DOCUMENT
CI Glossary
1153 definitions by Office of the Director of National Intelligence, and Office of the Director of National Intelligence, National Counterintelligence and Security Center

2XAbductionAbortAccessAccess AgentAccommodation AddressAcknowledged SAPAcquisition Systems Protection (ASP)Actionable IntelligenceAdaptive Planning and Execution (APEX)Adaptive Planning (AP)Ad-Hoc Requirement (AHR)Administrative Control (ADCON)Advanced Persistent Threat (APT)AdversaryAdverse InformationAdvisory TaskingAgentAgent HandlerAgent NetAgent of a Foreign EntityAgent of InfluenceAir Force Office of Special Investigations (AFOSI)AliasAllianceAll-SourceAll-Source AnalysisAll-Source IntelligenceAlternative Compensatory Control Measures (ACCM)AmbassadorÉmigréAnalysisAnalysis and ProductionAnalysis of Competing Hypothesis (ACH)Analysis ReportAnalytic TradecraftAnomaliesAnomalous ActivityAnomaly-Based DetectionAntiterrorism (AT)ApportionmentApprehensionArmed Forces Courier ServiceA-SpaceAssassinationAssessmentAssetAsset ValidationAssignAssumptionAsymmetric ThreatAttachAttachéAuthenticateAuthenticationAuthenticatorBackground Investigation (BI)BackstopBackstoppingBasic IntelligenceBattlespaceBattlespace AwarenessBeaconBehavioral Science ConsultantBigot CaseBigot ListBilateral/BILAT OperationBilateral CollectionBiometricBiometricsBiometrics-Enabled IntelligenceBlackBlack Bag JobBlack ListBona FidesBorder CrosserBotnetBrevity CodeBrief EncounterBrush ContactBrush PassBugBuggedBurnedBurn NoticeCampaignCampaign PlanCampaign PlanningCapability GapCarbonsCar Pick-UpCar TossCarve-OutCaseCase Officer (C/O)CasingCatastrophic EventCaveatCellCenter (British Spelling: Centre)Center of Gravity (COG)Central Intelligence Agency (CIA)Chain of CustodyChairman’s Guidance (CG)ChanceryChief of Mission (CoM)Chief of Station (CoS)Choke PointCipherCipher PadCivil AuthoritiesCivil DisturbanceCivilian InterneeClandestineClandestine CollectionClandestine Intelligence CollectionClandestine OperationClassificationClassified InformationClassified Information Procedures Act (CIPA)Clean PhoneClearanceCoalitionCodeCode WordCold PitchCollaborating Analytical Center (CAC)CollateralCollectionCollection AssetCollection EmphasisCollection EmphasisCollection Management Authority (CMA)Collection Management (CM)Collection ManagerCollection Operations Management (COM)Collection PlanCollection PlanningCollection RequirementCollection Requirements Management (CRM)Collection ResourceCollection Source EvaluationCollection Support BriefCollection Support Brief (CSB)CollectorCombatant CommandCombatant CommanderCombating Terrorism (CbT)Combat IntelligenceCombat Support Agency (CSA)Combat Support Agency (CSA)Command and Control (C2)Command Counterintelligence Coordinating Authority (CCICA)Commander's Critical Information Requirement (CCIR)Committee of Foreign Investment in the United States (CFIUS)Common Operational Picture (COP)Communications Intelligence (COMINT)Communications Security (COMSEC)Communications Security MonitoringCommunity Acquisition Risk Center (CARC)Community On-Line Intelligence System for End-Users and Managers (COLISEUM)CompartmentationCompartmented IntelligenceComplaint-Type InvestigationCompromiseCompromisedCompromising EmanationsComputer ForensicsComputer IntrusionComputer Intrusion DetectionComputer Network Attack (CNA)Computer Network Defense (CND)Computer Network Exploitation (CNE)Computer Network Operations (CNO)Computer Security (COMUSEC)Computer TrespasserComputer VirusConcealed MonitoringConcealment Device (CD)Concept of Intelligence OperationsConcept of Operations (CONOPS)Concept Plan (CONPLAN)Confidential SourceCongressional Intelligence