"Propaganda is obvious to anybody with any brains, but disinformation is not. Sometimes more than 90 percent of the content of disinformation is true. The thing that is important is to find the part that is false."
REVISION ONE

DoDD 3600.1 (Encl 1)

1-1

DEFINITIONS

1. Computer network attack (CNA). Operations to [manipulate] disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.

-OR-

1. Computer network attack (CNA): Operations using computer hardware or software, or conducted through computers or computer networks, with the intended objective or likely effect of disrupting, denying, degrading, or destroying information resident in computers and computer networks, or the computers and networks themselves.

2. Computer network defense (CND). Efforts to defend against the CNO of others, especially that directed against U.S. and allied computer networks.

-OR-

2. Computer network defense (CND): Those measures, internal to the protected entity, taken to protect and defend information, computers, and networks from intrusion, exploitation, disruption, denial, degradation, or destruction.

3. Computer network exploitation (CNE). Intelligence collection and enabling operations to gather data from target adversary automated information systems (AIS) or networks.

-OR-

3. Computer network exploitation (CNE): Intelligence collection and enabling operations to gather data from target or adversary automated information systems or networks. CNE is composed of two types of activities:

(1) enabling activities designed to obtain or facilitate access to the target computer system where the purpose includes foreign intelligence collection; and,
(2) collection activities designed to acquire foreign intelligence information from the target computer system.

4. Computer network operations (CNO) Comprises CNA, CND and CNE collectively.

5. Computer network response (CNR) ["Active Computer Network Defense"]: Those measures, that do not constitute CNA, taken to protect and defend information, computers, and networks from disruption, denial, degradation, destruction, or exploitation that involve activity external to the protected entity. Computer Network Response, when authorized, may include measures to determine the source of hostile CNA or CNE.

6. Deception. Those measures designed to mislead an adversary by manipulation, distortion, or falsification of evidence to induce him to react in a manner prejudicial to his interests.

7. Electronic warfare. Electromagnetic and directed energy used to control the electromagnetic spectrum or to attack an adversary.



--------------------------------------------------------------------------------
7
REVISION ONE

DoDD 3600.1 (Encl 1)

1-2

8. Global Information Grid (GIG). The globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing and storing, disseminating and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes all [USG] owned and leased communications and computing systems and services, software (including applications), data, security services, and other associated services necessary to achieve Information Superiority.

9. Human Factors. The psychological, cultural, behavioral, and other human attributes that influence decision making, the flow of information, and the interpretation of information by individuals or groups at any level in a state or organization.

10. Information. Facts, data, or instruction in any medium or form.

11. Information assurance (IA). IO that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

12. Information superiority. The capabilities to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same.

13. Information system. The entire infrastructure, organization, personnel and components that collect, process, store, transmit, display, disseminate, and act on information.

14. Operations security (OPSEC). A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to:

a. Identify those actions that can be observed by adversary intelligence systems;
b. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; c. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation.

15. Psychological operations (PSYOP). Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals. The purpose of Psychological Operations is to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives.

[End directive.]

http://cryptome.org/dodd3600-1.htm

Reply via email to