COMPILATION OF INTELLIGENCE COMMUNITY COMMENTS REGARDING S.2525
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP80M00596A000500020014-5
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
69
Document Creation Date:
December 15, 2016
Document Release Date:
March 10, 2004
Sequence Number:
14
Case Number:
Publication Date:
April 27, 1978
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP80M00596A000500020014-5.pdf | 4.02 MB |
Body:
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
DCI/IC 78-1161
27 April 1978
MEMORANDUM FOR: Mr. Anthony A. Lapham
Counsel. to the Director of Central
Intelligence.
Deputy to the DC1 or Resource
Management
STAT
'SUBJECT; Compilation of Intelligence Community
Comments Regarding S.2525
REFERENCE: Your memorandum of 17 April 1978,
. same subject
1. As I can see from your compilation of comments
on S.2525, definitions of intelligence terms are still
a problem. A Community working group has produced the
attached draft Glossary of Intelligence Terms and Defi-
nitions which may be.of interest to you. Many of its
definitions can, I think, help overcome problems evident
in S.2525.
2. NVIB is currently revie
i
l
t
d
th
t
wing the glossary and,
who has alread
the DCI
s comp
e
,
process
e
once
a
y
,
approved it in draft, will have
outstanding issues. I will see
a chance to resolve any
that you also receive the
Sion. A member of my staff
25X1
is Chairman of the Intelligence e ini-
tions Working Group, and. if he can he of assistance to
you in the meantime, please feel free to call upon him..
STAT
Attachment:
Glossary of Intelligence
Terms and Definitions
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
SUBJECT: Compilation of Intelligence Community Comments
Regarding S.2525
Distribution: (DCI/IC 78/1161)
Orig. - Addressee w/att
1 - OPP Chrono wo/att
1 - OPP Subject w/att
1 - RM Registry w/att
?,T*1T DCI/RM/OPP/PPD
I fm~
(26 Apr 78)
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
I. PREFACE
This publication is designed to provide definitions for
words and terms used frequently in the daily conduct of
business in the Intelligence Community. It is the product
of an interagency working group formed by the National
Foreign Intelligence Board in September 1977, in recognition
of the need for an authoritative and comprehensive glossary
of intelligence terms.
The definitions that appear in this publication have
been carefully constructed to reflect as nearly as possible
an accurate and modern sense of the meaning of each term,
focusing on the potential utility of the definition in each
case. No attempt has been made to include terms which have
no special connotation within the Intelligence Community.
Many technical intelligence terms have not been included for
the reason that their use is restricted to a small specialized
segment of the Community and would not have the broad
applicability that this glossary aims to provide. Additionally,
the limited number of classified terms that might otherwise
be appropriately included in this glossary have been intention-
ally omitted to enable the broadest possible distribution
and use of this publication. Those terms defined here in
unclassified form and which may also have classified. definitions
have not been altered in meaning although form and content
have been modified to protect classified information.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
T,Agpjo~j%~ Sra eetje
primary basis for interdepartmental communication and under-
standing within the Intelligence Community. It is not
intended to restrict intelligence agencies from the use of
identical terms in different contexts when good and suf-
ficient reasons exist. It should be recognized, for example,
that the definitions in this glossary may not coincide pre-
cisely with definitions used elsewhere for departmental or
legal purposes. Neither should the list of terms in this
glossary be considered to be completely exhaustive. Rather,
the glossary should be treated as a living compendium designed
to provide the principal meanings of intelligence terms as
they are understood in the Intelligence Community. Unless
otherwise specified the meanings provided will be used so that
the full value of a standardized glossary may be realized.
Thus, while the definitions found in this glossary will form
the basis for a common Intelligence Community language, they
will serve as well to unify the disparate elements of the
Community as they communicate with other parts of the Executive
Branch and with Congress and the Judiciary.
Authors of other special-use glossaries which contain
intelligence terms should try to align definitions of terms
with those found here as an important step toward language
commonality. Where that is not possible--such as in legislation
2
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
DRA 1'.i.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
or in other public and/or legal documents--the special
applicability of a definition will be recognized for that
purpose but will not be considered to have replaced the
"Community" definition contained here until authorized by
the Director of Central Intelligence.
In addition to the glossary of definitions itself,
other information is contained in this publication which is
designed to enhance its usefulness and contribute to its
instructional value. In the ensuing section, brief treat-
merit is accorded both the methodology and the most cogent,
considerations involved in devising the definitions. In-
cluded in the several appendices are a list of acronyms and
abbreviations related to the terms in the glossary, dupli-
cate definitions of certain glossary terms where they appear
in and for the special purpose of clarifying an executive
order or statute, graphic displays of certain families of
intelligence terms which portray word relationships, and a
reference index of other glossaries which contain intelli-
gence terms and their definitions.
Approved For Release 2004/03/23: CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
II. METHODOLOGY
The definitions in this glossary have been devised by
intelligence officers, not by philologists or semanticists.
Some definitions, therefore, may have limited applicability
outside the Intelligence Community, while other definitions
may be restricted to the single use of a word which has
intelligence significance; as, for example, in the word
"source." Insofar as possible, however, the definitions
included here contain a measure of consistency of form, and
an attempt has been made to establish relationships among
important intelligence words and terms. A basic example ex-
ists in the relationships to be found among "information,"
"intelligence information," and "intelligence." William R.
Corson, in his The Armies of Ignorance, observed:
"A word of caution about the term 'intelligence'
is in order. Too often it is used synonymously or
interchangeably with 'information.' This is inaccurate
and quite misleading. Information until and unless it
has been analyzed and evaluated remains nothing more
than a fact. Information may be interesting, amusing,
or hitherto unknown to the person receiving it, but by
and in itself it is inappropriate to call. it intelli-
gence. The three terms 'intelligence,' 'intelligence
information,' and 'information' need to remain distinct..
Intelligence by itself refers to the meaning of, or a
conclusion about, persons, events, and circumstances
which is derived from analysis and/or logic. Intelli-
gence information consists of facts bearing on a'pre-
viously identifi.ed problem or situation, the signifi-
cance of which has not been completely established.
And information is made of raw facts whose relationship
4
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
to other phenomena has yet to be considered or estab-
lished. Similarly, the methods involved in acquiring
information and/or intelligence information by any
means and turning it into intelligence constitute the
intelligence processor cycle. The distinctions between
these terms are important to remember...."
This glossary makes similar distinctions: "information"
is unevaluated material of every description, "intelligence
information" is information of potential intelligence value,
and "intelligence" is the knowledge derived from a cyclical
processing of information. The articulation of these differ-
ences is fundamental to the repeated use of these terms in
defining other terms. One will find, for example, that
nuclear intelligence is defined as "intelligence" derived
from the collection and analysis of radiation, etc., whereas
communications intelligence is defined as technical and
"intelligence information" derived from the intercept of
foreign communications, etc. (not yet analyzed, it is not
yet "intelligence"). Such fine distinctions are expected to
contribute to a broader understanding of the common meanings
of many such terms.
Arriving at a suitable definition for the word "intel-
ligence" is a challenge unto itself. In Sherman Kent's
Strategic Intelligence for American World Policy, "intelli-
gence" is characterized as having three definitional subsets:
knowledge, organization, and activity. This concept is
particularly useful in establishing the fact that "intelli-
gence" in the current context has multiple meanings.
Approved For Release 2004/03/2,1: CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
"Intelligence," he says, is the knowledge that our
nation must possess regarding other nations in order to
assure itself that its interests will not fail because of
planning or decisionmaking done in ignorance; and upon which
knowledge our. national foreign policy is based. "Intelligence"
is also "an institution;.. .a physical organization of living
people which pursues the special kind of knowledge at issue."
And "intelligence" is the activity which the organization
performs: research, analysis, collection, evaluation,
study, presentation, and myriad others.
As helpful as they are, Kent's definitions are excessively
delimiting for purposes of this glossary. In the sense that
intelligence is knowledge, for example, one cannot assume
that all intelligence is "our" intelligence. It is necessary,
therefore, to fashion the most basic definition possible for
the word "intelligence" in this sense of its meaning, trusting
in the utilizer's ability to. select a proper modifier to
give the word more precise meaning when that is necessary.
More definitional flexibility results from such an approach.
But "intelligence" is more than the knowledge contained
in an intelligence product. It encompasses the intelligence
organizations and activities that Kent refers to, and other
functions in addition to those. It also embraces the
activities--and their resultant products--which are known as
"counterintelligence." For these reasons, one might be
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
tempted to define "intelligence" simply as a generic term
which encompasses both foreign intelligence and foreign
counterintelligence, thence to formulate separate defini-
tions for each of those terms. One quickly discovers,
however, that such a simplistic approach is insufficiently
satisfying because it fails to provide for several shades of
meaning and subsequent use.
The problem is compounded by the scores of different
types of intelligence that are used commonly and which must
be'broadly understood, and by the variety of headings under
which these types of intelligence are classified. Some
types of intelligence are source-oriented (such as human
intelligence or signals intelligence), some form-oriented
(as in raw or unfinished intelligence), some system-oriented
(electronic or telemetric), some subject-oriented (medical,
economic), some use-oriented (military, tactical), and a
probable host of others. But the point to be made here is
how essential the basic definition of "intelligence" is to
further understanding of the many, many ways in which it can
be used. The definition of "intelligence" as it appears in
this glossary attempts to account for all of the foregoing.
The reader will notice frequent cross-referencing between
.terms and their definitions. In addition to providing an
intelligence lexicon, the glossary purports to be tutorial,
inasmuch as that is possible, and frequent cross-referencing
is a technique employed intentionally to that end.
7
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
The term cross-referenced most often is intelligence
cycle which, with its separately defined steps, is conceptu-
ally fundamental to understanding the vocabulary of intelligence.
The definitional technique is to list the steps in the cycle
as subsets of it (rather than in their normal alphabetical
order in the glossary), and to refer many related terms to
the cycle and its various steps. The desired.result is to
keep the reader's focus on the intelligence cycle in order to
maintain the conceptual integrity of its component steps.
The drafters of the definitions contained in this
glossary were not constrained by existing definitions or by
the narrow meaning of terms where broader significance could
be achieved by. redefinition. Known definitions were neverthe-
less accommodated to the greatest extent possible. The
primary objective of the drafters was to define those terms
that lacked definition and to improve on those definitions
extant.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
III. MAINTENANCE OF TILE GLOSSARY
This publication is intended to be a reference and
guidance document for members of the Intelligence Community.
As such it may be updated or amended at any time by the
Director of Central Intelligence with the advice of the
National Foreign Intelligence Board. Proposed corrections,
additions, deletions, or amendments may be forwarded by any
member of the Community to the Executive Secretary, National
Foreign Intelligence Board, who will be responsible for
coordination of proposed changes and, when approved, for
providing appropriate notification to the Intelligence
Community.
An interagency definitions working group will be re-
sponsible for the general administration of the glossary.
It will consider proposals, for changing the glossary as they
occur, will review the entire glossary for currency and
adequacy at least annually, and will in each case pass its
recommendations to the National Foreign Intelligence Board.
Approved For Release 2004/03/03 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
GLOSSARY OF INTELLIGENCE TERMS AND DEFINITIONS
Acoustical intelligence (ACOUSTINT): Technical intelligence
information derived from analysis of acoustic waves radiated
either intentionally or unintentionally by the target into
the surrounding medium. (In Naval usage, the acronym ACINT
is used and usually refers to intelligence derived specITically
from analysis of underwater acoustic waves from ships and
submarines.)
Actionable intelligence: Intelligence information that is
directly useful to customers without having to go through
the full intelligence production process; it may address
strategic or tactical needs, close-support of U.S. nego-
tiating teams, or action elements dealing with such matters
as international terrorism or narcotics.
Administratively controlled information: Privileged but
unclassified material bearing designations such as FOR
OFFICIAL USE ONLY, or LIMITED OFFICIAL USE, to prevent dis-
closure to unauthorized persons.
Advisory tasking: A non-directive. statement of intelligence
interest or a request for intelligence information which is
addressed by an authorized element of the Intelligence
Community to departments or agencies having information
collection capabilities or intelligence assets not a part of
the National Foreign Intelligence Program.
Agent: A person who engages in clandestine intelligence
activity under the direction of an intelligence organization
but who is not an officer, employee, or co-opted worker of
that organization.
Agent of influence: A person who is manipulated by an
intelligence organization to use his position to influence
public opinion or decisionmaking in a manner which will
advance the objective of the country for which that organiza-
tion operates.
Alert memorandum: A document issued by the Director of
Central Intelligence to National Security Council-level
policymakers to warn them of possible developments abroad,
often of a crisis nature, of major concern to the U.S.; it
is coordinated within the Intelligence Community to the
extent time permits.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Analysis: A process in the production step of the intelligence
cycle in which intelligence information is subjected to
review in order to identify significant facts and derive
conclusions therefrom. (See intelligence cycle.)
Assessment: Appraisal of the worth of an intelligence
activity, information, or product in terms of its contribu-
tion to a specific goal, or the credibility, reliability,
pertinency, accuracy, or usefulness of information in terms
of an intelligence need. When used in contrast with evalua-
tion assessment implies a weighing against resource allocation,
expenditure, or risk. (See evaluation.)
Asset: See intelligence asset and national intelligence
asset.
Authentication: (1) A communications security measure do-
signed to provide protection against fraudulent transmission
and hostile imitative communications deception by establish-
ing the validity of a transmission, message, station, or
designator. (2) A means of identifying or verifying the
eligibility of a station, originator, or individual to re-
ceive specific categories of information. (Also see communi-
cations deception.)
Automatic data processing system security: All of the
technological safeguards and managerial procedures established
and applied to computer hardware, software, and data in
order to ensure the protection of organizational assets and
individual privacy; it includes: all hardware/software
functions, characteristics, and features; operational procedures,
accountability procedures, and access controls at the central
computer facility; remote computer and terminal facilities,
management constraints, physical structures and devices;
and the personnel and communication controls needed to
provide an acceptable level of protection for classified
material to be contained in the computer system.
