Across
- 3. what our adversaries are willing to do with their capabilities
- 5. concealed operations where the intent is to maintain plausible deniability
- 8. organizing and processing data, storing information, and disseminating intelligence throughout the IC
- 9. those responsible for using intelligence in an actionable way
- 11. what our adversaries have at their disposal to harm the U.S.
Down
- 1. gathering information and data
- 2. how the U.S. will be impacted by adversaries capabilities and intentions
- 4. the process of collection and analysis of information gathered within or outside the U.S. that involves threats to our nation
- 6. the process by which an individual has to be approved to work in the intelligence field
- 7. connecting the dots
- 10. protecting information and intelligence from people and organizations that should not have the information
