text stringlengths 2 132k | source dict |
|---|---|
to identify and analyze knowledge and improvement opportunities. This will ensure advancements are permanent and pervasive, not temporary or limited. Leaders encourage the learning process by formally recognizing individual and unit successes, no matter how large or small. Facing Challenges. Developing Airmen for leade... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
support the change that is being implemented. To achieve that, leaders must maintain a clear understanding of the present and a clear focus on the future. Section 14D—The Art of Leading 14.17. Leadership Styles There are no secrets or magic formulas to successful leadership. Leadership is a responsibility that requires... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
be perceptive to their needs. Learn to recognize problems and seek out ideas. Be innovative. Recognize that effective communication involves shared perceptions. Do not be afraid to empathize when necessary. Do Not Take Things for Granted. Do not assume things have been fixed—look for yourself. Furthermore, the probabil... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
own sources of power enables leaders to be less dependent on others, thus allowing them to take initiative and make greater contributions in their jobs. Although the concept of power sometimes brings to mind such associations as coercion, manipulation, and even corruption, this does not have to be the case when the rig... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
certain degrees or certifications indicating special training. Knowledge power can generally be transferred within jobs or organizations. 14.19. Full Range Leadership Development A full range of leadership behaviors is essential in today’s complex world. Today’s Air Force depends on highly effective Airmen with the fle... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
sit back, observe, and wait for things to go wrong before taking action. They intervene only when policies or rules are broken. Management by exception-passive is a little more effective than laissez-faire, but only because subordinates know that leadership will hold them accountable if they fail to meet standards of p... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
leader must consider ways to get others to embrace ideas, strategies, and initiatives. There are four components of transformational leadership: individualized consideration, intellectual stimulation, idealized influence, and inspirational motivation. - Individualized Consideration ( Nurturing ). Individualized conside... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
of good order, discipline, and successful accomplishment of the mission. While no one expects a leader to be perfect, a leader cannot demand the best from others if he or she cannot demonstrate that they are willing to do the same. Through positive behavior, leaders live by their values and become good role models. The... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
during times of uncertainty, deviation, turmoil, and conflict. Accountability. Promoting accountability in the workplace includes establishing clear roles and responsibilities, cultivating a sense of pride and ownership among the members within the organization, providing regular feedback to subordinates, leading with ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
inherently motivating or compelling. While charisma can be effective at enhancing morale, it should not be contrary to authority or undermine commander intent. Compassion. Compassion is the sympathy and concern for the misfortunes of others. Compassion promotes healthy, open, and honest communication, and provides the ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
broken into three parts: the sender, the message, and the audience, we must be aware of and responsible for how we communicate, including the way our communication is perceived by others. Strategic communication is viewed as an emerging and extremely important concept, resulting in strategic communication being designa... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
Air Force, and through the enterprise perspective, be able to tell their Air Force story. All Airmen need to know how to integrate their personal Air Force story and experience into a message that adds credibility to Air Force, Department of Defense, and national strategic communication. 15.3. Public Affairs An importa... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
interests. More specific restrictions on communications and unofficial publications can be found in AFI 51-508, Political Activities, Free Speech and Freedom of Assembly of Air Force Personnel . 15.4. Social Media Airmen interact with individuals via face-to-face, telephone, written letter, e-mail, text messages, socia... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
and Associated Terms, supplements English-language dictionaries and standardizes terminology used within the Department of Defense, other federal agencies, and among the United States and its allies. It is a compilation of definitions, abbreviations, and acronyms applicable to the Department of Defense and its componen... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
> BBravo BRAH voh OOscar OSS car > CCharlie CHAR lee PPapa PAH pah > DDelta DEL tah QQuebec Keh BECK > EEcho EKK oh RRomeo ROW me oh > FFoxtrot FOKS trot SSierra See AIR ah > GGolf Golf TTango TANG go > HHotel HO tell UUniform YOU nee form > IIndia IN dee ah VVictor VIK ter > JJuliet JEW lee ett WWhiskey WISS key > KKi... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
subordinates and commands. Leaders set the command climate by making themselves available for communication, especially during times of crisis. Sustainable. Leadership is essential to instilling focus and function for the culture of engagement. Sustainability requires dedicated resources and manpower to build enduring ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