Basic intelligence: Comprises general reference material of
Factual nature which results from a collection of encyclo-
pedic information relating to the political, economic and
military structure, resources, capabilities and vulnerabilities
of foreign nations.
Biographical intelligence: Foreign intelligence on the
views, traits, habits, skills, importance, relationships and
curriculum vitae of those foreign personalities of actual or
potential interest to the United States Government.
2
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Cartographic intelligence: Intelligence primarily mani-
fested in maps and charts of areas outside the United.States
and its territorial waters.
Case officer: A professional employee of. an intelligence
organization who is responsible for providing direction for
an agent operation. (See agent.)
Central Intelligence Agency Program (CIAP): See National
Foreign Intelligence Program.
Cipher: A cryptographic system in which the cryptographic
treatment (i.e., the method of transforming plain-text by
predetermined rules to obscure or conceal its meaning) is
applied to plain-text elements such as letters, digits,
polygraphs or bits which either have no intrinsic meaning or
are treated without regard to their meaning in cases where
the element is a natural-language word.
Clandestine: Secret or hidden; conducted with secrecy by
design.
Clandestine activity: Secret or hidden activity conducted
wit secrecy by design. (The phrase "clandestine operation"
is preferred. Operations are pre-planned activities.)
Clandestine collection: The acquisition of intelligence in-
ormation in ways designed to assure the secrecy of the
operation.
Clandestine communication: See illicit communication.
Clandestine operation: A pre-planned secret intelligence
information collection activity or covert political, economic,
propaganda or paramilitary activity conducted so as to
assure the secrecy of the operation; encompasses both clan-
destine collection and covert action.
Clandestine services: That portion of the Central Intelli-
gence Agency (CIA) that engages in clandestine operations;
sometimes used as synonymous with the CIA Operations Direc-
torate.
Classification: The determination that official information
requires, in the interest of national security, a. specific
degree of protection against unauthorized disclosure, coupled
with a designation signifying that such a determination has
been made; the designation is normally termed a "security
classification". Also see declassification.
Approved For Release 2004/03/2?: CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Classification authorit : Those officials within the Executive
Branch who have been authorized pursuant to an Executive
Order to originally classify information or material.
Classified information: Official information which has been
determined to require, in the interests of national security,
protection against unauthorized disclosure and which has
been so designated.
Code: A cryptographic system in which the cryptographic
equivalents (usually called "code groups"), typically con-
sisting of letters or digits (or both) in otherwise meaning-
less combinations, are substituted for plain text elements
such as words, phrases, or sentences.
Code word: Generally, a word or term which conveys a pre-
arranged meaning other than the conventional:one; specifi-
cally, a word or term chosen to conceal the identity of a
function or action, as distinguished from a "cover" name
which conceals the identity of a person, organization, or
installation. (See cover.)
CODEWORD: A word or term used with a security classifica-
tio to indicate that the material so classified was derived
from a sensitive source and is therefore accorded limited
distribution.
Collateral: All national security information classified
under the provisions of an Executive Order for which special
Intelligence Community systems of compartmentation (i.e.
sensitive compartmented information) are not formally
establishe .
Collection: See intelligence cycle.
Collection guidance: See guidance.
Collection requirement: An expression of intelligence
information needs which requires collection and carries at
least an implicit authorization to commit resources in
acquiring the needed information. (Also see intelligence
requirement.)
Combat information: Unevaluated sensor data, gathered by or
provided directly to the tactical commander which, due to
its highly perishable nature or the criticality of the
situation, cannot be processed into. tactical intelligence in
time to satisfy the user's tactical intelligence requirements.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
4
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Combat intelligence: That knowledge of the enemy, weather,
and geographical features required by a commander in the
planning and conduct of combat operations. (See tactical
intelligence.)
Committee on Exchanges (COMEX): See Director of Central
Intelligence Committee.
Committee on Imagery Requirements and Exploitation (COMIREX):
See Director of Central Intelligence Committee.
Communications cover: See manipulative communications
Communications deception: The deliberate transmission,
retransmission, alteration, absorption, or reflection of
telecommunications in a manner intended to cause a mislead-
ing interpretation of these telecommunications. It includes:
a. Imitative communications deco tion--Intrusion
into the enemy's communications channels for the
purpose of deceiving him by introducing signals or
traffic in imitation of his own communications.
b. Manipulative co.mnunications deception--Regulated
insertion of misleading material into one's own tele-
communications channels for the purpose of presenting a
false picture to the enemy.
Communications intelligence (COMINT): Technical and intel-
ligence information derived from intercept of foreign
communications by other than the intended recipients; it
does not include the monitoring of foreign public media or
the intercept of communications obtained during the course
of counterintelligence investigations within the United
States.
Communications security (COMSEC): The protection resulting
from the application of any measures taken to deny unautho-
rized persons information of value which might be derived
from telecommunications, or to ensure the authenticity of
such telecommunications.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Communications security signals acquisition and analysis:
The acquisition of radio frequency propagation and its
subsequent analysis to determine empirically the vulnera-
bility of the transmission media to interception by hostile
intelligence services; it includes cataloging the transmis-
sion spectrum and taking signal parametric measurements as
required but does not include acquisition of information
carried on the system; it is one of the techniques of com-
munications security surveillance. (See communications
security surveillance.)
Communications security surveillance: The systematic
examination of telecommunications to determine the adequacy
of communications security measures: to identify communica-
tions security deficiencies, to provide data from which to
predict the effectiveness of proposed communications security
measures, and to confirm the adequacy of such measures after
implementation.
Community On-Line Intelligence Network System (COINS): A
network of Intelligence Community computer-based information
storage and retrieval systems that have been interconnected
for interagency sharing of machine formatted files.
Compartmentation: Formal systems of restricted access
established an or managed by the Director of Central In-
telligence to protect the sensitive aspects of sources,
methods, and analytical procedures of foreign intelligence
programs. (Also see decompartmentation.)
Compromise: The exposure of.classified official information
or activities to persons not authorized access thereto;
hence, unauthorized disclosure. (Also see-classified informa-
tion.)
Compromising emanations: Unintentional data-related or
intelligence-bearing signals which could disclose classified
information being transmitted, received, or handled by any
information-processing equipment.
Computer security: The computer-driven aspects of automatic
data processing system security encompassing the mechanisms
and techniques that control access to or use of the'computer
or information stored in it. (See automatic data processing
system security.)
Consolidated Cryptologic Program (CCP): See National Foreign
Intelligence Program.
Approved For Release 2004/03/23 : CI"A-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Consolidated Intelligence Resources Information System (CIRIS):
I'ie automated management information system used to identify
and display the expected distribution of all intelligence
resources within the National Foreign Intelligence Program.
Consumer: See customer.
Co-opted worker: A national of a country but not an'officer
or employee of the country's. intelligence service who assists
that service on a temporary or 'regular basis. (In most
circumstances a co-opted worker is an official of the country
but might also be, for example, a tourist or student.)
Coordination: (1) (In general) The process of seeking
concurrence from one or more groups, organizations, or
agencies regarding a proposal or an activity for which they
share some responsibility, and which may result in contribu-
tions,concurrences or dissents. (2) (In intelligence
production) The process by which producers gain the views of,
other producers on the adequacy of a specific draft assess-
ment, estimate, or report; it is intended to increase a
product's factual accuracy, clarify its judgments, resolve
disagreement on issues that permit., and sharpen statements
of disagreement on major unresolved issues.
Counterintelligence: See foreign counterintelligence.
Cover: Protective guise used by a person, organization, or
installation to prevent identification with clandestine ac-
tivities.
Covert: See clandestine.
Covert action: A clandestine operation designed to influence
foreign governments, events, organizations, or persons in
support of United States foreign policy; it may include
political, economic, propaganda, or paramilitary activities.
(Also known as "special activities" as defined in Executive
Order No. 1203.6; see Appendix .)
Covert operation: See clandestine operation (preferred
term). A covert operation encompasses covert action and
clandestine collection.
Critical Collection Problems Committee (CCPC): See Director
of Central Intelligence Committee.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80.M00596A000500020014-5
Critical intelligence: Intelligence information or intelligence
of such urgent importance to the security of the United
States that it is transmitted at the highest priority to the
President and other national decisionmaking officials before
passing through regular evaluative channels.
Critical Intelligence Communications System (CRITICOMM):
Those communications facilities under the operational and
technical control of the Director, National Security Agency
which have been allocated for the timely handling of critical
intelligence. (See critical intelligence.)
Critical intelligence message (CRITIC): A message designated-
as containing critical intelligence. -(See critical intelli-
gence.)
Cryptanalysis: The. steps or processes involved in converting
encrypted messages into plain text without initial knowledge
of the system or key employed in the encryption.
CRYPTO: A designation which is applied to classified,
cryptographic information which involves special rules for
access and handling. (See cryptographic information.)
Cryptographic information: All information significantly
descriptive o cryptographic techniques and processes or of
cryptographic systems and equipment, or their functions and
capabilities, and all cryptomaterial ("significantly descriptive"
means that the information could, if made known to unauthorized
persons, permit recovery of specific cryptographic features
of classified crypto-equipment, reveal weaknesses of associated
equipment which could allow recovery of plain text or. of
key, aid materially in the cryptanalysis of a general or
specific cryptosystem, lead to the cryptanalysis of an
individual of a message, command, or authentication); it is
normally identified by the bold letter marking "CRYPTO" and
is subject to the special safeguards required by that
marking. (See CRYPTO.)
Cryptographic security: The component of communications
security that results from the provision of technically
sound cryptographic systems and which provides for their
proper use.
Cryptographic system: All associated items of cryptomaterial
e.g., equipment and. their removable components which per-
form cryptographic functions, operating instructions, and
maintenance manuals) that are used as a unit to provide a
single means of encryption and decryption of plain text so
that its meaning may be concealed; also. any mechanical or
Approved For Release 2004/03/23 $CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
electrical device or method used for the purpose of disguising
authenticating, or concealing the contents, significance, or
meanings of communications; short name: cryptosystem.
Cryptography: The branch of cryptology used to provide a
means of encryption and deception of plain text so that its
meaning may be concealed.
Cryptolo i.c activities: The activities and operations
involved in tie production of signals intelligence and the
maintenance of communications security.
Cryptology: The branch of knowledge which treats the
principles of cryptography and cryptanalysis and is used to
produce signals intelligence and maintain communications
security. (See cryptography and cryptanalysis.)
CCrtomaterial: All material (including documents, devices,
or equipment that contains cryptographic information and is
essential to the encryption, decryption, or authentication
of telecommunications.
Cryptosecurity: Shortened form of cryptographic security.
See above.
Cryptosystem: Shortened form of cryptographic system. See
above.
Current intelligence: Intelligence of all types and forms
of immediate interest to the users of intelligence; it may
be disseminated without the delays incident to complete
evaluation, interpretation, analysis, or integration.
Customer: A person who uses intelligence or intelligence
information either to produce other intelligence or directly
in the decisionmaking process; it is synonymous with consumer
and user.
Damage assessment: (1) (Intelligence Community context.) An
evaluat of nee impact of a compromise in terms of loss of
:intelligence information, sources or methods, and which may
describe and/or recommend measures to minimize damage and
prevent future compromises. (2) (Military context.) An
appraisal of the effects of an attack on a nation's military
forces to determine residual military capability and to
support planning for recovery and reconstitution.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
DCID 1/2 Attachment: An annual publication by the Director
of Central Intelligence (DCI) which establishes a priorities
classification system; presents requirements. categories and
foreign countries in a geotopical matrix, against which
priorities are assigned which provide the Intelligence
Community with basic substantive priorities guidance for the
conduct of all.U.S. foreign intelligence activities; it
includes a system for adjusting priorities between annual
publications; priorities are approved by the DCI with the
advice of the National Foreign Intelligence Board. (See
priority.)
Deception: Those measures designed to mislead.a foreign
power, organization or person by manipulation, distortion,
or falsification of evidence to induce him to react in a
manner prejudicial to his interests.
Declassification: Removal of official information from the
protective status afforded by security classification; re-
quires a determination that disclosure no longer bears on
national security. (Also see classification.)
Decode: To convert an encoded message into plain text.
Decompartmentation: The removal of information from a
compartmentation system without altering the information to
conceal sources, methods, or analytical procedures. (Also
see compartmentation.)
Decrypt: To transform an encrypted communication into its
equivalent plain text.
Decipher: To convert an enciphered communication into its
equivalent plain text.
Defector: A national of a designated country who has escaped
from its control or who, being outside its jurisdiction and
control, is unwilling-to return and who is of special value
to another government because he is able to add valuable new
or confirmatory intelligence information to existing, knowledge
about his country.
Defense Intelligence Communit Refers to the Defense
Intelligence Agency (DIA , the National Security Agency
(NSA) and the Military Services' intelligence offices
including Department of Defense (DoD) collectors of spe-
cialized intelligence through reconnaissance programs.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Departmental intelligence: Foreign intelligence produced
and used within a governmental department or agency in order
to meet the unique requirements of the department or agency
mission.
Direction finding (DP): A procedure for obtaining bearings
on radio frequency emitters with the use of a direc-tional
antenna and a display unit on an intercept receiver of
ancillary equipment.
Director of Central Intelligence (DCI): The President's
principal foreign intelligence adviser appointed by him with
the consent of the Senate to be the head of the Intelligence
Community and Director of the Central Intelligence Agency
and to discharge those authorities and responsibilities as
they are prescribed by law and by Presidential and National
Security Council directives.
Director of Central Intelligence Committee: Any one of
several committees established by the Director of Central
Intelligence (DCI) to advise him and to perform whatever
functions he shall determine; DCI Committees usually deal
with Intelligence Community concerns, and their terms of
reference ordinarily are specified in DCI Directives;
members may be drawn from all components of the Intelligence
Community. (See Director of Central Intelligence Directive.)
Director of Central Intelligence Directive (DCID): A
rclie cove issue by the Director of Central Intelligence
which outlines general policies and procedures to be followed
by intelligence agencies and organizations which are under
his direction or overview.
