FM 3-12 Cyberspace and Electromagnetic Warfare

Total Page:16

File Type:pdf, Size:1020Kb

FM 3-12 Cyberspace and Electromagnetic Warfare FM 3-12 CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE AUGUST 2021 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 3-12, dated 11 April 2017. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). Foreword Over the past two decades of persistent conflict, the Army has deployed its most capable communications systems ever. During this time, U.S. forces have continued to dominate cyberspace and the electromagnetic spectrum while conducting counterinsurgency operations in Afghanistan and Iraq against enemies and adversaries who lack the ability to challenge our technological superiority. However, in recent years, regional peers have demonstrated formidable capabilities in hybrid operational environments. These capabilities threaten the Army’s dominance in both cyberspace and the electromagnetic spectrum. The Department of Defense information network-Army is an essential warfighting platform that is a critical element of the command and control system and foundational to success in Army operations. Effectively operating, securing, and defending the network to maintain trust in its confidentiality, integrity, and availability is essential to commanders’ success at all echelons. A commander who cannot access or trust communications and information systems or the data they carry risks the loss of lives, loss of critical resources, or mission failure. At the same time, our adversaries and enemies are also increasingly reliant on networks and networked weapons systems. The Army, as part of the joint force, must be prepared to exploit or deny our adversaries and enemies the operational advantages that these networks and systems provide. As the Army shifts its focus to large-scale combat operations against regional peers, we must anticipate that these threat actors will persistently attempt to infiltrate, exploit, and degrade access to our networks and data. In the future, as adversary and enemy capabilities grow, our continued dominance of cyberspace and the electromagnetic spectrum will become less certain, while at the same time our ability to access cyberspace and spectrum- dependent capabilities will become both more challenging and more critical to fight and win in multiple domains. Leveraging cyberspace and electromagnetic warfare effects throughout the competition continuum is key to achieving relative advantages through cyberspace and the electromagnetic spectrum while denying the same to our enemies and adversaries. To achieve these positions of relative advantage, commanders must integrate and synchronize cyberspace operations and electromagnetic warfare with all other available military capabilities using a combined arms approach. Moreover, intelligence, signal, information advantage activities, space, and fires capabilities are all critical to successful planning, synchronization, and execution of cyberspace operations and electromagnetic warfare. Commanders and staffs integrate and synchronize all of these capabilities across multiple domains and warfighting functions to maximize complementary effects in and through cyberspace and the electromagnetic spectrum. FM 3-12 defines and describes the principles and tactics to address challenges in the operational environment while providing an overview of cyberspace operations, electromagnetic warfare, and their planning, integration, and synchronization through the operations process. It describes the units that conduct these operations and how they enable accomplishment of commanders’ objectives in Army operations. Due to the rapid evolution of friendly and threat capabilities, tactics, techniques, and procedures in cyberspace and the electromagnetic spectrum, the Cyber Center of Excellence will review and update FM 3-12 and supporting publications frequently in order to keep pace with the continuously evolving operational environment. NEIL S. HERSEY Major General, U.S. Army Commanding This page intentionally left blank. *FM 3-12 Field Manual Headquarters No. 3-12 Department of the Army Washington, D.C., 24 August 2021 Cyberspace Operations and Electromagnetic Warfare Contents Page PREFACE..................................................................................................................... v INTRODUCTION ........................................................................................................ vii Chapter 1 OPERATIONAL ENVIRONMENT OVERVIEW ........................................................ 1-1 Overview of the Operational Environment ................................................................. 1-1 Cyberspace and the Electromagnetic Spectrum ....................................................... 1-1 Section I – Core Competencies and Fundamental Principles ............................ 1-3 Core Competencies ................................................................................................... 1-3 Fundamental Principles ............................................................................................. 1-4 Section II – Operational Environment ................................................................... 1-4 Cyberspace Domain .................................................................................................. 1-5 Electromagnetic Spectrum ........................................................................................ 1-7 Trends and Characteristics........................................................................................ 1-8 Conflict and Competition ......................................................................................... 