Department of Defense dictionary of military and associated terms (Online)DIANE Publishing, 1979 - 377 pages |
From inside the book
Results 1-5 of 100
Page 5
... and public about an issue or activity. An active approach is characterized by announcing the event or addressing the issue through news media advisories, news releases, personal contacts, news conferences, or other forms of public ...
... and public about an issue or activity. An active approach is characterized by announcing the event or addressing the issue through news media advisories, news releases, personal contacts, news conferences, or other forms of public ...
Page 10
... and / or coalition , joint , and / or Service doctrine or tactics , techniques , and procedures , as applicable , to prepare personnel or units for multinational operations . Usually conducted between US and non - US forces . May also ...
... and / or coalition , joint , and / or Service doctrine or tactics , techniques , and procedures , as applicable , to prepare personnel or units for multinational operations . Usually conducted between US and non - US forces . May also ...
Page 11
... and equipment which have the appearance of authenticity as to claimed origin and which support and are consistent with ... or geolocation. 2. A prominent radar-significant feature, for example a tip of land, or bridge, used to assist an ...
... and equipment which have the appearance of authenticity as to claimed origin and which support and are consistent with ... or geolocation. 2. A prominent radar-significant feature, for example a tip of land, or bridge, used to assist an ...
Page 18
... and/or firepower umbrella. See also air defense action area; air defense identification zone; positive identification and radar advisory zone. (JP 3-52) air defense operations center — See air defense control center. air defense ...
... and/or firepower umbrella. See also air defense action area; air defense identification zone; positive identification and radar advisory zone. (JP 3-52) air defense operations center — See air defense control center. air defense ...
Page 21
... or electronic contact by a friendly aircraft with another aircraft. Normally, the air intercept is conducted in the ... and altitude. c. transition phase — Increase or decrease of speed and altitude required for the attack. d. attack ...
... or electronic contact by a friendly aircraft with another aircraft. Normally, the air intercept is conducted in the ... and altitude. c. transition phase — Increase or decrease of speed and altitude required for the attack. d. attack ...
Other editions - View all
Common terms and phrases
action activities agency air defense Air Force air mobility air operations airborne aircraft airlift altitude amphibious operation amphibious vehicles and/or Army assigned attack authority called capability cargo casualty combatant command command and control commander’s communications component commander control center coordination Department of Defense deployment designated device direction electromagnetic electromagnetic radiation electromagnetic spectrum electronic warfare element enemy equipment evacuation execution facilities fire support flight FPCON friendly hostile identified imagery intelligence joint operations landing loading Marine materiel military operations Military Sealift Command missile mission movement NATO naval mine warfare normally nuclear weapon objective officer operation plan operational area operations center organization personnel psychological operations radar radiation reconnaissance requirements Reserve responsibility route search and rescue ship SIGINT signals intelligence special operations specific strategic supply surface target task force theater transportation unit vehicle zone
Popular passages
Page 422 - Geneva Convention relative to the Treatment of Prisoners of War of 12 August 1949.
Page 184 - That (a) whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information to be obtained is to be used to the injury of the United States, or to the advantage of any foreign nation...
Page 309 - The science of planning and carrying out the movement and maintenance of forces. In its most comprehensive sense, those aspects of military operations which deal with: a.
Page 140 - A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or automatic means.
Page 166 - Major disaster" means any flood, drought, fire, hurricane, earthquake, storm, or other catastrophe in any part of the United States which, in the determination of the President, is or threatens to be of sufficient severity and magnitude to warrant disaster assistance by the Federal Government...
Page 156 - JCS defines deterrence as the prevention from action by fear of the consequences. Deterrence Is a state of mind brought about by the existence of a credible threat of unacceptable counteraction.
Page 456 - Restricted Data" means all data concerning (1) design, manufacturing or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include any data declassified or removed from the Restricted Data category pursuant to section 142 of the act. (j) "Source of material" means source material as defined in the regulations contained in Part 40 of this chapter.
Page 16 - As used in this subsection, the term 'aircraft piracy' means any seizure or exercise of control, by force or violence or threat of force or violence and with, wrongful intent, of an aircraft in flight in air commerce.
Page 422 - The inhabitants of a territory which has not been occupied, who, on the approach of the enemy, spontaneously take up arms to resist the invading troops without having had time to organize themselves in accordance with Article 1, shall be regarded as belligerents if they carry arms openly and if they respect the laws and customs of war.
Page 107 - COMSAT. communications security — The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study.