IW-D Table of Contents

Jump to APPENDIX H: Glossary


INFORMATION WARFARE - DEFENSE


APPENDIX G

LIST OF ACRONYMS

ABIS             Advanced Battlefield Information System 

ACTD             Advanced Concepts Technology Demonstration 

Active X         See Appendix H, Glossary 

Arch             Architecture 

ASD(C3I)         Assistant Secretary of Defense for Command, Control,

                 Communications and Intelligence 

ATD              Advanced Technology Demonstration 



C2               Command and Control 

C3               Command, Control and Communications 

C3I              Command, Control, Communications and Intelligence 

C4I              Command and Control, Communications, Computers and Intelligence 

C4ISR            Command and Control, Communications, Computer Intelligence,                  

                 Surveillance and Reconnaissance 

CDR              Commander (USN designation of rank) 

CIA              Central Intelligence Agency 

CINC             Commander in Chief 

CIO              Chief Information Officer 

CIP              Critical Infrastructure Protection 

CJCS             Chairman, Joint Chiefs of Staff 

Conv.            Conventional 

CONUS            Continental United States 

Coord.           Coordination 

CSA              CINCs/Service/Agencies 

CSAAS            Combat Support Agency Assessment System 

CSPAR            CINCs Preparedness Assessment Report 

Ctr              Center 



DASD             Deputy Assistant Secretary of Defense 

DCI              Director of Central Intelligence 

DEPSECDEF        Deputy Secretary of Defense 

Des              Design 

DIA              Defense Intelligence Agency 

DII              Defense Information Infrastructure 

DIS              Defense Investigative Service 

DISA             Defense Information Systems Agency 

DoC              Department of Commerce 

DoD              Department of Defense 

DoDD             Department of Defense Directive 

DoE              Department of Energy 

DoJ              Department of Justice 

DoT              Department of Transportation 



EEI              Essential Elements of Information 



FBI              Federal Bureau of Investigation 

FEMA             Federal Emergency Management Agency 



GAO              Government Accounting Office 

GII              Global Information Infrastructure

 

HUMINT           Human Intelligence 



I&W/TA           Indication and Warning/Threat Assessment 

IC               Intelligence Community 

Info.            Information 

Intel            Intelligence 

IT               Information Technology 

IW               Information Warfare 

IW-D             Information Warfare-Defense

 

JAVA             See Appendix H, Glossary 

JWCA             Joint Warfare Analysis Center 



MEII             Minimum Essential Information Infrastructure 

Mil Deps         Military Departments 



NCS              National Communications System 

NEC              National Economic Council 

NII              National Information Infrastructure 

NRC              National Research Council 

NSA              National Security Agency 

NSC              National Security Council 

NSIE             Network Security Information Exchange 

NSTAC            National Security Telecommunications Advisory Board 

Nuc.             Nuclear 



OCONUS           Outside of CONUS 

Off              Office 

OMB              Office of Management and Budget 

Ops              Operations 

OSTP             Office of Science and Technology Policy 

OUSD(A&T)        Office of the USD(A&T) 

OUSD(P)          Office of the USD(P) 



Plan             Planning 

PSA              Principle Staff Assistant 

PSN              Public Switched Network

 

Ret.             Retired 



SECDEF           Secretary of Defense 

SORTS            Status of Resources and Training System 



TOR              Terms of Reference 

Treas            Department of the Treasury 



U.S.             United States 

USAF             United States Air Force 

USD(A&T)         Under Secretary of Defense for Acquisition and Technology 

USD(C)           Under Secretary of Defense, Comptroller 

USD(P&R)         Under Secretary of Defense for Personnel and Readiness 

USD(P)           Under Secretary of Defense for Policy 

USN              United States Navy 



VADM             Vice Admiral 



WARM             War-time Mode 


IW-D Table of Contents


INFORMATION WARFARE - DEFENSE


APPENDIX H

GLOSSARY

Source: Joint Pub 1-02, Department of Defense Dictionary of Military and Associated Terms, 23 March 1994. The DOD Dictionary of Military and Associated Terms," is promulgated for mandatory use by the Office of the Secretary of Defense, Military Departments, Joint Staff, combatant commands, and Defense agencies. Those terms approved for both DOD and NATO use are marked with an asterisk within parentheses, i.e.. (*). Other sources are indicated by brackets, e.g., [CJCSI 3210.01, 1996].

acoustic warfare(*) -- Action involving the use of underwater acoustic energy to determine, exploit, reduce or prevent hostile use of the underwater acoustic spectrum and actions which retain friendly use of the underwater acoustic spectrum. There are three divisions within acoustic warfare: 1. acoustic warfare support measures. That aspect of acoustic warfare involving actions to search for, intercept, locate, record and analyze radiated acoustic energy in water for purpose of exploiting such radiations. The use of acoustic warfare support measures involves no intentional underwater acoustic emission and is generally not detectable by the enemy. 2. acoustic warfare countermeasures. That aspect of acoustic warfare involving actions taken to prevent or reduce an enemy's effective use of the underwater acoustic spectrum. Acoustic warfare countermeasures involve intentional underwater acoustic emissions for deception and jamming. 3. acoustic warfare counter-countermeasures. That aspect of acoustic warfare involving actions taken to ensure friendly effective use of the underwater acoustic spectrum despite the enemy's use of underwater acoustic warfare. Acoustic warfare counter-countermeasures involve anti-acoustic warfare support measures and anti-acoustic warfare countermeasures, and ma not involve underwater acoustic emissions.

