EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-08-27 with total page 362 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is a comprehensive history of Army intelligence from George Washington (America's First Spymaster) through the Civil War, World War I and II, and Desert Storm, with over 700 pages of exciting coverage. The dedication reads: "MI soldiers have been the harbingers of the Age of Information throughout the 20th century. They have recognized early, spurred on by the urgency of military contingencies, that information is the lifeblood of military operations and they sought to devise more and better ways to collect and disseminate intelligence. Since the days of the Revolutionary War when George Washington, starved for information about his enemy's intentions, ordered spies to send reports to him exclusively by express courier, intelligence-minded officers in the U.S. Army have inventively ushered in the Age of Information. Thaddeus S. C. Lowe unspooled a telegraph wire from the basket of his balloon in 1861 so that he could pass along his observations instantaneously. Benjamin Foulois, suspended in his Army Aeroplane No. 1 from the ceiling of a Chicago Exposition hall, sent the first wireless message to the ground below in 1910. In the DESERT STORM operations of 1991, TV pictures of battle damage were viewed by millions of Americans hours after the air strikes had taken place. From Valley Forge to the Basra Valley, from lanterns in church bell towers to TROJAN SPIRIT, the intelligence-minded have relied upon their resourcefulness to send out their early warnings. They are the cognoscenti of the Information Age. As we turn the corner into the 21st century, their day has come." Contents include: George Washington: America's First Spymaster; Army Intelligence at Yorktown: Catalyst to Victory; Deserter in Ranks The Civil War; Military Intelligence Sources During American Civil War; Confederate Espionage, Indian Wars; The Apache Campaign Under General Crook. Military Information Division: Origin of Intelligence Division; Spanish-American War; Intelligence in Peace: A Historical Example: Military Information Division (MID) in Cuba, 1906-1909; World War I Era; United States Army Intelligence School, France, 1918; Army Counterintelligence in CONUS - World War I Experience; MID and German Spy in Arizona; Army COMSEC; Aerial Reconnaissance-Its Beginning; Invasion of the Ether: Radio Intelligence at Battle of St. Mihiel; Brief History of Signal Intelligence Service. World War II Era - Pearl Harbor; Army Signals Intelligence; Enigma Cipher Machine; Assignment with Third United States Army, Special Research History; Auschwitz - Birkenau; Eisenhower and Intelligence; Intelligence in the Philippines; Battle of the Bulge: The Secret Offensive; Big Business: Intelligence in Patton's Third Army; Heroic Stand of an Intelligence Platoon: A Symbol of the Combat Ability of MI Soldiers. Disaster Along the Ch'ongch'on: Intelligence Breakdown in Korea; Spot Report: Intelligence, Vietnam; PERSHING II: Success Amid Chaos; Which Way for Tactical Intelligence After Vietnam; Lessons Learned; Operation URGENT FURY: The 525th MI Group Perspective; JUST CAUSE: Intelligence Support to Special Operations Aviation Operation; Divisional MI Battalion, Nonlinear Battlefield, and AirLand Operations. DESERT STORM: A Third U.S. Army Perspective; A Division G-2's Perspective of Operation DESERT STORM; Successes and Failures; Joint STARS Goes to War; Deep Attack: A Military Intelligence Task Force in DESERT STORM * XVIII Airborne Corps Desert Deception * Battlefield TECHINT: Support of Operations DESERT SHIELD STORM History of American Military Intelligence: Selected Literature; UAVs-Where We Have Been; History of Security Monitoring; Moveable Beast: The Travels of the MI Sphinx; Uncertain Oracle: Intelligence Failures Revisited; History of U.S. Army Military Intelligence Training; Heraldry. This is a privately authored news service and educational publication of Progressive Management.

