Appendix C

ICOM Definitions

Click here to download a Word6.0 version of this appendix.

< /tr>
ICOM NameICOM Definition
ActivitiesThreat actions that will confirm or deny the threat's choice of a particular course of action.
Addressed ReportsIntelligence reports that include message addresses, precedence, and routing information.
Alternate MeansCommunication means in addition to the primary means used as backup.
Approved ReportsIntelli gence reports that have been reviewed and meet reporting criteria, quality standards, dissemination means, and are ready to be sent to the user.
Area ReportsTimely weather and terrain products covering the area of operations.
Assessed ImpactsDetermination of potential adverse effects of friendly electronic attack operations on friendly command, control, communications, and computer operations.
Asset StatusInformation pertaining to the location of subordinate IEW units and systems and their capability to perform a mission. Also may include a report of mission effectiveness, degree of completion, or satisfaction of mission requirements.
Asset TaskingSpecific planning and mission direction provided by MI or other units for the execution of intelligence collection, CI, or EA activities. Tasking includes detailed instructions to a specified collector or position with necessary mission parameters, technical da ta, reporting instructions, timeliness factors, and may include dynamic retasking based on cross-cueing information.
Audit TrailAn accounting system to keep track of who was sent which information, when the information was sent, and by what means the information was sent.
Available CI AssetsCI assets capable of performing or satisfying a CI task that are free or can have their mission changed to accommodate the new or modified mission.
Ava ilable EA SystemsEA systems capable of satisfying an EA requirement that are free or can have their mission changed to accomplish a new or modified mission.
Available SystemsCollection systems capable of satisfying a requirement that are free or can have their mission changed to accomplish a new or changed mission. (Available implies both crew and equipment readiness.)
Available TrunksInformation on available communication trunks required to prior itize report dissemination.
Candidate SystemsOrganic or nonorganic systems that are capable of satisfying a specific requirement for IEW support.
Capable CI AssetsCI assets who have been assessed as able to contribute to a CI task by virtue of their background, training, or experience.
Capable EA SystemsEA systems that have been assessed as able to accomplish a particular EA task by virtue of their technical characteristics.
Capable SystemsSystems that have been assessed as able to contribute to a particular IEW task by virtue of their technical characteristics.
CI RequirementsThe varied requirements levied on CI assets of an echelon. Requirements may include investigations, force protection measures, force protection source operations, and screening of EPW, detainees, or refugees of counterintelligence interest. Additionally, these requirements may include threat electronic warf are (EW) assessments versus friendly communications and methods of countering threat imagery systems.
CI StrategyA broad planning strategy for the effective employment of CI assets of an echelon.
Collection PlanA tool used by collection managers to determine the most appropriate asset to task against a particular PIR or IR. The collection plan has no universal standard format; therefore format is normally prescribed by the unit's SOP. A collection plan n ormally includes PIR/IR, indicators, SIR, available agencies and assets, time/place information is required, priority, and remarks. When produced, the collection plan replaces PIR/IR as the major control on the IEW process.
Collection Plan CI InputData or briefings regarding planned CI activities which may be included in the echelon intelligence collection plan, and in the echelon OPLAN/OPORD. The Intelligence Estimate to the OPLAN/OPORD contains a CI paragraph which outlines task s to be accomplished.
Collection SystemsEquipment and human means specifically designed or tasked to obtain enemy, weather, or terrain data from the battle area for purposes of generating intelligence, counterintelligence, or terrain and weather products.
Combat InformationUnevaluated data gathered by or provided directly to the commander which, due to its highly perishable nature or the criticality of the situation, cannot be processed into tactical intel ligence in time to satisfy the user's intelligence requirements; or information or data collected by sensors or assets but which have not been validated, integrated, compared, and analyzed into intelligence.
Commander's Intent PriorityPrioritized requirements based on the criticality to the commander's intent.
Communication SystemsCommunication and data distribution equipment and systems required to accomplish the IEW mission.
