Glossary
Intelligence Glossary
Not sure what a term means? Look it up here. This glossary explains the technical jargon used throughout the platform in plain language, from cyber security terms to military acronyms.
A2/AD (Anti-Access/Area Denial)
Military & DefenseMilitary strategy using missiles, mines, and other weapons to prevent adversary forces from entering or operating freely in a geographic area.
ACH (Analysis of Competing Hypotheses)
IntelligenceA structured analytic technique that evaluates multiple hypotheses against available evidence to reduce cognitive biases and improve analytical rigor.
AOR (Area of Responsibility)
Military & DefenseA geographic region assigned to a military commander for operations and defense. CENTCOM's AOR includes the Middle East and Central Asia.
APT (Advanced Persistent Threat)
Cyber SecurityA sophisticated, long-term cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs are typically state-sponsored and target high-value organizations for espionage or sabotage.
Artesh
General / RegionalIran's conventional military forces (Army, Navy, Air Force), distinct from the IRGC. The Artesh is responsible for territorial defense.
ASBM (Anti-Ship Ballistic Missile)
Military & DefenseA ballistic missile designed to target naval vessels at sea. Iran has developed ASBMs capable of threatening ships in the Persian Gulf and beyond.
Axis of Resistance
General / RegionalIran-led coalition of state and non-state actors opposing U.S. and Israeli influence in the Middle East, including Hezbollah, Hamas, Houthis, and Iraqi militias.
Ballistic Missile
Military & DefenseA missile that follows a ballistic trajectory to deliver warheads. Categories include short-range (SRBM), medium-range (MRBM), intermediate-range (IRBM), and intercontinental (ICBM).
Basij
General / RegionalIranian paramilitary volunteer militia subordinate to the IRGC, used for internal security, crowd control, and ideological enforcement.
Breakout Time
General / RegionalThe time required for a state to produce enough weapons-grade fissile material for one nuclear weapon, starting from a decision to do so.
C2 (Command and Control)
Cyber SecurityInfrastructure used by attackers to communicate with and control compromised systems. C2 servers send commands to malware and receive stolen data from infected machines.
CENTCOM (Central Command)
Military & DefenseU.S. military unified combatant command responsible for operations in the Middle East, Central Asia, and parts of South Asia, including the Iran region.
CISA (Cybersecurity and Infrastructure Security Agency)
IntelligenceU.S. federal agency responsible for protecting critical infrastructure from cyber and physical threats. CISA issues advisories and maintains the KEV catalog.
CJTF (Combined Joint Task Force)
Military & DefenseA temporary military organization composed of forces from multiple services and/or nations assembled for a specific mission or operation.
COA (Course of Action)
Military & DefenseA potential plan or strategy that a military commander might adopt to accomplish a mission. Multiple COAs are typically developed and analyzed before selection.
Confidence Level
IntelligenceAn assessment of the reliability and accuracy of intelligence, typically expressed as High, Medium, or Low based on source quality, corroboration, and analytical judgment.
CSG (Carrier Strike Group)
Military & DefenseA naval formation centered on an aircraft carrier, typically including cruisers, destroyers, and submarines. CSGs project power and provide air defense.
CVE (Common Vulnerabilities and Exposures)
Cyber SecurityA standardized identifier for publicly known cybersecurity vulnerabilities. Each CVE ID refers to a specific security flaw, enabling consistent communication about vulnerabilities across organizations.
CVN (Aircraft Carrier, Nuclear)
Military & DefenseA nuclear-powered aircraft carrier. The U.S. Navy operates 11 CVNs, which serve as the centerpiece of carrier strike groups.
CVSS (Common Vulnerability Scoring System)
Cyber SecurityA standardized framework for rating the severity of security vulnerabilities on a scale of 0-10. Scores of 9.0+ are considered Critical, 7.0-8.9 High, 4.0-6.9 Medium, and below 4.0 Low.
DDoS (Distributed Denial of Service)
Cyber SecurityAn attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users. Often used by hacktivists or as a distraction during more sophisticated attacks.
Enrichment
General / RegionalThe process of increasing the concentration of uranium-235 in uranium. Weapons-grade uranium is enriched to 90%+ while reactor fuel is typically 3-5%.
EW (Electronic Warfare)
Military & DefenseMilitary operations involving the use of electromagnetic spectrum to attack, protect, or exploit. Includes jamming, spoofing, and signals intelligence.
Exploit
Cyber SecurityCode or technique that takes advantage of a software vulnerability to cause unintended behavior, such as gaining unauthorized access or executing malicious code.
