RESOURCES // LEXICON
GLOSSARY
Intelligence derived from the collection and processing of acoustic phenomena, such as underwater sonar signatures.
The employment of limited offensive action to deny a contested area to the enemy.
Offensive operations designed to influence world events through disinformation, front organizations, or subversion.
The process of simulating the behavior and decision-making of an opponent to predict future actions.
An individual used to covertly influence target-audience attitudes or government policy in favor of a foreign power.
A recruit who remains in their position of authority within a target government to provide ongoing intelligence.
A security measure ensuring a secure computer network is physically isolated from unsecured networks like the internet.
An analytical approach that synthesizes data from every available collection discipline to produce a comprehensive assessment.
A formal agreement between two or more nations to cooperate for specific purposes.
A method used to determine if a suspected mole is passing information by providing them with unique, traceable data.
An eight-step methodology requiring analysts to identify all feasible explanations and systematically disprove them.
The concept that the international system lacks a central governing authority to enforce rules.
Originally the 1938 union of Austria/Germany; now used to describe forced territorial annexation.
Strategies and technologies (A2/AD) used to prevent an adversary from occupying or traversing an area of land, sea, or air.
The tendency to perceive meaningful patterns within random data; a common risk in intelligence analysis and conflict assessment.
A method of dispute resolution where the parties agree to be bound by the decision of a third-party arbitrator.
A formal agreement between warring parties to stop fighting, though not necessarily a permanent peace treaty.
The process used to determine the reliability and truthfulness of a human source.
A policy of making concessions to an aggressor to avoid conflict.
Conflict between actors whose relative military power or strategy differs significantly.
A strategic concept where a party attempts to win a war by wearing down the enemy to the point of collapse.
A policy of economic self-sufficiency to eliminate reliance on external trade.
An unofficial and often clandestine communication link between governments or organizations.
A covert method of bypassing normal authentication in a cryptography system or algorithm.
The provision of physical and digital evidence (e.g., social media, employment records) to support an operative’s legend.
A surreptitious entry into a location to steal or photograph documents or install surveillance.
A state of equilibrium where no single nation is strong enough to dominate all others.
A state of stability between two powers that both possess nuclear weapons.
The fragmentation of a larger region or state into smaller, often hostile units.
When a state aligns with a stronger adversarial power and concedes to their influence.
A global infrastructure development strategy adopted by the Chinese government.
Procedures intended to protect humans or animals against disease or harmful biological agents.
A global system dominated by two primary superpowers (e.g., the Cold War).
An operation involving breaking and entering for intelligence purposes, usually involving high risk.
An unpredictable event that is beyond what is normally expected and has potentially severe consequences.
Unintended consequences of a covert operation that affect the country that initiated the operation.
A military term for “friendly fire” incidents where one’s own forces are accidentally targeted.
A maritime force capable of operating globally, across the deep waters of open oceans.
Documentary or situational evidence of an individual’s identity or intent.
The time required for a state to produce enough weapons-grade material for a nuclear explosive.
The practice of pushing a dangerous situation to the absolute verge of disaster to force an opponent to concede.
A naval force designed for operations in riverine or littoral environments, close to the shore.
A brief, momentary contact between two individuals to pass information or items without stopping.
A neutral country situated between two larger, potentially hostile powers to prevent direct conflict.
The distribution of financial and military costs of maintaining an alliance among its members.
A specialized container for classified documents awaiting destruction by pulping or incineration.
When a covert operative or asset’s true identity or affiliation is compromised.
A high-profile example of “moles” within British intelligence who provided secrets to the Soviet Union.
The imposition of a very brutal peace by completely crushing the enemy.
A staff employee of an intelligence agency who manages agents and assets.
A temporary suspension of active hostilities, often localized, to allow for humanitarian aid or negotiations.
The chronological documentation that records the sequence of custody, control, and transfer of evidence.
The senior intelligence officer in a foreign country, typically overseeing all regional operations.
A narrow geographical feature (like a strait) that can be easily blocked to disrupt traffic.
An algorithm for performing encryption or decryption.
The relationship between the civil society and the military organization within a state.
