|
Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost. |
Table of Contents of main report.
FM 100-6 INFORMATION OPERATIONS
ABCS 2-8, 5-3, 5-7, 5-10, 6-3
access paths, alteration of 5-9
academic institutions 1-3
acquire 2-9
Advanced Field Artillery Tactical Data System. See AFTADS
advanced weapons system technology 2-8
adversary
adversary's
AES 2-7
AFTADS 2-11
AGCCS 5-3
agencies that coordinate international efforts 1-3
AHFEWS 6-2
air and naval support 2-7
air power 1-7
air superiority 1-9
Air Warfare Center 17
air/naval gunfire liaison company. See ANGLICO C-4
aircraft-borne sensors 6-2
AirLand Battle 2-4
alert phase 1-4
allied coalition force 1-9
AMOPES 6-14
analysis
ANGLICO C-4
Appliqué 5-3
ARAT-TA B-4
architecture 5-2
archives 3-11
area of operation, analysis of 2-12
Army
Army Battle Command System. See ABCS
Army Command and Control System. See ABCS
Army Enterprise Strategy. See AES
Army Global Command and Control System. See AGCCS
Army High Frequency Electronic Warfare System. See AHFEWS
Army Information System Architecture, illustration of 5-4
Army Mobilization and Operations Planning and Execution System. See AMOPES
Army Reprogramming Analysis Team-Threat Analysis. See ARAT-TA
Army Tactical Command and Control System. See ATCCS
Army Tactical Missile System. See ATACMS
arrangement of forces on the ground 6-15
art of command 1-12
artillery 1-6, 1-7, 6-15
assessment
ATACMS 2-12
ATCCS 5-3
attack
automation architecture 5-1
aviation platform 6-15
bandwidth requirements 5-12
battle command 1-4, 1-13, 2-8, 6-4, 6-5ñ6-6
Battle Command Training Program. See BCTP B-5
battle commander, and visualization 5-6
battle damage assessments. See BDA
battlefield
battle labs 18
battle plan
battlespace 1-4, 4-3, 5-0, 6-0, 6-4
battle staff 6-9
BCE C-4
BCTP 18
BDA 2-4, 2-6, 4-3, 4-7, 18, C-4, D-3
biological weapons, contamination by 1-7
BOSs 2-7, 2-13, 5-10, 5-3, 6-15
branches and sequels C-3
broadcast communications technology 5-5
broadcast dissemination of information 2-6
building blocks of C2W 3-2
buildup 6-12
bulletin boards 5-5
C2 1-4, 2-6, 4-1
C2-attack 2-4, 2-12, 3-2, 3-6, 3-9, 4-3, 4-4, 5-1, 6-1, 6-8, C-4
C2-protect 2-4, 2-5, 2-11, 3-6, 4-3, 5-1, 5-9, 6-1, 6-8, B-4, D-3
C2-target list C-4
C2W 1-1, 1-12, 2-4, 2-11, 3-0 through 3-17, 4-4, 6-2, 6-7, 6-8, 6-10, 6-13, 6-14, 6-15, 6-18
C2W annex A-8 through A-13, C-4
C3 annexes C-4
C3 systems, adversary's 2-7
C4
C4I 2-7, 6-12
CA operations 1-12, 2-4, 3-0, 3-15, 6-2, 6-7, 6-10, 6-15, 6-16, 6-19
camouflage 2-12
candidates for attack 1-7
CA officer 4-3
CCIR 2-5, 2-9, 2-10, 3-10, 5-0, 5-10, 6-3, 6-13, 6-14, 6-15, C-3, D-2
cellular
central system support assets 1-7
challenges for leaders 1-7, 6-5 and 6-6
chaplains 6-7
chemical weapons, contamination by 1-7
CI B-4, D-2
CINC. See also JTF
civil
civilian assets 1-9
civilian infrastructure 5-5
civilians 3-11,6-18
civil-military operations center. See CMOC
civil-military operations. See CMO
CJCS B-3
CMO 3-10, 6-13, 6-16
CMOC 2-5, 3-12, 6-3, 6-18. See also emergency operations centers
coalition nations, and C2W C-3
coalition operations and C2W C-3
cognitive hierarchy 2-1
collateral damage 4-7
collection
combat
combat service support C-3
combatant commander B-1, B-2.See also JFC
combatant commands B-2
combined arms team 6-3, 6-15
command and control. See C2
command and control warfare. See C2W
Command Information Program. See Commander's Internal Information Program
command information. See internal information program 2-5
command, control, communications, and computers. See C4 3-2
