Target Development Standards

Total Page:16

File Type:pdf, Size:1020Kb

Target Development Standards UNCLASSIFIED//FOR OFFICIAL USE ONLY CJCSI 3370.01B 6 May 2016 TARGET DEVELOPMENT STANDARDS JOINT STAFF WASHINGTON, D.C. 20318 UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY (INTENTIONALLY BLANK) UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-2 CJCSI 3370.01B DISTRIBUTION: A, B, C 6 May 2016 TARGET DEVELOPMENT STANDARDS Reference(s): See Enclosure H for References 1. Purpose. The purpose of this instruction is to document DoD policy and standards for target development and target intelligence standards consistent with references A through AH. 2. Superseded/Cancellation. CJCSI 3370.01A, 17 October 2014, “Target Development Standards,” is hereby superseded. CJCSM 3370.01, 25 October 2013, “Target Graphics Standards,” and CJCSM 3375.01, 29 May 2014, “ Target Intelligence Data Standards,” are hereby canceled. CJCSI 3370.01B consolidates content from all three directives. 3. Applicability. This Instruction applies to the Joint Staff, Services, Combatant Commands, joint forces, DoD Combat Support Agencies (CSA), and joint activities. 4. Policy. See Enclosures A through G. 5. Definitions. See Glossary, Part II, Terms and Definitions. 6. Responsibilities. See Enclosure A 7. Summary of Changes. This instruction consolidates and updates guidance on target development standards, target graphic standards, and target intelligence data standards. Document updates include: a. Annexes have been added to provide specific details for the basic, intermediate, and advanced target development of each of the five target types. b. Vetting: Defines the timeframe for “EXPEDITED” target vetting. UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED CJCSI 3370.01B 6 May 2016 TABLE OF CONTENTS Page ENCLOSURE A -- TARGET DEVELOPMENT ROLES AND RESPONSIBILITIES ................................................................................ A-1 Introduction ........................................................................................... A-1 Command Relationships ........................................................................ A-1 Joint Staff (JS) Targeting ........................................................................ A-2 Defense Intelligence Analysis Program (DIAP), Intelligence Planning and Modernized Integrated Database (MIDB) .................................... A-3 Intelligence Community (IC) Organizations that Support Targeting ......... A-4 Intelligence Organizations that Support Targeting .................................. A-8 Other Organizations that Support Targeting ........................................... A-9 Allied and Coalition Partners ................................................................ A-10 ENCLOSURE B -- TARGET DEVELOPMENT OVERVIEW AND CONCEPTS .... B-1 Introduction ........................................................................................... B-1 The Joint Operational Planning Process (JOPP) and Joint Intelligence Requirements ................................................................................... B-1 Creating Effects in the Operational Environment .................................... B-3 Target Intelligence .................................................................................. B-3 Target Development Defined ................................................................... B-5 The Joint Targeting Cycle (JTC) and Target Development ........................ B-7 Target Taxonomy .................................................................................... B-7 Applying Defense Threat Assessments (DTA), Joint Intelligence Preparation of the Operational Environment (JIPOE), Target System Analysis (TSA), and the Targeting Taxonomy to the Target Development Process ........................................................... B-11 Target Intelligence Production .............................................................. B-15 Target Development Resources ............................................................. B-15 ENCLOSURE C -- TARGET SYSTEM ANALYSIS (TSA) ................................... C-1 Introduction ........................................................................................... C-1 Target System Analysis (TSA) Value ........................................................ C-2 The Target System Analysis (TSA) Process .............................................. C-2 Target System Analysis (TSA) Product Review or Modification Based on Assessment ...................................................................................... C-6 APPENDIX A -- TARGET SYSTEMS ..................................................... C-A-1 APPENDIX B -- TARGET SYSTEMS ANALYSIS PRODUCT FORMAT .... C-B-1 ENCLOSURE D -- TARGET DEVELOPMENT AT THE ENTITY LEVEL ........... D-1 Introduction .......................................................................................... D-1 Target Development Responsibility ........................................................ D-2 Coordinating Target Development .......................................................... D-2 i UNCLASSIFIED UNCLASSIFIED CJCSI 3370.01B 6 May 2016 Types of Targets .................................................................................... D-3 Electronic Target Folders ....................................................................... D-5 APPENDIX A -- REMARK DEVELOPMENT .......................................... D-A-1 APPENDIX B -- TARGET DEVELOPMENT REMARK TYPES ................. D-B-1 ANNEX A -- FACILITY TARGETS ................................................D-B-A-1 ANNEX B -- INDIVIDUAL TARGETS .......................................... D-B-B-1 ANNEX C -- VIRTUAL TARGETS ............................................... D-B-C-1 ANNEX D -- EQUIPMENT TARGETS ......................................... D-B-D-1 ANNEX E -- ORGANIZATION TARGETS .................................... D-B-E-1 APPENDIX C -- ELECRONIC TARGET FOLDERS (ETF) STRUCTURE AND CONTENT .................................................................. D-C-1 APPENDIX D -- FEDERATED ELECTRONIC TARGET FOLDERS (ETF) PRODUCTION ............................................................ D-D-1 APPENDIX E -- SAMPLE TARGET DEVELOPMENT CHECKLIST ......... D-E-1 ENCLOSURE E -- VETTING, VALIDATION, AND TARGET LIST MANAGEMENT ...................................................................................... E-1 Introduction ........................................................................................... E-1 Procedures ............................................................................................. E-1 Target Lists in Modernized Integrated Database (MIDB) .......................... E-6 Removing Targets from Target Lists ........................................................ E-6 Target List Naming Convention ............................................................... E-7 APPENDIX A -- TARGET VETTING ...................................................... E-A-1 APPENDIX B -- TARGET LIST TYPES AND JUSTIFICATION ................ E-B-1 ENCLOSURE F -- AIMPOINT DATA STANDARDS .......................................... F-1 Introduction ........................................................................................... F-1 Joint Desired Point of Impact ................................................................. F-1 Non-Lethal Reference Point Data Standards ........................................... F-8 Weapon Characteristics Standards ....................................................... F-11 ENCLOSURE G -- GEOSPATIALLY ENABLED TARGET MATERIALS AND TARGET GRAPHIC STANDARDS ........................................................... G-1 Introduction .......................................................................................... G-1 Geospatially Enabled Target Materials (GETM) Database Standards ...... G-1 Target Graphics (TG) Standard Annotations .......................................... G-5 Target Graphics (TG) Standards for Basic Target Development .............G-15 Target Graphics (TG) Standards for Intermediate Target Development of Facility Target Types .......................................................................G-15 ii UNCLASSIFIED UNCLASSIFIED CJCSI 3370.01B 6 May 2016 Target Graphics (TG) Standards for Advanced Target Development of Facility Target Types .......................................................................G-19 Target Graphics (TG) Standards for Facility Target Type Supplemental Graphics ........................................................................................G-29 Target Graphics (TG) Standards for Battle Damage Assessment (BDA) of Facility Target Types .......................................................................G-32 Deviation from Standard ......................................................................G-34 Magnification/Zoom Box ......................................................................G-34 Imagery Standards ...............................................................................G-34 APPENDIX A -- TARGET GRAPHIC EXAMPLES ................................... G-A-1 APPENDIX B -- JOINT DESIRED POINT OF IMPACT (JDPI) REFERENCE ILLUSTRATIONS ................................... G-B-1 APPENDIX C -- TARGET GRAPHIC STORAGE AND DISSEMINATION . G-C-1 APPENDIX D -- GEOSPATIALLY ENABLED TARGET MATERIALS DATA ATTRIBUTE TABLE EXAMPLE ......................... G-D-1 ENCLOSURE H -- REFERENCES ................................................................ H-1 GLOSSARY ...............................................................................................
