JamBot Logo
1-49 of about 49 matches for site:www.globalsecurity.org function beneath
https://www.globalsecurity.org/org/news/2001/010416-nuke.htm
safe for civilians would destroy a warhead's ability to function. Apart from technological considerations
https://www.globalsecurity.org/org/news/2008/080915-bunker-buster.htm
Massive Ordnance Penetrator, a 30,000-pound bomb designed to burrow deep beneath the earth
https://www.globalsecurity.org/wmd/intro/nuke-test.htm
are straightforward, although the equipment needed to make a device function, and function
https://www.globalsecurity.org/military/systems/ship/lsd-49.htm
radar and the SLQ-32 electronic warfare system. Though the control function was being performed manually
http://www.globalsecurity.org/wmd/world/russia/overview_c3i.htm
program under way to ensure leadership survival and continuity of function in the
https://www.globalsecurity.org/military/world/russia/su-27.htm
29 fuselage sits entirely above the air intakes, engine pods and exhaust beneath the wings
https://www.globalsecurity.org/military/world/russia/mf-pacific.htm
known as "Bear Box," an area approximately 1,000 nautical miles east of Japan. Beneath the icy
https://www.globalsecurity.org/military/facility/newport.htm
Porter, who realized that in the future of ships would slip beneath the sea
https://www.globalsecurity.org/space/library/report/1988/sts_overview....
The baskets, 5 feet in diameter and 42 inches deep, are suspended beneath the slide
http://www.globalsecurity.org/military/facility/r-2508.htm
representatives from each command. The CCB conducts the R-2508 Complex management function. The R
https://www.globalsecurity.org/wmd/library/policy/army/fm/8-9/1ch3.htm
explosion in which the point of the detonation is beneath the surface
http://www.globalsecurity.org/military/systems/ship/cv-design.htm
Military Further Reading Carrier Design An aircraft carrier is a military ship whose main function is to deploy
http://www.globalsecurity.org/military/library/report/2000/ice.htm
571) made history in 1958 by completing the first trans-Arctic voyage beneath the polar
https://www.globalsecurity.org/military/world/russia/sso.htm
defined, for the most part, by three things: by fulfilling a special function or mission distinct from
http://www.globalsecurity.org/military/library/report/2001/arctic.htm
a simple one - proceed to the Arctic Circle and operate submerged beneath the polar
http://www.globalsecurity.org/military/systems/aircraft/airtanker.htm
southern European countries such as Greece and Portugal. Leadplanes The Lead Plane function directs the activities
http://www.globalsecurity.org/military/library/report/1998/virginia_cl...
a sail-mounted array and a new “chin”-mounted array, located right beneath the sphere
http://www.globalsecurity.org/wmd/library/report/enviro/eis-0189/sec5_...
the source term (i.e., mass flux and fluid flux release as a function of time
http://www.globalsecurity.org/wmd/library/report/enviro/eis-0217/eis02...
Stripper (see Appendix B.14 for description) removes volatile organic compounds from contaminated groundwater beneath A- and
http://www.globalsecurity.org/military/library/report/call/call_11-23_...
creating the security conditions to permit a society to function normally. Principally, security forces
http://www.globalsecurity.org/intell/library/congress/1999_hr/99-10-20...
are given access to critical national security assets. A PATH FORWARD Operating beneath the surface
http://www.globalsecurity.org/wmd/library/policy/army/fm/3-4/Appa.htm
and the zipper apt to malfunction. Soldiers should wear their mask carriers beneath their outer garments. This
http://www.globalsecurity.org/military/library/report/1999/uss_ashevil...