CommitteesConsensual MonitoringConsequence Management (CM)ConstraintContact Report (CR)Continental United States (CONUS)ContingencyContingency PlanningContingency Planning Guidance (CPG)ControlControlled Counterintelligence ActivitiesControlled InformationControlled SourceControlled Source Operation (CSO)Controlled Technical Services (CTS)Controlled Unclassified Information (CUI)Cooperative ContactCo-Opted Worker or Co-OpteeCoordinating AuthorityCoordinationCounterdeceptionCounterespionageCounterguerrilla OperationsCounterinsurgency (COIN)Counterintelligence ActivitiesCounterintelligence Activities in CyberspaceCounterintelligence AnalysisCounterintelligence Analysis and Production Council (CIAPC)Counterintelligence Analysis and Production ElementCounterintelligence Analysis ReportCounterintelligence Analytical ProductCounterintelligence AssessmentCounterintelligence AwarenessCounterintelligence Awareness ProductsCounterintelligence (CI)Counterintelligence CollectionCounterintelligence Collection in CyberspaceCounterintelligence Collection OperationsCounterintelligence Controlled Source Operation (CI CSO)Counterintelligence Coordinating Authority (CICA)Counterintelligence Cyber InvestigationCounterintelligence Effects-Based Operations (CI EBO)Counterintelligence Enhancement Act of 2002Counterintelligence FlagsCounterintelligence Functional ServicesCounterintelligence Functional Support Plan (CI FSP)Counterintelligence FunctionsCounterintelligence InquiryCounterintelligence Insider ThreatCounterintelligence InvestigationCounterintelligence MissionCounterintelligence Mission ManagerCounterintelligence Missions (aka CI Mission Areas)Counterintelligence Mission Tasking Authority (CI MTA)Counterintelligence Operational Concept/ProposalCounterintelligence Operational Lead (CIOL)Counterintelligence Operational Tasking Authority (CIOTA)Counterintelligence OperationsCounterintelligence ProductionCounterintelligence Recruitment Lead (CIRL)Counterintelligence Scope Polygraph (CI Scope Poly)Counterintelligence Special AgentCounterintelligence Staff Officer (CISO)Counterintelligence SupportCounterintelligence Support Plan (CISP)Counterintelligence Support to HUMINTCounterintelligence Technical Services (CITS)Counterintelligence TrainingCountermeasureCountermeasuresCounterproliferation (CP)Counter Surveillance (Also Countersurveillance)Counterterrorism (CT)Counter Threat Finance (CTF)Country ClearanceCountry TeamCourierCoverCover for ActionCover for StatusCover LegendCover StopCover StoryCover Support ActivitiesCovertCovert ActionCovert Communication (COVCOM)Covert OperationCredentialsCredibility AssessmentCredible InformationCriminal Intelligence (CRIMINT)Criminal InvestigationCriminal Investigation Task Force (CITF)CrisisCrisis Action Planning (CAP)CRITICCritical AssetCritical InformationCritical InfrastructureCritical Infrastructure Protection (CIP)Critical IntelligenceCritical Program Information (CPI)Critical TechnologyCross-cuingCryptanalysisCryptographyCryptologyCueingCultural IntelligenceCurrent IntelligenceCustodial InterviewCutoutCyberCyber CounterintelligenceCyber EspionageCyber IncidentCyber Intrusion Damage AssessmentCyber PersonaCyber PowerCyber Security (or Cybersecurity)CyberspaceCyberspace DomainCyberspace OperationsCyber-TerrorismCyber Threat InvestigationDamage AssessmentDamage to the National SecurityDanger SignalsDangleDatabaseData MiningDead DropDebriefingDebriefing OperationsDecentralized ExecutionDeceptionDeception ChannelDeception MeansDeception TargetDeclaredDeclassificationDeconflictionDecoyDeductionDeep CoverDefectionDefectorDefense Attaché Office (DAO)Defense Central Index of Investigations (DCII)Defense