issue. Address the issue, the whole issue, and nothing but the issue. Organized. Good organization means presenting information in a logical, systematic manner. When information is not well organized, audiences may become confused, impatient, or inattentive. Even if you are providing useful, relevant information, the i... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
clear on your purpose and know and understand your audience when preparing to communicate your message. This is often accomplished by determining what your message is and why you are communicating it to your audience. In this step you will want to ask yourself, is your purpose for communicating to direct, inform, persu... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
message. There are several ways to organize information; you will want to choose the one that allows your message to reach the audience in the best manner possible. There are several patterns available in AFH 33-337, Chapter 6. The pattern you choose will depend greatly on whether your intent is to direct, inform, pers... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
time to take a break before looking it over through an editing lens. This will allow you to edit with fresh eyes. Think about what you would like to accomplish with your work and keep that in mind as you look over your draft. Consider how it may look or sound to the audience as you edit your work. Whether your communic... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
job and whether or not you possess those experiences or skills. One of the first steps in preparing for a job interview is carefully studying the job advertisement or position description so you understand the particular knowledge, skills, and abilities required. Once you have successfully aligned your knowledge, skill... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
or after the interview. If you are having a phone interview, ensure you will be in an environment where you can solely focus on the interview. It is a good idea to research the mission and history of the hiring organization before the interview. The more you know about the organization, the better you will be at convin... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
you see as one of your biggest challenges with a job like this? Where do you see yourself in two to three years? Are there any issues to prevent you from accepting or performing in this position? Purpose of Interviews. All job interviews are designed with one goal in mind - to find the right person for the right job. E... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
clearly and accurately via e-mail, that is one of the quickest forms of sending a message. If you need to send a message that requires an immediate response or might need clarification or elaboration that could be lost in translation through e-mail, discussing the issue over the phone may be the best approach to take. ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
15.13. Writing Platforms The Air Force has adopted common, basic formats of written communication for official and personal correspondence and memorandums. Understanding the purpose of these formats will best serve your superiors, yourself, and your subordinates in using the proper format for the intended purpose. AFH ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
forms for everyday staff work to serve a variety of functions. The types of Air Force papers include the point paper, talking paper, bullet background paper, background paper, position paper, and the staff study. Be sure that the type of format used is appropriate for the task. Samples, explanations, and examples of Ai... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
can be used to explain or provide details regarding an attached talking paper. Background Paper. The background paper is used when addressing a single issue or several related issues using a multi-page format including full sentences, details, and numbered paragraphs. It is often used as a multi-purpose staff communica... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
particular format used to communicate findings. Understanding and applying the essential elements of problem analysis via a staff study will enable better application of any staff communication. The Staff Package. The staff package is a writing format commonly used in the Air Force for routing or coordinating correspon... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
Most of the time this action takes the form of a strong action verb, such as conducted, established, or generated. If desired, adverbs, such as actively, energetically, or swiftly, can modify action verbs for an added boost. For a more complete list of verbs and adverbs, refer to AFH 33-337. The impact element explains... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
superb impromptu 135 speaker has achieved the highest level in verbal communications. Prepared. Prepared speaking or briefing refers to those times when we have ample opportunity to prepare. This does not mean the person writes a script and memorizes it, but prepared delivery does require a thorough outline with carefu... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
the name implies, the primary purpose of a teaching lecture is to teach an audience about a given subject. Teaching lectures are either formal or informal. Formal lectures are generally one-way with no verbal participation by the audience. Informal lectures are usually presented to smaller audiences and allow for verba... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
. Sometimes we inadvertently exclude members of our audience by falling into communication traps involving references to race, religion, ethnicity, or sex. Remember this concept when designing visual support as well. Adhering to good taste and sensitivity will keep your message credible and ensure you reach your audien... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
give praise where praise is due. Rather than focusing on problem areas, optimism can encourage acceptance of a message. Also, encourage and be receptive to criticism in the form of helpful questions, suggestions, requests, recommendations, or information. Audiences often sense and appreciate sincerity and honesty. 15.2... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
