filename
stringclasses
1 value
title
stringlengths
3
66
text
stringlengths
41
12.8k
mil_tactics_continued_pretraining.csv
Regular army
Bibliography: Woodward, David. Armies of the world, 1854–1914. London: Sidgwick & Jackson, cop. 1978. ISBN 0-283-98243-8
mil_tactics_continued_pretraining.csv
Religious war
Definitions: Konrad Repgen (1987) pointed out that belligerents may have multiple intentions to wage a war, may have had ulterior motives that historians can no longer discover, and therefore, calling something a 'religious war' (or 'war of succession') based merely on a motive that a belligerent may have had, does not...
mil_tactics_continued_pretraining.csv
Religious war
Some commentators have concluded that only 123 wars (7%) out of these 1763 wars were fundamentally originated by religious motivations. Andrew Holt (2018) traced the origin of the "only 123 religious wars" claim back to the 2008 book The Irrational Atheist of far-right activist Vox Day, which he notes is slightly adjus...
mil_tactics_continued_pretraining.csv
Religious war
He mentioned the Maccabean Revolt (167–160 BCE), the First Jewish–Roman War (66–73 CE) and the Bar Kokhba revolt (132–136 CE) as three examples of a "holy war" or "Commanded War" (Hebrew: מלחמת מצווה Milkhemet Mitzvah) in the eyes of Rabbinic Judaism at the time. He asserted that this concept may have re-emerged in mod...
mil_tactics_continued_pretraining.csv
Religious war
Nolan described the wars' goals and character as follows: "The main aim of the Hussites was to prevent the hated Sigismund mounting the throne of Bohemia, but fighting between Bohemian Hussites and Catholics spread into Moravia. (...) cross-class support gave the Hussite Wars a tripartite and even 'national' character ...
mil_tactics_continued_pretraining.csv
Religious war
Israeli–Palestinian conflict: The Israeli–Palestinian conflict can primarily be viewed as an ethnic conflict between two parties where one party is most often portrayed as a singular ethno-religious group which only consists of the Jewish majority and ignores non-Jewish minority Israeli citizens who support the existen...
mil_tactics_continued_pretraining.csv
Religious war
A confessional Parliament was created in which Muslims and Christians were given quotas of seats. As well, the president was to be a Christian, the prime minister a Sunni Muslim and the speaker of Parliament a Shia Muslim. In March 1991, Parliament passed an amnesty law that pardoned all political crimes prior to its e...
mil_tactics_continued_pretraining.csv
Religious war
Gothenburg: University of Gothenburg. p. 40. Retrieved 22 March 2022. Metcalf, Barbara D.; Metcalf, Thomas R. (2006). A Concise History of India (2nd ed.). Cambridge University Press. ISBN 978-0-521-68225-1. Miner, Steven Merritt (2003). Stalin's Holy War: Religion, Nationalism, and Alliance Politics, 1941-1945, Univ o...
mil_tactics_continued_pretraining.csv
Resource war
History: Chincha Islands War: One of the most prolific examples of resource war in history is the conflict over Chincha Island guano in the late 19th century. The Chincha Islands of Peru are situated off of the southern coast of Peru, where many seabirds were known to roost and prey on fish brought there by the curre...
mil_tactics_continued_pretraining.csv
Reverse slope defence
Historical examples: Napoleonic Wars: The best-known proponent of the tactic was the Duke of Wellington, who used it repeatedly during the Napoleonic Wars to defeat French infantry, such as at the Battle of Waterloo. By placing a ridge between his own army and his opponent's, and having his troops lie down, Wellingt...
mil_tactics_continued_pretraining.csv
Revetting
Freshwater revetments: Many revetments are used to line the banks of freshwater rivers, lakes, and man-made reservoirs, especially to prevent damage during periods of floods or heavy seasonal rains (see riprap). Many materials may be used: wooden piles, loose-piled boulders or concrete shapes, or more solid banks. Con...
mil_tactics_continued_pretraining.csv
Right of conquest
History and arguments: Proponents state that the right of conquest acknowledges the status quo, and that denial of the right is meaningless unless one is able and willing to use military force to deny it. Further, the right was traditionally accepted because the conquering force, being by definition stronger than any l...
