Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome cryptome jya.com eyeball-series.org cryptome.cn


Table of Contents of main report.


FM 100-6 INFORMATION OPERATIONS


Index

A

ABCS 2-8, 5-3, 5-7, 5-10, 6-3

access paths, alteration of 5-9

academic institutions 1-3

acquire 2-9

Advanced Field Artillery Tactical Data System. See AFTADS

advanced weapons system technology 2-8

adversary

adversary's

AES 2-7

AFTADS 2-11

AGCCS 5-3

agencies that coordinate international efforts 1-3

AHFEWS 6-2

air and naval support 2-7

air power 1-7

air superiority 1-9

Air Warfare Center 17

air/naval gunfire liaison company. See ANGLICO C-4

aircraft-borne sensors 6-2

AirLand Battle 2-4

alert phase 1-4

allied coalition force 1-9

AMOPES 6-14

analysis

ANGLICO C-4

Appliqué 5-3

ARAT-TA B-4

architecture 5-2

archives 3-11

area of operation, analysis of 2-12

Army

Army Battle Command System. See ABCS

Army Command and Control System. See ABCS

Army Enterprise Strategy. See AES

Army Global Command and Control System. See AGCCS

Army High Frequency Electronic Warfare System. See AHFEWS

Army Information System Architecture, illustration of 5-4

Army Mobilization and Operations Planning and Execution System. See AMOPES

Army Reprogramming Analysis Team-Threat Analysis. See ARAT-TA

Army Tactical Command and Control System. See ATCCS

Army Tactical Missile System. See ATACMS

arrangement of forces on the ground 6-15

art of command 1-12

artillery 1-6, 1-7, 6-15

assessment

ATACMS 2-12

ATCCS 5-3

attack

automation architecture 5-1

aviation platform 6-15


B

bandwidth requirements 5-12

battle command 1-4, 1-13, 2-8, 6-4, 6-5ñ6-6

Battle Command Training Program. See BCTP B-5

battle commander, and visualization 5-6

battle damage assessments. See BDA

battlefield

battle labs 18

battle plan

battlespace 1-4, 4-3, 5-0, 6-0, 6-4

battle staff 6-9

BCE C-4

BCTP 18

BDA 2-4, 2-6, 4-3, 4-7, 18, C-4, D-3

biological weapons, contamination by 1-7

BOSs 2-7, 2-13, 5-10, 5-3, 6-15

branches and sequels C-3

broadcast communications technology 5-5

broadcast dissemination of information 2-6

building blocks of C2W 3-2

buildup 6-12

bulletin boards 5-5


C

C2 1-4, 2-6, 4-1

C2-attack 2-4, 2-12, 3-2, 3-6, 3-9, 4-3, 4-4, 5-1, 6-1, 6-8, C-4

C2-protect 2-4, 2-5, 2-11, 3-6, 4-3, 5-1, 5-9, 6-1, 6-8, B-4, D-3

C2-target list C-4

C2W 1-1, 1-12, 2-4, 2-11, 3-0 through 3-17, 4-4, 6-2, 6-7, 6-8, 6-10, 6-13, 6-14, 6-15, 6-18

