Simple Browser : Welcome guest : log in
Home |  Graph |  ]  KB:  Language:   

Formal Language: 



KB Term: 

  CTIntelligenceOperation

Sigma KEE - CTIntelligenceOperation
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
CTIntelligenceOperation
Intelligence Operations. These are operations to collect, exploit, and report information on terrorist organizations, personnel, assets, and/or activities. SOF have the capability to conduct these operations in an overt, covert, and/or clandestine manner.
Relationships      
Parents CounterTerrorism These are operations that include the offensive measures taken to prevent, deter, preempt, and respond to terrorism. SOF's role and additive capability is to conduct offensive measures within DOD's overall combatting terrorism efforts. SOF conduct CT missions as special operations by covert, clandestine, or low visibility means. SOF's activities within CT include, but are not limited to, intelligence operations, attacks against terrorist networks and infrastructures, hostage rescue, recovery of sensitive material from terrorist organizations, and non-kinetic activities aimed at the ideologies or motivations that spawn terrorism. (1) Intelligence Operations. These are operations to collect, exploit, and report information on terrorist organizations, personnel, assets, and/or activities. SOF have the capability to conduct these operations in an overt, covert, and/or clandestine manner. (2) Network and Infrastructure Attacks. These are operations that involve preemptive strikes against terrorist organizations with the objective of destroying, disorganizing, or disarming terrorist organizations before they can strike targets of national interest. (3) Hostage or Sensitive Materiel Recovery. These are operations conducted to rescue hostages and/or recover sensitive materiel from terrorist control, requiring capabilities not normally found in conventional military units. The safety of the hostages and preventing destruction of the sensitive materiel are essential mission requirements. (4) Non-Kinetic Activities. These are actions that are focused on defeating the ideologies or motivations that spawn terrorism by non-kinetic means. These could include, but are not limited to, PSYOP, IO, CA operations, UW and/or FID.
  OffensiveInformationOperation The integrated use of assigned and supporting capabilities and activities, mutually supported by intelligence, to affect adversary decision makers to achieve or promote specific objectives. These capabilities and activities include but are not limited to operations security, military deception, psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could also include computer network attack. See also computer network attack, defensive information operations, electronic warfare, information operations, intelligence, military deception, operations security, psychological operations, special information operations.


Show full definition (without tree view)
Show full definition (with tree view)

Show without tree


Sigma web home      Suggested Upper Merged Ontology (SUMO) web home
Sigma version 3.0 is open source software produced by Articulate Software and its partners