Assessment - Analysis of the security, effectiveness, and potential of an existing or planned intelligence activity.
Collection Intelligence Cycle - Acquisition of information and the provision of the information to processing or production elements. Communications Intelligence (COMINT) -Technical and intelligence information derived from foreign communications by other than the intended recipients.
Communications Security (COMSEC) -The protection resulting from all measures designed to deny unauthorized persons information of value which might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study. Communications security includesó cryptosecurity; transmission security; emission security; and physical security of communications security materials and information.
Compromising Emanations - Unintentional intelligence-bearing signals which, if intercepted and analyzed, disclose national security information transmitted, received, handled, or otherwise processed by an information-processing system.
Counterintelligence (CI) - Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs. Synonymous with Foreign Counterintelligence.
Counterintelligence (DOD, NATO) (JCS Pub 1) - Those activities which are concerned with identifying and counteracting the threat to security posed by hostile intelligence services or organizations, or by individuals engaged in espionage, sabotage, subversion, or terrorism.
Counterintelligence (Inter-American Defense Board) (JCS Pub 1) - That phase of intelligence covering all activity devoted to destroying the effectiveness of inimical foreign intelligence activities and to the protection of information against espionage, personnel against subversion, and installations or material against sabotage.
CI Liaison - The establishment and maintenance of personal contacts between CI liaison officers and personnel of organizations which have missions, responsibilities, information resources, or capabilities similar to those of US Army intelligence. It is conducted to promote cooperation, unity of purpose, and mutual understanding; coordinate actions and activities; and to exchange information and viewpoints. OCONUS CI liaison also includes overt collection of foreign intelligence and CI; acquisition from foreign sources of material and assistance not otherwise available; and the procedures used to gain access to individuals whose cooperations, assistance, or knowledge are desired.
Countermeasures - That form of military science that by the employment of devices or techniques, has as its objective the impairment of the operational effectiveness of enemy activity.
Counter-Signals Intelligence (C-SIGINT) -Those actions taken to determine enemy SIGINT capabilities and activities, the assessment of friendly operations to identify patterns and signatures, and the resulting vulnerabilities for subsequent development and recommendation of countermeasures. Recommendations to counter the foreign SIGINT collector (FSC) and EW threat are provided to the G3 by the G2. They can include offensive measures such as electronic attack, to include jamming or deception; or targeting for fire or maneuver.
Critical Node - An element, position, or communications entity whose disruption or destruction immediately degrades the ability of a force to command, control, or effectively conduct combat operations.
Cryptosecurity - The component of COMSEC which results from the provision of technically sound cryptosystems and their proper use. Deception - Those measures designed to mislead the enemy by manipulation, distortion, or falsification of evidence to induce them to react in a manner prejudicial to their interests.
Doctrine - Fundamental principles by which the military forces or elements thereof guide their actions in support of national objectives. It is authoritative but requires judgment in application.
Electronic Protection (EP) - That division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy employment of electronic warfare that degrade, neutralize, or destroy friendly combat capability. Formerly known as electronic counter-countermeasures (ECCM).
Electronic Attack (EA) - That division of electronic warfare involving the use of the electromagnetic or directed energy to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability. Formerly known as electronic countermeasures (ECM).
Electronic Deception - The deliberate radiation, reradiation, alteration, suppression, absorption, denial, enhancement, or reflection of electromagnetic energy in a manner intended to convey misleading information and to deny valid information to an enemy or to enemy electronics-dependent weapons. Among the types of electronic deception are: manipulative electronic deception, simulated electronic deception, and imitative deception.
Electronic Jamming - The deliberate radiation, reradiation, or reflection of electromagnetic energy for the purpose of disrupting enemy use of electronic devices, equipment or systems.
Electronic Security (ELSEC) - The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from their interception and study of noncommunications electromagnetic radiations, for example, radar.
Electronics Intelligence (ELINT) -Technical and intelligence information derived from foreign noncommunications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources.
Electronic Warfare (EW) - Military action involving the use of electromagnetic energy to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum and action which retains friendly use of electromagnetic spectrum.
