GLOSSARY OF INTELLIGENCE TERMS AND DEFINITIONS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP80M00596A000500020003-7
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
41
Document Creation Date:
December 19, 2016
Document Release Date:
November 30, 2006
Sequence Number:
3
Case Number:
Publication Date:
June 15, 1978
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP80M00596A000500020003-7.pdf | 3.2 MB |
Body:
Approved For Release 2006/12/01: CI.A-R DP80M00596A0ke0020g0317
FOR OFFICIAL USE ONLY
Glossary of Intelligence Terms
and Definitions
.luri.e '115, 1978
Published by. the Intelligence Community Staff
For the Director of Central Intelligence
With Advice of the.. National Foreign
Intelligence Board
FOR. OFFICIAL USE ONLY
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
PREFACE
This publication is the product of an interagency working group formed by the
National Foreign Intelligence Board in September 1977, and composed of representa-
tives from the organizations which constitute the Intelligence Community.
This publication is designed to be a reference and guidance document for inter-
departmental communications and understanding within the Intelligence Community
and is a means of fostering communication with other Executive Branch organizations
and with the Congress and the Judiciary. The glossary reflects only those intelligence
terms commonly used within and definitions commonly accepted by the Community.
It does not include organizationally peculiar terms or definitions nor does it include
such details as could be addressed only in a classified document.
The value of this document is dependent upon its currency and completeness;
thus, it is expected that changes will occur as new terms evolve and as definitions
change. Users are encouraged to submit proposed corrections, additions, deletions, or
amendments through their Intelligence Community representative to the Executive
Secretary, National Foreign Intelligence Board. The interagency working group will
support the Executive Secretary and will be responsible for a review of proposed
changes, an annual review of the entire document for currency and adequacy, and the
submission of recommended changes to the National Foreign Intelligence Board.
Although this document has been designed to enhance the efficiency of
communications within the Intelligence Community, it is hoped that it will also
contribute to language commonality throughout the intelligence field. In this regard,
authors of other intelligence glossaries and of other special-use glossaries which contain
intelligence terms are encouraged to consider the terms and definitions contained
herein.
The definitions in this glossary may not coincide precisely with definitions used
elsewhere for departmental or legal purposes, especially where definitions were
devised for the purpose of supporting and clarifying the language of a legal document.
However, terms which have been given other definitions have been annotated with a
reference to Appendix B, which contains the term and the definition or definitions
and cites the source document. Current publications and documents known to contain
intelligence terms and definitions, to include those definitions contained in Appendix
B, are listed in the index at Appendix C.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
CONTENTS
Page
PREFACE .................................................................................................................. iii
METHODOLOGY .................................................................................................... vii
GLOSSARY OF INTELLIGENCE TERMS AND DEFINITIONS .................. 1
APPENDIX A: Acronyms and Abbreviations ...................................................... la
APPENDIX B: Alternate Definitions ...................................................................... lb
(Which appear in other publications)
APPENDIX C: Index of Intelligence Glossaries .................................................. lc
(Publications containing definitions of intelligence terms)
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
METHODOLOGY
The definitions in this glossary have been devised by intelligence officers, not by
philologists or semanticists. Some definitions, therefore, may have limited applicability
outside the Intelligence Community, while other definitions may be restricted to the
single use of a word which has intelligence significance; as, for example, in the word
source. Insofar as possible, however, the definitions included here contain a measure
of consistency of form, and an attempt has been made to establish relationships among
important intelligence words and terms. A basic example exists in the relationships to
be found among the terms information, intelligence information and intelligence.
William R. Corson, in his The Armies of Ignorance, observed:
A word of caution about the term intelligence is in order. Too often it is
used synonymously or interchangeably with information. This is inaccurate
and quite misleading. Information until and unless it has been analyzed and
evaluated remains nothing more than a fact. Information may be interesting,
amusing, or hitherto unknown to the person receiving it, but by and in itself
it is inappropriate to call it intelligence. The three terms intelligence,
intelligence information, and information need to remain distinct. Intelli-
gence by itself refers to the meaning of, or a conclusion about, persons,
events, and circumstances which is derived from analysis and/or logic.
Intelligence information consists of facts bearing on a previously identified
problem or situation, the significance of which has not been completely
established. And information is made of raw facts whose relationship to other
phenomena has yet to be considered or established. Similarly, the methods
involved in acquiring information and/or intelligence information by any
means and turning it into intelligence constitute the intelligence process or
cycle. The distinctions between these terms are important to remember....
This glossary makes similar distinctions: information is unevaluated material of
every description, intelligence information is information of potential intelligence
value, and intelligence is the knowledge derived from a cyclical processing of
information. The articulation of these differences is fundamental to the repeated use
of these terms in defining other terms. One will find, for example, that nuclear
intelligence is defined as intelligence derived from the collection and analysis of
radiation, etc., whereas communications intelligence is defined as technical and
intelligence information derived from the intercept of foreign communications, etc.
(not yet analyzed, it is not yet intelligence). Such fine distinctions are expected to
contribute to a broader understanding of the common meanings of many such terms.
Arriving at a suitable definition for the word intelligence is a challenge unto
itself. In Sherman Kent's Strategic Intelligence for American World Policy,
intelligence is characterized as having three definitional subsets: knowledge,
organization, and activity. This concept is particularly useful in establishing the fact
that intelligence in the current context has multiple meanings.
Intelligence, he says, is the knowledge that our nation must possess regarding
other nations in order to assure itself that its interests will not fail because of planning
or decisionmaking done in ignorance; and upon which knowledge our national foreign
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
policy is based. Intelligence is also an institution; ... a physical organization of living
people which pursues the special kind of knowledge at issue. And intelligence is the
activity which the organization performs: research, analysis, collection, evaluation,
study, presentation, and myriad others.
As helpful as they are, Kent's definitions are excessively delimiting for purposes
of this glossary. In the sense that intelligence is knowledge, for example, one cannot
assume that all intelligence is "our" intelligence. It is necessary, therefore, to fashion
the most basic definition possible for the word intelligence in this sense of its meaning,
trusting in the utilizer's ability to select a proper modifier to give the word more
precise meaning when that is necessary. More definitional flexibility results from such
an approach.
But intelligence is more than the knowledge contained in an intelligence product.
It encompasses the intelligence organizations and activities that Kent refers to, and
other activities-and their resultant products-which are known as counterintelli-
gence. For these reasons, one might be tempted to define intelligence simply as a
generic term which encompasses both foreign intelligence and foreign counterintelli-
gence, thence to formulate separate definitions for each of those terms. One quickly
discovers, however, that such a simplistic approach is insufficiently satisfying because
it fails to provide for several shades of meaning and subsequent use.
The problem is compounded by the scores of different types of intelligence that
are used commonly and which must be broadly understood, and by the variety of
headings under which these types of intelligence are classified. Some types of
intelligence are source-oriented (such as human intelligence or signals intelligence),
some form-oriented (as in raw or unfinished intelligence), some system-oriented
(electronic or telemetric), some subject-oriented (medical, economic), some use-
oriented (military, tactical), and a probable host of others. But the point to be made
here is how essential the basic definition of intelligence is to further understanding of
the many, many ways in which it can be used. The definition of intelligence as it
appears in this glossary attempts to account for all of the foregoing.
Acoustic(al) Intelligence (ACOUSTINT or ACINT)
Actionable Intelligence
Basic Intelligence
Biographic(al) Intelligence
Cartographic Intelligence
Combat Intelligence
Communications Intelligence (COMINT)
Counterintelligence
Critical Intelligence
Current Intelligence
Department(al) Intelligence
Economic Intelligence
Electro-Optical Intelligence (ELECTRO-OPTINT)
Electronic Intelligence (ELINT)
Energy Intelligence
Estimative Intelligence
Evasion and Escape Intelligence
Finished Intelligence
Foreign Counterintelligence (FCI)
Foreign Instrumentation Signals Intelligence
(FISINT)
Foreign Intelligence (FI)
Foreign Materiel (FORMAT) Intelligence
Geographic(al) Intelligence
Human Intelligence (HUMINT)
Imagery Intelligence (IMINT)
Joint Intelligence
Laser Intelligence (LASINT)
Measurement and Signature Intelligence (MASINT)
Medical Intelligence (MEDINT)
Military Intelligence (MI)
National Intelligence
Nuclear Intelligence (NUCINT)
Nuclear Proliferation Intelligence
Operational Intelligence (OPINTEL)
Optical Intelligence (OPTINT)
Photographic Intelligence (PHOTINT)
Political Intelligence
Positive Intelligence
Radar Intelligence (RADINT)
Radiation Intelligence (RINT)
Raw Intelligence
Scientific and Technical (S&T) Intelligence
Signals Intelligence (SIGINT)
Special Intelligence (SI)
Strategic Intelligence
Tactical Intelligence (TACINTEL)
Target Intelligence
Technical Intelligence (TI)
Telemetry Intelligence (TELINT)
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
The reader will notice frequent cross-referencing between terms and their
definitions. In addition to providing an intelligence lexicon, the glossary purports to be
tutorial, inasmuch as it is possible, and frequent cross-referencing is a technique
employed intentionally to that end.
The term cross-referenced most often is intelligence cycle which, with its
separately defined steps, is conceptually fundamental to understanding the vocabulary
of intelligence. The definitional technique is to list the steps in the cycle as subsets of it
(rather than in their normal alphabetical order in the glossary), and to refer many
related terms to the cycle and its various steps. The desired result is to keep the
reader's focus on the intelligence cycle in order to maintain the conceptual integrity of
its component steps.
The drafters of the definitions contained in this glossary were not constrained by
existing definitions or by the narrow meaning of terms where broader significance
could be achieved by redefinition. Known definitions were nevertheless accommo-
dated to the greatest extent possible. The primary objective of the drafters was to
define those terms that lacked definition and to improve on those definitions extant.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
GLOSSARY OF INTELLIGENCE TERMS AND DEFINITIONS
acoustical intelligence* (ACOUSTINT): Intelligence
information derived from analysis of acoustic waves
radiated either intentionally or unintentionally by the
target into the surrounding medium. (In Naval usage,
the acronym ACINT is used and usually refers to
intelligence derived specifically from analysis of
underwater acoustic waves from ships and
submarines.)
actionable intelligence: Intelligence information that
is directly useful to customers without having to go
through the full intelligence production process; it
may address strategic or tactical needs, close-support
of U.S. negotiating teams, or action elements dealing
with such matters as international terrorism or
narcotics.
administratively controlled information: Privileged but
unclassified material bearing designations such as
FOR OFFICIAL USE ONLY, or LIMITED OFFI-
CIAL USE, to prevent disclosure to unauthorized
persons.
advisory tasking: A non-directive statement of intelli-
gence interest or a request for intelligence information
which is usually addressed by an element of the
Intelligence Community to departments or agencies
having information collection capabilities or intelli-
gence assets not a part of the National Foreign
Intelligence Program.
agent*: A person who engages in clandestine intelli-
gence activity under the direction of an intelligence
organization but who is not an officer, employee, or
co-opted worker of that organization.
agent of influence*: A person who is manipulated by
an intelligence organization to use his position to
influence public opinion or decisionmaking in a
manner which will advance the objective of the
country for which that organization operates.
alert memorandum: A document issued by the
Director of Central Intelligence to National Security
Council-level policymakers to warn them of possible
developments abroad, often of a crisis nature, of
major concern to the U.S.; it is coordinated within the
Intelligence Community to the extent time permits.
analysis*: A process in the production step of the
intelligence cycle in which intelligence information is
subjected to systematic examination in order to
identify significant facts and derive conclusions
therefrom. (Also see intelligence cycle.)
assessment*: (1) (General use) Appraisal of the worth
of an intelligence activity, source, information, or
product in terms of its contribution to a specific goal,
or the credibility, reliability, pertinency, accuracy, or
usefulness of information in terms of an intelligence
need. When used in contrast with evaluation assess-
ment implies a weighing against resource allocation,
expenditure, or risk. (See evaluation.) (2) (Production
context) See intelligence assessment. (Also see net
assessment.)
asset*: See intelligence asset. (Also see national
intelligence asset and tactical intelligence asset.)
authentication: (1) A communications security mea-
sure designed to provide protection against fraudulent
transmission and hostile imitative communications
deception by establishing the validity of a transmis-
sion, message, station, or designator. (2) A means of
identifying or verifying the eligibility of a station,
originator, or individual to receive specific categories
of information. (Also see communications deception.)
automatic data processing system security: All of the
technological safeguards and managerial procedures
established and applied to computer hardware,
software, and data in order to ensure the protection of
organizational assets and individual privacy; it in-
cludes: all hardware/software functions, characteris-
tics, and features; operational procedures, account-
ability procedures, and access controls at the central
computer facility; remote computer and terminal
facilities, management constraints, physical structures
and devices; and the personnel and communication
controls needed to provide an acceptable level of
protection for classified material to be contained in
the computer system.
basic intelligence*: Comprises general reference mate-
rial of a factual nature which results from a collection
of encyclopedic information relating to the political,
economic, geographic, and military structure, re-
sources, capabilities, and vulnerabilities of foreign
nations.
biographical intelligence: Foreign intelligence on the
views, traits, habits, skills, importance, relationships,
health, and curriculum vitae of those foreign personal-
ities of actual or potential interest to the United
States Government.
cartographic intelligence: Intelligence primarily mani-
fested in maps and charts of areas outside the United
States and its territorial waters.
case officer*: A professional employee of an intelli-
gence organization who is responsible for providing
direction for an agent operation. (See agent.)
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Central Intelligence Agency Program (CIAP): See
National Foreign Intelligence Program.
cipher*: A cryptographic system in which the
cryptographic treatment (i.e., the method of trans-
forming plain text by predetermined rules to obscure
or conceal its meaning) is applied to plain text
elements such as letters, digits, polygraphs, or bits
which either have no intrinsic meaning or are treated
without regard to their meaning in cases where the
element is a natural-language word.
clandestine: Secret or hidden; conducted with secrecy
by design.
clandestine activity: Secret or hidden activity con-
ducted with secrecy by design. (The phrase clandes-
tine operation is preferred. Operations are pre-
planned activities.)
clandestine collection: The acquisition of intelligence
information in ways designed to assure the secrecy of
the operation.
clandestine communication: Any type of communica-
tion or signal originated in support of clandestine
operations. (Also see illicit communication.)
clandestine operation*: A pre-planned secret intelli-
gence information collection activity or covert politi-
cal, economic, propaganda, or paramilitary action
conducted so as to assure the secrecy of the operation;
encompasses both clandestine collection and covert
action.
Clandestine Services: That portion of the Central
Intelligence Agency (CIA) that engages in clandes-
tine operations; sometimes used as synonymous with
the CIA Operations Directorate.
classification: The determination that official infor-
mation requires, in the interest of national security, a
specific degree of protection against unauthorized
disclosure, coupled with a designation signifying that
such a determination has been made; the designation
is normally termed a security classification. (Also see
declassification.)
classification authority: Those officials within the
Executive Branch who have been authorized pursuant
to an Executive Order to originally classify informa-
tion or material.
classified information*: Official information which
has been determined to require, in the interests of
national security, protection against unauthorized
disclosure and which has been so designated.
code*: A cryptographic system in which the crypto-
graphic equivalents (usually called code groups),
typically consisting of letters or digits (or both) in
otherwise meaningless combinations, are substituted
for plain text elements such as words, phrases, or
sentences.
code word*: Generally, a word or term which conveys
a prearranged meaning other than the conventional
one; specifically, a word or term chosen to conceal the
identity of a function or action, as distinguished from
a cover name which conceals the identity of a person,
organization, or installation. (Also see cover.)