Information collected by clandestine means that is not otherwise available.
An activity conducted in a way that the operation itself remains secret.
The use of threats or limited force to persuade an opponent to stop or undo an action.
Systematic errors in thinking that affect the decisions and judgments people make.
A series of covert and controversial domestic surveillance projects conducted by the FBI.
Relative peace where relations are maintained but characterized by mutual suspicion.
An approach to a potential asset for recruitment without a prior relationship.
Any death, injury, or other damage inflicted that is an incidental result of a military activity.
A systematic process to ensure that all requirements are addressed by the available INTs.
A specific priority for information gathering set by policy makers.
A system in which a group of nations acts as one to preserve the peace of all.
The exercise of authority and direction by a commander over assigned forces to accomplish a mission.
Technical and intelligence information derived from intercepting foreign communications.
Limiting access to sensitive information to the smallest circle with a specific “need to know”.
A cryptographic key that is no longer secure, necessitating the immediate revocation of communications.
Measures taken to deny unauthorized persons information derived from telecommunications.
The systematic process of identifying the actors, issues, and dynamics of a conflict for intervention points.
A situation where a person or organization is involved in multiple interests that could corrupt motivation.
A theory claiming significant aspects of international relations are socially/historically constructed.
A strategic policy aimed at preventing the expansion of a hostile power.
Military or political action taken against the activities of guerrillas or revolutionaries.
Activities intended to identify, exploit, or neutralize foreign intelligence services.
A false persona or organization used to conceal the true identity of an intelligence officer.
Operation designed to influence conditions abroad where the sponsor’s identity is concealed.
Assets, systems, and networks so vital that their incapacitation would have a debilitating effect on security.
An element of a system whose disruption or destruction would immediately degrade the system’s ability to function.
The study of methods for obtaining the meaning of encrypted information without the key.
A mechanism or person used to create a barrier between an intelligence officer and an agent.
An intermediate server or digital “hop” used to mask the true origin of a cyber operation.
The use of computer networks to gain illicit access to confidential information held by a government or organization.
The study of how digital infrastructure and cyber capabilities influence territorial power.
The use of computer technology to disrupt the activities of a state or organization.
The collection and analysis of information derived from cyberspace to characterize adversary capabilities.
An agent who deliberately identifies themselves to a foreign service to be recruited.
Systematic tracking of unindexed portions of the internet to identify leaked credentials.
The process of integrating multiple data sources to produce more consistent and useful information.
Disarmament, Demobilization, and Reintegration: A process to transition ex-combatants into civilian life.
The process of ensuring that different operations or agencies do not interfere with one another.
A pre-arranged location used to exchange items without a physical meeting.
A technique used to detect if one is being followed by observing reflections.
Extending excessive credit to a nation with the intent of extracting concessions upon default.
A geographic place or critical factor that allows commanders to gain a marked advantage.
The deliberate reduction of economic interdependence between two major powers.
An operative whose identity is masked so they have no overt connection to their home agency.
A video or audio recording that has been replaced using AI to appear as someone else.
Colloquial term for permanent bureaucracy that persists regardless of political leadership changes.
An individual who repudiates their country in favor of an opponent, providing intelligence.
An information assurance strategy that provides multiple, redundant defensive layers.
Theory suggesting the international system encourages states to maintain a balance of power.
A formal diplomatic representation of a government’s official position to a foreign official.
An area in which treaties or agreements between nations forbid military installations.
Measures designed to mislead an adversary’s intelligence analysis.
The easing of strained relations, especially in a political situation.
The use of threats to dissuade an adversary from taking a specific action.
Acronym for Diplomatic, Informational, Military, and Economic elements of power.
Legal immunity ensuring diplomats are not susceptible to lawsuit in host countries.
A formal acknowledgment by a country that another entity possesses the attributes of statehood.
A technical procedure used to determine the bearing of a radio transmitter.
False information intended to mislead, especially propaganda issued by a government organization.
The distribution of intelligence products to the consumers/policy makers.
The requirement that belligerents at all times distinguish between civilians and combatants.
