18.02.2015 Views

ITACG Intelligence Guide for First Responders 2nd Edition - ISE.gov

ITACG Intelligence Guide for First Responders 2nd Edition - ISE.gov

ITACG Intelligence Guide for First Responders 2nd Edition - ISE.gov

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

intelligence guide <strong>for</strong> first responders - <strong>2nd</strong> edition | references<br />

98<br />

Network: A structure of interconnecting components designed to communicate with each other<br />

and per<strong>for</strong>m a function or functions as a unit in a specified manner.<br />

No Fly: An individual not permitted to board commercial flights because of terrorism concerns.<br />

No-Fly List: A list created and maintained by the U.S. Government to keep known or suspected<br />

terrorists from boarding and flying on commercial flights.<br />

O<br />

Open Source: In<strong>for</strong>mation of potential intelligence value that is available to the general public<br />

that can be used to enhance intelligence analysis and reporting.<br />

Open-Source <strong>Intelligence</strong> (OSINT): Publicly available in<strong>for</strong>mation appearing in print or electronic<br />

<strong>for</strong>m, including radio, television, newspapers, journals, the Internet, commercial databases, and<br />

videos, graphics, and drawings used to enhance intelligence analysis and reporting.<br />

Operational <strong>Intelligence</strong>: (1) <strong>Intelligence</strong> required <strong>for</strong> planning and executing operations. (2)<br />

In<strong>for</strong>mation on an active or potential target, such as a group or individual, relevant premises,<br />

contact points, and methods of communication, that is evaluated and systematically organized.<br />

The process is developmental in nature wherein there are sufficient articulated reasons to<br />

suspect nefarious activity.<br />

Operations Security: A systematic, proven process by which a <strong>gov</strong>ernment, organization,<br />

or individual can identify, control, and protect generally unclassified in<strong>for</strong>mation about an<br />

operation/activity and thus, deny or mitigate an adversary’s/competitor’s ability to compromise<br />

or interrupt said operation/activity.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!