Compartmente d InformationInformation that is only to be seen by personnel authorized within a specific "compartment", or category of data.
Complete EA RequirementsInformation regarding requirements for EA that have been reviewed and found to be complete in terms of target and operational characteristics.
Complete RequirementsRequirements for intelligence that have been reviewed and found to specify all information needed in terms of what, where, when, why, an d who.
Completed SORA SOR that has been fully satisfied and no further action is required by the collectors.
Consolidated EA RequirementsRequirements for EA that have been combined in terms of time, location, target or system to execute the EA task.
Correlated ReportsInformation that links intelligence, counterintelligence, or EA reports with requirements.
Data Base TransactionInformation flow from a lowe r to higher echelon of a distributed data base containing data about the enemy, weather, terrain, or friendly situation which has been refined, added to, or changed at the lower echelon. The higher echelon controls its data base and has the prerogative to accept or reject the proposed changes. A data base transaction may also be a query of the higher echelon data base of interest.
Data Base UpdateInformation flow from a higher to lower echelon of a distributed data base containi ng information processed by the higher echelon about the enemy, weather, terrain, operational environment, friendly force, or friendly operations of interest to enemy intelligence that results in the adding to, refining, deleting, or changing of the distributed data base. Also includes technical data defining aspects of enemy and friendly communications and non-communications emitters such as information about equipment, signal characteristics, net structures, frequency and call signs, operating techniques , and code and cipher systems. Friendly emitter data is vital to counter-SIGINT and deception operations. Technical data bases on the enemy can be used to determine how best to employ a collector or jammer against an electronic target.
Decision PointThe point in space and time where the commander or staff anticipates making a decision concerning a specific friendly course of action.
Directives/ SOPMilitary communications that establish policy for a specific action; or which govern actions, conduct, or procedures.
Draft Collection StrategyThe initial attempt to capture the scheduling of collection operations.
Draft ReportsUnapproved reports.
EA RequirementsRequests or taskings for EA support that have been reviewed and either determined to be a new requirement or combined with ongoing or planned missions, and arranged in order of importance to the mission. EA requirements o riginate with the G3 or with brigade commanders.
Electronic FileAn electronic representation of a textual, graphic, imagery, other documents, or information.
Environmental FactorsThe natural or man-made characteristics of terrain, meteorological conditions, and enemy capabilities and intentions that may physically impact on intelligence and electronic warfare operations in an area of operations.
Equipment ParametersSpecific opera ting characteristics of electronic equipment that may be affected by electronic attack operations.
Evaluated Report ElementsInformation that correlates elements of an intelligence report with stated requirements for information.
EW SystemsThe systems, equipment, and procedures required to conduct electronic attack.
Feasible EA RequirementsRequirements for EA that have been reviewed and found to be possible, appropriate and suitabl e for EA systems.
Feasible RequirementsRequirements for intelligence that have been reviewed and found to be within the capability of the intelligence system to satisfy in the time requested.
Friendly InformationCondition of any friendly force resource (person, group, relationship, instrument, system, or supply) that affects the capabilities or activities of an IEW unit or would be of interest to an enemy.
Friendly InformationCond ition of any friendly force resource (person, group, relationship, instrument, system, or supply) that affects the capabilities or activities of an IEW unit or would be of interest to an enemy.
Guarded FrequenciesThreat frequencies from which SIGINT or ES information of technical or tactical importance is derived.
IndicatorsPositive or negative evidence of threat activity or any characteristic of the AO which points toward threat vulnerabilities or rejecti on by the threat of a particular capability, or which may influence the commander's selection of a COA.
Indicators/TimePositive or negative evidence of threat activity or any characteristic of the AO which points toward threat vulnerabilities or rejection by the threat of a particular capability, or which may influence the commander's selection of a COA, and the time the activity is expected to occur.