and capture the listener’s attention. Starting with a voice range that is comfortable for you and then adjusting pitch for emphasis may help make communication more interesting. You can use a downward (high to low) inflection in a sentence for an air of certainty and an upward (low to high) inflection for an air of unc... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
feedback from the audience, and enhances the credibility of the speaker. Gestures. Gestures are the purposeful use of the hands, arms, shoulders, and head to reinforce what is being said. Effective gestures are natural and should not be distracting to the audience. Purposeful, effective body movement can be described a... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
to ensure your message is received clearly and as intended. - Know the material, the script, or topic to be covered at the event. - Analyze your audience to reduce your fear of the unknown. - Envision yourself having a successful experience in front of the audience. - Practice using a recording device, video camera, fu... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
feeling the speaker has than it is an observation of the audience. Simply allowing hands to hang naturally may feel awkward, but it’s perfectly natural from the audience’s perspective. Practice allowing your hands to hang naturally and it’ll eventually begin to feel natural. Caged tiger. The caged tiger is a term used ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
and giving consideration to what is heard. In other words, listening involves thinking about and making sense of the message. Effective, active listening involves engaging verbally and nonverbally in the listening process to appropriately respond, comprehend, evaluate, and remember a message. Effective listening helps ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
listening. Empathic listening is often appropriate during mentoring and counseling sessions and is very helpful when communicating with family members. Section 15E—Electronic Messaging 15.26. E-mail Etiquette E-mail is defined as the electronic transmission of information over computer-based messaging systems. Technolo... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
brought together with other information, can create problems when in the wrong hands. Do not create or forward junk mail, do not create or send chain letters, and do not use e-mail for personal ads. Rule 4 —Be Selective About Who Gets Your Message. Reply to specific addressees to give those not interested a break, in o... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
and received information according to Air Force records management directives. Electronic messages may be subject to requests under the Freedom of Information Act, litigation, and court orders. Be sure to adhere to local policy when sending electronic messages to mail distribution lists. Do not auto-forward electronic ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
the Department of Defense, ensure there is an official need, and all addressees are authorized to receive personal information under the Privacy Act. “For official use only” is added to the beginning of the subject line, followed by the subject. The following statement is applied at the beginning of the e-mail: “This e... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
chain letters, unofficial soliciting, or selling except on authorized internet-based capabilities established for such use. - Unauthorized storing, processing, displaying, sending, or otherwise transmitting prohibited content: pornography, sexually explicit or sexually oriented material, nudity, hate speech or ridicule... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
removable media devices for viruses before and after use if scans are not automated. Report any suspected information system abnormalities (antivirus errors, virus alerts, unexpected file size increases, unexpected disk access, strange activity by applications) immediately to the organizational information assurance of... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
lead time, distance, and broader access to information and knowledge assets. Technology also eliminates barriers between customers and suppliers. Policies, Legislation, and Regulations. Changing existing policies, regulations, and legislation may be required for new processes. Physical Infrastructure. Physical faciliti... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
to four stars (professional development). Personnel: Availability of qualified people for peacetime, wartime, and various contingency operations. Facilities: Real property, installations, and industrial facilities (government owned ammunition production facilities) that support the forces. 16.18. Decision-Making Model ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
them. They may perceive the leader as playing favorites, which could result in some resistance from the group or organization when it comes time to implement the decision. 145 Level III: Gather Input from the Group and Decide. In this level, leaders gather input from the group and then make a decision. This approach of... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
accept the decision or facilitate further decision analysis. Level V: Delegate with Constraints. In this level, leaders delegate the problem to the group and authorize the group to make the decision within specified boundaries. Leaders do not abandon the group, but facilitate support and resources to enable the group’s... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
disaster or incident affecting the base is imminent or in-progress, personnel must respond to directions communicated over mass notification and warning systems or other communication channels, whether visual or audible. Be sure to understand how notifications and warnings are executed to ensure prompt, informed, and r... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
to quickly communicate the required individual protective equipment and protection levels for in-place forces to take in the event of wartime chemical, biological, radiological, and nuclear operations or attack conditions. The installation commander determines the initial level, based on MOPP condition analysis, and ad... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