Book Mission Command in the 21st Century

Download or read book Mission Command in the 21st Century written by Nathan K. Finney and published by . This book was released on 2016-03 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-08-27 with total page 130 pages. Available in PDF, EPUB and Kindle. Book excerpt: Force protection is a commander's top priority in any military operation. For this reason, civil engineers must always be aware of the latest tactics, techniques, and procedures (TTPs) used to protect our forces, particularly in hostile environments. Engineers implement physical security measures to protect personnel and critical assets needed to achieve military objectives. To assist in these efforts, this handbook is intended to be a reference for constructing and employing expedient fighting positions, obstacles, shelters, and revetments. It focuses primarily upon measures engineers can employ to protect airbases and mitigate the effects of direct- and indirect-fired weapons. Topics covered include: effects of weapons types, fighting positions, concealment and camouflage, bunkers, roadblocks, concertina wire, barbed wire, bollards. Direct- and indirect-fired weapons are common threats to airbases. Direct-fired weapons are projectiles designed to penetrate exterior protection. These weapons are highly accurate and capable of firing different types of projectiles including: (1) chemical or kinetic energy projectiles, (2) ball or tracer rounds, and (3) armor piercing rounds or high explosive shaped charges. Indirect-fired weapons include mortars, artillery shells, rockets, and bombs. These types of weapons are highly mobile and easily concealed. They can be fired from launchers or set on timers to allow aggressors time to escape prior to launch. Indirect-fired weapons do not require a clear line of sight to a specific target; aggressors rely on blast and fragmentation effects to damage or destroy their intended targets.

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-05 with total page 115 pages. Available in PDF, EPUB and Kindle. Book excerpt: Five U.S. Air Force instructions and directives provide unique information on criminal investigations and countermeasures: Criminal Investigations Program * Protective Service Matters - Special Investigations * The Air Force Technical Surveillance Countermeasures Program * Counterintelligence * Criminal Investigations and Counterintelligence Chapter 1 * RESPONSIBILITIES * 1.1. The Air Force Office of Special Investigations (AFOSI) Commander * 1.2. USAF Special Investigations Academy (USAFSIA) * 1.3. Investigations, Collections and Operations Nexus (ICON) * 1.4. AFOSI Field Investigative Units * 1.5. Commanders/Directors * 1.6. Installation Defense Force Commander (DFC) * Chapter 2 * INVESTIGATIONS PROGRAM * 2.1. Determining AFOSI and Security Forces Spheres of Influence * 2.2. Masking Rank * 2.3. Using Emergency and Extraordinary Expense Funds (E-Funds) * 2.4. Defense Clearance and Investigations Index (DCII) * 2.5. Fingerprints * 2.6. Deoxyribonucleic Acid (DNA) Samples * 2.7. Department of Justice (DoJ) Referrals * 2.8. Law Enforcement Collection of Information on Non-DoD US Persons * 2.9. AFOSI and JA Collaboration * 2.10. Suspicious Activity Reports (SARs) * 2.11. Enemy Prisoner of War (EPW)/Detainee information * 2.12. Obtaining Information from Financial Institutions * 2.13. Setting Up Joint Drug Enforcement Teams (JDETs) * 2.14. Investigation of Illegal Drug Use and Distribution * 2.15. Death Investigations of Active Duty Military Members * 2.16. Adultery, Fraternization and Sexual Harassment * 2.17. Sexual Assaults * 2.18. Investigating Fraud Offenses * 2.19. Contractor Disclosure Program * 2.20. Environmental Crime * 2.21. Crimes that Involve Air Force Computer Systems * 2.22. Processing Requests to Intercept Wire, Oral, or Electronic Communications for Law Enforcement Purposes * Chapter 3 * SPECIALIZED INVESTIGATIVE SERVICES * 3.1. Polygraph and Credibility Assessment (PCA) Techniques * 3.2. Forms