Counterintelligence and Human Intelligence Center (DCHC)Defense Counterintelligence and Human Intelligence Enterprise (DCHE)Defense Counterintelligence ComponentsDefense Counterintelligence Knowledge Base (DCIKB)Defense Counterintelligence ManagerDefense Criminal Investigative Organizations (DCIOs)Defense Criminal Investigative Service (DCIS)Defense Critical Asset (DCA)Defense Critical Infrastructure (DCI)Defense Critical Infrastructure Program (DCIP)Defense HUMINT EnterpriseDefense HUMINT ExecutorDefense HUMINT ManagerDefense Industrial Base (DIB)Defense Industrial Security Clearance Office (DISCO)Defense IntelligenceDefense Intelligence Agency (DIA)Defense Intelligence Analysis Program (DIAP)Defense Intelligence ComponentsDefense Intelligence Operations Coordination Center (DIOCC)Defense Personnel Security Research Center (PERSEREC)Defense Planning Guidance (DPG)Defense SectorsDefense Security Service (DSS)Deliberate CompromiseDelimitations AgreementDenialDenied AreaDenied Area TradecraftDepartmental IntelligenceDepartment of Defense Intelligence Information System (DoDIIS)Department of Defense Intelligence ProductionDepartment of Homeland Security (DHS) / Directorate of Information Analysis and Infrastructure ProtectionDepartment of State / Bureau of Diplomatic Security (DS)Department of State / Bureau of Intelligence and Research (INR)Department of Treasury / Office of Terrorism and Financial IntelligenceDerogatory InformationDesired PerceptionDetaineeDetectionDeterrenceDevil’s AdvocacyDigital EvidenceDigital ForensicsDigital TradecraftDigraph and/or TrigraphDiplomatic and/or Consular FacilityDirect AccessDirect Liaison Authorized (DIRLAUTH)Director Defense Intelligence AgencyDirector of National Intelligence (DNI)Direct Support (DS)Disaffected PersonDiscardsDisguiseDisinformationDisseminationDissemination and IntegrationDoctrineDocument and Media Exploitation (DOMEX)Document Exploitation (DOCEX)DoD Components with Organic CIDoD Criminal Investigative OrganizationsDoD InstallationDoD Personnel Travel ClearanceDoD Unknown SubjectDomestic ActivitiesDomestic IntelligenceDomestic TerrorismDossierDouble AgentDry CleanDry CleaningDual AgentDynamic Threat Assessment (DTA)Educing Information (EI)EffectEffects-Based Operations (EBO)eGuardianElectronic SurveillanceElectronic Tracking DeviceElements of EspionageElicitation (Intelligence)Enabling ActivitiesEncipherEnd StateEnemy Combatant (EC)Equipment Exploitation OperationsEspionageEspionage ActEssential Elements of Information (EEI)Essential SecrecyEssential TaskEstimative IntelligenceEvaluatingEvaluation and FeedbackEvidenceExecute Order (EXORD)Executive AgentExfiltrationExpeditionary IntelligenceEyewashFabricatorFalse FlagFalse-Flag ApproachFalse-Flag RecruitmentFederal Bureau of Investigation (FBI)Federal Polygraph ExaminerFeedbackFinancial Crimes Enforcement Network (FINCEN)FindingFIVE EYES (FVEY)Five Ws (also known as the Five Ws and one H)Flag OfficerFlaps and SealsForce MultiplierForce Protection Detachment (FPD)Force Protection (FP)Foreign Agents Registration Act (FARA)Foreign Computer IntrusionForeign ContactForeign Denial & DeceptionForeign Denial & Deception Committee (FDDC)Foreign Instrumentation Signals Intelligence (FISINT)Foreign Intelligence AgentForeign Intelligence and Security Service (FISS)Foreign Intelligence Collection ThreatForeign Intelligence Entity (FIE)Foreign Intelligence (FI)Foreign Intelligence LiaisonForeign Intelligence OfficerForeign Intelligence Service (FIS)Foreign Intelligence Surveillance Act (FISA)Foreign Liaison Officer (FLO)Foreign Material Acquisition (FMA)Foreign Material Exploitation (FME)Foreign Military Intelligence Collection