An agent who is working for two intelligence services simultaneously.
A situation where a negotiator must satisfy both international and domestic stakeholders.
A rehearsal of a clandestine operation without actually performing the final action.
An environment in which a person encounters only beliefs or opinions that coincide with their own.
Intelligence regarding foreign economic resources, activities, and policies.
Technical intelligence derived from foreign non-communications electromagnetic radiations (e.g., radar).
Military action involving the use of electromagnetic energy to control the spectrum or attack the enemy.
A technique to acquire information through conversation without the subject realizing it.
The set of required conditions that defines the achievement of objectives and the conclusion of an operation.
The association between national security and the availability of natural resources for energy.
An informal alliance between states.
A conceptual framework illustrating levels of intensity from tension to total war.
A third-party arrangement for holding materials or keys.
The act of obtaining secret information without the permission of the holder.
Standardized terminology used in products to convey the degree of confidence (e.g., “Highly Likely”).
A sea zone (200 nm) over which a state has special rights regarding marine resources.
The process of clandestinely removing personnel or data from a hostile environment.
The clandestine extraction of large data sets from a hardened network.
Growth whose rate becomes ever more rapid in proportion to the growing total size.
The state of being exempted from the jurisdiction of local law.
A distribution marker indicating the document must be read only by the named recipient.
A state whose political/economic system has become so weak the government is no longer in control.
A covert operation designed to deceive such that activities appear carried out by other entities.
Recruiting an asset by leading them to believe they are working for a different organization.
An enclosure used to block electromagnetic fields, preventing wireless signal interception.
The part of the intelligence cycle where consumers provide critiques on intelligence.
Any group of people who undermine a larger group from within, usually in favor of an external enemy.
The gathering of information about the financial affairs of entities of interest.
The final analytical product derived from raw data, evaluated for the user.
A game that has a definite beginning and end, played for the purpose of winning.
The process by which a powerful state makes a smaller neighbor refrain from opposing its policy.
The ability to launch a surprise nuclear attack that destroys an opponent’s retaliation.
A place, event, or time at which violence or hostility flares up.
A factor that gives personnel or weapons the ability to accomplish greater things than without it.
Maintaining military forces in distant regions to show commitment and react quickly.
Prioritizing supply chain networks with allies to minimize geopolitical risk.
An entity that appears independent but is controlled by an intelligence service.
A situation where active armed conflict has ended, but no peace treaty or political resolution is reached.
Intelligence on a specific topic, such as narcotics, terrorism, or proliferation.
A collaborative effort of agencies to provide resources to detect, prevent, and respond to threats.
The study of mathematical models of strategic interaction among rational decision-makers.
The use of trade, investment, or sanctions to influence the sovereign decisions of a state.
Intelligence derived from the exploitation and analysis of imagery and geospatial information.
The German school of geopolitics that influenced Nazi expansionism.
A subfield focusing on the strategic management of geographic resources and locations.
A term used to describe a hybrid warfare strategy involving military, technological, and cultural tactics.
A condensed version of an intelligence report that retains the essential meaning.
A “Stay-Behind” network established by NATO for resistance operations in Europe.
Resource domains that do not fall under the jurisdiction of any one nation (e.g., high seas).
An offer by a third party to facilitate communication between disputing parties without participating.
Data that has been assigned a level of reliability and credibility.
A state’s long-term sovereign plan to use all resources to achieve its goals.
The 19th-century strategic rivalry between the British and Russian Empires in Central Asia.
The practice of making decisions as a group in a way that discourages creativity or responsibility.
Irregular warfare in which small groups use mobile, hit-and-run tactics.
The management of an agent by a case officer.
Globally traded currency that serves as a reliable and stable store of value.
The use of military and economic might to influence or coerce other political bodies.
The process of securing a system by reducing its surface of vulnerability.
The central part of a region, especially one that is politically or economically important.
Hypothesis suggesting whoever controls Eastern Europe and Central Asia commands the world.
The idea that the international system is stable when a single nation-state is dominant.
The political, economic, or military predominance of one state over others.
A trap involving romantic or sexual entrapment to compromise a target.
