combat intelligence: That knowledge of the enemy, weather,
and geographical features required by a commander in the
planning and conduct of combat operations. (See tactical
intelligence.)
Committee on Exchanges (COMEX): See Director of Central
Intelligence Committee.
Committee on Imagery Requirements and Exploitation (COMIREX):
See Director of Central Intelligence Committee.
Communications cover: See manipulative communications
cover.
Communications deception: The deliberate transmission,
retransmission, alteration, absorption, or reflection of
telecommunications in ?a manner intended to cause a mislead-
ing interpretation .of these telecommunications. It includes:
a. Imitative communications deception--Intrusion
into the enemy's communications channels for the
purpose of deceiving him by introducing signals or,
traffic in imitation of his own communications.
b. Manipulative communications deception--Regulated
insertion of misleading material into one's own tele-
communications channels for the purpose of presenting a
false picture to the enemy.
Communications intelligence (COMINT): Technical and intel-
ligence information derived from intercept of foreign
communications by other than the intended recipients; it
does not include the monitoring of foreign public media or
the intercept of communications obtained during the course
of counterintelligence investigations within the United
States.
Communications security (COMSEC): The protection resulting
from the application of any measures taken to deny unautho-
rized persons information of value which might be derived
from telecommunications, or to ensure the authenticity of
such telecommunications.
5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Communications securityLsignals acquisition and analysis:
The acquisition of radio frequency propagation and its
subsequent analysis to determine empirically the vulnera-
bility of the transmission media to interception by hostile
intelligence services; it includes cataloging the transmis-
sion spectrum and taking signal parametric measurements as
required but does not include acquisition of information
carried on the system; it is one of the techniques of com-
munications security surveillance. (See communications
security surveillance.)
Communications security surveillance: The systematic
examination of telecommunications to determine the adequacy
of communications security measures: to identify communica-
tions security deficiencies, to provide data from which to
predict the effectiveness of proposed communications security
? measures, and to confirm the adequacy of such measures after
implementation.
Community On-Line Intelligence Network System (COINS): A
network of Intelligence Community computer-based information
.storage and retrieval systems that have been interconnected
for interagency sharing of machine formatted files.
Compartmentation: Formal systems of restricted access
established and/or managed by the Director of Central In-
telligence to protect the sensitive aspects of sources,
methods, and analytical procedures of foreign intelligence
programs. (Also see decompartmentation.)
Compromise: The exposure of classified official information
or activities to persons not authorized access thereto;
hence, unauthorized disclosure. (Also see classified informa-
tion.)
Compromising emanations: Unintentional data-related or
intelligence-bearing signals which could disclose classified,
information being transmitted, received, or handled by any
information-processing equipment.
Computer security: The computer-driven aspects of automatic
data processing system security encompassing the mechanisms
and techniques that control access to or use of the computer
or information Stored in it. (See automatic data processing
system security.)
Consolidated Cryptologic Program (CCP): See National Foreign
Intelligence Program.
Approved For Release 2004/03/23 : Clcek-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Consolidated Intelligence Resources Information System (CIRIS):
The automated management information system used. to identify
and display the expected distribution of all intelligence
resources within the National Foreign Intelligence Program.
Consumer: See customer.
Co-opted worker: A national of a country but not an officer
or employee of the country's intelligence service who assists
that service on a temporary or regular basis. (In most
circumstances a co-opted worker is an offitial of the country
but might also be, for example, a tourist or student.)
Coordination: (1) (In general) The process of seeking
concurrence from one or more groups, organizations, or
agencies regarding a proposal or an activity for which they
share SQMO responsibility, and which may result in contribu-
tions, concurrences or dissents. (2) (In intelligence ?
production) The process by which producers gain the view's of
other producers on the adequacy of a specific draft assess-
?ment, estimate, or report; it is intended to increase a
product's factual accuracy, clarify its judgments, resolve
disagreement on issues that permit, and sharpen statements
of disagreement on major unresolved issues.
Counterintelligence: See foreign counterintelligence.
Cover: Protective guise used by a person, organization, or
installation to prevent identification with clandestine ac-
tivities.
Covert: See clandestine.
Covert action: A clandestine operation designed to influence
foreign governments, events, organizations, -or persons in
support of United States foreign policy; it may include
political, economic, propaganda, or paramilitary activities.
(Also known as "special activities" as defined in Executive
Order No. 12036; see Appendix .)
Covert operation: See clandestine operation (preferred
term). A covert operation encompasses covert action and
clandestine collection.
Critical Collection Problems Committee (CCPC): See Director
of Central Intelligence Committee.
7
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Critical intelligence: Intelligence information or intelligence
of such urgent importance to the security of the United
States that it is transmitted at the highest priority to the
President and other national decisionmAing officials before
passing through regular evaluative channels.
Critical Intellience Communications System (CRITICOMM):
Those communications facilities under the operational and
technical control of the ,Director, National Security Agency
which have been allocated for the timely handling of critical
intelligence. (See critical intelligence.)
Critical intelligence message (CRITIC): A message designated
as containing critical intelligence. ? (See critical intelli-
gence.)
Cryptanalvsis: The steps ar processas involved, in converting
encrypted messages into plain 'text without initial knowledge
of the system or .key employed in the encryption_
CRY-PTO: A designation which is applied to classified,
cryptographic information which involves special rules for
access and handling. (See cryptographic information.)
Cryptographic information: All information significantly
'descriptive of cryptographic techniques and processes or of
cryptographic ,systems and equipment, or their functions and .
capabilities, and all cryptomaterial- ("significantly descriptive"
means that the information could, if made known to unauthorized
persons, permit recovery of specifit cryptographic features
of classified crypto-equipmcnt, reveal weaknesses of associated
equipment which could allow recovery of plain text or of
,key, aid- materially in the cryptanalysis of a general or
specific cryptosystem, lead tb the cryptanalysis of an
individual of a message, command, or authentication); it is
normally identified by the bold letter marking "CRYPTO" and
is subject to the special safeguards required by that
marking. (See CRYPTO.)
Cryptographic security': The component of communications
security that results from the provision of technically
sound cryptographic systems and which provides for their
proper use.
Cryptographic system: All associated items of?cryptomaterial
(e.g., equipment and. their removable components which per-
form cryptographic functions, operating instructions, and
maintenance manuals) that are used as a unit to provide a
single means of encryption' and decryption of plain text so
that its meaning may be concealed; also any mechanical or
Approved For Release 2004/03/238: CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
electrical device or method used for the purpose of disguising
authenticating, or concealing the contents, significance, or
meanings of communications; short name: cryptosystem.
Cryptography: The branch of cryptology used to provide a
means of encryption and deception of plain text so that its
meaning may be concealed.
Cryptologic activities: The activities and operations
involved in the production of signals intelligence and the
maintenance of communications security.
Cryptology: The branch of knowledge which treats the
principles of cryptography and cryptanalysis and is used to
produce signals intelligence and maintain communications
security. (See cryptography and cryptanalysis.)
Cryptomaterial: All material (including documents, devices,
or equipment) that contains cryptographic information and is
essential to the encryption, decryption, or authentication
of telecommunications
Cryptosecurity: Shortened form of cryptographic security.
See above.
Cryptosystem: Shortened form of cryptographic system. See
above.
Current intelligence: Intelligence of all types and forms
of immediate interest to the users of intelligence; it may
be disseminated without the delays incident to complete
evaluation, interpretation, analysis, or integration.
Customer: A person who uses intelligence or intelligence
information either to produce other intelligence or directly
in the decisionmaking process; it is synonymous with consumer
and user.
Damage assessment; (1) (Intelligence Community context.) An
evaluation of the impact of a compromise in terms of loss of
intelligence information, sources or methods, and which may
describe and/or recommend measures to minimize damage and
prevent future compromises. (2) (Military context.) An
appraisal of the effects of an attack on a nation's military
forces to determine residual military capability and to
support planning for recovery and reconstitution.
9
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
DC ID 1/2 At An annual publication by the Director
of Central Intelligence (DC1) which establishes a priorities
classification system; presents requirements categories and ?
foreign countries in -a geotopical matrix, against which
priorities are assignedwhich provide the Intelligence
Community with basic substantive priorities guidance for the
conduct 0f all U.S. foreign intelligence activities; it
includes a.system for adjusting priorities between annual
publications; priorities are approved by the DCI with the
Advice of the National Foreign Intelligence Board. (See
priority..)
