Matches in DBpedia 2015-10 for { <http://dbpedia.org/resource/Intelligence_cycle_security> ?p ?o }
Showing triples 1 to 79 of
79
with 100 triples per page.
- Intelligence_cycle_security abstract "This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy.National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:Their intelligence personnelTheir intelligence facilities and resourcesTheir intelligence operationsDefending the overall intelligence program, at a minimum, means taking actions to counter the major disciplines of intelligence collection techniques:Human Intelligence (HUMINT)Signals Intelligence (SIGINT)Imagery Intelligence (IMINT)Measurement and Signature Intelligence (MASINT)Technical Intelligence (TECHINT)Open Source Intelligence (OSINT)To these are added at least one complementary discipline, counterintelligence (CI) which, besides defending the six above, can itself produce positive intelligence. Much, but not all, of what it produces is from special cases of HUMINT.Also complementing intelligence collection are additional protective disciplines, which are unlikely to produce intelligence:Physical securityPersonnel securityCommunications security (COMSEC)Information system security (INFOSEC)Security classificationOperations security (OPSEC)These disciplines, along with CI, form intelligence cycle security, which, in turn, is part of intelligence cycle management. Disciplines involved in "positive security", or measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies a particular radio transmitter as one used only by a particular country, detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target.CI refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. Frank Wisner, a well-known CIA operations executive said of the autobiography of Director of Central Intelligence Allen W. Dulles, that Dulles "disposes of the popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition" Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services. In 1991 and 1995 US Army manuals dealing with counterintelligence, CI had a broader scope against the then-major intelligence collection disciplines. While MASINT was defined as a formal discipline in 1986, it was sufficiently specialized not to be discussed in general counterintelligence documents of the next few years.All US departments and agencies with intelligence functions are responsible for their own security abroad.In many governments, the responsibility for protecting intelligence and military services is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operation: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under the direction of James Jesus Angleton. Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. Aldrich Ames was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split.Some of the overarching CI tasks are described as Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission.Educating personnel in all fields of security. A component of this is the multidiscipline threat briefing. Briefings can and should be tailored, both in scope and classification level. Briefings could then be used to familiarize supported commands with the nature of the multidiscipline threat posed against the command or activity.↑ ↑ ↑ ↑ ↑ ↑ ↑".
- Intelligence_cycle_security wikiPageID "14103867".
- Intelligence_cycle_security wikiPageLength "34882".
- Intelligence_cycle_security wikiPageOutDegree "55".
- Intelligence_cycle_security wikiPageRevisionID "629872229".
- Intelligence_cycle_security wikiPageWikiLink Aldrich_Ames.
- Intelligence_cycle_security wikiPageWikiLink Allen_Dulles.
- Intelligence_cycle_security wikiPageWikiLink Allen_W._Dulles.
- Intelligence_cycle_security wikiPageWikiLink Andrew_Daulton_Lee.
- Intelligence_cycle_security wikiPageWikiLink Category:Counter-intelligence.
- Intelligence_cycle_security wikiPageWikiLink Category:Intelligence_analysis.
- Intelligence_cycle_security wikiPageWikiLink Category:Military_intelligence.
- Intelligence_cycle_security wikiPageWikiLink Category:Types_of_espionage.
- Intelligence_cycle_security wikiPageWikiLink Censorship.
- Intelligence_cycle_security wikiPageWikiLink Central_Intelligence_Agency.
- Intelligence_cycle_security wikiPageWikiLink Christopher_John_Boyce.
- Intelligence_cycle_security wikiPageWikiLink Classified_information_in_the_United_Kingdom.
- Intelligence_cycle_security wikiPageWikiLink Communications_security.
- Intelligence_cycle_security wikiPageWikiLink Counterintelligence.
- Intelligence_cycle_security wikiPageWikiLink Counterintelligence_failures.
- Intelligence_cycle_security wikiPageWikiLink DA-Notice.
- Intelligence_cycle_security wikiPageWikiLink Electronic_attack.
- Intelligence_cycle_security wikiPageWikiLink Electronic_countermeasure.
- Intelligence_cycle_security wikiPageWikiLink Encryption.
- Intelligence_cycle_security wikiPageWikiLink Frank_Wisner.
