Glossary of Int terms.png
Letter A.png

Abort: The termination of a mission or project.

Access: Means to identify or obtain use of the desired target for operational purposes.

Accommodation Address: A "safe" address without obvious connection to an intelligence agency, used for a person that does not occupy the premises. This address might be a prearranged temporary address or location where an intelligence operative may receive, forward, transmit, or relay mail to another intelligence operative or outside party. 

Action Officer: A case officer supporting intelligence activities designated to use direct or indirect means to affect enemy operations.

Agent: A person authorized and trained to obtain or assist in securing information for intelligence purposes. It may also represent a person who engages in clandestine activities under the direction of an intelligence organization, but is not an officer, employee, or co-opted worker of that organization.

Agent-in-Place: A penetration agent that betrays its organization to an enemy service by providing information from their actual location that is usually behind enemy lines.

Agent of Influence: Someone who privately serves the interests of a foreign power that can be identifiable by subversive political associations or activities.

Agent Net: An intelligence-gathering unit of agents supervised by a principal agent who is reports to an intelligence officer.

Agent Provocateur: A person used by intelligence agencies to provoke the desired reaction from a target.

Alias: A false name used by intelligence operatives and criminals to insulate themselves from identification. Covert operations and illegal undertakings often require deception to assure concealment.    

Analysis: The process by which information is transformed into intelligence; a systemic examination of information to identify significant facts, make judgments, and draw conclusions.

Assassination: One Central Intelligence Agency (CIA) employee called it "termination with extreme prejudice". The KGB (Soviet Intelligence Agency) described it as "Wet Work". Assassination is another historically observable method of removing political enemies used by intelligence and criminal organizations.

Alias: False names often used by criminals and intelligence operatives to conceal their identity. 

Asset: Human or technical resources used by an intelligence or security service for operational purposes.

Letter B.png

Backstop: Attempts to legitimize the undercover status adopted by intelligence agents. These agents require backstopping to prevent hostile discovery of their actual background. Methods range from rudimentary (false biographical information) to complex (networks of front corporations with employees).

Barium Meal: The use of traceable information for Counterintelligence purposes to reveal enemy networks or operatives.

Black Bag: A term used to describe illegal or clandestine operations involving entry into a desired but prohibited location.

Black Boxed: A portion of operational activities that cannot be assessed following intelligence action due to circumstances beyond direct control.

Black List: The list includes the location and identity of individuals whose capture and detention are of prime importance.

Black Operations (Black Ops): Operations that cannot be acknowledged and must be covertly undertaken. Such operations are illegal and often involve actions that would be catastrophic to the perpetrator and their organization if discovered.

Black Radio: Radio stations with concealed origins that use programming to influence listeners and misinform them for the dissemination of propaganda. 

Blowback: This informal word refers to unintended consequences resulting from operational decisions.

Bona Fides: Establishing the credibility of an individual based upon credentials.

Brush Contact: A method of quick interaction to minimize agent exposure during meetings. Often resources, instructions, or items can be exchanged without being monitored.

Bubble: Areas equipped with soundproofing to prevent any hostile or external monitoring of internal conversations.

Bug: A concealed electronic surveillance device of reduced size used to gather intelligence.

Burned: When an intelligence operative or employee is compromised.

Burning Bridges: Disrupting a compromised intelligence network to sever operational ties and prevent future communication between agents.

Burn Notice: A warning distributed to intelligence employees and operatives to end contact with an individual determined unreliable.

Burst Transmission: Signals that are compressed and transmitted in quick bursts to avoid interception.

Letter C.png

Case Officer: The professional employee of an intelligence or counterintelligence organization that is responsible for providing direction for an agent operation.

Clandestine: Concealment used to protect secret undertakings.

Clandestine Imaging Division: The CIA's Technical Services Clandestine Imaging Division that offered technical support for operations using varied technological intelligence gathering methods. 

Clandestine Services: An internal CIA term, it references the former Directorate for Plans and current Directorate of Operations.

Classification: Security levels assigned to information to prevent unauthorized disclosure.

Clearance: The authorization level of information a person is allowed to access in a national organization.

Collection: Acquiring desired information that can be processed by analysts for intelligence data.