Deception: Those measures designed to mislead a foreign
power, organization or person by manipulation, distortion,
or falsification of evidence to induce him to react in a
manner prejudicial to his interests.
Declassification: Removal of official information from the
protective status afforded by security classification; re-
quires a determination that disclosure no longer bears on
national security. (Also see classification.)
Decode: To convert an encoded message into plain text.
Decomnartmentation: The removal of information from a
compartmentation system without altering the information to
conceal sources, Methods, or analytical procedures. (Also
see coluartmentation.)
Decrypt' To transform an encrypted communication into its
equivalent plain text.
Decipher: To.cohvert an enciphered communication into its
equivalent plain text.
Defector: A national of a designated country who has escaped
from as control or who, being outside its jurisdiction and
control, is unwilling to return and who is of special value
to another government because he is able to add valuable new
or confirmatory 'intelligence information to existing knowledge
about his country.
Defense Intelligence Community:. Refers to the Defense
Intelligence, Agency (DIA), the National Security Agency
(NSA) and the Military Services intelligence offices
including Department of Defense (DoD) collectors of spe-
cialized intelligence through reconnaissance programs.
10
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Departmental intelligence: Foreign intelligence produced
and used within a governmental department or agency in order
to meet the unique requirements of the department or agency
mission.
Direction finding (DF): A procedure for obtaining bearings
on radio frequency emitters with the use of a directional
antenna and a display unit on an intercept receiver of
ancillary equipment.
Director of Central Intelligence (DCI): The President's
principal foreign intelligence adviser appointed by him with
the consent of the Senate to be the head of the Intelligence
Community and Director of the Central Intelligence Agency
and to discharge those authorities and responsibilities as
they are prescribed by law and by Presidential and National
Security Council directives.
Director of Central Intelligence Committee: Any one of
several committees established by the Director of Central
Intelligence (DCI) to advise him and to perform whatever
functions he shall determine; DCL Committees usually deal
with Intelligence Community concerns, and their terms of
reference ordinarily are specified in DCI Directives;
members may be drawn from all components of the Intelligence
Community. (See Director of Central Intelligence Directive.)
Director of Central Intelligence Directive (DCID): A
directive issued by the Director of Central Intelligence
which outlines general policies and procedures to be followed
by intelligence agencies and organizations which are under
his direction or overview.
Disaffected person: A person who either through inducement
or voluntary action has indicated the willingness or desire
to defect.
Disclosure: The authorized release of classified information
through approved channels.
Dissemination: See intelligence cycle.
Domestic collection: The acquisition of foreign intelligence
information within the United States from governmental or
nongovernmental organizations or individuals who are witting
sources and choose to cooperate by sharing such information.
11
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Double agent: An agentwho Ts coeperating with an intelligence
service of one government on behalf of and under the control
of an intelligence or security service of another government,
and is manipulated by one to the detriment of the other.
Downgrade: To change a security classification from a
higher to a lower level.
Economic intelligence: Foreign intelligence concerning the
production, distribution and consumption of goods and services
labor, finance, taxation, and other aspects of the interna-
tional economic system.
Economic. intelligence Committee (EIC): See Director of
Central intelligence Committee.
El6ctro-Optical intelligence (ELECTRO-OPTINT): Intelligence
information derived from the optical monitoring of the
electromagnetic spectrum from ultraviolet (0.01 micrometers)
through far ? (long wave length) infrared (1,000 micrometers).
Also see optical intelligence.
Electronic countermeasures (ECM): That division of electronic
warfare involving actions taken to prevent or reduce an
enemy's effective use of the?clectromagnetic spectrum.
Electronic countermeasures include?electronic jamming, which
is the deliberate radiation, rcradiation, or reflection of.
electromagnetic energy with the object of impairing the uses
of electronic equipment used by an enemy; and electronic
deception, which is similar but is intended to mislead an
enemy in the interpretation of information received by his
electronic system.
Electronic counter-countermeasures (ECCM): The division of
electronic warfare involving actions taken to ensure the
effective use of the electromagnetic spectrum despite an.
enemy's use of electronic countermeasures. (See electronic
warfare.)
Electronic emission security: Those- measures taken to
protect ail transmissions froM interception and electronic
analysis.
Electronic intelligence (FLINT): Technical and intelligence
information derived from foreign noncemmunications electro-
magnetic radiations emanating from other than atomic detona-
tion or radioactive sources.
12
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Electronic order of battle (BOB): A listing of non-communicat
electronic devices including site designation, nomenclature,
location, site function and any other pertinent information
obtained from any source and which has military significance
when related to the devices.
Electronic security (ELSEC): The protection resulting from
all measures designed to deny unauthorized persons information
of value which might be derived from their intercept and
analysis of non-communications electromagnetic radiations;
e.g., radar.
Electronic surveillance: The acquisition of a non-public_
communication by electronic means without the consent of a
person who is a party to the communication, but not including
radio direction finding used solely to determine the location
of a transmitter.
Electronic warfare (EW): Military action involving the use
of electromagnetic energy to determine, exploit, reduce, or
prevent hostile use of the electromagnetic spectrum, and
action which retains friendly use of the electromagnetic
spectrum. -(The three divisions of electronic warfare are:
electronic warfare support measures, electronic counter-
measures, and electronic counter-countermeasures.)
Electronic warfare support measures (ESM): That division of
electronic warfare involving actions to search for, inter-
cept, locate, record, and-analyze radiated electromagnetic
energy for the purpose of exploiting such radiations in
support of military operations; thus, electronic warfare
support measures provide a source of electronic warfare
information which may be used for immediate action involving
conduct of electronic countermeasures, electronic counter-
countermeasures, threat detection and avoidance, target
acquisition, and homing.
Emanations: See noncommunications emanations.
Emanations security (EMSEC): The protection resulting from
all measures designed to deny unauthorized persons information
of value which might be derived from intercept and analysis
of compromising emanations from other than cryptographic
.equipment and telecommunications systems. (Also see emis-
sion security.)
Emi re: A person who departs from his country for any law-
ful reason with the intention of permanently resettling
elsewhere. (Also see refugee.)
7
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Emission. security: The component of communi_cations security
resulting from all measures take to deny to unauthorized
persons information of value which might be derived from
intercept and analysis of compromising emanations from
cryptographic -equipment and telecommunications systems.
Also see emanations security.)
Encode: To convert plain text into a different form by
means of a code.
Encry21: To convert plain text into a different form in
order to conceal its meaning.
Encipher: To encrypt plain text by means of cipher. ,(See
cipher._)
End product: See finished intelligence. (Also see product.)
Energy_intelligence: Intelligence relating to the technical,
economic and political capabilities and programs of foreign
countries to engage in development, utilization and commerce
of basic and advanced energy technologies; it includes: the
location and extent of foreign energy resources and their
allocation; foreign government energy policies, plans and
programs; new and improved foreign energy technologies; and
economic and security aspects of foreign energy supply,
demand, production distribution, and utilization.
Espionage: Intelligence activity directed toward the
acquisition of information through clandestine means and
illegal in the territory in which it takes place.
Essential elements of information_ (EEI): Those items of
intelligence information essential for timely decisions and
to enhance operations and which relate to foreign power,
forces, targets or the physical environment.
Estimative intelligence: A category of intelligence pro-
Eiction which attempts to project future foreign develop-
ments and their implications for U.S. interests; it may or
may not be coordinated. and may be either national or depart
mental intelligence.
Evaluation: Appraisal of the worth of an intelligence
activity; information, or product in terms of, its contribu-
tion to a .specific goal; or the credibility, reliability,
pertinency, accuracy, or usefulness of information in terms
of an intelligence need. Evaluation may be used. without
reference to cost or risk, particularly when contrasted with
assessment. (See 'a.ssessment);" it is also a process in the
proTruction step of the intelligence cycle. (See intelligence
cycle.)
Approved For Release 2004/03/23 4:61A-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Evasion and escape (EE): The procedures and operations-
whereby'military personnel and other selected individuals
are enabled to emerge from enemy-held or hostile areas to
areas under friendly control.
Evasion and escape intelligence: Processed intelligence
information prepared to assist personnel to evade capture if
lost in enemy-dominated territory or to escape if captured.
Exploitation: The process of obtaining intelligence informa-
tion from any source and taking full advantage of it for
intelligence purposes. (Also see source.)
Finished intelligence: The result of the production step of
the intelligence cycle; the intelligence product. (Seo
intelligence cycle.)
