-
- Indirect Intelligence Activities:Â Additional categories for supporting activities and/or internal processes for use of information.
- Overt
- OPS: Policy Statements
Official or unofficial public pronouncements designed to assist and/or hinder adversarial intelligence services by clarifying or obscuring our own strategies and tactics.
- OPS: Counter-Intelligence
Activities to find and either incapacitate or make use of agents and surveillance systems operating on behalf of adversarial intelligence services.
- ANALYSIS: Linguistic Analysis
Activities to extract information from sources that are presented in other languages and/or have been corrupted during collection such that they are wholly or partially unintelligible.
- ANALYSIS: Cryptographic Analysis
Activities to extract information from sources that have been encrypted, coded, or otherwise treated to obscure the information. This is overt in the sense that there is no secret about what efforts are taking place, although of course the actual methods and information under analysis are closely guarded.
- ANALYSIS: Correlation, Validation, and Credibility Assessment
Activities to identify and correlate independent sources of information, assess the validity of information, and provide guidance to policy makers and to field agents as to the credibility of the sources and the information. This is overt in the sense that there is no secret about what efforts are taking place, although of course the actual methods and information under analysis are closely guarded.
- ANALYSIS: Data Fusion and Data Mining
Activities to combine disparate sources of intelligence data and to identify correlations and patterns not readily discernible from the raw data sources themselves. This is overt in the sense that there is no secret about what efforts are taking place, although of course the actual methods and information under analysis are closely guarded.
- ANALYSIS: Cryptography
Activities to create and improve methods for encrypting or coding information we wish to protect. This is overt in the sense that there is no secret about what efforts are taking place and in the sense that certain methods are made publicly available to protect commercial and low-security governmental information; the best techniques are, of course, closely guarded for use in our own high-security systems.
- OPS: Active Sabotage
Overt hostile activities (like bombing a factory), often involving the use of force, designed to eliminate or degrade some capability — typically military or economic — of an adversary.
- OPS: Active Intervention
Overt hostile activities, often involving the use of force, designed adversely to affect the political, economic, or social functioning of an adversary. Primarily this means acts of war or threats of war.
- Covert
- OPS: Misinformation
The provision of incorrect or misleading information to foreign intelligence services through their own overt and/or covert channels to confuse or deceive their analysts, agents, and policy makers.
- OPS: Passive Sabotage
The provision of incorrect or misleading information — particularly technical information — to foreign intelligence services through their own overt and/or covert channels to trick them into self-destructive actions.
- OPS: Active Sabotage
Covert hostile activities, often involving the use of force, designed to eliminate or degrade some capability — typically military or economic — of an adversary.
- OPS: Active Intervention
Covert hostile activities, often involving the use of force, designed adversely to affect the political, economic, or social functioning of an adversary. This includes, but is not limited to, assassinations, fomenting of rebellion, fomenting of social unrest, kidnapping, assaulting covert targets, and so on.