"Propaganda is obvious to anybody with any brains, but disinformation is
not. Sometimes more than 90 percent of the content of disinformation is
true. The thing that is important is to find the part that is false."
REVISION ONE
DoDD 3600.1 (Encl 1)
1-1
DEFINITIONS
1. Computer network attack (CNA). Operations to [manipulate] disrupt, deny,
degrade, or destroy information resident in computers and computer
networks, or the computers and networks themselves.
-OR-
1. Computer network attack (CNA): Operations using computer hardware or
software, or conducted through computers or computer networks, with the
intended objective or likely effect of disrupting, denying, degrading, or
destroying information resident in computers and computer networks, or the
computers and networks themselves.
2. Computer network defense (CND). Efforts to defend against the CNO of
others, especially that directed against U.S. and allied computer networks.
-OR-
2. Computer network defense (CND): Those measures, internal to the
protected entity, taken to protect and defend information, computers, and
networks from intrusion, exploitation, disruption, denial, degradation, or
destruction.
3. Computer network exploitation (CNE). Intelligence collection and
enabling operations to gather data from target adversary automated
information systems (AIS) or networks.
-OR-
3. Computer network exploitation (CNE): Intelligence collection and
enabling operations to gather data from target or adversary automated
information systems or networks. CNE is composed of two types of activities:
(1) enabling activities designed to obtain or facilitate access to the
target computer system where the purpose includes foreign intelligence
collection; and,
(2) collection activities designed to acquire foreign intelligence
information from the target computer system.
4. Computer network operations (CNO) Comprises CNA, CND and CNE collectively.
5. Computer network response (CNR) ["Active Computer Network Defense"]:
Those measures, that do not constitute CNA, taken to protect and defend
information, computers, and networks from disruption, denial, degradation,
destruction, or exploitation that involve activity external to the
protected entity. Computer Network Response, when authorized, may include
measures to determine the source of hostile CNA or CNE.
6. Deception. Those measures designed to mislead an adversary by
manipulation, distortion, or falsification of evidence to induce him to
react in a manner prejudicial to his interests.
7. Electronic warfare. Electromagnetic and directed energy used to control
the electromagnetic spectrum or to attack an adversary.
--------------------------------------------------------------------------------
7
REVISION ONE
DoDD 3600.1 (Encl 1)
1-2
8. Global Information Grid (GIG). The globally interconnected, end-to-end
set of information capabilities, associated processes, and personnel for
collecting, processing and storing, disseminating and managing information
on demand to warfighters, policy makers, and support personnel. The GIG
includes all [USG] owned and leased communications and computing systems
and services, software (including applications), data, security services,
and other associated services necessary to achieve Information Superiority.
9. Human Factors. The psychological, cultural, behavioral, and other human
attributes that influence decision making, the flow of information, and the
interpretation of information by individuals or groups at any level in a
state or organization.
10. Information. Facts, data, or instruction in any medium or form.
11. Information assurance (IA). IO that protect and defend information and
information systems by ensuring their availability, integrity,
authentication, confidentiality, and non-repudiation. This includes
providing for restoration of information systems by incorporating
protection, detection, and reaction capabilities.
12. Information superiority. The capabilities to collect, process, and
disseminate an uninterrupted flow of information while exploiting or
denying an adversary's ability to do the same.
13. Information system. The entire infrastructure, organization, personnel
and components that collect, process, store, transmit, display,
disseminate, and act on information.
14. Operations security (OPSEC). A process of identifying critical
information and subsequently analyzing friendly actions attendant to
military operations and other activities to:
a. Identify those actions that can be observed by adversary intelligence
systems;
b. Determine indicators hostile intelligence systems might obtain that
could be interpreted or pieced together to derive critical information in
time to be useful to adversaries; c. Select and execute measures that
eliminate or reduce to an acceptable level the vulnerabilities of friendly
actions to adversary exploitation.
15. Psychological operations (PSYOP). Planned operations to convey selected
information and indicators to foreign audiences to influence their
emotions, motives, objective reasoning, and ultimately the behavior of
foreign governments, organizations, groups, and individuals. The purpose of
Psychological Operations is to induce or reinforce foreign attitudes and
behavior favorable to the originator's objectives.
[End directive.]
http://cryptome.org/dodd3600-1.htm