Fol-eign: affairs community: Those U.S. Government departments
agencies, and other organizations which are represented in
U.S. diplomatic missions abroad, and those which may not be
represented abroad but are significantly involved in inter-
national activities with the governments of other nations.
Foreign counterintelligence (FCI): Intelligence activity,
with its resultant product, intended to detect, counteract,
and/or prevent espionage and other clandestine intelligence
activities, sabotage, international terrorist activities or
assassinations conducted for or on behalf of foreign powers,
organizations or persons; it does not include personnel,
physical, document, or communications security programs.
Foreign instrumentation signals (FIS): Electromagnetic
emissions associated with the testing and operational deploy-
ment of non-U.S. aerospace, surface, and sub-surface systems
which may have either military or civilian application; it
includes but is not limited to the signals from telemetry,
beaconry, interrogators, track/fusing/arming/command systems,
and video data links.
Foreign instrumentation signals intelligence (FISINT):
Technical and intelligence information derived from inter-
cept of foreign instrumentation signals (see above).
Foreign intelligence (FI): Tho product of collection,
processing, and analysis of intelligence information about
a foreign power and which is significant to the national
security, foreign relations, or economic interests of the
United States, and which is provided by a government agency
that is assigned an intelligence mission (i.e., an intelli-
gence agency).
15
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Foreign intelligence service: An organization of a foreign
government which engages in intelligence activities..
Foreign material (FORMAT) intelligence: Intelligence derived
from the exploitation of foreign materiel.
Foreign official: A foreign national acting in an official
capacity on behalf ?of a foreign power, attached to a foreign
diplomatic establishment or an establishment under the
control of a foreign power, or employed by a public inter-
national organization.
Forward looking infrared (FLIR): An airborne system used
for producing infrared ground images the dimensions of which
are determined by the forward motion of the aircraft and by
scanning across its flight path.
Fusion: The blending of intelligence information from
.multiple sources to produce a single intelligence product.
Fusion center: A term used within the Department of Defense
referring to an organization having the responsibility of
blending both compartmented intelligence information with
all other available information in order to support military
operations. (See actionable intelligence and tactical
intelligence.)
General Defense intelligence Program (GDIP): See National
Foreign Intelligence Program.
Geographic(al) intelligence: Foreign intelligence dealing
with the location, description, and analysis of physical and
cultural factors Of the world, (e.g., terrain, climate,
natural resources, transportation, boundaries, population
distribution) and their changes through time.
Guidance: Advice which identifies, interprets, clarifies,
and/or expands upon an information need. (See information
need.)
Human intelligence (HUMINT): A category of intelligence
information derived from human sources. (Sec human source
reporting and human resources collection.)
Human resources collection: All activities which attend
collection of intelligence information from human sources.
(See human intelligence and human source.)
Human Resources Committee (HRC): See Director of Central
Intelligence Committee.
Approved For Release 2004/03/23 : CIA-R133P80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Human source: A person who wittingly or unwittingly conveys
by any means information of potential intelligence value to,
an intelligence activity.
Human source reporting: The flow of intelligence information
from those who gather it to the customer; it may come from
information gathering activities either within or outside
the. Intelligence Community. (A form of the term is also
used to denote an item of.information being conveyed, as in
"human source report.") (See human intelligence.)
Illegal: An officeror employee of an intelligence organiza-
tion who is dispatched abroad and who has no overt connection
with the intelligence organization with which he is connected
or with the government operating that intelligence organization.
Illegal agent: An agent operated by an illegal residency or
directly 3y the headquarters of an intelligence organization.
Illegal communication: An electronic communication or
signal made without the legal sanction of the nation where
it originates.
Illegal residency: An intelligence apparatus established in
a foreign country and composed of one or more intelligence
officers, and which has no apparent connection with the
sponsoring intelligence organization or with the government
of the country operating the intelligence organization.
(Also see legal residency.)
Illicit communication: An electronic communication or
signal originated in support of clandestine operations; it
is also called clandestine communication.
Imagery: Representations of objects reproduced electronically
or by optical means on film, electronic display devices, Or
other media.
Imagery intelligence.: The collected products of imagery
interpretation processed for intelligence use. (See
imagery interpretation below.)
Imagery interuetation (II): The process of locating,
recognizing, identifying, and describing objects, activities,
and terrain represented by imagery; it includes photographic
interpretation.
Imitative communications decution: See communications
deception.
Approved For Release 2004/03/23 : 11A-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Imitative deception: The introduction into enemy channels
of electromagnetic radiations which imitate his own emissions.
Indications and warning (ION): Those intelligence activities
intended to detect and report time-sensitive intelligence
information on foreign developments that could involve a
threat to U.S. or allied military, political, or economic
interests, or to U.S. citizens abroad. It encompasses
forewarning of: enemy hostile actions or intentions; the
imminence of hostilities; serious insurgency; nuclear/non-
nuclear attack on the U.S., its overseas forces, or allied
nations; hostile reactions to U.S. reconnaissance activities;
terrorist attacks; and other similar events.
Information: Unevaluated material of every description, at
all levels of reliability, and from any source which may
contain intelligence information. (See intelligence informa-
tion.)
Information handling: Management of data and information
which may occur in connection with any step in the intelli-
gence cycle; such management may involve activities to
transform, manipulate, index, code, categorize, store,
select, retrieve, associate or display intelligence materials;
it may involve the use of printing, photographic, computer
or communications equipment, systems or networks; it may
include software programs to operate computers and to process
data and/or information; and may include information contained
in reports, files, data bases, reference services and libraries
Information Handling Committee (IHC): See Director of
Central Intelligence Committee.
Information security: Safeguarding knowledge against un-
authorized disclosure; or, the result of any system of
administrative policies and procedures for identifying,
controlling, and protecting from unauthorized disclosure or
release to the public, information the protection of which
is authorized by executive order or statute.
Information need: The requirement of an official involved
in the policymaking process or the intelligence production
process for the best available information and intelligence
on which to base policy decisions, recommendations, or
intelligence production.
Infrared imagery: A likeness or impression produced as a
result of sensing electromagnetic radiations emitted or
reflected from a given target surface in the infrared portion
of the electromagnetic spectrum.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
18
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Integration: A process in the production step of the intelligence
cycle in which a pattern is formed through the selection and
combination of evaluated intelligence information. (See
intelligence cycle.)
Intelligence: (1) Knowledge acquired and furnished in
response to the known or perceived requirements of decision-
makers which is derived principally from information which
is normally concealed or not intended to be available for
use by the acquirer; it is the product of a cyclical process.
(See intelligence cycle.)
Examples:
Policy development requires good intelligence.
Timely intelligence is important to informed
decisionmaking.
(2) A term used to refer collectively to the functions,
activities, or organizations which are involved in the
process of planning, gathering, and analyzing information of
potential value to decisionmakers and to the production of
intelligence as ?defined in (1) above. (See foreign intelligence
and foreign counterintelligence.)
Examples:
Human source collection is an important intelligence
activity.
Central Intelligence Agency.
Intelligence is a demanding profession.
Intelligence activity(ies): A generic term used to encompass
any or all of the efforts and endeavors undertaken by intelligence
organizations. (See intelligence organization.)
Intelligence agency: A component organization of the Intelligence
Community. (See Intelligence Community.)
Intelligence assessment: A category of intelligence production
that encompasses most analytical studies dealing with subjects
of policy significance; it is thorough in its treatment
of subject matter--as distinct from building-block papers,
research projects, and reference aids--but unlike estimates
may not attempt to project future developments and their
implications; it may or may not be coordinated.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
19
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Intelligence asset: Any resource--person, group, instrument,
installation, or technical system--at the disposal of an
intelligence organization.
Intelligence collector: A phrase sometimes used to refer to
an organization or agency that engages in the collection
step of the intelligence cycle. (See intelligence cycle.)
Intelligence Community (IC): A term which, in the aggregate,
refers to those Executive Branch organizations and activities
composed of: the Central Intelligence Agency (CIA); the
National Security Agency (NSA); the Defense Intelligence
Agency (DIA); offices within the Department of Defense for
the collection of specialized national foreign intelligence
through reconnaissance programs; the Bureau of Intelligence
and Research (INR) of the Department of State; intelligence
elements of the. military services; intelligence elements of
the Federal Bureau of Investigation (FBI); intelligence ?
elements of the Department of Treasury; intelligence elements
of the Department of Energy; intelligence elements of the
Drug Enforcement Administration; and staff elements of the
Office of the Director of Central Intelligence.
