The IT Law Wiki
Advertisement

Definitions[]

Computer systems[]

Reconnaissance is

the phase of an attack where an attacker gathers information on, and maps networks, as well as probing them for exploitable vulnerabilities in order to hack them.[1]

Military[]

Reconnaissance (RECON) is

[a] mission undertaken to obtain, by visual observation or other detection methods, information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographic, or geographic characteristics of a particular area.[2]
[t]hose operations undertaken to obtain, by visual observation or other detection methods, information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographical or geographical characteristics and the indigenous population of a particular area.[3]

Overview (Military)[]

"The seven fundamentals of reconnaissance are —

  • Ensure continuous reconnaissance.
  • Do not keep reconnaissance assets in reserve.
  • Orient on the reconnaissance objective.
  • Report information rapidly and accurately.
  • Retain freedom of maneuver.
  • Gain and maintain enemy contact.
  • Develop the situation rapidly.[4]

References[]

  1. National Cyber Security Strategy 2016 to 2021, Glossary, Annex 2, at 76.
  2. U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) (full-text).
  3. Department of the Army, Information Collection, at Glossary-2.
  4. FM 3-55, at 1-7.

See also[]

Advertisement