End
description
Transcript of End
-
ADDP 3.5
GLOSSARYUnless stated otherwise, approved ADF terms and definitions are used within this publication. Externally sourced terms and definitions, herewith approved for ADF use, have the source designated in brackets following the definition, using the following legend:
communications inIntelligence dwho are notsignals intell
communications seThe protectiotransmission telecommunimeasures to are taken to dmight be dtelecommunitelecommuni
computer network Operations toin computersthemselves.
computer network Defensive mand computdestruction.
computer network The exploitatnetworks, ornetwork explcomputer net
computer securityThe protectioand exploitat
NATO Allied Administrative Publication6, NATO Glossary of Terms and Definitions, 2006 (AAP6).telligenceerived from electromagnetic communications by those the intended recipients of the information (see also igence).
curityn resulting from the application of cryptographic security,
security and emission security measures to cations and from application of physical security communications security information. These measures eny information of value to unauthorised persons which erived from the possession and study of such
cations, or to ensure the authenticity of such cations.
attack disrupt, deny, degrade, or destroy information resident
and computer networks, or the computers and networks
defence easures to protect and defend information, computers er networks from disruption, denial, degradation or
exploitation ion of information resident in computers and computer the computers and networks themselves. Computer oitation may involve the use of electronic attack (EA) or work attack (adapted from US JP 351).
n resulting from all measurs to deny unauthorised access ion of friendly computer systems.
-
ADDP 3.5
2
cryptoanalysisThe analysis of encrypted texts, and particularly the steps or processes involved in converting encrypted text into plain text without initial knowledge of the encryption key.
cryptology (cryptography)The art or science which treats the various means and methods for rendering plain text unintelligible, and reconverting cipher text into intelligible focryptoanalysi
electromagnetic spThat range ofields propagspectrum (Eultraviolet, vis
electronic attack That divisionprevent or reuse of electrelectronic jam(NATO)
electronic intelligenIs intelligenctransmissionsinformation (s
electronic protectioThat division use of the EMThere are twelectronic prmeasures. (N
electronic support That divisionlocate, recordpurpose of exThus, electrorequired to warning, avorm or the application thereof by means other than s.
ectrum f frequencies in which oscillating electric and magnetic ate waves at the speed of light. The electromagnetic MS) includes cosmic and gamma radiation, X-rays, ible and infra-red radiation and radio waves.
of electronic warfare (EW) involving actions taken to duce an enemy's effective use of the EMS through the omagnetic energy. There are three subdivisions of EA: ming, electronic deception and electronic neutralisation.
cee derived from electromagnetic non-communications by those who are not the intended recipients of the ee also signals intelligence).
n of EW involving actions taken to ensure effective friendly S despite the enemys use of electromagnetic energy.
o subdivisions of electronic protective measures: active otective measures and passive electronic protective ATO)
of EW involving actions taken to search for, intercept, and analyse radiated electromagnetic energy for the ploiting such radiations in support of military operations. nic support (ES) provides a source of EW information conduct EA, electronic protection, threat detection,
idance, target acquisition and homing.
-
ADDP 3.5
electronic warfare EW is defined as military action to exploit the EMS which encompasses the interception and identification of electromagnetic emissions, the employment of electromagnetic energy, including directed energy, to reduce or prevent hostile use of the EMS and actions to ensure its effective use by friendly forces. (NATO)
emission control Measures taken to minimise the use of electronic emissions by friendly forces to prevent premature disclosure of the presence and composition o
emission security Emission seintelligence wnon-communinclude crypto
essential elementsThose elemadversary, windicators of
friendly force inforInformation runits is referr
foreign instrumentIs intelligencbeaconry, elecommand gu
guarded frequencieFrequencies against advfrequencies. commander cthe conseque
human intelligenceA category oprovided by h3
f a force.
curity encompasses all measures taken to deny hich may be derived from the intercept of friendly
ications transmissions. Non-communications systems graphic systems and information technology systems.
of friendly information ents of friendly information which, if known by an ould compromise friendly plans or operations through dispositions, capabilities and intentions.
mation requirements egarding the activities or capabilities of own or adjacent ed to as friendly forces information requirements.
ation signals intelligence e derived from intercepting signals from telemetry, ctronic interrogators, and tracking, fusing, arming and
idance systems (see also signals intelligence).
s from which intelligence is derived as a result of ES ersary electronic systems are termed guarded A guarded frequency may be subject to EA attack if a onsiders the tactical advantage to be gained outweighs nt loss of intelligence.
f intelligence derived from information collected and uman sources.