command, control, communications, computers, and intelligence. See C4I 2-7
command systems 2-7
commander-in-chief. See CINC
commander's
Commander's Internal Information Program 3-9, 3-14
commanders
commercial
communications 2-13, 3-12, 5-1, 6-2
connectivity 2-6, 5-12
compatibility C-0
components of IO 2-1, 2-3, 6-0
computer
computers 6-13
COMSEC 3-3
concealment 3-3
concept of operations 1-9, 2-6, 4-2, 5-10, 6-8, 6-9
conduits for information 2-10
connectivity 2-13, 5-2, 6-2, 6-4, 6-19
CONPLANs 6-14, D-2
constraints C-1
contingency planning 6-2
contingency plans. See CONPLANs
continuity of operations 5-12
continuous
contractors 5-9
contracts 1-9
coordination 1-13, 3-9, 3-11, 6-12, 6-18, D-0
counter-C2 actions of the adversary 3-1
counterintelligence 3-3, B-4
counter-IO the adversary launches 6-10
counterreconnaissance 2-13
course of action
covert attacks 1-7
crisis, and importance of information 2-2
critical
cultural
DALIS 3-13
data
data bases 1-4, 5-5
decentralized maneuver and engagement 6-15
deception 1-6, 2-4, 2-11, 2-12, 3-3, 3-4, 3-5, 4-4, 6-2, 6-7, 6-13, 6-18, B-1, B-4, B-5, C-4
decision and execution cycle. See commander's decision and execution cycle
decision-making 2-2
decisive operations 6-14ñ6-19, C-3
deconfliction 3-9, 6-8
deep battle strikes 6-1
deep operations strategy 2-4
defeat criteria 18
DEERS 6-12
Defense Enrollment Eligibility Reporting System. See DEERS
defense information infrastructure. See DII
Defense Information Systems Agency. See DISA
Defense Information Systems Network. See DISN 1-4
Defense Intelligence Agency 6-18
Defense Joint Military Pay System. See DJMS
Defense Switch Network 6-13
degradation
denial 2-2, 5-9
deny
Department of State. See DOS
deployment 2-3
desired future end state 4-2
destruction 2-11, 3-9, 6-3, 6-18, B-1, B-4. See also physical destruction
deterrence 2-2
digital
digitization 2-8, 5-5
DII 1-3, 1-4
direct air attack 1-6
direct broadcast satellites 5-8
directed telescope 1-10
directed-energy weapons 5-5
DISA 1-8
Disaster Assistance Logistics Information System. See DALIS
discipline 6-4
disinformation 6-4
DISN 1-4, 6-13
disorientation of adversary's decision cycle 3-6
disruption 1-7, 3-6, 6-3
distortion 3-3
DJMS 6-12
doctrine, training, leader development, organizations, materiel, and soldier requirements. See DTLOMS
DOD 3-11, B-1, B-2
DOD EW Plan B-2
domestic support operations 6-0, 6-18
domination of enemy IO 1-12, 2-12
DOS 1-3, 3-11, 6-16
DOS, and coordination of frequency use 5-13
drug cartels 1-7
DTLOMS B-5
EA 1-6, 3-5
early entry forces 6-14
echelon-above-corps units, C2 for 5-3
echelons-below-corps level, and assets 2-12
economic issues 3-10
EEFI 2-10, 3-3, D-2
electric power systems 5-5
electromagnetic interference. See EMI
electromagnetic pulse. See EMP
electromagnetic spectrum. See EMS
electronic
embedded processor 5-3
emergency operations centers 6-18. See also CMOCs
EMI 2-13, 5-12
emission control 2-13, C-2
EMP 1-6
employment considerations 6-0 through 6-4
EMS 3-5, 5-6, 5-12, 6-14
en route operations 6-14
end state 1-10, C-3
enemy
engagements 2-12
entry operations 6-12, 6-14
environment 4-1, 4-4
EP 3-5, 3-9, 6-3
ES 3-5
espionage 1-1, 6-4
essential elements of friendly information. See EEFI
ethical behavior 3-15
European Space Agency 1-3
EW 1-12, 2-4, 2-11, 3-5, 3-9, 6-3, 6-7, 6-18, B-1, B-2, B-3, C-4
exchange
execution 5-8, 6-0, 6-3, 6-10 through 6-19
expanded vision 1-12, 6-4
exploitation 1-7, 2-2, 2-11, 4-4
facsimile. See data distribution
false signals 1-6
falsification of friendly intentions 3-3
FBCB2 5-3