Disaffected person: A person who either through inducement
or voluntary action has indicated the willingness or desire
to defect.
Disclosure: The authorized release of classified information
through approved channels.
Dissemination: See intelligence cycle.
Domestic collection: The acquisition of foreign intelligence
in ormation within the United States from governmental or
nongovernmental organizations or individuals who are witting
sources and choose to cooperate by sharing such information.
11
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Double agent: An agent who is cooperating with an intelligence
service of one government on behalf of and under the control
of an intelligence or security service of another government,
and is manipulated by one to the detriment of the other.
Downgrade: To change a security classification from a
higher to a lower level.
Economic intelligence: Foreign intelligence concerning the
production, distribution and consumption of goods and services,
.labor, finance, taxation, and other aspects of the interna-
tional economic system.
Economic Intelligence Committee (EIC): See Director of
Central Intelligence Committee.
Electro-0 tical intelligence (ELECTRO-OPTINT): Intelligence
information derived from the optical monitoring of the
electromagnetic spectrum from ultraviolet (0.01 micrometers)
through far (long wave length) infrared (1,000 micrometers).
Also see optical intelligence.
Electronic countermeasures (ECM): That division of electronic
warfare involving actions to en to prevent or reduce an
enemy's effective use of the electromagnetic spectrum.
Electronic countermeasures include electronic jamming, which
is the deliberate radiation, reradiation, or reflection of
electromagnetic energy with the object of impairing the uses
of electronic equipment used by an enemy; and electronic
deception, which is similar but is intended to mislead an
enemy in the interpretation of information received by his
electronic system.
Electronic counter-countermeasures (ECCM): The division of
electronic warfare involving actions taken to ensure the
effective use of the electromagnetic spectrum despite an
enemy's use of electronic countermeasures. (See electronic
warfare.)
Electronic emission security: Those measures taken to
protect all transmissions from interception and electronic
analysis.
Electronic intelligence (FLINT): Technical and intelligence
information derived from foreign noncommunications electro-
magnetic radiations emanating from other than atomic detona-
tion or radioactive sources.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23: CIA-RDP80M00596A000500020014-5
Electronic order of battle (EOB): A listing of non-communications
electronic devices including site designation, nomenclature,
location, site function and any other pertinent information
obtained from any source and'which has military significance
when related to the devices.
Electronic security (ELSEC): The protection resulting from
all measures designed to deny unauthorized persons information
of value which might be derived from their intercept and
analysis of non-communications electromagnetic radiations;
e.g., radar.
Electronic surveillance: The acquisition of a non-public
communication by electronic means without the consent of a
person who is a party to the communication, but not including
radio direction finding used solely to determine the location
of a transmitter.
Electronic warfare (EW): Military action involving the use
of electromagnetic energy to determine, exploit, reduce, or
prevent hostile use of the electromagnetic spectrum, and
action which retains friendly use of the electromagnetic
spectrum. (The three divisions of electronic warfare are:
electronic warfare support measures, electronic counter-
measures, and electronic counter-countermeasures.)
Electronic warfare support measures (ESM): That division of
electronic warfare involving actions to search for, inter-
cept, locate, record, and analyze radiated electromagnetic
energy for the purpose of exploiting such radiations in
support of military operations; thus, electronic warfare
support measures provide a source of electronic warfare
information which may be used for immediate action involving
conduct of electronic countermeasures, electronic counter-
countermeasures, threat detection and avoidance, target
acquisition, and homing.
Emanations: See noncommunications emanations.
Emanations security (EMSEC): The protection resulting from
all measures designed to deny unauthorized persons information
of value which might be derived from intercept and analysis
of compromising emanations from other than cryptographic
equipment and telecommunications systems. (Also see emis-
sion security.)
Emigre: A person who departs from his country for any law-
ful reason with the intention of permanently resettling
elsewhere. (Also see refugee.)
Approved For Release 2004/03/23 : ql x RDP80M00596A000500020014-5
Approved For Release 2004/03/23 CIA-RDP80M00596A000500020014-5
Emission security: The component of communications security
resulting from all measures taken to deny to unauthorized
persons information of value which might be derived from
intercept and analysis of compromising emanations from
cryptographic equipment and telecommunications systems.
(Also see emanations security.)
Encode: To convert plain text into a di-fferent form by
means of a code.
Encrypt: To convert plain text into a different form in
order to conceal its meaning.
Encipher: To encrypt plain text by means of cipher. (See
cipher.)
End product: See finished intelligence. (Also se.e product.)
Energy intelligence: Intelligence relating to the technical,
economic an political capabilities and programs of foreign
countries to engage in development, utilization and commerce
of basic and-advanced energy technologies; it includes: the
location and extent of foreign energy resources and their
allocation; foreign government energy policies, plans and
programs; new and improved foreign energy technologies; and
economic and security aspects of foreign energy supply,
demand, production distribution, and utilization.
Espionage: Intelligence activity directed toward the
acquisition of information through clandestine means and
illegal in the territory in which it takes place.
Essential elements of information (EEI): Those items of
intelligence information essential for timely decisions and
to enhance operations and which relate to foreign power,,
forces, targets or the physical environment.
Estimative intelligence: A category of intelligence pro-
duction which attempts to project future foreign develop-
ments and their implications for U.S. interests; it may or
may not be coordinated and may be either national or depart-
mental intelligence.
Evaluation: Appraisal of the worth of an intelligence
activity, information, or product in terms of its contribu-
tion to a specific goal; or the credibility, reliability,
pertinency, accuracy, or usefulness of information in terms
of an intelligence need. Evaluation may be used without
reference to cost or risk, particularly when contrasted with
assessment. (See assessment); it is also a process in the
production step of the intelligence cycle. (See intelligence
cycle.)
14
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Evasion and escape (ESE): The procedures and operations
whereby military personnel and other selected individuals
are enabled to emerge from enemy-held or hostile areas to
areas under friendly control.
Evasion and escape intelligence: Processed intelligence
in ormation prepared to assist personnel to evade capture if
lost in enemy-dominated territory or to escape if captured.
Exploitation: The process of obtaining intelligence informa-
tion from any source and taking full advantage of it for
intelligence purposes. (Also see source.)
Finished intelligence: The result of the production step of
the intelligence cycle; the intelligence product. (See
intelligence cycle.)
Foreign affairs communit : Those U.S. Government departments.,
agencies, and other organizations which are represented in
U.S. diplomatic missions abroad, and those which may not be
represented abroad but are significantly involved in inter-
national activities with the governments of other nations.
.Foreign counterintelligence (FCI): Intelligence activity,
with its resultant product, intended to detect, counteract,
and/or prevent espionage and other clandestine intelligence
activities, sabotage, international terrorist activities or
assassinations conducted for or on behalf of foreign powers,
organizations or persons; it does not include personnel,
physical, document, or communications security programs.
Foreign instrumentation signals (FIS): Electromagnetic
emissions associated with the testing and operational deploy-
ment of non-U.S. aerospace, surface, and sub-surface systems
which may have either military or civilian application; it
includes but is not limited to the signals from telemetry,
beaconry, interrogators, track/fusing/arming/command systems,
and video data links.
Foreign instrumentation signals intelligence (FISINT):
Technical and intelligence information derived from inter-
cept of foreign instrumentation signals (see above).
Foreign intelligence (FI): The product of collection,
processing, and analysis of intelligence information about
a foreign power and which is significant to the national
security, foreign relations, or economic interests of the
United States, and which is provided by a government agency
that is assigned an intelligence mission (i.e., an intelli-
gence agency).
Approved For Release 2004/03/23 : d;l5A-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Foreign intelligence service: An organization of a foreign
government which engages in intelligence activities.
Foreign material (FORMAT) intelligence: Intelligence derived
from the exploitation of foreign materiel.
Foreign official: A foreign national acting in an official
capacity on behalf of a foreign power, attached to a foreign
diplomatic establishment or an establishment under the
control of a foreign power, or employed by a pub.lic inter-
national organization.
Forward looking infrared (FLIR): An airborne system used
or producing i.n rare ground images the dimensions of which
are determined. by the forward motion of the aircraft and by
scanning across its flight path.
Fusion: The blending of intelligence information from
multiple sources to produce a single intelligence product.
Fusion center: A term used within the Department of Defense
re erring to an organization having the responsibility of
blending both compartmented intelligence information with
all other available information in order to support military
operations. (See actionable intelligence and tactical
intelligence.)
General Defense intelligence Program (GDIP): See National
Foreign Intelligence Program.
Geographic(al) intelligence: Foreign intelligence dealing
with the location, description, and analysis of physical and
cultural factors of the world, (e.g., terrain, climate,
natural resources, transportation, boundaries, population
distribution) and their changes through time.
Guidance: Advice which identifies, interprets, clarifies,
and/or expands upon an information need. (See information
need.)
Human intelligence (HUMINT): A category of intelligence
in ormatjon derived from iuman sources. (See human source
reporting and human resources collection.)
Human resources collection: All activities which attend
collection of intelligence information from human sources.
(See human intelligence and human source.)
Human Resources Committee (IIRC): See Director of Central
ntelligence Committee.
Approved For Release 2004/03/23 : CIA17IgDP80M00596A000500020014-5
Approved For Release 2004/03/23 CIA-RDP80M00596A000500020014-5
Human source: A person who wittingly or unwittingly conveys
by any means information of potential intelligence value to
an intelligence activity.
Human source reporting: The flow of intelligence information
from those who gather it to the customer; it may come from
information gathering activities either within or outside
the Intelligence Community. (A form of the term is also
used to denote an item of information being conveyed, as in
"human source. report.") (See human intelligence.)
Illegal: An officer or employee of an intelligence organiza-
tion who is dispatched abroad and who has no overt connection
with the intelligence organization with which he is connected
or with the government operating that intelligence organization.
Illegal agent: An agent operated by an illegal residency or
diitectly by the headquarters of an intelligence organization.
Illegal communication: An electronic communication or
signal made without the legal sanction of the nation where
it originates.
Illegal residency: An intelligence apparatus established in
a foreign country and composed of one or more intelligence
officers, and which has no apparent connection with the
sponsoring intelligence organization or with the government
of the country operating the intelligence organization.
(Also see legal residency.)
Illicit communication: An electronic communication or
signal originated in support of clandestine operations; it
is also called clandestine communication.
Imagery: Representations of objects reproduced electronically
or by optical means on film, electronic display devices, or
other media.
Imagery intelligence: The collected products of imagery
interpretation processed for intelligence use. (See
imagery interpretation below.)
Imagery interpretation (II): The process of locating,
recognizing, identifying, and describing objects, activities,
and terrain represented by imagery; it includes photographic
interpretation.
Imitative communications deception: See communications
deception.
Approved For Release 2004/03/23 : YFA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Imitative deception: The introduction into enemy channels
of electromagnetic radiations which imitate his own emissions.
Indications and warning (IF;W): Those intelligence activities
intended to detect and report time-sensitive intelligence
information on foreign developments that could involve a
threat to U.S. or allied military, political, or economic
interests, or to U.S. citizens abroad. It encompasses
forewarning of: enemy hostile actions or intentions; the
imminence of hostilities; serious insurgency; nuclear/non-
nuclear attack on the U.S., its overseas forces, or allied
nations; hostile reactions to U.S. reconnaissance activities;
terrorist attacks; and other similar events.
Information: Unevaluated material of every description, at
all levels of reliability, and from any source which may
contain intelligence information. (See intelligence informa-
tlon.)
Information handling: Management of data and information
which may occur in connection with any step in the intelli-
gence cycle; such management may involve activities to
transform, manipulate, index, code, categorize, store,
select, retrieve, associate or display intelligence'materials;
it may involve the use of printing, photographic, computer
or communications equipment, systems or networks; it may
include software programs to operate computers and to process
data and/or information; and may include information contained
in reports, files, data bases, reference services and libraries.
Information Handling Committee (II-IC) : See Director of
Central Intelligence Committee.
Information security: Safeguarding knowledge against un-
authorized disclosure; or, the result of any system of
administrative policies and procedures for identifying,
controlling, and protecting from unauthorized disclosure or
release to the public, information the protection of which
is authorized by executive order or statute.
Information need: The requirement of an official involved
in the policymaking process or the intelligence production
process for the best available information and intelligence
on which to base policy decisions, recommendations, or
intelligence production.
Infrared imagery: A likeness or impression produced as a
result of sensing electromagnetic radiations emitted or
reflected from a given target surface in the infrared portion
of the electromagnetic spectrum.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
18
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Integration: A process in the production step of the intelligence
cycle in which a pattern is formed through the selection and
combination of evaluated intelligence information. (See
intelligence cycle.)
Intelligence: (1) Knowledge acquired and furnished in
response to the known or perceived requirements of decision-
makers which is derived principally from information which
is normally concealed or not intended to be available for
use by the acquirer; it is the product of a cyclical process.
(See intelligence cycle.)
Examples:
-- Policy development requires good intelligence.
-- Timely intelligence is important to informed
decisionma ing.
(2) A term used to refer collectively to the functions,
activities, or organizations which are involved in the
process of planning, gathering, and analyzing information of
potential value to decisionmakers and to the production of
intelligence as defined in (1) above. (See foreign intelligence
and foreign counterintelligence.)
Examples:
- Human source collection is an important intelligence
activity.
-- Central Intelligence Agency.
-- Intelligence is a demanding profession.
Intelligence activity(ies): A generic term used to encompass
any or all of the efforts and endeavors undertaken by intelligence
organizations. (See intelligence organization.)
Intelligence agency: A component organization of the Intelligence
Community. (See Intelligence Community.)
Intelligence assessment: A category of intelligence production
t T-F at encompasses most analytical studies dealing with subjects
of policy significance; it is thorough in its treatment
of subject matter--as distinct from building-block papers,
research projects, and reference aids--but unlike estimates
may not attempt to project future developments and their
implications; it may or may not be coordinated.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
19
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Intelligence asset: Any resource--person, group, instrument,
installation, or technical system--at the disposal of an
intelligence organization.