Recommended publications
  • Winning the Salvo Competition Rebalancing America’S Air and Missile Defenses
    WINNING THE SALVO COMPETITION REBALANCING AMERICA’S AIR AND MISSILE DEFENSES MARK GUNZINGER BRYAN CLARK WINNING THE SALVO COMPETITION REBALANCING AMERICA’S AIR AND MISSILE DEFENSES MARK GUNZINGER BRYAN CLARK 2016 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS (CSBA) The Center for Strategic and Budgetary Assessments is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s analysis focuses on key questions related to existing and emerging threats to U.S. national security, and its goal is to enable policymakers to make informed decisions on matters of strategy, security policy, and resource allocation. ©2016 Center for Strategic and Budgetary Assessments. All rights reserved. ABOUT THE AUTHORS Mark Gunzinger is a Senior Fellow at the Center for Strategic and Budgetary Assessments. Mr. Gunzinger has served as the Deputy Assistant Secretary of Defense for Forces Transformation and Resources. A retired Air Force Colonel and Command Pilot, he joined the Office of the Secretary of Defense in 2004. Mark was appointed to the Senior Executive Service and served as Principal Director of the Department’s central staff for the 2005–2006 Quadrennial Defense Review. Following the QDR, he served as Director for Defense Transformation, Force Planning and Resources on the National Security Council staff. Mr. Gunzinger holds an M.S. in National Security Strategy from the National War College, a Master of Airpower Art and Science degree from the School of Advanced Air and Space Studies, a Master of Public Administration from Central Michigan University, and a B.S. in chemistry from the United States Air Force Academy.
    [Show full text]
  • Missiles OUTLOOK
    SPECIFICATIONS Missiles OUTLOOK/ GENERAL DATA AIRFRAME GUIDANCE OUTLOOK/ POWERPLANT SPECIFICATIONS MAX. MAX. SPAN, BODY LAUNCH MAX. RANGE STATUS/OUTLOOK/REMARKS DESIGNATION/NAME LENGTH WINGS OR DIAMETER WEIGHT CONTRACTOR TYPE NO. MAKE & MODEL (FT.) FINS (FT.) (FT.) (LB.) (NAUT. MI.) AIR-TO-AIR CHUNG-SHAN INSTITUTE OF SCIENCE AND TECHNOLOGY (CSIST), Taoyuan, Taiwan Skysword 1 (Tien Chien 1) 9.8 2.1 0.42 196.4 — IR 1 X solid propellant 9.7 In service with Taiwan air force since 1993. Skysword 2 (Tien Chien 2) 11.8 2 0.62 396.8 — Active radar 1 X solid propellant 32.4 In service with Taiwan air force since 1996. DENEL (PTY.) LTD., Pretoria, South Africa OPERATORS SATELLITE A-Darter 9.8 1.6 0.54 195.8 Denel IIR 1 X solid propellant — Fifth-generation technology demonstrator. Likely co-development with Brazil. COMMERCIAL R-Darter 11.9 2.1 0.53 264 Denel Radar 1 X solid propellant — Development completed 2000. For South African Air Force Cheetah and Gripen aircraft. U-Darter 9.6 1.67 0.42 210 Denel Two-color, IR 1 X solid propellant — First revealed in 1988; similar to Magic. Entered production in 1994. In use on South African Air Force Cheetah and Impala aircraft. DIEHL BGT DEFENSE, Uberlingen, Germany COMMERCIAL AIM-9L/I-1 Sidewinder 9.4 2.1 0.4 189 Diehl BGT Defense IR 1 X solid propellant — Upgraded and refurbished. IRIS-T 9.7 — 0.4 196 Diehl BGT Defense IIR 1 X solid propellant — In production. SATELLITE OPERATORS SATELLITE MBDA MISSILE SYSTEMS (BAE Systems, EADS, Finmeccanica), London, UK; Vélizy, France; Rome, Italy Aspide 12.1 3.4 0.67 479 Alenia Semiactive radar, homing 1 X solid propellant 43 In service.
