Skip to content

Restructuring Intelligence Services

    • Indirect Intelligence Activities:  Additional categories for supporting activities and/or internal processes for use of information.
      • Overt
        • OPS: Policy Statements
          Official or unofficial public pronouncements designed to assist and/or hinder adversarial intelligence services by clarifying or obscuring our own strategies and tactics.
        • OPS: Counter-Intelligence
          Activities to find and either incapacitate or make use of agents and surveillance systems operating on behalf of adversarial intelligence services.
        • ANALYSIS: Linguistic Analysis
          Activities to extract information from sources that are presented in other languages and/or have been corrupted during collection such that they are wholly or partially unintelligible.
        • ANALYSIS: Cryptographic Analysis
          Activities to extract information from sources that have been encrypted, coded, or otherwise treated to obscure the information. This is overt in the sense that there is no secret about what efforts are taking place, although of course the actual methods and information under analysis are closely guarded.
        • ANALYSIS: Correlation, Validation, and Credibility Assessment
          Activities to identify and correlate independent sources of information, assess the validity of information, and provide guidance to policy makers and to field agents as to the credibility of the sources and the information. This is overt in the sense that there is no secret about what efforts are taking place, although of course the actual methods and information under analysis are closely guarded.
        • ANALYSIS: Data Fusion and Data Mining
          Activities to combine disparate sources of intelligence data and to identify correlations and patterns not readily discernible from the raw data sources themselves. This is overt in the sense that there is no secret about what efforts are taking place, although of course the actual methods and information under analysis are closely guarded.
        • ANALYSIS: Cryptography
          Activities to create and improve methods for encrypting or coding information we wish to protect. This is overt in the sense that there is no secret about what efforts are taking place and in the sense that certain methods are made publicly available to protect commercial and low-security governmental information; the best techniques are, of course, closely guarded for use in our own high-security systems.
        • OPS: Active Sabotage
          Overt hostile activities (like bombing a factory), often involving the use of force, designed to eliminate or degrade some capability — typically military or economic — of an adversary.
        • OPS: Active Intervention
          Overt hostile activities, often involving the use of force, designed adversely to affect the political, economic, or social functioning of an adversary. Primarily this means acts of war or threats of war.
      • Covert
        • OPS: Misinformation
          The provision of incorrect or misleading information to foreign intelligence services through their own overt and/or covert channels to confuse or deceive their analysts, agents, and policy makers.
        • OPS: Passive Sabotage
          The provision of incorrect or misleading information — particularly technical information — to foreign intelligence services through their own overt and/or covert channels to trick them into self-destructive actions.
        • OPS: Active Sabotage
          Covert hostile activities, often involving the use of force, designed to eliminate or degrade some capability — typically military or economic — of an adversary.
        • OPS: Active Intervention
          Covert hostile activities, often involving the use of force, designed adversely to affect the political, economic, or social functioning of an adversary. This includes, but is not limited to, assassinations, fomenting of rebellion, fomenting of social unrest, kidnapping, assaulting covert targets, and so on.

Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Leave a Reply