mil_tactics_continued_pretraining.csv
Robert A. Doughty
Early life: Doughty was born in Tullos, Louisiana, on November 4, 1943, to parents John and Georgia Doughty. Career: He attended the United States Military Academy, graduating in 1965. Doughty subsequently completed a tour of duty in Germany before deploying to Vietnam in an advisory role in 1968. Upon his return to t...
mil_tactics_continued_pretraining.csv
Rules of engagement
Authoritative sources: While many countries have their own rules of engagement documents, many others do not. There are two primary international rules of engagement manuals that are internationally available: NATO ROE Manual MC 362-1 (restricted to NATO and Partnership for Peace countries); and the San Remo Rules of E...
mil_tactics_continued_pretraining.csv
Saturation attack
Theoretical calculations: Taking the design of an anti-ship missile as a theoretical example, one can begin with the goal of creating a missile which will get through and destroy its target 100% of the time. It is also understood, however, that an opponent will develop counter measures if given enough time, meaning tha...
mil_tactics_continued_pretraining.csv
Scorched earth
Origin of the term: The term was found in English in a 1937 report on the Second Sino-Japanese War. The retreating Chinese forces burned crops and destroyed infrastructure including cities to sabotage the logistics of the advancing Japanese forces. Military theory: Clausewitz wrote in Principles of War: In defensive ...
mil_tactics_continued_pretraining.csv
Scorched earth
The atrocious, gut-wrenching sight caused Mehmed to withdraw from battle and send instead Radu, Vlad's brother, to fight Vlad the Impaler. 16th century: Anglicisation of the Irish: Further use of scorched-earth policies in war was seen during the 16th century in Ireland, where it was used by English commanders such ...
mil_tactics_continued_pretraining.csv
Scorched earth
Thus, the French army starved as it marched along the resource-depleted invasion route. South American War of Independence: In August 1812, Argentine General Manuel Belgrano led the Jujuy Exodus, a massive forced displacement of people from what is now Jujuy and Salta Provinces to the south. The Jujuy Exodus was condu...
mil_tactics_continued_pretraining.csv
Scorched earth
The historian Sydney Nettleton Fisher wrote, "The Greek army in retreat pursued a burned-earth policy and committed every known outrage against defenceless Turkish villagers in its path". Norman Naimark noted that "the Greek retreat was even more devastating for the local population than the occupation". Second Sino-J...
mil_tactics_continued_pretraining.csv
Scorched earth
See also: Explanatory notes: Notes: References: Ambler, Sophie; Bailey, Mark; Seel, Graham E. (2018). British Depth Studies c. 500–1100 (Anglo-Saxon and Norman Britain). London: Anthem Press. ISBN 978-1-78308-808-9. Retrieved 3 July 2023. american.edu (2010). "The Economic and Environmental Impact of the Gulf War...
mil_tactics_continued_pretraining.csv
Scorched earth
New York Times. Archived from the original on 8 June 2023. Retrieved 8 June 2023. Kuhn, Anthony (2008). "Rivers and the Destruction of Napoleon's Grand Army". napoleon-series.org. Lowry, Bernard (2006). Discovering Fortifications: From the Tudors to the Cold War. Princes Risborough, UK: Shire Publications. ISBN 978-0-7...
mil_tactics_continued_pretraining.csv
Screening (tactical)
Screening force: Screening is often done by reconnaissance units such as cavalry, which operate within range of supporting artillery. In contrast to a guard force, a screening force may consist of a scout platoon rather than a task force or squadron; and its mission is less ambitious, focusing on early warning to the m...
mil_tactics_continued_pretraining.csv
Seabed warfare
Overview: Seabed warfare is defined as “operations to, from and across the ocean floor.” In general the target of seabed warfare is infrastructure in place on the seabed such as power cables, telecom cables, or natural resource extraction systems. Seabed warfare capabilities are expensive and because of that significan...