exposure control, contamination control, and warning and notification systems. Individual protection measures are taken in stages equivalent to the urgency and nature of the threat. Command and theater-specific instructions will direct the proper individual protective postures. Ground Crew Ensemble. Regardless of the t... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
are structures that protect personnel from chemical, biological, radiological, and nuclear effects over extended periods. Shelter selection is based on structural and personnel housing capabilities in relation to potential types of disasters. Personnel may be required to shelter-in-place in the event the type or extent... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
be placed under overhead cover, it must be covered or wrapped with at least one layer of barrier material to prevent contamination. When possible, two layers of barrier material used to cover the tops of vehicles and equipment will serve to ensure contamination can be removed, safely discarded, and replaced, as necessa... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
of whether or not mass notification has been disseminated. Note: When alarm red is declared, or attack begins without notification, drop to the ground, don protective mask (if not donned already), crawl to closest available protection, don remaining individual protective equipment, and immediately check every member of... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
effort from personnel who are trained to operate as a team and are able to use specialized equipment to spearhead recovery efforts. Reestablishing the mission is a top priority. Reconnaissance. The installation commander will determine when base specialized and unit reconnaissance teams begin post-attack chemical, biol... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
5-percent chlorine solution will remove the chemical agent from equipment and a 0.5 percent chlorine solution will remove agents from the skin. Contamination Control Area. If personnel become contaminated with chemical, biological, or radiological agents, they decontaminate by processing through the contamination contr... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
elements of risk management. Safety training may be integrated into task performance training or conducted separately. Job Safety Analysis. A job safety analysis is used to evaluate each work task not governed by a technical order or other definitive guidance and when a new work task or process is introduced into the w... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
balance is achieved. Make Risk Decisions at the Appropriate Level. Although anyone can make a risk decision that impacts their personal well-being, some risk acceptance decisions must be made by an appropriate 153 decision-making authority to effectively allocate resources and implement controls to mitigate or eliminat... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
and fundamental concepts of risk management highlight the universal application of risk management both on- and off-duty. There are two primary levels of risk management: deliberate and real-time. Deliberate and real-time risk management are interrelated when making risk management decisions. They are separated only at... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
is provided here. Step 1. Identify the Hazards. Step 1 of the Five-Step Risk Management Process is to identify the hazards. Identifying the hazards involves application of appropriate hazard identification techniques to identify hazards associated with the operation or activity. Hazards can be defined as any real or po... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
Risk levels will vary from “extremely high” as associated with frequent exposure and catastrophic effects to “low” as associated with unlikely exposure and negligible effects. A complete and in-depth description of the risk assessment matrix can be found in AFPAM 90-803, Risk Management (RM) Guidelines and Tools . Step... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
or activity with the proposed controls in place, and determining if the benefits now exceed the level of risk the operation or activity presents. Step 4. Implement Controls. Step 4 of the Five-Step Risk Management Process is to implement controls. Once control measures have been selected, an implementation strategy mus... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
costs are in line with expectations and how the controls have affected mission performance (good or bad). Note: When risk analysis contains errors, it is important for those errors to be identified and corrected. Also, after-action reports, surveys, and in-progress reviews are excellent tools for measurements. A feedba... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
goals; and (3) projection into the future. Note: This first step of the real-time risk management process/ABCD model effectively combines the first two steps of the five-step risk management process. B – Balance Controls. The ‘B’ in the Real-Time Risk Management Process/ABCD Model is for balancing controls. After asses... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
abandon the mission. And, as with the formal five-step risk management process, both leadership and personnel involved in a mission or activity must ensure that the feedback loop or “debrief” is performed. This step ensures individuals complete the real-time risk management process/ABCD model mnemonic loop by identifyi... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
to examine the planning, preparation, execution, and post-execution phases of any operation or activity across the entire spectrum of military action and in any operational environment. Operations security analysis provides decision-makers with a means of weighing the risk to their operations. Decision-makers must dete... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