Intelligence Community Staff (IC Staff): A term referring
to an organization under the direction and control of the
Director of Central Intelligence (DCI) formed to assist the
DCI in discharging his responsibilities relating to the
Intelligence Community.
Intelligence consumer: See customer.
Intelligence Cycle: The processes by which information is
acquired and converted into intelligence and made available
to users. There are usually five steps in the cycle:
a. Planning and direction--determination of intelli-
gence requirements, preparation of a collection plan,
issuance of orders and requests to information collec-
tion entities, and a continuous check on the productivity
of collection entities.
b. Collection--acquisition ?of information or intelli-
gence information and the provision of this to processing
and/or production elements.
c. Processing--conversion of collected information
into intelligence information and a form suitable to
the production of intelligence.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
2 0
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
d. Production--conversion of information or intelli-
gence information into finished intelligence through
the integration, analysis, evaluation and/or inter-
pretation of all available data and the preparation of
intelligence products in support of known or anticipated
user requirements.
e. Dissemination--conveyance of intelligence in suitable
form to users.
Intelligence estimate: The product of estimative intelli-
gence.
Intelligence information: Information of potential intelli-
gence value concerning the capabilities, intentions and
activities of any foreign power, organization, or associated
personnel.
Intelligence information report: A report which disseminates
foreign intelligence information.
Intelligence officer: A professional employee of an intelligence
organization who is engaged in intelligence activities.
Intelligence organization: A generic term used to refer to
any organization engaged in intelligence activities; it may
include either an intelligence agency ora foreign intelli-
gence service, or both. (See intelligence agency and foreign
intelligence service.)
Intelligence Oversight Board (I0B): A body formed by appoint
ment of the President to provide him and the Attorney General
with reports and advice on the legality and propriety of
intelligence activities; membership and duties are expressed
in Executive Order 12036.
Intelligence producer: A phrase usually used to refer to an
organization or agency that participates in the production
step of the intelligence cycle. (See intelligence cycle.)
Intelligence related activities (IRA): Those activities
specifically excluded from the National Foreign Intelligence
Program which: respond to departmental or agency tasking
for time-sensitive information on foreign activities, re-
spond to national Intelligence Community advisory tasking of
collection capabilities which have a primary mission to
support departmental or agency missions or operational
forces, train personnel for intelligence duties, or are
devoted to research and development for intelligence and re-
lated capabilities.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
21
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Intelligence report: A product of the analysis of foreign
intelligence information.
Intelligence requirement: Any subject, general or specific,
upon which there is a need for the collection of intelligence
information or the production of intelligence. (Also see
collection requirement.)
Intelligence user: See customer.
Interagency Defector Committee (IDC): See Director of
Central Intelligence Committee.
Interagency intelligence memorandum (IIM): A national
intelligence assessment or estimate issued by the Director
of Central Intelligence with the advice of appropriate
National Foreign Intelligence Board components.
Intercept(ion): Acquisition for intelligence purposes of
electromagnetic signals (such as radio communications) by
electronic collection equipment without the consent of the
communicators.
Intercept station: A station which intercepts communications
or non-communications transmissions for intelligence purposes.
Interdepartmental intelligence: Integrated departmental in-
telligence required by departments and agencies of the U.S.
government for the execution of their missions but which
transcends the competence or interest of a single department
or agency.
International lines of communications (ICL): Those communica-
tions services which are under the supervision of the Inter-
national Telecommunication Union and which carry paid public
communications traffic between different countries; also
known as: International Civil Communications, International
Commercial Communications, Internationally-Leased Communica-
tions, International Service of Public Correspondence, and
commercial communications.
International terrorist activity: The calculated use of
violence, or the threat of violence, to attain political
goals through fear, intimidation or coercion; usually
involves a criminal act, often symbolic in nature, and is
intended to influence an audience beyond the immediate
victims. International terrorism transcends national boundaries
in the carrying out of the act, the purpose of the act, the
nationalities of the victims, or the resolution of the
incident; such an act is usually designed to attract wide
publicity in order to focus attention on the existence,
cause, or demands of the perpetrators.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
22
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Interpretation: A process in the production step of the
intelligence cycle in which the significance of information
or intelligence information is weighed relative to the
available body of knowledge. (See intelligence cycle.)
Joint Atomic Energy Intelligence Committee (JAEIC): See
Director of Central Intelligence Committee.
Joint intelligence: (1) (Military context.) Intelligence
produced by elements of more than one military service of
the same nation. (2) (Intelligence Community context.)
Intelligence produced by intelligence organizations of more
than one country.
Legal residency: An intelligence apparatus in a foreign
country and composed of intelligence officers assigned as
overt representatives of their government but not necessarily
identified as intelligence officers. (Also see illegal
residency.)
Manipulative communications cover: Those measures taken to
alter or conceal the characteristics of communications so as
to deny to any enemy or potential enemy the means to identify
them. Also known as communications cover.
Manipulative communications deception: See communications
deception.
Manipulative deception: The alteration or simulation of
friendly electromagnetic radiations to accomplish deception.
Measurement and signature intelligence (MASINT): Scientific
and technical intelligence information obtained by quantitative
and qualitative analysis of data (metric, angle, spatial,
wavelength, time dependent, modulation, plasma, and hydromag-
netic) derived from specific technical sensors for the
purpose of identifying any distinctive features associated
with the source, emitter, or sender and to facilitate sub-
sequent identification and/or measurement of the same.
Medical intelligence (MEDINT): Foreign intelligence related
to all aspects of foreign natural and man-made environments
which could influence the health of military forces; it
incorporates General Medical Intelligence (GMI), which is
concerned with foreign biological medical capabilities and
health situations, and medical scientific and technical
intelligence which assesses and predicts technological
advances of medical significance, to include defense against
Chemical, Biological, Radiological (CBR) Warfare; it applies
to both tactical and strategic planning and operations,
including military and humanitarian efforts.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
23
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Military intelligence (MI): Basic, current, or estimative
intelligence on any foreign military or military-related
situation or activity.
Monitor: To observe, listen to, intercept, record, or
transcribe any form of communication or media for col-
lection of intelligence information or communications security
purposes, either overtly or covertly.
Multi-level security: (For automatic data processing (ADP)
systems.) Provisions for the safeguarding of all information
within a multi-level information handling system. The multi-
level information handling system permits various levels,
categories, and/or compartments of material to be concurrently
stored and processed in a remotely-accessed resource-sharing
ADP system, while simultaneously permitting material to be
selectively accessed and manipulated from variously controlled
terminals by personnel having different security clearances
and access approvals. Security measures are therefore aimed
at ensuring proper matches between information security and
personnel security. (Also see uni-level security.)
National estimate: (See national intelligence estimate.)
National Foreign Assessment Center (NFAC): An organization
established by and under the control and supervision of the
Director of Central Intelligence, which is responsible for
production of national intelligence.
National Foreign Intelligence Board (NFIB): A body formed
to provide the Director of Central Intelligence (DCI) with
advice concerning: production, review, and coordination of
national foreign intelligence; the National Foreign Intel-
ligence Program budget; interagency exchanges of foreign
intelligence information; arrangements with foreign govern-
ments on intelligence matters; the protection of intelligence
sources or methods; activities of common concern; and such
other matters as are referred to it by the DCI. it is composed
of the DCI (chairman), and other appropriate officers of the
Central Intelligence Agency, the Office of the DCI, Department
of State, Department of Defense, Department of Justice,
Department of the Treasury, Department of Energy, the offices
within the Department of Defense for reconnaissance programs,
the Defense Intelligence Agency, the National Security
Agency, and the Federal Bureau of Investigation; senior
intelligence officers of the Army, Navy, and Air Force
participate as observers; a representative of the Assistant
to the President for National Security Affairs may also
attend meetings as an observer.
Approved For Release 2004/03/23 : CJA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
National Foreign Intelligence Program (NFIP): A program
aggregating the programs of the Central Intelligence Agency;
the Consolidated Cryptologic Program; the programs of the
offices within the Department of Defense for the collection
of specialized national foreign intelligence through recon-
naissance (except such elements as the Director of Central
Intelligence and the Secretary of Defense agree should be
excluded); the elements of the General Defense Intelligence
Program; and other programs of agencies within the Intelli-
gence Community designated by the President or jointly by
the Director of Central Intelligence and the head of the
department as national foreign intelligence or national
foreign counterintelligence activities; and activities of
the staff elements of the Office of the Director of Central
Intelligence.