C2W annex A-8 through A-13, C-4

C3 annexes C-4

C3 systems, adversary's 2-7

C4

C4I 2-7, 6-12

CA operations 1-12, 2-4, 3-0, 3-15, 6-2, 6-7, 6-10, 6-15, 6-16, 6-19

camouflage 2-12

candidates for attack 1-7

CA officer 4-3

CCIR 2-5, 2-9, 2-10, 3-10, 5-0, 5-10, 6-3, 6-13, 6-14, 6-15, C-3, D-2

cellular

central system support assets 1-7

challenges for leaders 1-7, 6-5 and 6-6

chaplains 6-7

chemical weapons, contamination by 1-7

CI B-4, D-2

CINC. See also JTF

civil

civilian assets 1-9

civilian infrastructure 5-5

civilians 3-11,6-18

civil-military operations center. See CMOC

civil-military operations. See CMO

CJCS B-3

CMO 3-10, 6-13, 6-16

CMOC 2-5, 3-12, 6-3, 6-18. See also emergency operations centers

coalition nations, and C2W C-3

coalition operations and C2W C-3

cognitive hierarchy 2-1

collateral damage 4-7

collection

combat

combat service support C-3

combatant commander B-1, B-2.See also JFC

combatant commands B-2

combined arms team 6-3, 6-15

command and control. See C2

command and control warfare. See C2W

Command Information Program. See Commander's Internal Information Program

command information. See internal information program 2-5

command, control, communications, and computers. See C4 3-2

command, control, communications, computers, and intelligence. See C4I 2-7

command systems 2-7

commander-in-chief. See CINC

commander's

Commander's Internal Information Program 3-9, 3-14

commanders

commercial

communications 2-13, 3-12, 5-1, 6-2

connectivity 2-6, 5-12

compatibility C-0

components of IO 2-1, 2-3, 6-0

computer

computers 6-13

COMSEC 3-3

concealment 3-3

concept of operations 1-9, 2-6, 4-2, 5-10, 6-8, 6-9

conduits for information 2-10

connectivity 2-13, 5-2, 6-2, 6-4, 6-19

CONPLANs 6-14, D-2

constraints C-1

contingency planning 6-2

contingency plans. See CONPLANs

continuity of operations 5-12

continuous

contractors 5-9

contracts 1-9

coordination 1-13, 3-9, 3-11, 6-12, 6-18, D-0

counter-C2 actions of the adversary 3-1

counterintelligence 3-3, B-4

counter-IO the adversary launches 6-10

counterreconnaissance 2-13

course of action

covert attacks 1-7

crisis, and importance of information 2-2

critical

cultural


D

DALIS 3-13

data

data bases 1-4, 5-5

decentralized maneuver and engagement 6-15

deception 1-6, 2-4, 2-11, 2-12, 3-3, 3-4, 3-5, 4-4, 6-2, 6-7, 6-13, 6-18, B-1, B-4, B-5, C-4

decision and execution cycle. See commander's decision and execution cycle

decision-making 2-2

decisive operations 6-14ñ6-19, C-3

deconfliction 3-9, 6-8

deep battle strikes 6-1

deep operations strategy 2-4

defeat criteria 18

DEERS 6-12

Defense Enrollment Eligibility Reporting System. See DEERS

defense information infrastructure. See DII

Defense Information Systems Agency. See DISA

Defense Information Systems Network. See DISN 1-4

Defense Intelligence Agency 6-18

Defense Joint Military Pay System. See DJMS

Defense Switch Network 6-13

degradation

denial 2-2, 5-9

deny

Department of State. See DOS

deployment 2-3

desired future end state 4-2

destruction 2-11, 3-9, 6-3, 6-18, B-1, B-4. See also physical destruction

deterrence 2-2

digital

digitization 2-8, 5-5

DII 1-3, 1-4

direct air attack 1-6

direct broadcast satellites 5-8

directed telescope 1-10

directed-energy weapons 5-5

DISA 1-8

Disaster Assistance Logistics Information System. See DALIS

discipline 6-4

disinformation 6-4

DISN 1-4, 6-13

disorientation of adversary's decision cycle 3-6

disruption 1-7, 3-6, 6-3

distortion 3-3

DJMS 6-12

doctrine, training, leader development, organizations, materiel, and soldier requirements. See DTLOMS