    [Show full text]
  • Former Warsaw Pact Ammunition Handbook, Vol 3
    NATO Explosive Ordnance Disposal Centre of Excellence FORMER WARSAW PACT AMMUNITION HANDBOOK VOLUME 3 Air Forces Ammunition Aerial projectiles, bombs, rockets and missiles TRENČÍN 2019 Slovak Republic For Official Use Only Explosive Ordnance Disposal Centre of Excellence FORMER WARSAW PACT AMMUNITION HANDBOOK VOLUME 3 Air Forces Ammunition Aerial projectiles, bombs, rockets and missiles For Official Use Only Explosive Ordnance Disposal Centre of Excellence The NATO Explosive Ordnance Centre of Excellence (NATO EOD COE) supports the efforts of the Alliance in the areas of training and education, information sharing, doctrine development and concepts validation. Published by NATO EOD Centre of Excellence Ivana Olbrachta 5, 911 01,Trenčín, Slovak Republic Tel. + 421 960 333 502, Fax + 421 960 333 504 www.eodcoe.org Former Warsaw Pact Ammunition Handbook VOL 3 – Edition II. ISBN 978-80-89261-81-9 © EOD Centre of Excellence. All rights reserved 2019 No part of this book may be used or reproduced in any manner without the written permission of the publisher, except in the case brief quotations embodied in articles and reviews. For Official Use Only Explosive Ordnance Disposal Centre of Excellence Foreword Even though in areas of current NATO operations the insurgency is vastly using the Home Made Explosive as the main charge for emplaced IEDs, our EOD troops have to cope with the use of the conventional munition in any form and size all around the world. To assist in saving EOD Operators’ lives and to improve their effectiveness at munition disposal, it is essential to possess the adequate level of experience and knowledge about the respective type of munition.
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Missile Guidance and Control
    CHAPTER 4 MISSILE GUIDANCE AND CONTROL INTRODUCTION in the interest of terminology standardization and to assist common understanding, we shall call the In the preceding chapters you learned that the complete system within a missile that steers and essential parts a guided missile needs to perform stabilizes it a guidance and control system. properly are: Depending on your experience with missiles, you 1. Airframe and control surfaces. may take exception to this designation. And if you 2. Propulsion system. do, there is good reason for it. The reason is shown 3. Warhead system. in figure 4-1. For example, if you have worked on 4. Guidance and control system. the Tartar or Terrier missiles you will consider the In addition, in chapter 2 you studied the basic fire system that guides and controls a missile to be its control problem, and learned how some of the steering system. On the other hand, a Talos GMM forces of nature affect the trajectory of a guided would call it a guidance and control system. We missile as it flies to its intended target. In chapter 3 will stick with the latter designation - not because you learned how wings and fins steer a missile and we favor Talos but because most manuals, and keep it pointed along its flight path. The use of many Navy publications, use this term. interior control devices by missiles without exterior control surfaces (or limited ones) was described SUBSYSTEMS AND COMPONENTS briefly. The different types of guidance systems used in missiles are inertial, command, beam-rider, In figure 4-2 we show that the complete system and homing guidance.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • IJESRT INTERNATIONAL JOURNAL of ENGINEERING SCIENCES & RESEARCH TECHNOLOGY a LITERATURE STUDY on COMMAND to LINE of SIGHT MISSILE SYSTEM Ramakrishna G*1, G.K.D
    ISSN: 2277-9655 [Ramakrishna* et al., 7(1): January, 2018] Impact Factor: 5.164 IC™ Value: 3.00 CODEN: IJESS7 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A LITERATURE STUDY ON COMMAND TO LINE OF SIGHT MISSILE SYSTEM Ramakrishna G*1, G.K.D. Prasanna Venkatesan 2 * Faculty of ECE, Indian Naval Academy, Ezhimala, India DOI: 10.5281/zenodo.1147484 ABSTRACT The aim of this paper is to explain the CLOS (Command to Line of Sight) Missile Systems in detail. The includes the concept behind it, the technology used and the applications in modern warfare. While the paper will largely deal with CLOS guidance, the theory behind basic functioning of a guided weapon/missile will also be discussed. The MCLOS (Manual Command to Line of Sight), SACLOS (Semi Automatic Command to Line of Sight), and ACLOS (Automatic Command to Line of Sight) are also presented along with their applications. KEYWORDS: ACLOS, MCLOS, SACLOS I. INTRODUCTION A Guided weapon may be described briefly as a weapon system which the warhead is delivered by an unmanned guided vehicle. Guided missiles have only been in practical use since the advent of World War II. It is because the technology has enabled the invention of the final product has been around for a lot longer. From the oldest of discoveries, like that of gunpowder in the 1st millennium BC by the Chinese to the rapid advances in the field of science, they have all been required to the practical enabling of the concept of guided missile systems [1][2]. The Germans were the first to field guided weapons with the use of V1 guided bomb and the V2 rocket.
