Brevity code: Code that provides no security but which has as its sole purpose the shortening of messages rather than the concealment of their content.
Commander’s Guidance: Written by the commander for his command and promulgated for all to read.
Commander’s Intent: Written statement by the commander to his subordinate commanders and staff which is a personal expression of the purpose of the operation.
Common operational picture: Single identical display of relevant information shared by more than one command.
Concept of operations: General description of actions to be taken in pursuit of mission accomplishment.
Cyber operation or cyberspace operations: Employment of cyberspace capabilities primarily to achieve objectives in or through cyberspace. Such operations include computer [network operations] and activities to operate and defend DOD information networks.
_____________
NOTE: Based on Department of Defense, 2010, Department of Defense Dictionary of Military and Associated Terms, Joint Publication 1-02, November 8 (as amended through December 15, 2012).
Deception event: Event executed at a specific time and location in support of a deception operation.
Disinformation: Information that is intentionally false.
Emission control: Selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command and control capabilities while minimizing, for operations security, the following: (a) detection by enemy sensors; (b) mutual interference among friendly systems; and/or (c) enemy interference with the ability to execute a military deception plan.
Information operations: Integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.
Irregular warfare: Violent struggle among state and nonstate actors for legitimacy and influence over the relevant population(s). Irregular warfare favors indirect and asymmetric approaches, though it may employ the full range of military and other capacities, in order to erode an adversary’s power, influence, and will.
Limited access: Plan, operation, or mission that has access restricted to specific individuals, units, or commands.
Local operational picture: Display that permits all friendly forces to have the same information and situational awareness at the local unit level.
Misinformation: Information that is unintentionally false.
Military operations other than war: Encompasses the use of military capabilities across the range of military operations short of war. These military actions can be applied to complement any combination of the other instruments of national power and occur before, during, and after war.
Operations security: Process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities.
Procedures: Standard, detailed steps that prescribe how to perform specific tasks.
Rules of engagement: Directives issued by competent military authority that delineate the circumstances and limitations under which U.S. forces will initiate and/or continue combat engagement with other forces encountered.
Tactics: Employment and ordered arrangement of forces in relation to each other
Techniques: Nonprescriptive ways or methods used to perform missions, functions, or tasks.