mil_tactics_continued_pretraining.csv
Security dilemma
Basic components: Tang identified the following core components between interpretations of the security dilemma by Herbert Butterfield, John H. Herz, and Robert Jervis: Butterfield viewed the security dilemma as the root cause of all war, but he did not view anarchy as being the ultimate source of the security dilemma...
mil_tactics_continued_pretraining.csv
Security dilemma
In that example, strategists believed that offense would be more advantageous than defense, but that ultimately turned out to not be the case. Competition on nuclear weapons construction between the United States and the Soviet Union, during the Cold War, is a well-known example of an arms race. Alliance formation: Th...
mil_tactics_continued_pretraining.csv
Sexual harassment in the military
Definitions: Sexual harassment is unwanted sexual behaviour experienced as threatening or otherwise upsetting. Definitions in use by state armed forces include: Australian Defence Forces: Unwanted sexual advances or sexual requests towards to another person British Army: Unwanted sexually based conduct or other conduc...
mil_tactics_continued_pretraining.csv
Sexual harassment in the military
In 2019, Secretary of Defense Lloyd Austin remarked nonetheless that prevention efforts remained "far short of what is required to make lasting change". Since the number of official complaints represents only a fraction of sexual harassment incidence, armed forces committed to reducing prevalence produce periodic estim...
mil_tactics_continued_pretraining.csv
Sexual harassment in the military
Between 2012 and 2017, the MOD recorded a further 363 allegations, of which 282 were referred to the police. United States: Since 2014, surveys of US military personnel have found a high prevalence of sexual harassment. The following rates refer to the proportion of women reporting that they had experienced harassment...
mil_tactics_continued_pretraining.csv
Shell scrape
null
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
History of analogue fire control systems: Naval fire control resembles that of ground-based guns, but with no sharp distinction between direct and indirect fire. It is possible to control several same-type guns on a single platform simultaneously, while both the firing guns and the target are moving. Though a ship roll...
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
In the director tower, operators trained their telescopes on the target; one telescope measured elevation and the other bearing. Rangefinder telescopes on a separate mounting measured the distance to the target. These measurements were converted by the Fire Control Table into bearings and elevations for the guns to fir...
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
The guns controlled by it were typically 5 inch weapons: the 5-inch/25 or 5-inch/38. Deployment: destroyers (1 per vessel, total 48) 8 Farragut-class(launched ca. 1934) 18 Mahan-class(ca. 1935) (Cassin, Downes later rebuilt with Mk37) 4 Gridley-class(ca. 1937) 8 Bagley-class(ca. 1937) 10 Benham-class(ca. 1938) heavy ...
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
It used 115 volts AC, 60 Hz, single phase, and typically a few amperes or even less. Under worst-case fault conditions, its synchros apparently could draw as much as 140 amperes, or 15,000 watts (about the same as 3 houses while using ovens). Almost all of the computer's inputs and outputs were by synchro torque transm...
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
The gyro's drift is low enough not to matter for short periods of time; when the ship resumes more typical cruising, the erecting system corrects for any error. The Earth's rotation is fast enough to need correcting. A small adjustable weight on a threaded rod, and a latitude scale makes the gyro precess at the Earth's...
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
It could also automatically track the target by controlling the director's bearing power drive. Because of radar, Fire Control systems are able to track and fire at targets at a greater range and with increased accuracy during the day, night, or inclement weather. This was demonstrated in November 1942 when the battles...
mil_tactics_continued_pretraining.csv
Ship gun fire-control system
Lockheed Electronics produced a prototype with AN/SPQ-9 radar fire control in 1965. An air defense requirement delayed production with the AN/SPG-60 until 1971. The Mark 86 did not enter service until when the nuclear-powered missile cruiser was commissioned in February 1974, and subsequently installed on US cruisers a...
mil_tactics_continued_pretraining.csv
Shock and awe
Doctrine of rapid dominance: Rapid dominance is defined by its authors, Harlan K. Ullman and James P. Wade, as attempting to affect the will, perception, and understanding of the adversary to fight or respond to our strategic policy ends through imposing a regime of Shock and Awe. Further, rapid dominance will, accord...