National intelligence: Foreign intelligence collected by assets
funded in the NFIP and then evaluated under the aegis of the
Director of Central Intelligence and intended primarily to
be responsive to the needs of the President, the National
Security Council and other Federal officials involved in the
formulation and execution of national security, foreign
political and/or economic policy.
Natienal intelligence asset: An intelligence asset, the
primary purpose of which is the collection, or processing of
intelligence?information and the production of national
intelligence. (See Intelligence asset and national in-
telligence.)
National intelligence estimate (NIE): A thorough assessment
of a situation in the foreign environment which is relevant
to the formulation of foreign, economic, and national security
policy, and which projects probable future courses of action
and developments; it is structured to illuminate differences
of view within the Intelligence Community; it is issued by
the Director of Central -Intelligence with the advice of the
National Foreign Intelligence Board.
National Intelligence - Officer. -(NI0): The senior staff
officer of the Director of Central Intelligence (DCI) and
the DCI's Deputy for National Intelligence for an assigned
area of substantive responsibility; he manages estimative
and interagency intelligence production on behalf of the
DCI; he is the principal point of contact between the DCI
and intelligence consumers below the cabinet level; he is
charged with monitoring and coordinating that portion of the
National Foreign Assessment Center's production that involves
more than one office or that is .interdisciplinary in character;
and he is a primary source of national-level substantive
guidance to Intelligence Community planners, collectors, and
resource managers.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
25
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
- National intelligence Tasking Center (NITC): The central
organizational mechanism established under the direction,
control and management of the Director of Central Intelli-
gence for coordinating and tasking national foreign intelli-
gence collection activities, and for providing advisory
tasking to other intelligence and information gathering
activities.
National security: The territorial integrity, sovereignty.,
and?Tnternational freedom of action. of the United States.
(Intelligence activities relating to national security
encompass all the military, economic, political, scientific
and technological and other aspects of foreign developments
which pose actual or potential threats to U.S. national
interests.)
National/tactical. interf.ace: A relationship between national
and tactical intelligence activities encompassing the full
range of fiscal, technical, operational, and programmatic
matters.
Near-real-time: The -brief interval between the collection
oT information regarding an event and reception of the data
at some other location, caused. by the time required for
processing, communications and display.
Net assessment: .A comparative review and analysis of opposing
national strengths, capabilities, .vulnerabilities and weaknesses.
(An intelligence net assessment involves only foreign countries.)
Noncommunications emanations: That class of radiations
which are emitted intentionally or unintentionally by
electrical or electronic equipment for purposes other than
communications; e.g., by radars, navigational aids, jammers
or remote control systems.
Nuclear intelligence (NUCINT).: Intelligence derived from
the collection and analysis oftadiation and other effects
resulting from the detonation of nuclear devices or from
radioactive sources.
Nuclear proliferation intelligence: Foreign intelligence
relating to (1) scientific, technacal and economic capa-
bilities and programs and the political plans and intentions
of nonnuclear weapon states (NNIS) or foreign organizations
to acquire.nuclear weapons and/or to acquire. the requisite
special nuclear materials (SNM) and to carry on research,
development and manufacture of nuclear explosive devices,
and; (2) the attitudes, policies and actions of foreign
nuclear supplier countries or organizations within these
Approved For Release 2004/03/23 : C14-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
countries toward provision of technologies, facilities or
SNftwhich could assist NNWS or foreign organizations to
acquire or develop nuclear explosive devices.
Official: See foreign. official.
Official information: Information which is subject to the
control of the United States Government.
Open source information: A generic term describing information
of potential intelligence value (i.e., intelligence information)
which is available to the general public.
Operational control (OPCON): (Military context) The authority
delegated to a commander to direct forces assigned so that
the commander may accomplish specific missions or tasks
which are usually limited by function, time, or location; to
deploy the forces concerned; and to retain or assign tactical
control of those forces. (It does not, of itself, include
administrative or logistic control.)
Operational intelligence (OPINTEL): Intelligence required
for planning and executing operations.
Operations security (OPSEC): Those measures designed to
deny information concerning planned, ongoing, and completed
operations to an enemy or potential enemy, and which might
otherwise provide him with a tactical or strategic advantage.
Optical intelligence (OPTINT): That portion of electro-optical
intelligence that deals with visible light. (See electro-
optical intelligence.)
Order of battle (OB): Intelligence pertaining to identifi-
cation, strength, command structure and disposition of the
personnel, units, and equipment of any foreign military
force.
Overt: ? Open; done without attempt at concealment.
Overt collection: The acquisition of intelligence informa-
tion from public media, observation, government-to-government
dialogue, elicitation, and from the sharing of data openly
acquired; the. process may be classified or unclassified;
the target and host governments as well ?as the sources
involved normally are aware of the general collection activity
although the specific acquisition, sites; and processes may
be successfully concealed.
27
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
?
Penetration: (1) (intelligence operations.) The recruit-
ment of agents within or the infiltration of agents or
introduction of technical monitoring devices into an organi-
zation or group or physical facility for the purpose of
acquiring information or influencing its activities.
(2) (automatic data processing (ADP) operations.). The
successful and repeatable extraction and. identification of
recognizable information from a protected ADP system.
Personnel security: The means or procedures--such as
selective investigations, record checks, personal inter-
views, and supervisory controls--designed to provide reasonable
assurance that persons being considered for or granted
access to classified information are loyal and trustworthy.
Photographic intelligence (PHOTINT): The collected products
of photographic interpretation classified and evaluated for
ilitelligence use; it is a category of imagery intelligence.
Photographic interpretation (PI): The process of locating,
recognizing, identifying, and describing objects, activities,
and terrain represented, on photography; it is a category of ?
imagery interpretation.
Physical security: Physical measures--such as safes, vaults,
perimeter, barriers, guard systems, alarms and access controls--
designed to safeguard installations against damage, disruption
or unauthorized entry; information Or material against
unauthorized access or theft; arid specified personnel
against harm.
Plain text: .Normal text or language, or any symbol or
signal, that conveys information without any hidden or
secret meaning.
Planning and direction: See intelligence cycle.
Policy Review Committee (As pertains to intelligence matters)
(PRC(I)): A coMmittee?established.undor the National
Security Council which when meeting under the chairmanship
of the Director of Central Intelligence is empowered to
establish requirements and priorities for national foreign
intelligence and to evaluate the quality of the intelligence
product; it is sometimes referred to as the Policy Review
Committee (Intelligence); its specific duties are defined in
Executive Order No. 12036.
28
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Political intelligence: Intelligence concerning the dynamics
of the internal and external political affairs of foreign
countries, regional groupings, multilateral treaty arrange-
ments and organizations, and foreign political movements
directed against or impacting upon established governments
or authority.
Positive intelligence: A term of convenience sometimes
applied to foreign intelligence to distinguish it from
foreign counterintelligence.
Priority: A value denoting a preferential rating or precedence
in position which is used to discriminate among like entities;
the term normally used in conjunction with intelligence
requirements in order to illuminate importance and to guide
the actions planned, being planned, or in use, to respond to
the requirements.
Processing: See intelligence cycle.
Product: (I) A finished intelligence report disseminated to
customers by an intelligence agency. (2) In SIGINT usage,
intelligence information derived from analysis of SIGINT
materials, and published as a report or translation for
dissemination to customers.
Production: See intelligence cycle.
Proprietary: A business entity owned, in whole or in part,
or controlled by an intelligence organization and operated
to provide private commercial cover for an intelligence
activity of that organization. (See cover.)
Radar intelligence (RADINT): Intelligence information derived
from data collected by radar.
Radiation intelligence (RINT): The functions and characteristics
. derived from information obtained from unintentional electro-
magnetic energy emanating from foreign devices; excludes
'nuclear detonations or -radioactive sources. (See noncommuni-
cations emanations.)
Raw intelligence: A -colloquial term moaning collected
- intelligence information which has not yet been converted
into intelligence. (See intelligence information.)
Reconnaissance (RECCE): A mission undertaken to obtain by
visual observation or other tdetection methods information
relating to the activities) resources or forces of a foreign
nation; or to secure data concerning the Meteorological,
hydrographic, or geographic characteristics of a particular
area.