DOD 3-11, B-1, B-2

DOD EW Plan B-2

domestic support operations 6-0, 6-18

domination of enemy IO 1-12, 2-12

DOS 1-3, 3-11, 6-16

DOS, and coordination of frequency use 5-13

drug cartels 1-7

DTLOMS B-5


E

EA 1-6, 3-5

early entry forces 6-14

echelon-above-corps units, C2 for 5-3

echelons-below-corps level, and assets 2-12

economic issues 3-10

EEFI 2-10, 3-3, D-2

electric power systems 5-5

electromagnetic interference. See EMI

electromagnetic pulse. See EMP

electromagnetic spectrum. See EMS

electronic

embedded processor 5-3

emergency operations centers 6-18. See also CMOCs

EMI 2-13, 5-12

emission control 2-13, C-2

EMP 1-6

employment considerations 6-0 through 6-4

EMS 3-5, 5-6, 5-12, 6-14

en route operations 6-14

end state 1-10, C-3

enemy

engagements 2-12

entry operations 6-12, 6-14

environment 4-1, 4-4

EP 3-5, 3-9, 6-3

ES 3-5

espionage 1-1, 6-4

essential elements of friendly information. See EEFI

ethical behavior 3-15

European Space Agency 1-3

EW 1-12, 2-4, 2-11, 3-5, 3-9, 6-3, 6-7, 6-18, B-1, B-2, B-3, C-4

exchange

execution 5-8, 6-0, 6-3, 6-10 through 6-19

expanded vision 1-12, 6-4

exploitation 1-7, 2-2, 2-11, 4-4


F

facsimile. See data distribution

false signals 1-6

falsification of friendly intentions 3-3

FBCB2 5-3

Federal Emergency Management Agency. See FEMA

feedback, as part of planning process 6-10

FEMA 1-3

FFIR 2-9

field support teams. See FSTs

fighting platforms 5-7

fire direction, targeting 2-12

fire support 6-7

floppy disks 5-9

flow of information between nodes and levels 2-13

force application, synchronization of 5-1

force-level commander 5-12

force projection 2-8, 6-2

force tailoring 5-2

Force XXI Battle Command Brigade and Below System. See FBCB2

Force XXI studies B-5

forced entry operations 5-13

foreign

frequencies, allocation of 5-12

frequency provisions and procedures 5-12

frequency spectrum 6-4

frequency use, coordination of 5-13

friendly C2 6-2

FSTs 6-7, B-5. See also LIWA FST

full-dimensional operations 1-4, 2-13, 6-5

functional component commanders B-1

future information technology 5-7


G

G2 3-11, 3-12, 6-10. See also J2

G3 4-3, 6-10, C-3, 6-15

G5. See CA staff officer

G6, responsibilities of 5-6, 5-12, C-1

GCCS 5-2, 15

geopolitical strategic factors 1-4

GIE 1-1, 1-2, 1-4, 1-12, 2-6, 3-10, 3-12, 4-2, 4-7, 5-5, 6-5, 6-16

GII 1-2, 1-3, 1-4, 5-1

global

Global Command and Control System. See GCCS 5-2

goal of IO 4-6

GPS 1-6, 1-7, 4-4, 5-3, 5-5

graphics. See imagery

ground forces, arrangement of 6-15

ground operations, impact of information on 2-2

ground sensors 6-2


H

hardening of programs 5-9, 5-10

hierarchical structure 1-12

high-payoff targets C-4

high-priority targets D-2

high-value targets C-4

historical perspectives

horizontal coordination 5-8

host nation telecommunications networks 2-13

hostility, level of 1-7

human intelligence. See HUMINT

humanitarian assistance 3-4, 3-12, 6-16

humanitarian relief operations. See humanitarian assistance

HUMINT 2-10, 3-11, 4-3, B-4, D-2


I

identification of threats 2-11, 4-4

image compression 5-8

imagery 5-8, 6-2

imagery satellites 1-7

inaccurate information 1-8

industries, American 1-1

influence, on the adversary 3-9

information

information activities 2-4, 2-8

information advantage 1-9, 1-12

Information Age 3-9

information dominance 1-1, 1-9, 1-12, 2-5, 3-0, 3-1, 3-10, 5-12, 6-0, 6-2, 6-3, 6-5, D-3

