IW-D Table of Contents
|Jump to APPENDIX H: Glossary|
ABIS Advanced Battlefield Information System ACTD Advanced Concepts Technology Demonstration Active X See Appendix H, Glossary Arch Architecture ASD(C3I) Assistant Secretary of Defense for Command, Control, Communications and Intelligence ATD Advanced Technology Demonstration C2 Command and Control C3 Command, Control and Communications C3I Command, Control, Communications and Intelligence C4I Command and Control, Communications, Computers and Intelligence C4ISR Command and Control, Communications, Computer Intelligence, Surveillance and Reconnaissance CDR Commander (USN designation of rank) CIA Central Intelligence Agency CINC Commander in Chief CIO Chief Information Officer CIP Critical Infrastructure Protection CJCS Chairman, Joint Chiefs of Staff Conv. Conventional CONUS Continental United States Coord. Coordination CSA CINCs/Service/Agencies CSAAS Combat Support Agency Assessment System CSPAR CINCs Preparedness Assessment Report Ctr Center DASD Deputy Assistant Secretary of Defense DCI Director of Central Intelligence DEPSECDEF Deputy Secretary of Defense Des Design DIA Defense Intelligence Agency DII Defense Information Infrastructure DIS Defense Investigative Service DISA Defense Information Systems Agency DoC Department of Commerce DoD Department of Defense DoDD Department of Defense Directive DoE Department of Energy DoJ Department of Justice DoT Department of Transportation EEI Essential Elements of Information FBI Federal Bureau of Investigation FEMA Federal Emergency Management Agency GAO Government Accounting Office GII Global Information Infrastructure HUMINT Human Intelligence I&W/TA Indication and Warning/Threat Assessment IC Intelligence Community Info. Information Intel Intelligence IT Information Technology IW Information Warfare IW-D Information Warfare-Defense JAVA See Appendix H, Glossary JWCA Joint Warfare Analysis Center MEII Minimum Essential Information Infrastructure Mil Deps Military Departments NCS National Communications System NEC National Economic Council NII National Information Infrastructure NRC National Research Council NSA National Security Agency NSC National Security Council NSIE Network Security Information Exchange NSTAC National Security Telecommunications Advisory Board Nuc. Nuclear OCONUS Outside of CONUS Off Office OMB Office of Management and Budget Ops Operations OSTP Office of Science and Technology Policy OUSD(A&T) Office of the USD(A&T) OUSD(P) Office of the USD(P) Plan Planning PSA Principle Staff Assistant PSN Public Switched Network Ret. Retired SECDEF Secretary of Defense SORTS Status of Resources and Training System TOR Terms of Reference Treas Department of the Treasury U.S. United States USAF United States Air Force USD(A&T) Under Secretary of Defense for Acquisition and Technology USD(C) Under Secretary of Defense, Comptroller USD(P&R) Under Secretary of Defense for Personnel and Readiness USD(P) Under Secretary of Defense for Policy USN United States Navy VADM Vice Admiral WARM War-time Mode
IW-D Table of Contents
Source: Joint Pub 1-02, Department of Defense Dictionary of Military and Associated Terms, 23 March 1994. The DOD Dictionary of Military and Associated Terms," is promulgated for mandatory use by the Office of the Secretary of Defense, Military Departments, Joint Staff, combatant commands, and Defense agencies. Those terms approved for both DOD and NATO use are marked with an asterisk within parentheses, i.e.. (*). Other sources are indicated by brackets, e.g., [CJCSI 3210.01, 1996].
acoustic warfare(*) -- Action involving the use of underwater acoustic energy to determine, exploit, reduce or prevent hostile use of the underwater acoustic spectrum and actions which retain friendly use of the underwater acoustic spectrum. There are three divisions within acoustic warfare: 1. acoustic warfare support measures. That aspect of acoustic warfare involving actions to search for, intercept, locate, record and analyze radiated acoustic energy in water for purpose of exploiting such radiations. The use of acoustic warfare support measures involves no intentional underwater acoustic emission and is generally not detectable by the enemy. 2. acoustic warfare countermeasures. That aspect of acoustic warfare involving actions taken to prevent or reduce an enemy's effective use of the underwater acoustic spectrum. Acoustic warfare countermeasures involve intentional underwater acoustic emissions for deception and jamming. 3. acoustic warfare counter-countermeasures. That aspect of acoustic warfare involving actions taken to ensure friendly effective use of the underwater acoustic spectrum despite the enemy's use of underwater acoustic warfare. Acoustic warfare counter-countermeasures involve anti-acoustic warfare support measures and anti-acoustic warfare countermeasures, and ma not involve underwater acoustic emissions.
acoustic warfare counter-countermeasures -- See acoustic warfare Part 3.
acoustic warfare countermeasures -- See acoustic warfare Part 2.
acoustic warfare support measures -- See acoustic warfare Part 1.
active air defense(*) -- Direct defensive action taken to nullify or reduce the effectiveness of hostile air action. It includes such measures as the use of aircraft, air defense weapons, weapons not used primarily in an air defense role, and electronic warfare. See also air defense.