Activities (FORMICA)Foreign NationalForeign Ownership, Control or Influence (FOCI)Foreign PowerForeign Service National (FSN)Foreign Terrorist Tracking Task Force (FTTTF)Foreign Visits System (FVS)FOUR EYES (ACGU)Full-Spectrum Counterintelligence ActivitiesFunctional ManagersFunctional Support [Analytical Product]Functional Support Plan (FSP)FusionGeneral Defense Intelligence Program (GDIP)General Support (GS)Geospatial InformationGeospatial Information and Services (GI&S)Geospatial Intelligence (GEOINT)Ghost SurveillanceGlobal Force Management (GFM)Global Information Grid (GIG)Global Positioning System (GPS)Goldwater-Nichols Act (GNA)Gray ListGraymailGRUHackerHacktivismHandlerHard TargetHarmonyHello NumberHeuristicsHigh-Payoff Target (HPT)High-Value Detainee Interrogation Group (HIG)High-Value Target (HVT)HOCNetHomelandHomeland Defense (HD)Homeland SecurityHomeland Security InformationHoney PotHoney TrapHorizontal IntegrationHorizontal Protection AnalysisHost CountryHostileHostile ActHostile EnvironmentHostile IntentHost Nation (HN)Host-Nation Support (HNS)House Permanent Select Committee on Intelligence (HPSCI)Human Derived Information (HDI)Human Enabled Information (HEI)Human FactorsHuman Intelligence (HUMINT)Human SourceHuman Source Contact Operations (SCO)HUMINT Collection ActivitiesHUMINT Collection Requirement (HCR)HUMINT Collection Team (HCT)HUMINT CollectorHUMINT EnablingHUMINT Operations Cell (HOC)HUMINT SourceHUMINT Support Element (HSE)HUMINT TargetingHUMINT TasksHybrid ThreatsIC E-mailIIR EvaluationIllegalIllegal NetIllegal ResidencyIllegal Support OfficerImageryImagery ExploitationImagery Intelligence (IMINT)Impersonal CommunicationImplied TaskImprovised Explosive Device (IED)Inadvertent DisclosureIndicationsIndications and Warning (I&W)IndicatorIndirect AccessIndoctrination (or Read-On)Induced DefectionInduced OperationInductionIndustrial SecurityIn ExtremisInfiltrateInfiltrationInformantInformationInformation Assurance (IA)Information EnvironmentInformation Operations (IO)Information RequirementsInformation Security (INFOSEC)Information SuperiorityInitial Contact Point (ICP)InsiderInsider ThreatInsurgencyIntegrated Defense Source Registration System (IDSRS)INTELINKINTELINK-SIntelligenceIntelligence ActivitiesIntelligence CollectionIntelligence Collection ActivitiesIntelligence Collection PlanIntelligence CollectorIntelligence Community Directives (ICDs)Intelligence Community (IC)Intelligence Contingency Funds (ICF)Intelligence CycleIntelligence DisciplineIntelligence EstimateIntelligence FederationIntelligence GapIntelligence Information NeedIntelligence Information Report (IIR)Intelligence InterrogationIntelligence InterviewingIntelligence LiaisonIntelligence Officer (IO)Intelligence OperationsIntelligence PlanningIntelligence Planning ProcessIntelligence Preparation of the Battlespace (IPB)Intelligence ProcessIntelligence ProcessingIntelligence ProductIntelligence ProductionIntelligence ReachIntelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)Intelligence-Related ActivitiesIntelligence ReportingIntelligence Report (INTREP)Intelligence RequirementIntelligence SourceIntelligence Sources and MethodsIntelligence, Surveillance, and Reconnaissance (ISR)Intelligence Task List (ITL)Intelligence ThreatInteragencyInteragency CoordinationInterdictionInterdictionIntergovernmental Organization (IGO)Internal SecurityInternational TerrorismInternational Terrorist ActivitiesINTERPOLInterpretationInterrogationInterviewIntrusionInvestigationInvestigative Analysis ReportInvestigative JurisdictionInvestigative LeadInvestigative Plan (IP)Investigative Source EvaluationInvestigative Support PackageIrregular