Asheville in drydock, the chin receiver and projector arrays are visible beneath the bow
http://www.globalsecurity.org/intell/library/congress/1999_hr/990624-m...
airports nationwide but not at our most sensitive nuclear facilities. A PATH FORWARD Operating beneath the surface
http://www.globalsecurity.org/military/library/report/1984/BJQ.htm
and diffuse radar pulses, thereby masking the radar signature of whatever is beneath it. Concealment is the
http://www.globalsecurity.org/military/library/report/2000/occppr11.ht...
static and distorted radio signals that occur when a car is driven beneath high voltage power lines
http://www.globalsecurity.org/wmd/library/congress/1999_r/cox/ch1bod.h...
their top posts in the Communist Party ­ also serve a bridging function between the CCP
http://www.globalsecurity.org/military/systems/aircraft/v-22-testing.h...
Those concerns included the effects of the high-velocity proprotor downwash beneath a hovering
https://www.globalsecurity.org/security/library/report/2005/zawahiri-z...
Shiism. It is a religious school based on excess and falsehood whose function is to accuse
http://www.globalsecurity.org/wmd/library/report/enviro/eis-0228/Chap-...
lies approximately 1,200 ft (370 m) below the surface (Broxton et al. 1994). Beneath the site
http://www.globalsecurity.org/intell/library/congress/1989_cr/s890711-...
contrast to the European Community (EC) in our job-creating ability. Digging beneath the surface
http://www.globalsecurity.org/intell/library/congress/1999_hr/has29320...
what you are probably more interested in is a path forward. Operating beneath the surface
http://www.globalsecurity.org/wmd/world/russia/il-28.htm
Klimov VK-1 centrifugal-flow turbojets (developed from the Rolls-Royce Nene) were mounted beneath the wings
http://www.globalsecurity.org/wmd/library/report/enviro/ea_0502.html
be used for alternative purposes in conjunction with production. Presently, one primary function of the
http://www.globalsecurity.org/military/library/congress/2012_hr/chrg-1...
the Sequestration Transparency Act, STA, report spells out. Cut in the national defense function will total $54.7
http://www.globalsecurity.org/military/library/report/2012/2012-11-20-...
also subside. You were following the role that you performed, the political function that you performed at
http://www.globalsecurity.org/intell/library/congress/1994_cr/s940715-...
at home as we end it abroad: MacNeil/Lehrer Newshour, July 23, 1991. [T]he primary function of the
http://www.globalsecurity.org/military/library/report/1984/BGJ.htm
Grotius' Rights of War and Peace classic alongside the Bible beneath his pillow when he
http://www.globalsecurity.org/wmd/library/news/un/a-50-60.htm
the after-shocks continue to be felt. But even if the ground beneath our feet has not
http://www.globalsecurity.org/wmd/library/policy/army/fm/3-4/Ch3.htm
3-1 , 3-2 , and 3-3 provide casualty estimates as a function of temperature
http://www.globalsecurity.org/military/library/report/other/us-army_ge...
and his officers had spent months getting civil affairs accepted as a legitimate staff function, and as
http://www.globalsecurity.org/wmd/library/policy/army/fm/3-4/Ch6.htm
relaxation of individual NBC protection. Under NBC conditions, CPE allows soldiers to function effectively. CPE comes to
https://www.globalsecurity.org/military/library/report/2003/pla-china_...
to the Central Committee, it appears to have been entirely a function of protocol
https://www.globalsecurity.org/military/library/report/2000/ice.htm
571) made history in 1958 by completing the first trans-Arctic voyage beneath the polar
https://www.globalsecurity.org/military/library/report/2001/arctic.htm
a simple one - proceed to the Arctic Circle and operate submerged beneath the polar
https://www.globalsecurity.org/military/library/report/1998/virginia_c...
a sail-mounted array and a new “chin”-mounted array, located right beneath the sphere
https://www.globalsecurity.org/space/world/israel/imint.htm
rapid image acquisition. It acquires images in swaths ahead of satellite trajectory, beneath it and lateral
https://www.globalsecurity.org/military/library/congress/2012_hr/chrg-...
the Sequestration Transparency Act, STA, report spells out. Cut in the national defense function will total $54.7
https://www.globalsecurity.org/military/library/report/2012/2012-11-20...
also subside. You were following the role that you performed, the political function that you performed at