FININT (Financial Intelligence)
IntelligenceIntelligence derived from financial data and transactions, used to track illicit financing, sanctions evasion, and terrorist funding networks.
FOB (Forward Operating Base)
Military & DefenseA secured military position used to support tactical operations. FOBs provide logistics, command and control, and force protection in forward areas.
Force Posture
Military & DefenseThe positioning, readiness, and capabilities of military forces in a region. Changes in force posture can signal escalation or de-escalation.
GEOINT (Geospatial Intelligence)
IntelligenceIntelligence derived from imagery and geospatial data, including satellite imagery, maps, and terrain analysis.
Hezbollah
General / RegionalLebanese Shia militant group and political party, founded with IRGC support in 1982. Iran's most capable proxy with significant military capabilities.
Houthis (Ansar Allah)
General / RegionalYemeni Shia rebel movement that controls much of northern Yemen, including the capital Sana'a. Receives weapons and support from Iran.
HUMINT (Human Intelligence)
IntelligenceIntelligence gathered from human sources through interpersonal contact, including agents, informants, and diplomatic reporting.
I&W (Indications and Warning)
IntelligenceIntelligence activities focused on detecting and reporting time-sensitive information about foreign developments that could threaten national security.
IAB (Initial Access Broker)
Cyber SecurityCybercriminals who specialize in gaining unauthorized access to corporate networks and then selling that access to other threat actors, typically ransomware operators.
IADS (Integrated Air Defense System)
Military & DefenseA coordinated network of radars, command centers, and surface-to-air missiles designed to detect and engage aerial threats.
IAEA (International Atomic Energy Agency)
General / RegionalUN agency responsible for promoting peaceful use of nuclear energy and preventing nuclear weapons proliferation through inspections and safeguards.
IMINT (Imagery Intelligence)
IntelligenceIntelligence derived from visual imagery collected by satellites, aircraft, or drones. Used to identify military installations, movements, and activities.
Intelligence Cycle
IntelligenceThe process of converting raw information into finished intelligence: Planning & Direction, Collection, Processing, Analysis, Dissemination, and Feedback.
IOC (Indicator of Compromise)
Cyber SecurityForensic artifacts that indicate a potential security breach, including IP addresses, domain names, file hashes, email addresses, or behavioral patterns associated with malicious activity.
IPB (Intelligence Preparation of the Battlefield)
Military & DefenseA systematic process of analyzing threat, terrain, weather, and civil considerations to support military decision-making and operations planning.
IRGC (Islamic Revolutionary Guard Corps)
Military & DefenseIran's elite military force responsible for protecting the Islamic Republic's political system. Includes ground, naval, aerospace forces, and the Quds Force for external operations.
ISR (Intelligence, Surveillance, and Reconnaissance)
Military & DefenseCoordinated acquisition, processing, and dissemination of accurate, relevant, and timely information about adversaries and the operational environment.
JCPOA (Joint Comprehensive Plan of Action)
General / RegionalThe 2015 nuclear agreement between Iran and world powers that limited Iran's nuclear program in exchange for sanctions relief. The U.S. withdrew in 2018.
JIPOE (Joint Intelligence Preparation of the Operational Environment)
Military & DefenseThe joint force version of IPB that analyzes adversary capabilities, the operational environment, and potential threats to support joint operations.
KEV (Known Exploited Vulnerabilities)
Cyber SecurityCISA's catalog of vulnerabilities that are actively being exploited in the wild. Federal agencies are required to remediate KEV entries within specified timeframes.
Malware
Cyber SecurityMalicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Types include viruses, worms, trojans, ransomware, spyware, and rootkits.
MITRE ATT&CK
Cyber SecurityA globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Used to understand threat actor behavior and improve defensive capabilities.
OFAC (Office of Foreign Assets Control)
IntelligenceU.S. Treasury Department office that administers and enforces economic sanctions against targeted foreign countries, terrorists, and narcotics traffickers.
ORBAT (Order of Battle)
Military & DefenseThe hierarchical organization, command structure, strength, and disposition of military forces. ORBAT analysis identifies units, commanders, and capabilities.
OSINT (Open Source Intelligence)
IntelligenceIntelligence collected from publicly available sources including news media, social media, academic publications, government reports, and commercial data.
Phishing
Cyber SecurityA social engineering attack that uses fraudulent emails, messages, or websites to trick victims into revealing sensitive information or installing malware. Spear-phishing targets specific individuals.