Federal Emergency Management Agency. See FEMA
feedback, as part of planning process 6-10
FEMA 1-3
FFIR 2-9
field support teams. See FSTs
fighting platforms 5-7
fire direction, targeting 2-12
fire support 6-7
floppy disks 5-9
flow of information between nodes and levels 2-13
force application, synchronization of 5-1
force-level commander 5-12
force projection 2-8, 6-2
force tailoring 5-2
Force XXI Battle Command Brigade and Below System. See FBCB2
Force XXI studies B-5
forced entry operations 5-13
foreign
frequencies, allocation of 5-12
frequency provisions and procedures 5-12
frequency spectrum 6-4
frequency use, coordination of 5-13
friendly C2 6-2
FSTs 6-7, B-5. See also LIWA FST
full-dimensional operations 1-4, 2-13, 6-5
functional component commanders B-1
future information technology 5-7
G2 3-11, 3-12, 6-10. See also J2
G3 4-3, 6-10, C-3, 6-15
G5. See CA staff officer
G6, responsibilities of 5-6, 5-12, C-1
GCCS 5-2, 15
geopolitical strategic factors 1-4
GIE 1-1, 1-2, 1-4, 1-12, 2-6, 3-10, 3-12, 4-2, 4-7, 5-5, 6-5, 6-16
GII 1-2, 1-3, 1-4, 5-1
global
Global Command and Control System. See GCCS 5-2
goal of IO 4-6
GPS 1-6, 1-7, 4-4, 5-3, 5-5
graphics. See imagery
ground forces, arrangement of 6-15
ground operations, impact of information on 2-2
ground sensors 6-2
hardening of programs 5-9, 5-10
hierarchical structure 1-12
high-payoff targets C-4
high-priority targets D-2
high-value targets C-4
historical perspectives
horizontal coordination 5-8
host nation telecommunications networks 2-13
hostility, level of 1-7
human intelligence. See HUMINT
humanitarian assistance 3-4, 3-12, 6-16
humanitarian relief operations. See humanitarian assistance
HUMINT 2-10, 3-11, 4-3, B-4, D-2
identification of threats 2-11, 4-4
image compression 5-8
imagery 5-8, 6-2
imagery satellites 1-7
inaccurate information 1-8
industries, American 1-1
influence, on the adversary 3-9
information
information activities 2-4, 2-8
information advantage 1-9, 1-12
Information Age 3-9
information dominance 1-1, 1-9, 1-12, 2-5, 3-0, 3-1, 3-10, 5-12, 6-0, 6-2, 6-3, 6-5, D-3
information environment 1-2, 2-11
information management 1-14
information operations. See IO
information operations battle staff. See IOBS
information sources available to CA units 3-11
information systems. See INFOSYS
information technology 2-11
information warfare. See IW
information-based warfare 2-7
information-gathering 2-12, 6-19
information-sharing by elements within the force 5-3
informational maneuver 1-12
INFOSEC 1-8, 3-3, 5-9, 6-13, 6-17, 17
infosphere 5-7, 6-3
INFOSYS 1-4, 5-0 through 5-13, 6-4, 6-8, 6-13
infotainment 5-5
infrastructure
initiative, seizing and sustaining 6-2
INMARSAT 5-5
insiders 1-6
installation sustaining bases 5-7
instant communications capabilities 1-8
interconnectivity of 6-0
integration
intelligence 4-3ñ4-7, 6-4, 6-7, 6-18
intelligence-enabling functions 4-3
intelligence-preparation-of-the battlefield. See IPB
intelligent minefield systems 6-15
intent, of friendly force 3-2
interagency task force 6-4
interface requirements 5-6
interference 5-13
internal information activities 3-15
internal information program 2-5, 6-4,6-16
international
International Committee of the Red Cross, and CA 3-10
international maritime satellites. See INMARSAT
International Telecommunications Union. See ITU 5-13
internet 1-9, 3-9, 3-15, 5-5, 5-9, 6-8, C-3
Internet Worm 3-9
internetted nonhierarchical management models 1-2
interoperability 2-8, 6-0, 6-4, 6-18, C-0
intruders, tracking 5-10
intrusions into computer networks 5-9, 5-10
IO
IO activities