1-11 Section III – Contributions to the Warfighting Functions .................................. 1-12 Command and Control ............................................................................................ 1-12 Movement and Maneuver ........................................................................................ 1-13 Intelligence .............................................................................................................. 1-14 Fires ......................................................................................................................... 1-15 Sustainment ............................................................................................................. 1-15 Protection................................................................................................................. 1-15 Chapter 2 CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE FUNDAMENTALS ..................................................................................................... 2-1 Section I – Cyberspace Operations ....................................................................... 2-1 Joint Force and Army ................................................................................................ 2-3 Department of Defense Information Network Operations ......................................... 2-4 Defensive Cyberspace Operations ............................................................................ 2-4 Offensive Cyberspace Operations ............................................................................ 2-5 Cyberspace Actions ................................................................................................... 2-5 Section II – Electromagnetic Warfare .................................................................... 2-8 Electromagnetic Attack .............................................................................................. 2-8 Electromagnetic Protection...................................................................................... 2-11 Electromagnetic Support ......................................................................................... 2-14 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-12, dated 11 April 2017. FM 3-12 i Contents Electromagnetic Warfare Reprogramming.............................................................. 2-15 Section III – Interrelationship with other Operations ........................................ 2-16 Intelligence Operations ........................................................................................... 2-16 Space Operations ................................................................................................... 2-16 Information Operations ........................................................................................... 2-18 Chapter 3 ARMY ORGANIZATIONS AND COMMAND AND CONTROL ............................... 3-1 Section I – Army Cyberspace Operations Organizational Structure ................. 3-1 United States Army Cyber Command ....................................................................... 3-1 Army Information Warfare Operations Center .......................................................... 3-2 Section II – Electromagnetic Warfare Organizations .......................................... 3-3 Electromagnetic Warfare Platoon (Brigade Combat Team) ..................................... 3-3 Intelligence, Information, Cyber, Electromagnetic Warfare, and Space Detachment ........................................................................................................ 3-4 Section III – Cyberspace Electromagnetic Activities at Corps and Below........ 3-4 Commander’s
Recommended publications
  • The Erosion of Strategic Stability and the Future of Arms Control in Europe
    Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: [email protected] Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010.
    [Show full text]
  • Pdhonline Course E402 (4 PDH)
    PDHonline Course E402 (4 PDH) Electromagnetic Pulse and its impact on the Electric Power Industry Instructor: Lee Layton, P.E 2016 PDH Online | PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone & Fax: 703-988-0088 www.PDHonline.org www.PDHcenter.com An Approved Continuing Education Provider www.PDHcenter.com PDHonline Course E402 www.PDHonline.org Electromagnetic Pulse and its impact on the Electric Power Industry Lee Layton, P.E Table of Contents Section Page Introduction ………………………………………… 3 Chapter 1: History of EMP ……….……………….. 5 Chapter 2: Characteristics of EMP……..…………. 9 Chapter 3: Electric Power System Infrastructure … 20 Chapter 4: Electric System Vulnerabilities ………. 29 Chapter 5: Mitigation Strategies ………………….. 38 Conclusion ……………………………………..…. 46 The photograph on the cover is of the July 1962 detonation of the Starfish Prime. © Lee Layton. Page 2 of 46 www.PDHcenter.com PDHonline Course E402 www.PDHonline.org Introduction An electromagnetic pulse (EMP) is a burst of electromagnetic radiation that results from the detonation of a nuclear weapon and/or a suddenly fluctuating magnetic field. The resulting rapidly changing electric fields and magnetic fields may couple with electric systems to produce damaging current and voltage surges. In military terminology, a nuclear bomb detonated hundreds of kilometers above the Earth's surface is known as a high-altitude electromagnetic pulse (HEMP) device. Nuclear electromagnetic pulse has three distinct time components that result from different physical phenomena. Effects of a HEMP device depend on a very large number of factors, including the altitude of the detonation, energy yield, gamma ray output, interactions with the Earth's magnetic field, and electromagnetic shielding of targets.