Compartmentalization: The creation of separate units within an organization that possess varying levels of access to sensitive information. This method allows increased control and security to prevent the disclosure of secrets.

Confidential: Security Classification applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe.

Confusion Agent: An individual dispatched by his sponsors to confound the intelligence or counterintelligence apparatus of another country rather than to collect and transmit information.

Contact Report: A report of an operational event. This format provides officers the ability to document routine aspects of operational activities not otherwise covered by other intelligence or operational reporting.

Control: The capacity of a case officer (and his service) to generate, alter, or halt agent behaviors by using or indicating his capacity to use physical or psychological means of leverage.

Counterintelligence: Deceptive methods used to assess and penetrate enemy intelligence groups.  These include the use of surveillance, infiltration with double agents, inspiring defectors, and compromising adversarial operations.

Cover: False background or credentials adopted to conceal intelligence agents engaged in clandestine operations. The only type of cover protected by the Vienna Convention from arrest or prosecution is diplomatic cover.

Covert Action: An officially unrecognized operation inspired to promote foreign policy objectives. US Government covert action has employed paramilitary groups, the Mafia, and the recruitment of assassins.

Cryptology: The academic study, development, and deciphering of codes. 

Cryptonym: A false name used to conceal various people, places, and things related to intelligence operations. The CIA for instance combines a locational prefix and a secondary word to represent concealed information. Certain cryptonyms can relate to a group project and specific members of the operation.

Cultivation: The time preceding agent recruitment during which an intelligence officer utilizes a handler to determine if recruitment is desirable. Often this contact is during a social event to conceal its true purpose.

Cutout: An intermediary or device used to remove direct contact between members of a clandestine organization by compartmenting their communications to allow greater security.

Letter D.png

Damage: Harmful adversarial countermeasures that reduce viable intelligence operations from being undertaken.

Damage Assessment: An internal review conducted to determine how to best minimize damage from legal proceedings resulting from intelligence operations.

Dangle: Intelligence agents used with the intention of manipulating enemy agents to attempt recruitment. This provides opportunity for the "dangle" to penetrate the enemy group.

Debriefing: An interview conducted with a voluntary source to assess topics and areas of intelligence or national security interest by the systematic review of observational data.

Dead Drop: Using a remote or lightly traveled area to exchange information and messages. These drops often employ concealed messages hidden in the surrounding environment for retrieval.

Deep Cover: A cover status designed to withstand scrutiny by opposing groups through diligent fabrication of all related credentials.  

Defection: Conscious abandonment of loyalty, duty, and principle to one's country.

Defector: A defector is a person who betrays their side in a conflict for opposing forces to the detriment of their original side. Often they are a citizen whose public disloyalty potentially is utilized to advance hostile external intelligence goals.

Defector in Place: Defectors located within their country of origin serving a hostile power.

Denied Areas: Hostile areas that usually prevent intelligence operations from being undertaken covertly.  Enhanced counterintelligence methods and precautions should be used within such areas to remain undetected by enemy groups.

Diagraph: A CIA two-letter prefix referencing code-named sources. The prefix identifies the Agency division responsible for managing the source.

Diplomatic Bags and Couriers: These bags are utilized for delivery of sensitive information. Couriers enjoy diplomatic immunity from search and seizure. Bags and couriers are protected under the Vienna Convention. 

Diplomatic Immunity: A status wherein diplomatic officers accredited to a foreign government as ambassadors, or other public ministers, are immune from the jurisdiction of all courts and tribunals of the receiving states whether criminal or civil. The status of diplomatic immunity protects the bearer from prosecution, civil suit, punishment, or compelled testimony in the country to which he or she is accredited.

Discard: The intentional sacrificing a lesser spy to distract notice from a vital agent.

Disinformation: Using a wide array of false information to discredit chosen targets privately or publicly or mislead enemy agents and the public.

Double Agents: Agents in contact with two opposing intelligence services, this agent simultaneously betrays one agency while serving the other. 

Letter E.png

Electronic Intelligence: Using electronic media to collect and analyze signals intelligence.

Émigré: A person lawfully emigrates from their country with the intention of resettling abroad.

Evidence: Legal items and sources presented that prove or refute allegations.