CODEWORD*: Any of a series of designated words
or terms used with a security classification to indicate
that the material so classified was derived through a
sensitive source or method, constitutes a particular
type of sensitive compartmented information (SCI),
and is therefore accorded limited distribution.
collateral: All national security information classified
under the provisions of an Executive Order for which
special Intelligence Community systems of compart-
mentation (i.e., sensitive compartmented information)
are not formally established.
collection*: See intelligence cycle.
collection guidance: See guidance.
collection requirement: An expression of an intelli-
gence information need which requires collection and
carries at least an implicit authorization to commit
resources in acquiring the needed information. (Also
see intelligence requirement.)
combat information: Unevaluated data, gathered by
or provided directly to the tactical commander which,
due to its highly perishable nature or the criticality of
the situation, cannot be processed into tactical
intelligence in time to satisfy the customer's tactical
intelligence requirements.
combat intelligence: That knowledge of the enemy,
weather, and geographical features required by a
commander in the planning and conduct of combat
operations. (Also see tactical intelligence.)
Committee on Exchanges (COME)U! Sec Director of
Committee on Imagery Requirements and Exploitation
(COMIREX): See Director of Central Intelligence
Committee. (Also see DCID 1/13.)
communications cover: See manipulative communica-
tions cover.
communications deception: The deliberate transmis-
sion, retransmission, alteration, absorption, or reflec-
tion of telecommunications in a manner intended to
cause a misleading interpretation of these telecom-
munications. It includes:
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
a. imitative communications deception-Intrusion
into foreign communications channels for the purpose
of deception by introducing signals or traffic in
imitation of the foreign communications.
b. manipulative communications deception-The
alteration or simulation of friendly telecommunica-
tions for the purpose of deception.
communications intelligence* (COMINT): Technical
and intelligence information derived from intercept of
foreign communications by other than the intended
recipients; it does not include the monitoring of
foreign public media or the intercept of communica-
tions obtained during the course of counterintelligence
investigations within the United States.
communications security* (COMSEC): The protection
resulting from any measures taken to deny unauthor-
ized persons information of value which might be
derived from telecommunications, or to ensure the
authenticity of such telecommunications.
communications security signals acquisition and
analysis: The acquisition of radio frequency propaga-
tion and its subsequent analysis to determine empiri-
cally the vulnerability of the transmission media to
interception by hostile intelligence services; it includes
cataloging the transmission spectrum and taking
signal parametric measurements as required but does
not include acquisition of information carried on the
system; it is one of the techniques of communications
security surveillance. (Also see communications secu-
rity surveillance.)
communications security surveillance: The systematic
examination of telecommunications and automatic
data processing systems to determine the adequacy of
communications security measures: to identify com-
munications security deficiencies, to provide data
from which to predict the effectiveness of proposed
communications security measures, and to confirm
the adequacy of such measures after implementation.
Community On-Line Intelligence System (COINS): A
network of Intelligence Community computer-based
information storage and retrieval systems that have
been interconnected for interagency sharing of ma-
chine formatted files.
compartmentation*: Formal systems of restricted
access to intelligence activities, such systems estab-
lished by and/or managed under the cognizance of
the Director of Central Intelligence to protect the
sensitive aspects of sources, methods, and analytical
procedures of foreign intelligence programs. (Also see
decompartmentation.)
compromise*: The exposure of classified official
information or activities to persons not authorized
access thereto; hence, unauthorized disclosure. (Also
see classified information.)
compromising emanations: Unintentional emissions
which could disclose information being transmitted,
received, or handled by any information-processing
equipment.
computer security*: The computer-driven aspects of
automatic data processing system security encompass-
ing the mechanisms and techniques that control
access to or use of the computer or information stored
in it. (Also see automatic data processing system
security.)
Consolidated Cryptologic Program (CCP): See Na-
tional Foreign Intelligence Program.
Consolidated Intelligence Resources Information Sys-
tem (CIRIS): The automated management informa-
tion system used to identify and display the expected
distribution of all intelligence resources within the
National Foreign Intelligence Program.
consumer*: See customer.
co-opted worker: A national of a country but not an
officer or employee of the country's intelligence
service who assists that service on a temporary or
regular basis. (In most circumstances a co-opted
worker is an official of the country but might also be,
for example, a tourist or student.)
coordination: (1) (In general) The process of seeking
concurrence from one or more groups, organizations,
or agencies regarding a proposal or an activity for
which they share some responsibility, and which may
result in contributions, concurrences, or dissents. (2)
(In intelligence production) The process by which
producers gain the views of other producers on the
adequacy of a specific draft assessment, estimate, or
report; it is intended to increase a product's factual
accuracy, clarify its judgments, resolve disagreement
on issues that permit, and sharpen statements of
disagreement on, major unresolved issues.
counterintelligence*: See foreign counterintelligence.
cover: Protective guise used by a person, organization,
or installation to prevent identification with clandes-
tine operations.
covert: See clandestine.
covert action: A clandestine operation designed to
influence foreign governments, events, organizations,
or persons in support of United States foreign policy;
it may include political, economic, propaganda, or
paramilitary activities. Covert action is referred to in
Executive Order No. 12036 as special activities. (See
special activities.)
covert operation: See clandestirr operation (preferred
term). A covert operation encompasses covert action
and clandestine collection.
Critical Collection Problems Committee (CCP
Director of Central Intelligence Committee.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
critical intelligence*: Intelligence information or
intelligence of such urgent importance to the security
of the United States that it is transmitted at the
highest priority to the President and other national
decisionmaking officials before passing through regu-
lar evaluative channels.
Critical Intelligence Communications System (CRITI-
COMM): Those communications facilities under the
operational and technical control of the Director,
National Security Agency which have been allocated
for the timely handling of critical intelligence. (Also
see critical intelligence.)
critical intelligence message* (CRITIC): A message
designated as containing critical intelligence. (Also
see critical intelligence.)
cryptanalysis (CA): The steps or processes involved in
converting encrypted messages into plain text without
initial knowledge of the system or key employed in the
encryption.
CRYPTO: A designation which is applied to classi-
fied, cryptographic information which involves special
rules for access and handling. (Also see cryptographic
information.)
cryptographic information: All information signifi-
cantly descriptive of cryptographic techniques and
processes or of cryptographic systems and equipment,
or their functions and capabilities, and all cryptoma-
terial ("significantly descriptive" means that the
information could, if made known to unauthorized
persons, permit recovery of specific cryptographic
features of classified crypto-equipment, reveal weak-
nesses of associated equipment which could allow
recovery of plain text or of key, aid materially in the
cryptanalysis of a general or specific cryptosystem, or
lead to the cryptanalysis of an individual message,
command, or authentication). (Also see CRYPTO.)
cryptographic security: The component of communi-
cations security that results from the provision of
technically sound cryptographic systems and which
provides for their proper use.
cryptographic system: All associated items of crypto-
material (e.g., equipment and their removable compo-
nents which perform cryptographic functions, operat-
ing instructions, and maintenance manuals) that are
used as a unit to provide a single means of encryption
and decryption of plain text so that its meaning may
be concealed; also any mechanical or electrical device
or method used for the purpose of disguising,
authenticating, or concealing the contents, signifi-
cance, or meanings of communications; short name:
cryptosystem.
cryptography*: The branch of cryptology used to
provide a means of encryption and deception of plain
text so that its meaning may be concealed.
cryptologic activities: The activities and operations
involved in the production of signals intelligence and
the maintenance of signals security.
cryptology: The science of producing signals intelli-
gence and maintaining signals security. (Also see
cryptanalysis and cryptography.)
cryptomaterial*: All material (including documents,
devices, or equipment) that contains cryptographic
information and is essential to the encryption,
decryption, or authentication of telecommunications.
cryptosecurity: Shortened form of cryptographic
security. See above.
cryptosystem: Shortened form of cryptographic sys-
tem. See above.
current intelligence*: Intelligence of all types and
forms of immediate interest to the users of intelli-
gence; it may be disseminated without the delays
incident to complete evaluation, interpretation, analy-
sis, or integration.
customer: An authorized person who uses intelligence
or intelligence information either to produce other
intelligence or directly in the decisionmaking process;
it is synonymous with consumer and user.
damage assessment: (1) (Intelligence Community
context.) An evaluation of the impact of a compro-
mise in terms of loss of intelligence information,
sources, or methods, and which may describe and/or
recommend measures to minimize damage and
prevent future compromises. (2) (Military context.)
An appraisal of the effects of an attack on one or
more elements of a nation's strength (military,
economic, and political) to determine residual capabi-
lity for further military action in support of planning
for recovery and reconstitution.
DCID 1/2 Attachment: An annual publication by the
Director of Central Intelligence (DCI) which estab-
lishes a priorities classification system; it presents
requirements categories and foreign countries in a
geotopical matrix, against which priorities are as-
signed which provide the Intelligence Community
with basic substantive priorities guidance for the
conduct of all U.S. foreign intelligence activities; it
includes a system for adjusting priorities between
annual publications; priorities are approved by the
DCI with the advice of the National Foreign
Intelligence Board. (Also see priority.)
deception: Those measures designed to mislead a
foreign power, organization, or person by manipula-
tion, distortion, or falsification of evidence to induce
him to react in a manner prejudicial to his interests.
(Also see communications deception, electronic coun-
termeasures, and manipulative deception.)
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
declassification: Removal of official information from
the protective status afforded by security classifica-
tion; it requires a determination that disclosure no
longer would be detrimental to national security.
(Also see classification.)
decode: To convert an encoded message into plain
text.
decompartmentation: The removal of information
from a compartmentation system without altering the
information to conceal sources, methods, or analytical
procedures. (Also see compartmentation.)
decrypt: To transform an encrypted communication
into its equivalent plain text.
decipher: To convert an enciphered communication
into its equivalent plain text.
defector*: A national of a designated country who has
escaped from its control or who, being outside its
jurisdiction and control, is unwilling to return and
who is of special value to another government because
he is able to add valuable new or confirmatory
intelligence information to existing knowledge about
his country. (Also see emigre, refugee, and disaffected
person.)
Defense Intelligence Community*: Refers to the
Defense Intelligence Agency (DIA), the National
Security Agency (NSA) and the Military Services'
intelligence offices including Department of Defense
(DoD) collectors of specialized intelligence through
reconnaissance programs.
departmental intelligence*: Foreign intelligence pro-
duced and used within a governmental department or
agency in meeting its assigned responsibilities.
direction finding (DF): A procedure for obtaining
bearings on radio frequency emitters with the use of a
directional antenna and a display unit on an intercept
receiver or ancillary equipment.
Director of Central Intelligence (DCI): The President's
principal foreign intelligence adviser appointed by
him with the consent of the Senate to be the head of
the Intelligence Community and Director of the
Central Intelligence Agency and to discharge those
authorities and responsibilities as they are prescribed
by law and by Presidential and National Security
Council directives.
Director of Central Intelligence Committee: Any one
of several committees established by the Director of
Central Intelligence (DCI) to advise him and to
perform whatever functions he shall determine; DCI
Committees usually deal with Intelligence Commu-
nity concerns, and their terms of reference ordinarily
are specified in DCI Directives; members may be
drawn from all components of the Intelligence
Community. (Also see Director of. Central Intelli-
gence Directive.)
Director of Central Intelligence Directive (DCID): A
directive issued by the Director of Central Intelli-
gence which outlines general policies and procedures
to be followed by intelligence agencies and organiza-
tions which are under his direction or overview.
disaffected person: A person apparently disenchanted
with his current situation who may therefore be
exploitable for intelligence purposes; e.g., by the
willingness to become an agent or defector. (Also see
walk-in.)
disclosure: The authorized release of classified infor-
mation through approved channels.
dissemination*: See intelligence cycle.
domestic collection: The acquisition of foreign intelli-
gence information within the United States from
governmental or nongovernmental organizations or
individuals who are witting sources and choose to
cooperate by sharing such information.
double agent*: An agent who is cooperating with an
intelligence service of one government on behalf of
and under the control of an intelligence or security
service of another government, and is manipulated by
one to the detriment of the other.
downgrade: To change a security classification from a
higher to a lower level.
economic intelligence*: Foreign intelligence concern-
ing the production, distribution and consumption of
goods and services, labor, finance, taxation, and other
aspects of the international economic system.
Economic Intelligence Committee (EIC): See Director
of Central Intelligence Committee. (Also see DCID
3/1.)
electro-optical intelligence (ELECTRO-OPTINT): In-
telligence information derived from the optical moni-
toring of the electromagnetic spectrum from ultravio-
let (0.01 micrometers) through far (long wavelength)
infrared (1,000 micrometers). (Also see optical
intelligence.)
electronic countermeasures (ECM): That division of
electronic warfare involving actions taken to prevent
or reduce an adversary's effective use of the
electromagnetic spectrum. Electronic countermeas-
ures include electronic jamming, which is the
deliberate radiation, reradiation, or reflection of
electromagnetic energy with the object of impairing
the uses of electronic equipment used by an adversary;
and electronic deception, which is similar but is
intended to mislead an adversary in the interpretation
of information received by his electronic system.
electronic counter-countermeasures (ECCM): The di-
vision of electronic warfare involving actions taken to
ensure the effective use of the electromagnetic
spectrum despite an adversary's use of electronic
countermeasures. (Also see electronic warfare.)
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
electronic emission security: Those measures taken to
protect all transmissions from interception and
electronic analysis.
electronic intelligence* (ELINT): Technical and intel-
ligence information derived from foreign noncom-
munications electromagnetic radiations emanating
from other than atomic detonation or radioactive
sources.
electronic order of battle* (EOB): A listing of non-
communications electronic devices including site
designation, nomenclature, location, site function, and
any other pertinent information obtained from any
source and which has military significance when
related to the devices.
electronic security* (ELSEC): The protection resulting
from all measures designed to deny unauthorized
persons information of value which might be derived
from their intercept and analysis of non-communica-
tions electromagnetic radiations; e.g., radar.
electronic surveillance*: Acquisition of a nonpublic
communication by electronic means without the
consent of a person who is a party to an electronic
communication or, in the case of a nonelectronic
communication, without the consent of a person who
is visibly present at the place of communication, but
not including the use of radio direction finding
equipment solely to determine the location of a
transmitter.
electronic warfare (EW): Military action involving the
use of electromagnetic energy to determine, exploit,
reduce, or prevent hostile use of the electromagnetic
spectrum, and action which retains friendly use of the
electromagnetic spectrum. (The three divisions of
electronic warfare are: electronic warfare support
measures, electronic countermeasures, and electronic
counter-countermeasures.)
electronic warfare support measures (ESM): That
division of electronic warfare involving actions to
search for, intercept, locate, record, and analyze
radiated electromagnetic energy for the purpose of
exploiting such radiations in support of military
operations; thus, electronic warfare support measures
provide a source of electronic warfare information
which may be used for immediate action involving
conduct of electronic countermeasures, electronic
counter-countermeasures, threat detection and avoid-
ance, target acquisition, homing, and other combat
support measures.
emanations security (EMSEC): The protection result-
ing from all measures designed to deny unauthorized
persons information of value which might be derived
from intercept and analysis of compromising emana-
tions from other than cryptographic equipment and
telecommunications systems. (Also see emission
security.)
emigre: A person who departs from his country for
any lawful reason with the intention of permanently
resettling elsewhere. (Also see refugee and defector.)
emission security: The component of communications
security resulting from all measures taken to deny to
unauthorized persons information of value which
might be derived from intercept and analysis of
compromising emanations from cryptographic equip-
ment and telecommunications systems. (Also see
emanations security.)
encode: To convert plain text into a different form by
means of a code.
encipher*: To encrypt plain text by means of a cipher.