    [Show full text]
  • Future EW Capabilities
    CRITICAL UNCLASSIFIED INFORMATION Future EW Capabilities COL Daniel Holland, ACM-EW Director [email protected] 706-791-8476 CRITICAL17 UNCLASSIFIEDAug 2021 INFORMATION Future Army EW Capabilities AISR Target identification, geo-location, and advanced non-kinetic effects delivery for the MDO fight. HELIOS (MDSS) Altitude 60k’ EW Planning and Management Tool LOS 500 kms (nadir 18 kms) HADES (MDSS) Altitude 40k+’ UAV LOS 400 kms Spectrum Analyzer MFEW Air Large MFEW Air Small Altitude 15k-25k’ Altitude 2500-8000’ LOS 250-300 kms LOS 100-150 kms C2 Counter Fire XX Radar SAM SRBM MEMSS C2 TT Radar Tech Effects CP TA Radar C2 AISR – Aerial ISR DEA – Defensive Electromagnetic Attack GSR- Ground Surveillance Radar TA Radar ERCA – Extended Range Cannon Artillery FLOT – Forward Line of Troops IFPC – Indirect Fire Protection Capability GMLS-ER – Guided Multiple Launch Rocket System Extended Rng UGS HADES – High Accuracy Detection & Exploitation System HELIOS – High altitude Extended range Long endurance Intel Observation System LOS – Line of Sight MDSS – Multi-Domain Sensor System MEMSS - Modular Electromagnetic Spectrum System TLS EAB MFEW – Multifunction Electromagnetic Warfare Ground to Air TLS BCT M-SHORAD – Mobile Short Range Air Defense Close fight TLS – Terrestrial Layer System 30km 70km 150km TT – Target Tracking 500km FLOT THREAT TA – Target Acquisition PrSM Ver 14.6 – 30 Jul 21 155mm ERCA GMLS-ER UGS – Unmanned Ground System AREA UNCLASSIFIED Electronic Warfare Planning and Management Tool (EWPMT) Electromagnetic Warfare/Spectrum
    [Show full text]
  • Fm 6-02 Signal Support to Operations
    FM 6-02 SIGNAL SUPPORT TO OPERATIONS SEPTEMBER 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 6-02, dated 22 January 2014. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil/) and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *FM 6-02 Field Manual Headquarters No. 6-02 Department of the Army Washington, D.C., 13 September 2019 Signal Support to Operations Contents Page PREFACE..................................................................................................................... v INTRODUCTION ........................................................................................................ vii Chapter 1 OVERVIEW OF SIGNAL SUPPORT ........................................................................ 1-1 Section I – The Operational Environment ............................................................. 1-1 Challenges for Army Signal Support ......................................................................... 1-1 Operational Environment Overview ........................................................................... 1-1 Information Environment ........................................................................................... 1-2 Trends ........................................................................................................................ 1-3 Threat Effects on Signal Support .............................................................................
