The author and publisher have provided this e-book to you for your personal use only. You may not make this e-book publicly available in any way. Copyright infringement is against the law. If you believe the copy of this e-book you are reading infringes on the authors copyright, please notify the publisher at:
us.macmillanusa.com/piracy.
John A. Belton
Active measures | Operations to influence or otherwise affect other nations policies |
AFR | Automatic fingerprint recognition |
ANC | African National Congress |
ANO | Abu Nidal Organization |
AI | Artificial intelligence |
AL | Specialist unit operating under deep cover in the United States |
Aman | Israeli military intelligence |
ASU | Active service terrorist unit |
AWACS | Airborne warning and control aircraft |
Babbler | Counterbugging device |
Backstopping | Fake identification papers |
Base | Permanent station in foreign country |
Bat leveyha | Female assistant agent |
Better world | Euphemism for killing enemy agent; similarly, to send a person on vacation means to injure him/herthe extent of the injury depends on whether the vacation is to be brief or long |
Bioleverage | Euphemism for blackmailliterally, the use of derogatory information to coerce someone |
Blind dating | Meeting place chosen by a contact to meet his controller |
Blow-back | Fake stories fed to foreign news media |
BND | Bundesnachrichtendienst, German Federal Intelligence Service, concerned with both foreign and domestic intelligence |
Bodel | A courier |
Bug | Electronic device for hearing and recording |
Burn | An agent deliberately sacrificed in order to protect a more valuable spy |
BW | Biological weapons |
Case death | Operation that fails for no obvious reason |
Case officer | In charge of field agents |
CAT | Computer-aided tomography |
Chamfering | Technique for opening sealed mail |
CIA | Central Intelligence Agency |
CIO | Central Imagery Office |
CIS | Commonwealth of Independent States |
Cold approach | Attempt to recruit a foreign national |
Comint | Acronym for communications intelligence |
Cover | Identity assumed by intelligence officer when abroad |
Cultivation | Establishing rapport with a source of information |
CW | Chemical weapons |
Daylight | Highest form of alert |
DCI | Director of Central Intelligence Agency |
DEA | Drug Enforcement Administration |
DI | Directorate of Intelligence |
DIA | Defense Intelligence Agency |
Diamond | Communications unit |
DO | Directorate of Operations |
Dry cleaning | Various techniques to avoid surveillance |
ECM | Electronic countermeasures |
EDP | Electronic data processing |
Elint | Electronic intelligence intercepted from radar, satellites |
Exfiltrate | Removing an agent from hostile country |
FACES | Facial Analysis Comparison and Elimination System |
False flagging | Recruiting a person who believes he or she will be working for another country or interest |
Fumigate | Sweeping an area for electronic bugs |
Go-away | Prearranged signal not to make contact at previously arranged rendezvous |
Grinder | Debriefing room, also used to interrogate suspects |
Honey trap | Sexual entrapment for intelligence purposes |
Humint | Intelligence gathered by agents in the field |
IDA | Intelligence database |
IED | Improvised explosive device |
IFF | Identification, friend or foe |
II | Image identification |
Institute | Formal name of MossadInstitute for Intelligence and Special Operations; originally called Institute for Coordination |
IR | Infrared |
ISA | Intelligence support activity |
JIC | Joint Intelligence Center |