ISMThe product of horizontal and vertical integration o f IEW activities to support the commander's decision-making needs and process. Used by intelligence collection and production managers to prioritize, schedule, and dynamically focus IEW resources to provide answers on time to positively affect operational outcomes.
ISMThe product of horizontal and vertical integration of IEW activities to support the commander's decision-making needs and process. Used by intelligence collection and production managers to prioritize, schedule, and dynamically focus IEW resources to provide answers on time to positively affect operational outcomes.
Jamming ControlsInformation regarding how EA operations will be positively and/or negatively controlled.
Jamming-to Signal Ratio InformationInformation pertaining to the measure of the jamming-to-signal ratio achieved by a jammer at the targeted receiver.
Justified PriorityPrioritized requirements based on justification.
LTIOVThe time by which information must be delivered to the requestor in order to provide decision makers with timely intelligence.
Maximum Jammer DistanceThe maximum distance in kilometers that a jammer may be and still effectively attack the designated target.
Merged RequirementsThe result of the process of reviewing new and current intelligence requirements and where possible merging the requirements to reduce the number of outstanding requirements, improve coverage, reduce duplication, etc.
MI Unit/ Intel StaffThe personnel, both military and civilian, assigned to or attached to the Division G2 staff or the Division MI Battalion required to accomplish IEW missions.
Mission FeedbackInformation concerning a specific mission provided to the asset manager by the collection manager based on evaluation of the mission reports.
Mission Jammer Power OutputThe power out put required to effectively conduct a required EA mission.
NAI(Named Area of Interest) The geographic area where information that will satisfy a specific information requirement can be collected. Usually selected to capture indications of threat courses of action (COA) but may also be related to conditions of the battlefield.
Necessary RequirementA requirement that must be collected against to satisfy because data bases do not contain the requested inform ation.
New LeadsNew counterintelligence investigative leads developed during the course of the investigation.
Non-Capable RequirementsRequirements which exceed the capabilities of organic systems.
Operational Environment InformationInformation flow that provides data on significant regional features to include political, economic, industrial, cultural, lingual, historical, and psychological factors which might affect the conduct of military operations within an area.
OPLAN/ OPORDThe collection of approved documents which present the commander's instructions for the tactical decisionmaking process, or execution of the mission. These controls which include alerts, commander's guidance, plans, and orders will impact on the model at different times in the cycle or through different cycles. The documents also include High Payoff Target (HPT) and High Value Target (HVT) lists.
PIR/IR Priority Information Requirements/Information Requirements. PIR - those intelligence requirements for which a commander has an anticipated and stated priority in his task of planning and decision-making. IR - those items of information regarding the enemy and his environment which need to be collected and processed in order to meet the intelligence requirements of the commander. PIR/IR are the reason for, and give direction to the intelligence collection effort. May also include those Essential Elements of Friendly Information which, if known by the enemy, would jeopardize the friendly mission.
Potential Asset MixThe proposed mix of intelligence collection assets to provide complimentary coverage by a combination of assets from multiple disciplines.
Potential CI AssetCI agents or teams which have been determined to be capable and available to perform a specific mission.
Potential External CI AssetThe identification of an MDCI as set of another echelon who may be capable of fulfilling a requirement that can not be satisfied by the echelon's organic MDCI capability.
Potential External EA AssetsNon-organic EA assets identified as capable of satisfying an EA mission or tasks.
Preplanned TaskA task which has been preplanned but is not considered urgent.
Prioritized EA RequirementsEA requirements that have been listed in order of precedence.
Pr ioritized EA TargetsAn updated prioritized listing of preplanned threat targets for attack by electronic attack (EA) assets. The initial list is prepared by the S3/G3 of the echelon in coordination with the S2/G2 and arrives as EA Requirements. The MI Battalion staff revises the initial requirements to determine how best to accomplish the tasking. An informal list of targets of opportunity, and on-call targets may also be kept. The preplanned EA target list equates to the "Decide" phase of targ eting.