WarfareJ-2XJack-in-the-Box (JIB)JihadJihadistJointJoint Captured Materiel Exploitation Center (JCMEC)Joint Counterintelligence Unit (JCIU)Joint DoctrineJoint Document Exploitation Center (JDEC)Joint ForceJoint IntelligenceJoint Intelligence Operations Center (JIOC)Joint Intelligence Preparation of the Operational Environment (JIPOE)Joint Intelligence Support Element (JISE)Joint Intelligence Task Force-Combating Terrorism (JITF-CT)Joint Intelligence Training (JIT)Joint Inter-Agency Cyber Task Force (JIACTF)Joint Interrogation and Debriefing Center (JIDC)Joint Interrogation Operations (JIO)Joint InvestigationJoint Operational PlanningJoint Operation Planning and Execution System (JOPES)Joint Operation Planning Process (JOPP)Joint OperationsJoint Personnel Adjudication System (JPAS)Joint Personnel Recovery Center (JPRC)Joint Strategic Capabilities Plan (JSCP)Joint Strategic Exploitation Center (JSEC)Joint Task Force (JTF)Joint Terrorism Task Forces (JTTFs)Joint Worldwide Intelligence Communications System (JWICS)J-SpaceJudgmentKey EnablerKnowledgeKnowledgeability Brief (KB)Knowledge ManagementLaser Intelligence (LASINT)LaunderingLaw EnforcementLaw Enforcement Agency (LEA)Law Enforcement OfficerLaw of WarLeadLead AgencyLead Federal Agency (LFA)Legal Attaché (LEGAT)Legal ResidencyLegal TravelerLegendLiaisonLiaison OperationsLight Cover (AKA Shallow Cover)Line of OperationsLinkLink AnalysisListening PostLoadLoad SignalLocal Agency Check (LAC)Logic BombLow Visibility OperationsMail CoverMake (AKA Made)Malicious CodeMalwareManipulationMaritime DomainMeasurement and Signature Intelligence (MASINT)Measures of Effectiveness (MOE)Media ExploitationMI5MI6MICEMicrodotMikratMilitarily Critical Technologies List (MCTL)Military Counterintelligence Collection (MCC)Military Deception (MILDEC)Military Department (MILDEP)Military Information Support Operations (MISO)Military Intelligence Board (MIB)Military Intelligence (MI)Military Intelligence Program (MIP)Military ServiceMilitary Source OperationsMisdirectionMisperceptionMissionMission AssuranceMission ManagerMission NeedMission StatementMitigationModus Operandi (MO)MoleMole HuntMotivationMultilateral CollectionMultilateral OFCOMultilevel Security (MLS)MultinationalMultinational Force (MNF)Multinational OperationsName TraceNarco-TerrorismNational Agency Check (NAC)National Capital Region (NCR)National Clandestine Service (NCS)National Counterintelligence Executive (NCIX)National Counterproliferation Center (NCPC)National Counterterrorism Center (NCTC)National Critical Infrastructure and Key AssetsNational Defense Strategy (NDS)National Detainee Reporting Center (NDRC)National Disclosure Policy CommitteeNational Disclosure Policy (NDP-1)National EmergencyNational Foreign Intelligence ProgramNational Geospatial-Intelligence Agency (NGA)National HUMINT Collection Directive (NHCD)National HUMINT Requirements Tasking Center (NHRTC)National Industrial Security Program (NISP)National IntelligenceNational Intelligence BoardNational Intelligence Coordination Center (NIC-C)National Intelligence Council (NIC)National Intelligence Estimate (NIE)National Intelligence Priorities Framework (NIPF)National Intelligence Program (NIP)National Intelligence StrategyNational Intelligence Support Plan (NISP)National Joint Terrorism Task Force (NJTTF)National Media Exploitation Center (NMEC)National Military Strategy (NMS)National PolicyNational Reconnaissance Office (NRO)National SecurityNational Security ActNational Security Agency (NSA)National Security Branch (NSB)National Security Council Intelligence Directive (NSCID)National Security Council (NSC)National Security CrimesNational Security Division (NSD)National