1MC is the term for the shipboard intercom on U.S. Navy vessels. This system broadcasts throughout the entire ship, and is loud enough that all embarked personnel are able to (normally) hear it. In movies, calls to General Quarters are made over the 1MC. ...more on Wikipedia about "1MC"
An Aldis lamp is a visual signalling device, essentially a focussed lamp which can produce a pulse of light. It is named after its inventor ACW Aldis. This pulse is achieved by opening and closing shutters mounted in front of the lamp, either via a manually-operated pressure switch or, in later versions, automatically. The lamps were usually equipped with some form of optical sight, and were most commonly used on naval vessels and in airport control towers. ...more on Wikipedia about "Aldis lamp"
An aviator call sign or callsign is a nickname given to a military pilot or other flight officer. This call sign is a substitute for the officer's given name, and is used on name tags, planes, and radio conversations. ...more on Wikipedia about "Aviator call sign"
Communications security (COMSEC): Measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, traffic-flow security. and physical security of COMSEC material. ...more on Wikipedia about "Communications security"
The Communications-Electronics Research, Development and Engineering Center (or CERDEC) is the United States Army information technologies and integrated systems center. It belongs to the Research, Development & Engineering Command (RDECOM), but is hosted by the Communications Electronics Command (CECOM) at Fort Monmouth, New Jersey. It is subdivided into directorates, each focusing on an area or discipline: ...more on Wikipedia about "Communications-Electronics Research, Development and Engineering Center"
Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. Historically, cryptography was concerned solely with encryption; that is, means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge. Encryption was used primarily to ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, however, the field of cryptography has expanded its remit: modern cryptography provides mechanisms for more than just keeping secrets and has a variety of applications including, for example, authentication, digital signatures, electronic voting and digital cash. Moreover, people without extraordinary needs for secrecy use cryptographic technology, which is often built transparently into much of computing and telecommunications infrastructure. ...more on Wikipedia about "Cryptography"
The Defense Switched Network (DSN) is a primary information transfer network for the Defense Information Systems Network (DISN). The DSN provides the worldwide non-secure voice, secure voice, data, facsimile, and video teleconferencing services for DOD Command and Control (C2) elements, their supporting activities engaged in logistics, personnel, engineering, and intelligence, as well as other Federal agencies. ...more on Wikipedia about "Defense Switched Network"
Electronic counter-countermeasures (ECCM) describes a variety of practices which attempt to reduce or eliminate the effect of Electronic countermeasures (ECM) on electronic sensors aboard vehicles, ships and aircraft and weapons such as missiles. ECCM is also known as Electronic Protective Measures (EPM), chiefly in Europe. In practice, EPM often means resistance to jamming. Also see Electronic warfare. ...more on Wikipedia about "Electronic counter-countermeasures"
Electronic countermeasures (ECM) are any sort of electrical or electronic device designed to "spoof" radar, sonar, or other detection systems. They may be used both offensively or defensively in any method to deny targeting information to an enemy. The system may make there appear to be many separate targets or make the real target appear to disappear or move about randomly. It is used effectively to protect aircrafts from guided missiles. Most air forces use them to protect their aircraft from attack. ...more on Wikipedia about "Electronic countermeasures"
In telecommunication, the term electronic warfare support measures (ESM) is the division of electronic warfare involving actions taken under direct control of an operational commander to search for, intercept, identify, and locate sources of radiated electromagnetic energy for the purpose of immediate threat recognition. Thus, electronic warfare support measures (ESM) provide a source of information required for immediate decisions involving electronic counter-measures (ECM), electronic counter-counter-measures (ECCM), avoidance, targeting, and other tactical employment of forces. Electronic warfare support measures data can be used to produce signals intelligence (SIGINT), both communications intelligence (COMINT) and electronics intelligence (ELINT). ...more on Wikipedia about "Electronic warfare support measures"
(Finnish armed forces' radio alphabet) A Aarne male name ...more on Wikipedia about "Finnish armed forces' radio alphabet"
The Global Information Grid (GIG) is defined as the globally interconnected, end-to-end set of information capabilities, ...more on Wikipedia about "Global Information Grid"