    [Show full text]
  • Sources for Genealogical Research at the Austrian War Archives in Vienna (Kriegsarchiv Wien)
    SOURCES FOR GENEALOGICAL RESEARCH AT THE AUSTRIAN WAR ARCHIVES IN VIENNA (KRIEGSARCHIV WIEN) by Christoph Tepperberg Director of the Kriegsarchiv 1 Table of contents 1. The Vienna War Archives and its relevance for genealogical research 1.1. A short history of the War Archives 1.2. Conditions for doing genealogical research at the Kriegsarchiv 2. Sources for genealogical research at the Kriegsarchiv 2. 1. Documents of the military administration and commands 2. 2. Personnel records, and records pertaining to personnel 2.2.1. Sources for research on military personnel of all ranks 2.2.2. Sources for research on commissioned officers and military officials 3. Using the Archives 3.1. Regulations for using personnel records 3.2. Visiting the Archives 3.3. Written inquiries 3.4. Professional researchers 4. Relevant publications 5. Sources for genealogical research in other archives and institutions 5.1. Sources for genealogical research in other departments of the Austrian State Archives 5.2. Sources for genealogical research in other Austrian archives 5.3. Sources for genealogical research in archives outside of Austria 5.3.1. The provinces of the Austro-Hungarian Monarchy and its “successor states” 5.3.2. Sources for genealogical research in the “successor states” 5.4. Additional points of contact and practical hints for genealogical research 2 1. The Vienna War Archives and its relevance for genealogical research 1.1. A short history of the War Archives Today’s Austrian Republic is a small country, but from 1526 to 1918 Austria was a great power, we can say: the United States of Middle and Southeastern Europe.
    [Show full text]
  • The Disappearing Human: Gnostic Dreams in a Transhumanist World
    religions Article The Disappearing Human: Gnostic Dreams in a Transhumanist World Jeffrey C. Pugh Department of Religious Studies, Elon University, Elon, NC 27244-2020, USA; [email protected] Academic Editor: Noreen Herzfeld Received: 25 January 2017; Accepted: 18 April 2017; Published: 3 May 2017 Abstract: Transhumanism is dedicated to freeing humankind from the limitations of biological life, creating new bodies that will carry us into the future. In seeking freedom from the constraints of nature, it resembles ancient Gnosticism, but complicates the question of what the human being is. In contrast to the perspective that we are our brains, I argue that human consciousness and subjectivity originate from complex interactions between the body and the surrounding environment. These qualities emerge from a distinct set of structural couplings embodied within multiple organ systems and the multiplicity of connections within the brain. These connections take on different forms, including structural, chemical, and electrical manifestations within the totality of the human body. This embodiment suggests that human consciousness, and the intricate levels of experience that accompany it, cannot be replicated in non-organic forms such as computers or synaptic implants without a significant loss to human identity. The Gnostic desire to escape our embodiment found in transhumanism carries the danger of dissolving the human being. Keywords: Singularity; transhumanism; Merleau-Ponty; Kurzweil; Gnosticism; AI; emergence; technology 1. Introduction In 1993, the mathematician and science fiction writer Vernor Vinge gave a talk at the Vision 21 symposium sponsored by NASA introducing the idea of the Singularity, an evolutionary moment when we would create the capacity for superhuman intelligence that would transcend the human and take us into the posthuman world (Vinge 1993).
    [Show full text]
  • Intentional Electromagnetic Interference (IEMI) and Its Impact on the U.S
    Meta-R-323 Intentional Electromagnetic Interference (IEMI) and Its Impact on the U.S. Power Grid William Radasky Edward Savage Metatech Corporation 358 S. Fairview Ave., Suite E Goleta, CA 93117 January 2010 Prepared for Oak Ridge National Laboratory Attn: Dr. Ben McConnell 1 Bethel Valley Road P.O. Box 2008 Oak Ridge, Tennessee 37831 Subcontract 6400009137 Metatech Corporation • 358 S. Fairview Ave., Suite E • Goleta, California • (805) 683-5681 Registered Mail: P.O. Box 1450 • Goleta, California 93116 Metatech FOREWORD This report has been written to provide an overview of Intentional Electromagnetic Interference (IEMI) threats to the electric power infrastructure. It is based on the past 10 years of research by the authors and their colleagues who have been active in the field. Some of the information provided here is adapted from the IEEE Special Issue on HPEM and IEMI published in the IEEE EMC Transactions in August 2004. Additional information is presented from recent published papers and conference proceedings. This report begins in Section 1 by explaining the background and terminology involved with IEMI. Section 2 summarizes the types of EM weapons that have been built and the IEMI environments that they produce. Section 3 provides insight concerning the basic EM coupling process for IEMI and why certain threat waveforms and frequencies are important to commercial systems. Section 4 provides a selection of commercial equipment susceptibility data covering important categories of equipment that may be affected by IEMI. Section 5 discusses more specific aspects of the IEMI threat for the power system, and Section 6 indicates the IEC standardization efforts that can be useful to understanding the threat of IEMI and the means to protect equipment from the threat.
