Clandestine operation/Related Articles
< Clandestine operationJump to navigation Jump to search
- See also changes related to Clandestine operation, or pages that link to Clandestine operation or to this page or whose text .
Auto-populated based on Special:WhatLinksHere/Clandestine operation. Needs checking by a human.
- Clandestine cell system : A method for organizing a group in such a way that it can more effectively resist penetration by an opposing organization.
- Clandestine human-source intelligence and covert action : Intelligence and military special operations functions that either should be completely secret (i.e., clandestine: the existence of which is not known outside the relevant government circles), or simply cannot be linked to the sponsor (i.e., covert: it is known that sabotage is taking place, but its sponsor is unknown).
- Clandestine human-source intelligence : clandestine operations by people who secretly collect intelligence, and their support by couriers, forgers, radio operators, and other operational personnel.
- Diplomacy (foreign policy) : The process of negotiations, among nations, usually by accredited representatives of a government. While the details of the negotiations may not be public information, the fact of the diplomatic negotiations is official and acknowledged
- Director of National Intelligence : The professional head of the United States Intelligence Community, reporting to the President, with Dennis Blair being replaced by James Clapper
- Economic warfare : The use of principally non-military methods to impose national policy, when those methods deal in the broad sense of economics, such as embargoes, freezing assets, and buying up raw materials. It may be complemented by military means such as intercepting supply shipments or attacking factories.
- Executive Order 13224 : The basic ruling by George W. Bush authorizing the seizure of financial assets associated with terrorism
- False flag : In a variety of situations ranging from clandestine human-source intelligence to fraud to counterintelligence to false flag interrogation techniques, a manipulative technique where the manipulator leads others to believe he is the representative of a group they either admire or fear, in order to secure a benefit for his own cause, symbolically represented by a national flag
- Federal Bureau of Investigation : The principal U.S. Federal police agency, part of the U.S. Department of Justice and the United States intelligence community, who has arrest authority, and is the primary authority for a variety of domestic crimes, civilian counterespionage within the United States, and organized crime
- Financial intelligence : Collecting information on financial transactions (either from the financial institution or by clandestine means) and then analyzing it to determine providers and consumers of money or money equivalents
- Freedom of Information Act : A piece of legislation that enables individuals and groups to demand that the government review designated information that is being withheld from public release.
- Human-source intelligence : (HUMINT); the practice of acquiring information through interactions with people who can disclose relevant information, including but not limited to espionage, interrogation, debriefing and elicitation
- Intelligence (disambiguation) : Add brief definition or description
- Intelligence Preparation of the Battlespace : "An analytical methodology employed to reduce uncertainties concerning the enemy, environment, and terrain for all types of operations. Intelligence preparation of the battlespace builds an extensive database for each potential area in which a unit may be required to operate. The database is then analyzed in detail to determine the impact of the enemy, environment, and terrain on operations and presents it in graphic form. Intelligence preparation of the battlespace is a continuing process. Also called IPB." (Joint Chiefs of Staff)
- Intelligence analysis : Techniques, independent of the subject matter, for correlating multiple kinds of information, hypothesizing meaning from the set of data available, and, with incomplete information, validating the hypotheses
- Intelligence collection management : Assigning questions to various collection techniques, reflecting the techniques available and the priority of the information need. Includes the process of categorizing information learned for subsequent analysis, and assigning probabilities of accuracy to the raw information
- Intelligence cycle management : The continuous process by which intelligence priorities are set, raw information collected, information analyzed, the processed information disseminated, and the next set or priorities set.
- Iraq War : Invasion of Iraq by a coalition of countries, led by the United States, in 2003, and subsequent occupation
- Joint Chiefs of Staff : The staff committee of the most senior members of the U.S. military services, charged with policy advice, doctrinal development, and preparedness rather than operational control of forces
- Laser designator : A device that puts a distinctive, usually invisible, pattern of laser energy on an object, for purposes such as designating the target of a laser-guided bomb
- Operational Preparation of the Battlespace : Non-intelligence activities conducted prior to D-Day, H-Hour, in likely or potential areas of employment, to train and prepare for follow-on military operations (United States Special Operations Command)
- Operational Preparation of the Environment : Clandestine operations of the U.S. Department of Defense that can fall into Intelligence Preparation of the Battlespace or Operational Preparation of the Battlespace, but are of sufficient sensitivity that if they were conducted by the Central Intelligence Agency, the Congressional leadership would need to be informed
- Order of battle intelligence : A subset of intelligence analysis, which produces information on the organization, strength and deployment of an opposing force. Its basic principles are common to all forms of military forces, conventional and clandestine, but the methods of collection and analysis differ for different target organizations.
- Phishing : Add brief definition or description
- Richard Sorge : Add brief definition or description
- Safehouse : Add brief definition or description
- Secret Intelligence Service : Add brief definition or description
- Special operations : Add brief definition or description
- Special reconnaissance : Add brief definition or description
- State : Add brief definition or description
- Terrorism and U.S. Intelligence : Add brief definition or description
- Transnational spillover from insurgency : Add brief definition or description
- U.S. intelligence involvement with World War II Japanese war criminals : Add brief definition or description
- U.S. intelligence involvement with World War II Nazi war criminals : Add brief definition or description
- U.S. intelligence involvement with World War II war criminals : Add brief definition or description
- Unconventional warfare (United States doctrine) : Add brief definition or description
- Unified Combatant Command : Add brief definition or description
- United States intelligence community : Add brief definition or description
- Wadi al Aqiq : Add brief definition or description
- War on terror : Add brief definition or description