Section Glossaryby Sandy
A
A
and R
|
Advance and Retreat
|
Absorption Tests
|
Tests ran on chemicals procured
|
Accelerated Clock
|
A faster timetable that is normally required
|
Acceptable Collateral
|
An Innocent that Section knows will probably be killed to complete their goals
|
Access Card
|
Allows entrance to the private levels of Section One
|
Advanced Digital Sensore System
|
A device that keeps a computer file from being downloaded or copied
|
Agency
|
In charge of security for Mijovich
|
A - I Program
|
A program of Artificial Intelligence
|
Air Tactical
|
Section One Mission support from the air
|
Alarm Frequency
|
Commuications that were received (alarm) from missing teams before they shut down
|
Alive 2000
|
Cosmetic that Madline and Nikita Sell while attempting to rescue Michael
|
A.L.L.
|
Acute Lymphocytic Leukemia
|
Alpha Levels
|
Stages of adjustment that could happen from being brought into Section (denial to suicide)
|
Alpha Point
|
Whereabouts of the mission van during an mission
|
Alpha Secure
|
Transmission which has a high level of authenticity
|
Alternate Cover
|
Alternative retreat used when surveillance is assumed
|
Aluminum Oxide
|
Natural or synthetic oxide of aluminum
|
Anchor
|
Group of operatives working at Section to help the active teams
|
Arbitrary
|
Section One operative that is under suspicion (their status)
|
Armored Transport
|
What is looked for on a satellite image to make an unauthorized iris scan
|
Asni Group
|
Outside assassins that Section One hires to kill George
|
Assault Team
|
Section One Operative which can be used to assault a target
|
Assembly Tracker
|
Device found on Tyco during a raid on a terrorist organization
|
Auxiliary Sections
|
Other Sections than Section One
|
B
Back Filing
|
To create a backup story for a mission
|
Backfill
|
False story inserted in a file for coverup
|
Beacon
|
Signal from a Mission team
|
Bio Engineering
|
Processs used to alter skeletal structures
|
Bio Tech
|
Dept of Section One
|
Breached
|
Section One mission operative's cover is detected
|
Bridge
|
Person or method that let Section One get closer to the Main Purpose
|
Broad Sweep
|
Method to search which involves a large area
|
C
Class A Priority
|
Main Target
|
Clip
|
Ammunition Carrier
|
Code
|
Standard Operating Procedures for Section One
|
Command Center
|
Main Headquarters
|
Committee
|
Area of Section One where Madeline, Operation and George Meet
|
Counter
Surveillance
|
Enemy surveillance
|
CR 14
|
Deadly bioweapon
|
D
Data Dump
|
Area where info c/b dropped and picked by by another without being detected
|
Delta File
|
File in Data that needs alteration
|
Drone Program
|
Computer virus used to steal Section One's Directory
|
E
Engage
|
Section orders to being a mission
|
|
Exit Point
|
Area to wait to be picked up
|
F
Field Router
|
A device that has all of Section's codes and frequencies
|
Flash Mission
|
Mission on short notice where profiles are given to operative on the way of of Section
|
FLT Chips
|
A device which is needed to do reprogramming
|
Fourier
Transformer
|
Used on surveillance images
|
Full Inquiry
|
Investigation into Section One's activities by Oversight
|
Full Status
|
Operative is on full status when not in abeyance or on probation
|
G
G4
|
Area of Section One to which Michael tracks Tyco
|
GAME PLAN
|
Synonym for mission profile, plans for a mission
|
GANDIUM FOUR
|
Grade one bio-weapon that is secretly being produced
by Genefex for Red Cell
|
GATE ARRAYS
|
Characteristics of the phasing shell
|
GELMAN FILE
|
Computer file that contains all the information about
the Gelman process; the only copy is at Section One headquarters
|
GEMSTONE FILE
|
A Section One computer file that shows Operations has
been working with Saddam Hussein of Iraq
|
GENE-CODED
|
A biometric method of security that allows only a person
with the correct genetic code access to protected material
|
GENEFEX
|
Pharmaceutical lab and a producer of over-the-counter
drugs, working with Red Cell to produce gandium four, a grade-one
biological weapon
|
G-FOUR
|
Name of Operations' umbrella file
|
GLOBAL SECURITY EMERGENCY
|
What would happen if Fifth Order leverages
the decryption codes
|
GO DARK
|
To cut communications between an operative and Section One
in order to avoid detection
|
GRADE ONE
|
Classification level of toxicity for bio-weapons
|
GRADE TWO BREACH
|
Status when a prisoner has escaped within Section
One headquarters
|
GRAYSTONE
|
Password for Alec Chandler's computer
|
GREEN LIST
|
List of people with whom Section One works, they cannot
be killed without special permission from Oversight
|
GREEN TEAM
|
A group of Section One operatives monitoring the isotope
room
|
GRUNEN 412
|
Explosive device that has a detonator that is pitch and
roll sensitive
|
H
HARD WEDGE
|
