Difference between revisions of "Spooks Portal"

From Powerbase
Jump to: navigation, search
(Wanted pages)
(Elements of intelligence)
Line 70: Line 70:
 
<!---------------------------Categories------------------------>
 
<!---------------------------Categories------------------------>
 
|-
 
|-
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Spooks</h2>
+
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">The Elements of Intelligence</h2>
Text needed here
+
Despite the secrecy which surrounds intelligence agencies, the general nature of their activities is well-known, being based on practices that are thousands of years old. Each of the four main intelligence disciplines present profound issues for democratic societies.
  
 
<!---------------------------Research------------------------>
 
<!---------------------------Research------------------------>
 
|-
 
|-
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Issues</h2>
+
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Intelligence collection</h2>
 
|-
 
|-
 
|style="color:#000;"|
 
|style="color:#000;"|
Text needed here
+
*[[Human intelligence]]: The age old practice in which intelligence officers recruit agents with access to information: e.g [[Robert Hanssen]], [[Jonathan Pollard]].
 +
*[[Paper mill]]: A source which fabricates or embellishes intelligence for pecuniary advantage. e.g allegedly [[Laura Montini]].
 +
*[[Double agent]]: an agent who is secretly working for a rival agency, e.g. [[Kim Philby]], allegedly [[Ahmad Chalabi]]
 +
*[[Defector]]: A source who flees rather than remains in place, and whose intelligence, as opposed to propaganda value, therefore tends to diminish over time, e.g. [[Anatoliy Golitsyn]], [[Yuri Nosenko]], [[Oleg Gordievsky]].
 +
*[[Technical intelligence]]: Includes techniques such as [[Imagery intelligence]] obtained from aerial or satellite reconnaissance and [[Signals intelligence]] such as the intereception of communications engaged in by the US [[National Security Agency]] and Britain's [[GCHQ]].
 +
*[[Open source collection]] Intelligence from overt sources such as media and diplomatic reports.
 +
|-
 +
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Intelligence analysis</h2>
 +
|-
 +
|style="color:#000;"|
 +
*[[Technical analysis]]: includes techniques such as photo interpretation and code-breaking.
 +
*[[Competitive analyis]]: System advocated by neoconservative theorists, in which multiple centres are encouraged to put forward competing interpretations of raw intelligence data. Their opponents argue that this allows analysis to become politicised, e.g. [[Team B]], [[Rumsfeld Commission]], [[Office of Special Plans]].
 +
|-
 +
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Counterintelligence</h2>
 +
|-
 +
|style="color:#000;"|
 +
*[[Classification]]: Categorisation of information according to its sensitivity, e.g. secret, top secret.
 +
*[[Security]] Measures taken to obstruct hostile intelligence services such as personnel vetting and physical security.
 +
*[[Counterespionage]]: Measures designed to actively frustrate a hostile intelligence service, such as surveillance and collection of intelligence on agents.
 +
*[[Offensive counterintelligence]] Attempting to turn one's opponent's intelligence operations to one's own advantage, e.g. [[Operation Double-Cross]].
 +
*[[Deception]]: Operations designed to mislead an opponent's intelligence analysis, e.g. [[Operation Fortitude]]
 +
*[[Feedback]]: Intelligence indicating whether a deception has successfully influenced an opponents analysis.
 +
|-
 +
! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Covert action</h2>
 +
|-
 +
|style="color:#000;"|
 +
[[Covert action]] is a term of art used by the American intelligence community to describe "the attempt by a government or group to influence events in another state or territory without revealing its own involvement."<ref>Dirty Tricks or Trump Cards, by Roy Godson, Transaction Books, 2001, p.3.</ref> Similar terms include the British [[Special Political Action]] or [[Political warfare]] and the Russian [[aktivnye merpriiatiia]] or [[active measures]].
 +
*[[Intelligence support]] and [[Intelligence liason]] may be means of exercising covert influence, e.g. [[British Security Cooperation]] in the US during the Second World War.
 +
*[[unilateral penetration]]: Spying on a friendly intelligence agency, sometimes conducted to assure the strength of the relationship.
 +
*[[Agents of influence]] Individuals with whom an agency maintains a secret relationship so that they will be in a position to influence policy immediately or in the future.
 +
*[[Front groups]] Organisations secretly created or aided by an agency to pursue its objectives, e.g. [[Congress for Cultural Freedom]].
 +
*[[White propaganda]]:Overt propaganda carried out openly on behlaf of its sponsor, e.g. the activities of the [[United States Information Agency]] or the [[British Council]].
 +
*[[Grey propaganda]]: Thinly disguised propaganda which is deniable but which may be seen for what it is by sophisticated observers. The output of [[Encounter]] magazine might be considered an example.
 +
*[[Black propaganda]]: Propaganda whose source is heavily concealed and which may also be [[disinformation]], false information designed to mislead. Methods of dissemination include rumour and forgery.
 +
*[[Paramilitary operations]]: Examples include US support for Cuban exiles at the [[Bay of Pigs]], the [[Contras]] and the Afghan Mujahideen.
 +
*[[Assassination]]: Examples include the Russian-sponsored murder of [[Leon Trotsky], [[CIA]] attempts on the life of [[Fidel Castro]] and British attempts to kill [[Gamal Abdel Nasser]].
 +
*[[Special Forces]]: Covert deployments of special forces include for example, British operations in Yemen in the 1960s.
 +
*[[Coup d'etat]]: Facilitating the overthrow of a government,e.g. the US and British-supported Iranian coup of 1953, [[Operation Ajax]].
  