A network of “honeypots” designed to invite and monitor adversary intrusion attempts.
An intelligence organization of a country considered an adversary.
An emerging paradigm for understanding global vulnerabilities challenging traditional national security.
Information gathered through interpersonal contact, including espionage or debriefings.
A military strategy employing political warfare and blending conventional, irregular, and cyber tactics.
A state that dominates all other states in every domain (military, economic, cultural).
Someone who is forced to flee their home but remains within their country’s borders.
An intelligence officer operating in a foreign country without diplomatic cover.
The motivation (money, ideology, coercion, ego) used to recruit an agent.
Information reflecting the intention of an adversary to adopt a course of action.
A piece of information which reflects the intention or capability of an adversary to adopt a course.
A systematic approach to identifying specific events that signal an adversary’s transition.
The practice of placing an operative within a target organization.
Employment of electronic warfare, cyber ops, PSYOP, deception, and OPSEC.
The process of removing sensitive metadata from digital files before transmission.
Operational advantage derived from the ability to collect and disseminate an uninterrupted flow of info.
An organized rebellion aimed at overthrowing a constituted government through subversion and conflict.
A finished intelligence product that includes an evaluation of implications.
The group of government agencies and organizations that conduct intelligence activities.
The process of ensuring that intelligence activities are conducted in accordance with law.
A collaborative wiki used by intelligence communities to share data across agencies.
The acquisition of a signal or communication by a third party.
A guided ballistic missile with a minimum range of 5,500 kilometers.
A relationship between countries in which they rely on each other for resources or stability.
The systematic questioning of an individual to obtain information.
A political movement seeking to reclaim territory considered “lost” from a nation’s past.
A policy of remaining apart from the affairs or interests of other countries.
Military operations conducted by forces of two or more military departments.
The set of criteria that must be consulted before engaging in war.
The law that governs the way in which warfare is conducted.
A doctrine of military ethics to ensure a war is morally justifiable.
A systematic process to target and engage an adversary to create desired effects.
A euphemism for active warfare involving lethal force.
The degree to which an asset has access to the information required.
The ability of a nation to exert influence or control over land.
A country that does not have a direct outlet to an ocean or sea.
The use of legal systems and international law as a substitute for traditional military means.
The practice of integrating data from multiple INTs to verify a high-value target’s activity.
A fabricated biography for a deep-cover operative.
A relationship between two intelligence services for the exchange of information.
Foreign policy doctrine arguing international organizations should intervene for liberal objectives.
A conflict in which the belligerents do not expend all of the resources at their disposal.
A route that connects an operating military unit with its supply base.
A facility designed to intercept electronic signals.
The part of a sea, lake, or ocean that is close to the shore.
The essential supplies and services necessary to maintain military operations.
Political-military confrontation below conventional war and above peaceful competition.
An asset who provides information of limited value or has limited access.
Narrow international waterways that, if blocked, can paralyze global trade.
The ability of a nation to exert influence or control over the sea.
Intelligence that identifies the distinctive characteristics of dynamic source objects.
A Russian military doctrine of deception, including camouflage, denial, and disinformation.
A process where a neutral third party helps disputing states reach a voluntary agreement.
An economic policy designed to maximize exports and minimize imports.
The examination of “data about data” (e.g., timestamps) to uncover patterns.
A photograph reduced to the size of a dot to be hidden in plain sight.
Principle permitting measures necessary for legitimate military purposes not otherwise prohibited.
Analytical error of assuming an adversary acts in the same way the analyst would.
False or inaccurate information that is spread, regardless of an intention to deceive.
The gradual expansion of an objective of a mission or organization beyond its original goals.
An agent who achieves a high position long before they begin active espionage.
A US policy opposing European colonialism in the Americas.
The principle of participation by several countries in a given policy or action.
A distribution of power in which more than two states have nearly equal influence.
The belief that appeasement of aggressors only leads to further aggression.
Doctrine where full-scale use of nuclear weapons would cause annihilation of both sides.
The process of constructing a national identity using state power to promote social harmony.
A sovereign state whose citizens are relatively homogeneous in language or descent.