Prioritized Requirements ListA valid list of requirements for collection that have been placed in the proper order of precedence.
Processing SystemsComputer based systems, equipment, and procedures required to convert or assist in the conversion of raw data or information into intelligence.
Proposed EA TaskingInformation resulting from the process of determining which assets to task.
Protected Frequencies< /td>Frequencies used by tactical friendly forces for a particular operational requirement.
Qualified CI AssetsCI assets of an echelon which are technically qualified to carry out an CI tasking. Implies training, experience, etc.
QueryA request for information submitted to a resident data base or a communication to determine the availability of information that might satisfy a requirement.
Query FeedbackThe results of a data b ase query that provides the information sought or tells the individual querying the data base that the information does not exist. Also includes technical data required for SIGINT, IMINT, HUMINT, and EA operations.
Queued ReportsA released report that has been arranged in order of precedence for transmission.
Recommended SystemsCollection or EA systems that have been selected based on type of mission and system availability, capability, and vulnerability.< /td>
Recorded RequirementsAn intelligence requirement received by an element which has been recorded to provide tracking or an audit trail of the requirement as it makes its way through the intel cycle.
ReportsInformation flow resulting from the processing of data obtained through the systematic observation of the battle area by means of sensors and systems for the purpose of providing timely combat information, intelligence, counterintelligence, OPSEC informat ion, terrain and weather products, and the results of electronic attack operations. Reports are reviewed and approved by competent authority before being transmitted electronically.
Request AddressThe destination of the request for support.
Request For Technical DataAn internal requirement for collection generated as a result of not finding the required technical data in the EA or SIGINT data base.
Requestor FeedbackInformation f low that describes to the requestor whether his request has been accepted, or if rejected, why.
RequestsCommunication seeking intelligence, information, counterintelligence, or electronic warfare support from higher or adjacent echelons due to inability of organic means to satisfy requirements.
Required Redundant CoverageDuring the collection planning process, a conscious decision is made to task several same intelligence discipline assets to cover the sam e target. Used against high priority targets when the probability of success by any one collection system is low.
Required SkillsInformation on skills needed to accomplish a particular multidiscipline counterintelligence task.
RequirementsInformation flow from internal, higher, lower, or adjacent elements that initiates planning or coordination to carry out IEW operations.
Revised EA Target ListAn updated prioritized listing of p replanned threat targets for attack by electronic attack (EA) assets. The initial list is prepared by the S3/G3 of the echelon in coordination with the S2/G2 and arrives as EA Requirements. The MI Battalion staff revises the initial requirements to determine how best to accomplish the tasking. An informal list of targets of opportunity, and on-call targets may also be kept. The preplanned EA target list equates to the "Decide" phase of targeting.
Screened ReportsA report that h as been determined to satisfy an SOR in terms of pertinence, completeness, timeliness, and opportunities for cueing.
Selected MediaMethod chosen to disseminate information, such as voice, graphics or text, where the selection is a function of volume, speed of delivery, amount of data, error rates and similar requirements.
Selected ResourcesThe intelligence collection resources selected by the mission manager of the echelon to fulfill collection requirement s.
Selected UnitThe unit or organization to which a request for EA support will be sent.
SIGINT/EW Target ListThe resultant product of adding technical data to the prioritized target list.
Similar RequirementsRequirements that are similar in the type information requested.
SIRSpecific Information Requirement. Developed by determining gaps in knowledge or unsatisfied requirements about the enemy and by an alyzing PIR/IR, determining indicators, LTIOV, and specific information needed to address those indicators.
SORSpecific Orders or Requests - The order or request that generates planning and execution of a collection mission or analysis of data base information. SOR to subordinates are orders. SOR to other commands are requests.
SOR SetsDeveloped during the mission management function when reporting criteria is tailored to the collection capabilities of the tasked asset.
Specificity PriorityPrioritized requirements based on the most specific questions possible.
Synchronization Reporting RequirementsIntelligence or EA reporting requirements prescribed by the Intelligence Synchronization Matrix. May include reporting times, means, and addresses.