 
<!---------------------------Recent Articles on SpinWatch------------------------>
 
<!---------------------------Recent Articles on SpinWatch------------------------>

Revision as of 03:29, 12 November 2008

Welcome to the Spooks Portal on Spinprofiles

Welcome to the Spooks Portal on Spinprofiles—your guide to networks of power, lobbying and deceptive PR. This portal focuses on Intelligence agencies and their activities.

Theorists have traditionally divided the activities of the world's spies into four areas: intelligence collection, intelligence analysis, counterintelligence and covert action. The last of these covers covers a wide range of political interventions, from propaganda and disinformation, through support for front groups to terrorism and guerrilla warfare.

Major Intelligence Agencies

Main page: List of intelligence agencies

Spinprofiles has a policy of strict referencing and is overseen by an Managing editor and a Sysop and several Associate Portal editors. The Editor of the Spooks Portal is Tom Griffin.

Priority pages on Spooks and Intelligence


Historical

See more...

The Elements of Intelligence

Despite the secrecy which surrounds intelligence agencies, the general nature of their activities is well-known, being based on practices that are thousands of years old. Each of the four main intelligence disciplines present profound issues for democratic societies.

Intelligence collection

Intelligence analysis

Counterintelligence

  • Classification: Categorisation of information according to its sensitivity, e.g. secret, top secret.
  • Security Measures taken to obstruct hostile intelligence services such as personnel vetting and physical security.
  • Counterespionage: Measures designed to actively frustrate a hostile intelligence service, such as surveillance and collection of intelligence on agents.
  • Offensive counterintelligence Attempting to turn one's opponent's intelligence operations to one's own advantage, e.g. Operation Double-Cross.
  • Deception: Operations designed to mislead an opponent's intelligence analysis, e.g. Operation Fortitude
  • Feedback: Intelligence indicating whether a deception has successfully influenced an opponents analysis.

Covert action

Covert action is a term of art used by the American intelligence community to describe "the attempt by a government or group to influence events in another state or territory without revealing its own involvement."[1] Similar terms include the British Special Political Action or Political warfare and the Russian aktivnye merpriiatiia or active measures.

Recent Articles on SpinWatch

Rss Propaganda

Categories

There are a list of categories associated with this page:


New pages on Spinprofiles

<DynamicArticleList>

 title=Newest Pages
 type=new
 count=10

</DynamicArticleList>

<DynamicArticleList>

 title=Recently Updated Articles
 type=update
 count=10

</DynamicArticleList>

References and Resources

Text needed here

Getting Started

Looking for somewhere to start?

To learn how you can edit any article right now, visit Spinprofiles:About, Welcome, newcomers, our Help page, Frequently Asked Questions, A quick guide to editing or experiment in the sandbox.

Research and Writing Tips

Article guidelines | How to research front groups | Resources for studying propaganda | Research using the web

Can you help?

Spinprofiles can be made more effective if more people join the project. If you have research or writing skills or just spare time, you can help.

If you are unsure where to start, you could expand some of the recently created but currently very brief articles. (If you look at the recent changes page you will see some noted as being 'stubs' - articles that may just be a line or two and needing to be fleshed out). So if you would like to add to some of those you would be most welcome.

There is an automatically updated page which includes the pages which have been signalled by Spinprofiles users as most wanted. In addition there is a page which includes a list of Things you can do to help.

Or if you would like some other suggestions closer to your interests you could drop Spinprofiles editor, David Miller an email. His address is editor AT spinprofiles.org

Start Here


Spinprofiles history

Spinprofiles is a collaborative venture initiated by Spinwatch in collaboration with Lobbywatch, GM Watch Red Star Research and Corporate Watch, but put into effect by a wide variety of volunteers and independent researchers.

Contributors are now working on 19,414 articles.

Disclaimer: Spinprofiles is an encyclopedia of people, issues and groups shaping the public agenda. It is a project of the Spinwatch—email editor AT spinprofiles.org.

Antispam note: To avoid attracting spam email robots, email addresses on Spinprofiles are written with AT in place of the usual symbol, and we have removed "mail to" links. Replace AT with the correct symbol to get a valid address. We regret the inconvenience this entails. Campaign for more effective antispam regulations.


References

  1. Dirty Tricks or Trump Cards, by Roy Godson, Transaction Books, 2001, p.3.