acoustic warfare counter-countermeasures -- See acoustic warfare Part 3.

acoustic warfare countermeasures -- See acoustic warfare Part 2.

acoustic warfare support measures -- See acoustic warfare Part 1.

active air defense(*) -- Direct defensive action taken to nullify or reduce the effectiveness of hostile air action. It includes such measures as the use of aircraft, air defense weapons, weapons not used primarily in an air defense role, and electronic warfare. See also air defense.

Active X -- A name for a version of Distributed Object Linking and Embedding (OLE) that enables sharing of data, links, and controls over a network (primarily for interoperability among Windows-based software).

anti-air warfare -- A U.S. Navy/U.S. Marine Corps term used to indicate that action required to destroy or reduce to an acceptable level the enemy air and missile threat. It includes such measures as the use of interceptors, bombers, antiaircraft guns, surface-to-air and air-to-air missiles, electronic attack, and destruction of the air or missile threat both before and after it is launched. Other measures which are taken to minimize the effects of hostile air action are cover, concealment, dispersion, deception (including electronic), and mobility. See also counter air.

antisubmarine operation -- Operation contributing to the conduct of antisubmarine warfare.

antisubmarine warfare(*) -- Operations conducted with the intention of denying the enemy the effective use of submarines.

attack assessment -- An evaluation of information to determine the potential or actual nature and objectives of an attack for the purpose of providing information for timely decisions. See also damage estimation.

biological operation(*) -- Employment of biological agents to produce casualties in personnel or animals and damage to plants or materiel; or defense against such employment

biological operation(*) -- Employment of biological agents to produce casualties in personnel or animals and damage to plants or materiel; or defense against such employment. biological warfare--See biological operation.

C2-protection -- See command and control warfare.

chemical warfare -- All aspects of military operations involving the employment of lethal and incapacitating munitions/agents and the warning and protective measures associated with such offensive operations. Since riot control agents and herbicides are not considered to be chemical warfare agents, those two items will be referred to separately or under the broader term "chemical," which will be used to include all types of chemical munitions/agents collectively. The term "chemical warfare weapons" may be used when it is desired to reflect both lethal and incapacitating munitions/agents of either chemical or biological origin. Also called CW. See also chemical operations, herbicide, riot control agent.

combined warfare -- Warfare conducted by forces of two or more allied nations in coordinated action toward common objectives.

command and control warfare -- The integrated use of operations security (OPSEC), military deception, psychological operations (PSYOP), electronic warfare (EW), and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions. Command and control warfare applies across the operational continuum and all levels of conflict. Also called C2W. C2W is both offensive and defensive: a. counter-C2 -- To prevent effective C2 of adversary forces by denying information to, influencing, degrading, or destroying the adversary C2 system. b. C2-protection -- To maintain effective command and control of own forces by turning to friendly advantage or negating adversary efforts to deny information to, influence, degrade, or destroy the friendly C2 system. See also command and control; electronic warfare; intelligence; military deception; operations security; psychological operations.

counterguerrilla warfare(*) -- Operations and activities conducted by armed forces, paramilitary forces, or nonmilitary agencies against guerrillas.

damage estimation -- A preliminary appraisal of the potential effects of an attack. See also attack assessment.

directed-energy protective measures -- That division of directed-energy warfare involving actions taken to protect friendly equipment, facilities, and personnel to ensure friendly effective uses of the electromagnetic spectrum that are threatened by hostile directed-energy weapons and devices.

directed-energy warfare -- Military action involving the use of directed-energy weapons, devices, and countermeasures to either cause direct damage or destruction of enemy equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum through damage, destruction, and disruption. It also includes actions taken to protect friendly equipment, facilities, and personnel and retain friendly use of the electromagnetic spectrum. Also called DEW. See also directed energy; directed-energy device; directed-energy weapon; electromagnetic spectrum; electronic warfare.

directed-energy weapon -- A system using directed energy primarily as a direct means to damage or destroy enemy equipment, facilities, and personnel. See also directed energy; directed energy device. economic warfare--Aggressive use of economic means to achieve national objectives.

electromagnetic intrusion -- The intentional insertion of electromagnetic energy into transmission paths in any manner, with the objective of deceiving operators or of causing confusion. See also electronic warfare.