(Also see cipher.)
encrypt*: To convert plain text into a different form in
order to conceal its meaning.
end product: See finished intelligence. (Also see
product.)
energy intelligence: Intelligence relating to the techni-
cal, economic and political capabilities and programs
of foreign countries to engage in development,
utilization, and commerce of basic and advanced
energy technologies; it includes: the location and
extent of foreign energy resources and their alloca-
tion; foreign government energy policies, plans, and
programs; new and improved foreign energy technolo-
gies; and economic and security aspects of foreign
energy supply, demand, production distribution, and
utilization.
espionage*: Intelligence activity directed toward the
acquisition of information through clandestine means
and proscribed by the laws of the country against
which it is committed.
essential elements of information (EEI): Those items of
intelligence information essential for timely decisions
and for enhancement of operations and which relate
to foreign power, forces, targets, or the physical
environment.
estimative intelligence: A category of intelligence
which attempts to project probable future foreign
courses of action and developments and their implica-
tions for U.S. interests; it may or may not be
coordinated and may be either national or depart-
mental intelligence.
evaluation*: Appraisal of the worth of an intelligence
activity, information, or product in terms of its
contribution to a specific goal; or the credibility,
reliability, pertinency, accuracy, or usefulness of
information in terms of an intelligence need. Evalua-
tion may be used without reference to cost or risk,
particularly when contrasted with assessment (Also
see assessment); it is also a process in the production
step of the intelligence cycle. (See intelligence cycle.)
evasion and escape (E & E): The procedures and
operations whereby military personnel and other
selected individuals are enabled to emerge from
enemy-held or hostile areas to areas under friendly
control.
Am
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
evasion and escape intelligence: Processed intelligence
information prepared to assist personnel to avoid
capture if lost in enemy-dominated territory or to
escape if captured.
exploitation*: The process of obtaining intelligence
information from any source and taking advantage of
it for intelligence purposes. (Also see source.)
finished intelligence: The result of the production step
of the intelligence cycle; the intelligence product.
(Also see intelligence cycle and end product.)
foreign affairs community: Those U.S. Government
departments, agencies, and other organizations which
are represented in U.S. diplomatic missions abroad,
and those which may not be represented abroad but
are significantly involved in international activities
with the governments of other nations.
foreign counterintelligence (FCI): Intelligence activity,
with its resultant product, intended to detect, counter-
act, and/or prevent espionage and other clandestine
intelligence activities, sabotage, international terrorist
activities, or assassinations conducted for or on behalf
of foreign powers, organizations or persons; it does not
include personnel, physical, document, or communica-
tions security programs.
foreign instrumentation signals (FIS): Electromagnetic
emissions associated with the testing and operational
deployment of non-U.S. aerospace, surface, and sub-
surface systems which may have either military or
civilian application; it includes but is not limited to
the signals from telemetry, beaconry, electronic
interrogators, tracking/fusing/arming/command sys-
tems, and video data links.
foreign instrumentation signals intelligence (FISINT):
Technical and intelligence information derived from
intercept of foreign instrumentation signals (see
above).
foreign intelligence* (FI): The product resulting from
collection, evaluation, analysis, integration, and inter-
pretation of intelligence information about a foreign
power and which is significant to the national
security, foreign relations, or economic interests of the
United States, and which is provided by a government
agency that is assigned an intelligence mission (i.e.,
an intelligence agency). (Also see intelligence cycle.)
foreign intelligence service: An organization of a
foreign government which engages in intelligence
activities.
foreign materiel (FORMAT) intelligence: Intelligence
derived from the exploitation of foreign materiel.
foreign official: A person acting in an official capacity
on behalf of a foreign power, attached to a foreign
diplomatic establishment or an establishment under
the control of a foreign power, or employed by a
public international organization.
forward-looking infrared (FLIR) system: An infrared
imaging system which raster scans the scene viewed
by internal means, both horizontally and vertically; it
can be spaceborne, airborne, seaborne, mounted on a
ground vehicle, or placed at a fixed site; and its field
of view is determined by the optics used, the scanning
mechanism, and the dimensions of the detector array.
fusion: The blending of intelligence information from
multiple sources to produce a single intelligence
product.
fusion center: A term used within the Department of
Defense referring to an organization having the
responsibility of blending both compartmented intelli-
gence information with all other available information
in order to support military operations. (Also see
actionable intelligence and tactical intelligence.)
General Defense Intelligence Program (GDIP): See
National Foreign Intelligence Program.
geographic(al) intelligence: Foreign intelligence deal-
ing with the location, description, and analysis of
physical and cultural factors of the world, (e.g.,
terrain, climate, natural resources, transportation,
boundaries, population distribution) and their changes
through time.
general medical intelligence (GMI): See medical
intelligence.
guidance*: Advice which identifies, interprets, clari-
fies, and/or expands upon an information need. (Also
see information need.)
human intelligence (HUMINT): A category of intelli-
gence information derived from human sources. (Also
see human source reporting and human resources
collection.)
human resources collection: All activities which attend
collection of intelligence information from human
sources. (See human intelligence and human source.)
Human Resources Committee (HRC): See Director of
Central Intelligence Committee. (Also see DCID
1/17.)
human source: A person who wittingly or unwittingly
conveys by any means information of potential
intelligence value to an intelligence activity.
human source reporting: The flow of intelligence
information from those who gather it to the customer;
it may come from information gathering activities
either within or outside the Intelligence Community.
(A form of the term is also used to denote an item of
information being conveyed, as in human source
report.) (Also see human intelligence.)
illegal: An officer or employee of an intelligence
organization who is dispatched abroad and who has
no overt connection with the intelligence organization
with which he is connected or with the government
operating that intelligence organization.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
illegal agent: An agent operated by an illegal
residency or directly by the headquarters of an
intelligence organization. (Also see illegal residency.)
illegal communication: An electronic communication
or signal made without the legal sanction of the nation
where it originates.
illegal residency: An intelligence apparatus estab-
lished in a foreign country and composed of one or
more intelligence officers, and which has no apparent
connection with the sponsoring intelligence organiza-
tion or with the government of the country operating
the intelligence organization. (Also see legal
residency.)
illicit communication: An electronic communication
or signal originated in support of clandestine oper-
ations; it is a type of clandestine communication.
imagery: Representations of objects reproduced elec-
tronically or by optical means on film, electronic
display devices, or other media.
imagery intelligence (IMINT): The collected products
of imagery interpretation processed for intelligence
use. (Also see imagery interpretation below.)
imagery interpretation (II): The process of locating,
recognizing, identifying, and describing objects, ac-
tivities, and terrain represented by imagery; it
includes photographic interpretation.
imitative communications deception: See communica-
tions deception.
imitative deception: The introduction into foreign
channels of electromagnetic radiations which imitate
his own emissions.
indications and warning (I & W): Those intelligence
activities intended to detect and report time-sensitive
intelligence information on foreign developments that
could involve a threat to U.S. or allied military,
political, or economic interests, or to U.S. citizens
abroad. It encompasses forewarning of. enemy hostile
actions or intentions; the imminence of hostilities;
serious insurgency; nuclear/nonnuclear attack on the
U;S., its overseas forces, or allied nations; hostile
reactions to U.S. reconnaissance activities; terrorist
attacks; and other similar events.
information: Unevaluated material of every descrip-
tion, at all levels of reliability, and from any source
which may contain intelligence information. (Also see
intelligence information.)
information handling: Management of data or infor-
mation which may occur in connection with any step
in the intelligence cycle; such management may
involve activities to transform, manipulate, index,
code, categorize, store, select, retrieve, associate or
display intelligence materials; it may involve the use
of printing, photographic, computer or communica-
tions equipment, systems or networks; it may include
software programs to operate computers and process
data and/or information; and may include informa-
tion contained in reports, files, data bases, reference
services and libraries.
information security: Safeguarding knowledge against
unauthorized disclosure; or, the result of any system
of administrative policies and procedures for identify-
ing, controlling, and protecting from unauthorized
disclosure or release to the public, information the
protection of which is authorized by executive order
or statute.
information need: The requirement of an official
involved in the policymaking process or the intelli-
gence production process for the best available
information and intelligence on which to base policy
decisions, recommendations, or intelligence pro-
duction.
infrared imagery: A likeness or impression produced
as a result of sensing electromagnetic radiations
emitted or reflected from a given target surface in the
infrared portion of the electromagnetic spectrum.
integration*: A process in the production step of the
intelligence cycle in which a pattern is formed
through the selection and combination of evaluated
intelligence information. (Also see intelligence
cycle.)
intelligence*: (1) A body of evidence and the
conclusions drawn therefrom which is acquired and
furnished in response to the known or perceived
requirements of customers; it is often derived from
information which is concealed or not intended to be
available for use by the acquirer; it is the product of a
cyclical process. (Also see intelligence cycle.)
Examples:
- Policy development requires good intelligence.
- Timely intelligence is important to informed
decisionmaking.
(2) A term used to refer collectively to the functions,
activities, or organizations which are involved in the
process of planning, gathering, and analyzing infor-
mation of potential value to decisionmakers and to the
production of intelligence as defined in (1) above.
(Also see foreign intelligence and foreign
counterintelligence.)
Examples:
- Human source collection is an important
intelligence activity.
- Central Intelligence Agency.
- Intelligence is a demanding profession.
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
intelligence activity(ies)*: A generic term used to
encompass any or all of the efforts and endeavors
undertaken by intelligence organizations. (Also see
intelligence organization.)
intelligence agency: A component organization of the
Intelligence Community. (Also see Intelligence
Community.)
intelligence assessment: A category of intelligence
production that encompasses most analytical studies
dealing with subjects of policy significance; it is
thorough in its treatment of subject matter-as
distinct from building-block papers, research projects,
and reference aids-but unlike estimative intelligence
need not attempt to project future developments and
their implications; it is usually coordinated within the
producing organization but may not be coordinated
with other intelligence agencies. (Also see estimative
intelligence.)
intelligence asset: Any resource-person, group, in-
strument, installation, or technical system-at the
disposal of an intelligence organization.
intelligence collector: A phrase sometimes used to
refer to an organization or agency that engages in the
collection step of the intelligence cycle. (Also see
intelligence cycle.)
Intelligence Community (IC): A term which, in the
aggregate, refers to the following Executive Branch
organizations and activities: the Central Intelligence
Agency (CIA); the National Security Agency (NSA);
the Defense Intelligence Agency (DIA); offices within
the Department of Defense for the collection of
specialized national foreign intelligence through re-
connaissance programs; the Bureau of Intelligence
and Research (INR) of the Department of State;
intelligence elements of the military services; intelli-
gence elements of the Federal Bureau of Investigation
(FBI); intelligence elements of the Department of
Treasury; intelligence elements of the Department of
Energy; intelligence elements of the Drug Enforce-
ment Administration; and staff elements of the Office
of the Director of Central Intelligence.
Intelligence Community Staff (IC Staff): A term
referring to an organization under the direction and
control of the Director of Central Intelligence (DCI)
formed to assist the DCI in discharging his responsi-
bilities relating to the Intelligence Community.
intelligence consumer: See customer.
intelligence cycle*: The processes by which informa-
tion is acquired and converted into intelligence and
made available to customers. There are usually five
steps in the cycle:
a. planning and direction-determination of intelli-
gence requirements, preparation of a collection plan,
issuance of orders and requests to information
collection entities, and a continuous check on the
productivity of collection entities.
b. collection*-acquisition of information or intel-
ligence information and the provision of this to
processing and/or production elements.
c. processing*--conversion of collected informa-
tion and/or intelligence information into a form more
suitable for the production of intelligence.
d. production*-conversion of information or intel-
ligence information into finished intelligence through
the integration, analysis, evaluation, and/or interpre-
tation of all available data and the preparation of
intelligence products in support of known or antici-
pated customer requirements.
e. dissemination*-conveyance of intelligence in
suitable form to customers.
intelligence estimate*: The product of estimative
intelligence.
intelligence information*: Information of potential
intelligence value concerning the capabilities, inten-
tions, and activities of any foreign power, organiza-
tion, or associated personnel.
Intelligence Information Handling Committee (IHC):
See Director of Central Intelligence Committee.
(Also see DCID 1/4.)
intelligence information report: A product of the
collection step of the intelligence cycle. (Also see
intelligence report.)
intelligence officer: A professional employee of an
intelligence organization who is engaged in intelli-
gence activities.
intelligence organization: A generic term used to refer
to any organization engaged in intelligence activities;
it may include either an intelligence agency or a
foreign intelligence service, or both. (Also see
intelligence agency and foreign intelligence service.)
Intelligence Oversight Board (IOB): A body formed by
appointment of the President to provide him and the
Attorney General with reports and advice on the
legality and propriety of intelligence activities; mem-
bership and duties are expressed in Executive Order
No. 12036.
intelligence producer: A phrase usually used to refer to
an organization or agency that participates in the
production step of the intelligence cycle. (Also see
intelligence cycle.)
intelligence related activities (IRA): Those activities
specifically excluded from the National Foreign
Intelligence Program which: respond to departmental
or agency tasking for time-sensitive information on
foreign activities, respond to national Intelligence
Community advisory tasking of collection capabilities
which have a primary mission of supporting depart-
mental or agency missions or operational forces, of
training personnel for intelligence duties, or are
devoted to research and development for intelligence
and related capabilities.
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
intelligence report*: A product of the production step
of the intelligence cycle. (Also see intelligence
information report.)
intelligence requirement*: Any subject, general or
specific, upon which there is a need for the collection
of intelligence information or the production of
intelligence. (Also see collection requirement.)
Intelligence Research and Development Council
(IR & DC): See Director of Central Intelligence
STAT Committee
Joint Atomic Energy Intelligence Committee (JAEIC):
See Director of Central Intelligence Committee.
(Also see DCID 3/3.)
joint intelligence: (1) (Military context.) Intelligence
produced by elements of more than one military
service of the same nation. (2) (Intelligence Communi-
ty context.) Intelligence produced by intelligence
organizations of more than one country.
laser intelligence (LASINT): Technical and intelli-
gence information derived from laser systems; it is a
subcategory of electo-optical intelligence. (See elec-
tro-optical intelligence.)
legal residency: An intelligence apparatus in a foreign
country and composed of intelligence officers assigned
as overt representatives of their government but not
necessarily identified as intelligence officers. (Also see
illegal residency.)
manipulative communications cover: Those measures
taken to alter or conceal the characteristics of
communications so as to deny to any enemy or
potential enemy the means to identify them. Also
known as communications cover.
intelligence user: See customer.