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2018-04-16 with total page 165 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is literally an A to Z "who's who" set of biographies of major figures in the history of U.S. Army Military Intelligence. Some of the prominent people in this comprehensive document: John Alsop * Stewart Alsop * Charles F. Berlitz * John Birch * McGeorge Bundy * Aaron Burr * Kit Carson * Buffalo Bill Cody * William J. Donovan * Alfred "Fred" Friendly * Daniel O. Graham * Nathan Hale * Senator Chic Hecht * Henry Kissinger * Robert E. Lee * Walter Lippman * Douglas MacArthur * Ib Melchior * Allen Pinkerton * Supreme Court Justice Lewis F. Powell, Jr. * Tony Randall * Edwin O. Reischauer * Paul Revere * J.D. Salinger * Edward J. Steicher * Henry L. Stimson * Astronaut K. T. Thornton * Harriet Tubman * Hoyt S. Vandenberg * Vernon Walters * George Washington * Caspar Weinberger Harold Aaron * Franklin Pierce Adams * George Ahern * John Aiso * Harry Akune * Jerry Alajajian * Henry Allen * Lafayette Baker * Gerald Beatson * Leonard Bessman * Thomas Betts * Daniel Bissell * Roy Benavidez * John Black * Lyman Bothwell * Mary Bowser * Ann Bray * John Bross * Travis Bunn * Edward Caskey * James Chambers * Clifford Charron * John Concannon * W. Preston Corderman * Lydia Darragh * Phillip Davidson * Victor DeGuinzbourg * Charles Denholm * Robert Donohue * George Eckman * Charles Eichelberger * William Gardner * Robert Glass * George Goddard * Daniel O. Graham * Aline Griffith * Henry Hauser * Stephen Hempstead * John Honeyman * Herbert Hovey * George Howell * John Hughes * Gero Iwai * Fredrick Johnston * Robert Kelly * James Kelsey * Kenneth Koeber * James Lafayette * Paul Lawson * Robert E. Lee * Robert Leigh * Duwayne Lundgren * Douglas MacArthur * Sidney Mashbir * Chester McCold * John O'Connor * William Odom * William Owens * John Pattison * Cloyd Pfister * Billy Rea * Joseph Richard * Lou Rothenstein * Edward Rybak * Charles Scanlon * Paul Shoemaker * Charles Simerly * Harry Soyster * John Stewart * Joseph Warren Stilwell * Walter Sweeney * Herbert Taylor * John Thomas * Trent Thomas * Edmund Thompson * Arthur Trudeau * Ralph van Deman * Elizabeth Van Lew * Vernon Walters * William Walters * Sidney Weinstein * Richard Williams * Charles Young This is a privately authored news service and educational publication of Progressive Management.

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-12-31 with total page 299 pages. Available in PDF, EPUB and Kindle. Book excerpt: How Air Force installations and units operate in a chemical, biological, radiological, nuclear, and high yield explosive environment is an evolving effort. In 2002 the Air Force implemented the counter-chemical warfare concept of operations (CONOPS) that changed how installations prepared for and responded to conventional chemical munitions attacks. The AF further defined the most probable threat as tactical ballistic missiles. That reevaluation of the threat became the basis for developing tactics, techniques and procedures (TTP) for installations to recover and continue mission operations. In 2003, the AF began investigating potential vulnerabilities for biological attacks by conducting exercises at Kunsan AB, Korea. These exercises led to the development and refinement of TTPs for responding to conventional and irregular biological warfare attacks. The resulting counter-biological warfare CONOPS was institutionalized through two Air Force Instructions: AFI 10-2603, Emergency Health Powers on Air Force Installations and AFI 10-2604, Disease Containment Planning Guidance. In 2009, the Air Force published and began implementing the Counter-Radiological Warfare CONOPS. This CONOPS is being institutionalized through this document and other Air Force and multiservice directives.The nuclear threat has been exhaustively studied. The AF will review existing information to determine a need to change TTPs for nuclear weapon threats. This manual will incorporate the information from all CBRNE efforts as they mature in order to provide installations guidance to prepare for, respond to, and recover from a conventional or irregular CBRNE attack.In addition to developing Counter-Chemical, Biological, Radiological CONOPS, the AF has made changes to its emergency response procedures and operations.Contents: Operations in a Chemical, Biological, Radiological, Nuclear, and High-Yield Explosive (CBRNE) Environment Chapter 1 OVERVIEW * 1.1. Overview * 1.2. Purpose * 1.3. Mission * 1.4. Operational Environment * 1.5. Policy Overview * Chapter 2 * PREPAREDNESS * 2.1. Preparedness Overview * 2.2. Planning - Threat Probability and the Operational Environment * 2.3. Training and Exercises * Chapter 3 * RESPONSE * 3.1. Response Overview * 3.2. CBRNE Operational Standards and Enabling Tasks * 3.3. Trigger Events * 3.4. Response Command and Control * 3.5. Installation Notification and Warning System (INWS) * 3.6. First and Emergency Responders' Missions * 3.7. Conventional CBRNE Attack Response * 3.8. Terrorist Attack Response Actions * 3.9. Withdrawal/Evacuation * Chapter 4 * RECOVERY AND MITIGATION * 4.1. Overview of Recovery and Mitigation * 4.2. Contamination Control * 4.3. Contamination Avoidance * 4.4. Recovery Actions for Conventional and Irregular CBRNE Attacks * 4.5. Hazard Duration * 4.6. Mission Continuation * 4.7. Medical Protection and Casualty Management * 4.8. Restoration of Infrastructure * 4.9. Mitigation * Chapter 5 * INFORMATION COLLECTION, RECORDS, AND FORMS * 5.1. Information Collections * 5.2. Records * Attachment 1 * GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION * Attachment 2 * IPE AND PPE ANALYSIS * Attachment 3 * INCIDENT COMMANDER'S GUIDE TO FIRST AND EMERGENCY RESPONSE MISSIONS * Attachment 4--SHELTER PROCEDURES * Attachment 5--CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR, AND HIGH YIELD EXPLOSIVES RESPONSE DECISION TOOLS * Attachment 6--REPRESENTATIVE CBRNE THREAT PROFILES * Attachment 7--POST ATTACK RECONNAISSANCE (PAR) TEAMS * Attachment 8--CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBRN) FORCE PROTECTION (FP) MEASURES * Attachment 9--CONTAMINATION CONTROL AREA (CCA) PROCEDURESEducation, Training and Exercise Competencies for Counter-Chemical, Biological, Radiological and Nuclear Operations * Counter-Chemical, Biological, Radiological and Nuclear Operations * Safeguarding Biological Select Agents and Toxins * Bonus: Air Force Culture / Doctrine Instruction / Policy Directive