A country’s goals and ambitions, whether economic, military, or cultural.
A term used by Russia to refer to the former Soviet republics.
A criterion used in security to limit access to sensitive information.
Information confirming that a specific event or capability does not exist.
A theory of international relations that says power is the most important factor.
A comparative analysis of military, economic, and political capabilities of contending nations.
Doctrine seeking to translate information advantage into advantage through robust networking.
A slang term for an operative specialized in nocturnal surreptitious entries.
A forum of 120 developing world states not formally aligned with major power blocs.
A person who is not engaged in fighting, specifically civilians, medical personnel, or chaplains.
An operative who lacks diplomatic immunity and works under a private-sector guise.
An individual or organization with significant influence but not allied to a country.
An international treaty whose objective is to prevent the spread of nuclear weapons.
Force structure consisting of land missiles, submarines, and strategic aircraft.
A structural theory suggesting that states are power maximizers who seek hegemony.
Strategy where a power uses regional allies to check potentially hostile powers.
Encryption technique that cannot be cracked, requiring a key of the same length as the message.
A centralized hub for the collection and analysis of OSINT.
The use of creative thinking by commanders to design strategies and campaigns.
A composite of the conditions and influences that affect the employment of capabilities.
Information that could lead to recruitment of an agent or initiation of an operation.
Process that identifies critical info to see if friendly actions can be observed by adversaries.
Strategic competition for dominance in Earth’s orbits, focusing on satellite positioning.
The identification, command structure, and disposition of personnel and equipment of a force.
Intelligence derived from publicly available sources like news or academic journals.
Treaty prohibiting weapons of mass destruction in orbit.
The ability to strike or monitor from a long distance without a permanent local presence.
The collection and analysis of data related to global health threats and outbreaks.
A nation-state considered to be an outcast in the international community.
The routine behavior of a target used to identify anomalies or vulnerabilities.
The use of military force to compel compliance with resolutions intended to restore peace.
The active maintenance of a truce between nations or communities.
A diplomatic legal status used to expel a foreign official suspected of espionage.
A method of using fraudulent communications to gain access to sensitive data.
A nation with a strategic location that allows it to affect the balance of power.
Ability of senior officials to deny knowledge of, or responsibility for, a covert action.
A person invested with the full power of independent action on behalf of their government.
Any of the various ways in which power is distributed within the international system.
A device used to measure physiological responses to determine veracity.
The capacity of a state to deploy and sustain forces in dispersed locations.
An action taken to prevent a perceived incoming threat before it manifests.
A surprise attack launched with the objective of anticipating an opponent’s attack.
A state’s pursuit of clear preeminence in the international system.
Information used to promote a political cause or point of view.
Principle that incidental loss of life must not be excessive relative to military advantage.
An emergency governmental authority set up to manage a political transition.
A conflict instigated by a major power which does not itself become involved.
A conflict instigated by major powers using third parties as substitutes for direct fighting.
Operations to convey selected info to foreign audiences to influence behavior.
Actions intended to reduce an opponent’s morale or mental resistance.
A traitor who collaborates with an enemy force occupying their country.
Process by which an individual or group comes to adopt increasingly extreme political ideals.
An establishment or resumption of harmonious relations between previously hostile states.
Unevaluated data that has not yet been subjected to the analytical process.
A system of politics based on practical and material factors rather than moral premises.
The process of enlisting an individual to work for an intelligence service.
A figurative boundary which, if crossed by an adversary, will result in pre-declared consequences.
The practice of viewing a problem from an adversary’s perspective to find vulnerabilities.
Use of an independent group to challenge assumptions by simulating an adversary’s thought process.
A state that dominates its surrounding geographic region.
Paradox that countries with abundant natural resources tend to have less economic growth.
Conflicts caused by a desire to gain control over natural resources.
Commitment holding that states must protect populations from mass atrocities.
A state whose objective is to change or end the current international system.
Theory that domination of the coastal fringes of Eurasia provides the base for world conquest.
Directives among military forces that define the conditions in which force may be applied.
A shared commitment by countries to conduct activities in accordance with agreed-upon rules.