Active X -- A name for a version of Distributed Object Linking and Embedding (OLE) that enables sharing of data, links, and controls over a network (primarily for interoperability among Windows-based software).
anti-air warfare -- A U.S. Navy/U.S. Marine Corps term used to indicate that action required to destroy or reduce to an acceptable level the enemy air and missile threat. It includes such measures as the use of interceptors, bombers, antiaircraft guns, surface-to-air and air-to-air missiles, electronic attack, and destruction of the air or missile threat both before and after it is launched. Other measures which are taken to minimize the effects of hostile air action are cover, concealment, dispersion, deception (including electronic), and mobility. See also counter air.
antisubmarine operation -- Operation contributing to the conduct of antisubmarine warfare.
antisubmarine warfare(*) -- Operations conducted with the intention of denying the enemy the effective use of submarines.
attack assessment -- An evaluation of information to determine the potential or actual nature and objectives of an attack for the purpose of providing information for timely decisions. See also damage estimation.
biological operation(*) -- Employment of biological agents to produce casualties in personnel or animals and damage to plants or materiel; or defense against such employment
biological operation(*) -- Employment of biological agents to produce casualties in personnel or animals and damage to plants or materiel; or defense against such employment. biological warfare--See biological operation.
C2-protection -- See command and control warfare.
chemical warfare -- All aspects of military operations involving the employment of lethal and incapacitating munitions/agents and the warning and protective measures associated with such offensive operations. Since riot control agents and herbicides are not considered to be chemical warfare agents, those two items will be referred to separately or under the broader term "chemical," which will be used to include all types of chemical munitions/agents collectively. The term "chemical warfare weapons" may be used when it is desired to reflect both lethal and incapacitating munitions/agents of either chemical or biological origin. Also called CW. See also chemical operations, herbicide, riot control agent.
combined warfare -- Warfare conducted by forces of two or more allied nations in coordinated action toward common objectives.
command and control warfare -- The integrated use of operations security (OPSEC), military deception, psychological operations (PSYOP), electronic warfare (EW), and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions. Command and control warfare applies across the operational continuum and all levels of conflict. Also called C2W. C2W is both offensive and defensive: a. counter-C2 -- To prevent effective C2 of adversary forces by denying information to, influencing, degrading, or destroying the adversary C2 system. b. C2-protection -- To maintain effective command and control of own forces by turning to friendly advantage or negating adversary efforts to deny information to, influence, degrade, or destroy the friendly C2 system. See also command and control; electronic warfare; intelligence; military deception; operations security; psychological operations.
counterguerrilla warfare(*) -- Operations and activities conducted by armed forces, paramilitary forces, or nonmilitary agencies against guerrillas.
damage estimation -- A preliminary appraisal of the potential effects of an attack. See also attack assessment.
directed-energy protective measures -- That division of directed-energy warfare involving actions taken to protect friendly equipment, facilities, and personnel to ensure friendly effective uses of the electromagnetic spectrum that are threatened by hostile directed-energy weapons and devices.
directed-energy warfare -- Military action involving the use of directed-energy weapons, devices, and countermeasures to either cause direct damage or destruction of enemy equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum through damage, destruction, and disruption. It also includes actions taken to protect friendly equipment, facilities, and personnel and retain friendly use of the electromagnetic spectrum. Also called DEW. See also directed energy; directed-energy device; directed-energy weapon; electromagnetic spectrum; electronic warfare.
directed-energy weapon -- A system using directed energy primarily as a direct means to damage or destroy enemy equipment, facilities, and personnel. See also directed energy; directed energy device. economic warfare--Aggressive use of economic means to achieve national objectives.
electromagnetic intrusion -- The intentional insertion of electromagnetic energy into transmission paths in any manner, with the objective of deceiving operators or of causing confusion. See also electronic warfare.
electronic warfare -- Any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Also called EW. The three major subdivisions within electronic warfare are: electronic attack, electronic protection, and electronic warfare support. a. electronic attack -- That division of electronic warfare involving the use of electromagnetic or directed energy to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability. Also called EA. EA includes: 1) actions taken to prevent or reduce an enemy's effective use of the electromagnetic spectrum, such as jamming and electromagnetic deception, and 2) employment of weapons that use either electromagnetic or directed energy as their primary destructive mechanism (lasers, radio frequency weapons, particle beams). b. electronic protection -- That division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy employment of electronic warfare that degrade, neutralize, or destroy friendly combat capability. Also called EP. c. electronic warfare support -- That division of electronic warfare involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition. Thus, electronic warfare support provides information required for immediate decisions involving electronic warfare operations and other tactical actions such as threat avoidance, targeting, and homing. Also called ES. Electronic warfare support data can be used to produce signals intelligence (SIGINT), both communications intelligence (COMINT), and electronics intelligence (ELINT). See also command and control warfare; communications intelligence; directed energy; directed-energy device; directed-energy warfare; directed-energy weapon; electromagnetic compatibility; electromagnetic deception; electromagnetic hardening; electromagnetic jamming; electromagnetic spectrum; electronics intelligence; frequency deconfliction; signals intelligence; spectrum management; suppression of enemy air defenses.