    [Show full text]
  • Intelligence and Net Assessment
    GW-5 Intelligence 6/28/2016 Page 1 Chapter Five: Intelligence and Net Assessment Like command and control and battle management, the lessons to be drawn from intelligence during the Gulf War are not only valuable in themselves, they lay the ground work for understanding many of the other aspects and lessons of the war. This is particularly true when intelligence is broadened to cover net assessment, and intelligence- related policy. A narrow definition of the role of intelligence not only gives intelligence responsibility for actions and priorities that were often beyond its control, it ignores critical problems and issues that need to be transformed into lessons for the future. Any such, analysis, however, must be shaped by the fact that the Gulf War was in many ways a war between a Coalition that could "see" and an Iraq that was "blind." The COALITION had a near monopoly of sophisticated intelligence, reconnaissance, near real time analysis capability, and secure communication and dissemination assets. In addition, the Coalition could secure its territory against most Iraqi over flights and incursions, while Iraq effectively had "open skies," with basic intelligence problems greatly reinforced by the rigidities in its strategy and tactics, decision making, and command and control process.1 This war between the "seeing" and the "blind" shaped each side's ability to understand the other's military actions and capabilities throughout Desert Shield. It affected every aspect of battle management during Desert Storm, including such basic military functions as targeting. Superior intelligence played a key role in every aspect of Coalition operations, in giving Coalition forces superior effectiveness, in allowing the Coalition to react to Iraq, in achieving surprise and a superior tempo of operations, and in reducing Coalition casualties.
    [Show full text]
  • IHS™ Jane's® Weapons
    IHS™ Jane’s® Weapons Air-Launched 2014-2015 RobertHewson ISBN 978 07106 3104 6-Weapons Air-Launched ISBN 978 07106 3108 4-Weapons Ammunition ISBN 978 07106 3105 3-Weapons Infantry ISBN 978 07106 3106 0-Weapons Naval ISBN 978 07106 3107 7-Weapons Strategic ISBN 978 07106 3120 6-Weapons Full Set ©2014 IHS. All rights reserved. Thirdparty details and websites No partofthis publication may be reproduced or transmitted, in any form or by any Any thirdparty details and websites aregiven for information and reference purposes means, electronic, mechanical, photocopying, recording or otherwise, or be stored in only and IHS Global Limited does not control, approve or endorse these thirdparties any retrieval system of any nature, without prior written permission of IHS Global or thirdparty websites. Further,IHS Global Limited does not control or guarantee the Limited. Applications for written permission should be directed to Christopher Bridge. accuracy, relevance, availability, timeliness or completeness of the information contained on any thirdparty website. Inclusion of any thirdparty details or websites is Any views or opinions expressed by contributors and thirdparties arepersonal to not intended to reflect their importance, nor is it intended to endorse any views them and do not represent the views or opinions of IHS Global Limited, its affiliates or expressed, products or services offered, nor the companies or organisations in staff. question. Youaccess any thirdparty websites solely at your own risk. Disclaimer of liability Use of data Whilst
    [Show full text]
  • Missile Communication Links
    Missile Communication Links Clifton E. Cole Jr. tandard Missile (SM) is a family of surface-to-air missiles used on U.S. Navy destroyers and cruisers. As the U.S. Navy’s Technical Direction Agent for SM, APL has been involved with the development and in-service use of numerous aspects of this missile, including all of its variants, since their conception. One of the many aspects of APL’s involvement is in the area of missile communications links that were introduced into SM in the early 1970s to support its new midcourse guidance mode. APL’s efforts in this area include concept development, design, analysis, testing, test equipment design, modeling and simulation, and systems engineering. This article provides an overview of the current communications links used by SM and discusses the Preplanned Product Improvement Link, a new communica- tions link development for SM and the Evolved Seasparrow Missile that also is used by the U.S. Navy on some of their combat ships. INTRODUCTION All Standard Missiles (SM) except for SM-1, the midcourse phase of flight allows the support of more mis- oldest variant, use a communications link. SM-1 was a sile engagements in a given time period because the illu- home-all-the-way guided missile that received its homing minator, which is required for the entire SM-1 flight, is a guidance signal from target-reflected energy provided by limited shipboard resource. Aegis destroyers have three a high-power transmitter, called an illuminator, resid- illuminators, and cruisers have four. When midcourse ing on the Terrier and Tartar ships from which it was guidance is used, the illuminator is required only during launched.