Exfiltration: The covert process of removing someone from a target area that may require exceptional support and avoidance of border controls.

Expulsion: This is the proscribed diplomatic sanction for a host country under the tenets of the Vienna Convention. A suspected abuser of diplomatic privilege can be named "persona non grata" and thus be required to leave the offended nation within a required amount of time.

Eyewash: False entries made in files, usually to protect the security of a source.

Letter F.png

False Defector: A seeming foreign defector that maintains loyalty to their original intelligence service, the rarity of these particular agents is notable and far more alleged false defectors have been named rather than proven.

False Flag: Deceptive tactics employed to aid intelligence officials in their own clandestine operations. These tactics are used rarely to assure their impact and prevent full disclosure of important events.

False Flag Defector: A defector that has been recruited but deceived about who they actually serve by an intelligence group. For instance, a person might believe they serve the CIA but could be a pawn of KGB agents that represented themselves as CIA officials. 

Fellow Traveler: Communist allied persons who support their agendas without formal membership.

Front: Using an organization or body to provide cover for intelligence operatives, this association might also provide reasonable excuses for associating with intelligence targets or sources.

Letter H.png

Handler:  These intelligence employees directly manage an agent or agent network.

Honey trap: A planned sexual encounter used to compromise a target for blackmail. If the encounter is recorded or witnesses it may be used to threaten exposure creating dire personal or professional consequences. Vulnerable agents and officials have been compromised repeatedly throughout history to serve hostile powers.

Human Intelligence: A significant portion of the most useful intelligence is received and distributed using live intelligence sources. However, these sources are the most difficult to manage and develop. Unlike technical intelligence sources, these sources can betray, fabricate information, and serve hostile groups while seemingly being managed.

Letter I.png

Imagery: Photographic Intelligence gathered by technological means that often relies on satellite and high altitude photography.

Indoctrination: Instructions and policy information disseminated to intelligence employees conducting assigned programs.

Informant: A person that wittingly or unwittingly provides information to a clandestine service.

In Obscura: Rare instances when intelligence operatives are temporarily obscured from hostile observation.

Intelligence Analysis: It is the ability to render several often-unconnected facets of an issue and assemble these pieces into a single cohesive idea for policy and operational usage. One of the bedrock activities of intelligence is the conversion of raw gathered facts, rumors, and public information into actionable intelligence data.

Letter M.png

Measurement and Signals Intelligence: The useful data processed from the analysis of targets and monitoring areas of specific interest with technological means.

Microdot: Concealing important information by drastically reducing its size, this necessitates a microscope to deciphering its contents. The dot can be hidden within other materials to conceal its existence. This method is a low-cost alternative to more complex arrangements. 

Misdirection: A classic conjurer's trick, misdirection is the term applied in the counterintelligence community for the tactic of supplying an ostensibly plausible explanation for an event actually caused by something quite different, probably by an individual or an operation, deemed sufficiently valuable to require protection. Invariably a human asset many produce some information which requires action that could compromise him or her, so misdirection is intended to divert attention elsewhere. 

Missile Gap: An exaggerated US military estimate of Soviet nuclear missile capabilities, it occurred in the early 1960s.

Mole: Intelligence agents infiltrating one group while maintaining allegiance to another group who prior enlisted them. The mole potentially can extract secret information, spread dissension among the targeted group, falsely accuse loyal agents, and create chaos in operations they have influence over. The primary use of a mole is penetrating and seriously damaging the target group's operations.

Mole Hunt: A counterintelligence investigation that targets suspected penetration agents within an intelligence group.

Moscow Station: The CIA base inside the Soviet capital city of  Moscow used for Cold War operations after 1953. The first Agency officer sent to Moscow was compromised by hostile blackmail operations. The American Embassy in Moscow was repeatedly the subject of hostile intelligence since that time.

Moscow Rules: The vigorous use of intelligence methods required in only the most hostile of operational environments defined by Moscow, Russia.

Letter N.png

Name Trace: A search of available recorded data to find information about a person, normally conducted to determine the presence or absence of derogatory information about them.

Non-Official Cover: A false background used by intelligence agents to undertake operations; however unlike regular cover these agents do not enjoy diplomatic protections and thus require more complex operational protections for success.

