Vous êtes sur la page 1sur 8

UNCONTROLLED IF PRINTED

ADDP 3.5

GLOSSARY
Unless stated otherwise, approved ADF terms and definitions are used within this publication. Externally sourced terms and definitions, herewith approved for ADF use, have the source designated in brackets following the definition, using the following legend: NATO Allied Administrative Publication6, NATO Glossary of Terms and Definitions, 2006 (AAP6).

communications intelligence Intelligence derived from electromagnetic communications by those who are not the intended recipients of the information (see also signals intelligence). communications security The protection resulting from the application of cryptographic security, transmission security and emission security measures to telecommunications and from application of physical security measures to communications security information. These measures are taken to deny information of value to unauthorised persons which might be derived from the possession and study of such telecommunications, or to ensure the authenticity of such telecommunications. computer network attack Operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. computer network defence Defensive measures to protect and defend information, computers and computer networks from disruption, denial, degradation or destruction. computer network exploitation The exploitation of information resident in computers and computer networks, or the computers and networks themselves. Computer network exploitation may involve the use of electronic attack (EA) or computer network attack (adapted from US JP 351). computer security The protection resulting from all measurs to deny unauthorised access and exploitation of friendly computer systems.

UNCONTROLLED IF PRINTED
ADDP 3.5

cryptoanalysis The analysis of encrypted texts, and particularly the steps or processes involved in converting encrypted text into plain text without initial knowledge of the encryption key. cryptology (cryptography) The art or science which treats the various means and methods for rendering plain text unintelligible, and reconverting cipher text into intelligible form or the application thereof by means other than cryptoanalysis. electromagnetic spectrum That range of frequencies in which oscillating electric and magnetic fields propagate waves at the speed of light. The electromagnetic spectrum (EMS) includes cosmic and gamma radiation, X-rays, ultraviolet, visible and infra-red radiation and radio waves. electronic attack That division of electronic warfare (EW) involving actions taken to prevent or reduce an enemy's effective use of the EMS through the use of electromagnetic energy. There are three subdivisions of EA: electronic jamming, electronic deception and electronic neutralisation. (NATO) electronic intelligence Is intelligence derived from electromagnetic non-communications transmissions by those who are not the intended recipients of the information (see also signals intelligence). electronic protection That division of EW involving actions taken to ensure effective friendly use of the EMS despite the enemys use of electromagnetic energy. There are two subdivisions of electronic protective measures: active electronic protective measures and passive electronic protective measures. (NATO) electronic support That division of EW involving actions taken to search for, intercept, locate, record and analyse radiated electromagnetic energy for the purpose of exploiting such radiations in support of military operations. Thus, electronic support (ES) provides a source of EW information required to conduct EA, electronic protection, threat detection, warning, avoidance, target acquisition and homing.

UNCONTROLLED IF PRINTED
ADDP 3.5

electronic warfare EW is defined as military action to exploit the EMS which encompasses the interception and identification of electromagnetic emissions, the employment of electromagnetic energy, including directed energy, to reduce or prevent hostile use of the EMS and actions to ensure its effective use by friendly forces. (NATO) emission control Measures taken to minimise the use of electronic emissions by friendly forces to prevent premature disclosure of the presence and composition of a force. emission security Emission security encompasses all measures taken to deny intelligence which may be derived from the intercept of friendly non-communications transmissions. Non-communications systems include cryptographic systems and information technology systems. essential elements of friendly information Those elements of friendly information which, if known by an adversary, would compromise friendly plans or operations through indicators of dispositions, capabilities and intentions. friendly force information requirements Information regarding the activities or capabilities of own or adjacent units is referred to as friendly forces information requirements. foreign instrumentation signals intelligence Is intelligence derived from intercepting signals from telemetry, beaconry, electronic interrogators, and tracking, fusing, arming and command guidance systems (see also signals intelligence). guarded frequencies Frequencies from which intelligence is derived as a result of ES against adversary electronic systems are termed guarded frequencies. A guarded frequency may be subject to EA attack if a commander considers the tactical advantage to be gained outweighs the consequent loss of intelligence. human intelligence A category of intelligence derived from information collected and provided by human sources.