Book Managing Materials for a Twenty first Century Military

Download or read book Managing Materials for a Twenty first Century Military written by National Research Council and published by National Academies Press. This book was released on 2008-03-26 with total page 206 pages. Available in PDF, EPUB and Kindle. Book excerpt: Since 1939, the U.S. government, using the National Defense Stockpile (NDS), has been stockpiling critical strategic materials for national defense. The economic and national security environments, however, have changed significantly from the time the NDS was created. Current threats are more varied, production and processing of key materials is more globally dispersed, the global competition for raw materials is increasing, the U.S. military is more dependent on civilian industry, and industry depends far more on just-in-time inventory control. To help determine the significance of these changes for the strategic materials stockpile, the Department of Defense asked the NRC to assess the continuing need for and value of the NDS. This report begins with the historical context of the NDS. It then presents a discussion of raw-materials and minerals supply, an examination of changing defense planning and materials needs, an analysis of modern tools used to manage materials supply chains, and an assessment of current operational practices of the NDS.

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-09-26 with total page 129 pages. Available in PDF, EPUB and Kindle. Book excerpt: This handbook provides USAF civil engineers with guidance on the installation and use of Air Force contingency water systems. It addresses site location and layout, assembly, and operation of water system components at bare base or austere locations. This handbook addresses general characteristics, setup, and basic operating procedures for the contingency water system and targets civil engineer utilities personnel while performing their beddown and sustainment mission taskings under contingency conditions. The contingency water system fulfills potable water and wastewater recovery needs at austere locations. The water system provides water to support kitchens, latrines, showers, laundries, and other bare base facilities and recovers the wastewater for appropriate disposal. The system is semi-automatic in that the 3,000-gallon facility storage tanks will fill automatically as long as the manually filled 20,000-gallon storage tanks are kept at the appropriate level. Once the system has been filled to capacity, water should be available for 5 days given 30 gallons per person per day usage. The removal of facility wastewater is also automatic under normal circumstances and does not require manual intervention. Chapter 1 * INTRODUCTION * 1.1. Scope * 1.2. Overview * 1.3. General Information * 1.4. Water System Design and Capacity * 1.5. Safety * 1.6. Additional Information * Chapter 2 * PLANNING AND PREPARATION * 2.1. General Information * 2.2. Site Selection * 2.3. Layout * 2.4. Equipment Preparation * 2.5. System Flexibility * 2.6. Subsystems Interface * Chapter 3 * SOURCE RUN SUBSYSTEM * 3.1. General Information * 3.2. Components * 3.3. Installation * 3.4. Operation * 3.5. Component Descriptions * Chapter 4 * WATER PRODUCTION SUBSYSTEM * 4.1. General Information * 4.2. Components * 4.3. Installation * 4.4. Operation * 4.5. WPS Component Descriptions * Chapter 5 * 550-INITIAL SUBSYSTEM * 5.1. General Information * 5.2. Components * 5.3. Installation * 5.4. Operation * 5.5. Component Descriptions * Chapter 6 * 550-FOLLOW-ON SUBSYSTEM * 6.1. General Information * 6.2. Components * 6.3. Installation * 6.4. Operation * 6.5. Component Descriptions * Chapter 7 * INDUSTRIAL OPERATIONS AND FLIGHTLINE EXTENSION SUBSYSTEM * 7.1. General Information * 7.2. Components * 7.3. Installation * 7.4. Operation * 7.5. Component Descriptions * Attachment 1 * GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION * Attachment 2 * COMPONENTS ILLUSTRATIONS * Attachment 3 * HOSE QUICK- DISCONNECT (QD) COUPLING CONNECTIONS * Attachment 4 * HOSE BRIDGE SYSTEM ASSEMBLY * Attachment 5 * NORMAL OPERATION OF THE CONTINGENCY WATER SYSTEM