information environment 1-2, 2-11

information management 1-14

information operations. See IO

information operations battle staff. See IOBS

information sources available to CA units 3-11

information systems. See INFOSYS

information technology 2-11

information warfare. See IW

information-based warfare 2-7

information-gathering 2-12, 6-19

information-sharing by elements within the force 5-3

informational maneuver 1-12

INFOSEC 1-8, 3-3, 5-9, 6-13, 6-17, 17

infosphere 5-7, 6-3

INFOSYS 1-4, 5-0 through 5-13, 6-4, 6-8, 6-13

infotainment 5-5

infrastructure

initiative, seizing and sustaining 6-2

INMARSAT 5-5

insiders 1-6

installation sustaining bases 5-7

instant communications capabilities 1-8

interconnectivity of 6-0

integration

intelligence 4-3ñ4-7, 6-4, 6-7, 6-18

intelligence-enabling functions 4-3

intelligence-preparation-of-the battlefield. See IPB

intelligent minefield systems 6-15

intent, of friendly force 3-2

interagency task force 6-4

interface requirements 5-6

interference 5-13

internal information activities 3-15

internal information program 2-5, 6-4,6-16

international

International Committee of the Red Cross, and CA 3-10

international maritime satellites. See INMARSAT

International Telecommunications Union. See ITU 5-13

internet 1-9, 3-9, 3-15, 5-5, 5-9, 6-8, C-3

Internet Worm 3-9

internetted nonhierarchical management models 1-2

interoperability 2-8, 6-0, 6-4, 6-18, C-0

intruders, tracking 5-10

intrusions into computer networks 5-9, 5-10

IO

IO activities

IOBS 3-0, 3-15, 6-15, D-1

IO/C2W planners B-4

IPB 2-4, 2-6, 2-7, 4-4 through 4-7, 6-13, 6-15, D-2

ISS 5-9, 6-3

ITU 5-13

IW 2-2, 3-0, 14

IW/C2W 6-7, B-4


J

J2 3-11, 3-12

J3 4-3, 6-6, 6-7, 6-8, 6-10, B-1, B-2, B-3, C-3

J5. See CA staff officer

J6 5-6, 5-12, B-2

JAARS B-2

jamming 1-6, 2-12, 2-13, 3-5

JC2WC B-1 through B-3

JEWC. See JC2WC

Joint After-Action Reporting System. See JAARS

Joint Command and Control Warfare Center. See JC2WC

Joint Electronic Warfare Center. See JC2WC

joint force attack strategy 6-2

joint force commanders B-1

joint message text. See data distribution

joint operational areas 5-7

Joint Operations Planning and Execution System. See JOPES

joint restricted frequency list 5-12

joint signal operating instructions 5-12

Joint Special Technical Operations System B-1

joint task force. See JTF

joint universal lessons learned. See JULLS B-2

Joint Warfighting Center B-3

joint warfighting operations 6-1

JOPES 6-14

JTF 6-4, 6-7. JTF. See also CINC

judge advocate, coordination with 1-9, 6-4

JULLS B-2


K

know the situation 1-5

knowledge advantage 1-9

knowledge-based operations 5-10

knowledge-based relevant common picture 5-7


L

land forces, C2 capabilities of 2-7

Land Information Warfare Activity. See LIWA 6-7

land operations 6-0

laptop computers 5-3

lassie also ROE

LCCs 6-7, 17, 18

leadership 6-4, 6-5

legal and policy limits, on use of non-DOD systems 2-10

legal and policy restrictions 6-10. See also law and ROE

legal considerations 1-8, 1-9. See also law and ROE

lethal and nonlethal, direct and indirect capabilities 1-12

lethality 1-9, 2-8

levels of war 3-14, 6-0, 6-1

liaison 3-0, 3-12, 6-18

libraries 3-11

linguistics 2-5

linkages 5-7

LIWA 6-7, B-4 through B-6

local

logic bombs 1-6, 5-9

logistics 6-7


M

maintenance, coordination of 3-12

major operations plan model A-1 through A-7

malicious software 1-6, 2-11, 5-9

management

maneuver 6-15

manipulation

Marine drones 6-3

media coverage 1-1, 1-3, 1-13, 3-14, 6-6, 6-13. See also news media and PA operations