IOBS 3-0, 3-15, 6-15, D-1
IO/C2W planners B-4
IPB 2-4, 2-6, 2-7, 4-4 through 4-7, 6-13, 6-15, D-2
ISS 5-9, 6-3
ITU 5-13
IW 2-2, 3-0, 14
IW/C2W 6-7, B-4
J2 3-11, 3-12
J3 4-3, 6-6, 6-7, 6-8, 6-10, B-1, B-2, B-3, C-3
J5. See CA staff officer
J6 5-6, 5-12, B-2
JAARS B-2
jamming 1-6, 2-12, 2-13, 3-5
JC2WC B-1 through B-3
JEWC. See JC2WC
Joint After-Action Reporting System. See JAARS
Joint Command and Control Warfare Center. See JC2WC
Joint Electronic Warfare Center. See JC2WC
joint force attack strategy 6-2
joint force commanders B-1
joint message text. See data distribution
joint operational areas 5-7
Joint Operations Planning and Execution System. See JOPES
joint restricted frequency list 5-12
joint signal operating instructions 5-12
Joint Special Technical Operations System B-1
joint task force. See JTF
joint universal lessons learned. See JULLS B-2
Joint Warfighting Center B-3
joint warfighting operations 6-1
JOPES 6-14
JTF 6-4, 6-7. JTF. See also CINC
judge advocate, coordination with 1-9, 6-4
JULLS B-2
know the situation 1-5
knowledge advantage 1-9
knowledge-based operations 5-10
knowledge-based relevant common picture 5-7
land forces, C2 capabilities of 2-7
Land Information Warfare Activity. See LIWA 6-7
land operations 6-0
laptop computers 5-3
lassie also ROE
LCCs 6-7, 17, 18
leadership 6-4, 6-5
legal and policy limits, on use of non-DOD systems 2-10
legal and policy restrictions 6-10. See also law and ROE
legal considerations 1-8, 1-9. See also law and ROE
lethal and nonlethal, direct and indirect capabilities 1-12
lethality 1-9, 2-8
levels of war 3-14, 6-0, 6-1
liaison 3-0, 3-12, 6-18
libraries 3-11
linguistics 2-5
linkages 5-7
LIWA 6-7, B-4 through B-6
local
logic bombs 1-6, 5-9
logistics 6-7
maintenance, coordination of 3-12
major operations plan model A-1 through A-7
malicious software 1-6, 2-11, 5-9
management
maneuver 6-15
manipulation
Marine drones 6-3
media coverage 1-1, 1-3, 1-13, 3-14, 6-6, 6-13. See also news media and PA operations
media relations 3-14
medical facilities 3-12
METL D-2
METT-T 2-9, 2-12, C-2, C-4, D-0
MIE 1-1, 1-3, 1-4, 1-8, 1-12, 2-6, 2-10, 4-2, 4-4, 4-7, 5-5, 6-4, 6-9
military deception. See deception
military information environment. See MIE
military operations, support by CA elements 2-5
military police. See MP
misinformation 1-8
missiles 1-6
mission analysis 6-8
mission, enemy, troops, terrain and weather, and time available. See METT-T
mission-essential task list. See METL
mobile networks 5-3
mobile subscriber equipment/tactical packet network. See MSE/TPN
mobility 5-5
mobilization 6-12ñ6-13
Mobilization Level Application Software. See MOBLAS
MOBLAS 6-12
morale 6-4
MP 1-13
MSE/TPN 5-3
multilevel secure network 5-12
multimedia
multinational operations 6-19
National Command Authorities. See NCA
national information infrastructure. See NII
national information network 1-2
national IO strategy 6-1
National Military Strategy 6-11
national-level systems 6-2
navigation 6-2
NCA 1-1, 1-2, 3-14, 6-0, C-0
networks
news media 1-3, 1-7, 2-10, 3-3, 3-12, 3-14, 4-3, 5-5, 6-6, 6-8, 6-11, 6-18, 6-19
news organizations. See news media
newspaper services 3-10, 3-11
NGOs 1-3, 2-5, 2-12, 3-0, 3-10, 3-11, 6-10, 6-16, 6-18, 6-19. See also PVOs
NII 1-3, 6-13
non-DOD agencies 1-3, 6-18
nongovernment organizations. See NGOs
nonhierarchical structure 1-12
nonmilitary
nonstandard equipment C-1
nonstate groups 1-6
nuclear exchange 6-1
nuclear warfare 6-1
offensive C2W operations 6-15
Office of the Secretary of Defense B-1