Intelligence collector: A phrase sometimes used to refer to
an organization or agency that engages in the collection
step of the intelligence cycle. (See intelligence cycle.)
Intelligence Community (IC): A term which, in-the aggregate,
refers to those Executive Branch organizations and activities
composed of: the Central Intelligence Agency (CIA); the
National Security Agency (NSA); the Defense Intelligence
Agency (DIA); offices within the Department of. Defense for
the collection of specialized national foreign intelligence
through reconnaissance programs; the Bureau of Intelligence
and Research (INR) of the Department of State; intelligence
elements of the military services; intelligence elements of
the Federal Bureau of Investigation (FBI); intelligence
elements of the Department of Treasury; intelligence elements
of the Department of Energy; intelligence elements of the
Drug Enforcement Administration; and staff elements of the
Office of the Director of Central Intelligence.
Intelligence Community Staff (IC Staff): A term referring
to an organization under the. direction and control of the
Director of Central Intelligence (DCI) formed to assist the
DCI in discharging his responsibilities relating to the
Intelligence Community.
Intelligence consumer: See customer.
Intelligence cycle: The processes by which information is
,acquire and converted into intelligence and made available
to users. There are usually five steps in the cycle:
a. Planning and direction--determination of intelli-
gence requirements, preparation of a collection plan,
issuance of orders and requests to information collec-
tion entities, and a continuous check on the productivity
of collection entities.
b. Collection--acquisition of information or intelli-
gence information and the provision. of this to processing
and/or production elements.
c. Processing--conversion of collected information
into intelligence information and a form suitable to
the production of'intelligence.
Approved For Release 2004/03/23 : CItkaRDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
d. Production--conversion of information or intelli-
gence information into finished intelligence through
the integration, analysis, evaluation and/or inter-
pretation of all available data and the preparation of
intelligence products in support of known or anticipated
user requirements.
e. Dissemination--conveyance of intelligence in suitable
form to users.
Intelligence estimate: The product of estimative intelli-
gence.
Intelligence information: Information of potential intelli-
gence value concerning the capabilities, intentions and
activities of any foreign power, organization, or associated
personnel.
Intelligence information report: A report which disseminates
foreign intelligence information.
Intelligence officer: A professional employee of an intelligence
organization who is engaged in intelligence activities.
Intelligence organization: A generic term used to refer to
any organization engaged in intelligence activities; it may
include either an intelligence agency or a foreign intelli-
gence service, or both. (See intelligence agency and foreign
intelligence service.)
-Intelligence Oversight Board (IOB): A body formed by appoint-
ment o the President to provide him and the Attorney General
with reports and advice on the legality and propriety of
intelligence activities; membership and duties are expressed
in Executive Order 12036.
Intelligence producer: A phrase usually used to refer to an
organization or agency that participates in the production
step of the intelligence cycle. (See intelligence cycle.)
Intelligence related activities (IRA): Those activities
specifically excluded from the National Foreign Intelligence
Program which: respond to departmental or agency tasking
for time-sensitive information on foreign activities, re-
spond to national Intelligence Community advisory tasking of
collection capabilities which have a primary mission to
support departmental or agency missions or operational
forces, train personnel for intelligence duties, or are
devoted to research and development for intelligence and re-
lated capabilities.
Approved For Release 2004/03/23 : GJ.-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Intelligence report: A product of the analysis of foreign
1 to elligence information.
Intelligence requirement: Any subject, general or specific,
upon which there is a need for the collection of intelligence
information or the production of intelligence. (Also see
collection requirement.)
Intelligence user: See customer.
Interagency Defector Committee (IDC): See Director of
Central Intelligence Committee.
Interagency intelligence memorandum (IIM): A national
intelligence assessment or estimate issued by the Director
of Central Intelligence with the advice of appropriate
National Foreign Intelligence Board components.
Intercept(ion): Acquisition for intelligence purposes of
electromagnetic signals (such as radio communications) by
electronic collection equipment without the consent of the
communicators.
Intercept station: A station which intercepts communications
or non-communications transmissions for intelligence purposes.
Interdepartmental intelligence: Integrated departmental in-
telligence required by departments and agencies of the U.S.
government for the execution of their missions but which
transcends the competence or interest of a single department
or agency.
International lines of communications (ICL): Those communica-
tions services which are under the supervision of the Inter-
national Telecommunication Union and which carry paid public
communications traffic between different countries; also
known as: International Civil Communications, International
Commercial Communications, Internationally-Leased. Communica-
tions, International Service of Public Correspondence, and
commercial communications.
International terrorist activit : The calculated use of
violence, or the threat o violence, to attain political
goals through fear, intimidation or coercion; usually
involves a criminal act, often symbolic in nature, and is
intended.to influence an audience beyond the immediate
victims. International terrorism transcends national. boundaries
in the carrying out of the act, the.purpose of the act, the
nationalities of the victims, or the resolution of the
incident; such an act is usually designed to attract wide
publicity in order to focus attention on the existence,
cause, or demands of the perpetrators.
Approved For Release 2004/03/23 : CIZAZ-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Interpretation: A process in the production step of the
intelligence cycle in which the significance of information
or intelligence information is weighed relative to the
available body of knowledge. -(See intelligence cycle.)
Joint Atomic Energy Intelligence Committee (JAEIC): See
Director of Central Intelli ence Committee.
Joint intelligence: (1) (Military context.) Intelligence
produce elements-of more than one military service of
the same nation. (2) (Intelligence Community context.)
Intelligence produced by intelligence organizations of more
than. one country.
Legal residency: An intelligence apparatus in a foreign
country ancomcomposed of intelligence officers assigned as
overt representatives of their government but not necessarily
idbntified'as intelligence officers. (Also see illegal
residency.)
Manipulative communications cover: Those measures taken to
alter or conceal tie ciaracteristics of communications so as
to deny to any enemy or potential enemy the means to identify
them.' Also known as. communications cover.
Manipulative communications deception: See communications
deception.
Manipulative deception: The alteration or simulation of
rien ly electromagnetic radiations to accomplish deception.
Measurement and signature intelligence (MASINT): Scientific
an.technical intelligence in ormation obtained' by quantitative
and qualitative analysis of data (metric, angle, spatial,
wavelength, time dependent, modulation, plasma, and hydromag-
netic) derived from specific technical sensors for the
purpose of identifying any distinctive features associated
with the source, emitter, or sender and to facilitate sub-
sequent identification and/or measurement.of the same.
Medical intelli ence (MEDINT): Foreign intelligence related
to all aspects of foreign natural and man-made environments
which could influence the health of military forces; it
incorporates General Medical Intelligence (GMI), which is
concerned with foreign biological medical capabilities and
health situations, and medical scientific and technical
intelligence which assesses and predicts technological
advances of medical significance, to include defense against
Chemical, Biological; Radiological (CBR) Warfare; it applies
to both tactical and strategic planning and operations,
including military and humanitarian efforts.
Approved For Release 2004/03/23 : GIA-RDP80M00596A000500020014-5
Approved For Release 2004103/23 : CIA-RDP80M00596A000500020014-5
Military intelligence (MI): Basic, current., or estimative
intelligence on any foreign military or military-related
situation or activity.
Monitor: To observe, listen to, intercept, record, or
transcribe any form of communication or media for col-
lection of intelligence information or communications security
purposes, either overtly or covertly.
Multi-level security: (For automatic data processing (ADP)
systems. Provisions for the safeguarding of all information
within a multi-level information handling system. The multi-
level information handling system permits. various levels,
categories, and/or compartments of material to be concurrently
stored and processed in a remotely-accessed resource-sharing
ADP system, while simultaneously permitting material to be
selectively accessed and manipulated from variously controlled
terminals by personnel having different security clearances
and access approvals. Security measures are therefore aimed
at ensuring proper matches between information security and
personnel security. (Also see uni-level security.)
National estimate: (See national intelligence estimate.)
National Foreign Assessment Center (NFAC): An organization
established y an un er the control and supervision of the
Director of Central Intelligence, which is responsible for
production of national intelligence.
National Foreign Intelligence Board (NFIB): A body formed
to provide the Director of Central Intelligence (DCI) with
advice concerning: production, review, and coordination of
national foreign intelligence; the National Foreign Intel-
ligence Program budget; interagency exchanges of foreign
intelligence information; arrangements with foreign govern-
ments on intelligence matters; the protection of intelligence
sources or methods; activities of common concern; and such
other matters as are referred to it by the DCI. It is composed
of the DCI (chairman), and other appropriate officers of the
Central Intelligence Agency, the Office of the DCI, Department
of State, Department of Defense, Department of Justice,
Department of the Treasury, Department of Energy, the offices
within the Department of Defense for reconnaissance programs,
the Defense Intelligence Agency, the National Security.
Agency, and the Federal Bureau of Investigation; senior
intelligence officers of the Army, Navy, and Air Force
participate as observers; a representative of the Assistant
to the President for National Security Affairs may also
attend meetings as .an observer.
Approved For Release 2004/03/23 : Ci RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
National Foreign Intelligence Program (NFIP): A program
aggregating the programs of the Central Intelligence Agency;
the Consolidated Cryptologic Program; the programs of the
offices within the-Department of Defense for the collection
of specialized national foreign intelligence through recon
naissance (except such elements as the Director of Central
Intelligence and the Secretary of Defense agree should be
excluded); the elements of the General Defense Intelligence
Program; and other programs of agencies within the Intelli-
gence Community designated by the President or jointly by
the Director of Central Intelligence and the head of the
department as national foreign intelligence or-national
foreign counterintelligence activities; and activities of
the staff elements of the Office of the Director of Central
Intelligence.
National intelligence: Foreign intelligence collected by assets
funded in the NFIP and. then evaluated under the aegis of the
Director of Central Intelligence and intended primarily to
be responsive to the needs of the President, the National
Security Council and other Federal officials involved in the
formulation and execution of national security, foreign
political and/or economic policy.
National intelligence asset: An intelligence asset, the
primary purpose of which is the collection, or processing of
intelligence information and the production of national
intelligence. (See intelligence asset and national in-
telligence.)
National intelligence estimate (NIF): A thorough assessment
of a situation in the foreign environment which is relevant
to the formulation of foreign, economic, and national security
policy, and which projects probable future courses of action
and developments; it is structured to illuminate differences
of view within the Intelligence Community; it is issued by
the Director of Central Intelligence with the advice of the
National Foreign Intelligence Board.
National Intelligence Officer (NIO): The senior staff
officer of the Director of Central Intelligence (DCI)'and
the DCI's Deputy for National Intelligence for an assigned
area of substantive responsibility.; he manages estimative
and interagency intelligence production on behalf of the
DCI; he is the principal. point of contact between the DCI
and intelligence consumers below the cabinet level; he is
charged with monitoring and coordinating that portion of the
National Foreign Assessment Center's production that involves
more than one office or that is interdisciplinary in character;
and he is a primary source of national-level substantive
guidance to Intelligence Community planners, collectors, and
resource managers.
Approved For Release 2004/03/23 : CILA5RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
National Intelligence Tasking Center (NITC): The central
organizational mechanism establ.islied under the direction,
control and management of the Director of Central Intelli-
gence for coordinating and tasking national foreign intelli-
gence collection activities, and for providing advisory
tasking to other intelligence and information gathering
activities.
National securit : The territorial integrity, sovereignty,
an international freedom of action of the United States.
(Intelligence activities relating to national security
encompass all the military, economic, political., scientific
and technological and other aspects of foreign developments
which pose actual or potential threats to U.S. national
interests.)
National/tactical interface: A relationship between national
an tactical intelligence activities encompassing the full
range of fiscal, technical, operational, and programmatic
matters.
Near-real-time: The brief interval between the collection
o in ormati.on regarding an event and reception. of the data
at some other location, caused by the time. required for
processing, communications and display.
Net assessment: A comparative review and analysis of opposing
national strengths, capabilities, vulnerabilities and weaknesses.
(Ari intelligence net assessment involves only foreign countries.)
Noncommunications emanations: That class of radiations
which are emitte intentionally or unintentionally by
electrical or electronic equipment for purposes other than
communications; e.g., by radars, navigational aids, jammers,
or remote control systems.
Nuclear intelligence (NUCINT): Intelligence derived from
the collection an analysis of radiation and other effects
resulting from the detonation of nuclear devices or from
radioactive sources.
Nuclear roliferation intelli once: Foreign intelligence
relating to 1 scl.entltic, technical and economic capa-
bilities and programs and the political plans and intentions
of nonnuclear weapon states (NNWS) or foreign organizations
to acquire nuclear weapons and/or to acquire the requisite
special nuclear materials (SNM) and to carry on research,
development and manufacture of nuclear explosive devices,
and; (2) the attitudes, policies and actions of foreign
nuclear supplier countries or organizations within these
Approved For Release 2004/03/23 : CF1 -RDP80M00596A000500020014-5
Approved For Release 2004/03/23 CIA-RDP80M00596A000500020014-5
countries toward provision of technologies, facilities or
SNM which could assist NNWS or foreign organizations to
acquire or develop nuclear explosive devices.
Official: See foreign official.
Official information: Information which is subject to the
control of t Fe United States Government.
Open source information: A generic term describing information
potential intelligence value (i.e., intelligence information)
which is available to the general public.
Operational control (OPCON): (Military context) The authority
elegated to a commander to direct forces assigned so that
the commander may accomplish specific missions or tasks
which are usually limited by function, time, or location; to
deploy the forces concerned; and.to retain or assign tactical
control of those forces. (It does not, of itself, include
administrative or logistic control.)
Operational intelligence (OPINTEL): Intelligence required
for planning and executing operations.
Operations security _(OPSEC): Those measures designed to
deny information concerning planned, ongoing, and completed
operations to an enemy or potential enemy, and which might
otherwise provide him with a tactical or strategic advantage.
.Optical intelligence (OPTINT): That portion of electro-optical
intelligence that deals with visible light. (See electro-
optical intelligence.)
