Intel Stream

Glossary

LIVE FEED ACTIVE

Intelligence Glossary

Not sure what a term means? Look it up here. This glossary explains the technical jargon used throughout the platform in plain language, from cyber security terms to military acronyms.

76 Terms
A
7 terms

A2/AD (Anti-Access/Area Denial)

Military & Defense

Military strategy using missiles, mines, and other weapons to prevent adversary forces from entering or operating freely in a geographic area.

Related:ASBMStrait of Hormuz

ACH (Analysis of Competing Hypotheses)

Intelligence

A structured analytic technique that evaluates multiple hypotheses against available evidence to reduce cognitive biases and improve analytical rigor.

Related:SATsIntelligence Analysis

AOR (Area of Responsibility)

Military & Defense

A geographic region assigned to a military commander for operations and defense. CENTCOM's AOR includes the Middle East and Central Asia.

Related:CENTCOMTheater

APT (Advanced Persistent Threat)

Cyber Security

A sophisticated, long-term cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs are typically state-sponsored and target high-value organizations for espionage or sabotage.

Related:Nation-State ActorThreat ActorTTPs

Artesh

General / Regional

Iran's conventional military forces (Army, Navy, Air Force), distinct from the IRGC. The Artesh is responsible for territorial defense.

Related:IRGCIranian Military

ASBM (Anti-Ship Ballistic Missile)

Military & Defense

A ballistic missile designed to target naval vessels at sea. Iran has developed ASBMs capable of threatening ships in the Persian Gulf and beyond.

Related:Ballistic MissileA2/AD

Axis of Resistance

General / Regional

Iran-led coalition of state and non-state actors opposing U.S. and Israeli influence in the Middle East, including Hezbollah, Hamas, Houthis, and Iraqi militias.

Related:IRGCProxyHezbollah
B
3 terms

Ballistic Missile

Military & Defense

A missile that follows a ballistic trajectory to deliver warheads. Categories include short-range (SRBM), medium-range (MRBM), intermediate-range (IRBM), and intercontinental (ICBM).

Related:ASBMWMDProliferation

Basij

General / Regional

Iranian paramilitary volunteer militia subordinate to the IRGC, used for internal security, crowd control, and ideological enforcement.

Related:IRGCInternal Security

Breakout Time

General / Regional

The time required for a state to produce enough weapons-grade fissile material for one nuclear weapon, starting from a decision to do so.

Related:EnrichmentNuclear Program
C
10 terms

C2 (Command and Control)

Cyber Security

Infrastructure used by attackers to communicate with and control compromised systems. C2 servers send commands to malware and receive stolen data from infected machines.

Related:MalwareBotnetRAT

CENTCOM (Central Command)

Military & Defense

U.S. military unified combatant command responsible for operations in the Middle East, Central Asia, and parts of South Asia, including the Iran region.

Related:AORCJTF

CISA (Cybersecurity and Infrastructure Security Agency)

Intelligence

U.S. federal agency responsible for protecting critical infrastructure from cyber and physical threats. CISA issues advisories and maintains the KEV catalog.

Related:KEVCritical Infrastructure

CJTF (Combined Joint Task Force)

Military & Defense

A temporary military organization composed of forces from multiple services and/or nations assembled for a specific mission or operation.

Related:CENTCOMCoalition

COA (Course of Action)

Military & Defense

A potential plan or strategy that a military commander might adopt to accomplish a mission. Multiple COAs are typically developed and analyzed before selection.

Related:IPBJIPOE

Confidence Level

Intelligence

An assessment of the reliability and accuracy of intelligence, typically expressed as High, Medium, or Low based on source quality, corroboration, and analytical judgment.

Related:Intelligence AnalysisSource Reliability

CSG (Carrier Strike Group)

Military & Defense

A naval formation centered on an aircraft carrier, typically including cruisers, destroyers, and submarines. CSGs project power and provide air defense.

Related:CVNNaval Operations

CVE (Common Vulnerabilities and Exposures)

Cyber Security

A standardized identifier for publicly known cybersecurity vulnerabilities. Each CVE ID refers to a specific security flaw, enabling consistent communication about vulnerabilities across organizations.