Book Battlefield of the Future   21st Century Warfare Issues

Download or read book Battlefield of the Future 21st Century Warfare Issues written by Lawrence Grinter and published by CreateSpace. This book was released on 2012-08-01 with total page 288 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is a book about strategy and war fighting. It contains 11 essays which examine topics such as military operations against a well-armed rogue state, the potential of parallel warfare strategy for different kinds of states, the revolutionary potential of information warfare, the lethal possibilities of biological warfare and the elements of an ongoing revolution in military affairs. The purpose of the book is to focus attention on the operational problems, enemy strategies and threat that will confront U.S. national security decision makers in the twenty-first century.

Book Arming the Future

Download or read book Arming the Future written by Ann R. Markusen and published by . This book was released on 1999 with total page 462 pages. Available in PDF, EPUB and Kindle. Book excerpt: "A Council on Foreign Relations book"--Cover.

Book Armed Conflict in the 21st Century

Download or read book Armed Conflict in the 21st Century written by Steven Metz and published by . This book was released on 2000 with total page 140 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Understanding U S  Military Conflicts Through Primary Sources  American Civil War to Spanish American War

Download or read book Understanding U S Military Conflicts Through Primary Sources American Civil War to Spanish American War written by James R. Arnold and published by . This book was released on 2016 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: "Primary source analysis is a valuable tool that teaches students how historians utilize documents and interpret evidence from the past. This four-volume reference traces key decisions in U.S. military history--from the Revolutionary War through the 21st-century conflicts in Afghanistan and Iraq--by examining documents relating to military strategy and national policy judgments by U.S. military and political leaders. A comprehensive introductory essay provides readers with the context necessary to understand the relationship between diplomatic documents, military correspondence, and other documentation related to events that shaped warfare, diplomacy, and military strategy. Once the stage is set, the work covers 14 conflicts that are significant to U.S. history. Treatment of each of the conflicts begins with a historical overview followed by a chronology and approximately 30 primary source documents presented in chronological order. Each document is accompanied by a description and annotations and by an analysis that highlights its importance to the event or topic under discussion. Designed for secondary school and college students, the work will be exceptionally valuable to teachers who will appreciate the ready-made lessons that fit directly into core curriculum standards."--Publisher's description.

Book On Point

    Book Details:
  • Author : Gregory Fontenot
  • Publisher :
  • Release : 2005
  • ISBN :
  • Pages : 578 pages

Download or read book On Point written by Gregory Fontenot and published by . This book was released on 2005 with total page 578 pages. Available in PDF, EPUB and Kindle. Book excerpt: Den amerikanske hærs første officielle historiske beretning om operationerne i den anden Irakiske Krig, "Operation Iraqi Freedom", (OIF). Fra forberedelserne, mobiliseringen, forlægningen af enhederne til indsættelsen af disse i kampene ved Talil og As Samawah, An Najaf og de afsluttende kampe ved Bagdad. Foruden en detaljeret gennemgang af de enkelte kampenheder(Order of Battle), beskrives og analyseres udviklingen i anvendte våben og doktriner fra den første til den anden Golf Krig.