Interagency Defector Committee (II)CI Sen i --- tar
STAT
interagency intelligence memorandum (IIM): A na-
tional intelligence assessment or estimate issued by
the Director of Central Intelligence with the advice of
appropriate National Foreign Intelligence Board
components.
intercept(ion)*: Acquisition for intelligence purposes
of electromagnetic signals (such as radio communica-
tions) by electronic collection equipment without the
consent of the signallers.
intercept station: A station which intercepts commu-
nications or non-communications transmissions for
intelligence purposes.
international lines of communications (ILC): Those
communications services which are under the supervi-
sion of the International Telecommunication Union
and which carry paid public communications traffic
between different countries; also known as: Interna-
tional Civil Communications, International Commer-
cial Communications, Internationally-Leased Com-
munications, International Service of Public
Correspondence, and commercial communications.
international terrorist activity*: The calculated use of
violence, or the threat of violence, to attain political
goals through fear, intimidation or coercion; usually
involves a criminal act, often symbolic in nature, and
is intended to influence an audience beyond the
immediate victims. International terrorism tran-
scends national boundaries in the carrying out of the
act, the purpose of the act, the nationalities of the
victims, or the resolution of the incident; such an act
is usually designed to attract wide publicity in order
to focus attention on the existence, cause, or demands
of the perpetrators.
interpretation: A process in the production step of the
intelligence cycle in which the significance of
information or intelligence information is weighed
relative to the available body of knowledge. (Also see
intelligence cycle.)
manipulative communications deception: See commu-
nications deception.
manipulative deception: The alteration or simulation
of friendly electromagnetic radiations to accomplish
deception.
measurement and signature intelligence* (MASINT):
Scientific and technical intelligence information ob-
tained by quantitative and qualitative analysis of data
(metric, angle, spatial, wavelength, time dependence,
modulation, plasma, and hydromagnetic) derived
from specific technical sensors for the purpose of
identifying any distinctive features associated with
the source, emitter, or sender and to facilitate
subsequent identification and/or measurement of the
same.
medical intelligence* (MEDINT): Foreign intelligence
related to all aspects of foreign natural and man-made
environments which could influence the health of
military forces; it incorporates general medical
intelligence which is concerned with foreign biological
medical capabilities and health situations, and medi-
cal scientific and technical intelligence which assesses
and predicts technological advances of medical
significance, to include defense against Chemical,
Biological, Radiological Warfare; it applies to both
tactical and strategic planning and operations, includ-
ing military and humanitarian efforts. (Also see
biographical intelligence.)
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
military intelligence (MI): Basic, current, or estimative
intelligence on any foreign military or military-related
situation or activity.
monitor: To observe, listen to, intercept, record, or
transcribe any form of communication or media for
collection of intelligence information or communica-
tions security purposes, either overtly or covertly.
multi-level security: (For automatic data processing
(ADP) systems.) Provisions for the safeguarding of all
information within a multilevel information handling
system. The multilevel information handling system
permits various levels, categories, and/or compart-
ments of material to be concurrently stored and
processed in a remotely-accessed resource-sharing
ADP system, while simultaneously permitting mate-
rial to be selectively accessed and manipulated from
variously controlled terminals by personnel having
different security clearances and access approvals.
Security measures are therefore aimed at ensuring
proper matches between information security and
personnel security. (Also see uni-level security.)
national estimate: See national intelligence estimate.
National Foreign Assessment Center (NFAC): An
organization established by and under the control and
supervision of the Director of Central Intelligence,
which is responsible for production of national
intelligence.
National Foreign Intelligence Board (NFIB): A body
formed to provide the Director of Central Intelligence
(DCI) with advice concerning: production, review,
and coordination of national foreign intelligence; the
National Foreign Intelligence Program budget; inter-
agency exchanges of foreign intelligence information;
arrangements with foreign governments on intelli-
gence matters; the protection of intelligence sources or
methods; activities of common concern; and such
other matters as are referred to it by the DCI. It is
composed of the DCI (chairman), and other appropri-
ate officers of the Central Intelligence Agency, the
Office of the DCI, Department of State, Department
of Defense, Department of Justice, Department of the
Treasury, Department of Energy, the offices within
the Department of Defense for reconnaissance pro-
grams, the Defense Intelligence Agency, the National
Security Agency, and the Federal Bureau of Investi-
gation; senior intelligence officers of the Army, Navy,
and Air Force participate as observers; a representa-
tive of the Assistant to the President for National
Security Affairs may also attend meetings as an
observer.
National Foreign Intelligence Program (NFIP): In-
cludes the programs listed below, but its composition
shall be subject to review by the National Security
Council and modification by the President.
(a) The programs of the Central Intelligence
Agency;
(b) The Consolidated Cryptologic Program, the
General Defense Intelligence Program, and the
programs of the offices within the Department of
Defense for the collection of specialized national
foreign intelligence through reconnaissance except
such elements as the Director of Central Intelligence
and the Secretary of Defense agree should be
excluded;
(c) Other programs of agencies within the Intelli-
gence Community designated jointly by the Director
of Central Intelligence and the head of the depart-
ment or by the President as national foreign
intelligence or counterintelligence activities;
(d) Activities of the staff elements of the Office of
the Director of Central Intelligence.
(e) Activities to acquire the intelligence required
for the planning and conduct of tactical operations by
the United States military forces are not included in
the National Foreign Intelligence Program.
national intelligence*: Foreign intelligence produced
under the aegis of the Director of Central Intelligence
and intended primarily to be responsive to the needs
of the President, the National Security Council, and
other Federal officials involved in the formulation and
execution of national security, foreign political,
and/or economic policy.
national intelligence asset: An intelligence asset
funded in the National Foreign Intelligence Program,
the primary purpose of which is the collection or
processing of intelligence information or the produc-
tion of national intelligence. (Also see intelligence
asset and national intelligence.)
National Intelligence Estimate* (NIE): A thorough
assessment of a situation in the foreign environment
which is relevant to the formulation of foreign,
economic, and national security policy, and which
projects probable future courses of action and
developments; it is structured to illuminate differences
of view within the Intelligence Community; it is
issued by the Director of Central Intelligence with the
advice of the National Foreign Intelligence Board.
(Also see Special National Intelligence Estimate.)
National Intelligence Officer (NIO): The senior staff
officer of the Director of Central Intelligence (DCI)
and the DCI's Deputy for National Intelligence for an
assigned area of substantive responsibility; he man-
ages estimative and interagency intelligence produc-
tion on behalf of the DCI; he is the principal point of
contact between the DCI and intelligence consumers
below the cabinet level; he is charged with monitoring
and coordinating that portion of the National Foreign
Assessment Center's production that involves more
than one office or that is interdisciplinary in
character; and is a primary source of national-level
substantive guidance to Intelligence Community
planners, collectors, and resource managers.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
National Intelligence Tasking Center (NITC): The
central organizational mechanism established under
the direction, control and management of the Director
of Central Intelligence for coordinating and tasking
national foreign intelligence collection activities, and
for providing advisory tasking to other intelligence
and information gathering activities.
national security: The territorial integrity, sover-
eignty, and international freedom of action of the
United States. (Intelligence activities relating to
national security encompass - all the military, eco-
nomic, political, scientific and technological, and
other aspects of foreign developments which pose
actual or potential threats to U.S. national interests.)
national/tactical interface: A relationship between
national and tactical intelligence activities encom-
passing the full range of fiscal, technical, operational,
and programmatic matters.
near-real-time: The brief interval between the collec-
tion of information regarding an event and reception
of the data at some other location, caused by the time
required for processing, communications, and display.
net assessment: A comparative review and analysis of
opposing national strengths, capabilities, vulnerabili-
ties, and weaknesses. (An intelligence net assessment
involves only foreign countries.)
nuclear intelligence (NUCINT): Intelligence derived
from the collection and analysis of radiation and other
effects resulting from radioactive sources.
nuclear proliferation intelligence: Foreign intelligence
relating to (1) scientific, technical, and economic
capabilities and programs and the political plans and
intentions of nonnuclear weapons states or foreign
organizations to acquire nuclear weapons and/or to
acquire the requisite special nuclear materials and to
carry on research, development, and manufacture of
nuclear explosive devices, and; (2) the attitudes,
policies, and actions of foreign nuclear supplier
countries or organizations within these countries
toward provision of technologies, facilities, or special
nuclear materials which could assist nonnuclear
weapon states or foreign organizations to acquire or
develop nuclear explosive devices.
official: See foreign official.
official information: Information which is subject to
the control of the United States Government.
open source information: A generic term describing
information of potential intelligence value (i.e.,
intelligence information) which is available to the
general public.
operational control (OPCON): (military context) The
authority delegated to a commander to direct forces
assigned so that the commander may accomplish
specific missions or tasks which are usually limited by
function, time, or location; to deploy the forces
concerned; and to retain or assign tactical control of
those forces. (It does not, of itself, include administra-
tive or logistic control.)
operational intelligence* (OPINTEL): Intelligence
required for planning and executing operations.
operations security (OPSEC): Those measures de-
signed to protect information concerning planned,
ongoing, and completed operations against unauthor-
ized disclosure.
optical intelligence (OPTINT): That portion of electro-
optical intelligence that deals with visible light. (Also
see electro-optical intelligence.)
order of battle (OB): Intelligence pertaining to
identification, strength, command structure, and
disposition of the personnel, units, and equipment of
any foreign military force. (Also see technical
intelligence.)
overt: Open; done without attempt at concealment.
overt collection: The acquisition of intelligence infor-
mation from public media, observation, government-
to-government dialogue, elicitation, and from the
sharing of data openly acquired; the process may be
classified or unclassified; the target and host govern-
ments as well as the sources involved normally are
aware of the general collection activity although the
specific acquisition, sites, and processes may be
successfully concealed.
penetration: (1) (clandestine operations.) The recruit-
ment of agents within or the infiltration of agents or
introduction of technical monitoring devices into an
organization or group or physical facility for the
purpose of acquiring information or influencing its
activities. (2) (automatic data processing (ADP)
operations.) The unauthorized extraction and identifi-
cation of recognizable information from a protected
ADP system.
personnel security: The means or procedures-such as
selective investigations, record checks, personal inter-
views, and supervisory controls-designed to provide
reasonable assurance that persons being considered
for or granted access to classified information are
loyal and trustworthy.
photographic intelligence (PHOTINT): The collected
products of photographic interpretation classified and
evaluated for intelligence use; it is a category of
imagery intelligence.
photographic interpretation (PI): The process of
locating, recognizing, identifying, and describing
objects, activities, and terrain represented on photog-
raphy; it is a category of imagery interpretation.
physical security*: Physical measures-such as safes,
vaults, perimeter barriers, guard systems, alarms and
access controls-designed to safeguard installations
against damage, disruption or unauthorized entry;
information or material against unauthorized access
or theft; and specified personnel against harm.
plain text*: Normal text or language, or any symbol
or signal, that conveys information without any
hidden or secret meaning.
planning and direction: See intelligence cycle.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Policy Review Committee (As pertains to intelligence
matters) (PRC(I)): A committee established under the
National Security Council which when meeting under
the chairmanship of the Director of Central Intelli-
gence is empowered to establish requirements and
priorities for national foreign intelligence and to
evaluate the quality of the intelligence product; it is
sometimes referred to as the Policy Review Commit-
tee (Intelligence); its specific duties are defined in
Executive Order No. 12036.
political intelligence*: Intelligence concerning the
dynamics of the internal and external political affairs
of foreign countries, regional groupings, multilateral
treaty arrangements and organizations, and foreign
political movements directed against or impacting
upon established governments or authority.
positive intelligence: A term of convenience sometimes
applied to foreign intelligence to distinguish it from
foreign counterintelligence.
priority: A value denoting a preferential rating or
precedence in position which is used to discriminate
among competing entities; the term normally used in
conjunction with intelligence requirements in order to
illuminate importance and to guide the actions
planned, being planned, or in use, to respond to the
requirements.
processing*: See intelligence cycle.
product: (1) An intelligence report disseminated to
customers by an intelligence agency. (2) In SIGINT
usage, intelligence information derived from analysis
of SIGINT materials and published as a report or
translation for dissemination to customers. (Also see
production in Appendix B.)
production*: See intelligence cycle.
proprietary: A business entity owned, in whole or in
part, or controlled by an intelligence organization and
operated to provide private commercial cover for an
intelligence activity of that organization. (Also see
cover.)
radar intelligence (RADINT): Intelligence information
derived from data collected by radar.
radiation intelligence* (RINT): The functions and
characteristics derived from information obtained
from unintentional electromagnetic energy emanating
from foreign devices; excludes nuclear detonations or
radioactive sources.
raw intelligence: A colloquial term meaning collected
intelligence information which has not yet been
converted into intelligence. (Also see intelligence
information.)
reconnaissance (RECCE or RECON): An operation
undertaken to obtain by visual observation or other
detection methods information relating to the activi-
ties, resources or forces of a foreign nation; or to
secure data concerning the meteorological, hydro-
graphic, or geographic characteristics of a particular
area.
recruitment-in-place: A person who agrees to become
an agent and retain his position in his organization or
government while reporting on it to an intelligence or
security organization of a foreign country.
RED/BLACK Concept: The separation of electrical
and electronic circuits, components, equipment, and
systems which handle classified plain language
information in electric signal form (RED) from those
which handle encrypted or unclassified information
(BLACK); RED and BLACK terminology is used to
clarify specific criteria relating to and differentiating
between such circuits, components, equipment, and
systems and the areas in which they are contained.
refugee: A person who is outside the country or area
of his former habitual residence and who, because of
fear of being persecuted or because of hostilities in
that country or area, is unwilling or unable to return
to it. (Also see defector and emigre.)
report: See intelligence report and intelligence
information report.
requirement*: See intelligence requirement or collec-
tion requirement.
residency: See illegal residency and legal residency.
sabotage: Action against material, premises or utili-
ties, or their production, which injures, interferes
with, or obstructs the national security or ability of a
nation to prepare for or carry on a war.
safe house: A house or premises controlled by an
intelligence organization that affords-at least tem-
porarily-security for individuals involved or equip-
ment used in clandestine operations.
sanitization: The process of editing or otherwise
altering intelligence information or reports to protect
sensitive intelligence sources, methods, capabilities,
analytical procedures, or privileged information in
order to permit wider dissemination.
scientific and technical (S & T) intelligence*: Intelli-
gence concerning foreign developments in basic and
applied scientific and technical research and develop-
ment including engineering and production tech-
niques, new technology, and weapon systems and their
capabilities and characteristics; it also includes
intelligence which requires scientific or technical
expertise on the part of the analyst, such as medicine,
physical health studies, and behavioral analyses.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01
Scientific and Technical Intelligence Committee
(STIC): See Director of Central Intelligence Commit-
tee. (Also see DCID 3/5.)
security: Establishment and maintenance of protective
measures which are intended to ensure a state of
inviolability from hostile acts or influences.
TYPES OF SECURITY
Automatic Data Processing System
Communications Security
Computer Security
Cryptographic Security
Electronic Emission Security
Electronic Security
Emanation Security
Emission Security
Information Security
Multi-level Security
National Security
Operations Security
Personnel Security
Physical Security
Signals Security
Transmission Security
Uni-level Security
security
Security
Central
1/11.)
classification: See classification.