Emission Control - The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize C 2 capabilities while minimizing, for OPSEC, detection by enemy sensors; to minimize mutual interference among friendly systems; or to execute a military deception plan.
Emission Security - That component of COMSEC which results from all measures taken to deny unauthorized persons information of value which might be derived from intercept and analysis of compromising emanations from crytoequipment and telecommunications systems.
Essential Elements of Friendly Information (EEFI) - Key questions about friendly intentions and military capabilities likely to be asked by opposing planners and decisionmakers in competitive circumstances.
Foreign SIGINT Collector (FSC)/EW - A foreign entity employing electromagnetic and SIGINT techniques to target friendly forces for the purposes of detecting, exploiting, or subverting the C-E environment of the friendly commander.
f-stop - A camera lens aperture setting indicated by an f-number.
Human Intelligence (HUMINT) - A category of intelligence information derived from human sources.
Imagery Intelligence (IMINT) - The collected products of imagery interpretation processed for intelligence purposes.Indicator - (1) In intelligence usage, an item of information that reflects the intention or capability of a potential enemy to adopt or reject a COA. (2) Activities that can contribute to the determination of a friendly COA.
Intelligence - The product resulting from the collection, processing, integration, analysis, evaluation and interpretation of available information concerning foreign countries or areas.
Liaison - That contact or intercommunication maintained between elements of military forces to ensure mutual understanding and unity of purpose and action.
Liaison Contact - The act of visiting or otherwise contacting a liaison source.
Liaison Officer - A CI special agent (SA) assigned the mission of conducting CI liaison.
Liaison Source - An individual with whom liaison is conducted. This term applies regardless of whether the individual furnishes assistance or is contacted on a protocol basis.
Mission - (1) The task, together with the purpose, that clearly indicates the action to be taken and the reason therefore. (2) In common usage, especially when applied to lower military units, a duty assigned to an individual or unit to task.
Operations Security (OPSEC) - The process of denying adversaries information about friendly capabilities and intentions by identifying, controlling, and protecting indicators associated with planning and conducting military operations and other activities.
Patterns - Stereotyped actions which so habitually occur in a given set of circumstances that they cue an observer, well in advance, to either the type of military unit or activity, its identity, capabilities or intent. Stereotyping occurs in a variety of ways, such as communications deployment techniques or historical association. Patterns must be unique and detectable to be of military significance.
Profile - The picture formed through the identification and analysis of elements, actions, equipment, and details of military units or activity. Pattern plus signature equals profile.
Risk - A measure of the extent to which a recommended countermeasure has been historically effective in eliminating a vulnerability, given a certain level of susceptibility and threat.
Security - (1) Measures taken by a military unit, an activity or installation to protect itself against all acts designed to, or that may, impair its effectiveness. (2) A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. (3) With respect to classified matter, it is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security.
Signals Intelligence (SIGINT) - A category of intelligence information comprising all communications intelligence, electronic intelligence, and telemetry intelligence.
Signals Security (SIGSEC) - A generic term that includes both COMSEC and ELSEC.Signature - The identification of a military unit or activity resulting from the unique and detectable visual, imagery, electromagnetic, olfactory, or acoustical display of key equipment normally associated with that type unit or activity.
source - (1) A point of origin or procurement. (2) One that initiates.
Source - Any person who furnishes intelligence information either with or without the knowledge that the information is being used for intelligence purposes. In this context, a controlled source is in the employment or under the control of the intelligence activity and knows that the information is to be used for intelligence purposes.
SUBJECT - (1) A person who is the principal object of attention. (2) One who is under investigation. Susceptibility - The degree to which a device, equipment, or weapons systems is open to effective attack due to one or more inherent weaknesses.
Threat - The technical and operational capability of a FSC or EW system to detect, exploit or subvert friendly signals and the demonstrated, presumed or inferred intent of that system to conduct such activity.
Vulnerability - Characteristics of a friendly C-E system or cryptosystem which are potentially exploitable by FSC or EW systems. As applied in this manual, vulnerability is a susceptibility in the presence of a threat. Susceptibility in the absence of a threat does not constitute a vulnerability.