mil_tactics_continued_pretraining.csv
Shock and awe
According to some analysts, the military's attack was perhaps too precise. It did not trigger shock and awe in the Iraqis and, in the end, the city was only captured after close combat on the outskirts of Baghdad." Criticism of execution: According to The Guardian correspondent Brian Whitaker in 2003, "To some in the ...
mil_tactics_continued_pretraining.csv
Shock tactics
Pre-modern: Shock tactics were usually performed by heavy cavalry, but were sometimes achieved by heavy infantry. The most famous shock tactic is the medieval cavalry charge. This shock attack was conducted by heavily armoured cavalry armed with lances, usually couched, galloping at full speed against an enemy infantry...
mil_tactics_continued_pretraining.csv
Shoot-and-scoot
Caucasian War: The first recorded use of this tactic came from the Caucasian War where the Chechen Naib Talkhig of Shali became famous for his shoot-and-scoot tactics, termed nomadic artillery by Russians, in the 1830-1850s. According to the Russian historian and professor Nikolay Smirnov, he was one of the first comma...
mil_tactics_continued_pretraining.csv
Show of force
Function: Shows of force have historically been undertaken mostly by a military actor unwilling to engage in all-out hostilities, but fearing to 'lose face' (to appear weak). By performing a carefully calculated provocation, the opponent is to be shown that violent confrontation remains an option, and there will be no ...
mil_tactics_continued_pretraining.csv
Siege
Ancient period: The necessity of city walls: The Assyrians deployed large labour forces to build new palaces, temples, and defensive walls. Some settlements in the Indus Valley civilization were also fortified. By about 3500 BC, hundreds of small farming villages dotted the Indus River floodplain. Many of these settl...
mil_tactics_continued_pretraining.csv
Siege
This could be accomplished by digging a tunnel beneath the foundations of the walls, and then deliberately collapsing or exploding the tunnel. This process is known as mining. The defenders could dig counter-tunnels to cut into the attackers' works and collapse them prematurely. Fire was often used as a weapon when dea...
mil_tactics_continued_pretraining.csv
Siege
Food and water reserves were taxed by the sudden influx of refugees. Soon, what was once a formidable undertaking became easy. The Mongols were then free to lay siege without interference of the field army, as it had been destroyed. At the siege of Aleppo, Hulagu used twenty catapults against the Bab al-Iraq (Gate of I...
mil_tactics_continued_pretraining.csv
Siege
Fortresses built in this style throughout the 16th century did not become fully obsolete until the 19th century, and were still in use throughout World War I (though modified for 20th-century warfare). During World War II, trace italienne fortresses could still present a formidable challenge, for example, in the last d...
mil_tactics_continued_pretraining.csv
Siege
Even when in the end the New Model Army—a regular professional army—developed the original decision-compelling spirit permeated the whole organisation, as was seen when pitched against regular professional continental troops the Battle of the Dunes during the Interregnum. Experienced commanders on both sides in the En...
mil_tactics_continued_pretraining.csv
Siege
Whether the battle can be considered true siege warfare is debatable. Under the theories of Erich von Falkenhayn, it is more distinguishable as purely attrition with a coincidental presence of fortifications on the battlefield. When considering the plans of Crown Prince Wilhelm, purely concerned with taking the citadel...
mil_tactics_continued_pretraining.csv
Siege
The optimal result of most standoffs is a peaceful resolution: the safe extraction of hostages and bystanders, and the peaceful surrender and arrest of the hostage-takers. To ensure this, police make use of trained negotiators and psychologists to learn the hostage-takers' demands (and meet said demands if feasible or ...
mil_tactics_continued_pretraining.csv
Siege
Explorations in Empire, Pre-Modern Imperialism Tutorial: the Mongols. University of Wisconsin-Madison. Archived from the original on 18 May 2008. Ostwald, Jamel (2007). Vauban Under Siege: Engineering Efficiency and Martial Vigor in the War of the Spanish Succession. History of Warfare. Vol. 41 (illustrated ed.). Brill...