Order of battle (OB): Intelligence pertaining to identifi-
cation, strength, command structure and disposition of the
personnel, units, and equipment of any foreign military
force.
Overt: Open; done without attempt at concealment.
Overt collection: The acquisition of intelligence informa-
tion from public media, observation, government-to-government
dialogue, elicitation, and from the sharing of data openly
acquired; the process may be classified or unclassified;
the target and host governments as well as the sources
involved normally are aware of the general collection activity
although the specific acquisition, sites, and processes may
be successfully concealed.
. 27
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Penetration: (1) (intelligence operations.) The recruit-
ment o agents within or the infiltration of agents or
introduction of technical monitoring devices into an organi-
zation or group or physical facility for the purpose of
acquiring information or influencing its activities.
(2) (automatic data processing (ADP) operations.) The
successful and repeatable extraction and identification of
recognizable information from a protected ADP system.
Personnel security: The means or procedures--such as
selective investigations, record checks, personal inter-
views, and supervisory controls.--designed to provide reasonable
assurance that persons being considered for or granted
access to classified information are loyal and trustworthy.
Photographic intelligence (PIIOTINT): The collected products
of-photographic interpretation classified and evaluated for
intelligence use; it is a category of imagery intelligence.
Photogra hic interpretation (PI): The process of locating,
recognizing, identifying, and describing objects, activities,
and terrain represented on photography; it is a category of
imagery interpretation.
Physical security: Physical measures--such as safes, vaults,
perimeter barriers, guard systems, alarms and access controls--
designed to safeguard installations against damage, disruption
or unauthorized entry; information or material against
unauthorized access or theft; and specified personnel
against harm.
Plain text: Normal text or language, or any symbol or
signal, that conveys information without any hidden or
secret meaning.
Planning and direction: See intelligence cycle.
Policy Review Committee (As pertains to intelligence matters)
PRC I A committee established under the National
Security Council which when meeting under the chairmanship
of the Director of Central Intelligence is empowered to
establish requirements and priorities for national foreign
intelligence and to evaluate the quality of the intelligence
product;. it is sometimes referred to as the Policy Review
Committee (Intelligence); its specific duties are defined in
Executive Order No. 12036.
28
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
P o 1 it i iov dtFai] "yec2A04/OJJ/9J I l~4iPPc80 ~ PR~00 90IM am i c s
of to internal and external political affairs of foreign
countries, regional groupings, multilateral treaty arrange-
ments and organizations, and foreign political movements
directed against or impacting upon established governments
or authority.
Positive intelligence: A term of convenience sometimes
applied to foreign intelligence to distinguish it from
foreign counterintelligence.
Priority: A value denoting a preferential rating or precedence
in position which is used to discriminate among like entities;
the. term normally used in conjunction with intelligence
requirements in order to illuminate importance and to guide
the actions planned, being planned, or in use, to respond to
the requirements.
Processing: See intelligence cycle.
Product: (1) A finished intelligence report disseminated to
customers by an intelligence agency. (2) In SIGINT usage,
intelligence information derived. from analysis of SIGINT
materials and published as a report or translation for
dissemination to customers.
Production: See intelligence cycle.
Proprietary: A business entity owned, in whole or in part,
or controlled by an intelligence organization and operated
to provide private commercial cover for an intelligence
activity of that organization. (See cover.)
Radar intelligence (RADINT): Intelligence information derived
from data collecte by radar.
Radiation intelligence (RINT): The functions and characteristics
.eri.ve rom information. obtained from unintentional electro-
magnetic energy emanating from foreign devices; excludes
nuclear detonations or radioactive sources. (See noncommuni-
cations emanations.)
Raw intelligence: A colloquial term meaning collected
intelligence information which has not yet been converted
into intelligence. (See intelligence information.)
Reconnaissance (RECCE): A mission undertaken to obtain by
visual observation or other detection methods information
relating to the activities, resources or forces of a foreign
nation; or to secure data concerning the meteorological,
hydrographic, or geographic characteristics of a particular
area.
Approved For Release 2004/03/23 CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Recruitmentt-in-place: A person who agrees to become an
agent an retain is position in his organization or govern-
ment while reporting on it to an intelligence or security
organization of a foreign country.
RED/BLACK Concept: The separation of electrical and electronic
circuits, components, equipment, and systems which handle
classified plain., language information in electric signal
form (RED) from those which handle encrypted or unclassified
information (BLACK); RED and BLACK terminology is used to
clarify specific criteria relating to and differentiating
between such circuits, components, equipment, and systems
and the areas in. which they are contained.
Refu See: A person who is outside the country of his former
ia.itual residence and who, because of fear of being perse-
cuted in that country, is unwilling to return to it. (Also
see emigre.)
Report: See intelligence report and intelligence information
report.
Requirement: See intelligence requirement or collection
requirement.
Residency: See illegal residency and legal residency.
Sabota e: Action against material, premises or utilities,
or otter
d
i
pro
uct
on, which injures, interferes with or
obstructs the national security or ability of .a nation t
prepare for or carry on a war.
Safe house: A house or premises controlled by an intelli-
gence organization. that affords--at least temporarily--.
security for individuals involved or equipment used in
clandestine operations.
Sanitization: The process of altering intelligence informa-
tion or reports in order to protect sensitive intelligence
sources, methods, capabilities, and analytical procedures in
order to permit wider dissemination.
Scientific and technical. (SF,T) intelli ence: Intelligence
concerning oreign developments in basic and applied scien-
tific and technical research and development including
engineering and production techniques, now technology, and
weapon systems and their capabilities and characteristics;
it also includes intelligence which requires scientific or
technical expertise on the part of the analyst, such as
medicine, physical health studies and behavioral analyses.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Scientific and Technical Intelligence Committee (STIC): See
Director of Central Intelligence Committee.
Security: Establishment and maintenance of protective
measures which are intended to ensure a state of inviola-
bility from hostile acts or influences.
Security classification: See classification.
Security Committee (SECOM): See Director of Central Intelli-
gence Committee.
Sensitive: Requiring special protection from disclosure to
avoiT compromise or threat to the security of the sponsor.
Sensitive compartmented information (SCI): All information
and material requiring special controls for restricted
handling within compartmented intelligence . systems. (Also
see compartmentation.)
Sensitive intelligence sources or methods: A collective
term for those persons, organizations, t ings, conditions,
or events that provide intelligence information and those
means used in the collection, processing and production of
such information which, if compromised, would be vulnerable
to counteraction that could reasonably be expected to reduce
their ability to support U.S. intelligence activities.
Service Cr tolo is A enc (ies) (SCA): See service cryptologic
element(s).
Service cryptologic elements: A term used to designate
separately or together those elements of the U.S..Army,
Navy, and Air Force which perform cryptologic functions;
Navy and Air Force elements are also known as Service Cryptologic
Agency(ies) (SCA).
Sensor: (1) A technical device designed to detect and
respond to one or more particular stimulae and which may
record and/or transmit a resultant impulse for interpreta-
tion or measurement; often called a technical sensor. (2)
special sensor: An unclassified term use as a matter of
convenience to refer to a highly-classified or controlled
technical sensor.
Side-looking airborne radar (SLAR): An airborne radar,
viewing at right angles to the axis of the vehicle, which
produces a presentation of terrain or targets.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
SIGINT activity: Any activity conducted for the purpose of
producing signals intelligence. Also see SIGINT-related
activity.
SIGINT Committee: See Director of Central Intelligence
Committee.
SIGINT operational tasking authority (SOTA): That authority
"delegated by the Director, National Security Agency, to
military commanders which enables them to task specified
signals intelligence resources that have tactical applica-
bility and the ability to respond to time-sensitive require-
ments.
SIGINT-related activitAny activity primarily intended
for a purpose s other than signals intelligence (SIGINT),
but which can be used to produce SIGINT, or which produces
SIGINT as a by-product of its principal function(s). Also
see SIGINT activity.
SIGINT technical information: Information concerning or
derived from intercepted foreign transmissions or radiations
which is composed of technical (as opposed to intelligence)
information and which is required in the further collection
or analysis of signals intelligence.
Signal: Anything intentionally transmitted by visual, other
electromagnetic, or acoustical methods intended to convey a
meaning to the recipient.
Signals intelligence (SIGINT): A category of intelligence
information comprising all communications intelligence,
electronics intelligence, and foreign instrumentation
signals intelligence, either individually or in combination,
including nonimagery infrared and coherent light signals.
Source: A person, device, system or activity from which
intelligence information is obtained. (Also see human
source and sensitive intelligence sources and methods.)
Special activities: Sec covert action.
Special Activities Office(r) (SAO): A control point for
certain categories of compartmented information. (The acronym
is often used to refer to the compartmented information
concerned.)
Special Coordination Committee (SCC): A committee established
under the National Security Council which deals with such
matters as the oversight of sensitive intelligence activities--
such as covert action--which are undertaken on Presidential
authority.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23; CIA-RDP80M00596A000500020014-5
Special intelligence (SI): An unclassified term used to
designate a category o sensitive compartmented information
(SCI). (See sensitive compartmented information.)
Special intelligence communications (SPINTCOMM): A communica-
tions network for the handling of all special intelligence
and consisting of those facilities under the operational and
technical control of the Chief of Intelligence of each of
the military departments, under the management of the
Defense Intelligence Agency, and under the technical and
security specification criteria established and monitored
by the National Security Agency.
Special national intelligence estimate (SNIE): National
intelligence estimates (NIEs) which are relevant to specific
policy problems that need to be addressed in the immediate
future. SNIEs are generally unscheduled, shorter, and
prepared more quickly than NIEs and are coordinated within
the Intelligence Community only to the extent that time
permits.
Special Security Office(r) (SSO): A control point for
security procedures within any activity authorized access to
sensitive compartmented information.
Special sensor: See sensor.
Strategic intelligence: Intelligence which is required for
the formulation of policy and military plans at national and
international levels; it differs primarily from tactical
intelligence in level of use, but may also vary in scope and
detail.
Strategic warning: Intelligence regarding.th.e threat of the
initiation of hostilities against the U.S. or in which U.S.
forces may become involved; it may be received at any time
prior to the initiation of hostilities.
Su ort for the Analysts' File Environment (SAFE): A joint
CIA.DIA project to develop a new computer micro ilm system
to'support production analysts in reading, filing and
routing cable traffic; building and searching private and
central files; and writing, editing, and routing intelli-
gence memoranda and reports.
Surveillance: The systematic observation or monitoring of
aerospace, surface,-or subsurface areas, places, persons, or
things by visual, aural, electronic, photographic, or other
means.
33
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Tactical intelligence: Foreign intelligence collected with
assets funded in DoD programs and evaluated by DoD elements
for the use of military commanders in the field to maintain
the readiness of operating forces for combat operations and
to support the planning and conduct of combat operations.
(See combat intelligence.)
Tactical intelligence asset: An intelligence asset, the
primary purpose o which ss the collection, processing or
production of tactical intelligence. (See tactical intel-
ligence and intelligence asset.)
Target: A country, area, installation, organization, weapon
system, military force, situation (political or economic),
person or other entity against which intelligence operations
are conducted.
Target intelligence: Intelligence which portrays and locates
the components of a target or target complex and indicates
its identification, vulnerability and relative importance.
Tasking: The assignment or direction of an individual or
activity to perform in a specified way to achieve an objective
or goal.
Technical sensor: See sensor.
Technical SIGINT: Intelligence information which provides a
detailed know le ge of the technical characteristics of a
given emitter and thus permits estimates to be made about
its primary function, capabilities, modes of operation
(including malfunctions), and state-of-the-art, as well as
its specific role within a complex weapon system or defense
network.
Telecommunications: Any transmission, emission, or reception
of signs, signals, writing, images, and sounds or informa-
tion of any nature by wire, radio, visual, or other electro-
magnetic systems.
Telemetry intelligence (TELINT : Technical and intelligence
information derived from intercept, processing and analysis
of foreign telemetry.
Teleprocessing: The overall function of an information
transmission system which combines telecommunications,
automatic data processing, and man-machine interface equip-
ment and their interaction as an integrated whole.
Approved For Release 2004/03/23 :3dlA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
TEMPEST: An unclassified term referring to technical
investigations for compromising emanations from electrically
operated, information processing equipment; they are conducted
in support of emanations and emissions security.
Terrorist organization: A group that engages in terrorist
activities. (See international terrorist activity.)
Traffic analysis (TA): The study of the external charac-
teristics of communications.
Transmission security (TIZANSEC): The component of communications
security w 1ich results from all measures designed to protect
transmissions from interception and from exploitation by
means other than cryptanalysis.
Unauthorized disclosure: See compromise.
Uni-level securi: (For automatic data processing systems)
Provision for the safeguarding of all material within a
single information handling system in accordance with the
highest level of. classification and most restrictive dis-
semination caveats assigned to any material contained therein,
as distinguished from multi-level security. (Also see
multi-level security.)
United States Signals Intelligence System (USSIS): An entity
that is comprised of tihe National Security Agency (including
assigned military personnel); those elements of the military
departments and the Central Intelligence Agency performing
signals intelligence activities; and those elements of any
other department or agency which may from time-to-time be
authorized by the National Security Council to perform
signals intelligence activities during the time when such
elements are so authorized; it is governed by the United
States Signals Intelligence Directives (USSID) system.
Upgrade: To determine that certain classified information
requires, in the interest of national security, a higher
degree of protection against unauthorized disclosure than
currently provided, coupled with a changing of the classi-
fication designation to reflect such higher degree. (Also
see classification.)
User: See customer.
Approved For Release 2004/03/23 : CIA-RDP8D=0.596A00050'0o2oo14-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000506020014-5
Validation: A process normally associated with the collection
of intelligence information which provides official status
to an identified requirement and confirms that the requirement
is appropriate for a given collector and has not previously
been satisfied. (See collection requirement.)
Walk-in; A person who on his own initiative makes contact
with a representative of a foreign country and who volunteers
intelligence. information and/or requests political asylum.