Numbers Stations: A shortwave radio station transmission of a seemingly undecipherable numeric code read over the radio. Multiple counties have used this method to distribute hidden instructions and statements to their own assets within foreign areas.   

Letter O.png

Open Sources: Public or declassified information that is the source of most intelligence material.

Operational Act: Any undertaking that reveal an individual's intelligence agent status and compromises their operation.

Overt: Activities that are openly acknowledged by or readily attributable to the United States government and include activities designed to acquire information trhough legal and transparent means. Overt information may be collected by observation, elicitation, or from expert sources.

Letter P.png

Penetration: Targeting the existing infrastructure of an enemy intelligence group to access secret material and influence enemy activities.

Persona Non Grata: A Vienna Convention disciplinary measure afforded to countries hosting foreign diplomats. It allows a government to expel designated persons from a country by public or private official declaration. The term means a "person who is not acceptable or welcome."

Pitch: This occurs when an intelligence operative attempts to enlist another person in a secret operation. This act may include no preparation or complex advanced preparation depending on operational priorities.

Plausible Deniability: The need to establish a reasonable cover story to prevent blame from being easily applied to clandestine operations and provides officials the ability to deny secret operations that would incite negative public relations.

Positive Vetting: An internal security measure used to accumulate information on candidates in order to prevent compromised individuals from accessing protected information. This might include a series of interviews, extensive verifiable references, and all required document evidence.

Proprietary: Unlike cover organizations, a proprietary is a business owned by the CIA. This does not infer that employees know of the operational use of their company because of a complex web of allied or subsidiary corporate organizations usually supporting these businesses.

Provocation: Activity designed to induce an individual, intelligence service, or government to take action damaging to its own interests.

Pseudonyms: A long-term false name used by intelligence operatives and leaders to conceal their identity.

Letter R.png

Rabbit: The person targeted by a surveillance operation.

Redaction: For purposes of declassification, the removal of exempted information from copies of a document.

Redefector: An individual who defects from their country of origin and for various decides to return.

Romeo Spies: Male intelligence operatives who are used to stage honey trap plots to compromise enemy female intelligence agents.

Letter S.png

Sanitize: The revision of a document to prevent the identification of sources. This usually involves the deletion or substitution of names and other key details.

Secret: The security classification applied to information that unauthorized disclosure could be expected to cause serious damage to national security.

Sheep Dip:  Military operatives removed from normal duties for use in clandestine purposes.

Sleeper: Agents that are placed in a foreign country long in advance of future operations to be later activated without prior alerting enemy intelligence.

Spy Swap: When captured intelligence agents are exchanged by enemy powers.

Spotter: A person assigned to locate and assess individuals in positions of value to an intelligence service.

Station: The term used to signify the CIA base of operations in a given zone or country.

Stay Behind: Intelligence operatives that are purposefully left behind to create disorder and chaos if enemy agents assume control of a territory. Military operations also successfully used this tactic.

Letter T.png

Tagging: Methods of physical surveillance to monitor the actions of operational targets. 

Triple Agents: Agents intentionally posing as disaffected operatives to illicit enemy recruitment of them as double agents.

Letter U.png

Unwitting: An individual used by an official group that is not aware of their connection to a government agency.

Letter V.png

Validation: The process used to determine a source, asset, agent, or employees authenticity, reliability, utility, suitability, and degree of control the case officer or others have.

Volunteer: A person who initiates contact with a government, and who volunteers operation intelligence or requests political asylum; includes call ins, walk ins, and write ins. 

Letter W.png

White List: A list of persons and locations approved to provide intelligence support or useful information to allied intelligence operatives.

Wilderness of Mirrors: The deceptive landscape that clandestine intelligence gathering and assessment occurs in. This culture deception is false, lies are truth, the reflections are illuminating and confusing. The phrase centers on the problem of reliability of the secret information about espionage and the identity of spies. The mirrors comprise information from defectors, disinformation from opposing sides in the Cold War, deviously covered false trails, and facts thought to be valid but incomplete and later established as totally untrue.   

Witting: An individual used by an official group that is aware of their connection to a government agency.  

Letter Z.png

Zoning: A method of surveillance in which the surveillance area is divided into zones, and different people are assigned to cover a specific area. 

