In operations security usage
| data derived from friendly detectable
| actions and open-source information that an adversary can interpret and piece together to reach conclusions or estimates of friendly intentions
| capabilities or
| activities - only individual words found (there may be no translations for some thesaurus entries in the bilingual dictionary)