- Intelligence_cycle_security wikiPageWikiLink HUMINT.
- Intelligence_cycle_security wikiPageWikiLink Human_intelligence_(intelligence_gathering).
- Intelligence_cycle_security wikiPageWikiLink IMINT.
- Intelligence_cycle_security wikiPageWikiLink Imagery_intelligence.
- Intelligence_cycle_security wikiPageWikiLink Intelligence_(information_gathering).
- Intelligence_cycle_security wikiPageWikiLink Intelligence_assessment.
- Intelligence_cycle_security wikiPageWikiLink Intelligence_cycle_management.
- Intelligence_cycle_security wikiPageWikiLink James_Jesus_Angleton.
- Intelligence_cycle_security wikiPageWikiLink KGB.
- Intelligence_cycle_security wikiPageWikiLink MASINT.
- Intelligence_cycle_security wikiPageWikiLink MI5.
- Intelligence_cycle_security wikiPageWikiLink Measurement_and_signature_intelligence.
- Intelligence_cycle_security wikiPageWikiLink National_Reconnaissance_Office.
- Intelligence_cycle_security wikiPageWikiLink OPSEC.
- Intelligence_cycle_security wikiPageWikiLink OSINT.
- Intelligence_cycle_security wikiPageWikiLink Open-source_intelligence.
- Intelligence_cycle_security wikiPageWikiLink Operation_RAFTER.
- Intelligence_cycle_security wikiPageWikiLink Operations_security.
- Intelligence_cycle_security wikiPageWikiLink Peter_Wright.
- Intelligence_cycle_security wikiPageWikiLink Physical_security.
- Intelligence_cycle_security wikiPageWikiLink Security_clearance.
- Intelligence_cycle_security wikiPageWikiLink Signals_intelligence.
- Intelligence_cycle_security wikiPageWikiLink Spycatcher.
- Intelligence_cycle_security wikiPageWikiLink TECHINT.
- Intelligence_cycle_security wikiPageWikiLink TEMPEST.
- Intelligence_cycle_security wikiPageWikiLink TRW_Inc..
- Intelligence_cycle_security wikiPageWikiLink Technical_intelligence.
- Intelligence_cycle_security wikiPageWikiLink Tempest_(codename).
- Intelligence_cycle_security wikiPageWikiLink Threat_assessment.
- Intelligence_cycle_security wikiPageWikiLink Traffic_analysis.
- Intelligence_cycle_security wikiPageWikiLink Traffic_flow_security.
- Intelligence_cycle_security wikiPageWikiLink US_Department_of_Defense.
- Intelligence_cycle_security wikiPageWikiLink United_States_Department_of_Defense.
- Intelligence_cycle_security wikiPageWikiLinkText "Intelligence cycle security".
- Intelligence_cycle_security wikiPageWikiLinkText "Personnel security".
- Intelligence_cycle_security wikiPageWikiLinkText "communications security monitoring".
- Intelligence_cycle_security wikiPageWikiLinkText "intelligence cycle security".
- Intelligence_cycle_security hasPhotoCollection Intelligence_cycle_security.
- Intelligence_cycle_security wikiPageUsesTemplate Template:Harv.
- Intelligence_cycle_security wikiPageUsesTemplate Template:Intelligence_cycle_management.
- Intelligence_cycle_security wikiPageUsesTemplate Template:Reflist.
- Intelligence_cycle_security subject Category:Counter-intelligence.
- Intelligence_cycle_security subject Category:Intelligence_analysis.
- Intelligence_cycle_security subject Category:Military_intelligence.
- Intelligence_cycle_security subject Category:Types_of_espionage.
- Intelligence_cycle_security hypernym Part.
- Intelligence_cycle_security type Communication.
- Intelligence_cycle_security comment "This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy.National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends.".
- Intelligence_cycle_security label "Intelligence cycle security".
- Intelligence_cycle_security sameAs m.03ctsjm.
- Intelligence_cycle_security sameAs Q6043953.
- Intelligence_cycle_security sameAs Q6043953.
- Intelligence_cycle_security wasDerivedFrom Intelligence_cycle_security?oldid=629872229.
- Intelligence_cycle_security isPrimaryTopicOf Intelligence_cycle_security.