Author Topic: Intelligence & counterintelligence terms (vocabulary)  (Read 4581 times)

0 Members and 1 Guest are viewing this topic.

Offline kimono

  • Hero Member
  • *****
  • Posts: 779
Intelligence & counterintelligence terms (vocabulary)
« on: January 04, 2014, 12:43:55 PM »
I've found a very interesting document (pdf) to read for everyone who want to learn the language used by intelligence communities: it's free to download

examples of terms:

. An abbreviation for Analytical Space. A virt
ual work environment that provides analyst from
across the Intelligence Community a common platform
to do their research and analysis and to easily
connect with colleagues working the same or simila
r issues to collaboratively achieve common mission
objectives. (Intellipedia; accessed 22 Oct 2010) Also see
. To terminate a mission for any reason other t
han enemy action. It may occur at any point after
the beginning of the mission and prior to its completion. (JP 1-02)*

Access Agent
. An individual used to acquire information on an otherwise inaccessible target. (Human
Derived Information Lexicon Terms and Definitions for HUMINT, Counterintelligence, and Related
Activities, April 2008, hereinafter referr
ed to as HDI Lexicon) Also see
 -- Also, an agent whose relationship or potential
relationship with a foreign intelligence personality
allows him or her to serve as a channel for the in
troduction of another controlled agent for the purpose of
recruitment of the target. (AFOSI Manual 71-142, 9 Jun 2000)
-- Also, a person who facilitates contact with a target
 individual or entry into a facility. (Spycraft: The
Secret History of the CIA’s Spytechs from Communi
sm to Al-Qaeda, 2008; hereinafter referred to as

. During wartime, any person who is found lurking
as a spy or acting as a spy in or about any
place, vessel or aircraft, within the control or jurisdic
tion of any of the Armed Forces or in or about any
shipyard, any manufacturing or industrial plant, or any
other place or institution engaged in work in aid of
the prosecution of the war by the United Stat
es, or elsewhere. (DoDI 5240.06, 7 Aug 2004)
in time of war is a violation of Article 10
6, Uniform Code of Military Justice (UCMJ).
One spy in the right place is worth 20,000 men in the field
-- Napoleon
Like war, spying is dirty business. Shed of its allege
d glory, a soldier’s job is to kill. Peel away the
claptrap of espionage and the spy’s job is to betray trust.
-- William Hood,

. A wide range of unwanted programs that exploit
infected computers for commercial gain. They
can deliver unsolicited pop-up advertisements, steal
personal information (including financial information
such as credit card numbers), monitor web-browsing
activity for marketing purposes, or route HTTP
requests to advertising sites. (, accessed 15 Nov 201

Surveillance Detection
. Measures taken to detect and/or verify whether an individual, vehicle, or location
is under surveillance. (DoDI S-5240.15, 20 Oct 2010) Also see
counter surveillance
-- Measures taken to determine if an individual is
under surveillance. (HDI Lexicon, April 2008)
-- Also, self-initiated actions taken by a target/sub
ject to identify surveillance. Conducted by taking
advantage of screen and flow, couple with detailed
route selection, and noting possible surveillance
against time and distance relationships. (CI Community Lexicon

Suspicious Activity
. Observed behavior that may be indicative of intelligence gathering or other pre-
operational planning related to a terrorist or other
security threat to DoD interests worldwide.
(DTM 10-018, Law Enforcement Reporting of
 Suspicious Activity, 1 Oct 2010)
-- Also, observed behavior reasonably indicative of
pre-operational planning related to terrorism or
other criminal activity. (ISE-FS-200 v1.5)
"Les hommes qui ont vécu dans les laboratoires n'imaginent guère que les partis extrêmes" -
"Men who lived in the laboratories can hardly imagine anything else than extreme parties" (Louis Aragon, 1897-1982)