Committee (SECOM): See Director of
Intelligence Committee. (Also see DCID
sensitive*: Requiring special protection from disclo-
sure to avoid compromise or threat to the security of
the sponsor.
sensitive compartmented information* (SCI): All infor-
mation and material requiring special controls for
restricted handling within compartmented intelli-
gence systems and for which compartmentation is
established. (Also see compartmentation.)
sensitive intelligence sources and methods: A collective
term for those persons, organizations, things, condi-
tions, or events that provide intelligence information
and those means used in the collection, processing,
and production of such information which, if compro-
mised, would be vulnerable to counteraction that
could reasonably be expected to reduce their ability to
support U.S. intelligence activities.
Service Cryptologic Agency(ies) (SCA): See Service
Cryptologic Elements.
Service Cryptologic Elements: A term used to
designate separately or together those elements of the
U.S. Army, Navy, and Air Force which perform
cryptologic functions; also known as Service
Cryptologic Agencies and Service Cryptologic
Organizations.
Service Cryptologic Organizations (SCO): See Service
Cryptologic Elements.
sensor: (1) A technical device designed to detect and
respond to one or more particular stimulae and which
may record and/or transmit a resultant impulse for
interpretation or measurement; often called a techni-
cal sensor. (2) special sensor: An unclassified term
used as a matter of convenience to refer to a highly
classified or controlled technical sensor.
side-looking airborne radar (SLAR): An airborne
radar, viewing at right angles to the axis of the
vehicle, which produces a presentation of terrain or
targets.
SIGINT activity: Any activity conducted for the
purpose of producing signals intelligence. (Also see
SIGINT-related activity.)
SIGINT Committee: See Director of Central Intelli-
gence Committee. (Also see DCID 6/1.)
SIGINT-related activity: Any activity primarily in-
tended for a purpose(s) other than signals intelligence
(SIGINT), but which can be used to produce
SIGINT, or which produces SIGINT as a by-product
of its principal function(s). (Also see SIGINT
activity.)
SIGINT technical information: Information concern-
ing or derived from intercepted foreign transmissions
or radiations which is composed of technical informa-
tion (as opposed to intelligence) and which is required
in the further collection or analysis of signals
intelligence.
signal*: Anything intentionally transmitted by visual
and other electromagnetic, nuclear, or acoustical
methods for either communications or non-communi-
cations purposes.
signals intelligence* (SIGINT): Intelligence informa-
tion comprising either individually or in combination
all communications intelligence, electronics intelli-
gence, and foreign instrumentation signals intelli-
gence, however transmitted.
signals security (SIGSEC): A term which includes
communications security and electronics security and
which encompasses measures intended to deny or
counter hostile exploitation of electronic emissions.
signals security acquisition and analysis: The acquisi-
tion of electronic emissions and subsequent analysis to
determine empirically the susceptibility of the emis-
sion to interception and exploitation by hostile
intelligence services; it includes cataloging the trans-
mission spectrum and taking signal parametric
measurements as required, but does not include
acquisition of information carried on the system; it is
one of the techniques of signals security surveillance.
(Also see signals security surveillance:)
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
signals security surveillance: The systematic examina-
tion of electronic emissions to determine the adequacy
of signals security measures, to identify signals
security deficiencies, to provide data from which to
predict the effectiveness of proposed signals security
measures, and to confirm the adequacy of such
measures after implementation.
source*: A person, device, system, or activity from
which intelligence information is obtained. (Also see
human source and sensitive intelligence sources and
methods.)
special activities: As defined in Executive Order No.
12036, activities conducted abroad in support of
national foreign policy objectives which are designed
to further official United States programs and policies
abroad and which are planned and executed so that
the role of the United States Government is not
apparent or acknowledged publicly, and functions in
support of such activities, but not including diplo-
matic activity or the collection and production of
intelligence or related support functions; also known
as covert action. (Also see covert action.)
Special Activities Office(r) (SAO): A control point for
certain categories of compartmented information.
(The acronym is often used to refer to the compart-
mented information itself.)
Special Coordination Committee (SCC): A committee
established under the National Security Council
which deals inter alia with the oversight of sensitive
intelligence activities, such as covert actions, which
are undertaken on Presidential authority.
special intelligence (SI): An unclassified term used to
designate a category of sensitive compartmented
information (SCI). (Also see sensitive compartmented
information.)
special intelligence communications* (SPINT-
COMM): A communications network for the handling
of all special intelligence and consisting of those
facilities under the operational and technical control
of the chief of intelligence of each of the military
departments, under the management of the Defense
Intelligence Agency, and under the technical and
security specification criteria established and moni-
tored by the National Security Agency.
Special National Intelligence Estimate (SNIE): Na-
tional Intelligence Estimates (NIEs) which are
relevant to specific policy problems that need to be
addressed in the immediate future. SNIEs are
generally unscheduled, shorter, and prepared more
quickly than NIEs and are coordinated within the
Intelligence Community to the extent that time
permits. (Also see National Intelligence Estimate.)
Special Security Office(r) (SSO): A control point for
security procedures within any activity authorized
access to sensitive compartmented information.
special sensor*: See sensor.
strategic intelligence: Intelligence which is required
for the formulation of policy and military plans at
national and international levels; it differs primarily
from tactical intelligence in level of use, but may also
vary in scope and detail.
strategic warning: Intelligence information or intelli-
gence regarding the threat of the initiation of
hostilities against the U.S. or in which U.S. forces
may become involved; it may be received at any time
prior to the initiation of hostilities.
Support for the Analysts' File Environment (SAFE): A
joint CIA/DIA project to develop a new computer
/microfilm m system to support production analysts
in reading, filing, and routing cable traffic; building
and searching private and central files; and writing,
editing, and routing intelligence memoranda and
reports.
surveillance: The systematic observation or monitoring
of places, persons, or things by visual, aural,
electronic, photographic, or other means.
tactical intelligence* (TACINTEL): Foreign intelli-
gence produced under the aegis of the Secretary of
Defense and intended primarily to be responsive to the
needs of military commanders in the field to maintain
the readiness of operating forces for combat opera-
tions and to support the planning and conduct of
combat operations. (Also see combat intelligence.)
tactical intelligence asset: An intelligence asset
funded in Department of Defense programs, the
primary purpose of which is the collection or
processing of intelligence information or the produc-
tion of tactical intelligence. (Also see tactical
intelligence and intelligence asset.)
target: A country, area, installation, organization,
weapon system, military force, situation (political or
economic), signal, person, or other entity against
which intelligence operations are conducted.
target intelligence: Intelligence which portrays and
locates the components of a target or target complex
and indicates its identification, vulnerability, and
relative importance.
tasking: The assignment or direction of an individual
or activity to perform in a specified way to achieve an
objective or goal.
technical intelligence (TI): Intelligence on the charac-
teristics and performance of foreign weapons and
equipment; a part of scientific and technical intelli-
gence and distinct from order of battle.
technical sensor: See sensor.
technical SIGINT: Intelligence information which
provides a detailed knowledge of the technical
characteristics of a given emitter and thus permits
estimates to be made about its primary function,
capabilities, modes of operation (including malfunc-
tions), and state-of-the-art, as well as its specific role
within a complex weapon system or defense network;
it is a contributor to technical intelligence.
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
telecommunications: Any transmission, emission, or
reception of signs, signals, writing, images, and
sounds or information of any nature by wire, radio,
visual, or other electromagnetic systems.
telemetry intelligence (TELINT): Technical and intel-
ligence information derived from intercept, process-
ing, and analysis of foreign telemetry; a subcategory
of foreign instrumentation signals intelligence.
teleprocessing: The overall function of an information
transmission system which combines telecommunica-
tions, automatic data processing, and man-machine
interface equipment and their interaction as an
integrated whole.
TEMPEST: An unclassified term referring to techni-
cal investigations for compromising emanations from
electrically operated, information processing equip-
ment; they are conducted in support of emanations
and emission security.
terrorist organization: A group that engages in
terrorist activities. (Also see international terrorist
activity.)
traffic analysis (TA): The cryptologic discipline which
develops information from communications about the
composition and operation of communications struc-
tures and the organizations they serve. The process
involves the study of traffic and related materials, and
the reconstruction of communication plans, to pro-
duce signals intelligence.
transmission security (TRANSEC): The component of
communications security which results from all
measures designed to protect transmissions from
interception and from exploitation by means other
than cryptanalysis.
unauthorized disclosure: See compromise.
uni-level security: (For automatic data processing
systems) Provision for the safeguarding of all material
within a single information handling system in
accordance with the highest level of classification and
most restrictive dissemination caveats assigned to any
material contained therein, as distinguished from
multilevel security. (Also see multi-level security.)
United States Signals Intelligence System (USSS): An
entity that is comprised of the National Security
Agency (including assigned military personnel); those
elements of the military departments and the Central
Intelligence Agency performing signals intelligence
activities; and those elements of any other department
or agency which may from time to time be authorized
by the National Security Council to perform signals
intelligence activities during the time when such
elements are so authorized; it is governed by the
United States Signals Intelligence Directives
(USSID) system.
upgrade: To determine that certain classified informa-
tion requires, in the interest of national security, a
higher degree of protection against unauthorized
disclosure than currently provided, coupled with a
changing of the classification designation to reflect
such higher degree. (Also see classification.)
user: See customer.
validation: A process normally associated with the
collection of intelligence information which provides
official status to an identified requirement and
confirms that the requirement is appropriate for a
given collector and has not previously been satisfied.
(Also see collection requirement.)
walk-in: A person who on his own initiative makes
contact with a representative of a foreign country and
who volunteers intelligence information and/or re-
quests political asylum. (Also see disaffected person.)
Weapon and Space Systems Intelligence Committee
(WSSIC): See Director of Central Intelligence
Committee. (Also see DCID 3/4.)
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Appendix A
ACRONYMS AND ABBREVIATIONS
ACINT ..................................
ACOUSTINT ......................
ACSI ......................................
CA ........................................
CAMS ....................................
CCF ......................................
CCP ......................................
CCPC ....................................
CI ..........................................
CIA ........................................
CIAP ....................................
CIFAX ..................................
CIPHONY ............................
CIRIS ....................................
CIVISION ............................
COINS ..................................
COMEX ................................
COMINT ..............................
COMIREX ............................
COMSEC ..............................
CONTEXT ..........................
CRITIC ................................
CRITICOMM ......................
CRYPTO ..............................
DAO ......................................
DCI ......................................
DCID ....................................
DEA ......................................
DEFSMAC ..........................
DF ........................................
DIA ......................................
DNI ......................................
ECCM ..................................
ECM ......................................
EEI ........................................
E&E ......................................
EIC ........................................
ELECTRO-OPTINT ..........
ELINT ..................................
ELSEC ..................................
EMSEC ................................
EOB ......................................
ESM ......................................
EW ........................................
FBI ........................................
FBIS ......................................
Acoustical Intelligence (Naval acronym; see definition.)
Acoustical Intelligence
Assistant Chief of Staff/Intelligence (Army or Air
Force)
Cryptanalysis
COMIREX Automated Management System
Collection Coordination Facility
Consolidated Cryptologic Program
Critical Collection Problems Committee
Counterintelligence
Central Intelligence Agency
Central Intelligence Agency Program
Enciphered Facsimile
Enciphered Telephone
Consolidated Intelligence Resources Information System
Enciphered Television
Community On-Line Intelligence System
Committee on Exchanges
Communications Intelligence
Committee on Imagery Requirements and Exploitation
Communications Security
Conferencing and Text Manipulation System
Critical Intelligence Message
Critical Intelligence Communications System
CRYPTO (See definition.)
Defense Attache Office
Director of Central Intelligence
Director of Central Intelligence Directive
Drug Enforcement Administration
Defense Special Missile and Astronautic Center
Direction Finding
Defense Intelligence Agency
Director of Naval Intelligence
Electronic Counter-Countermeasures
Electronic Countermeasures
Essential Elements of Information
Evasion and Escape
Economic Intelligence Committee
Electro-optical Intelligence
Electronic Intelligence
Electronic Security
Emanations Security
Electronic Order of Battle
Electronic Warfare Support Measures
Electronic Warfare
Federal Bureau of Investigation
Foreign Broadcast Information Service
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release~2n006/2X01 : CI,-R .1P8011M00596A000500020003-7
on roue ))
FCI .......................................
FI ............................................
FIS ........................................
FISINT ............................... .
FLIR ....................................
FORMAT ............................
GDIP ....................................
GMI ......................................
HPSCI ..................................
HRC ......................................
HUMINT ............................. .
IC ..........................................
ICRS ......................................
IDC ......................................
IHC .....................................
II ............................................
JIM ........................................
ILC ........................................
IMINT ..................................
INR ......................................
IOB ........................................
IRA ........................................
IR&DC ..................................
I& W .....................................
JAEIC ..................................
JINTACCS ............................
MASINT ..............................
MEDINT..............................
MI .........................................
NFAC ..................................
NFIB ....................................
NFIP ....................................
NIE ......................................
NIO ......................................
NITC ...................................
NMIC ....................................
NOIWON ............................
NPIC ....................................
NSA ......................................
NSCID ..................................
NSOC ....................................
NSRL ...................................
NTPC....................................
NUCINT ................................
Foreign Counterintelligence
Foreign Intelligence
Foreign Instrumentation Signals
Foreign Instrumentation Signals Intelligence
Forward-looking infrared
Foreign Materiel
General Defense Intelligence Program
General Medical Intelligence
House Permanent Select Committee on Intelligence
Human Resources Committee
Human Intelligence
Intelligence Community
Imagery Collection Requirements Subcommittee
(COMIREX)
Interagency Defector Committee
Intelligence Information Handling Committee
Imagery Interpretation
Interagency Intelligence Memorandum
International Lines of Communications
Imagery Intelligence
Bureau of Intelligence and Research, Department of
State
Intelligence Oversight Board
Intelligence-Related Activities
Intelligence Research & Development Council
Indications and Warning
Joint Atomic Energy Intelligence Committee
Joint Interoperability Tactical Command and Control
System
Laser Intelligence
Measurement and Signature Intelligence
Medical Intelligence
Military Intelligence
National Foreign Assessment Center
National Foreign Intelligence Board
National Foreign Intelligence Program
National Intelligence Estimate
National Intelligence Officer
National Intelligence Tasking Center
National Military Intelligence Center
National Operations and Intelligence Watch Officers
Network
National Foreign Intelligence Plan for Human
Resources
National Photographic Interpretation Center
National Security Agency
National Security Council Intelligence Directive
National SIGINT Operations Center
National SIGINT Requirements List
National Telemetry Processing Center
Nuclear Intelligence
Approved For Release 2006/12/01: CIA-R DP80M00596A000500020003-7
Approved For Release 2QO6/121Q.1 : CIA-J~pP$QM00 96A000500020003-7
Appendix ll-i irk 11 e
OB ........................................ Order of Battle
OPCON ................................ Operational Control
OPINTEL ............................ Operational Intelligence
OPSEC .................................. Operations Security
OPTINT .............................. Optical Intelligence
PARPRO .............................. Peacetime Airborne Reconnaissance Program
PHOTINT ............................ Photographic Intelligence
PI .......................................... Photographic Interpretation or Photographic Interpreter
PRC(I) .................................. Policy Review Committee (Intelligence)
RADINT .............................. Radar Intelligence
RECCE or RECON ............ Reconnaissance
RINT .................................... Radiation Intelligence
S&T ...................................... Scientific and Technical
SA .......................................... Signals Analysis
SAFE .................................... Support for the Analysts' File Environment
SAO ...................................... Special Activities Office
SCA ...................................... Service Cryptologic Agencies
SCC ...................................... Special Coordination Committee
SCI ........................................ Sensitive Compartmented Information or Source Code
Indicator
SCO ...................................... Service Cryptologic Organizations
SECOM ................................ Security Committee
SI .......................................... Special Intelligence
SIGINT ................................ Signals Intelligence
SIGINT Committee ............ Signals Intelligence Committee
SIGSEC ................................ Signals Security
SIRVES ................................ SIGINT Requirements Validation and Evaluation Sub-
committee (of SIGINT Committee)
SLAR .................................... Side-Looking Airborne Radar
SNIE .................................... Special National Intelligence Estimate
SOSUS .................................. Sound Surveillance System
SOTA .................................... SIGINT Operational Tasking Authority
SPINTCOMM ...................... Special Intelligence Communications
SSCI ........................................ Senate Select Committee on Intelligence
SSO ........................................ Special Security Officer
STIC ...................................... Scientific and Technical Intelligence Committee
TA ........................................ Traffic Analysis
TACINTEL .......................... Tactical Intelligence
TI .......................................... Technical Intelligence
TELINT .............................. Telemetry Intelligence
TRANSEC ............................ Transmission Security
USSID .................................. United States Signals Intelligence Directive
USSS ...................................... United States Signals Intelligence System
WWMCCS .......................... Worldwide Military Command and Control Systems
WSSIC .................................. Weapon and Space Systems Intelligence Committee
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Appendix B
ALTERNATE DEFINITIONS
acoustical intelligence: The technical and intelligence
information derived from foreign sources which
generate waves. (Dictionary of Military and Asso-
ciated Terms, Dept. of Defense (U), the Joint Chiefs
of Staff, 3 Sep 74 (U)).
agent: 1) An individual who acts under the direction of
an intelligence agency or security service to obtain, or
assist in obtaining, information for intelligence or
counterintelligence purposes. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976). 2)
In intelligence usage, one who is authorized or
instructed to obtain or to assist in obtaining informa-
tion for intelligence or counterintelligence purposes.
