posted on Nov, 10 2012 @ 01:33 AM
Pages 2, 3, 4, & 5 of AF110-2005
"1.3. The classification authority for DCI will be retained by the Director of Intelligence, Surveillance
and Reconnaissance. Users shall adhere to the guidance provided in this guide and shall cite authority
derived from this guide when classifications and markings are applied. This guide should be listed on
your office file plan and maintained IAW AFMAN 37-139, Table 31-4, R24 (original at issuing activity) and Table 31-4, R25 (copy at using activity).
"3.4. In certain circumstances, the compilation of unclassified or open source information may result
in a sensitive or classified product. This can happen when the compilation reveals specific Air Force’s
interest, employment of DCI tools, techniques, methodologies, or vulnerabilities. Compilations
should be reviewed for marking or classification under the guidance in this document and related documents. Any questions concerning the final
classification of compiled information shall be referred to
the OCA for final determination. "
"3.6. Release of Information: Release or disclosure of information classified per this guide to U.S.
government agencies and contractors, foreign governments or the public follow para 6.6. of DoD
Instruction S-3600.2, Information Operations (IO) Security Classification Guidance. For public
release, further review and processing is required IAW DoD Regulation 5400.7/AF Supplement, DoD
Freedom of Information Act Program. Contact your Freedom of Information Act Office at the MAJCOM/FOA/Base."
"Counterdeception—Efforts to negate, neutralize, diminish the effects of, or gain advantage from a
foreign deception operation. Counterdeception does not include the intelligence function of identifying
foreign deception operations. See also deception. (JP 1-02)
Counterinformation—Counterinformation seeks to establish a desired degree of control in information
functions that permits friendly forces to operate at a given time or place without prohibitive interference
by the opposing force. (AFDD 1-2)
Counterintelligence—Information gathered and activities conducted to protect against espionage, other
intelligence activities, sabotage or assassinations conducted by or on behalf of foreign governments or
elements thereof, foreign organizations, or foreign persons, or international terrorist activities. Also called CI. See also counterespionage;
countersabotage; countersubversion; security; security intelligence. (JP
Counterpropaganda—Efforts to negate, neutralize, diminish the effects of, or gain advantage from
foreign psychological operations or propaganda efforts. (AFDD 2-5)
Defensive Counterinformation—Activities which are conducted to protect and defend friendly
information and information systems. (AFDD 1-2)
Electronic Protection—See Electronic Warfare.
Electronic Warfare—Any military action involving the use of electromagnetic or directed energy to
manipulate the electromagnetic spectrum or to attack the enemy. Also called EW. The three major
subdivisions within electronic warfare are: electronic attack, electronic protection, and electronic warfare
support. a. electronic attack. That division of electronic warfare involving the use of electromagnetic
energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the
intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires.
Also called EA. EA includes: 1) actions taken to prevent or reduce an enemy’s effective use of the
electromagnetic spectrum, such as jamming and electromagnetic deception, and 2) employment of
weapons that use either electromagnetic or directed energy as their primary destructive mechanism
(lasers, radio frequency weapons, particle beams). b. electronic protection. That division of electronic
warfare involving passive and active means taken to protect personnel, facilities, and equipment from any
effects of friendly or enemy employment of electronic warfare that degrade, neutralize, or destroy friendly
combat capability. Also called EP. c. electronic warfare support. That division of electronic warfare
involving actions tasked by, or under direct control of, an operational commander to search for, intercept,
identify, and locate or localize sources of intentional and unintentional radiated electromagnetic energy
for the purpose of immediate threat recognition, targeting, planning and conduct of future operations.
Thus, electronic warfare support provides information required for decisions involving electronic warfare
operations and other tactical actions such as threat avoidance, targeting, and homing. Also called ES.
Electronic warfare support data can be used to produce signals intelligence, provide targeting for
electronic or destructive attack, and produce measurement and signature intelligence. See also directed
energy; electromagnetic spectrum. (JP 1-02)"
to be continued....