signatures and profiles with critical information value. Contrasts. A contrast is any difference observed between an activity’s standard profile and most recent or current actions. Exposure. Exposure refers to when and for how long an indicator is observed. The longer an indicator is observed, the better chance an adve... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
national security that the original classification authority is able to identify or describe. Confidential . Confidential shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
as not leaving FOUO status information unattended where unauthorized personnel are present. After working hours, store the information in unlocked containers, desks, or cabinets if the building is provided security by government or government-contract personnel. If building security is not provided or deemed inadequate... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
downgrading (if any) and declassification; give information on the sources of and reasons for classification; notify holders of special access, control, or safeguarding requirements; and promote information sharing, facilitate judicious use of resources, and simplify management through implementation of uniform and sta... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
SF 704, Secret , and SF 705, Confidential . End-of-Day Security Checks. Use SF 701, Activity Security Checklist , to record the end of the day security checks. This form is required for any area where classified information is used or stored. Ensure all vaults, secure rooms, and containers used for storing classified m... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
cannot be physically located or accounted for. This could include classified information/equipment being discovered as missing during an audit and cannot be immediately located. Data Spills . Classified data spills occur when classified data is introduced either onto an unclassified information system, to an informatio... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
information. 163 Adjudicative Guidelines. The Department of Defense Central Adjudication Facility is the designated authority to grant, deny, and revoke security clearance eligibility using the Department of Defense 13 adjudicative guidelines, while applying the whole person concept and mitigating factors. Individuals ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
collection must not conflict with the rights guaranteed by the First Amendment to the U.S. Constitution. A Privacy Act statement must be given when individuals are asked to provide personal information about themselves for collection in a system of records. System of Records Maintenance. Privacy Act system of records i... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
Act provides access to federal agency records (or parts of these records) except those protected from release by specific exemptions. Freedom of Information Act requests are written requests that cite or imply the Freedom of Information Act. The law establishes rigid time limits for replying to requesters and permits a... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
balanced to include safety, reliability, interoperability, and ease of use, while maximizing performance, as well as promoting transparency and interoperability 165 with Air Force mission partners. All Air Force personnel are required to complete Information Assurance Awareness training prior to system access and annua... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Information systems also include specialized systems, such as industrial/process controls, telephone switching and private branch systems, and environmental controls. All authorized u... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
officer and following local procedures. 18.20. Mobile Computing Devices Mobile computing devices are information systems, such as portable electronic devices, laptops, smartphones, and other handheld devices that can store data locally and access Air Force managed networks through mobile access capabilities. All wirele... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
technically sound cryptosystems. Transmission Security. Transmission security is a component of communications security resulting from the application of measures designed to protect transmissions from interception and 167 exploitation by means other than cryptoanalysis. Examples of transmission security measures inclu... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
or limit the effects of terrorist acts by giving guidance on collecting and disseminating timely threat information, providing training to all Air Force members, developing comprehensive plans to deter and counter terrorist incidents, allocating funds and personnel, and implementing antiterrorism measures. Headquarters... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
exercise antiterrorism plans, to include antiterrorism physical security measures, continuity of operations, critical asset risk management, and emergency management plans. Antiterrorism training should include terrorism scenarios specific to the location and be based on current enemy tactics, techniques, procedures, a... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
affiliations. Keep doors locked at all times. Do not let someone you do not know direct you to a specific taxi. Ensure taxis are licensed and have safety equipment (seat belts at a minimum). Ensure that the face of the taxi driver and the picture on the license are the same. 18.26. Commercial Air Transportation Securit... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
has been moved, place the package in a plastic bag to prevent any leakage of contents. If handling mail suspected of containing chemical or biological contaminants, wash hands thoroughly with soap and water. Report suspicious mail immediately and make a list of personnel who were in the room when the suspicious envelop... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
night, including the garage. - Keep the house locked, even if you are home. - Destroy all envelopes or other items that show your name, rank, or other personal information. - Remove names and rank from mailboxes. - Watch for unfamiliar vehicles cruising or parked frequently in the area, particularly if one or more occu... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