(Dictionary of Military and Associated Terms, Dept.
of Defense (U), the Joint Chiefs of Staff, 3 Sep 74.
(U))
agent of influence: An individual who can be used to
influence covertly foreign officials, opinion molders,
organizations, or pressure groups in a way which will
generally advance United States Government objec-
tives, or to undertake specific action in support of
United States Government objectives. (Final Report,
Senate Select Committee on Intelligence, 26 April
1976).
analysis: In electronic warfare, a study of electromag-
netic radiations to determine their technical charac-
teristics and their tactical or strategic use. (Glossary
of Communications-Electronics Terms (U), JCS, Dec
74).
assessment: Judgment of the motives, qualifications,
and characteristics of present or prospective employ-
ees or "Agent." (Dictionary of Military and Asso-
ciated Terms, Dept. of Defense (U), the Joint Chiefs
of Staff, 3 Sep 74. (U)).
asset: Any resource-a person, group, relationship,
instrument, installation, or supply-at the disposition
of an intelligence agency for use in an operational or
support role. The term is normally applied to a person
who is contributing to a CIA clandestine mission, but
is not a fully controlled agent of CIA. (Final Report,
Senate Select Committee on Intelligence, 26 April
1976).
basic intelligence: 1) General reference material for
use in planning concerning other countries which
pertains to capabilities, resources or potential theaters
of operations. See also -intelligence-. (Dictionary
of Military and Associated Terms, Dept. of Defense
(U), the Joint Chiefs of Staff, 3 Sep 74. (U)). 2)
Factual, fundamental, and generally permanent infor-
mation about all aspects of a nation-physical, social,
economic, political, biographical, and cultural-which
is used as a base for intelligence products in support of
planning, policymaking, and military operations.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976). 3) "Fundamental intelligence
concerning the general situation, resources, capabili-
ties and vulnerabilities of foreign countries or areas
which may be used as reference material in the
planning of operations at any level and in evaluating
subsequent information relating to the same subject."
(Recommended Changes to JCS Pub 1, 25 July
1977).
case officer: A staff employee of the CIA who is
responsible for handling agents. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976).
cipher: Any cryptographic system in which arbitrary
symbols or groups of symbols represent units of plain
text. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976).
clandestine operations: 1) Intelligence, counterintelli-
gence, or other information collection activities and
covert political, economic, propaganda and paramili-
tary activities, conducted so as to assure the secrecy of
the operation. (Final Report, Senate Select Commit-
tee on Intelligence, 26 April 1976). 2) Activities to
accomplish intelligence, counterintelligence, and
other similar activities sponsored or conducted by
Governmental departments or agencies, in such a way
as to assure secrecy or concealment. (It differs from
covert operations in that emphasis is placed on
concealment of the operation rather than on conceal-
ment of identity of sponsor.) (Dictionary of Military
and Associated Terms, Dept. of Defense (U), the Joint
Chiefs of Staff, 3 Sep 74. (U)).
classified information: "Classified information"
means information or material (hereinafter collec-
tively termed "information") that is owned by,
produced for or being in the possession of or under the
control of the United States Government that has
been determined by proper authority to require
protection against unauthorized disclosure in the
interest of national security and is so designated.
Classification and Declassification of National Secu-
rity Information and Material; (Executive Order No.
11652 as amended, Nov 1977).
code: A system of communication in which arbitrary
groups of symbols represent units of plain text. Codes
may be used for brevity or for security. (Final Report,
Senate Select Committee on Intelligence, 26 April
1976).
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Appendix B (Continued)
code word: 1) A word which has been assigned a
classification and a classified meaning to safeguard
intentions and information regarding a planned
operation. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976). 2) A word which has
been assigned a classification and a classified
meaning to safeguard intentions and information
regarding a classified plan or operation. (Communica-
tions-Electronics Terminology (U), U.S. Dept. of the
Air Force, 15 Nov 73, (U)). 3) A word which conveys a
meaning other than its conventional one. Prearranged
by the correspondents. Its aim is to increase security.
(Glossary of Communications-Electronics Terms (U),
JCS, Dec 74).
CODEWORD: 1) A cryptonym used to identify
sensitive intelligence data. (Glossary of Communica-
tions-Electronics Terms (U), JCS, Dec 74). 2) A
single word selected from those listed in joint Army,
Navy, Air Force publication (JANAP) 299 and
subsequent volumes, and assigned a classified mean-
ing by appropriate authority to insure proper security
concerning intentions, and to safeguard information
pertaining to actual, real world military plans or
operations classified as Confidential or higher. (Mod-
ern Data Communications Concepts, Language and
Media (U), William P. Davenport, Hayden Book Co.,
Inc., 1971, (U)).
collection: 1) Any one or more of the gathering,
analysis, dissemination or storage of non-publicly
available information without the informed express
consent of the subject of the information. (USSID 18,
Limitations and Procedures in Signals Intelligence
Operations of the USSS (U), NSA , 26 May 76). 2)
The act of employing instruments and/or equipment
to obtain qualitative or quantitative data from the test
or operation of foreign systems. (Defense Intelligence
Collection Requirements Manual (C), DIA, 27 Jan
75). 3) Used in ELINT to mean the gathering or
collection of the unevaluated and uninterpreted
information about the enemy or potential enemy.
Specifically the collection of data from noncommuni-
cations radiators such as radars, navigation aids or
countermeasures equipments. (Basic Manual (U),
ELINT Collection Analysis Guide (U), National
Cryptologic School, 1965, (S)).
communications intelligence (COMINT): 1) Technical
and intelligence information derived from foreign
communications by other than the intended recipi-
ents. COMINT is produced by the collection and
processing of foreign communications passed by
electromagnetic means, with specific exceptions
stated below, and by the processing of foreign
encrypted communications. However transmitted,
COMINT shall not include:
1. Intercept and processing of unencrypted written
communications, except the processing of written
plain text versions of communications which have
been encrypted or are intended for subsequent
encryption.
2. Intercept and processing of press, propaganda
and other public broadcasts, except for processing
encrypted or "hidden meaning" passages in such
broadcasts.
3. Oral and wire interceptions conducted under
DoD Directive 5200.24.
4. Censorship. (Signals Intelligence-(SIGINT) (U),
DOD, 25 Jan 73).
2) Technical and intelligence information derived
from foreign communications by other than the
intended recipients:
B. COMINT activities are those which produce
COMINT by collecting and processing foreign
communications passed by radio, wire, or other
electromagnetic means, and by the processing of
foreign encrypted communications. However trans-
mitted, collection comprises search, intercept, and
direction finding. Processing comprises range estima-
tion, transmitter /operator identification, signal analy-
sis, traffic analysis, cryptanalysis, decryption, study of
the plaintext, the fusion of these processes, and the
reporting of results.
C. Exceptions to COMINT and COMINT activi-
ties. COMINT and COMINT activities as defined
here do not include: (1) Intercept and processing of
unencrypted written communications, except written
plaintext versions of communications which have been
encrypted or are intended for subsequent encryption.
(2) Intercept and processing of press, propaganda and
other public broadcasts, except for encrypted or
"hidden meaning" passa-e2s in such broadcasts. (3)
(4) Censorship. (5) The
interception and study of non-communications trans-
missions (ELINT). (USSID 3, SIGINT Security (U),
NSA, 24 Aug 72).
3) Technical and intelligence information derived
from foreign commications by someone other than the
intended recipient. It does not include foreign press,
propaganda, or public broadcasts. The term is
sometimes used interchangeably with SIGINT. (Final
Report, Senate Select Committee on Intelligence, 26
April 1976).
I STAT
2b
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release A (I 1 W1 fi 596A000500020003-7
communications security (COMSEC): 1) Protective
measures taken to deny unauthorized persons infor-
mation derived from telecommunications of the
United States Government related to national security
and to ensure the authenticity of such telecommunica-
tions. (U.S. Intelligence Activities, Executive Order
No. 12036, Jan 1978.) 2) The protection of United
States telecommunications and other communications
from exploitation by foreign intelligence services and
from unauthorized disclosure. COMSEC is one of the
mission responsibilities of NSA. It includes cryptose-
curity, transmission security, emission security, and
physical security of classified equipment, material,
and documents. (Final Report, Senate Select Com-
mittee on Intelligence, 26 April 1976). 3) The
protection resulting from the application of crypto-
security, transmission security, and emission security
measures to telecommunications and from application
of physical security measures to COMSEC informa-
tion. These measures are taken to deny unauthorized
persons information of value which might be derived
from the possession and study of such telecommunica-
tions or to insure the authenticity of such telecom-
munications. (Glossary of Communications Security
and Emanations Security Terms (U), U.S. Communi-
cations Security Board, Oct. 74). 4) The protection
resulting from all measures designed to deny un-
authorized persons information of value which might
be derived from the possession and study of telecom-
munications, or to mislead unauthorized persons in
their interpretation of the results of such possession
and study. Also called COMSEC. Communications
security includes: A. Cryptosecurity: B. Transmission
Security: C. Emission Security: and D. Physical
Security of Communications Security materials and
information.
A. Cryptosecurity-The component of communi-
cations security which results from the provision of
technically sound cryptosystems and their proper use.
B. Transmission Security-The component of
communications security which results from all
measures designed to protect transmissions from
interception and exploitation by means other than
cryptanalysis.
C. Emission Security-The component of commu-
nications security which results from all measures
taken to deny unauthorized persons information of
value which might be derived from intercept and
analysis of compromising emanations from crypto-
equipment and telecommunications systems.
D. Physical Security-The component of commu-
nications security which results from all physical
measures necessary to safeguard classified equipment,
material, and documents from access thereto or
observation thereof by unauthorized persons. (Dictio-
nary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74. (U)).
eompartmentation: 1) The practice of establishing
special channels for handling sensitive intelligence
information. The channels are limited to individuals
with a specific need for such information and who are
therefore given special security clearances in order to
have access to it. (Final Report, Senate Select
Committee on Intelligence, 26 April 1976). 2) 1. In
SIGINT, special protection given to the production
and distribution of SIGINT material of especially
sensitive nature because of its source, method of
processing, or content. 2. In COMSEC, restricting the
use of specific primary cryptovariables to specific
operational units grouped together on the basis of
their geographical area or their common participation
in a mission or operation for the purpose of limiting
the information protected by these cryptovariables
and thus limiting the adverse impact of a compromise
of these variables. (Basic Cryptologic Glossary (U),
NSA , 1971. 3) 1. Establishment and management of
an intelligence organization so that information about
the personnel, organization, or activities of one
component is made available to any other component
only to the extent required for the performance of
assigned duties. (Dictionary of Military and Associat-
ed Terms, Dept. of Defense (U), the Joint Chiefs of
Staff 3 Sep 74 (U)).
compromise: 1) The loss of control over any COMINT
or information related to COMINT or COMINT
activities resulting in a reasonable assumption that it
could have, or confirmation of the fact that it has,
come to the knowledge of an unauthorized person.
(USSID 3, SIGINT Support to Military Command-
ers (U), NSA, 1 Jul 74). 2) The known or suspected
exposure of classified information or material in
whole or in part to unauthorized persons through loss,
theft, capture, recovery by salvage, defection of
individuals, unauthorized viewing, or any other
means. (Basic Cryptologic Glossary (U), NSA, 1971).
computer security: The protection resulting from all
measures designed to prevent either deliberate or
inadvertent unauthorized disclosure, acquisition, ma-
nipulation, or modification of classified information in
a computer system. (Basic Cryptologic Glossary (U),
NSA, 1971).
consumer: An obsolete term for customer. (Basic
Cryptologic Glossary (U), NSA, 1971).
counterintelligence: 1) Information gathered and
activities conducted to protect against espionage and
other clandestine intelligence activities, sabotage,
international terrorist activities or assassinations
conducted for or on behalf of foreign powers,
organizations or persons, but not including personnel,
physical, document, or communications security pro-
grams. (U.S. Intelligence Activities, Executive Order
No. 12036, Jan 1978.) 2) Information concerning the
protection of foreign intelligence or of national
security information and its collection from detection
or disclosure. (USSID 18, Limitations and Proce-
dures in Signals Intelligence Operations of the USSS
(U), NSA, 26 May 76). 3) That phase of intelligence
covering all activity devoted to destroying the
effectiveness of inimical foreign intelligence activities
and to the protection of information against
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/1 /01 C gg, RDP80M 0596A000500020003-7
Appendix B (continued)
espionage, personnel against subversion, and installa-
tions or material against sabotage. See also counter-
espionage, countersabotage, countersubversion. (Dic-
tionary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74). 3)
That aspect of intelligence activity which is devoted to
destroying the effectiveness of inimical foreign intelli-
gence activities and to the protection of information
against espionage, individuals against subversion, and
installations or material against sabotage. See also
counterespionage, countersabotage, countersubver-
sion. (Dictionary of Military and Associated Terms,
Dept. of Defense (U), the Joint Chiefs of Staff 3 Sep
74 (U)).
critical intelligence: Intelligence which is critical and
requires the immediate attention of the commander.
