|“||[u]sing a weakness or vulnerability in an automated information system to access or cause damage to or loss of an asset.||”|
|“||[t]he process of obtaining intelligence information from any source and taking advantage of it.||”|
|“||taking full advantage of any information that has come to hand for tactical, operational, or strategic purposes.||”|
- ↑ The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications: An Awareness Document, at F-2.
- ↑ OPSEC Glossary of Terms.
- ↑ Joint Publication 3-13.1, at I-12.