Book 21st Century Military Documents

Download or read book 21st Century Military Documents written by Department of Defense and published by . This book was released on 2017-10-29 with total page 166 pages. Available in PDF, EPUB and Kindle. Book excerpt: This regulation delineates the responsibilities and details the processes and procedures for management of National Guard Weapons of Mass Destruction Civil Support Teams (WMD-CST). Civil emergency management structure prepares for and manages the consequences of incidents that occur within their jurisdiction. The National Guard leverages its war fighting capability to support the civil authorities by providing a disciplined, well trained, and well equipped organization to supplement local, state, and Federal efforts to manage potential catastrophic events, or provide special technical support to augment specific needs of the Incident Commander (IC). WMD-CSTs are designed and trained to provide initial assessment of incidents and advise and assist the IC, State Emergency Management, the State's Joint Forces Headquarters (JFHQ-State), the Adjutant General (AG) or Commanding General (CG), the Governor, and other key officials, including representatives of Federal agencies. This regulation establishes the policies, processes, and standards for synchronized, integrated, and seamless WMD-CST employment across the nation, on short notice to assist local and state governments in protecting public health and safety, restoring essential government services, and providing emergency relief to governments, businesses, and individuals affected by the consequences of catastrophic events. Chapter 1 - Introduction * Chapter 2 - WMD-CST Response Management Plan * Chapter 3 - WMD-CST Mission Requests and Validations * Chapter 4 - Alert and Deployment * Chapter 5 - Command and Control * Chapter 6 - Reporting * Chapter 7 - Mission Execution * Chapter 8 - Operational Support * Chapter 9 - Medical * Chapter 10 - WMD-CST Logistics * Chapter 11 - Funding * Chapter 12 - Training and Readiness * Chapter 13 - Personnel and Administration * Chapter 14 - WMD-CST Certification and Revalidation Process * Chapter 15 - WMD-CST Standardization and Evaluation The WMD-CSTs are National Guard units designed to provide a specialized capability to respond to a chemical, biological, radiological or nuclear (CBRN) incident primarily in a Title 32 operational status within the United States, the District of Columbia, its territories and possessions, as established by 10 USC §12310. Congress, the President, and DoD recognized that the WMD-CSTs, responding under the authority of the Governor, provide significant capabilities to assist local and state agencies that may be overwhelmed by a large-scale terrorist attack or where specific technical capabilities to identify CBRN materials are required. In October 1998, Congress authorized and funded the fielding of the first 10 WMD-CSTs. With this fielding began the development and evolution of new capabilities and concepts to ensure that DoD could support evolving interagency response plans. Since 1998, Congress has authorized and funded the fielding of WMD-CSTs in the remaining States and territories.