The Ground Wave Emergency Network (GWEN) is an array of radio transceivers distributed across the continental USA, operating in the VLF frequency band, and intended for military communications during a nuclear war. ...more on Wikipedia about "Ground Wave Emergency Network"
In telecommunication, the term intercept has the following meanings: ...more on Wikipedia about "Intercept"
:The Joint Army/Navy Phonetic Alphabet is not a phonetic alphabet in the sense in which that term is used in phonetics, i.e., it is not a system for transcribing speech sounds. See the phonetic alphabet disambiguation page, and also phonetic notation. ...more on Wikipedia about "Joint Army/Navy Phonetic Alphabet"
Looking Glass is a codename for the United States Air Force Strategic Command's Airborne Nuclear Command Post (ABNCP). ...more on Wikipedia about "Looking Glass"
Message precedence is an indicator attached to an message indicating its level of urgency. ...more on Wikipedia about "Message precedence"
The NATO phonetic alphabet is a common name for the international radiotelephony spelling alphabet which assigns code words to the letters of the English alphabet so that critical combinations of letters (and numbers) can be pronounced and understood by those who transmit and receive voice messages by radio or telephone regardless of their native language, especially when the safety of navigation or persons is essential. It is used by many national and international organizations, including the International Civil Aviation Organization (ICAO), the International Telecommunication Union (ITU), the International Maritime Organization (IMO), the North Atlantic Treaty Organization (NATO), the Federal Aviation Administration (FAA), and the American National Standards Institute (ANSI). It is a subset of the much older International Code of Signals (INTERCO), which originally included visual signals by flags or flashing light, sound signals by whistle, siren, foghorn, or bell, as well as one, two, or three letter codes for many phrases. The same alphabetic code words are used by all agencies, but each agency chooses one of two different sets of numeric code words. NATO uses the normal English numeric words (Zero, One), except for 5 and 9, which are pronounced "fife" and "niner", whereas the IMO uses compound numeric words (Nadazero, Unaone). ...more on Wikipedia about "NATO phonetic alphabet"
:The RAF phonetic alphabet is not a phonetic alphabet in the sense in which that term is used in phonetics, i.e., it is not a system for transcribing speech sounds. See the phonetic alphabet disambiguation page, and also phonetic notation. ...more on Wikipedia about "RAF phonetic alphabet"
The Royal Australian Corps of Signals (RASIGS) keeps every part of the Australian Army in touch. Its motto is Certa Cito (swift and sure). ...more on Wikipedia about "Royal Australian Corps of Signal"
The Royal Corps of Signals (sometimes referred to incorrectly as the Royal Signal Corps and often known simply as the Royal Signals, R Signals or R Sigs) is one of the 'arms' (combat support corps) of the British Army. It is responsible for installing, maintaining and operating all types of telecommunications equipment. ...more on Wikipedia about "Royal Corps of Signals" www.shortopedia.com - Go in quickly.
The Signal Corps is a military branch, usually subordinate to a country's army. Many countries have a Signal Corps, whose main function is usually communication (in modern times, usually radio or telephone communication on the battlefield). The word corps is used in the British sense (meaning a branch of military service, such as Corps of Engineers), rather than the American sense (meaning an organizational unit below army and above division). Subordinate units include signal regiments, battalions, etc. ...more on Wikipedia about "Signal Corps"
(Swedish Armed Forces' phonetic alphabet) A Adam ...more on Wikipedia about "Swedish Armed Forces' phonetic alphabet"
Police units in the United States tend to use a tactical designator (or tactical callsign) consisting of a letter of the police phonetic alphabet followed by one or two numbers. For example, "Mary One" might identify the head of a city's homicide division. Police and fire department radio systems are assigned official callsigns, however. Examples are KQY672 and KYX556. The official headquarters callsigns are usually announced at least hourly, and more frequently by Morse code. ...more on Wikipedia about "Tactical designator"
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more that can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security. ...more on Wikipedia about "Traffic analysis"
This article is licensed under the GNU Free Documentation License.
It uses material from the Wikipedia . Direct links to the original articles are in the text.
If you use exact copy or modified of this article you should preserve above paragraph and put also : It uses material from the Shortopedia article about "Military communications".
|MAIN PAGE||MAIN INDEX||CONTACT US|