03.04.2013 Views

jp1_02

jp1_02

jp1_02

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

As Amended Through 15 March 2013<br />

attack assessment — An evaluation of information to determine the potential or actual<br />

nature and objectives of an attack for the purpose of providing information for timely<br />

decisions. See also damage estimation. (JP 3-14)<br />

attack group — A subordinate task organization of the Navy forces of an amphibious task<br />

force. It is composed of assault shipping and supporting naval units designated to<br />

transport, protect, land, and initially support a landing group. (JP 3-<strong>02</strong>)<br />

attack heading — 1. The interceptor heading during the attack phase that will achieve the<br />

desired track-crossing angle. 2. The assigned magnetic compass heading to be flown<br />

by aircraft during the delivery phase of an air strike. (JP 3-09.3)<br />

attack position — The last position occupied by the assault echelon before crossing the line<br />

of departure.<br />

attack the network operations — Lethal and nonlethal actions and operations against<br />

networks conducted continuously and simultaneously at multiple levels (tactical,<br />

operational, and strategic) that capitalize on or create key vulnerabilities and disrupt<br />

activities to eliminate the enemy’s ability to function in order to enable success of the<br />

operation or campaign. Also called AtN operations. (JP 3-15.1)<br />

augmentation forces — Forces to be transferred from a supporting combatant commander<br />

to the combatant command (command authority) or operational control of a supported<br />

combatant commander during the execution of an operation order approved by the<br />

President and Secretary of Defense. (JP 5-0)<br />

authenticate — A challenge given by voice or electrical means to attest to the authenticity<br />

of a person, message, or transmission. (JP 3-50)<br />

authentication — 1. A security measure designed to protect a communications system<br />

against acceptance of a fraudulent transmission or simulation by establishing the<br />

validity of a transmission, message, or originator. 2. A means of identifying individuals<br />

and verifying their eligibility to receive specific categories of information. 3. Evidence<br />

by proper signature or seal that a document is genuine and official. 4. In personnel<br />

recovery missions, the process whereby the identity of an isolated person is confirmed.<br />

See also evader; evasion; recovery operations; security. (JP 3-50)<br />

authenticator — A symbol or group of symbols, or a series of bits, selected or derived in a<br />

prearranged manner and usually inserted at a predetermined point within a message or<br />

transmission for the purpose of attesting to the validity of the message or transmission.<br />

(JP 3-13.3)<br />

authorized departure — A procedure, short of ordered departure, by which mission<br />

employees or dependents or both, are permitted to leave post in advance of normal<br />

rotation when the national interests or imminent threat to life require it. (JP 3-68)<br />

JP 1-<strong>02</strong> 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!