media relations 3-14

medical facilities 3-12

METL D-2

METT-T 2-9, 2-12, C-2, C-4, D-0

MIE 1-1, 1-3, 1-4, 1-8, 1-12, 2-6, 2-10, 4-2, 4-4, 4-7, 5-5, 6-4, 6-9

military deception. See deception

military information environment. See MIE

military operations, support by CA elements 2-5

military police. See MP

misinformation 1-8

missiles 1-6

mission analysis 6-8

mission, enemy, troops, terrain and weather, and time available. See METT-T

mission-essential task list. See METL

mobile networks 5-3

mobile subscriber equipment/tactical packet network. See MSE/TPN

mobility 5-5

mobilization 6-12ñ6-13

Mobilization Level Application Software. See MOBLAS

MOBLAS 6-12

morale 6-4

MP 1-13

MSE/TPN 5-3

multilevel secure network 5-12

multimedia

multinational operations 6-19


N

National Command Authorities. See NCA

national information infrastructure. See NII

national information network 1-2

national IO strategy 6-1

National Military Strategy 6-11

national-level systems 6-2

navigation 6-2

NCA 1-1, 1-2, 3-14, 6-0, C-0

networks

news media 1-3, 1-7, 2-10, 3-3, 3-12, 3-14, 4-3, 5-5, 6-6, 6-8, 6-11, 6-18, 6-19

news organizations. See news media

newspaper services 3-10, 3-11

NGOs 1-3, 2-5, 2-12, 3-0, 3-10, 3-11, 6-10, 6-16, 6-18, 6-19. See also PVOs

NII 1-3, 6-13

non-DOD agencies 1-3, 6-18

nongovernment organizations. See NGOs

nonhierarchical structure 1-12

nonmilitary

nonstandard equipment C-1

nonstate groups 1-6

nuclear exchange 6-1

nuclear warfare 6-1


O

offensive C2W operations 6-15

Office of the Secretary of Defense B-1

OOTW 2-10, 3-1, 3-2, 4-3, 6-1, 6-2, 6-6, 6-11, 6-12, 6-17 through 6-19, D-0

Operation

operational

operational-level IO 6-2

operations

OPLAN 2-10, 3-12, 3-15, 6-2, B-3, B-4, D-2.See also OPORD

OPORD 3-12, 3-15, B-4. See also OPLAN

opportunity cost of an action 6-10

opposed entry 6-14

opposing militaries 1-6, 1-7

OPSEC 1-12, 2-4, 3-2, 3-3, 3-9, 3-12, 3-15, 6-3, 6-7, 6-13, 6-14, 6-16, 6-18, B-1, B-4, C-4. See also security

order of battle 2-7, 2-12, 6-2, 6-4

orders, development of 2-6, 5-7, A-0

organizational sciences 1-2

other services, allies, and adversaries 1-3

overt attacks 1-7


P

PA operations 1-13, 3-0, 3-9, 3-12, 6-2, 6-7, 6-10, 6-13, 6-15, 6-16.See also news media

PAO, responsibilities of 2-5, 3-10, 3-14, 4-3, 6-3, 6-7

passwords 5-9

peacekeeping force, protection of 6-19

perception, manipulation of 3-6

phone networks 6-10

physical destruction 2-12. See also destruction

physical protection 3-9

PIR 2-7, 2-9, 6-13, 6-14, D-2

planners, responsibilities of 6-0

planning 5-8, 6-0 through 6-10, 6-19

plans 5-7, A-0. See also OPLAN and OPORD

policy

political opponents 1-6, 1-7

populace and resources control 6-16

position locating and reporting technologies 6-5

positioning and navigation data 5-12

postal and telegraph systems 5-5

post-Cold War world 6-1

postconflict operations 6-16

postconflict turmoil 6-16

potential threats 6-4

power projection 2-2, 6-11

power sources 1-7

power-projection operations. See force-projection operations

power-projection platforms 5-7

precision-guided munitions 1-7

predeployment operations 6-13ñ6-14

premobilization levels of readiness, and reconstitution 6-17

press. See news media and PA operations

principles of C2-protect 3-9

prioritization

priority intelligence requirements. See PIR

private voluntary organizations. See PVOs

procedures for operating without all the information infrastructure 2-11

process-oriented group, responsibilities for integration of IO 6-6

programs, hardening of 5-10

propaganda 2-11, 3-10

protection

protective tactics, techniques, and procedures 6-10

psychological operations.
See PSYOP 1-6

PSYOP 1-6, 1-13, 2-4, 2-5, 3-9, 3-10, 3-12, 3-15, 4-4, 6-2, 6-4, 6-7, 6-8, 6-13, 6-14, 6-15, 6-16, 6-18, 6-19, 14, 17, C-4