guerrilla warfare(*) -- Military and paramilitary operations conducted in enemy-held or hostile territory by irregular, predominantly indigenous forces. See also unconventional warfare.
indications and warning -- Those intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the United States or allied military, political, or economic interests or to U.S. citizens abroad. It includes forewarning of enemy actions or intentions; the imminence of hostilities; insurgency; nuclear/non-nuclear attack on the United States, its overseas forces, or allied nations; hostile reactions to United States reconnaissance activities; terrorists' attacks; and other similar events.
information warfare -- Actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one's own information, information-based processes, information systems, and computer-based networks. [CJCSI 3210.01, 1996]
integrated warfare -- The conduct of military operations in any combat environment wherein opposing forces employ non-conventional weapons in combination with conventional weapons.
JAVA -- An object-oriented, platform-independent programming language, often used to create small cross-program executable software applications called applets that are downloaded from remote sites and that execute automatically.
mine warfare -- The strategic, operational, and tactical use of mines and mine countermeasures. Mine warfare is divided into two basic subdivisions: the laying of mines to degrade the enemy's capabilities to wage land, air, and maritime warfare; and the countering of enemy-laid mines to permit friendly maneuver or use of selected land or sea areas.
naval coastal warfare -- Coastal sea control, harbor defense, and port security, executed both in coastal areas outside the United States in support of national policy and in the United States as part of this Nation's defense. Also called NCW.
naval special warfare -- A specific term describing a designated naval warfare specialty and covering operations generally accepted as being unconventional in nature and, in many cases, covert or clandestine in character. These operations include using specially trained forces assigned to conduct unconventional warfare, psychological operations, beach and coastal reconnaissance, operational deception operations, counterinsurgency operations, coastal and river interdiction, and certain special tactical intelligence collection operations that are in addition to those intelligence functions normally required for planning and conducting special operations in a hostile environment. Also called NSW.
nuclear warfare(*) -- Warfare involving the employment of nuclear weapons. See also post-attack period; trans-attack period.
operations security -- A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. Identify those actions that can be observed by adversary intelligence systems. b. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries. c. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. Also called OPSEC. See also command and control warfare; operations security indicators; operations security measures; operations security planning guidance; operations security vulnerability.
perception management -- Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning; and to intelligence systems and leaders at all levels to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator's objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations. See also psychological operations. political warfare -- Aggressive use of political means to achieve national objectives.
psychological operations -- Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives. Also called PSYOP. See also perception management.
psychological warfare -- The planned use of propaganda and other psychological actions having the primary purpose of influencing the opinions, emotions, attitudes, and behavior of hostile foreign groups in such a way as to support the achievement of national objectives. Also called PSYWAR.
strategic air warfare -- Air combat and supporting operations designed to effect, through the systematic application of force to a selected series of vital targets, the progressive destruction and disintegration of the enemy's war-making capacity to a point where the enemy no longer retains the ability or the will to wage war. Vital targets may include key manufacturing systems, sources of raw material, critical material, stockpiles, power systems, transportation systems, communication facilities, concentration of uncommitted elements of enemy armed forces, key agricultural areas, and other such target systems.
tactical warning -- 1. A warning after initiation of a threatening or hostile act based on an evaluation of information from all available sources. 2. In satellite and missile surveillance, a notification to operational command centers that a specific threat event is occurring. The component elements that describe threat events are: Country of origin--country or countries initiating hostilities. Event type and size--identification of the type of event and determination of the size or number of weapons. Country under attack--determined by observing trajectory of an object and predicting its impact point. Event time--time the hostile event occurred. Also called integrated tactical warning. See also attack assessment; strategic warning.
tactical warning and assessment -- A composite term. See separate definitions for tactical warning and for attack assessment.
unconventional warfare -- A broad spectrum of military and paramilitary operations, normally of long duration, predominantly conducted by indigenous or surrogate forces who are organized, trained, equipped, supported, and directed in varying degrees by an external source. It includes guerrilla warfare and other direct offensive, low visibility, covert, or clandestine operations, as well as the indirect activities of subversion, sabotage, intelligence activities, and evasion and escape. Also called UW.
End of IW-D Report