Department of Defense dictionary of military and associated terms (Online)DIANE Publishing, 1979 - 377 pages |
From inside the book
Results 1-5 of 100
Page 3
... called AWSM. 2. acoustic warfare countermeasures. That aspect of acoustic warfare involving actions taken to prevent or reduce an enemy's effective use of the underwater acoustic spectrum. Acoustic warfare countermeasures involve ...
... called AWSM. 2. acoustic warfare countermeasures. That aspect of acoustic warfare involving actions taken to prevent or reduce an enemy's effective use of the underwater acoustic spectrum. Acoustic warfare countermeasures involve ...
Page 8
... called AWADS. (JP 3-17) advisory area — (*) A designated area within a flight information region where air traffic advisory service is available. aerial picket — See air picket. aerial port — An airfield that has been designated for the ...
... called AWADS. (JP 3-17) advisory area — (*) A designated area within a flight information region where air traffic advisory service is available. aerial picket — See air picket. aerial port — An airfield that has been designated for the ...
Page 14
... called mapping camera. air cartographic photography — (*) The taking and processing of air photographs for mapping and charting purposes. air component coordination element — An Air Force component element that interfaces and provides ...
... called mapping camera. air cartographic photography — (*) The taking and processing of air photographs for mapping and charting purposes. air component coordination element — An Air Force component element that interfaces and provides ...
Page 17
... called AD. See also active air defense; aerospace defense; passive air defense. air defense action area — (*) An area and the airspace above it within which friendly aircraft or surface-to-air weapons are normally given precedence in ...
... called AD. See also active air defense; aerospace defense; passive air defense. air defense action area — (*) An area and the airspace above it within which friendly aircraft or surface-to-air weapons are normally given precedence in ...
Page 20
... called AFSOB. (JP 3-05) Air Force special operations component — The Air Force component of a joint force special operations component. Also called AFSOC. See also Army special operations component; Navy special operations component ...
... called AFSOB. (JP 3-05) Air Force special operations component — The Air Force component of a joint force special operations component. Also called AFSOC. See also Army special operations component; Navy special operations component ...
Other editions - View all
Common terms and phrases
action activities agency air defense Air Force air mobility air operations airborne aircraft airlift altitude amphibious operation amphibious vehicles and/or Army assigned attack authority called capability cargo casualty combatant command command and control commander’s communications component commander control center coordination Department of Defense deployment designated device direction electromagnetic electromagnetic radiation electromagnetic spectrum electronic warfare element enemy equipment evacuation execution facilities fire support flight FPCON friendly hostile identified imagery intelligence joint operations landing loading Marine materiel military operations Military Sealift Command missile mission movement NATO naval mine warfare normally nuclear weapon objective officer operation plan operational area operations center organization personnel psychological operations radar radiation reconnaissance requirements Reserve responsibility route search and rescue ship SIGINT signals intelligence special operations specific strategic supply surface target task force theater transportation unit vehicle zone
Popular passages
Page 422 - Geneva Convention relative to the Treatment of Prisoners of War of 12 August 1949.
Page 184 - That (a) whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information to be obtained is to be used to the injury of the United States, or to the advantage of any foreign nation...
Page 309 - The science of planning and carrying out the movement and maintenance of forces. In its most comprehensive sense, those aspects of military operations which deal with: a.
Page 140 - A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or automatic means.
Page 166 - Major disaster" means any flood, drought, fire, hurricane, earthquake, storm, or other catastrophe in any part of the United States which, in the determination of the President, is or threatens to be of sufficient severity and magnitude to warrant disaster assistance by the Federal Government...
Page 156 - JCS defines deterrence as the prevention from action by fear of the consequences. Deterrence Is a state of mind brought about by the existence of a credible threat of unacceptable counteraction.
Page 456 - Restricted Data" means all data concerning (1) design, manufacturing or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include any data declassified or removed from the Restricted Data category pursuant to section 142 of the act. (j) "Source of material" means source material as defined in the regulations contained in Part 40 of this chapter.
Page 16 - As used in this subsection, the term 'aircraft piracy' means any seizure or exercise of control, by force or violence or threat of force or violence and with, wrongful intent, of an aircraft in flight in air commerce.
Page 422 - The inhabitants of a territory which has not been occupied, who, on the approach of the enemy, spontaneously take up arms to resist the invading troops without having had time to organize themselves in accordance with Article 1, shall be regarded as belligerents if they carry arms openly and if they respect the laws and customs of war.
Page 107 - COMSAT. communications security — The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study.