    [Show full text]
  • BULGARIA and HUNGARY in the FIRST WORLD WAR: a VIEW from the 21ST CENTURY 21St -Century Studies in Humanities
    BULGARIA AND HUNGARY IN THE FIRST WORLD WAR: A VIEW FROM THE 21ST CENTURY 21st -Century Studies in Humanities Editor: Pál Fodor Research Centre for the Humanities Budapest–Sofia, 2020 BULGARIA AND HUNGARY IN THE FIRST WORLD WAR: A VIEW FROM THE 21ST CENTURY Editors GÁBOR DEMETER CSABA KATONA PENKA PEYKOVSKA Research Centre for the Humanities Budapest–Sofia, 2020 Technical editor: Judit Lakatos Language editor: David Robert Evans Translated by: Jason Vincz, Bálint Radó, Péter Szőnyi, and Gábor Demeter Lectored by László Bíró (HAS RCH, senior research fellow) The volume was supported by theBulgarian–Hungarian History Commission and realized within the framework of the project entitled “Peripheries of Empires and Nation States in the 17th–20th Century Central and Southeast Europe. Power, Institutions, Society, Adaptation”. Supported by the Hungarian Academy of Sciences NKFI-EPR K 113004, East-Central European Nationalisms During the First World War NKFI FK 128 978 Knowledge, Lanscape, Nation and Empire ISBN: 978-963-416-198-1 (Institute of History – Research Center for the Humanities) ISBN: 978-954-2903-36-9 (Institute for Historical Studies – BAS) HU ISSN 2630-8827 Cover: “A Momentary View of Europe”. German caricature propaganda map, 1915. Published by the Research Centre for the Humanities Responsible editor: Pál Fodor Prepress preparation: Institute of History, RCH, Research Assistance Team Leader: Éva Kovács Cover design: Bence Marafkó Page layout: Bence Marafkó Printed in Hungary by Prime Rate Kft., Budapest CONTENTS INTRODUCTION .................................... 9 Zoltán Oszkár Szőts and Gábor Demeter THE CAUSES OF THE OUTBREAK OF WORLD WAR I AND THEIR REPRESENTATION IN SERBIAN HISTORIOGRAPHY .................................. 25 Krisztián Csaplár-Degovics ISTVÁN TISZA’S POLICY TOWARDS THE GERMAN ALLIANCE AND AGAINST GERMAN INFLUENCE IN THE YEARS OF THE GREAT WAR................................
