03.04.2013 Views

jp1_02

jp1_02

jp1_02

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

As Amended Through 15 March 2013<br />

the purposes of preventing technological surprise, assessing foreign scientific and<br />

technical capabilities, and developing countermeasures designed to neutralize an<br />

adversary’s technological advantages. Also called TECHINT. See also exploitation;<br />

intelligence. (JP 2-0)<br />

technical nuclear forensics — The collection, analysis and evaluation of pre-detonation<br />

(intact) and post-detonation (exploded) radiological or nuclear materials, devices, and<br />

debris, as well as the immediate effects created by a nuclear detonation. (JP 3-41)<br />

technical operational intelligence — A Defense Intelligence Agency initiative to provide<br />

enhanced scientific and technical intelligence to the commanders of unified commands<br />

and their subordinates through a closed loop system involving all Service and Defense<br />

Intelligence Agency scientific and technical intelligence centers. Through a system<br />

manager in the National Military Joint Intelligence Center, the technical operational<br />

intelligence program provides timely collection, analysis, and dissemination of area of<br />

responsibility-specific scientific and technical intelligence to combatant commanders<br />

and their subordinates for planning, training, and executing joint operations. Also<br />

called TOPINT. (JP 2-0)<br />

technical review authority — The organization tasked to provide specialized technical or<br />

administrative expertise to the primary review authority or coordinating review<br />

authority for joint publications. Also called TRA. See also coordinating review<br />

authority; joint publication; primary review authority. (CJCSM 5120.01)<br />

technical surveillance countermeasures — Techniques and measures to detect and<br />

neutralize a wide variety of hostile penetration technologies that are used to obtain<br />

unauthorized access to classified and sensitive information. Technical penetrations<br />

include the employment of optical, electro-optical, electromagnetic, fluidic, and<br />

acoustic means as the sensor and transmission medium, or the use of various types of<br />

stimulation or modification to equipment or building components for the direct or<br />

indirect transmission of information meant to be protected. Also called TSCM. See<br />

also counterintelligence. (JP 2-01.2)<br />

techniques — Non-prescriptive ways or methods used to perform missions, functions, or<br />

tasks. See also procedures; tactics. (CJCSM 5120.01)<br />

telecommunications — Any transmission, emission, or reception of signs, signals, writings,<br />

images, sounds, or information of any nature by wire, radio, visual, or other<br />

electromagnetic systems. (JP 6-0)<br />

telemedicine — Rapid access to shared and remote medical expertise by means of<br />

telecommunications and information technologies to deliver health services and<br />

exchange health information for the purpose of improving patient care. (JP 4-<strong>02</strong>)<br />

tempest — An unclassified term referring to technical investigations for compromising<br />

emanations from electrically operated information processing equipment; these<br />

288 JP 1-<strong>02</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!