Reconnaissance (disambiguation): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Chris Day
No edit summary
imported>Meg Taylor
No edit summary
 
Line 3: Line 3:
In a military and intelligence context, '''reconnaissance''' involves dissimilar concepts, either conducting potential combat operations, or the gathering of information by physical observation or remote viewing with technological sensors.  
In a military and intelligence context, '''reconnaissance''' involves dissimilar concepts, either conducting potential combat operations, or the gathering of information by physical observation or remote viewing with technological sensors.  


{{r|Armed reconnaissance}}
{{rpl|Armed reconnaissance}}
{{r|Reconnaissance in force}}
{{rpl|Reconnaissance in force}}
{{r|Special reconnaissance}}  
{{rpl|Special reconnaissance}}  


'''Reconnaissance satellites''' and '''reconnaissance aircraft''' also gather information. Without further detail, they are assumed to be primarily collecting [[imagery intelligence]].
'''Reconnaissance satellites''' and '''reconnaissance aircraft''' also gather information. Without further detail, they are assumed to be primarily collecting [[imagery intelligence]].

Latest revision as of 04:40, 26 September 2013

This disambiguation page lists articles associated with the same or a similar title.

Military and intelligence

In a military and intelligence context, reconnaissance involves dissimilar concepts, either conducting potential combat operations, or the gathering of information by physical observation or remote viewing with technological sensors.

Reconnaissance satellites and reconnaissance aircraft also gather information. Without further detail, they are assumed to be primarily collecting imagery intelligence.

Computer network security

Network reconnaissance is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking to protect it or to enforce its acceptable use policy. It also may be a precursor to external attacks on the network.

Certain apparent reconnaissance activities, which would be highly suspicious if coming from outside the network, may be perfectly normal network performance and reliability monitoring when performed inside the boundaries of the network. Some network intrusion detection systems have difficulty in determining if a reconnaissance activity is internal or external, and generate many false alarms causing fear, uncertainty and doubt.