OOTW 2-10, 3-1, 3-2, 4-3, 6-1, 6-2, 6-6, 6-11, 6-12, 6-17 through 6-19, D-0
Operation
operational
operational-level IO 6-2
operations
OPLAN 2-10, 3-12, 3-15, 6-2, B-3, B-4, D-2.See also OPORD
OPORD 3-12, 3-15, B-4. See also OPLAN
opportunity cost of an action 6-10
opposed entry 6-14
opposing militaries 1-6, 1-7
OPSEC 1-12, 2-4, 3-2, 3-3, 3-9, 3-12, 3-15, 6-3, 6-7, 6-13, 6-14, 6-16, 6-18, B-1, B-4, C-4. See also security
order of battle 2-7, 2-12, 6-2, 6-4
orders, development of 2-6, 5-7, A-0
organizational sciences 1-2
other services, allies, and adversaries 1-3
overt attacks 1-7
PA operations 1-13, 3-0, 3-9, 3-12, 6-2, 6-7, 6-10, 6-13, 6-15, 6-16.See also news media
PAO, responsibilities of 2-5, 3-10, 3-14, 4-3, 6-3, 6-7
passwords 5-9
peacekeeping force, protection of 6-19
perception, manipulation of 3-6
phone networks 6-10
physical destruction 2-12. See also destruction
physical protection 3-9
PIR 2-7, 2-9, 6-13, 6-14, D-2
planners, responsibilities of 6-0
planning 5-8, 6-0 through 6-10, 6-19
plans 5-7, A-0. See also OPLAN and OPORD
policy
political opponents 1-6, 1-7
populace and resources control 6-16
position locating and reporting technologies 6-5
positioning and navigation data 5-12
postal and telegraph systems 5-5
post-Cold War world 6-1
postconflict operations 6-16
postconflict turmoil 6-16
potential threats 6-4
power projection 2-2, 6-11
power sources 1-7
power-projection operations. See force-projection operations
power-projection platforms 5-7
precision-guided munitions 1-7
predeployment operations 6-13ñ6-14
premobilization levels of readiness, and reconstitution 6-17
press. See news media and PA operations
principles of C2-protect 3-9
prioritization
priority intelligence requirements. See PIR
private voluntary organizations. See PVOs
procedures for operating without all the information infrastructure 2-11
process-oriented group, responsibilities for integration of IO 6-6
programs, hardening of 5-10
propaganda 2-11, 3-10
protection
protective tactics, techniques, and procedures 6-10
psychological operations.
See PSYOP 1-6
PSYOP 1-6, 1-13, 2-4, 2-5, 3-9, 3-10, 3-12, 3-15, 4-4, 6-2, 6-4, 6-7, 6-8, 6-13, 6-14, 6-15, 6-16, 6-18, 6-19, 14, 17, C-4
PSYOP-supported Special Forces 1-12
public administration 2-5, 3-10
public affairs officer. See PAO 2-5
public affairs operations 2-5, 3-13
public affairs operations, and media coverage 3-14
public affairs. See PA 1-13
public facilities 3-10
public opinion 2-5, 3-4
public support 3-12
public switch network 1-8, 5-5
purposeful misinformation 1-8
PVOs 1-3, 2-5, 3-0, 3-10, 3-11, 6-6, 6-10, 6-16, 6-18,6-19. See also NGOs
quality assurance 5-9
radiation 2-13
radio 1-8, 3-10, 5-3, 6-8
range of military operations, and IO 2-2
rapid movement of data 4-3
RAPs B-2
RCP 6-5, 6-15, D-3
real-time information, transmission of 3-3
rear operations 2-7
RECBASS 6-12
Reception Battalion Automated Support System. See RECBASS
reconnaissance 2-13
reconstitution 6-16
redeployment 2-3, 6-12, 6-16
redeployment phase 1-4
rehearsals 5-8
relevant information 2-6
relevant information and intelligence. See RII
remedial action projects. See RAPs
reports, routine or standard 6-7
reporters. See news media
reserve components 17
resilience 2-13
restraints and constraints 6-4
RII 2-4, 2-6, 2-7, 4-0ñ4-7, 6-3, 6-8
risk assessments 4-4
risk management analysis 2-11, 4-4
RISTA 2-7, 2-12, 6-13, D-2
ROE 1-8, 1-9, 6-10, 6-17.See also laws
rules of engagement. See ROE
rumors 6-4
sabotage 1-1
sample C2W annex A-8 through A-13
sample campaign OPLAN A-1 through A-7
sanctuary operations center C-2