Synchronized RequirementsRequirements which have been associated with its corresponding decision points and timelines.
S ystems VulnerabilitiesAttributes or characteristics of a system that make the system vulnerable to threat collection and location systems.
TABOO FrequenciesFrequencies which must never be deliberately interfered with by friendly forces.
Target CharacteristicsSpecific technical operating characteristics of threat electronic equipment designated as a target for collection or EA.
Target NominationsResults of (1) analyzing th e value to friendly operations of engaging particular types of enemy installations, systems, equipment, units, or personnel, and (2) developing a list of geographical areas, complexes, or installations, that when occupied by enemy materiel or personnel, are worthy of engagement by lethal or non-lethal means. These target nominations result from analysis and are provided to the division fire support element for possible inclusion in the HPT/HVT lists. Target nominations may also result from identification of predesignated targets or from intercepts that meet predesignated criteria for targeting purposes. These target nominations result from the collection effort and are reported directly to the fire support element for input into fire support channels.
Task RejectionA tasking received from the mission manager that the asset manager has deemed impossible to accomplish.
Task RejectionA tasking received from the mission manager that the asset manager has deem ed impossible to accomplish.
Tasking MethodThe means of conveying a CI task to the responsible agency. Tasking methods vary and depend upon the type of task.
TaskingsThe communication providing selected organic IEW units or assets with specific orders for collection, analysis, counterintelligence operations, or electronic attack. Taskings result from the process of analyzing and translating requirements.
Technical DataTechnica l aspects of enemy communications emitters such as information about equipment, signal characteristics, net structures, frequency and call sign usage, operating techniques, and code and cipher systems. It can tell a collector or jammer how best to receive or attack the electronic target with the EW systems available. Additionally, technical can include non-communications information.
Technical FactorsInformation about the specific aspects of an electronic attack mission to inclu de threat system, parameters, frequencies, call signs and similar characteristics.
Terrain InformationInformation flow describing the natural and manmade features of an area, their effect on military operations, and the effect of weather and climate on these features.
Threat InformationAny information pertaining to the enemy in the area of operations.
Threat ReportsThe compilation of all pertinent, relevant, and credible single-s ource threat information organized into established report formats for dissemination.
Time Phased PriorityPrioritized requirements based on time the answer to the requirement will be important to the decision making process or when the requirement will no longer be valid.
Transmission MeansA decision which has been made to use a particular type means of transmission or combination of means to disseminate evaluated intelligence. Transmission means include graphics, combat net radio, area communications, messenger, or other type.
Unanticipated EventAn activity observed in the area of operations that had not been included in the proposed plan of the threat COA. Unanticipated events may indicate the rejection of an identified threat COA, or a lack of proper planning on the part of the intelligence staff.
Unfulfilled RequirementAn intelligence collection or EA requirement which has not been satisfied or the in formation collected does not fully satisfy the requirement. If the requirement timelines have not expired or the requirement is of high priority, the requirement will be relevied for collection or EA effort.
Unsupported TargetsTargets for which insufficient technical data is available to enable attack of the target.
Urgent TaskA task which must be satisfied rapidly.
Validated CI RequirementsConfirmed requirements for CI support t hat have been reviewed; found to be appropriate, complete, and feasible; and once accepted, are binding and must be addressed by a specific reporting time.
Validated EA RequirementsConfirmed requirements for EA support that have been reviewed; found to be complete, appropriate, and feasible; and once accepted, are binding and must be addressed by a specified time.
Validated RequirementsConfirmed requirements for intelligence support that have been reviewed ; found to be complete, appropriate, and feasible; and once accepted, are binding and must be addressed within a specified reporting time.
Weather InformationInformation flow describing climatic conditions affecting military operations within the area of operations.


Return to Previous Page Previous Section | Return to Home Page ODCSINT home page |Next SectionReturn to Previous Page