The Language and the Marketing of “Intelligence”

I have recently posted an item on the controversy generated by the Department of Defense’s when it made available to its employees with Appalachian backgrounds a course on how to talk less obviously like hillbillies [https://academeblog.org/2014/08/31/do-you-speak-hillbilly-and-wish-that-you-didnt/]. And, even more recently, I have posted an item on the ways in which armed conflicts often involve battles over language and, alternatively,  the ways in which battles over language often suggest what we feel most threatened by [https://academeblog.org/2014/09/05/wars-on-language-and-the-language-of-wars/].

Here is another linguistic item related to the Department of Defense, one which relates as well to the series of eighteen posts that I recently finished called “National (In)Security: Fifty Notable American Espionage Novels” [https://academeblog.org/2014/08/30/national-in-security-fifty-notable-american-espionage-novels-49-50/; this final post in the series includes links to all of the others].

Perhaps you have at some point considered a career in espionage, or perhaps you have considered writing an espionage novel, or simply would like to read such novels or to watch popular television series such as Homeland and The Americans more knowledgably. If so, the Department of Defense has created materials to guide you. Business Insider just ran selected excerpts from those materials in an article titled “How to Talk like a Spy”:

“Asset”

No, we’re not talking about a stock. In intel-speak, an asset is anything that holds intelligence value. This can be technical — a hacked phone for example — or a human asset: A person working for a foreign intelligence agency who has agreed to share secrets a spy is looking for.

“Asset Validation”

Not every source is going to be a meaningful one. Just as a journalist may test a source or press for other information to confirm what he or she is being told, an intelligence asset needs to be “validated” — meaning there is a process to make sure the asset is authentic, reliable, and useful.

“Walk-in”

While spies often have to go out and look for people to turn against their homeland and spill secrets, sometimes a potential asset just shows up at the embassy door. These are referred to as “walk-ins” or “volunteers,” although they don’t have to literally go to a location. Former CIA officer Aldrich Ames and former FBI agent Robert Hanssen were both “volunteers” to the Soviet KGB.

“Backstop”

This is an arrangement made to make sure a spy’s cover isn’t blown. It’s the spy’s version of an alibi if the spy were to be picked up by the bad guys. If a spy is inside Iran posing as a businessman, then his backstop would be documents, financial records, and a phone number back to his office that would vouch for him, as one example.

“Cover within a Cover”

If the backstop may not hold up, a spy may revert to this “Inception”-like phrase. In going to his or her cover within a cover, a spy would admit to doing something less serious than espionage, which would hopefully explain away the suspicious activities the spy was observed to be doing: “Oh no sir, I’m just a tourist taking pictures.”

“Eyewash”

Let’s say a CIA officer successfully recruits a member of Russia’s intelligence service, the FSB. Because both sides have had problems with their files being given away to the other side, the CIA officer may make an “eyewash” entry to protect the new source. When writing about the recruitment effort, he or she might write that an attempt was made to get information, but the FSB agent balked at the idea. It’s like lying to your personal diary.

“False-Flag Recruitment”

A common piece of trade craft involves a spy’s effort to recruit assets by deceiving them into believing the spy is from a different country. In his book A Spy for All Seasons, former CIA officer Duane Clarridge writes that “Israelis have often used this technique by impersonating CIA officers when trying to recruit Arabs.”

“Illegal”

Illegals are the spies operating in deep cover. They have no overt relationship with their intelligence service, nor do they operate out of an embassy or have diplomatic cover. They are operating in a country illegally and alone. Sometimes this means they will simply burrow in and pose as just an average person in the neighborhood. As recently as 2010, the U.S. uncovered a ring of 11 “illegals” from Russia who had assumed stolen identities and reported back to Moscow since at least the 1990s. These types of spies could also be referred to as “sleepers” if they are just there, waiting to be told what to do next.

“Agent”

To intelligence personnel, an agent more often refers to an asset or source from a foreign entity. While movies and media often refer to “CIA agents,” the correct term is actually CIA officer. A CIA agent would better describe a mole inside the agency that is under the control of a foreign intelligence service who is throwing secrets its way.

“Confusion Agent”

This is a spy who has the goal of screwing up the opposition’s intelligence service, rather than gaining any information. Here’s an example: At an embassy function sure to be teeming with military leaders, diplomats, and spies alike, it would be the confusion agent’s job to keep the other side’s spies occupied with boring chit-chat so he or she can’t listen to what the diplomat nearby is saying.

“Active Measures”

The use of a confusion agent can also be put under operations known as active measures — which were often carried out by Soviet intelligence during the Cold War — to spread disinformation, manipulate media, and push propaganda. Former NSA analyst John Schindler wrote about one such operation recently, in which Cuban intelligence was able to influence The Daily Caller website to publish scandalous allegations that U.S. Sen. Robert Menendez (D-N.J.) was engaging with underage prostitutes in the Dominican Republic.

“Brush Contact”

You’ve seen it in spy movies, of course. Also known as the “brush pass,” it’s a brief encounter between friendly spies to share a few words or documents. These are risky maneuvers, and there are better and safer ways to pass messages, like having a prearranged site that is accessed by each side at different times.

“In the Gap”

If it’s absolutely necessary that two spies meet up for a quick conversation, they would want to be “in the gap” of surveillance. This means they have no eyeballs, cameras, or microphones pointed in their direction for at least a few seconds, but not any longer than a minute.

“Jack in the Box”

Besides being a restaurant home to always-great waffle fries, “Jack in the Box” refers to a dummy placed in a vehicle to deceive the other side into thinking there are more people inside. If a spy wants to make it seem like he or she is not alone, the spy might put a blow-up doll in the passenger seat.