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-08-26 with total page 437 pages. Available in PDF, EPUB and Kindle. Book excerpt: Three Air Force documents provide unique information about USAF flight test operations. Contents: Operations Procedures * Aircrew Evaluation Criteria * Aircrew Training Chapter 1 * GENERAL INFORMATION * 1.1. Scope * 1.2. Recommended Changes * 1.3. Waivers * 1.4. Unit Supplements * 1.5. Developmental Aircraft * 1.6. Inter-fly * Chapter 2 * MISSION PLANNING * 2.1. General * 2.2. Mission Planning Requirements * 2.3. Mission Planning/Takeoff and Landing Data (TOLD) Software * 2.4. Inflight Publications * 2.5. VFR Low Altitude Charts * 2.6. Local Area Maps and In-flight Guides * 2.7. Local Aircrew Aids * 2.8. Test Cards * 2.9. Briefing/Debriefing Room Requirements * 2.10. Briefing/De-briefing * 2.11. Passenger Briefing Guides * 2.12. Bird Avoidance * 2.13. Normal/Minimum/Emergency Landing Fuel * 2.14. Authorized Fuel Loads * 2.15. Aircraft Movement on the Ground * 2.16. Minimum Runway Lengths * 2.17. AFMC Close Watch Mission/Unusual AFMC Flight Operations * 2.18. Minimum Equipment List (MEL) * Chapter 3 * MISSION GUIDANCE * 3.1. General * 3.2. Common Mission Operations * 3.3. Tactical and Systems Mission Operations * 3.4. Air-to-Air Operations * 3.5. Air-to-Surface Weapons Delivery, Air Drop and/or Low Altitude * 3.6. Flight Test Mission Operations * Chapter 4 * INSTRUMENT PROCEDURES * 4.1. Weather Requirements * 4.2. Approach Category * 4.3. Weather Avoidance * 4.4. Advisory Calls (N/A C-130) * 4.5. Instrument Approach Briefings/Checklists * Chapter 5 * OPERATING PROCEDURES AND RESTRICTIONS * 5.1. General * 5.2. Technical Orders * 5.3. Developmental Software * 5.4. New/Modified Aircraft Equipment/Weapons * 5.5. Wind and Sea State Restrictions (Ejection Seat Aircraft) * 5.6. Aerial Demonstration/Show Formation * 5.7. Aerial Photography and Equipment * 5.8. Flight Duty Period (FDP) * 5.9. Checklists * 5.10. Preflight/Ground Operations * 5.11. Seat and Safety Belt Requirements * 5.12. High Speed Taxi Checks * 5.13. Aircraft Malfunctions and Damage * 5.14. Duty Station (multi-place aircraft) * 5.15. Transfer of Aircraft Control * 5.16. Takeoff Aborts * 5.17. G-Awareness * 5.18. Unusual Attitude and Training Maneuvers (non-aerobatic) * 5.19. Simulated Emergencies * 5.20. Fuel Jettisoning/Dumping * 5.21. Fuel Conservation * 5.22. Dropped Objects * 5.23. Hazardous Conditions * 5.24. Back Seat Landings * 5.25. Touch-and-Go Landings - All Aircraft * 5.26. Post Arresting Gear Engagement Procedures * 5.27. Reduced Runway Separation (RRS) * 5.28. Search and Rescue (SARCAP) Procedures * 5.29. Flight Test Technique Restrictions * Attachment 1 * GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION * Attachment 2 * PASSENGER BRIEFING GUIDE * Attachment 3 * A-10 OPERATING PROCEDURES * Attachment 4 * B-1 OPERATING PROCEDURES * ATTACHMENT 5-B-2 OPERATING PROCEDURES * Attachment 6 * B-52 OPERATING PROCEDURES * Attachment 7 * E-3/E-8/B707 OPERATING PROCEDURES * Attachment 8 * C-5 OPERATING PROCEDURES * Attachment 9 * C-12 OPERATING PROCEDURES * ATTACHMENT 10 * C-17 OPERATING PROCEDURES * Attachment 11 * C-130 OPERATING PROCEDURES * Attachment 12 * C-135 OPERATING PROCEDURES * Attachment 13 * F-35 OPERATING PROCEDURES * Attachment 14 * F-4 OPERATING PROCEDURES * Attachment 15 * F-15 OPERATING PROCEDURES * Attachment 16 * F-16 OPERATING PROCEDURES * Attachment 17 * NOT USED * Attachment 18 * T-38 OPERATING PROCEDURES * Attachment 19 * KC10 OPERATING PROCEDURES * Attachment 20 * U-2 OPERATING PROCEDURES * Attachment 21 * UH/TH-1 OPERATING PROCEDURES * Attachment 22 * F-22 OPERATING PROCEDURES * Attachment 23 * RQ-4 OPERATING PROCEDURES * Attachment 24 * HH-60G OPERATING PROCEDURES * Attachment 25 * CSAR-X OPERATING PROCEDURES * Attachment 26 * CV-22 OPERATING PROCEDURES * Attachment 27 * MQ-1/9 OPERATING PROCEDURES * Attachment 28 * AL-1 OPERATING PROCEDURES * ATTACHMENT 29 * DHC-8-Q200/Q300 OPERATING PROCEDURES * Attachment 30 * PC-12/U-28 (AND VARIANTS) OPERATING PROCEDURES * Attachment 31 * C-20 GULFSTREAM OPERATING PROCEDURES * Attachment 32 * C/R