Maneuver Madeline plans to use to deal with Michael and
Nikita and their unsanctioned relationship
|
HARD-WIRED DECRYPTION CODES
|
Material that Fifth Order hoped to get
from a downed Norwegian satellite
|
HARD TARGET SEARCH
|
Search that involves looking for a particular
target
|
HEADER BLOCK
|
Protection against a computer virus scan
|
HEAD STRATEGIST
|
Position to which Zalman is promoted to over Michael
|
HELIX
|
Name Section One uses for a mercenary special force
responsible for multiple terrorist acts
|
HOLDING
|
Section room in which Kudrin was kept while being
interrogated
|
HOLLOW
|
Not substantive, this is how Birkoff describes the groups
that have taken responsibility for the embassy bombing
|
HOOK
|
Something or someone that Section One can use to gain access to
a target organization
|
HOSTILES
|
Generic word used for the
enemy
|
HOT ZONE
|
Area in which surveillance by the enemy is assumed
|
I
IMPEDANCE MATCH
|
Test Walter wants to run on a newly found device
|
IMPORT BUREAU
|
Office Madeline and Nikita go to get a license to sell
cosmetics
|
INCENTIVE SCENARIO
|
Lie used by Madeline to motivate a Gerard to
carry out the mission
|
INCIDENTAL DISPOSAL OF INNOCENTS
|
Euphemism for Section One's murder
of innocents who become aware of its existence
|
INCUBATE
|
Euphemism for killing any innocents who become aware of
Section One or its activities
|
INFRARED SCAN
|
A program Birkoff used to examine the contents of a
jet
|
IN FULL PHASE
|
Point in a mission beyond which the mission cannot be
aborted
|
INGRESS
|
A way into a building
|
INNOCENT
|
An uninvolved bystander in the interplay between
Section One and its targets
|
INSIDE OPERATOR
|
Member of a terrorist grouping who does not have
contact with the public
|
INTEL
|
Short for intelligence, information gathered prior to a
mission
|
IRIS MATCH
|
Security method that involves the scanning and
identification of a person's iris to allow access
|
J
JACQUES
|
Michael's Section One codename
|
JOSEPHINE
|
Nikita's Section One codename
|
K
KAPPA SIGNAL
|
Device that will enable Navaro to electronically infiltrate Section I
|
KAPPA TRANSMITTER
|
Device that would allow Navaro to tunnel into
Section One's computers
|
KITCHEN
|
Slang term for a chemical plant or lab
|
KL TRANSFORM PLATFORM
|
Used to run simulations, has a large frequency domain delta
|
L
LAN SAT Coverage
|
Satellite surveillance that was used to locate missing Section Teams
|
Layered Matric
|
Method of secure communications between the Sections
|
Levels (Section One):
|
Section One consists of numerous levels (at least twenty)
|
Linkage
|
Spyworld jargon for "connection"
|
Live Sim
|
Short for live simulation, dress rehearsal for a real mission
|
Locked
|
Engaged, something that cannot be changed
|
Looped In
|
Status of being involved in an operation or the thread of communication
|
L Virus
|
Fast acting nerve gas that has only a short life span
|
M
Marker
|
A device placed on a target that can be tracked from the ground or by satellite
|
Micro Cartridges
|
Ammunition carrying shell which encases a tranquilizer dart
|
Monolux Disk
|
disk Micheal uses to record Nikita, can be detected if someone else were to open
|
O
Ocular Therapy
|
What is necessary to maintain the Gelman Process
|
Outside Team
|
Section One Operative that guard the perimeter on a Mission
|
P
Parallel Teams
|
Section One teams that attack two sites at the same time
|
PDA
|
Personal Data Assistant (computer)
|
Perimeter Security
|
Area that is around a target
|
Plastique
|
Explosive
|
P.O.S.
|
Possibility of Success
|
Pulse
|
A Signal which is sent from a communication set
|
R
RIM
|
Area where operative protect the entrance or exit
|
S
Scramble
|
Disrupt satellite surveillance
|
Secured Line
|
Telephone which has an untraceable connection
|
SIM
|
Simulation
|
Singularitites
|
Strange happenings that cause suspicions
|
Stagger Approach
|
Method that send operatives to a target in staggered intervals
|
T
TAG
|
Placing a tracking device on a person or thing so Section One can
monitor it/their movement
|
Tracing
|
Tracking an incomming phone call
|
U
Unprotected Target
|
After Directory was stolen this was Status of Section Operative
|
Unrelated Agression
|
Attack on Operatives which is not related to the mission on hand
|
Uplink Scanner
|
A device which was used to look for Section One communications
|
W
White Room
|
A white, round room in Section One which is used for interrogating prisoners
and for new recruits
|
Window
|
The amount of time in which operatives have to complete a mission
|
Y
Y Directive
|
Protocol Michael wants Birkoff to initiate which requires George to come
Directly to Section One
|
YOU HAVE COMMAND
I HAVE COMMAND
|
Protocol for exchanging authority for the running of Section One
|
Z
Z Screen
|
Transmission disguise which filters sources
|