Security EmergencyNational Security Information (NSI)National Security Letter (NSL)National Security Strategy (NSS)National Special Security Event (NSSE)National Threat Identification and Prioritization Assessment (NTIPA)National Virtual Translation Center (NVTC)Naval Criminal Investigative Service (NCIS)Near Real TimeNeed-to-KnowNet-CentricNetwork Operations (NetOps)NicknameNon Attributable Internet AccessNoncustodial InterviewNongovernmental Organization (NGO)Non-Official Cover (NOC)Non-Permissive EnvironmentNon-State Sponsored TerrorismNon-Title 50 (NT50)Notice of Intelligence Potential (NIP)NotionalNotorious IndividualNuclear Intelligence (NUCINT)Offensive Counterintelligence Operation (OFCO)Offensive Cyber OperationsOffice of the National Counterintelligence Executive (ONCIX)Official InformationOne-Time Pad (OTP)One-Time SourceOne-Way Radio Link (OWRL)One-Way Voice Link (OWVL)OpenOpen Source AcquisitionOpen Source Center (OSC)Open Source InformationOpen-Source Intelligence (OSINT)Operational Analysis ReportOperational Asset EvaluationOperational Control (OPCON)Operational EnvironmentOperational IntelligenceOperational Interest (OI)Operational Level of WarOperational ProposalOperational Support PackageOperational TestingOperation Order (OPORD)Operation Plan (OPLAN)Operations Officer (CIA)Operations Security (OPSEC)Operations Security VulnerabilityOperations Support Element (OSE)OPSEC ProcessOrganized Cyber Intruders/AttackersOther Government Agency (OGA)OvertOvert CollectionOvert [HUMINT] OperationsOvert OperationParamilitary ForcesParolePATRIOT ActPatternsPeace Building (PB)Peace EnforcementPeacekeepingPeacemakingPeace Operations (PO)PenetrationPenetration OperationPen RegisterPermissive EnvironmentPersistent ConflictPersistent SurveillancePersonal Meeting (PM)Persona Non Grata (PNG)Personnel SecurityPersonnel Security Investigation (PSI)PhishingPhysical SearchPhysical SecurityPhysical Security InvestigationPhysical SurveillancePiracyPitchPlacementPlacement and AccessPlanned TargetPlanningPlanning and DirectionPlanning Order (PLANORD)PlantPlanted InformationPlatformPlausible DeniabilityPlausible DenialPocket LitterPolitical IntelligencePolygraph ExaminationPorticoPort SecurityPositive IntelligencePosse Comitatus ActPreliminary InquiryPreparation of the Environment (PE)Preventive DeploymentPreventive DiplomacyPriority Intelligence Requirement (PIR)Prisoner of War (POW or PW)Probable CauseProbeProcessing and ExploitationProductionProduction RequirementProliferationProminent IndividualPropagandaProtectionProvocationPseudonymPublic Affairs (PA)Public DiplomacyPublic InformationPublicly Available InformationQuit ClaimRabbitRadar Intelligence (RADINT)RadiogramReachbackReactive OperationReal TimeReasonable BeliefRecognition SignalRecords CheckRecovery OperationsRecruitmentRecruitment CycleRecruitment-in-Place (RIP)Red TeamRed Team AnalysisRefugeeRegional Security Officer (RSO)RemediationRenditionRepatriateRepatriationReportable IncidentRequest For Assistance (RFA)Request For Information (RFI)ResidencyResistance MovementResponsible Analytical Center (RAC)RestraintRestricted AreaRestricted TargetRestricted Target List (RTL)ReturneeRevolutionRiskRisk AssessmentRisk Management (RM)Rolling Car PickupRule of the Least Intrusive MeansRules of Engagement (ROE)RuseSabotageSafe HouseSanction EnforcementSanitizationSanitizeScattered CastlesScientific and Technical Intelligence (S&TI)Scientific MethodScreeningSearchSearch WarrantSECRET Internet Protocol Router Network (SIPRNet)Secret Writing (SW)Section 811 ReferralSecuritySecurity ClassificationSecurity ClearanceSecurity Countermeasures (SCM)Security DetaineeSecurity In-DepthSecurity