electronic warfare -- Any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Also called EW. The three major subdivisions within electronic warfare are: electronic attack, electronic protection, and electronic warfare support. a. electronic attack -- That division of electronic warfare involving the use of electromagnetic or directed energy to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability. Also called EA. EA includes: 1) actions taken to prevent or reduce an enemy's effective use of the electromagnetic spectrum, such as jamming and electromagnetic deception, and 2) employment of weapons that use either electromagnetic or directed energy as their primary destructive mechanism (lasers, radio frequency weapons, particle beams). b. electronic protection -- That division of electronic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy employment of electronic warfare that degrade, neutralize, or destroy friendly combat capability. Also called EP. c. electronic warfare support -- That division of electronic warfare involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate sources of intentional and unintentional radiated electromagnetic energy for the purpose of immediate threat recognition. Thus, electronic warfare support provides information required for immediate decisions involving electronic warfare operations and other tactical actions such as threat avoidance, targeting, and homing. Also called ES. Electronic warfare support data can be used to produce signals intelligence (SIGINT), both communications intelligence (COMINT), and electronics intelligence (ELINT). See also command and control warfare; communications intelligence; directed energy; directed-energy device; directed-energy warfare; directed-energy weapon; electromagnetic compatibility; electromagnetic deception; electromagnetic hardening; electromagnetic jamming; electromagnetic spectrum; electronics intelligence; frequency deconfliction; signals intelligence; spectrum management; suppression of enemy air defenses.

guerrilla warfare(*) -- Military and paramilitary operations conducted in enemy-held or hostile territory by irregular, predominantly indigenous forces. See also unconventional warfare.

indications and warning -- Those intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the United States or allied military, political, or economic interests or to U.S. citizens abroad. It includes forewarning of enemy actions or intentions; the imminence of hostilities; insurgency; nuclear/non-nuclear attack on the United States, its overseas forces, or allied nations; hostile reactions to United States reconnaissance activities; terrorists' attacks; and other similar events.

information warfare -- Actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems, and computer-based networks while defending one's own information, information-based processes, information systems, and computer-based networks. [CJCSI 3210.01, 1996]

integrated warfare -- The conduct of military operations in any combat environment wherein opposing forces employ non-conventional weapons in combination with conventional weapons.

JAVA -- An object-oriented, platform-independent programming language, often used to create small cross-program executable software applications called applets that are downloaded from remote sites and that execute automatically.

mine warfare -- The strategic, operational, and tactical use of mines and mine countermeasures. Mine warfare is divided into two basic subdivisions: the laying of mines to degrade the enemy's capabilities to wage land, air, and maritime warfare; and the countering of enemy-laid mines to permit friendly maneuver or use of selected land or sea areas.

naval coastal warfare -- Coastal sea control, harbor defense, and port security, executed both in coastal areas outside the United States in support of national policy and in the United States as part of this Nation's defense. Also called NCW.

naval special warfare -- A specific term describing a designated naval warfare specialty and covering operations generally accepted as being unconventional in nature and, in many cases, covert or clandestine in character. These operations include using specially trained forces assigned to conduct unconventional warfare, psychological operations, beach and coastal reconnaissance, operational deception operations, counterinsurgency operations, coastal and river interdiction, and certain special tactical intelligence collection operations that are in addition to those intelligence functions normally required for planning and conducting special operations in a hostile environment. Also called NSW.

nuclear warfare(*) -- Warfare involving the employment of nuclear weapons. See also post-attack period; trans-attack period.

operations security -- A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. Identify those actions that can be observed by adversary intelligence systems. b. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries. c. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. Also called OPSEC. See also command and control warfare; operations security indicators; operations security measures; operations security planning guidance; operations security vulnerability.

perception management -- Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning; and to intelligence systems and leaders at all levels to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator's objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations. See also psychological operations. political warfare -- Aggressive use of political means to achieve national objectives.

psychological operations -- Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. The purpose of psychological operations is to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives. Also called PSYOP. See also perception management.

psychological warfare -- The planned use of propaganda and other psychological actions having the primary purpose of influencing the opinions, emotions, attitudes, and behavior of hostile foreign groups in such a way as to support the achievement of national objectives. Also called PSYWAR.

strategic air warfare -- Air combat and supporting operations designed to effect, through the systematic application of force to a selected series of vital targets, the progressive destruction and disintegration of the enemy's war-making capacity to a point where the enemy no longer retains the ability or the will to wage war. Vital targets may include key manufacturing systems, sources of raw material, critical material, stockpiles, power systems, transportation systems, communication facilities, concentration of uncommitted elements of enemy armed forces, key agricultural areas, and other such target systems.

tactical warning -- 1. A warning after initiation of a threatening or hostile act based on an evaluation of information from all available sources. 2. In satellite and missile surveillance, a notification to operational command centers that a specific threat event is occurring. The component elements that describe threat events are: Country of origin--country or countries initiating hostilities. Event type and size--identification of the type of event and determination of the size or number of weapons. Country under attack--determined by observing trajectory of an object and predicting its impact point. Event time--time the hostile event occurred. Also called integrated tactical warning. See also attack assessment; strategic warning.

tactical warning and assessment -- A composite term. See separate definitions for tactical warning and for attack assessment.

unconventional warfare -- A broad spectrum of military and paramilitary operations, normally of long duration, predominantly conducted by indigenous or surrogate forces who are organized, trained, equipped, supported, and directed in varying degrees by an external source. It includes guerrilla warfare and other direct offensive, low visibility, covert, or clandestine operations, as well as the indirect activities of subversion, sabotage, intelligence activities, and evasion and escape. Also called UW.


End of IW-D Report