Weapon and Space Systems Intelligence Committee (WSSIC):
See Director of Central Intelligence Committee.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
ACRONYMS AND ABBREVIATIONS
ACOUSTINT
ACSI
CAMS
CBR
CCF
CCP
cc PC
CI
CIA
CIAP
CIFAX
CIPI-IONY
CIRIS
CIVISION
COINS
COMEX
COMINT
COMIREX
COMSEC
CONTEXT
CRITIC
CRITICOMM
DAO
DCI
DCID
D EA
DEFSMAC
DF
DIA
DNI
Acoustical Intelligence (Naval acronym;
see definition.)
Acoustical Intelligence
Assistant Chief of Staff/Intelligence
(Army or Air Force)
COMIREX Automated Management System
Chemical, Biological, Radiological
Warfare
Collection Coordination Facility
Consolidated Cryptologic Program
Critical Collection Problems Committee
Counterintelligence
Central Intelligence Agency
Central Intelligence Agency Program
Enciphered Facsimile
Enciphered Telephone
Consolidated Intelligence Resources
Information System
Communications Intelligence Security
Regulation
Enciphered Television
Community On-Line Intelligence
Network System
Committee on Exchanges
Communications Intelligence
Committee on Imagery Requirements and
Exploitation
Communications Security
Conferencing and. Text Manipulation System
Critical Intelligence Message
Critical Intelligence Communications
System
CRYPTO (See definition.)
Defense Attache Office
Director of Central Intelligence
Director of Central Intelligence
Directive
Drug Enforcement Administration
Defense Special Missile and Astronautic
Center
Direction Finding
Defense Intelligence Agency
Director of Naval Intelligence
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
ECCM
ECM
EEI
EF,E
EIC
ELECTRO-OPTINT
ELINT
ELSEC
EMSEC
EOB
ESM
EW
Electronic Counter-Countermeasures
Electronic Countermeasures
Essential Elements of Information
Evasion and Escape
Economic Intelligence Committee
Electro-optical Intelligence
Electronic Intelligence
Electronic Security
Emanations Security.
Electronic Order of Battle
Electronic Warfare Support Measures
Electronic Warfare
FBI Federal Bureau of Investigation
FBIS Foreign Broadcast Information Service
FCI Foreign Counterintelligence
FI Foreign Intelligence
FIS Foreign Instrumentation Signals
FISINT Foreign Instrumentation Signals
Intelligence
FLIR Forward Looking Infrared
FORMAT Foreign Material
GDIP General Defense Intelligence Program
GMI General Medical Intelligence
House Permanent Select Committee
on Intelligence
IIRC Human Resources Committee
HUMINT Human Intelligence
IC Intelligence Community
ICRS Imagery Collection Requirements
Subcommittee (COMIREX)
IDC Interagency Defector Committee
IIIC Information Handling Committee
II Imagery Interpretation
IIM Interagency Intelligence Memorandum
ILC International Lines of Communications
INR Bureau of Intelligence and Research,
Department of State
JOB Intelligence Oversight Board
IRA Intelligence-Related Activities
IRFTDC Intelligence Research 6 Development Council
ItW Indications and Warning
Approved or a ease - -
JAEIC Joint Atomic. Energy Intelligence
Approved For Release 2DO4fO3/128c#IA-RDP80M00596A000500020014-5
MASINT Measurement and Signature Intelligence
MEDINT Medical Intelligence
MI Military Intelligence
NFAC National Foreign Assessment Center
NFIB National Foreign Intelligence Board
NFIP National Foreign Intelligence Program
NIE National Intelligence Estimate
NIO National Intelligence Officer
NITC National Intelligence Tasking Center
NMIC National Military Intelligence Center
NNWS Non-Nuclear Weapon States
NOIWON National Operations and Intelligence
Watch Officers Network
NPHR? National Foreign Intelligence Plan for
Human Resources
NPIC National Photographic Interpretation
Center
NSA National Security Agency
NSCID National Security Council Intelligence
Directive
NSOC National SIGINT Operations Center
NSRL. National SIGINT Requirements List
NTPC National Telemetry Processing Center
NUCINT Nuclear Intelligence
OB Order of Battle
OPCON Operational Control
OPINTEL Operational Intelligence
OPSEC Operations Security
OPTINT Optical Intelligence
PIIOTINT Photographic Intelligence
PI Photographic Interpretation or
Photographic Interpretor
PRC(I) Policy Review Committee (Intelligence)
RADINT Radar Intelligence
RECCE Reconnaissance
RINT Radiation Intelligence
---Approved For-Release 2004/03/23: CIA-RDP80M00596A00050002-001 3
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
SST Scientific and Technical
SAFE Support for. the Analysts'
File Environment
SAO Special Activities Office
SCA Service Cryptologic Agencies
SCC Special Coordination Committee
SCI Sensitive Compartmented Information
or Source Code Indicator
SECOM Security Committee
SI Special Intelligence
SIGINT Signals Intelligence
SIGINT Committee Signals Intelligence Committee
SIRVES SIGINT Requirements Validation and
Evaluation Subcommittee (of SIGINT
Committee)
SLAR Side-Looking Airborne Radar
SNIE Special National Intelligence Estimate
SNM Special Nuclear Materials
S'OSUS Sound Surveillance System
SOTA SIGINT Operational Tasking Authority
SPINTCOMM Special Intelligence Communications
SSCI Senate Select Committee on Intelligence
SSO Special Security Officer
STIC Scientific and Technical Intelligence
Committee
TA Traffic Analysis
TELINT Telemetry Intelligence
TRANSEC Transmission Security
United States Signals Intelligence
Directive
United States Signals Intelligence
System
WSSIC Weapon and Space Systems Intelligence
Committee
Approved For. Release 2004103/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Acoustical intelligence: The technical and intelligence
in ormation erivedfrom foreign sources which generate
waves. (Dictionary of Military and Associated Terms, Dept.
of Defense (U), the Joint Chiefs of Staff, 3 Sep 74 (U)).
Agent: 1) An individual who acts under the direction of an
intelligence agency or security service to obtain, or assist
in obtaining, information for intelligence or counterintelli-
gence purposes. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976). 2) In intelligence usage, one
who is authorized or instructed to obtain or to assist in
obtaining information for intelligence or counterintelligence
purposes. (Dictionary of Military and Associated Terms,
Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74.
(U)).
Agent of influence: An individual who can be used to influence
covertly foreign officials, opinion molders, organizations,
or pressure groups in a way which will generally advance
United States Government objectives, or to undertake specific
action in support of United States Government objectives.
(Final Report, Senate Select Committee on Intelligence, 26
April 1976).
Analysis: In electronic warfare, a study of electromagnetic
radiations to determine their technical characteristics and
their tactical or strategic use. (Glossary of Communications-
Electronics Terms (U), JCS, Dec 74).
Assessment: Judgment of the motives, qualifications, and
characteristics of present or prospective employees or
"Agents". (Dictionary of Military and Associated Terms,
Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74.
(U)).
Asset: Any resource--a person, group, relationship, instrument,
installation, or supply--at the disposition of an intelligence
agency for use. in an operational or support role. The term
is normally applied toa.person who is contributing to a CIA
clandestine mission, but is not a fully controlled agent of
CIA. (Final Report, Senate Select Committee on Intelligence,
26 April 1976).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Basic intelligence: 1) General reference material for use
in planning concerning other countries which pertains to
capabilities, resources or potential theaters of operations.
See also --intelligence--. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), the Joint Chiefs of
Staff, 3 Sep 74. (U)). 2) Factual, fundamental, and generally
permanent information about all aspects of a nation--physical,
social, economic, political, biographical, and cultural--
which is used as a base for intelligence products in support
of planning, policymaking, and military operations. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976). 3) "Fundamental intelligence concerning the general
situation, resources, capabilities and vulnerabilities of
foreign countries or areas which may be used as reference
material in the planning of operations at any level and in
evaluating subsequent information relating to the same
subject." (Recommended Changes.to JCS Pub 1, 25 July 1977).
Case officer: A staff employee of the CIA who is responsible
for handling agents. (Final Report, Senate Select Committee
on Intelligence, 26 April 1976.).
Cipher: Any cryptographic system in which arbitrary symbols
or groups of symbols represent units of plain text. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976).
Clandestine operations: 1) Intelligence, counterintelligence,
or other information collection activities and covert political,
economic, propaganda and paramilitary activities, conducted
so as to assure the secrecy of the operation. (Final Report,
Senate Select Committee on Intelligence, 26 April 1976). 2)
Activities to accomplish intelligence, counterintelligence,
and other similar activities sponsored or conducted by
Governmental departments or agencies, in such a way as to
assure secrecy or concealment. (It differs from covert
operations in that emphasis is placed on concealment of the
operation rather than on concealment of identity of sponsor.)
(Dictionary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)).
Code: A system of communication in which arbitrary groups
of symbols represent units of plain text. Codes may be used
for brevity or for security. (Final Report, Senate Select
Committee on Intelligence, 26 April 1976).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Code word: 1) A word which has been assigned a classification
an a -classified meaning to safeguard intentions and informa-
tion regarding a planned operation. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976). 2) A word
which has been assigned a classification and a classified
meaning to safeguard intentions and information regarding a
classified plan or operation. (Communications-Electronics
Terminology (U), U.S. Dept. of the Air Force, 15 Nov 73,
(U)). 3) A word which conveys a meaning other than its con-
ventional one. Prearranged by the correspondents. Its aim
is to increase security. (Glossary of Communications-
Electronics Terms (U), JCS, Dec 74).
CODEWORD: 1) A cryptonym used to identify sensitive intelli-
gencedata. (Glossary of Communications-Electronics Terms
(U), JCS, Dec 74). 2) A single word selected from those
listed in joint Army, Navy, Air Force publication (JANAP)
299 and subsequent volumes, and assigned a classified meaning
by appropriate authority to insure proper security concerning
intentions, and to safeguard information pertaining to
actual, real world military plans or operations classified
as Confidential or higher. (Modern Data Communications
Concepts, Language and Media (U), William P. Davenport,
Hayden Book Co., Inc., 1971, (U)).
Collection: 1) Any one or more of the gathering, analysis,
dissemination or storage of non-publicly available informa-
tion without the informed express consent of the subject of
the information. (USSID 18, Limitations and Procedures in
Signals Intelligence Operations of the USSS (U), NSA (D6),
26 May 76). 2) The act of employing instruments and/or
equipment to obtain qualitative or quantitative data from
the test or operation of foreign systems. (Defense Intelli-
gence Collection Requirements Manual (C), DIA, 27 Jan 75).
3) Used in FLINT to mean the gathering or collection of the
unevaluated and uninterpreted information about the enemy or
potential enemy. Specifically the collection of data from
noncommunications radiators such as radars, navigation aids
or countermeasures equipments. (Basic Manual (U), FLINT
Collection Analysis. Guide (U), National Cryptologic School,
1965, (S)).
Communications intelligence (COMINT): 1) Technical and intel-
ligence information derived from communications by
other than the intended recipients. COMINT is produced' by the
collection and processing of foreign communications passed by
electromagnetic means, with specific exceptions stated below,
and by the processing of foreign encrypted communications.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
However transmitted, COMINT shall not include:
1. Intercept and processing of unencrypted written
communications, except the processing of written plaintext
versions of communications which have been encrypted or are
intended for subsequent encryption.
2. Intercept and processing of press, propaganda and
other public broadcasts, except for processing encrypted or
"hidden meaning" passages in such broadcasts.
3. Oral and wire interceptions conducted under DoD
Directive 5200.24.
4, Censorship. (Signals Intelligence (SIGINT) (U),
DOD, 25 Jan 73).
2) Technical and intelligence information derived from
foreign communications by other than the intended recipients:
A. Foreign Communications are all communications
except: .(1) Those of the governments of the U.S. and the
British Commonwealth, (2) Those exchanged among private
organizations and nationals, acting in a private capacity of
the U.S. and the British Commonwealth. (3) Those of nationals
of the U.S. and British Commonwealth appointed or detailed
by their governments to.serve in the international.organiza-
tions.
B. COMINT activities are those which produce COMINT by
collecting and processing foreign communications passed by
radio, wire, or other electromagnetic means, and by the
processing of foreign encrypted communications. However
transmitted, collection comprises search, intercept, and
direction finding. Processing comprises range estimation,
transmitter/operator identification, signal analysis, traffic
analysis, cryptanalysis, decryption, study of the plaintext,
the fusion of these processes, and the reporting of results.
C. Exceptions to COMINT and COMINT activities. COMINT
and COMINT activities as defined here do not include: (1)
Intercept and processing of unencrypted written communications,
except written plaintext versions of communications which
have been encrypted or are intended for subsequent encryption.
(2) Intercept and processing of press, propaganda and other
public broadcasts, except for encrypted or "hidden meaning"
passages in such broadcasts. (3) Operations conducted by
U.S., U.K. or Commonwealth security authorities. (4) Censor-
ship. (5) The interception and study of non-communications
transmissions (ELINT). (USSID 3, SIGINT Security (U), NSA
(D41), 24 Aug 72).
3) Technical and Intelligence information derived from
foreign communications by someone other than the intended
recipient. It does not include foreign press, propaganda,
or public broadcasts. The term is sometimes used interchange-
ably with SIGINT. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Communications security (COMSEC): 1) The protection of
United States telecommunications and other communications'
from exploitation by foreign intelligence services and from
unauthorized disclosure. COMSEC is one of the mission
responsibilities of NSA. It includes cryptosecurity, trans-
mission security, emission security, and physical security
of classified equipment, material, and documents. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976). 2) The protection resulting from the application of
cryptosecurity, transmission security, and emission security,
measures to telecommunications and from application of
physical security, measures to COMSEC information. These
measures are taken to deny unauthorized persons information
of value which might be derived from the possession and
study of such telecommunications or to insure that authen-
ticity of such telecommunications. (Glossary of Communica-
tions Security and Emanations Security Terms (U), U.S.