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by Department of Defense and published by . This book was released on 2017-08-27 with total page 163 pages. Available in PDF, EPUB and Kindle. Book excerpt: Three Air Force documents provide unique information about USAF operations of the U-2 aircraft. Contents: Operations Procedures * Aircrew Evaluation Criteria * Aircrew Training Chapter 1 * INTRODUCTION * 1.1. General * 1.2. Deviations and Waivers * 1.3. Revisions * 1.4. Key Words and Definitions * Chapter 2 * MISSION PLANNING * 2.1. Flight Manuals * 2.2. Checklists * 2.3. Local Aircrew Aids * 2.4. Mission Planning Responsibility * 2.5. Mission Planning Procedures * 2.6. Flight Crew Information File (FCIF) Procedures * Chapter 3 * NORMAL OPERATING PROCEDURES * 3.1. Preflight * 3.2. Ground Visual Signals * 3.3. Taxi * 3.4. Runway Line Up * 3.5. Climbout * 3.6. Descent * 3.7. Stall Training * 3.8. Visual Flight Rule (VFR) Patterns * 3.9. Low Approaches * 3.10. Mobile Officer Control of Landings * 3.11. Touch and Go Landings * 3.12. No-Voice Landings * 3.13. Full Stop Landings * 3.14. Takeoff and Landing with Arresting Cables * 3.15. Interfly * Chapter 4 * SIMULATED EMERGENCY PROCEDURES * 4.1. General * 4.2. Simulated Flameout Patterns (SFO) * 4.3. No-Flap Patterns * 4.4. Simulated Emergency Pattern Full Stop Landings * Chapter 5 * EMERGENCY PROCEDURES * 5.1. General * 5.2. Takeoff Aborts * 5.3. Air Aborts * 5.4. Hung Pogo Procedures * 5.5. Fuel Restrictions * Chapter 6 * WEATHER RESTRICTIONS * 6.1. Ceiling and Visibility * 6.2. Maximum Steady State Surface Wind (Forecasted or Reported) * 6.3. Crosswinds * 6.4. Tail Winds * 6.5. Turbulence * 6.6. Ice and Snow * Chapter 7 * PHYSIOLOGICAL/CREW REST PROCEDURES * 7.1. General * 7.2. High Altitude Flights * 7.3. Low Altitude Flights * 7.4. Crossing Time Zones * 7.5. Crew Rest * 7.6. Wear of Jewelry * 7.7. Exercise * 7.8. Aircrew Operations in Chemical, Biological, Radiological and Nuclear Threat Environment * Chapter 8 * ORIENTATION FLIGHTS * 8.1. General * 8.2. Policy * 8.3. Responsibilities * 8.4. Mission Profiles * 8.5. Sensitive Information * Chapter 9 * U-2 AIRCRAFT SECURITY * 9.1. General * 9.2. Security * 9.3. Air Force Installation Security Program * 9.4. En Route Security * 9.5. Primary Mission Equipment (PME)

Book 21st Century U S  Military Documents

Download or read book 21st Century U S Military Documents written by U. S. Government and published by . This book was released on 2018-03-20 with total page 112 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Red Horse Program stands for Rapid Engineer Deployable Heavy Operational Repair Squadron Engineers, the Air Force heavy construction equivalent of the Navy Seabees. Chapter 1 * FUNCTIONAL RESPONSIBILITIES * 1.1. AF Deputy Chief of Staff for Logistics, Installations & Mission Support (AF/A4/7) * 1.2. AF Civil Engineer (AF/A7C) * 1.3. Air Force Civil Engineer Support Agency (AFCESA) * 1.4. Air Combat Command (ACC) * 1.5. CE Governance Structure * 1.6. Major Commands (MAJCOM) and ANG with Assigned RED HORSE Units * 1.7. NGB/A7 * 1.8. AFRC/A7X * 1.9. RED HORSE Squadron Commanders * 1.10. RED HORSE Operational Control (OPCON) and Administrative Control (ADCON) * Chapter 2 * RED HORSE PROGRAM * 2.1. RED HORSE Units * 2.2. Concept of Operations (CONOPS) * 2.3. Manpower Requirements * 2.4. Deployment Augmentees * 2.5. Mission Requirements * 2.6. RED HORSE Deployment UTCs * 2.7. Deployment Requirements * 2.8. Special Capabilities * 2.9. Monthly Activity Report (MAR) * 2.10. Observations, Innovations, and Lessons (OIL), After Action Reports (AAR)/End of Tour (EOT) Reports * 2.11. Inspections * Chapter 3 * TRAINING * 3.1. Purpose * 3.2. Individual Skill Areas * 3.3. RED HORSE Special Capability and Air Force Specialty Code (AFSC) Specific Training * 3.4. Government Vehicle and Equipment Operations Training * 3.5. Training Frequency * 3.6. Documentation * 3.7. Airborne/Air Insert RED HORSE Additional Training Requirements * 3.8. Troop Training Scope * Chapter 4 * RED HORSE SUPPORT * 4.1. Logistics Information * 4.2. Specialized Functions and Key Staff Advisors * Chapter 5 * AIR RESERVE COMPONENT (ARC) UNITS * 5.1. Reporting Authority * 5.2. Organization * 5.3. ARC Mobilization * 5.4. Total Force Integration (TFI) Associations