UNCONTROLLED IF PRINTED
ADDP 3.5

imagery intelligence Intelligence derived from the exploitation of collection by visual photography, infrared sensors, lasers, electro-optics and radar sensors such as synthetic aperture radar wherein images of objects are reproduced optically or electronically on film, electronic display devices or other media. information security The protection of information and information systems against unauthorised access or modification of information, whether in storage, processing, or transit and against denial of service to authorised users. Information security includes those measures necessary to detect, document and counter such threats. Information security consists of computer security and electromagnetic security. intelligence Intelligence is the product resulting from the processing of information concerning a potential threat, hostile or potentially hostile forces or elements, or areas of actual or potential operations. It is the result of a process involving the evaluation, analysis, integration and interpretation of disparate pieces of information, usually in conjunction with existing information and intelligence, to attempt to clarify a situation and produce meaningful conclusions, assessments and predictions in response to the decision-makers intelligence needs. measurement and signatures intelligence Scientific and technical intelligence derived from the analysis of data obtained from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latters measurement and identification. (NATO) protected frequencies These are frequencies designated to be used by friendly forces for a particular operation and free from friendly EA either for the duration of the operation or at specified times. signals intelligence This is the generic term used to describe all intelligence derived from exploitation of the EMS. Signals intelligence comprises; communications intelligence, electronic intelligence and foreign instrumentation signals intelligence.

UNCONTROLLED IF PRINTED
ADDP 3.5

taboo frequencies Frequencies that are of such importance to friendly operations that friendly EA may not be employed on them, eg distress frequencies, vital communications frequencies or early warning air defence radar frequencies, are termed taboo frequencies. wartime reserve modes Characteristics or operating procedures of equipment or systems which are held in reserve for war or crisis. (NATO)

UNCONTROLLED IF PRINTED
ADDP 3.5

ACRONYMS AND ABBREVIATIONS


1 ATF ABCA ADDP ADF ASCC Bn C2 CCIR CDF CIS CJOPS COA Comd JTF COMPSEC COMSEC Coy CSG CSS CV DGJOPS DJFHQ DSD DSDLO EA EEFI EMCON EMS EMSEC EOB EP ES EW GHQ HQ HQJOC INFOSEC IO IR 1st Australian Task Force American, British, Canadian and Australian Australian Defence Doctrine Publication Australian Defence Force Air Standardisation Coordinating Committee Battalion command and control commanders critical information requirements Chief of the Defence Force communication and information systems Chief of Joint Operations course of action Commander Joint Task Force computer security communications security Company Cryptologic Services Group combat support system critical vulnerabilities Director-General Joint Operations and Plans Deployable Joint Force Headquarters Defence Signals Directorate Defence Signals Directorate Liaison Officer electronic attack essential elements of friendly information emission control electromagnetic spectrum emission security electronic order of battle electronic protection electronic support electronic warfare General Headquarters headquarters Headquarters Joint Operations Command information security information operations information requirements

UNCONTROLLED IF PRINTED
ADDP 3.5

JEWCC JEWPG JIPB JMAP JTF MINDEF NATO NCW OGA OGD OPINST OPORD OPSEC OS RAAF RAN Regt ROE SIGINT UK US WP WU

joint electronic warfare coordination centre Joint Electronic Warfare Planning Group joint intelligence preparation of the battlespace joint military appreciation process joint task force Minister for Defence North Atlantic Treaty Organisation Network Centric Warfare other government agencies other government departments operational instruction operation order operations security offensive support Royal Australian Air Force Royal Australian Navy Regiment rules of engagement signals intelligence United Kingdom United States Working Party wireless units

Vous aimerez peut-être aussi