satellite
satellites 5-7
security 2-13, 5-9, C-1, C-2. See also OPSEC
see the battlefield 6-6
senior and subordinate commanders 4-2
senior commander's intent, sharing 1-12
sensitive information, protection of 1-9
sensor technologies 2-7, 2-8, 5-5
sensor-to-shooter links 6-15, D-3
sensor-to-shooter systems 3-5
separate Army command 6-7
service component commanders B-1
sharing
signal 6-7
signature and noise levels 2-13
single-channel ground and airborne radio system/enhanced position location reporting system 5-3
situation
situational awareness 1-11, 2-6, 2-8, 2-10, 4-2, 4-3, 5-0, 6-2, 6-5, 6-15, C-3, D-2, D-3
sniffer devices 5-9
social activists 1-7
social and cultural elements 1-3
social environments, of adversaries 4-4
software
SOPs 6-15
space-based data system, competition for 6-4
space-based technology 5-5
space-based navigation systems 5-5
Special Force 2-4
Special Forces teams 6-2
Special Forces. See SF 1-13
spectrum management 5-13
spectrum supremacy 2-8
split-based communications 6-14
split-based operations 5-0
spurious data 1-6
staff judge advocate 6-7
staff responsibilities for integrating IO actions 6-6
staff responsibilities for planning and execution 6-6
STAMIS 6-12
Standard Army Management Information System. See STAMIS
standardization C-1
status of forces agreements 1-8
status of mission agreements 1-8
statutory constraints 6-4
strategic
subordinate
support planning principles C-0
support, to US and allied armed forces 6-19
supporting agencies, responsibilities of B-1 through B-5
supporting commander's CCIR 5-10
surprise 6-2
surveillance 6-2
survivability 1-9, 2-8, 17, C-1
synchronization 6-8, 6-12
synergy
systems
system-to-system data 5-12
tactical
tailored forces 6-4
target audience behavior 6-19
target lists 18
targeting 4-4
targets
target-sensing weapons systems 17
task-organization strategies 5-6
TECHINT 3-11, B-4
technical intelligence. See TECHINT
technological innovations 1-10
technology
television 1-4, 1-8, 6-8
tempo of operations 2-8, 6-2, 6-3
termination and postconflict operations 6-16.See also postconflict operations
termination of hostilities. See termination and postconflict operations
terrorism 1-1, 1-6
theater level of war. See strategic level of war
think tanks 1-3
threat
threats
throughput 2-13
time-phased objectives 6-9
training 5-6, 5-8, 6-4, C-1, D-1 through D-3
TRANSEC 3-3
transition for redeployment 6-17
transition plan for postconflict operations 6-16
transmission security. See TRANSEC
transmission technologies 5-8
transportation 3-12
transporting information 5-7
TV, and CA 3-10
UAVs 1-7, 2-12, 6-2
UN 5-13, 6-18
UN/coalition forces 6-19
unauthorized users, of computers 1-6
understanding the adversary 2-12, 4-3
understanding the information infrastructure of the adversary 4-5
unified CINC 6-0
unit plans 2-11
United Nations. See UN
United States. See US
United States Agency for International Development. See USAID
United States Information Agency. See USIA
unity of effort 1-11, 2-6, 4-1, 6-6, 6-15
unity of purpose 3-14
unmanned aerial vehicles. See UAVs
unopposed entry operations 5-12, 6-14
US
USAID 3-12
USAINSCOM B-3
use 2-10
user information exchange requirements 5-3
USIA 6-18
video 1-4
video broadcasting 6-5
viruses 5-9
visualization, of the battle 5-7
voice traffic 5-12
vulnerability 6-8
war 6-1
warfighting C2 INFOSYS 5-3
wargaming 15
weapons, long-range 2-4
weapon systems
weather 6-2
webbed computer networks, competition for 6-4
wide area networks 5-11
wireless technologies 1-4
worldwide telecommunications web 1-3
worldwide web 6-8