Words of Intelligence: A Dictionary, 1st Edition

  • Published By:
  • ISBN-10: 0810859335
  • ISBN-13: 9780810859333
  • Grade Level Range: 9th Grade - College Senior
  • 173 Pages | eBook
  • Original Copyright 2006 | Published/Released April 2007
  • This publication's content originally published in print form: 2006

  • Price:  Sign in for price

About

Overview

Words of Intelligence: A Dictionary is intended for the intelligence and national security men and women who are fighting the Global War on Terrorism at all levels: local, state, and federal. The intelligence community has undergone massive changes since the Central Intelligence Agency, National Security Agency, and the Department of Defense were created, and recently, with the establishment of Homeland Security and a Director of National Intelligence, it has taken on even more duties and responsibilities. Intelligence now must be transmitted to state and local public administrators, health officials, and transportation planners (to name just a few) in times of a possible domestic attack. Containing over 600 terms related to theoretical aspects of intelligence, intelligence operations, intelligence strategies, security classification of information, obscure names of intelligence boards and organizations, and homeland security, this dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues. A topical index is also included.

About the Author:
Jan Goldman is a professor for the study of strategic warning and threat management at the Joint Military Intelligence College in Washington, DC., where he also teaches ethics and intelligence.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Other Frontmatter.
Contents.
Foreword.
Preface.
Abbreviations and Acronyms.
1: A-Team/B-Team Concept (Also Known as Blue Team/Red Team Concept).
2: A-Type Deception.
3: Aardwolf.
4: Absolute Surprise.
5: Accelerator.
6: Acceptable Risk.
7: Access (Sometimes Following the Word Authorized).
8: Accountability.
9: Accountability Information.
10: Accuracy.
11: Acoustical Intelligence (ACINT or ACOUSTINT).
12: Actionable Intelligence.
13: Active Deception.
14: Adversarial Approach.
15: Advisory Sensitivity Attributes.
16: Agency, Intelligence.
17: Agenda-Setting Theory.
18: Agent.
19: Agent of Influence.
20: Alert Center.
21: Alert Fatigue.
22: Alert Memorandum.
23: All-Source Intelligence.
24: Analysis.
25: Analysis and Production.
26: Analysis of Competing Hypotheses.
27: Anomaly.
28: Areas of Concern.
29: Argument.
30: Assessment.
31: Asset.
32: Attributes of Intelligence Quality.
33: Authentication.
34: Authenticity.
35: Authorized for Release to [Name of Country or International Organization].
36: Awareness of National Security Issues and Response (ANSIR) Program.
37: Back-Tell.
38: Basic Intelligence.
39: Basic Measures of Military Preparedness.
40: Bayesian (Decision) Analysis.
41: Bean-Counting Assessment.
42: Black.
43: Bootlegging.
44: Born Classified.
45: Brevity Code.
46: Briefing.
47: British Ten-Year Rule.
48: Bye.
49: Camouflage.
50: Capability.
51: Case Officer.
52: Cassandra.
53: Causal Analysis.
54: Causal Association.
55: Causal Relationship.
56: Caveated Information.
57: Chaos Theory.
58: Checklist Approach.
59: Cipher.
60: Circular Intelligence.
61: Clandestine Operation.
62: Classification (of Information or Intelligence).
63: Classification by Association (Also Known as Classification by Compilation).
64: Classification Challenge.
65: Classification Level(s).
66: Classification Markings (Control Markings, Dissemination Control Markings).
67: Classifier.
68: Clientitis.
69: Closed Information.
70: CNN Effect.
71: Codeword.
72: Codeword Compartment.
73: Cognitive Dissonance.
74: Collaborative Intelligence.
75: Collateral Intelligence.
76: Collecting.
77: Collection.
78: Collection Plan.
79: Combat Information.
80: Combat Intelligence.
81: Combat Readiness.
82: Combined Intelligence Watch Center (CIWC), Also Known as the Combined Intelligence Center (CIC).
83: Command, Control, Communications, and Intelligence (C3I).
84: Communications Cover.
85: Communications Intelligence (COMINT).
86: Community Open-Source Program Office (COSPO).
87: Compartmentalization.
88: Compartmentation of Intelligence.
89: Complex Emergency.
90: Compromise.
91: Computer Security Act Sensitive Information.
92: Concealment.
93: Concentrated Warning.
94: Conclusion.
95: Condition Rating System (AKA, C-Rating).
96: Conditioning and Cover.
97: Confidence Level Scale.
98: Confidential Commercial Information.
99: Confidential Source.
100: Confidentiality.
101: Confirmation of Information (Intelligence).
102: Conflict Prevention.
103: Congruence Analysis.
104: Consequence Analysis.
105: Consequence Management.
106: Contingency Planning Process (Also Referred to as Crisis Action Planning Process).
107: Contractor Access Restricted Information (CARI).
108: Control.
109: Controlled Access Area.
110: Controlled Dossier.
111: Controlled Information.
112: Controlled Unclassified Information.
113: Convergent Evidence.
114: Correlates of War Theory.
115: Correlation Analysis.
116: Counterinformation.
117: Counterintelligence (CI).
118: Counterintelligence Field Activity (CIFA).
119: Counter-Terrorism Center (CTC).
120: Court Records, Types.
121: Covert Operation.
122: Credibility.
123: Creeping Normalcy.
124: Criminal Intelligence.
125: Criminal Intelligence System.
126: Crisis.
127: Crisis Management.
128: Criteria for Success.
129: Critical and Sensitive Information List.
130: Critical Information.
131: Critical Infrastructure.
132: Critical Infrastructure Information.
133: Critical Intelligence.
134: Critical Intelligence Message (Critic).
135: Critical Oversight Information.
136: Crypto.
137: Cryptography.
138: Cry-Wolf Syndrome (or Crying Wolf).
139: Cuban Missile Crisis.
140: Cultivation.
141: Current Indications.
142: Current Intelligence.
143: Current Operational Intelligence.
144: Custodian.
145: Cycle, Intelligence.
146: Daily Digest.
147: Daily Intelligence Summary (DINSUM).
148: Damage Assessment.
149: Damage Caused by Unauthorized Disclosure.
150: Damage to the National Security.
151: Dangerous Assumption.
152: Data.
153: Data Aggregation.
154: Database.
155: Data Mining.
156: Decapitation Strike.
157: Deception.
158: Deception Means.
159: Declassification.
160: Deductive Logic.
161: Defector.
162: Defense Automated Warning System (DAWS).
163: Defense Condition (DEFCON).
164: Defense Intelligence Agency (DIA).
165: Defense Intelligence Production.
166: Degrade.
167: Deliberate Compromise of Classified Information.
168: Delphi Method.
169: Demonstration.
170: Denial and Deception (Also Known as D&D).
171: Department of Defense Directive.
172: Department of Defense Intelligence Information System (DODIIS).
173: Department of State Sensitive But Unclassified.
174: Derivative Classification.
175: Derogatory Information.
176: Descriptive Analysis.
177: Detectable Actions.
178: Devil's Advocate or Devil's Advocacy.
179: Direct Information Warfare.
180: Direction Finding.
181: Director of National Intelligence (DNI).
182: Disaster (Humanitarian).
183: Disaster Alert.
184: Disaster Preparedness.
185: Disaster Prevention.
186: Disaster Relief.
187: Disaster Response.
188: Disaster Risk Management, Humanitarian.
189: Disaster Team.
190: Disclosure.
191: Discovery.
192: Discovery Process.