-
ADDP 3.5
4
imagery intelligence Intelligence derived from the exploitation of collection by visual photography, infrared sensors, lasers, electro-optics and radar sensors such as synthetic aperture radar wherein images of objects are reproduced optically or electronically on film, electronic display devices or other media.
information securityThe protection of information and information systems against unauthorisedstorage, proauthorised unecessary tosecurity cons
intelligenceIntelligence isconcerning aelements, or process invinterpretationwith existingsituation andpredictions in
measurement and Scientific andobtained fromdistinctive feafacilitate the l
protected frequencThese are freparticular opethe operation
signals intelligenceThis is the geexploitation communicatioinstrumentati access or modification of information, whether in cessing, or transit and against denial of service to sers. Information security includes those measures detect, document and counter such threats. Information ists of computer security and electromagnetic security.
the product resulting from the processing of information potential threat, hostile or potentially hostile forces or areas of actual or potential operations. It is the result of a olving the evaluation, analysis, integration and of disparate pieces of information, usually in conjunction information and intelligence, to attempt to clarify a produce meaningful conclusions, assessments and response to the decision-makers intelligence needs.
signatures intelligence technical intelligence derived from the analysis of data sensing instruments for the purpose of identifying any tures associated with the source, emitter or sender, to
atters measurement and identification. (NATO)
ies quencies designated to be used by friendly forces for a ration and free from friendly EA either for the duration of or at specified times.
neric term used to describe all intelligence derived from of the EMS. Signals intelligence comprises; ns intelligence, electronic intelligence and foreign
on signals intelligence.
-
ADDP 3.5
taboo frequencies Frequencies that are of such importance to friendly operations that friendly EA may not be employed on them, eg distress frequencies, vital communications frequencies or early warning air defence radar frequencies, are termed taboo frequencies.
wartime reserve modes Characteristics or operating procedures of equipment or systems which are held in reserve for war or crisis. (NATO)5
-
ADDP 3.5
ACRONYMS AND ABBREVIATIONS1 ATF 1st Australian Task ForceABCA American, British, Canadian and AustralianADDP Australian Defence Doctrine PublicationADF Australian Defence ForceASCC Air Standardisation Coordinating Committee
Bn Battalion
C2CCIRCDFCISCJOPSCOAComd JTFCOMPSECCOMSECCoyCSGCSSCV
DGJOPSDJFHQDSDDSDLO
EAEEFIEMCONEMSEMSECEOBEPESEW
GHQHQHQJOC
INFOSECIOIR7
command and controlcommanders critical information requirementsChief of the Defence Forcecommunication and information systemsChief of Joint Operationscourse of actionCommander Joint Task Forcecomputer securitycommunications securityCompanyCryptologic Services Groupcombat support systemcritical vulnerabilities
Director-General Joint Operations and PlansDeployable Joint Force HeadquartersDefence Signals DirectorateDefence Signals Directorate Liaison Officer
electronic attackessential elements of friendly informationemission controlelectromagnetic spectrumemission securityelectronic order of battleelectronic protectionelectronic supportelectronic warfare
General HeadquartersheadquartersHeadquarters Joint Operations Command
information securityinformation operationsinformation requirements
-
ADDP 3.5
8
JEWCC joint electronic warfare coordination centreJEWPG Joint Electronic Warfare Planning GroupJIPB joint intelligence preparation of the battlespaceJMAP joint military appreciation processJTF joint task force
MINDEF Minister for Defence
NATO North Atlantic Treaty OrganisationNCW Network Centric Warfare
OGAOGDOPINSTOPORDOPSECOS
RAAFRANRegtROE
SIGINT
UKUS
WPWUother government agenciesother government departmentsoperational instruction operation orderoperations securityoffensive support
Royal Australian Air ForceRoyal Australian NavyRegimentrules of engagement
signals intelligence
United KingdomUnited States
Working Partywireless units
Back to ListHomeSearchResultsPrintExitContentsGlossaryAcronyms and Abbreviations
print_field: UNCONTROLLED IF PRINTED