Approved For Release 2004/03/23 : CR,-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Recruitment-in-place: A person who agrees to become an
-
agent and retain his position in his organization or govern-
ment while reporting on it to an intelligence or security
organization of a foreign country.
RED/BLACK Concept: The separation of electrical and electronic
circuits, components, equipment, and systems which handle
classified plain language information in electric signal
form (RED) from those which handle encrypted or unclassified
information (BLACK); 'RED and BLACK terminology is used to
clarify specific criteria relating to and differentiating
between such. circuits, components, equipment, and Systems
and :the areas in which they are contained,
Refugee: A person who is outside the country of his former
habitual residence and who, because of fear of being perse-
cuted in that country, is unwilling to return to it. (Also
see emigre.)
Report: See intelligence report and intelligence information
report.
Requirement: See intelligence requirement or collection
requirement.
Residency: See illegal residency and legal residencv.
Sabotage: Action against material, promises or utilities,
or other production, ? which injures, interferes with or
obstructs the national security or ability of a nation to
prepare for or carry on a war.
Safe house: A house or premises controlled by an intelli-
gence organization that affords--at least temporarily--
security for individuals involved or equipment used in
clandestine operations.
Sanitization: The process of altering intelligence informa-
tion or reports in order to protect sensitive intelligence
sources, methods, capabilities, and analytical procedures in
?order to permit wider- dissemination.
Scientific and technical (SU)'intelligence: Intelligence
concerning foreign developments in basic and applied scien-
tific and technical research and development including
engineering and production techniques, new technology-, and
weapon systems and their capabilities and characteristics;
it also includes intelligence which requires scientificor
technical expertise on the part of the analyst, such as
medicine, physical health studies and benavioral analyses.
30
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Scientific and Technical Intelligence Committee .(STIC): See
Director of Central Intelligence Committee.
Security: Establishment and maintenance of protective'
measures which are intended to ensure a state of inviola-
bility from hostile acts or influences.
Security classification: See classification.
Security Committee (SECOM): See Director of Central Intelli-
gence Committee.
Sensitive: Requiring special protection from disclosure to
avoid compromise or threat to the security of the sponsor.
Sensitive compartmented information (SCI): All information
and material requiring special controls for restricted
hahdling within compartmented intelligence systems. (Also
see compartmentation.)
Sensitive intelligence sources or methods: A collective
term for those persons, organizations, things, conditions,
or events that provide intelligence information and those
means used in the collection, processing and production of
such information which, if compromised, would be.vulnerable
to counteraction that could reasonably be expected to reduce
their ability to support U.S. intelligence activities.
Service Cryptologic Agency(ies) (SCA): See service cryptologic
element (s)
Service cryptologic elements: A term used to designate
separately or together those elements of the U.S. Army,
Navy, and Air Force which perform cryptologic functions;
Navy and Air Force elements are also known as Service Cryptologic
Agency(ies) (SCA).
Sensor: (1) A technical device designed to detect and
respond to one or more particular stimulae and which- may
record and/or transmit a resultant impulse for interpreta-
tion or measurement; often called a technical sensor. (2)
special sensor: An unclassified term used as a matter of
convenience to refer to a highly-classified or controlled
technical sensor.
Side-looking airborne radar (SLAR): An airborne radar,
viewing at right angles to the axis of the vehicle, which
produces a presentation of terrain or targets.
Approved For Release 2004/03/23,f1A-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
SIGINT activity: Any activity conducted for the purpose
producing signals intelligence. Also see SIGINT-related
activity.
SICINT Committee: See Director of. Central Intelligence
Committee.
of
SIGINT operational tasking authority (SOTA): That authority
delegated by the Director, National Security Agency, to
military- commanders which enables them to task specified
signals intelligence resources that have tactical applica-
bility and the ability to respond to time-sensitive require-
ments.
SIGINT-related activity: Any activity primarily intended
Lot a purpose M other than signals intelligence (SIGINT),
but which can be used to produce SIGINT, or which produces
SIGINT as a by-product of its principal function(s). Also
see SIGINT activity.
SIGINT technical information: Information concerning or
derived from intercepted foreign transmissions or radiations
which is composed of technical (as opposed to intelligence)
information and which is required in the further collection
or analysis of signals intelligence.
Signal: Anything intentionally transmitted by visual, other
electromagnetic, or acoustical methods intended to convey a
meaning to the recipient.
Signals intelligence (SIGINT): A category of intelligence
information comprising all communications intelligence,
electronics intelligence, and foreign instrumentation
signals intelligence, either individually or in combination,
including nonimagery infrared and. coherent light signals.
Source: A person, device, system or activity from which
intelligence information is obtained_ (Also sec human
source and sensitive intelligence sources and methods.)
Special 'activities:. Sec covert action.
Special Activities Office (r) (SAQ): A control point for
certain- categories of compartmented information. (The acronym
is often used to refer to the compartmented information
concerned-)
Special Coordination Committee (SCC): A committee established
under the National Security Council which deals with such
matters as the oversight of sensitive intelligence activities--
such as covert action--which are undertaken on Presidential
authority.
Approved For Release 2004/03/23 : CJA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Special intelligence (Si.): An uaclassified term used to
designate a category of sensitive compartmented information
(SCI). (See sensitive compartmented in
Special intelligence communications (SPINTCOMM): A communica-
tions network for the hand-ling of all special intelligence
and consisting of those facilities under the .operational and
:technical control of the Chief of Intelligence of each of ?
the Military departments, under the management of the
Defense intelligence Agency, and under the technical and
security specification criteria established and monitored
by the National Security Agency. .
Special national intelligence estimate (SNIE):. National
intelligence estimates (NIEs) which are relevant to specific
policy .problems that need to be addressed in the immediate
future. SNIEs are generally unscheduled, shorter, and
prepared more quickly than NIEs and are coordinated within
the Intelligence Community only to the extent that time
permits
Special Security Office (r) (SSO): A control point for
.security procedures within any activity authorized access to
sensitive compartmented information.
Special sensor: See sensor.
Strategic intelligence: Intelligence which is required for
.the formulation of policy and military plans at national and
international levels; it differs primarily from tactical
intelligence in level of use, but may also vary in scope and
detail.
Strategic warning: Intelligence regarding the threat of the
initiation of hostilities against the U.S. or in which U.S.
forces may become involved; it May be received at any time
prior to the initiation of hostilities.
Support for the Analysts File Environment (SAFE): A joint
CIA/DIA project to develop a new computer/Microfilm system
to support production analysts in reading, filing and
routing cable traffic; building. and. searching private and
central files; and writing, editing, and routing intelli-
gence meMoranda and reports.
Surveillance: The systematic observation or monitoring of
aerospace, surface, or Subsurface areas, places, persons, or
things by visual, aural, electronic, photographic, or other
means.
33
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Tactical into Foreign intelligence collected with
assets funded in nol) programs and evaluated by DoD elements
for theuse of military commanders in the field to maintain
the readiness of operating forces for combat operations and
to support the planning and conduct of combat operations.
(See combat intelligence.)
Tactical intelligence asset: An intelligence asset, the
primary purpose of which is .the collection, processing or
production of tactical intelligence. (See tactical intel-
ligence and intelligence asset.)
Target: A country, area, installation, organization, weapon
system, military force, situation (political or economic), .
person or other entity against which intelligence operations.
are conducted.
-Ta.rgot intelligence: Intelligence which portrays and locates
the components of a target or target complex and indicates
its identification, vulnerability and relative importance.
Tasking: The assignment or direction of an individual or
activity to perform in a specified way to achieve an objective
or goal.
Technical sensor: See sensor.
Technical SIGINT: Intelligence information which provides a
detailed knowledge of the technical characteristics of a
given emitter and thus permits estimates to be made about
its primary function, capabilities, modes of operation.
(including malfunctions), and state-of-the-art, as well as
its specific role within a complex -weapon system or defense
netWork.
Telecommunications: Any transmission, -emission, or reception
of signs, signals, writing, images, and sounds or informa-
tion of any nature by wire, radio, visual, or other electro-
magnetic systems.
Telemetry intelligence (TELINT): Technical and intelligence
information derived from intercept, processing and analysis
of foreign telemetry. .
Teleprocessing: The overall function of an information
transmission system which combines telecommunications,
automatic data processing, and man-machine interface equip-
ment and their interaction as an integrated. whole.
Approved For Release 2004/03/23 iialA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
TEMPEST: An unclassified term 7eferring to technical
investigations for compromising emanations from electrically
operated, information processing equipment; they are conducted
in support of emanations and emissions security.