A country that provides a secure base for an organization or individual.
A secure location used for clandestine meetings or as an operative residence.
A series of small actions that accumulate to produce a much larger result.
Commercial and financial penalties applied against a state, group, or individual.
A place where a non-state actor can operate with relative safety from state interference.
Removing sensitive sources/methods from a report so it can be shared more widely.
A cognitive bias where an analyst settles for the first explanation rather than evaluating all data.
The primary maritime routes between ports used for trade, logistics, and naval forces.
Situation in which actions by a state to heighten its security lead other states to respond.
A conflict that is fought behind the scenes, often through proxies or covert operations.
Regions characterized by persistent internal fragmentation and involvement by competing powers.
Negotiations conducted by a mediator who travels back and forth between parties.
The interception of electronic signals, including COMINT and ELINT.
The ratio of useful, actionable intelligence to irrelevant or redundant data.
A component of COMSEC focused on the protection of signals.
The perception of environmental elements and events with respect to time or space.
A group of operatives who remain inactive in a target country until ordered to act.
Psychological manipulation of individuals into divulging confidential information.
The ability to influence others through culture, political values, and foreign policy.
The risk that a foreign central bank or government will default on its debt obligations.
The full right and power of a governing body over itself without outside interference.
A spatial region over which a state or organization has exclusivity.
Government support of violent non-state actors engaged in terrorism.
A state that seeks to maintain the current distribution of power and international norms.
The ability of a state to pursue national interests without being constrained by others.
The purposeful use of communication by an organization to fulfill its mission.
The physical distance between a nation’s borders and its core heartland.
Elements (e.g., Lithium) essential for defense technology, used as geopolitical leverage.
Intelligence regarding the threat of an adversary’s initiation of hostilities.
Theory regarding the network of Chinese military/commercial facilities along sea lanes.
High-level diplomatic meetings between heads of state designed to resolve major issues.
Phenomenon where a nation is reluctant to abandon a strategy because of heavy investment.
The capacity of a state to ensure critical goods flow without reliance on adversaries.
The state of having power or influence that transcends national boundaries.
In conflict, when two opponents use similar tactics and technology.
Intelligence required for the planning and execution of tactical operations.
A collaborative approach where all INTs contribute to a shared model of the target.
The process of selecting and prioritizing targets and matching the appropriate response.
Techniques to detect and neutralize electronic eavesdropping devices.
TEMPEST is a codename under the U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.
The five stages (Planning, Collection, Processing, Analysis, Dissemination) of intel production.
Protocol where a service cannot share intelligence with a “third” party without originator consent.
An apparent tendency towards war when an emerging power threatens an existing hegemon.
A war that is unrestricted in terms of weapons, combatants, or objectives pursued.
Unofficial, non-governmental, and informal contacts between citizens of adversarial nations.
The study of patterns, frequency, and volume of communications, rather than content.
Range of processes associated with attempts to come to terms with a legacy of abuses.
Designation for signals intel obtained by breaking high-level WWII German ciphers.
A secret organization working to overthrow a government or an occupying power.
A distribution of power in which one state exercises most of the influence.
An aircraft without a human pilot on board, commonly known as a drone.
Combat conducted in urban areas such as towns and cities.
A state that is subordinate to another.
The specific path or method an adversary uses to gain access to a system or asset.
A long-term program that decrypted Soviet communications, revealing espionage networks.
A formal evaluation of the points where a system or organization can be attacked.
The process of discrediting an assessment after new data proves the initial conclusion false.
A person who voluntarily offers services to an agency without prior contact.
A tool for exploring consequences of strategic decisions in a simulated environment.
A prolonged period of conflict during which each side seeks to gradually wear out the other.
Use of global financial systems (e.g., SWIFT) to impose costs on adversarial states.
The use of information to cause harm or to achieve a political objective.
The principle of international law that each state has exclusive sovereignty over its territory.
The combined landmass of Europe, Asia, and Africa in Mackinder’s theory.
A software vulnerability unknown to those who should be interested in mitigating it.
A situation in which one person’s gain is equivalent to another’s loss.