CIA ash leaves joined dk grey.png
List of Abbr terms.png

AA: American Airlines, anti-aircraft

A/C: aircraft

ACIC: Army Counter Intelligence Center

ADSO: Assistant Director of Special Operations

BOB: Bureau of Budget

C/WH: Chief, Western Hemisphere Division

CA: Covert Action

CCS: Central Cover Staff

CE: Counterespionage

CI: Counterintelligence

CIA: Central Intelligence Agency

CIARDS: CIA Retirement and Disability System

CIC: Counter Intelligence Corps

CID: Clandestine Imaging Division

CIG: Central Intelligence Group

CISIG: Counter Intelligence Special Investigations Group

CMA: Mexican Aviation Company

CNE: National Confederation of Students

CNO: Chief of Naval Operations

COG: Continuity of Government

COMINT: Communication Intelligence

COS: Chief of Station

CP: Communist Party

COVCOM: Covert Communications

CR: Contact Report

CS: Clandestine Service

DCI: Director of Central Intelligence

DDA: Deputy Director for Administration

DDCI: Deputy Director of Central Intelligence

DDO: Deputy Director of Operations

DCOS: Deputy Chief of Station

DDP: Deputy Director for Plans

DDR: Deputy Director of Research

DDS: Deputy Director of Support

DDS&T: Deputy Director Science and Technology

DFS: Department of Federal Security

DI: Directorate of Intelligence

DIA: Defense Intelligence Agency

DO: Directorate of Operations

DOD: Department of Defense

DOE: Department of Energy

DFS: Department of Federal Security

DOD: Department of Defense

DP: Directorate of Plans

DRE: Directorio Revolucianario Estudiantil, Student Revolutionary Directorate

DS: Directorate of Support

D&TO: Developmental and Target of Opportunity

EDT: Estimated time of departure

FIS: Foreign Intelligence Service

FBI: Federal Bureau of Investigation

FI: Foreign Intelligence

FI/INT/RE: Foreign Intelligence Staff, Intelligence Group, Requirements & Evaluation Branch

FRD: Frente Revolucionario Democratico, Revolutionary Democratic Front

HUMINT: Human Source Intelligence

IDN: Identification Number

IG: Inspector General

IISE: Institute of Social and Economic

IO: International Organizations Division

IPN: National Polytechnic Institute

I&NS: Immigration and Naturalization Service

I&R: Inspection and Review Staff

JCS: Joint Chiefs of Staff

MLN: National Liberation Movement

MSS: Mexican Social Secretariat

MSWT: Medium Speed Wireless Transmission

MURO: University Reform Orientation Movement

NCNA: New China News Agency

NSA: National Security Agency

NSCID: National Security Council Intelligence Directive

OAS: Organization of American States

OO: Office of Operations

OOA: Other Operational Activities

OPC: Office of Policy Coordination

OPF: Official Personnel File

OSO: Office of Special Operations

OSS: Office of Strategic Services

OWVL: One-Way Voice Link

PA: Principal Asset

P/A: Political asset

PAN: Party of National Action 

PARM: Authentic Party of the Mexican Revolution

PCM: Communist Party of Mexico

PM: Paramilitary

POCM: Workers and Farmers Party of Mexico

PP: Political and Psychological Warfare

PPS: Popular Socialist Party

PRI: Institutional Revolutionary Party

RID: Records Integration Division

RMD: Related Missions Directive

SAB: Sabotage

SAS: Special Affairs Staff

SIGINT: Signals Intelligence

SOI: Special Operational Instruction

SR: Soviet Russian

SRD: Soviet Russian Division

SRS: Security Research Staff

SW: Secret Writing

TDY: Temporary Duty

TELEX: Automatic Teletypewriter Exchange

T/O: Table of Organization

TSD: Technical Services Division

TUI: Trade Union International

UCI: International Civic Union

UN: United Nations

UNAM: National Autonomous University of Mexico

UOM: Mexican Workers University

USAID: United States Agency for International Development

USIA: US Information Agency

USIS: US Information Service

UNSUB: Unknown Subject

WFTU: World Federation of Trade Unions

WH: Western Hemisphere Division

CIA ash leaves joined dk grey.png