    [Show full text]
  • Electromagnetic Side Channels of an FPGA Implementation of AES
    Electromagnetic Side Channels of an FPGA Implementation of AES Vincent Carlier, Herv´e Chabanne, Emmanuelle Dottax and Herv´e Pelletier SAGEM SA Abstract. We show how to attack an FPGA implementation of AES where all bytes are processed in parallel using differential electromag- netic analysis. We first focus on exploiting local side channels to isolate the behaviour of our targeted byte. Then, generalizing the Square at- tack, we describe a new way of retrieving information, mixing algebraic properties and physical observations. Keywords: side channel attacks, DEMA, FPGA, AES hardware im- plementation, Square attack. 1 Introduction Side channel attacks first appear in [Koc96] where timing attacks are de- scribed. This kind of attack tends to retrieve information from the secret items stored inside a device by observing its behaviour during a crypto- graphical computation. In a timing attack, the adversary measures the time taken to perform the computations and deduces additionnal information about the cryptosystems. Similarly, power analysis attacks are introduced in [KJJ99] where the attacker wants to discover the secrets by analysing the power consumption. Smart cards are targets of choice as their power is sup- plied externally. Usually we distinguish Simple Power Analysis (SPA), that tries to gain information directly from the power consumption, and Differ- ential Power Analysis (DPA) where a large number of traces are acquired and statistically processed. Another side channel is the one that exploits the Electromagnetic (EM) emanations. Indeed, these emanations are correlated with the current flowing through the device. EM leakage in a PC environ- ment where eavesdroppers reconstruct video screens has been known for a 1 long time [vE85], see also [McN] for more references.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • The Crossing of Heaven
    The Crossing of Heaven Memoirs of a Mathematician Bearbeitet von Karl Gustafson, Ioannis Antoniou 1. Auflage 2012. Buch. xvi, 176 S. Hardcover ISBN 978 3 642 22557 4 Format (B x L): 15,5 x 23,5 cm Gewicht: 456 g Weitere Fachgebiete > Mathematik > Numerik und Wissenschaftliches Rechnen > Angewandte Mathematik, Mathematische Modelle Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 4. Computers and Espionage ...and the world’s first spy satellite... It was 1959 and the Cold War was escalating steadily, moving from a state of palpable sustained tension toward the overt threat to global peace to be posed by the 1962 Cuban Missile Crisis – the closest the world has ever come to nuclear war. Quite by chance, I found myself thrust into this vortex, involved in top-level espionage work. I would soon write the software for the world’s first spy satellite. It was a summer romance, in fact, that that led me unwittingly to this particular role in history. In 1958 I had fallen for a stunning young woman from the Washington, D.C., area, who had come out to Boulder for summer school. So while the world was consumed by the escalating political and ideological tensions, nuclear arms competition, and Space Race, I was increasingly consumed by thoughts of Phyllis.
    [Show full text]
  • 8200.1D United States Standard Flight Inspection Manual
    DEPARTMENT OF THE ARMY TECHNICAL MANUAL TM 95-225 DEPARTMENT OF THE NAVY MANUAL NAVAIR 16-1-520 DEPARTMENT OF THE AIR FORCE MANUAL AFMAN 11-225 FEDERAL AVIATION ADMINISTRATION ORDER 8200.1D UNITED STATES STANDARD FLIGHT INSPECTION MANUAL April 2015 DEPARTMENTS OF THE ARMY, THE NAVY, AND THE AIR FORCE AND THE FEDERAL AVIATION ADMINISTRATION DISTRIBUTION: Electronic Initiated By: AJW-331 RECORD OF CHANGES DIRECTIVE NO. 8200.1D CHANGE SUPPLEMENTS OPTIONAL CHANGE SUPPLEMENTS OPTIONAL TO TO BASIC BASIC The material contained herein was formerly issued as the United States Standard Flight Inspection Manual, dated December 1956. The second edition incorporated the technical material contained in the United States Standard Flight Inspection Manual and revisions thereto and was issued as the United States Standard Facilities Flight Check Manual, dated December 1960. The third edition superseded the second edition of the United States Standard Facilities Flight Check Manual; Department of Army Technical Manual TM-11-2557-25; Department of Navy Manual NAVWEP 16-1-520; Department of the Air Force Manual AFM 55-6; United States Coast Guard Manual CG-317. FAA Order 8200.1A was a revision of the third edition of the United States Standard Flight Inspection Manual, FAA OA P 8200.1; Department of the Army Technical Manual TM 95-225; Department of the Navy Manual NAVAIR 16-1-520; Department of the Air Force Manual AFMAN 11-225; United States Coast Guard Manual CG-317. FAA Order 8200.1B, dated January 2, 2003, was a revision of FAA Order 8200.1A. FAA Order 8200.1C, dated October 1, 2005, was a revision of FAA Order 8200.1B.
    [Show full text]