“Ghost Surveillance”

Spies are taught to watch for when they are being watched. In a vehicle, this might mean taking frequent turns or heading out into the country to see if there’s a tail. On the street, a spy’s eyes would be looking for people who look as if they might be a little too interested in what they are doing. But it’s much harder to spot “ghost surveillance” — the “extremely discreet and seemingly omnipresent” type of surveillance, according to the manual, which watches the target from out of view.

“Spy Dust”

Also known as Metka, spy dust was a chemical compound used by the Soviet KGB that could be applied to a target to mark that person for surveillance. Once applied to clothing, shoes, or elsewhere, the invisible compound could be picked up on infrared by people following, according to Intelligence Reference.

“Rabbit”

Instead of a target, a rabbit is what intel folks would call the person they are watching and/or following.

“Black-Bag Job”

Think of this as the spy’s version of breaking and entering, but instead of burglary, the intention is to enter a target’s residence to discreetly learn more about him or her. Also known as “surreptitious entry,” the manual says this type of operation is often carried out by FBI agents against foreign intelligence agents operating inside the United States.

“Cover stop”

Spies are usually working “under cover” but still know they are most likely under surveillance. To go where they need to go, and ultimately to steal secrets without getting caught, they may make cover stops, which give what appear to be innocent reasons for going out. This could be as simple as a trip to the grocery store where a spy makes a brush pass with a friend in aisle nine.

“Rolling Car Pickup”

This term is fairly self-explanatory. It’s a move in which someone is picked up so smoothly, the car hardly stops or seems as if it’s moving forward normally. While not exactly the same, closed-circuit footage from February showed a CIA and Delta Force team capturing a terror suspect off the street in Libya and putting him in a van. The entire sequence took only 40 seconds.

“Hello Number”

If a spy is dialing a hello number, it usually means he or she is in trouble. This trade craft term refers to a phone call in which the person on the other end doesn’t identify who or where he or she is, giving only a codeword or some other signal the spy would know the meaning to. Random example: Spy calls the hello number and the person on the other end says “it’s raining in Florida right now.” To anyone else listening, it could mean the weather is terrible in the Sunshine state, but the real meaning could be that the spy needs to get on a plane and get out of the country immediately.

“Shape”

This refers to activities that try to change the behavior, perceptions, and capabilities of an adversary. Similar to “active measures,” this bit of jargon deals with preparation that often happens before people may enter a foreign land. Military commanders will say they are “shaping the battlespace” by dropping leaflets in a village for instance, before they send in troops to try to gain intelligence.

“Motivation”

Motivation holds the same meaning as you probably think, but it’s an important term in the intelligence community for when a spy is trying to recruit a source. An asset’s motivation for giving away secrets could boil down to ideological, financial, sexual, ego, coercion, or a combination. If a spy wants to recruit a source, he or she needs to understand the “why” first. Historically for American spies, the manual says, the motivation has been money. One of the worst intelligence leaks in U.S. history came from former FBI agent Robert Hanssen, who sold secrets to the Soviet Union, and later Russia, for $1.4 million over 22 years.

“Pharming/Phishing”

While some hackers break into computers just out of curiosity or in an effort to score some cash, there are plenty of others who are working in the intelligence community. In the U.S., most are in a special NSA unit called TAO, or Tailored Access Operations (Many other countries have their own versions of this unit). Put simply, TAO is the unit of hackers trying to break into foreign computers, and one technique they can use is pharming. In a pharming attack, a user is redirected to a website other than what he or she was trying to go to, but the person doesn’t know it. For example, TAO could duplicate a bank’s website where the target enters in all his or her account information and logs in successfully, but in the process, the data also gets captured by the hackers. Pharming can be used in conjunction with, or in an independent “phishing attack” — usually in the form of an email that looks friendly but contains links to very unfriendly places.

“SCIF”

The SCIF, as it’s referred to by intelligence professionals, is the acronym for Sensitive Compartmented Information Facility. It’s the room or building where the really sensitive and secret information is held and processed, which has physical and procedural methods to keep those secrets in. Before entering a SCIF, intel analysts usually have to give up their phones, thumb drives, and other media that could potentially be used to take out information. The procedures aren’t always followed, as the U.S. Army learned soon after former intelligence analyst Chelsea Manning started spilling secrets to the Wikileaks website.

“Triple Agent”

You may have heard of a double agent, which is a spy playing for both sides. Well, there’s also a triple agent. Like the double, this person may “wittingly or unwittingly” withhold significant information from two intelligence services at the urging of a third service.

“Clean Phone”

A clean phone is a brand-new — usually pre-paid — mobile phone a spy can use that won’t be traced. These are burners taken out of the box that ensure more secure communications. Of course, that doesn’t mean a call couldn’t be picked up as it travels over the air, but a spy can at least be safe in knowing the purchase or user probably won’t be traced.

The complete glossary of intelligence and counterintelligence terms is more than 350 pages long and can be found in a pdf at: http://fas.org/irp/eprint/ci-glossary.pdf.

This sort of material, including the related novels and television series, may not seem to glamorize espionage because the moral ambiguities seem so manifold and profound and because the stories often include acts of great inhumanity and brutality. But, much as the novels films about organized crime have made that underworld familiar to us through the filter of fiction and have thereby made it seem less alien and threatening, so, too, these materials make “intelligence gathering” seem more an inherent part of the culture and thereby less threatening and objectionable. It was harder to glamorize morally dubious enterprises when standards of morality were more simplistic, more black and white. So, in some ways, one of the costs of a more nuanced sense of morality is that we are slower to recognize and to reject some morally indefensible enterprises.

 

One thought on “The Language and the Marketing of “Intelligence”

Comments are closed.