Related:Zero-DayVulnerabilityCVSS

CVN (Aircraft Carrier, Nuclear)

Military & Defense

A nuclear-powered aircraft carrier. The U.S. Navy operates 11 CVNs, which serve as the centerpiece of carrier strike groups.

Related:CSGNaval Operations

CVSS (Common Vulnerability Scoring System)

Cyber Security

A standardized framework for rating the severity of security vulnerabilities on a scale of 0-10. Scores of 9.0+ are considered Critical, 7.0-8.9 High, 4.0-6.9 Medium, and below 4.0 Low.

Related:CVEVulnerabilityKEV
D
1 term

DDoS (Distributed Denial of Service)

Cyber Security

An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users. Often used by hacktivists or as a distraction during more sophisticated attacks.

Related:BotnetHacktivist
E
3 terms

Enrichment

General / Regional

The process of increasing the concentration of uranium-235 in uranium. Weapons-grade uranium is enriched to 90%+ while reactor fuel is typically 3-5%.

Related:Nuclear ProgramBreakout TimeIAEA

EW (Electronic Warfare)

Military & Defense

Military operations involving the use of electromagnetic spectrum to attack, protect, or exploit. Includes jamming, spoofing, and signals intelligence.

Related:SIGINTC2

Exploit

Cyber Security

Code or technique that takes advantage of a software vulnerability to cause unintended behavior, such as gaining unauthorized access or executing malicious code.

Related:VulnerabilityZero-DayPayload
F
3 terms

FININT (Financial Intelligence)

Intelligence

Intelligence derived from financial data and transactions, used to track illicit financing, sanctions evasion, and terrorist funding networks.

Related:SanctionsOFAC

FOB (Forward Operating Base)

Military & Defense

A secured military position used to support tactical operations. FOBs provide logistics, command and control, and force protection in forward areas.

Related:AORForce Posture

Force Posture

Military & Defense

The positioning, readiness, and capabilities of military forces in a region. Changes in force posture can signal escalation or de-escalation.

Related:AORDeterrence
G
1 term

GEOINT (Geospatial Intelligence)

Intelligence

Intelligence derived from imagery and geospatial data, including satellite imagery, maps, and terrain analysis.

Related:IMINTISR
H
3 terms

Hezbollah

General / Regional

Lebanese Shia militant group and political party, founded with IRGC support in 1982. Iran's most capable proxy with significant military capabilities.

Related:IRGCProxyLebanon

Houthis (Ansar Allah)

General / Regional

Yemeni Shia rebel movement that controls much of northern Yemen, including the capital Sana'a. Receives weapons and support from Iran.

Related:IRGCProxyYemen

HUMINT (Human Intelligence)

Intelligence

Intelligence gathered from human sources through interpersonal contact, including agents, informants, and diplomatic reporting.

Related:SIGINTOSINTIntelligence Collection
I
10 terms

I&W (Indications and Warning)

Intelligence

Intelligence activities focused on detecting and reporting time-sensitive information about foreign developments that could threaten national security.

Related:Early WarningThreat Assessment

IAB (Initial Access Broker)

Cyber Security

Cybercriminals who specialize in gaining unauthorized access to corporate networks and then selling that access to other threat actors, typically ransomware operators.

Related:RansomwareDark WebThreat Actor

IADS (Integrated Air Defense System)

Military & Defense

A coordinated network of radars, command centers, and surface-to-air missiles designed to detect and engage aerial threats.

Related:SAMA2/AD

IAEA (International Atomic Energy Agency)

General / Regional

UN agency responsible for promoting peaceful use of nuclear energy and preventing nuclear weapons proliferation through inspections and safeguards.

Related:Nuclear ProgramEnrichmentSafeguards

IMINT (Imagery Intelligence)

Intelligence

Intelligence derived from visual imagery collected by satellites, aircraft, or drones. Used to identify military installations, movements, and activities.

Related:GEOINTISRSatellite

Intelligence Cycle

Intelligence

The process of converting raw information into finished intelligence: Planning & Direction, Collection, Processing, Analysis, Dissemination, and Feedback.

Related:Intelligence AnalysisCollection

IOC (Indicator of Compromise)

Cyber Security

Forensic artifacts that indicate a potential security breach, including IP addresses, domain names, file hashes, email addresses, or behavioral patterns associated with malicious activity.