Terrorist oraanization: A group that engages in terrorist
activities. (Soo international terrorrst activity.)
Traffic ana]vsis (TA): Tho study of the external charac-
teristics of communications.
Transmission security (TRANSEC) The component of communications
security which results from all measures designed. to protect
transmissions from interception and from exploitation by
means other than cryptanalysis.
Unauthorized disclosure: Sec compromise.
Uni-level. security.: (For automatic data processing systems)
Provision for the safeguarding of all material within a
single information handlingsystem in accordance with the
highest level of classification and most restrictive dis-
semination caveats assigned to any material contained therein,
as distinguished from multi-level security. (Also see
multi-level security.)
United States Signals Intelligence System (USSIS): An entity
that is comprised of the National Security Agency (including
assigned military personnel); those elements of the military
departments and. the Central Intelligence Agency performing
signals intelligence activities; and those elements of any
other department or agency which may from time-to-time be
authorized by the National Security Council to perform
signals intelligence activities during the time. when such
element S are so authorized; it is governed by the United
States Signals Intelligence Directives (USSID) -system.
Upgrade:. To determine that certain classified, information
requires, in the interest of national security, al higher
degree of protection against unauthorized disclosure than
currently provided, coupled with a changing of the classi-
fication designation to reflect such higher degree. (Also
see classification.)
User: See customer.
35
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
yalidation: A process normally associated with the collection
of intelligence information which provides official status
to an identified, requirement and confirms that the requirement
is appropriate for a given collector and has not previously
been satisfied. (See collection requirement.) ?
Walk-in; A person .who on his own initiative makes contact
with a representative of a foreign country and who volunteers
intelligence information and/or requests political asylum.
Weapon and Space Systems Intelligence Committee (WSSIC):
See Director of Central Intelligence Committee.
36
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
ACRONYMS AND ABBREVIATIONS
ACINT
ACOUSTINT
ACSI
Acoustical Intelligence (Naval acronym;
see definition.)
Acoustical Intelligence
Assistant Chief of Staff/Intelligence
(Army or Air Force)
CAMS COMIREX Automated Management System
CBR Chemical, Biological, Radiological
Warfare
CCF Collection Coordination Facility
CCP Consolidated Cryptologic Program
CCPC Critical Collection Problems Committee
CI Counterintelligence
CIA Central Intelligence Agency
CIAP Central Intelligence Agency Program
CIFAX Enciphered Facsimile
CIPHONY Enciphered Telephone
CIRIS Consolidated Intelligence Resources
Information System
CISR Communications Intelligence Security
Regulation
CIVISION Enciphered Television
COINS Community On-Line Intelligence
Network System
COMEX Committee on Exchanges
COMINT Communications Intelligence
COMIREX Committee on Imagery Requirements and
Exploitation
COMSEC Communications Security
CONTEXT Conferencing and Text Manipulation System
CRITIC Critical Intelligence Message
CRITICOMM Critical Intelligence Communications
System
CRYPTO CRYPTO (See definition.)
DAO Defense Attache Office
DCI Director of Central Intelligence
DCID Director of Central Intelligence
Directive
DEA Drug Enforcement Administration'
DEFSMAC Defense Special Missile and Astronautic
Center
DF Direction Finding
DIA Defense Intelligence Agency
DNI Director of Naval Intelligence
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
ECCM
ECM
EEI
EE
EIC
ELECTRO.-OPTINT
BUNT
ELSEC
EMSEC
EOB
ESM
EW
FBI
FBIS
FCI
FI
FIS
FISINT
FLIR
FORMAT
GDIP
GMI
HPSCI
HRC
HUMINT
IC
ICRS
IDC
IHC
II
TIM
ILC
INR
JOB
IRA
IR&DC
I&W
Electronic Counter-Countermeasures
Electronic Countermeasures
Essential Elements of Information
Evasion and Escape
Economic Intelligence Committee
Electro-optical Intelligence
Electronic Intelligence
Electronic Security
Emanations Security
Electronic Order of Battle
Electronic Warfare Support Measures
Electronic Warfare
Federal Bureau of Investigation
Foreign Broadcast Information Service
Foreign Counterintelligence
Foreign Intelligence
Foreign Instrumentation Signals
Foreign Instrumentation Signals
Intelligence
Forward Looking Infrared
Foreign Material
General Defense Intelligence Program
General Medical Intelligence
House Permanent Select Committee
on Intelligence
Human Resources Committee
Human Intelligence
Intelligence Community
Imagery Collection Requirements
Subcommittee (COMIREX)
Interagency Defector Committee
Information Handling Committee
Imagery Interpretation
Interagency Intelligence Memorandum
International Lines of Communications
Bureau of Intelligence and Research,
Department of State
Intelligence Oversight Board
Intelligence-Related Activities
Intelligence Research & Development Council
Indications and Warning
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
JAEIC Joint Atomic Energy Intelligence
Committee
MASINT Measurement and Signature Intelligence
MEDINT. Medical Intelligence
MI Military Intelligence
NFAC National Foreign Assessment Center
NFIB National Foreign Intelligence Board
NFIP National Foreign Intelligence Program
NIE National Intelligence Estimate
NIO National Intelligence Officer
NITC National Intelligence Tasking Center
NMIC National Military Intelligence Center
NNWS Non-Nuclear Weapon States
NOJWON National Operations and Intelligence
Watch Officers Network
NPHR National Foreign Intelligence Plan for
Human Resources
NPIC. National Photographic Interpretation
Center
NSA National Security Agency
NSCID National Security Council Intelligence
Directive
NSOC National SIGINT Operations Center
NSRL National SIGINT Requirements List
NTPC National Telemetry Processing Center
NUCINT Nuclear Intelligence
OB Order of Battle
OPCON Operational Control
OPINTEL Operational Intelligence
OPSEC -Operations Security
OPTINT Optical Intelligence
PHOTINT Photographic Intelligence
PI Photographic Interpretation or
Photographic Interpretor
PRC(I) Policy Review Committee (Intelligence)
RADINT Radar Intelligence
RECCE Reconnaissance
RINT Radiation Intelligence
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
SU Scientific and Technical
SAFE Support for the Analysts'
File Environment
SAO Special Activities Office
SCA Service Cryptologic Agencies
SCC Special Coordination Committee
SCI Sensitive Compartmented Information
or Source Code Indicator
SECOM Security Committee
SI Special Intelligence
SIGINT Signals Intelligence
SIGINT Committee Signals Intelligence Committee
SIRVES SIGINT Requirements Validation and
Evaluation Subcommittee (of SIGINT
Committee)
SLAR Side-Looking Airborne Radar
SNIE Special National Intelligence Estimate
SgM Special Nuclear Materials
SOSUS Sound Surveillance System
SOTA SIGINT Operational Tasking Authority
SPINTCOMM Special Intelligence Communications
SSCI Senate Select Committee on Intelligence
SSO Special Security Officer
STIC Scientific and Technical Intelligence
Committee
TA Traffic Analysis
TELINT Telemetry Intelligence
TRANSEC Transmission Security
USSID
USSIS
United States Signals Intelligence
Directive
United States Signals Intelligence
System
WSSIC Weapon and Space Systems Intelligence
Committee
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
DRAFT
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
I. PREFACE
This publication is designed to provide definitions for
words and terms used frequently in the daily conduct of
business in the Intelligence Community. It is the product
of an interagency working group formed by the National
Foreign Intelligence Board in September 1977, in recognition
of the need for an authoritative and comprehensive glossary
of intelligence terms.
The definitions that appear in this publication have
been carefully constructed to reflect as nearly as possible
an accurate and modern sense of the meaning of each term,
focusing on the potential utility of the definition in each
case. No attempthas been made to include terms which have
no special connotation within the Intelligence Community.
Many technical intelligence terms have not been included for
the reason that their use is restricted to a small specialized
segment of the Community and would not have the broad
applicability that this glossary aims to provide. Additionally,
the limited number of classified terms that might otherwise
be appropriately included in this glossary have been intention-
ally omitted to enable the broadest possible distribution
and use of this publication. Those terms defined here in
unclassified form, and which may also have classified defini-
tions, have not been altered in meaning although form and
content have been modified to protect classified information.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
DRAFT
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
This glossary of intelligence terms will serve as a
primary basis for interdepartmental communication and under-
standing within the Intelligence Community. It is not
intended ?to restrict intelligence agencies from the use of
identical terms in different contexts when good and suf-
ficient reasons exist. It should' be recognized, for example,
that the definitions in this glossary may not coincide pre-
cisely with definitions used elsewhere for departmental or
legal purposes. Neither should the list of terms in this
gldssary be considered to be completely exhaustive. Rather,
the glossary should be treated as a living compendium designed
to provide the principal meanings of intelligence terms as
they are understood in the Intelligence Community. Unless
otherwise specified the meanings provided will be used so that
the full value of a standardized glossary may be realized.