Communications Security Board, Oct 74). 3) The protection
resulting from all measures designed to deny unauthorized
persons information of value which might be derived from the
possession and study of telecommunications, or to mislead
unauthorized persons in their interpretation of the results
of such possession and study. Also called COMSEC. Communi-
cations security includes: A. Cryptosecurity: B. Transmission
Security: C. Emission Security: and D. Physical Security of
Communications Security materials and information.
A. Cryptosecurity - The component of communications security
which results from the provision of technically sound crypto-
systems and their proper use.
B. Transmission Security - The component of communications
security which results from all measures designed to protect
transmissions from interception and exploitation by means
other than cryptanalysis.
C. Emission Security - The component of communications
security which results from all measures taken to deny
unauthorized persons information of value which might be
derived from intercept and analysis of comprising emanations
from cryptoequipment and telecommunications systems.
D. Physical Security - The component of communications
security which results from all physical measures necessary
to safeguard classified equipment, material, and documents
from access thereto or observation thereof by unauthorized
persons. (Dictionary of Military and Associated Terms,
Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep 74.
(U)).
Compartmentation: 1) The practice of establishing special
channels or handling sensitive intelligence information.
The channels are limited to individuals with a specific need
for such information and who are therefore given special
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
security clearances in order to have access to it. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976). 2) 1. In SIGINT, special protection given to the
production and distribution of SIGINT material of especially
sensitive nature because of its source, method of processing,
or content. (Basic Cryptologic Glossary (U), NSA (P1),
1971, (C-GRP. 1)
2. In COMSEC, restricting the use of specific primary crypto-
variables to specific operational units grouped together on
the basis of their geographical area or their common participa-
tion in a mission or operation for the purpose of limiting,
the information protected by these cryptovariables and thus
limiting the adverse impact of. a compromise of these variables.
(Basic Cryptologic Glossary (U), NSA (I1), 1971, (C-GRP. 1)
3) 1. Establishment and management of an intelligence organi-
zation so that information about the personnnel, organization,
or,activities of one component is made available to any
other component only to the extent required for the performance
of assigned duties. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3
Sep 74 (U)).
Compromise: 1) The loss of control over any COMINT or
information related to COMINT or COMINT activities resulting
in a reasonable assumption that it could have, or confirma-
tion of the fact that it has, come to the knowledge of an
unauthorized person. (USSID 3, SIGINT Support to Military
Commanders (U), NSA (V13), 1 Jul 74). 2) The known or
suspected exposure of classified information or material in
whole or in part to unauthorized persons through loss,
theft, capture, recovery by salvage, detection of individuals,
unauthorized viewing, or any other means. (Basic Cryptologic
Glossary (U), NSA (P1), 1971).
Computer security: The protection resulting from all measures
designed to prevent either 'deliberate or inadvertent unauthori-
zed disclosure, acquisition, manipulation, or modification
of classified information-in a computer system. (Basic
Cryptologic Glossary (U), NSA (P1), 1971).
Consumer:, An obsolete term for customer. (Basic Crypto-
logic Glossary (U), NSA (P1), 1971).
Counterintelligence: 1) Information concerning the pro-
tection of foreign intelligence or of national security
information and its collection from detection or disclosure.
(USSID 18, Limitations and Procedures in Signals Intelligence
Operations of the USSS (U), NSA (D6), 26 May 76). 2) That
phase of intelligence covering all activity devoted to
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
destroying the effectiveness of, inimical foreign intelligence
activities and to the protection of information against
espionage, personnel against subversion, and installations
or material against sabotage. See also counterespionage,
countersabotage, countersubversion. (Dictionary of Military
and Associated Terms, Dept. of Defense (U), the Joint Chiefs
of Staff, 3 Sep 74). 3) That aspect of intelligence activity
which is devoted to destroying the effectiveness of inimical
foreign intelligence activities and to the protection of
information against espionage, individuals against subversion,
and installations or material against sabotage. See also
counterespionage, countersabotage, countersubversion.
(Dictionary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74 (U))..
Critical intelligence: Intell.igence which is critical and
requires the imm ediate attention of the commander. It is
required to enable the commander to make decisions which
will provide a timely and appropriate response to actions by
the potential/actual enemy. It includes but is not limited
to the following:
A. Strong indications of the imminent outbreak of
hostilities of any type (warning of attack):
B. Aggression of any nature against a friendly country:
C. Indications or use of nuclear-biological chemical
weapons (targets): and
D. Significant events within potential enemy countries
that may lead 'to modification of nuclear strike plans.
(Dictionary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)).
Critical intelligence message (CRITIC): A message containing
information indicating a situation or pertaining to a situa-
tion which affects the security or interests of the United
States or its allies to such an extent that it may require
the immediate attention of the President. .(Defense Special
Communications System (DSSCS) Operating Instructions System
Procedures (U), NSA, 6 Feb 73).
Cryptograph : The enciphering of plain text so that it will
be unintelligible to be an unauthorized recipient. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976).
Cr.yptomaterial: All COMSEC material bearing the marking
CRYPTO or otherwise designated as incorporating crypto-
graphic information classified cryptoequipments. Their
classified subdivisions and keying material are considered
cryptomaterial even though they do not bear the CRYPTO
marking. (Communications-Electronics Terminology (U), U.S.
Dept. of the Air Force, 15 Nov 73).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Current intelligence: Summaries and analyses of recent
events. (Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
Defector: A person who, for political or other reasons, has
repudiated his country and may be in possession of informa-
tion of interest to the United States Government. (Final
Report, Senate Select Committee on Intelligence, 26 April
.1976).
Defense Intelligence Community: The Defense Intelligence
Agency, National Security Agency, and. the intelligence
components of the unified and specified command. (IDHS
Glossary of Common Acronyms, Codes, Abbreviations, and Terms
Used in Dept. of Defense Intelligence Data Handling Systems
(IDHS) Documents (U), DIA, 1970).
Departmental intelligence: 1) Intelligence which any depart-
ment or agency of the Federal Government requires to execute
its own mission. (Dictionary of Military and Associated
Terms) Dept. of Defense (U), the Joint Chiefs of Staff, 3
Sep 74. (U)). 2) The intelligence which Government depart-
ments and agencies generate in support of their own activities.
(Final Report, Senate Select Committee on Intelligence, 26
April 1976).
Dissemination: The distribution of information intelligence
products (in oral, written, or graphic form) to departmental
and agency intelligence consumers. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976).
Double agent: Agent in contact with two opposing intelli-
gence services only-one of which is aware of the double
agent contact or quasi-intelligence services. (Dictionary of
Military and Associated Terms, Dept. of Defense (U), the
Joint Chiefs of Staff, 3 Sep 74. (U)).
Economic intelligence: Intelligence regarding foreign
economic resources, activities, and policies. (Final Report,
Senate Select Committee on Intelligence, 26 April).
Electronic intelligence (FLINT): 1) That technical and
intelligence information derived from foreign electromag-
netic noncommunications transmissions by other than the
intended recipients. (Glossary of Communications-Electronics
Terms (U), JCS, Dec 74). 2) The intelligence information
product of activities engaged in the collection and pro-
cessing for subsequent intelligence purposes of foreign
noncommunications electromagnetic radiations emanating from
other than nuclear detonations and radioactive sources.
(Basic Cryptologic Glossary (U), NSA (P1), 1971). 3) Techni-
cal and intelligence information derived from the collection
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
(or interception) and processing of foreign electromagnetic
radiations (noncommunications) emanating from sources such
as radar. ELINT is part of the NSA/CSS Signals Intelligence
Mission. (Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
Electronic order of battle (EOB): A document summarizing
the deployment of enemy noncommunications and communications
emitters in a given area. In addition to deployment, the
EOB also contains data as to the function of each emitter.
(Basic Manual (U), ELINT Collection Analysis Guide (U),
National Cryptologic School, 1965).
Electronic security: The detection, identification, evalua-
tion, and location of foreign electromagnetic radiations.
(Final Report, Senate Select Committee on Intelligence, 26
April 1976).
Electronic surveillance: Surveillance conducted on a
person, group, or of er entity by electronic equipment which
is often highly sophisticated and extremely sensitive.
(Final Report, Senate Select Committee on Intelligence,
26 April 1976).
Encipher: To convert a plain text message into unintelli-
gible form by the use of a cipher system. (Final Report,
Senate Select Committee on Intelligence, 26 April 1976).
Encrypt: To convert a plain text message into unintelli-
gible form by means of a cryptosystem; this term covers the
meanings of encipher and encode. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976).
Espionage: Clandestine intelligence collection activity.
This term is often interchanged with "clandestine collec-
tion." (Final Report, Senate Select-Committee on Intelli-
gence, 26 April 1976).
Evaluation: 1) Appraisal.of an item of information in terms
of credibility, reliability, pertinency, and accuracy. Ap-
praisal is accomplished at several stages within the intelli-
gence process with progressively different contexts. Initial
evaluations made by case officers and report officers are
focused upon the reliability of the source and the accuracy
of the information as judged by data available at or close
to their operational levels. Later evaluations by intelli-
gence analysts are primarily concerned with verifying accu-
racy of information and may, in effect, convert information
into intelligence. Appraisal or evaluation of items of
information or intelligence is indicated by a standard
letter-number system. The evaluation of the reliability of
sources is designated by a letter from A through F, and the
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
accuracy of the information is designated by numeral 1
through 6. These are two entirely independent appraisals,
and these separate appraisals are indicated in accordance
with the system indicated below. Thus, information adjudged
to be "probably true" received from a "usually reliable
source" is designated "B-2" or "B2" while information of
which the "truth cannot be judged" received from a "usually
reliable source" is designated "B-6" or "B6." Reliability
of source:
A-Completely reliable; B-Usually reliable;
C-Fairly reliable; D-Not usually reliable;
E-Unreliable; F-Reliability cannot be judged.
Accuracy of information:
1-Confirmed by other sources;
2-Probably true;
3-Possibly true;
4-Doubtful;
5-Improbable;
6-Truth cannot be judged (Dictionary'of Military and
Associated Terms, Dept. of Defense (U), the Joint Chiefs of
Staff, 3 Sep 74. (U)).
2) In intelligence usage, appraisal of an item of informa-
tion in terms of credibility, reliability, pertinency, and
accuracy. Appraisal is accomplished at several stages with-
in the intelligence cycle with progressively different con-
texts." (Recommended Change to JCS Pub 1, 25 July 1977).
Exploitation: In SIGINT, the production of information from
messages that are encrypted in systems whose basic elements
are known. Exploitation includes decryption, translation,
and the solution of specific controls such as indicators and
specific keys. (Basic Cryptologic Glossary (U), NSA (P1),
1971).
Foreign intelligence: 1) Information relating to the capa-
bilities, intentions and activities of foreign powers,
organizations or persons, but not including counterintelli-
gence except for information on international terrorist
activities. (Executive Order 12036, 26 Jan 1978). 2) a.
Information concerning the capabilities,. intentions and
activities of any foreign power, or of any non-United States
person, whether within or outside the United States or
concerning areas outside the United States. b. Information
relating to the ability of the United States to protect
itself against actual or.potential attack or other hostile
acts of a foreign power or its agents. c. Information with
respect to foreign powers or non-United States persons which
because of its importance is deemed essential to the security
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
of the United States or to the conduct of its foreign affairs.
d. Information relating to the ability of the United States
to protect itself against the activities of foreign intel-
ligence services. (USSID 18, Limitations and Procedures in
Signals Intelligence Operations of the USSS (U), NSA (D6),
26 May 76). 3) Intelligence concerning areas not under
control of the power sponsoring the collection effort.
(Dictionary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)).
Guidance:. The general direction of an intelligence effort,
particularly in the area of collection. (Final Report,
Senate Select Committee on Intelligence, 26 April 1976).
Integration: In photography, a process by which the average
radar picture seen on several scans of the time base may be
obtained on a print, or, the'process by which several photo-
graphic images are combined into a single image. (Dictionary
of Military and Associated Terms, Dept. of Defense (U), the
Joint Chiefs of Staff, 3 Sep 74. (U)).
Intelligence: 1) The product resulting from the collection,
collation, evaluation, analysis, integration, and interpre-
tation of all collected information. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976). 2) The
product resulting from the collecting and processing of
information concerning actual and potential situations and
conditions relating to foreign activities and to foreign or
enemy-held areas. This processing includes the evaluation
and collation of the information obtained from all available
sources, and its analysis, synthesis, and interpretation.
(Basic Cryptologic Glossary (U), NSA (P1), 1971). 3) The
product resulting from the collection, evaluation, analysis,
integration, and interpretation of all available information
which concerns one or more aspects of foreign nations or of
areas of operations and which is immediately or potentially
significant to military planning and operations. (Dictionary
of Military. and Associated Terms, Dept. of Defense (U) the
Joint Chiefs of Staff, 3 Sep 74. (U)).
Intelligence cycle: 1) The steps by which information is
assembled, converted to intelligence, and made available to
users. Those steps are in four. phases:
A. Planning and direction: Determination of intelli-
gence requirements, preparation of a collection plan., is-
suance of orders'and requests to information collection
agencies, and a continuous check on the productivity of
collection agencies.
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
B. Collection: The exploitation of sources of information
by collection agencies and the delivery of this information
to the proper intelligence processing unit for use in the
production of intelligence.
C. Processing: The step whereby information becomes
intelligence through evaluation, analysis, integration, and
interpretation.
D. Dissemination: The conveyance of intelligence in
suitable form (oral, graphic, or written) to agencies needing
it. (Dictionary of Military.and Associated Terms, Dept. of
Defense (U),-the Joint Chiefs of Staff, 3 Sep 74. (U)). 2)
The steps by which information is assembled, converted into
intelligence, and made available to consumers. The cycle is
composed of four basic phases: (1) direction: the determin-
ation-of intelligence requirements, preparation of a collection
plan, tasking of collection agencies, and a continuous check
on the productivity of these agencies; (2) collection: the
exploitation of information sources and the delivery of the
collected information to the proper intelligence processing
unit for use in the production of intelligence; (3) process-
ing: the steps whereby information becomes intelligence
through evaluation, analysis, integration, and interpreta-
tion; and (4) dissemination: the distribution of information
or intelligence products (in oral, written, or graphic form)
to departmental and agency intelligence consumers. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976).