    [Show full text]
  • Ministry of Defence Acronyms and Abbreviations
    Acronym Long Title 1ACC No. 1 Air Control Centre 1SL First Sea Lord 200D Second OOD 200W Second 00W 2C Second Customer 2C (CL) Second Customer (Core Leadership) 2C (PM) Second Customer (Pivotal Management) 2CMG Customer 2 Management Group 2IC Second in Command 2Lt Second Lieutenant 2nd PUS Second Permanent Under Secretary of State 2SL Second Sea Lord 2SL/CNH Second Sea Lord Commander in Chief Naval Home Command 3GL Third Generation Language 3IC Third in Command 3PL Third Party Logistics 3PN Third Party Nationals 4C Co‐operation Co‐ordination Communication Control 4GL Fourth Generation Language A&A Alteration & Addition A&A Approval and Authorisation A&AEW Avionics And Air Electronic Warfare A&E Assurance and Evaluations A&ER Ammunition and Explosives Regulations A&F Assessment and Feedback A&RP Activity & Resource Planning A&SD Arms and Service Director A/AS Advanced/Advanced Supplementary A/D conv Analogue/ Digital Conversion A/G Air‐to‐Ground A/G/A Air Ground Air A/R As Required A/S Anti‐Submarine A/S or AS Anti Submarine A/WST Avionic/Weapons, Systems Trainer A3*G Acquisition 3‐Star Group A3I Accelerated Architecture Acquisition Initiative A3P Advanced Avionics Architectures and Packaging AA Acceptance Authority AA Active Adjunct AA Administering Authority AA Administrative Assistant AA Air Adviser AA Air Attache AA Air‐to‐Air AA Alternative Assumption AA Anti‐Aircraft AA Application Administrator AA Area Administrator AA Australian Army AAA Anti‐Aircraft Artillery AAA Automatic Anti‐Aircraft AAAD Airborne Anti‐Armour Defence Acronym
    [Show full text]
  • 19850006477.Pdf
    NASA Technical Memorandum 86330 NASA-TM-86330 19850006477 ANOVERVIEWOFSOMEMONOPLANAMISR SILE PROfiRAMS • _',,e?,,.°. _ w,.._-._ •j M- LEROYSPEARMAN " ".........' " ":"::'__:'_'_" DECEMBER1984 P.III£fIVllplr NASA J",' i,!,q ,--_._ NationalAeronauticsand .I-__NGLERESEARCHY CENTER SpaceAdministration LIERARY.NASA LangleyResearchCaenter H'e_MP-TONVIRGIN, IA Hampton, Virginia 23665 3 1176 00519 0294 SUMMARY A historical review indicates that monoplanar missiles have been in existence since the early 1900's with many concepts and missions evolving from many coun- tries. Many monoplanar systems have been developed and demonstrated in the U.S.; however, few entered the inventory and generally remained for only a short time. By contrast_within the Soviet Union, many monoplanar missiles have also been developed_ most of which have remained in the inventory. A large data bank of monoplanar missile aerodynamics exists and many programs are currently underway. Most monoplanar missile systems have been directed toward use as surface-to-surface or air-to-surface where range requirements may be more important than maneuver requirements. However, the use of monoplanar systems in the surface-to-air and air-to-air roles should not be overlooked. INTRODUCTION . The knowledge of rocketry and missiles has been in existence for many centuries but the serious thought of using unmanned cruise missiles for possible military application did not begin until early in the 20th century. This thought, of course, was spawned by the advent of successful manned flight with heavier-than-air vehi- cles. The early missiles generally had an airplane-like appearance since the bulk of available information was related to airplane design.
    [Show full text]