Thus, while the definitions found in this glossary will form
the basis for a common Intelligence Community language, they
will serve as well to unify the disparate elements of the
Community as they communicate with other parts of the Executive
Branch and with Congress and the Judiciary.
Authors of other special-use glossaries which contain
intelligence terms should try to align definitions of terms
with those found here as an important step toward language
commonality. Where that is not possible--such as in legislation
Approved For Release 2004/03/2: CIA-RDP80M00596A000500020018-1
DRAFT
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
or in other public and/or legal documents--the special
applicability of a definition will be recognized for that
purpose but will not be considered to have replaced the
"Community" definition contained here until authorized by
the Director of Central Intelligence.
In addition to the glossary of definitions itself,
other information is contained in this publication which is
designed to enhance its usefulness and contribute to its
instructional value. In the ensuing section, brief treat-
'meta is accorded both the methodology and the most cogent,
considerations involved in devising the definitions. In-
cluded in the several appendices are a list of acronyms and
abbreviations related to the terms in the glossary, dupli-
cate definitions of certain glossary terms where they appear
in and for the special purpose of clarifying an executive
order or statute, graphic displays of certain families of
intelligence terms which.portray word relationships, and a
reference index of other glossaries which contain intelli-
gence terms and their definitions.
Approved For Release 2004/03/Z3 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
II. METHODOLOGY
The definitions in this glossary have been devised by
intelligence officers, not by philologists or semanticists.
Some definitions, therefore, may have limited applicability
outside the Intelligence Community, while other definitions
may be restricted to the single Use of a word which has
intelligence significance; as, for example, in the word
"source." Insofar as possible, however, the definitions
included here contain a measure of consistency of form, and
an. attempt has been made to establish relationships among
important intelligence words and terms. A basic example ex-
ists in the relationships to be found among "information,"
"intelligence information," and "intelligence." William R.
Corson, in his The Armies of Ignorance, observed:
"A word of caution about the term 'intelligence'
is in order. Too often it is used synonymously or
interchangeably with 'information.' This is inaccurate
and quite misleading. Information until and unless it
has been analyzed and. evaluatedremains nothing more
than a fact. Information may be interesting, amusing,
or hitherto, unknown to the person receiving it, but by
and in itself it is inappropriate to call it intelli-
gence. The three terms 'intelligence,' intelligence
information,' and 'information' need to remain distinct.
Intelligence by itself refers to the meaning of, or a
conclusion about, persons, events, and circumstances
which is derived from analysis and/or logic. Intelli-
gence information consists of facts bearing on a pre-
viously identified problem or situation, the signifi-
cance of which has not been completely established.
And information is made of raw facts whose relationship
4
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
DRAFT
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
to other phenomena has yet to be considered or estab-
lished. Similarly, the methods involved in acquiring
information and/or intelligence information by any
means and turning it into intelligence constitute the
intelligence process or cycle. The distinctions between
these terms are important to remember...."
This glossary makes similar distinctions: "information"
is unevaluated material of every description, "intelligence
information" is information of potential intelligence value,
and "intelligence" is the knowledge derived from a cyclical
pr9cessing of information. The articulation of these differ-
ences is fundamental to the repeated use of these terms in
defining other terms. One will find, for example, that
nuclear intelligence is defined as "intelligence" derived
from the collection and analysis of radiation, etc., whereas
communications intelligence is defined as technical and
"intelligence information" derived from the intercept of
foreign communications, etc. (not yet analyzed, it is not
yet "intelligence"). Such fine distinctions are expected to
contribute to a broader understanding of the common meanings
of many such terms.
Arriving at a suitable definition for the word."intel-
ligence" is a challenge unto itself. In Sherman Kent's
Strategic Intelligence for American World Policy, "intelli-
gence" is characterized as having three definitional subsets:
knowledge, organization, and activity. This concept is
particularly useful in establishing the fact that "intelli-
gence" in the current context has multiple meanings.
Approved For Release 2004/03/2: CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
"Intelligence," he says, is the knowledge that our
nation must possess regarding other nations in order to
assure itself that its interests will not fail because of
planning or decisionmaking done in ignorance; and upon which
knowledge our national foreign policy is based. "Intelligence"
?is also "an institution;...a physical organization of living
people which pursues the special kind of knowledge at issue."
And "intelligence" is the activity which the organization
performs: research, analysis, collection, evaluation,
study, presentation, and myriad others.
As helpful as they. are, Kent's definitions are excessively
delimiting for purposes of this glossary. In the sense that
intelligence is knowledge, for example, one cannot assume
that all intelligence is "our" intelligence. It is necessary,
therefore, to fashion the most basic definition possible for
the word "intelligence" in this sense of its meaning, trusting
in the utilizer's ability to select a proper modifier to
give the word more precise meaning when that is necessary.
More definitional flexibility results from such an approach.
But "intelligence" is more than the knowledge contained
in an intelligence product. It encompasses the intelligence
organizations and activities that Kent refers to, and other
functions in addition to those. It also embraces the
activities--and their resultant products--which are known as
"counterintelligence." For these reasons, one might be
6
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
? DRAFT
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
tempted to define "intelligence" simply as a generic term
which encompasses both foreign intelligence and foreign
counterintelligence, thence to formulate separate defini-
tions for each of those terms. One quickly discovers,
however, that such a simplistic approach is insufficiently
satisfying because it fails to provide for several shades of
meaning and subsequent use.
The problem is compounded by the scores of different
types of intelligence that are used commonly and which must
be broadly understood, and by the variety of headings under
which these types of intelligence are classified. Some
types of intelligence are source-oriented (such as human
intelligence or signals intelligence), some form-oriented
(as in raw or unfinished intelligence),' some system-oriented
(electronic or telemetric), some subject-oriented (medical,
economic), some use-oriented (military, tactical), and a
probable host of others. But the point to be made here is
how essential the basic definition of "intelligence" is to
further understanding of the many, many ways in which it can
be used. The definition of "intelligence" as it appears in
this glossary attempts to account for all of the foregoing.
The reader will notice frequent cross-referencing between
terms and their definitions. In addition to providing an
intelligence lexicon, the glossary purports to be tutorial,
inasmuch as that is possible, and frequent cross-referencing
is a technique employed intentionally to that end.
7
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
The term cross-referenced most often is intelligence
cycle which, with its separately defined steps, is conceptu-
ally fundamental to understanding the vocabulary of intelligence.
The definitional technique is to list the steps in the cycle
as subsets of it (rather than in their normal alphabetical
order in the glossary), ?and to refer many related terms to
the cycle and its various steps. The desired, result, is to
keep the reader's focus on the intelligence cycle in order to
maintain the conceptual integrity of its component steps.
The drafters of the definitions contained in this
glossary were not constrained by existing definitions or by
the narrow meaning of terms where broader significance could
be achieved by redefinition. Known definitions were neverthe-
less accommodated to the greatest extent possible. The
primary objective of the drafters was to define those terms
that lacked definition and to improve on those definitions
extant.
8
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
DRAFT
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
III. MAINTENANCE OF THE GLOSSARY
This publication is intended to be a reference and
guidance document for members of the Intelligence Community.
As such it may be updated or amended at any time by the
Director of Central Intelligence with the advice of the
National Foreign Intelligence Board. proposed corrections,
additions, deletions, or amendments may be forwarded by any
member of the Community to the Executive Secretary, National
Foreign Intelligence Board, who will be responsible for
coordination of proposed changes and, when approved, for
providing appropriate notification to the Intelligence
Community.
An interagency definitions working group will be re-
sponsible for the general administratiOn of the glossary.
It will consider proposals for changing the glossary as they
occur, will review the entire glossary for currency and
adequacy at least annually, and will in each case pass its
recommendations to the National Foreign Intelligence Board.
Approved For Release 2004/03/253 : CIA-RDP80M00596A000500020018-1
25X1 Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020018-1