Intelligence estimate: An appraisal of the elements of
intelligence relating to a specific situation or condition
with a view to determining the courses of action open to the
enemy or potential enemy and the probable order of their
adoption. (Dictionary of Military and Associated Terms,
Dept. of Defense (U)., the Joint Chiefs of Staff, 3 Sep 74. -
(U))
Intelligence information: 1) In SIGINT, information which
is of intelligence use to customers whose primary mission
does not include SIGINT operations of technical SIGINT
information. (Basic Cryptologic Glossary (U), NSA (P1),
1971). 2-) The unevaluated and uninterpreted information
about the enemy or potential enemy. (Basic manual (U), FLINT
Collection Analysis Guide (U), National Cryptologic School,
196S).
Intelligence report: A specific report of information,
usually on a single item, made at any level of command in
tactical operations and disseminated as rapidly as possible
in keeping with the timeliness of the information. Also
called INTREP. - (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3
Sep 74. (U)).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Intelligence requirement: A consumer statement of informa-
tion needed which is not already at hand. (Final Report,
Senate Select Committee on Intelligence, 26 April 1976).
Interception: The act of searching for and listening to
and/or recording communications and/or electronic trans-
missions for the purpose of obtaining intelligence. (Glossary
of Communications-Electronics Terms (U), JCS, Dec 74).
International terrorist activity: Means any activity or
activities which: a. involves killing, causing serious
bodily harm, kidnapping,' or violent destruction of property,
or an attempt or credible threat to commit such acts; and
(b) appears intended to endanger a protectee of the Secret
Service or the Department of State or to further political,
social,. or economic goals by intimidating or coercing a
civilian population or any segment thereof, influencing the
policy of a government or international organization by
intimidation or coercion, or obtaining widespread publicity
for a group or its cause; and (c) transcends national bounda-
ries in terms of the means by which it is accomplished, the
civilian population, government, or international organiza-
tion it appears intended to coerce or intimidate, or the
locale in which its perpetrators operate or seek asylum.
(Executive Order 12036, 26 Jan 1978)
Measurement and signature intelligence (MASINT): MASINT is
obtained by quantitative and qualitative analysis of data
(metric, angle, spatial, wavelength, time dependent,'modula-
tion, plasma, and hydromagnetic) derived from sensing instru-
ments other than those normally associated with human communi-
cations, electronics intelligence (HUMINT, COMINT, ELINT) or
imagery collection. MASINT includes,, but is not limited to,
the following disciplines: Radar intelligence (RADINT):
Nuclear intelligence (NUCINT): Unintentional Radiation in-
telligence (RINT): Acoustic intelligence (Non-Compressible
fluids - ACINT: Compressible Fluids - ACOUSTINT): Electro-
Optic intelligence (Electro-OPTINT): Event-related dynamic
measurements photography (OPTINT): and debris collection.
Telemetry intelligence (TELINT) is a special category of
signals intelligence (SIGINT) that provides measurement data
on foreign instrumentation signals (FIS). Requirements for
collection will be expressed as MASINT requirements. The
term MASINT should be used when referring to the above
categories of special sensor disciplines in aggregate.
(Defense Intelligence Collection Requirements Manual (C),
DIA, 27 Jan 75).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Medical intelligence: That category of intelligence which
concerns itself with man as a living organism and those
factors affecting his efficiency, capability, and well-
being. (Dictionary of Military and Associated Terms, Dept.
of Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)).
National Foreign Intelligence Program: Includes the programs
liste -below, but its composition shall be subject to review
by the National Security Council and modification by the
President. (a) The programs of the CIA; (b) The Consolidated
Cryptologic Program, the General Defense Intelligence Program,
and the programs of the offices within the Department of
Defense for the collection of specialized national foreign
intelligence through reconnaissance except such elements as
the Director of Central Intelligence and the Secretary of
Defense agree should be excluded; (c) Other programs of
agencies within the Intelligence Community designated
jointly by the Director of Central Intelligence and the
head of the department or by the President as national
foreign intelligence or counterintelligence activities;
(d) Activities of the staff elements of the Office of the
Director of Central Intelligence; and (e) Activities to
acquire the intelligence required for the planning and
conduct of tactical operations by the United States military
forces are not included in the National Foreign Intelligence
Program. (Executive Order 12036, 26 Jan 1978).
National intelligence: 1) Integrated departmental intelli-
gence that covers the broad aspects of national policy and
national security; is of concern to more than one department
or agency, and transcends the exclusive competence of a
single department or agency. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), the Joint Chiefs of
Staff, 3 Sep 74. (U)). 2) Intelligence produced by the CIA
which bears on the broad aspects of United States national
policy and national security. It is of concern to more than
one department or agency. (Final Report, Senate Select
Committee on Intelligence, 26 April 1976).
National intelligence estimate: A strategic estimate of
ulnera ilities, and probable courses of
capabilities, vulnerabilities,-
action of foreign nations which is produced at the national
level as a composite of the views of the Intelligence Commu-
nity. (Dictionary of Military and Associated'Terms, Dept. of
Defense (U), the Joint Chie-fs of Staff, 3 Sep 74. (U)).
Operational intelligence: 1. Intelligence required for
planning an executing all types of military operations.
2. Intelligence required to support the activities of intel-
ligence agencies under the national security council.
(Basic Cryptologic Glossary (U), NSA (P1), 1971).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23: CIA-RDP80M00596A000500020014-5
Physical security: 1) The component of security which
results from all physical measures necessary to safeguard
classified equipment and material from access by unauthorized
persons. (Basic Cryptologic Glossary (U), NSA (P1), 1971).
2) The component of COMSEC which results from all physical
measures necessary to safeguard CQMSEC material and informa-
tion from access thereto or observation thereof by unauthoriz-
ed persons. (Glossary of Communications Security and Emanations
Security Terms (U), U.S. Communications Security Board, Oct
74). 3) The element of communications security that results
from all. physical measures necessary for safeguarding
classified equipment, material, and documents from access or
observation by unauthorized persons. (Communications-Electronics
Terminology (U), U.S. Dept. of the Air Force, 15 Nov 73).
4) That part of security concerned with physical measures
designed to safeguard personnel to prevent unauthorized
access to equipment, facilities, material, and documents,
and to safeguard them against espionage, sabotage, damage,
and theft. See also communications security. (Dictionary of
Military and Associated Terms, Dept. of Defense (U), the
Joint Chiefs of Staff, 3 Sep 74).
Plain text: Unencrypted communications; specifically, the
original message of a cryptogram, expressed in ordinary
language. (Final Report, Senate. Select Committee on Intel-
ligence, 26 April 1976).
Political intelligence: Intelligence concerning foreign and
domestic policies of governments and the.activities of
political movements. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff,
3 Sep 74).
Processing: 1) The manipulation of collected raw informa-
tion to make it usable in analysis to prepare for data
storage or retrieval. (Final Report, Senate Select Committee
on Intelligence, 26 April 1976) 2) Treatment of copy in
accordance with predetermined and generalized criteria so as
to produce all or some of the information contained in it in
a new medium or a new form. (The main types of processing
are conversion, scanning, extraction, digestion and diariza-
tion). (Basic Cryptologic Glossary (U), (PI), 1971). 3)
Further handling, manipulation, consolidation, compositing,
etc., of information to convert it from one format to another
or to reduce it to manageable and/or intelligible information.
(Communications-Electronics Terminology (U), U.S. Dept. of
the Air Force, 15 Nov 73). 4) In photography, the operations
necessary to produce negatives, diapositives or prints from
exposed films, plates. or paper. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), -the Joint Chiefs of
Staff, 3 Sep 74).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23: CIA-RDP80M00596A000500020014-5
Production: 1) The preparation of reports based on an
analysis of information to meet the needs of intelligence
users (consumers) within and outside the Intelligence Community.
(Final Report, Senate Select Committee on Intelligence, 26
April 1976).2. Intelligence product means the estimates,
memoranda and other reports produced from the analysis of
available information. (Executive ORder 12036, 26 Jan 1978).
Radar intelligence (RADINT): Technical and operational
information derived from observations of friendly radars, in
relation to SIGINT. It is a type of collateral information.
(SIGINT Operations Management (MR-405 Course Notes) (U),
National Cryptologic School, Sep 76).
Radiation intelligence: Intelligence derived from the col-
lection and analysis of non-information bearing elements
extracted from the electromagnetic energy unintentionally
emanated by foreign devices, equipments, and systems ex-
cluding those generated by the detonation of automatic/
nuclear weapons. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3
Sep 74).
Requirement: A general or specific request for intelligence
information made by a member of the Intelligence Community.
(Final Report, Senate Select Committee on Intelligence, 26
April 1976).
Scientific and technical intelligence: The product resulting
front collection, evaluation, analysis and interpretation of.
foreign scientific and technical information which covers:
A. Foreign developments in basi.c and applied research and in
applied engineering techniques; and B. Scientific and techni-
cal characteristics, capabilities, and limitations of all
foreign military systems, weapons, weapon systems and material.
The research and development related thereto, and the pro-
duction methods employed for their manufacture. (USSID 40,
ELINT Operating Policy (U), NSA (W09),24 Oct 75).
_Sensitive: Something which requires special protection from
closure, which could cause embarrassment, compromise, or
threat to the security of the sponsoring power. (Final
Report, Senate Select Committee on Intelligence, 26 April
1976).
Sensitive compartmented . information: The term as used in
this manual is identical with its use in DCID 1/14. It is
intended to include all information and material bearing
special Intelligence Community controls indicating restricted
handling within Community Intelligence collection programs
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/2.:,CIA-RDP80M00596A000500020014-5
and their end products for which community systems of
compartmentation are formally established. The term does
not include restricted data as defined in section 11, Atomic
Energy Act of 1954, as amended. (Security of Compartmented
Computer Operations (U), DIA, 14 Jan 75).
Signal: 1) In electronics, any transmitted electric impulse
which is of interest in the particular context; and 2) Any-
thing intentionally transmitted by visual acoustical, or
electrical methods, which is intended to convey a meaning to
the recipient. (Basic Cryptologic Glossary (U), NSA (P1),
1971). 3) A visual, audible, electrical, or other indica-
tion used to convey information; and 4) The message or
effect to be conveyed over a communication system. (Glossary
of Machine Processing Terms (U), NSA (Office of Machine
Processing), 1964). 5) Event, phenomenon or electrical
quality that conveys information from one point to another;
and 6) Operationally, a type.of message that is conveyed or
transmitted by visual, acoustical, or electric means. The
text consists of one or more letters, words, characters,
signal flags, visual displays, or special sounds with prearranged
meanings. (Communications-Electronic Terminology (U), U.S.
Dept. of the Air Force, 15 Nov 73).
Signal intelligence (SIGINT): 1) A generic term which
includes both communications intelligence (COMINT) and
electronic intelligence (ELINT). (Glossary of Communica-
tions-Electronics Terms (U), JCS, Dec 74). 2) A generic
term including Communications intelligence and electronic
intelligence, abbr. SIGINT. (SIGINT refers to the combination
of COMINT and FLINT or to either when one of them is not
specifically identified).,(Basic Cryptologic Glossary (U),
NSA (P1), 1971). 3) A generic term which includes both
communication intelligence and electronic intelligence.
Also called SIGINT. See also intelligence. (Dictionary of
Military and Associated Terms, Dept. of Defense (U), the
Joint Chiefs of Staff, 3 Sep 74. (U)). 4) A category of
intelligence information comprising all communications
intelligence (COMINT), electronics intelligence(ELINT), and
telemetry intelligence (TELINT). (Signals Intelligence
(SIGINT) (U), DOD, 25 Jan 73).
Source: 1) A person, thing, or activity which provides
intelligence information. In clandestine activities, the
terms applies to an agent or asset, normally a foreign
national, being used in an intelligence activity for intel-
ligence purposes. In interrogations, it refers to a person
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5
Approved For Release 2004/03/23 :,CIA-RDP80M00596A000500020014-5
who furnishes intelligence information with or without
knowledge that the information is being used for intel-
ligence purposes. 2) In interrogation activities, any
person who furnished intelligence that the information is
being used for intelligence purposes. In this context, a
controlled source is in the employment or under the control
of the intelligence activity and knows that his information
is to be used for intelligence purposes. An uncontrolled
source is a voluntary contributor of information and may or
.may not know that the information is to be used for intelli-
gence purposes. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff, 3
Sep 74. (U)).
Special activities: Means activities conducted abroad in
support of national foreign policy objectives which are
designed to further offical United States programs and
policies abroad and which are planned and executed so that
the role of the United States Government is not apparent or
acknowledged publicly, and functions in support of such
activities, but not including diplomatic activity or the
collection and production of intelligence or related. support
functions. (Executive Order 12036, 26 Jan 78).
Special intelli ence communications (SPINTCOMM): SPINTCOMM
was establisie y Secretary o Defense Memorandum, dated 4
.November 1964. It consists of those communications facilities
under the operational and technical control of the chief of
intelligence of each of the military departments and under
the management of the Defense Intelligence A enc
Special Security Communications System (DSSCS) OperaDtingnse
Instructions System/Data Procedures (U), NSA (T32), 8 Oct
75).
Special sensor: Equipment on instrumented platforms and in
installations designed to collect measurement and signature
data that can be further processed into data usable by
intelligence analysts. (Defense Intelligence Collection
Requirements Manual (C), DIA, 27 Jan.75).
Tactical intelligence: Intelligence which is required for
the planning an conduct of tactical operations. Essentially
tactical intelligence and strategic intelligence differ only
in scope, point of view and level of employment. (Dictionary
of Military and Associated Terms, Dept. of Defense (U), the
Joint Chiefs of Staff, 3 Sep 74. (U)).
Approved For Release 2004/03/23 : CIA-RDP80M00596A000500020014-5