It is required to enable the commander to make
decisions which will provide a timely and appropriate
response to actions by the potential/actual enemy. It
includes but is not limited to the following:
A. Strong indications of the imminent outbreak of
hostilities of any type (warning of attack):
B. Aggression of any nature against a friendly
country:
C. Indications or use of nuclear-biological chemi-
cal weapons (targets): and
D. Significant events within potential enemy coun-
tries that may lead to modification of nuclear strike
plans. (Dictionary of Military and Associated Terms,
Dept. of Defense (U), the Joint Chiefs of Staff, 3 Sep
74. (U)).
critical intelligence message (CRITIC): A message
containing information indicating a situation or
pertaining to a situation which affects the security or
interests of the United States or its allies to such an
extent that it may require the immediate attention of
the President. (Defense Special Security Communica-
tions System (DSSCS) Operating Instructions Sys-
tem Procedures (U), NSA, 6 Feb 73).
cryptography: The enciphering of plain text so that it
will be unintelligible to an unauthorized recipient.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
cryptomaterial: All COMSEC material bearing the
marking CRYPTO or otherwise designated as incor-
porating cryptographic information. Classified cryp-
toequipments, their classified subdivisions and keying
material are considered cryptomaterial even though
they do not bear the CRYPTO marking. (Communi-
cations-Electronics Terminology (U), U.S. Dept. of
the Air Force, 15 Nov 73).
current intelligence: Summaries and analyses of recent
events. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976).
defector: A person who, for political or other reasons,
has repudiated his country and may be in possession
of information of interest to the United States
Government. (Final Report, Senate Select Committee
on Intelligence, 26 April 1976).
Defense Intelligence Community: The Defense Intelli-
gence Agency, National Security Agency, and the
intelligence components of the unified and specified
command. (IDHS Glossary of Common Acronyms,
Codes, Abbreviations, and Terms Used in Dept. of
Defense Intelligence Data Handling Systems (IDHS)
Documents (U), DIA, 1970).
departmental intelligence: 1) Intelligence which any
department or agency of the Federal Government
requires to execute its own mission. (Dictionary of
Military and Associated Terms, Dept. of Defense (U),
the Joint Chiefs of Staff, 3 Sep 74. (U)). 2) The
intelligence which Government departments and
agencies generate in support of their own activities.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
dissemination: The distribution of information intelli-
gence products (in oral, written, or graphic form) to
departmental and agency intelligence consumers.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
double agent: Agent in contact with two opposing
intelligence services only one of which is aware of the
double agent contact or quasi-intelligence services.
(Dictionary of Military and Associated Terms, Dept.
of Defense (U), the Joint Chiefs of Staff, 3 Sep 74.
(u)).
economic intelligence: Intelligence regarding foreign
economic resources, activities, and policies. (Final
Report, Senate Select Committee on Intelligence, 26
April 1976).
electronic intelligence (ELINT): 1) That technical and
intelligence information derived from foreign electro-
magnetic noncommunications transmissions by other
than the intended recipients. (Glossary of Communi-
cations-Electronics Terms (U), JCS, Dec 74). 2) The
intelligence information product of activities engaged
in the collection and processing for subsequent
intelligence purposes of foreign noncommunications
electromagnetic radiations emanating from other than
nuclear detonations and radioactive sources. (Basic
Cryptologic Glossary (U), NSA, 1971). 3) Technical
and intelligence information derived from the collec-
tion (or interception) and processing of foreign
electromagnetic radiations (noncommunications)
emanating from sources such as radar. ELINT is part
of the NSA/CSS Signals Intelligence Mission. (Final
Report, Senate Select Committee on Intelligence, 26
April 1976).
Am
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release J $&W& :frlAeQltll e0596A000500020003-7
electronic order of battle (EOB): A document summa-
rizing the deployment of enemy noncommunications
and communications emitters in a given area. In
addition to deployment, the EOB also contains data as
to the function of each emitter. (Basic Manual (U),
ELINT Collection Analysis Guide (U), National
Cryptologic School, 1965).
electronic security: The detection, identification,
evaluation, and location of foreign electromagnetic
radiations. (Final Report, Senate Select Committee
on Intelligence, 26 April 1976).
electronic surveillance: Surveillance conducted on a
person, group, or other entity by electronic equipment
which is often highly sophisticated and extremely
sensitive. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976).
encipher: To convert a plain text message into
unintelligible form by the use of a cipher system.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
encrypt: To convert a plain text message into
unintelligible form by means of a cryptosystem; this
term covers the meanings of encipher and encode.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
espionage: Clandestine intelligence collection activity.
This term is often interchanged with "clandestine
collection." (Final Report, Senate Select Committee
on Intelligence, 26 April 1976).
evaluation: 1) Appraisal of an item of information in
terms of credibility, reliability, pertinency, and
accuracy. Appraisal is accomplished at several stages
within the intelligence process with progressively
different contexts. Initial evaluations made by case
officers and report officers are focused upon the
reliability of the source and the accuracy of the
information as judged by data available at or close to
their operational levels. Later evaluations by intelli-
gence analysts are primarily concerned with verifying
accuracy of information and may, in effect, convert
information into intelligence. Appraisal or evaluation
of items of information or intelligence is indicated by
a standard letter-number system. The evaluation of
the reliability of sources is designated by a letter from
A through F, and the accuracy of the information is
designated by numeral 1 through 6. These are two
entirely independent appraisals, and these separate
appraisals are indicated in accordance with the
system indicated below. Thus, information adjudged
to be "probably true" received from a "usually
reliable source" is designated "B-2" or "B2" while
information of which the "truth cannot be judged"
received from a "usually reliable source" is desig-
nated "B-6" or "B6."
Reliability of source:
A-Completely reliable; B-Usually reliable;
C-Fairly reliable; D-Not usually reliable; E-Unreli-
able; F-Reliability cannot be judged.
Accuracy of information:
1-Confirmed by other sources; 2-Probably true;
3-Possibly true; 4-Doubtful; 5-Improbable;
6-Truth cannot be judged.
(Dictionary of Military and Associated Terms, Dept.
of Defense (U), the Joint Chiefs of Staff 3 Sep 74.
(U)).
2) In intelligence usage, appraisal of an item of
information in terms of credibility, reliability, per-
tinency, and accuracy. Appraisal is accomplished at
several stages within the intelligence cycle with
progressively different contexts. (Recommended
Change to JCS Pub 1, 25 July 1977).
exploitation: In SIGINT, the production of informa-
tion from messages that are encrypted in systems
whose basic elements are known. Exploitation in-
cludes decryption, translation, and the solution of
specific controls such as indicators and specific keys.
(Basic Cryptologic Glossary (U), NSA, 1971).
foreign intelligence: 1) Information relating to the
capabilities, intentions and activities of foreign
powers, organizations or persons, but not including
counterintelligence except for information on interna-
tional terrorist activities. (U.S. Intelligence Activities,
Executive Order No. 12036, Jan 1978.) 2) a.
Information concerning the capabilities, intentions
and activities of any foreign power, or of any non-
United States person, whether within or outside the
United States or concerning areas outside the United
States. b. Information relating to the ability of the
United States to protect itself against actual or
potential attack or other hostile acts of a foreign
power or its agents. c. Information with respect to
foreign powers or non-United States persons which
because of its importance is deemed essential to the
security of the United States or to the conduct of its
foreign affairs. d. Information relating to the ability
of the United States to protect itself against the
activities of foreign intelligence services. (USSID 18,
Limitations and Procedures in Signals Intelligence
Operations of the USSS (U), NSA, 26 May 76). 3)
Intelligence concerning areas not under control of the
power sponsoring the collection effort. (Dictionary of
Military and Associated Terms, Dept. of Defense (U),
the Joint Chiefs of Staff, 3 Sep 74. (U)).
guidance: The general direction of an intelligence
effort, particularly in the area of collection. (Final
Report, Senate Select Committee on Intelligence, 26
April 1976).
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Appendix B (Continued)
integration: In photography, a process by which the
average radar picture seen on several scans of the time
base may be obtained on a print, or, the process by
which several photographic images are combined into
a single image. (Dictionary of Military and Asso-
ciated Terms, Dept. of Defense (U), the Joint Chiefs
of Staff, 3 Sep 74. (U)).
intelligence: 1) Foreign intelligence and counterintelli-
gence. (U.S. Intelligence Activities, Executive Order
No. 12036, Jan 78.) 2) The product resulting from the
collection, collation, evaluation, analysis, integration,
and interpretation of all collected information. (Final
Report, Senate Select Committee on Intelligence, 26
April 1976). 3) The product resulting from the
collecting and processing of information concerning
actual and potential situations and conditions relating
to foreign activities and to foreign or enemy-held
areas. This processing includes the evaluation and
collation of the information obtained from all
available sources, and its analysis, synthesis, and
interpretation. (Basic Cryptologic Glossary (U), NSA,
1971). 4) The product resulting from the collection,
evaluation, analysis, integration, and interpretation of
all available information which concerns one or more
aspects of foreign nations or of areas of operations and
which is immediately or potentially significant to
military planning and operations. (Dictionary of
Military and Associated Terms, Dept. of Defense (U)
the Joint Chiefs of Staff. 3 Sep 74. (U)).
intelligence activities: Sec 14. (a) As used in this
resolution, the term "intelligence activities" includes
(1) the collection, analysis, production, dissemination,
or use of information which relates to any foreign
country, or any government, political group, party,
military force, movement, or other association in such
foreign country, and which relates to the defense,
foreign policy, national security, or related policies of
the United States, and other activity which is in
support of such activities; (2) activities taken to
counter similar activities directed against the United
States; (3) covert or clandestine activities affecting
the relations of the United States with any foreign
government, political group, party, military force,
movement or other association; (4) the collection,
analysis, production, dissemination, or use of informa-
tion about activities of persons within the United
States, its territories and possessions, or nationals of
the United States abroad whose political and related
activities pose, or may be considered by any
department, agency, bureau, office, division, instru-
mentality, or employee of the United States to pose, a
threat to the internal security of the United States,
and covert or clandestine activities directed against
such persons. Such term does not include tactical
foreign military intelligence serving no national
policymaking function. (Senate Resolution 400. June
1977.)
intelligence cycle: 1) The steps by which information is
assembled, converted to intelligence, and made
available to users. These steps are in four phases:
A. Planning and direction: Determination of intel-
ligence requirements, preparation of a collection plan,
issuance of orders and requests to information
collection agencies, and a continuous check on the
productivity of collection agencies.
B. Collection: The exploitation of sources of
information by collection agencies and the delivery of
this information to the proper intelligence processing
unit for use in the production of intelligence.
C. Processing: The step whereby information be-
comes intelligence through evaluation, analysis, inte-
gration, and interpretation.
D. Dissemination: The conveyance of intelligence
in suitable form (oral, graphic, or written) to agencies
needing it. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff
3 Sep 74. (U)). 2) The steps by which information is
assembled, converted into intelligence, and made
available to consumers. The cycle is composed of four
basic phases: (1) direction: the determination of
intelligence requirements, preparation of a collection
plan, tasking of collection agencies, and a continuous
check on the productivity of these agencies; (2)
collection: the exploitation of information sources and
the delivery of the collected information to the proper
intelligence processing unit for use in the production
of intelligence; (3) processing: the steps whereby
information becomes intelligence through evaluation,
analysis, integration, and interpretation; and (4)
dissemination: the distribution of information or
intelligence products (in oral, written, or graphic
form) to departmental and agency intelligence con-
sumers. (Final Report, Senate Select Committee on
Intelligence, 26 April 1976).
intelligence estimate: An appraisal of the elements of
intelligence relating to a specific situation or condition
with a view to determining the courses of action open
to the enemy or potential enemy and the probable
order of their adoption. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), the Joint
Chiefs of Staff, 3 Sep 74. (U)).
intelligence information: 1) In SIGINT, information
which is of intelligence use to customers whose
primary mission does not include SIGINT operations
of technical SIGINT information. (Basic Cryptologic
Glossary (U), NSA (P1), 1971). 2) The unevaluated
and uninterpreted information about the enemy or
potential enemy. (Basic manual (U), ELINT Collec
tion Analysis Guide (U), National Cryptologic
School, 1965).
intelligence report: A specific report of information,
usually on a single item, made at any level of
command in tactical operations and disseminated as
rapidly as possible in keeping with the timeliness of
the information. Also called INTREP. (Dictionary of
Military and Associated Terms, Dept. of Defense (U),
the Joint Chiefs of Staff. 3 Sep 74. (U)).
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2WIla X CA hnued)06A000500020003-7
intelligence requirement: A consumer statement of
information needed which is not already at hand.
(Final Report, Senate Select Committee on Intelli-
gence, 26 April 1976).
interception: The act of searching for and listening to
and/or recording communications and/or electronic
transmissions for the purpose of obtaining intelli-
gence. (Glossary of Communications-Electronics
Terms (U), JCS, Dec 74).
international terrorist activities: Means any activity or
activities which: (a) involves killing, causing serious
bodily harm, kidnapping, or violent destruction of
property, or an attempt or credible threat to commit
such acts; and (b) appears intended to endanger a
protectee of the Secret Service or the Department of
State or to further political, social, or economic goals
by intimidating or coercing a civilian population or
any segment thereof, influencing the policy of a
government or international organization by intimida-
tion or coercion, or obtaining widespread publicity for
a group or its cause; and (c) transcends national
boundaries in terms of the means by which it is
accomplished, the civilian population, government, or
international organization it appears intended to
coerce or intimidate, or the locale in which its
perpetrators operate or seek asylum. (U.S. Intelli-
gence Activities, Executive Order No. 12036, 26 Jan
1978.)
measurement and signature intelligence (MASINT):
MASINT is obtained by quantitative and qualitative
analysis of data (metric, angle, spatial, wavelength,
time dependent, modulation, plasma, and hydromag-
netic) derived from sensing instruments other than
those normally associated with human communica-
tions, electronics intelligence (HUMINT, COMINT,
ELINT) or imagery collection. MASINT includes,
but is not limited to, the following disciplines: Radar
intelligence (RADINT): Nuclear intelligence
(NUCINT): Unintentional Radiation intelli-
gence (RINT): Acoustic intelligence (Non-
Compressible fluids - ACINT: Compressible
Fluids - ACOUSTINT): Electro-Optic intelli-
gence (Electro-OPTINT): Event-related dynamic
measurements photography (OPTINT): and debris
collection. Telemetry intelligence (TELINT) is a
special category of signals intelligence (SIGINT) that
provides measurement data on foreign instrumenta-
tion signals (FIS). Requirements for collection will be
expressed as MASINT requirements. The term
MASINT should be used when referring to the above
categories of special sensor disciplines in aggregate.
(Defense Intelligence Collection Requirements Man-
ual (C), DIA, 27 Jan 75).
medical intelligence: That category of intelligence
which concerns itself with man as a living organism
and those factors affecting his efficiency, capability,
and well-being. (Dictionary of Military and Associat-
ed Terms, Dept. of Defense (U), the Joint Chiefs of
Staff, 3 Sep 74. (U)).
national intelligence: 1) Integrated departmental
intelligence that covers the broad aspects of national
policy and national security, is of concern to more
than one department or agency, and transcends the
exclusive competence of a single department or
agency. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff,
3 Sep 74. (U)). 2) Intelligence produced by the CIA
which bears on the broad aspects of United States
national policy and national security. It is of concern
to more than one department or agency. (Final
Report, Senate Select Committee on Intelligence, 26
April 1976).