PSYOP-supported Special Forces 1-12

public administration 2-5, 3-10

public affairs officer. See PAO 2-5

public affairs operations 2-5, 3-13

public affairs operations, and media coverage 3-14

public affairs. See PA 1-13

public facilities 3-10

public opinion 2-5, 3-4

public support 3-12

public switch network 1-8, 5-5

purposeful misinformation 1-8

PVOs 1-3, 2-5, 3-0, 3-10, 3-11, 6-6, 6-10, 6-16, 6-18,6-19. See also NGOs


Q

quality assurance 5-9


R

radiation 2-13

radio 1-8, 3-10, 5-3, 6-8

range of military operations, and IO 2-2

rapid movement of data 4-3

RAPs B-2

RCP 6-5, 6-15, D-3

real-time information, transmission of 3-3

rear operations 2-7

RECBASS 6-12

Reception Battalion Automated Support System. See RECBASS

reconnaissance 2-13

reconstitution 6-16

redeployment 2-3, 6-12, 6-16

redeployment phase 1-4

rehearsals 5-8

relevant information 2-6

relevant information and intelligence. See RII

remedial action projects. See RAPs

reports, routine or standard 6-7

reporters. See news media

reserve components 17

resilience 2-13

restraints and constraints 6-4

RII 2-4, 2-6, 2-7, 4-0ñ4-7, 6-3, 6-8

risk assessments 4-4

risk management analysis 2-11, 4-4

RISTA 2-7, 2-12, 6-13, D-2

ROE 1-8, 1-9, 6-10, 6-17.See also laws

rules of engagement. See ROE

rumors 6-4


S

sabotage 1-1

sample C2W annex A-8 through A-13

sample campaign OPLAN A-1 through A-7

sanctuary operations center C-2

satellite

satellites 5-7

security 2-13, 5-9, C-1, C-2. See also OPSEC

see the battlefield 6-6

senior and subordinate commanders 4-2

senior commander's intent, sharing 1-12

sensitive information, protection of 1-9

sensor technologies 2-7, 2-8, 5-5

sensor-to-shooter links 6-15, D-3

sensor-to-shooter systems 3-5

separate Army command 6-7

service component commanders B-1

sharing

signal 6-7

signature and noise levels 2-13

single-channel ground and airborne radio system/enhanced position location reporting system 5-3

situation

situational awareness 1-11, 2-6, 2-8, 2-10, 4-2, 4-3, 5-0, 6-2, 6-5, 6-15, C-3, D-2, D-3

sniffer devices 5-9

social activists 1-7

social and cultural elements 1-3

social environments, of adversaries 4-4

software

SOPs 6-15

space-based data system, competition for 6-4

space-based technology 5-5

space-based navigation systems 5-5

Special Force 2-4

Special Forces teams 6-2

Special Forces. See SF 1-13

spectrum management 5-13

spectrum supremacy 2-8

split-based communications 6-14

split-based operations 5-0

spurious data 1-6

staff judge advocate 6-7

staff responsibilities for integrating IO actions 6-6

staff responsibilities for planning and execution 6-6

STAMIS 6-12

Standard Army Management Information System. See STAMIS

standardization C-1

status of forces agreements 1-8

status of mission agreements 1-8

statutory constraints 6-4

strategic

subordinate

support planning principles C-0

support, to US and allied armed forces 6-19

supporting agencies, responsibilities of B-1 through B-5

supporting commander's CCIR 5-10

surprise 6-2

surveillance 6-2

survivability 1-9, 2-8, 17, C-1

synchronization 6-8, 6-12

synergy

systems

system-to-system data 5-12


T

tactical

tailored forces 6-4

target audience behavior 6-19

target lists 18

targeting 4-4

targets

target-sensing weapons systems 17

task-organization strategies 5-6

TECHINT 3-11, B-4

technical intelligence. See TECHINT

technological innovations 1-10

technology

television 1-4, 1-8, 6-8

tempo of operations 2-8, 6-2, 6-3

termination and postconflict operations 6-16.See also postconflict operations

termination of hostilities. See termination and postconflict operations

terrorism 1-1, 1-6

theater level of war. See strategic level of war

think tanks 1-3

threat

threats

throughput 2-13

time-phased objectives 6-9

training 5-6, 5-8, 6-4, C-1, D-1 through D-3

TRANSEC 3-3

transition for redeployment 6-17

transition plan for postconflict operations 6-16

transmission security. See TRANSEC

transmission technologies 5-8

transportation 3-12

transporting information 5-7

TV, and CA 3-10


U

UAVs 1-7, 2-12, 6-2

UN 5-13, 6-18

UN/coalition forces 6-19

unauthorized users, of computers 1-6

understanding the adversary 2-12, 4-3

understanding the information infrastructure of the adversary 4-5

unified CINC 6-0

unit plans 2-11

United Nations. See UN

United States. See US

United States Agency for International Development. See USAID

United States Information Agency. See USIA

unity of effort 1-11, 2-6, 4-1, 6-6, 6-15

unity of purpose 3-14

unmanned aerial vehicles. See UAVs

unopposed entry operations 5-12, 6-14

US

USAID 3-12

USAINSCOM B-3

use 2-10

user information exchange requirements 5-3

USIA 6-18


V

video 1-4

video broadcasting 6-5

viruses 5-9

visualization, of the battle 5-7

voice traffic 5-12

vulnerability 6-8


W

war 6-1

warfighting C2 INFOSYS 5-3

wargaming 15

weapons, long-range 2-4

weapon systems

weather 6-2

webbed computer networks, competition for 6-4

wide area networks 5-11

wireless technologies 1-4

worldwide telecommunications web 1-3

worldwide web 6-8