Related:TTPsThreat IntelligenceMITRE ATT&CK

IPB (Intelligence Preparation of the Battlefield)

Military & Defense

A systematic process of analyzing threat, terrain, weather, and civil considerations to support military decision-making and operations planning.

Related:JIPOECOAThreat Assessment

IRGC (Islamic Revolutionary Guard Corps)

Military & Defense

Iran's elite military force responsible for protecting the Islamic Republic's political system. Includes ground, naval, aerospace forces, and the Quds Force for external operations.

Related:Quds ForceBasijProxy

ISR (Intelligence, Surveillance, and Reconnaissance)

Military & Defense

Coordinated acquisition, processing, and dissemination of accurate, relevant, and timely information about adversaries and the operational environment.

Related:SIGINTIMINTHUMINT
J
2 terms

JCPOA (Joint Comprehensive Plan of Action)

General / Regional

The 2015 nuclear agreement between Iran and world powers that limited Iran's nuclear program in exchange for sanctions relief. The U.S. withdrew in 2018.

Related:Nuclear ProgramSanctionsEnrichment

JIPOE (Joint Intelligence Preparation of the Operational Environment)

Military & Defense

The joint force version of IPB that analyzes adversary capabilities, the operational environment, and potential threats to support joint operations.

Related:IPBCOAThreat Assessment
K
1 term

KEV (Known Exploited Vulnerabilities)

Cyber Security

CISA's catalog of vulnerabilities that are actively being exploited in the wild. Federal agencies are required to remediate KEV entries within specified timeframes.

Related:CVECISAVulnerability
M
2 terms

Malware

Cyber Security

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Types include viruses, worms, trojans, ransomware, spyware, and rootkits.

Related:RansomwareRATPayload

MITRE ATT&CK

Cyber Security

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Used to understand threat actor behavior and improve defensive capabilities.

Related:TTPsThreat ActorIOC
O
3 terms

OFAC (Office of Foreign Assets Control)

Intelligence

U.S. Treasury Department office that administers and enforces economic sanctions against targeted foreign countries, terrorists, and narcotics traffickers.

Related:SanctionsFININT

ORBAT (Order of Battle)

Military & Defense

The hierarchical organization, command structure, strength, and disposition of military forces. ORBAT analysis identifies units, commanders, and capabilities.

Related:Force PostureMilitary Intelligence

OSINT (Open Source Intelligence)

Intelligence

Intelligence collected from publicly available sources including news media, social media, academic publications, government reports, and commercial data.

Related:HUMINTSIGINTSocial Media
P
4 terms

Phishing

Cyber Security

A social engineering attack that uses fraudulent emails, messages, or websites to trick victims into revealing sensitive information or installing malware. Spear-phishing targets specific individuals.

Related:Social EngineeringCredential Theft

PMESII (Political, Military, Economic, Social, Information, Infrastructure)

Intelligence

An analytical framework for understanding the operational environment by examining six interconnected systems that affect stability and conflict.

Related:JIPOEIPBCountry Analysis

PMF (Popular Mobilization Forces)

Military & Defense

An Iraqi state-sponsored umbrella organization of predominantly Shia militias, many with close ties to Iran's IRGC Quds Force.

Related:IRGCProxyMilitia

Proxy

Military & Defense

A non-state armed group that receives support (funding, weapons, training) from a state sponsor to advance that state's interests while providing deniability.

Related:IRGCHezbollahHouthis
Q
1 term

Quds Force

Military & Defense

The IRGC's extraterritorial operations branch responsible for intelligence, unconventional warfare, and support to proxy forces across the Middle East.

Related:IRGCProxyHezbollah
R
3 terms

Ransomware

Cyber Security

Malware that encrypts victim files and demands payment for the decryption key. Modern ransomware groups also exfiltrate data and threaten to publish it (double extortion).

Related:MalwareIABDark Web

RAT (Remote Access Trojan)

Cyber Security

Malware that provides an attacker with remote control over an infected system, enabling surveillance, data theft, and further malicious activities.

Related:MalwareC2Backdoor

ROE (Rules of Engagement)

Military & Defense

Directives that define the circumstances and limitations under which military forces may engage adversaries. ROE balance mission requirements with legal and policy constraints.

