unintentional radiation exploitation
Exploitation for operational purposes of noninformation-bearing elements of electromagnetic energy unintentionally emanated by targets of interest.

Military dictionary. 2000.

Look at other dictionaries:

  • Radar MASINT — is one of the subdisciplines of Measurement and Signature Intelligence (MASINT) and refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT),… …   Wikipedia

  • List of intelligence gathering disciplines — Intelligence Gathering DisciplinesHUMINTHuman Intelligence gathered from a person on the ground. *Espionage. * Friendly accredited diplomats * Military attaches * Patrolling (Military police, patrols, etc) *Non governmental organizations (NGOs) * …   Wikipedia

  • Life Sciences — ▪ 2009 Introduction Zoology       In 2008 several zoological studies provided new insights into how species life history traits (such as the timing of reproduction or the length of life of adult individuals) are derived in part as responses to… …   Universalium

  • Measurement and Signature Intelligence — Measurement and Signature Intelligence, or MASINT, refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of the major disciplines mentioned above. As a means of collecting… …   Wikipedia

  • Measurement and signature intelligence — (MASINT) is a branch of intelligence gathering activities. MASINT, may have aspects of intelligence analysis management, since certain aspects of MASINT, such as the analysis of electromagnetic radiation received by signals intelligence are more… …   Wikipedia

  • Flora of Australia — For the series of monographs, see Flora of Australia (series). Australian plants redirects here. For the magazine, see Australian Plants. Part of a series on Wildlife of …   Wikipedia

  • Fuzzy locating system — Fuzzy locating is a rough but reliable method based on appropriate measuring technology for estimating a location of an object. The concept of precise or ‘’crisp locating’’ is replaced with respect to the operational requirements and the economic …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Asian black bear — Conservation status Vulnerable …   Wikipedia

  • Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”