OrganizationsSecurity ServiceSeditionSeizureSenate Select Committee on Intelligence (SSCI)Senior Defense Official / Defense Attaché (SDO/DATT)SensitiveSensitive Compartmented Information Facility (SCIF)Sensitive Compartmented Information (SCI)Sensitive InformationSensitive SiteSensitive Sources and MethodsShapeShort-Range Agent Communication (SRAC)Signal FlagsSignalsSignal SecuritySignals Intelligence (SIGINT)Signal SiteSignaturesSilver TriangleSingle Scope Background Investigation (SSBI)SingletonSite ExploitationSituational AwarenessSituation Report (SITREP)SleeperSociocultural FactorsSourceSource-Directed RequirementSource Directed Requirement (SDR)Source ManagementSource RegistrySource ValidationSpecial Access Program Central Office (SAPCO)Special Access Program (SAP)Special ActionsSpecial Area ClearanceSpecial Collection TechniquesSpecial eventSpecial Information Operations (SIO)Special Investigative Inquiry (SII)Special Limiting Criteria (SLC)Special Mission Unit (SMU)Special Operations (SO)Special Reconnaissance (SR)Specific Intelligence Collection Requirement (SICR)Specified TaskSpotSpotterSpotter / AssessorSpotter / Assessor OperationSpySpyingSpywareStability OperationsStaff Judge Advocate (SJA)Star-Burst ManeuverState-Directed TerrorismState-Supported TerrorismStationStatus of Forces Agreement (SOFA)SteganographyStrategic CommunicationStrategic DebriefingStrategic IntelligenceStrategic Level of WarStrategic Planning Guidance (SPG)StrategySubversionSubversion of Department of Defense personnelSubversive ActivitySupplier AssuranceSupply ChainSupply Chain RiskSupply Chain Risk Management (SCRM)Supply Chain VulnerabilitiesSupport AssetSupported CommanderSupporting CommanderSurreptitious EntrySurveillanceSurveillance DetectionSurveillance Detection Route (SDR)Suspicious ActivitySuspicious Activity Report (SAR)SynchronizationSynthesisSystem AssuranceTactical Control (TACON)Tactical IntelligenceTactical Intelligence and Related Activities (TIARA)Tactical Level of WarTactical Questioning (TQ)TagTargetTarget Audience (TA)Target FolderTargetingTarget IntelligenceTask Force Counterintelligence Coordinating Authority (TFCICA)TaskingTear LineTearline ReportingTechnical Intelligence (TECHINT)Technical PenetrationTechnical SecurityTechnical SurveillanceTechnical Surveillance Countermeasures (TSCM)Technical Surveillance DeviceTechnical Threat AnalysisTechnology Targeting Risk Assessment (TTRA)TempestTerrorismTerrorism [the federal crime]Terrorism Threat AssessmentTerroristTerrorist ExtremistTerrorist GroupTerrorists with Global Reach – Transnational TerroristsTheaterTheater ClearanceTheater of WarTheater StrategyThird Agency RuleThreatThreat AdvisoryThreat AnalysisThreat AssessmentThreat FinanceThreats to the National SecurityThreat WarningTime-Sensitive Collection Requirement (TSCR)Tosses (Hand, Vehicular)TradecraftTradecraft - AnalyticalTransnational ThreatTrap and TraceTreasonTrojan HorseTwo-Person IntegrityTwo-Person RuleUnacknowledged SAPUnauthorized DisclosureUncertaintyUnconventional Warfare (UW)UndeclaredUnderstandUnified ActionUnified Command Plan (UCP)Uniform Code of Military Justice (UCMJ)Unilateral OperationUnity of EffortUnknown Subject (UNSUB)Unlawful Enemy CombatantUnload SignalUnsolicited CorrespondenceUnwittingU.S. Coast Guard (USCG)U.S. HomelandU.S. NationalU.S. PersonValidationVehicle-Borne Improvised Explosive Device (VBIED)VENONAVettingVirusVolunteerVulnerabilityVulnerability AnalysisVulnerability Assessment (VA)Vulnerability StudyWaived SAPWalk-InWarningWeapons of Mass Destruction (WMD)White ListWindow DressingWittingWormsWrite for Maximum Utility (WMU)Write-to-Release (WTR)Zombie
Loading conversations.