Related:EscalationUse of Force
S
12 terms

SAM (Surface-to-Air Missile)

Military & Defense

A missile designed to be launched from the ground to destroy aircraft or other aerial targets. Iran operates various SAM systems including S-300 and indigenous designs.

Related:IADSA2/AD

Sanctions

General / Regional

Economic and diplomatic penalties imposed on countries, entities, or individuals to change behavior. Iran faces extensive U.S., EU, and UN sanctions.

Related:OFACJCPOASanctions Evasion

SATs (Structured Analytic Techniques)

Intelligence

Methodologies designed to improve intelligence analysis by making reasoning explicit, challenging assumptions, and reducing cognitive biases.

Related:ACHIntelligence Analysis

SIEM (Security Information and Event Management)

Cyber Security

Software that aggregates and analyzes security data from across an organization's IT infrastructure to detect threats, generate alerts, and support incident response.

Related:SOCThreat Intelligence

SIGINT (Signals Intelligence)

Intelligence

Intelligence derived from intercepted electronic signals and communications, including COMINT (communications) and ELINT (electronic emissions).

Related:HUMINTOSINTNSA

SLBM (Submarine-Launched Ballistic Missile)

Military & Defense

A ballistic missile capable of being launched from submarines, providing a sea-based nuclear or conventional strike capability.

Related:Ballistic MissileNuclear

SOC (Security Operations Center)

Cyber Security

A centralized facility where security professionals monitor, detect, analyze, and respond to cybersecurity incidents using technology and processes.

Related:SIEMIncident Response

SOF (Special Operations Forces)

Military & Defense

Elite military units trained for unconventional warfare, counterterrorism, direct action, and special reconnaissance missions.

Related:Quds ForceDirect Action

Source Reliability

Intelligence

An assessment of how trustworthy and credible an intelligence source is, typically rated on a scale from A (completely reliable) to F (reliability cannot be judged).

Related:Confidence LevelIntelligence Analysis

Spyware

Cyber Security

Malware designed to secretly monitor user activity and collect information such as keystrokes, screenshots, and browsing history without the user's knowledge.

Related:MalwareRATSurveillance

Strait of Hormuz

General / Regional

Strategic waterway between the Persian Gulf and Gulf of Oman through which approximately 20% of global oil passes. Iran has threatened to close it during crises.

Related:A2/ADIRGC NavyOil

Supreme Leader

General / Regional

Iran's highest authority (currently Ali Khamenei), who controls the armed forces, judiciary, and state media, and sets overall policy direction.

Related:IRGCIranian Government
T
3 terms

Threat Actor

Cyber Security

An individual or group that conducts malicious cyber activities. Categories include nation-state actors, cybercriminals, hacktivists, and insider threats.

Related:APTNation-State ActorHacktivist

Threat Assessment

Intelligence

An evaluation of the capabilities, intentions, and activities of potential adversaries to determine the level of threat they pose.

Related:I&WJIPOERisk Assessment

TTPs (Tactics, Techniques, and Procedures)

Cyber Security

The behavior patterns of threat actors describing how they conduct attacks. Tactics are the 'why', techniques are the 'how', and procedures are the specific implementation.

Related:MITRE ATT&CKIOCThreat Actor
U
1 term

UAV/UAS (Unmanned Aerial Vehicle/System)

Military & Defense

Remotely piloted or autonomous aircraft used for surveillance, reconnaissance, and strike missions. Iran has developed extensive drone capabilities.

Related:ISRLoitering Munition
W
2 terms

Wiper

Cyber Security

Destructive malware designed to permanently delete or corrupt data on infected systems, often used in state-sponsored attacks for sabotage rather than financial gain.

Related:MalwareNation-State Actor

WMD (Weapons of Mass Destruction)

General / Regional

Nuclear, chemical, biological, and radiological weapons capable of causing mass casualties. Iran is suspected of pursuing nuclear weapons capability.

Related:Nuclear ProgramProliferationCBRN
Z
1 term

Zero-Day

Cyber Security

A vulnerability that is unknown to the software vendor and has no available patch. Zero-day exploits are highly valuable and often used in sophisticated attacks.

Related:VulnerabilityExploitCVE

This glossary provides definitions for common terms used in cyber security, military intelligence, and threat analysis. Definitions are simplified for accessibility while maintaining accuracy.