National Intelligence Estimate: A strategic estimate of
capabilities, vulnerabilities, and probable courses of
action of foreign nations which is produced at the
national level as a composite of the views of the
Intelligence Community. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), the Joint
Chiefs of Staff, 3 Sep 74. (U)).
operational intelligence: 1) Intelligence required for
planning and executing all types of military oper-
ations. 2) Intelligence required to support the activi-
ties of intelligence agencies under the National
Security Council. (Basic Cryptologic Glossary (U),
NSA, 1971).
physical security: 1) The component of security which
results from all physical measures necessary to
safeguard classified equipment and material from
access by unauthorized persons. (Basic Cryptologic
Glossary (U), NSA, 1971). 2) The component of
COMSEC which results from all physical measures
necessary to safeguard COMSEC material and
information from access thereto or observation
thereof by unauthorized persons. (Glossary of Com-
munications Security and Emanations Security
Terms (U), U.S. Communications Security Board,
Oct 74). 3) The element of communications security
that results from all physical measures necessary for
safeguarding classified equipment, material, and
documents from access or observation by unauthor-
ized persons. (Communications-Electronics Termin-
ology (U), U.S. Dept. of the Air Force, 15 Nov 73). 4)
That part of security concerned with physical
measures designed to safeguard personnel to prevent
unauthorized access to equipment, facilities, material,
and documents, and to safeguard them against
espionage, sabotage, damage, and theft. See also
communications security. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), the Joint
Chiefs of Staff. 3 Sep 74).
plain text: Unencrypted communications; specifically,
the original message of a cryptogram, expressed in
ordinary language. (Final Report, Senate Select
Committee on Intelligence, 26 April 1976).
political intelligence: Intelligence concerning foreign
and domestic policies of governments and the
activities of political movements. (Dictionary of
Military and Associated Terms, Dept. of Defense (U),
the Joint Chiefs of Staff, 3 Sep 74).
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Appendix B (Continued)
processing: 1) The manipulation of collected raw
information to make it usable in analysis to prepare
for data storage or retrieval. (Final Report, Senate
Select Committee on Intelligence, 26 April 1976) 2)
Treatment of copy in accordance with predetermined
and generalized criteria so as to produce all or some of
the information contained in it in a new medium or a
new form. (The main types of processing are
conversion, scanning, extraction, digestion and diari-
zation). (Basic Cryptologic Glossary (U), 1971). 3)
Further handling, manipulation, consolidation, com-
positing, etc., of information to convert it from one
format to another or to reduce it to manageable
and/or intelligible information. (Communications-
Electronics Terminology (U), U.S. Dept. of the Air
Force, 15 Nov 73). 4) In photography, the operations
necessary to produce negatives, diapositives or prints
from exposed films, plates or paper. (Dictionary of
Military and Associated Terms, Dept. of Defense (U),
the Joint Chiefs of Staff. 3 Sep 74).
production: 1) Intelligence product means the esti-
mates, memoranda and other reports produced from
the analysis of available information. (Executive
Order No. 12036, 26 Jan 1978.) 2) The preparation of
reports based on an analysis of information to meet
the needs of intelligence users (consumers) within and
outside the Intelligence Community. (Final Report,
Senate Select Committee on Intelligence, 26 April
1976).
radiation intelligence: Intelligence derived from the
collection and analysis of non-information bearing
elements extracted from the electromagnetic energy
unintentionally emanated by foreign devices, equip-
ments, and systems excluding those generated by the
detonation of automatic/nuclear weapons. (Dictio-
nary of Military and Associated Terms, Dept. of
Defense (U), the Joint Chiefs of Staff, 3 Sep 74).
requirement: A general or specific request for
intelligence information made by a member of the
Intelligence Community. (Final Report, Senate Select
Committee on Intelligence, 26 April 1976).
scientific and technical intelligence: The product
resulting from collection, evaluation, analysis and
interpretation of foreign scientific and technical
information which covers: A. Foreign developments in
basic and applied research and in applied engineering
techniques; and B. Scientific and technical character-
istics, capabilities, and limitations of all foreign
military systems, weapons, weapon systems and
material. The research and development related
thereto, and the production methods employed for
their manufacture. (USSID 40, ELINT Operating
Policy (U), NSA, 24 Oct 75).
sensitive: Something which requires special protection
from disclosure, which could cause embarrassment,
compromise, or threat to the security of the sponsor-
ing power. (Final Report, Senate Select Committee
on Intelligence, 26 April 1976).
sensitive compartmented information: The term as
used in this manual is identified with its use in DCID
1/14. It is intended to include all information and
material bearing special Intelligence Community
controls indicating restricted handling within Com-
munity intelligence collection programs and their end
products for which Community systems of compart-
mentation are formally established. The term does not
include restricted data as defined in section 11,
Atomic Energy Act of 1954, as amended. (Security of
Compartmented Computer Operations (U), DIA, 14
Jan 75).
signal: 1) In electronics, any transmitted electric
impulse which is of interest in the particular context;
and 2) Anything intentionally transmitted by visual
acoustical, or electrical methods, which is intended to
convey a meaning to the recipient. (Basic Cryptologic
Glossary (U), NSA, 1971). 3) A visual, audible,
electrical, or other indication used to convey informa-
tion; and 4) The message or effect to be conveyed over
a communication system. (Glossary of Machine
Processing Terms (U), NSA (Office of Machine
Processing), 1964). 5) Event, phenomenon or electrical
quality that conveys information from one point to
another; and 6) Operationally, a type of message that
is conveyed or transmitted by visual, acoustical, or
electric means. The text consists of one or more
letters, words, characters, signal flags, visual displays,
or special sounds with prearranged meanings. (Com-
munications-Electronic Terminology (U), U.S. Dept.
of the Air Force, 15 Nov 73).
signals intelligence (SIGINT): 1) A generic term which
includes both communications intelligence
(COMINT) and electronic intelligence (ELINT).
(Glossary of Communications-Electronics Terms (U),
JCS, Dec 74). 2) A generic term including communi-
cations intelligence and electronic intelligence, abbr.
SIGINT. (SIGINT refers to the combination of
COMINT and ELINT or to either when one of them
is not specifically identified). (Basic Cryptologic
Glossary (U), NSA, 1971). 3) A generic term which
includes both communication intelligence and elec-
tronic intelligence. Also called SIGINT. See also
intelligence. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff
3 Sep 74. (U)). 4) A category of intelligence
information comprising all communications intelli-
gence (COMINT), electronics intelligence (ELINT),
and telemetry intelligence (TELINT). (Signals Intel-
ligence (SIGINT) (U), DOD, 25 Jan 73).
source: 1) A person, thing, or activity which provides
intelligence information. In clandestine activities, the
term applies to an agent or asset, normally a foreign
national, being used in an intelligence activity for
intelligence purposes. In interrogations, it refers to a
person who furnishes intelligence information with or
without knowledge that the information is being used
for intelligence purposes. 2) In interrogation activities,
any person who furnished intelligence that the
information is being used for intelligence purposes. In
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release X0
R :9116WARMP96A000500020003-7
this context, a controlled source is in the employment
or under the control of the intelligence activity and
knows that his information is to be used for
intelligence purposes. An uncontrolled source is a
voluntary contributor of information and may or may
not know that the information is to be used for
intelligence purposes. (Dictionary of Military and
Associated Terms, Dept. of Defense (U), the Joint
Chiefs of Staff, 3 Sep 74. (U)).
special intelligence communications (SPINTCOMM):
SPINTCOMM was established by Secretary of
Defense Memorandum, dated 4 November 1964. It
consists of those communications facilities under the
operational and technical control of the chief of
intelligence of each of the military departments and
under the management of the Defense Intelligence
Agency. (Defense Special Security Communications
System (DSSCS) Operating Instructions System/
Data Procedures (U), NSA, 8 Oct 75).
special sensor: Equipment on instrumented platforms
and in installations designed to collect measurement
and signature data that can be further processed into
data usable by intelligence analysts. (Defense Intelli-
gence Collection Requirements Manual DIA, 27 Jan
75).
tactical intelligence: Intelligence which is required for
the planning and conduct of tactical operations.
Essentially tactical intelligence and strategic intelli-
gence differ only in scope, point of view and level of
employment. (Dictionary of Military and Associated
Terms, Dept. of Defense (U), the Joint Chiefs of Staff.
3 Sep 74. (U)).
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Appendix C
INDEX OF OTHER INTELLIGENCE GLOSSARIES
Other publications, many of which contain classified infor-
mation, also contain definitions of intelligence terms. An index
of some of these publications appears below.
Acquisition and Storage of Information Concerning Non-Affiliated Persons and
Organizations. Army Regulation 380-13. September 1974
ADP Security Manual, Techniques and Procedures for Implementing Deactivating,
Testing, and Evaluating Secure Resource-Sharing ADP Systems. DoD. January
1973
Basic Cryptologic Glossary. NSA. 1971
Charter of DCI SIGINT Committee, DCID No. 6/1, May 1976
Classification and Declassification of National Security Information and Material.
Executive Order No. 11652. March 1972 and as amended.
Combat Intelligence. Army Field Manual 30-5. October 1973
Communications-Electronics Terminology Handbook. Public Affairs Press. 1965
Communications-Electronics Terminology, U.S. Dept. of the Air Force. November
1973
Communications Glossary, Range Commanders Council, White Sands Missile
Range. March 1966
Communications Security. Army Regulation 530-2. March 1976
Control of Compromising Emanations. Army Regulation 530-4. June 1971
Counterintelligence Operations. Army Field Manual 30-17. January 1972
Counterintelligence Special Operations. Army Field Manual 30-17A. February 1973
DCI Policy on Release of Foreign intelligence to Contractors, DCID No. 1/7. May
1976
DoD Human Resource Intelligence Collection Implementation Plan. 1966
Data Standardization for the Intelligence Community, DCID No. 1/5. May 1976
Defense Intelligence Collection Requirements Manual, DIA. January 1975
Defense Special Security Communications System (DSSCS) Operating Instructions
System/Data Procedures. NSA. October 1975
Definitions of Search and Analysis Terms, Appendix D to "Selected Electronic
Emitters for Target Countries," June 1964
Department of the Army Supplement to DoD 5200.1-R. Army Regulation 38-05. July
1974
Dictionary of Military and Associated Terms. JCS Pub 1. September 1974
Dictionary of Telecommunications. 1970
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Relea'k$jj j1j/t :, ,& ' e0 {100596A000500020003-7
Dictionary of United States Army Terms. Army Regulation 310-25. June 1972
Domestic Exploitation Program. Army Regulation 381-15. July 1974
Electronic Security. Army Regulation 530-3. June 1971
Electronic Warfare. Army Regulation 105-87. August 1976
ELINT Operating Policy. USSID 40. October 1975
ELINT Collection Analysis Guide, National Cryptologic School. 1965
Enemy Prisoners of War, Civilian Internees, and Detained Persons. Army Field
Manual 19-40. February 1976
Engineer Intelligence. Army Field Manual 5-30. September 1967
Final Report of the Select Committee to Study Governmental Operations with
Respect to Intelligence Activities, United States Senate, Together with Additional
Supplemental and Separate Views. April 1976
Foreign Intelligence Production, NSCID No. 3. February 1972
Glossary of Basic TA Terminology, National Cryptologic School. 1969
Glossary of Communications-Electronics Terms. December 1974
Glossary of Communications Security and Emanations Security Terms. U.S.
Communications and Security Board. October 1974
Glossary for Computer Systems Security, National Bureau of Standards. February
1976
Glossary of Machine Processing Terms. September 1964
Handling of Critical Information, DCID No, 7/1. May 1976
House Resolution 658. (Establishes House Permanent Select Committee on Intelli-
gence). November 1977
IDHS Glossary of Common Acronyms, Codes, Abbreviations, and Terms Used in
Dept. of Defense Intelligence Data Handling Systems (IDHS) Documents. 1970
Information Security Regulation. DoD 5200.1-11
Intelligence Collection Operations. Army Field Manual 30-18. November 1973
Intelligence Cover and Operational Support Activities. Army Regulation 381-102.
November 1973
Intelligence Interrogation. Army Field Manual 30-15. June 1973
Intelligence Support. Army Regulation 381-19. March 1977
Limitations and Procedures in Signals Intelligence Operations of the USSS. USSID
18. May 1976
List of Terminology Used in Foreign Counterintelligence and Counterespionage
Investigations. December 1973
Meteorological Support for the U.S. Army. Army Regulation 115-10. June 1970
Military Geographic Intelligence (Terrain). Army Field Manual 30-10. March 1972
Military Intelligence Officer Excepted Career Program. Army Regulation 614-115.
January 1975
Military Intelligence Organizations. Army Field Manual 30-9. October 1973
Modern Data Communications Concepts, Language and Media. Wm. P. Davenport,
Hayden Book Co., Inc. 1971
National Foreign Intelligence Plan for Human Resources. NFIB D/27.7/5. 1977
NATO Glossary of Terms and Definitions for Military Use (AAP-6)
Approved For Release 2006/12/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2
~~illl X c
tQ 8talluecrQ6AO00500020003-7
01
National SIGINT Requirements System Handbook. December 1976
Naval Intelligence System Architectural Management Plan for 1978 (NISAM-78)
(Draft)
Offensive CI Operations (OFCO). Army Regulation 381-47. April 1976
Operations. Army Field Manual 100-5. July 1976
Operations Security. Army Regulation 530-1. May 1976
Physical Security. Army Field Manual 19-30. November 1977
Point Weather Warning Dissemination. Army Regulation 115-1. February 1975
Security, Use and Dissemination of Communications Intelligence, The. Army
Regulation 380-35. March 1973
Security, Use and Dissemination of Communications Intelligence, The. DoD
Directive S-5200.17 (M-2)
Security, Use and Dissemination of Communications Intelligence, The. USAFINTEL
201-1.
Senate Resolution 400. (Establishes the Senate Select Committee on Intelligence).
June 1977
SIGINT Security, NSA. USSID 3. August 1972
Signals Intelligence, NSCID No. 6. February 1972
Signal Intelligence (SIGINT). Army Field Manual 30-21. August 1975
Signals Intelligence. DoD Directive S-3115.7
SIGSEC Techniques. Army Field Manual 32-6. February 1977
Soviet Naval Threat Circa 2000, The. August 1976
Special Security Officer System, The. Army Regulation 380-28. October 1971
Statement of Intelligence Interest. DoD Document No. 05990
Surveillance, Target Acquisition and Night Observation (STANO) Operations. Army
Field Manual 31-100. May 1971
Technical Intelligence. Army Field Manual 30-16. August 1972
Telemetry Terminology, Missile Intelligence Agency, Huntsville, Alabama. January
1975
Threat Analysis. Army Regulation 381-11. August 1974
Title Classified. DoD Directive TS-500.12 (M-1)
Title Classified (USAFINTEL 201-4)
United States Air Force Dictionary, Woodford Agee Heflin (Editor), Research Studies
Institute, Air University Press, Maxwell Air Force Base, Alabama. 1956
United States Intelligence Activities. Executive Order No. 12036. January 1978
U.S. Air Force Glossary of Standardized Terms. (Air Force Manual 11-1)
U.S. Army Requirements for Weather Service Support. Army Regulation 115-12.
August 1976
U.S. Clandestine Foreign Intelligence and Counterintelligence Activities Abroad,
NSCID No. 5. February 1972
Approved For Release 2006112/01: CIA-RDP80M00596AO00500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7
Approved For Release 2006/12/01: CIA-RDP80M00596A000500020003-7