PMESII (Political, Military, Economic, Social, Information, Infrastructure)
IntelligenceAn analytical framework for understanding the operational environment by examining six interconnected systems that affect stability and conflict.
PMF (Popular Mobilization Forces)
Military & DefenseAn Iraqi state-sponsored umbrella organization of predominantly Shia militias, many with close ties to Iran's IRGC Quds Force.
Proxy
Military & DefenseA non-state armed group that receives support (funding, weapons, training) from a state sponsor to advance that state's interests while providing deniability.
Quds Force
Military & DefenseThe IRGC's extraterritorial operations branch responsible for intelligence, unconventional warfare, and support to proxy forces across the Middle East.
Ransomware
Cyber SecurityMalware that encrypts victim files and demands payment for the decryption key. Modern ransomware groups also exfiltrate data and threaten to publish it (double extortion).
RAT (Remote Access Trojan)
Cyber SecurityMalware that provides an attacker with remote control over an infected system, enabling surveillance, data theft, and further malicious activities.
ROE (Rules of Engagement)
Military & DefenseDirectives that define the circumstances and limitations under which military forces may engage adversaries. ROE balance mission requirements with legal and policy constraints.
SAM (Surface-to-Air Missile)
Military & DefenseA missile designed to be launched from the ground to destroy aircraft or other aerial targets. Iran operates various SAM systems including S-300 and indigenous designs.
Sanctions
General / RegionalEconomic and diplomatic penalties imposed on countries, entities, or individuals to change behavior. Iran faces extensive U.S., EU, and UN sanctions.
SATs (Structured Analytic Techniques)
IntelligenceMethodologies designed to improve intelligence analysis by making reasoning explicit, challenging assumptions, and reducing cognitive biases.
SIEM (Security Information and Event Management)
Cyber SecuritySoftware that aggregates and analyzes security data from across an organization's IT infrastructure to detect threats, generate alerts, and support incident response.
SIGINT (Signals Intelligence)
IntelligenceIntelligence derived from intercepted electronic signals and communications, including COMINT (communications) and ELINT (electronic emissions).
SLBM (Submarine-Launched Ballistic Missile)
Military & DefenseA ballistic missile capable of being launched from submarines, providing a sea-based nuclear or conventional strike capability.
SOC (Security Operations Center)
Cyber SecurityA centralized facility where security professionals monitor, detect, analyze, and respond to cybersecurity incidents using technology and processes.
SOF (Special Operations Forces)
Military & DefenseElite military units trained for unconventional warfare, counterterrorism, direct action, and special reconnaissance missions.
Source Reliability
IntelligenceAn assessment of how trustworthy and credible an intelligence source is, typically rated on a scale from A (completely reliable) to F (reliability cannot be judged).
Spyware
Cyber SecurityMalware designed to secretly monitor user activity and collect information such as keystrokes, screenshots, and browsing history without the user's knowledge.
Strait of Hormuz
General / RegionalStrategic waterway between the Persian Gulf and Gulf of Oman through which approximately 20% of global oil passes. Iran has threatened to close it during crises.
Supreme Leader
General / RegionalIran's highest authority (currently Ali Khamenei), who controls the armed forces, judiciary, and state media, and sets overall policy direction.
Threat Actor
Cyber SecurityAn individual or group that conducts malicious cyber activities. Categories include nation-state actors, cybercriminals, hacktivists, and insider threats.
Threat Assessment
IntelligenceAn evaluation of the capabilities, intentions, and activities of potential adversaries to determine the level of threat they pose.
TTPs (Tactics, Techniques, and Procedures)
Cyber SecurityThe behavior patterns of threat actors describing how they conduct attacks. Tactics are the 'why', techniques are the 'how', and procedures are the specific implementation.
UAV/UAS (Unmanned Aerial Vehicle/System)
Military & DefenseRemotely piloted or autonomous aircraft used for surveillance, reconnaissance, and strike missions. Iran has developed extensive drone capabilities.
Wiper
Cyber SecurityDestructive malware designed to permanently delete or corrupt data on infected systems, often used in state-sponsored attacks for sabotage rather than financial gain.
WMD (Weapons of Mass Destruction)
General / RegionalNuclear, chemical, biological, and radiological weapons capable of causing mass casualties. Iran is suspected of pursuing nuclear weapons capability.
Zero-Day
Cyber SecurityA vulnerability that is unknown to the software vendor and has no available patch. Zero-day exploits are highly valuable and often used in sophisticated attacks.
This glossary provides definitions for common terms used in cyber security, military intelligence, and threat analysis. Definitions are simplified for accessibility while maintaining accuracy.