Department of Defense dictionary of military and associated terms (Online)DIANE Publishing, 1979 - 377 pages |
From inside the book
Results 1-5 of 84
Page 2
... collection of information . acoustic circuit — A mine circuit which responds to the acoustic field of a target . See also mine . acoustic intelligence — ( * ) Intelligence derived from the collection and processing of acoustic phenomena ...
... collection of information . acoustic circuit — A mine circuit which responds to the acoustic field of a target . See also mine . acoustic intelligence — ( * ) Intelligence derived from the collection and processing of acoustic phenomena ...
Page 3
... collection (acquisition). acquisition and cross-servicing agreement — Agreements negotiated on a bilateral basis with US allies or coalition partners that allow US forces to exchange most common types of support, including food, fuel ...
... collection (acquisition). acquisition and cross-servicing agreement — Agreements negotiated on a bilateral basis with US allies or coalition partners that allow US forces to exchange most common types of support, including food, fuel ...
Page 5
... collection of actions. Also called ACT. See also establishment. act of mercy — In evasion and recovery operations, assistance rendered to evaders by an individual or elements of the local population who sympathize or empathize with the ...
... collection of actions. Also called ACT. See also establishment. act of mercy — In evasion and recovery operations, assistance rendered to evaders by an individual or elements of the local population who sympathize or empathize with the ...
Page 10
... collection agency . See also agent ; intelligence cycle ; agent source . In intelligence usage , one who is authorized or instructed to obtain or to assist in obtaining information for intelligence or counterintelligence purposes ...
... collection agency . See also agent ; intelligence cycle ; agent source . In intelligence usage , one who is authorized or instructed to obtain or to assist in obtaining information for intelligence or counterintelligence purposes ...
Page 13
... collected information produced in flight. airborne troops — Those ground units whose primary mission is to make assault landings from the air. See also troops. air-breathing missile — A missile with an engine requiring the intake of air ...
... collected information produced in flight. airborne troops — Those ground units whose primary mission is to make assault landings from the air. See also troops. air-breathing missile — A missile with an engine requiring the intake of air ...
Other editions - View all
Common terms and phrases
action activities agency air defense Air Force air mobility air operations airborne aircraft airlift altitude amphibious operation amphibious vehicles and/or Army assigned attack authority called capability cargo casualty combatant command command and control commander’s communications component commander control center coordination Department of Defense deployment designated device direction electromagnetic electromagnetic radiation electromagnetic spectrum electronic warfare element enemy equipment evacuation execution facilities fire support flight FPCON friendly hostile identified imagery intelligence joint operations landing loading Marine materiel military operations Military Sealift Command missile mission movement NATO naval mine warfare normally nuclear weapon objective officer operation plan operational area operations center organization personnel psychological operations radar radiation reconnaissance requirements Reserve responsibility route search and rescue ship SIGINT signals intelligence special operations specific strategic supply surface target task force theater transportation unit vehicle zone
Popular passages
Page 422 - Geneva Convention relative to the Treatment of Prisoners of War of 12 August 1949.
Page 184 - That (a) whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information to be obtained is to be used to the injury of the United States, or to the advantage of any foreign nation...
Page 309 - The science of planning and carrying out the movement and maintenance of forces. In its most comprehensive sense, those aspects of military operations which deal with: a.
Page 140 - A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or automatic means.
Page 166 - Major disaster" means any flood, drought, fire, hurricane, earthquake, storm, or other catastrophe in any part of the United States which, in the determination of the President, is or threatens to be of sufficient severity and magnitude to warrant disaster assistance by the Federal Government...
Page 156 - JCS defines deterrence as the prevention from action by fear of the consequences. Deterrence Is a state of mind brought about by the existence of a credible threat of unacceptable counteraction.
Page 456 - Restricted Data" means all data concerning (1) design, manufacturing or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include any data declassified or removed from the Restricted Data category pursuant to section 142 of the act. (j) "Source of material" means source material as defined in the regulations contained in Part 40 of this chapter.
Page 16 - As used in this subsection, the term 'aircraft piracy' means any seizure or exercise of control, by force or violence or threat of force or violence and with, wrongful intent, of an aircraft in flight in air commerce.
Page 422 - The inhabitants of a territory which has not been occupied, who, on the approach of the enemy, spontaneously take up arms to resist the invading troops without having had time to organize themselves in accordance with Article 1, shall be regarded as belligerents if they carry arms openly and if they respect the laws and customs of war.
Page 107 - COMSAT. communications security — The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study.