to cooperate. Debriefing may be conducted at all echelons and in all operational environments. Through debriefing, face-to-face meetings, conversations, and elicitation, information may be obtained from a variety of human sources. Document and Media Exploitation. Captured documents and media, when properly processed an... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
acquire reportable information, to immediately (within 30 days of the contact) report the contact or information either verbally or in writing to AFOSI. The AFOSI initiates and conducts all counterintelligence investigations, operations, collections, and other related activities for the Air Force. When appropriate, or ... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
Chapter 19 STANDARDS OF CONDUCT # Chapter 19 STANDARDS OF CONDUCT Section 19A—Way of Life 19.1. Air Force Way of Life Air Force employees are required to comply with prescribed standards of conduct in all official matters, as well as when off-duty. This means military and civilian Airmen (Active Duty, Air Force Reserve... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
the Air Force, as prescribed by the issuing authority. - Air Force Policy Directives. Air Force Policy Directives (AFPD) are the policy statements of the Secretary of the Air Force directing Airmen to initiate, govern, delegate, and regulate actions within specified areas of responsibility by Air Force activities. AFPD... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
> 32—Civil Engineering 71—Special Investigations > 33—Communications and Information 84—History > 34—Services 90—Special Management > 35—Public Affairs 91—Safety > 36—Personnel 99—Test and Evaluation > 38—Manpower and Organization Nondirective Publications. Nondirective publications are informational and suggest guidan... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
by these restrictions to preserve relations with our host nation and support military operations with friendly forces. No mission, particularly a combat mission, can succeed without the discipline and resilience produced by strict compliance with these rules. Individuals who are unable to maintain these higher standard... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
fall into the hands of the enemy, particularly prisoners of war, civilians, and military wounded, sick, and shipwrecked. The law aims to keep conflicts from degenerating into savagery and brutality, thereby helping restore peace. LOAC also serves to assist commanders in ensuring the disciplined and efficient use of mil... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
use of all measures needed to defeat the enemy as quickly and efficiently as possible, that are not prohibited by the law of war. Attacks must be limited to military objectives. Combatants, unprivileged belligerents, and civilians taking a direct part in hostilities, are military objectives and may be made the object o... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
harmless character means there is no military purpose served by attacking them. Distinction. The LOAC principle of distinction imposes a requirement to distinguish (discriminate) between the military forces and the civilian population, and between unprotected 177 and protected objects. Military force may be directed on... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
feasible precautions in planning and conducting attacks to reduce the risk of harm to civilians and other persons and objects. Honor. Honor is a principle of the LOAC that requires a certain amount of fairness in offense and defense and a certain mutual respect between opposing military forces. In doing so, honor refle... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
status is determined. Combatants. Lawful or “privileged” combatants are: (1) members of the military forces of a state that is a party to a conflict, aside from certain categories of medical and religious personnel; (2) 178 under certain conditions, members of militia or volunteer corps who are not part of the military... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
or direct part in hostilities. Unprivileged Belligerents: A Distinction Not Made by the Geneva Conventions. The term unprivileged belligerent is not used in the Geneva Conventions, but is defined in the DoD Manual on the Law of War, as “lawful combatants who have forfeited the privileges of combatant status by engaging... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
for their own safety; collecting intelligence from civilians, including interrogating civilians, restricting the movement of civilians, or directing their 179 movement away from military operations for their own protection; or seeking to influence enemy civilians with propaganda. Reasonable precautions to reduce the ri... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
not be attacked. Airmen who resist in descent or are downed behind their own lines and who continue to fight may be subject to attack. The rules of engagement for a particular operation often include additional guidance for attacking enemy aircraft consistent with LOAC obligations. An enemy’s public and private nonmili... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
services has a duty to comply with LOAC, which includes the refusal to comply with clearly illegal orders to commit violations of LOAC. For LOAC violations, members can be prosecuted by courts-martial under the Uniform Code of Military Justice or through an international military tribunal. Reporting Violations. Departm... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
and against prisoners of war. The authority to conduct reprisal is held at the National level. Service members and units are not to take reprisal action on their own initiative. 19.10. Rules of Engagement Rules of engagement exist to ensure use of force in an operation occurs according to national policy goals, mission... | {
"page_id": null,
"source": 7334,
"title": "from dpo"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.