From Citizendium, the Citizens' Compendium
Auto-populated based on Special:WhatLinksHere/VENONA. Needs checking by a human.
- Clandestine human-source intelligence operational techniques : "Tradecraft" of espionage and activities supporting it, such as secret communication, document forgery, etc.
- Clandestine human-source intelligence : clandestine operations by people who secretly collect intelligence, and their support by couriers, forgers, radio operators, and other operational personnel.
- Cryptanalysis : The sub-field of cryptology which deals with breaking into existing codes and ciphers.
- Economic warfare : The use of principally non-military methods to impose national policy, when those methods deal in the broad sense of economics, such as embargoes, freezing assets, and buying up raw materials. It may be complemented by military means such as intercepting supply shipments or attacking factories.
- Federal Bureau of Investigation : The principal U.S. Federal police agency, part of the U.S. Department of Justice and the United States intelligence community, who has arrest authority, and is the primary authority for a variety of domestic crimes, civilian counterespionage within the United States, and organized crime
- Moral panic : A condition, episode, person or group of persons emerges to become defined as a threat to societal values and interests; its nature is presented in a stylized and stereotypical fashion by the mass media; the moral barricades are manned by editors, bishops, politicians and other right-thinking people; socially accredited experts pronounce their diagnosis and solutions; ways of coping are revolved or (more often) resorted to. Stanley Cohen
- National Security Agency : An organization within the United States Department of Defense, with the dual roles of the principal signals intelligence agency in the United States intelligence community, but also having the responsibility for information assurance of military, diplomatic, and other critical communications.
- One-time pad : A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word.
- SIGINT in the Second World War : Add brief definition or description
- Signals intelligence at the start of the Cold War : Signals intelligence technology and history between 1945 and 1954
- Stream cipher : A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step.