mil_tactics_continued_pretraining.csv
Siege of Alesia
Background: In 58 BC, following his first consulship in 59 BC, Julius Caesar engineered his own appointment as proconsul (governor) of three Roman provinces by the First Triumvirate. These were Cisalpine Gaul (northern Italy), Illyricum (on the eastern coast of the Adriatic Sea) and Gallia Narbonensis (in southeastern ...
mil_tactics_continued_pretraining.csv
Siege of Alesia
Alesia was an oppidum (fortified settlement) on a lofty hill, with two rivers on two different sides. Due to such strong defensive features, Caesar decided on a siege to force surrender by starvation. Considering that about 80,000 men were garrisoned in Alesia, together with the local civilian population, this would no...
mil_tactics_continued_pretraining.csv
Siege of Alesia
The chieftains were brought before him and Vercingetorix was surrendered. Captives were given to the Roman soldiers as part of the spoils of war apart from the Aedui and Arverni, whom he hoped to win over. Aftermath: With the revolt crushed, Caesar set his legions to winter across the lands of the defeated tribes to p...
mil_tactics_continued_pretraining.csv
Signal corps
Asia: Rejimen Semboyan Diraja, Malaysian Royal Signals Regiment Indian Army Corps of Signals, raised in 1911. Pakistan Army Corps of Signals, raised in 1947. Singapore Armed Forces Signals Formation Sri Lanka Signals Corps Israeli C4I Corps Korps Perhubungan TNI AD (Indonesian Army Signal Corps) Armed Forces of the Phi...
mil_tactics_continued_pretraining.csv
Skirmish
Ancient history: In ancient warfare, skirmishers typically carried bows, javelins, slings and sometimes light shields. Acting as light infantry with their light arms and minimal armour, they could run ahead of the main battle line; release a volley of arrows, sling stones, or javelins; and retreat behind their main bat...
mil_tactics_continued_pretraining.csv
Skirmish
The modern US military has light rapid-deployment Stryker brigade combat teams working with heavy-mechanized and armored units, with tracked M2 Bradley infantry fighting vehicles and M1 Abrams tanks forming the primary combat force. Apartheid South Africa's military doctrine stressed the use of highly-mobile, light-mec...
mil_tactics_continued_pretraining.csv
Smoke screen
Technology: Smoke grenades: These are canister-type grenades used as a ground-to-ground or ground-to-air signalling device. The body consists of a steel sheet metal cylinder with a few emission holes on the top and/or bottom to allow smoke release when the smoke composition inside the grenade is ignited. In those tha...
mil_tactics_continued_pretraining.csv
Smoke screen
The titanium tetrachloride smoke is an irritant and unpleasant to breathe. It is dispensed from aircraft to create vertical smoke curtains, and during World War II it was a favorite smoke generation agent on warships. Goggles and a respirator should be worn when in contact with the smoke, full protective clothing shoul...
mil_tactics_continued_pretraining.csv
Soldier
Etymology: The word soldier derives from the Middle English word soudeour, from Old French soudeer or soudeour, meaning mercenary, from soudee, meaning shilling's worth or wage, from sou or soud, shilling. The word is also related to the Medieval Latin soldarius, meaning soldier (literally, "one having pay"). These wor...
mil_tactics_continued_pretraining.csv
Soldier
Individuals may also enlist for part-time duty in the Army Reserve or National Guard. Depending on need or fitness to serve, soldiers usually may reenlist for another term, possibly receiving monetary or other incentives. In the U.S. Army, career soldiers who have served for at least 20 years are eligible to draw on a ...
mil_tactics_continued_pretraining.csv
Sonar
History: Although some animals (dolphins, bats, some shrews, and others) have used sound for communication and object detection for millions of years, use by humans in the water was initially recorded by Leonardo da Vinci in 1490: a tube inserted into the water was said to be used to detect vessels by placing an ear to...
mil_tactics_continued_pretraining.csv
Sonar
This assembly penetrated the ship hull and was manually rotated to the desired angle. The piezoelectric Rochelle salt crystal had better parameters, but the magnetostrictive unit was much more reliable. High losses to US merchant supply shipping early in World War II led to large scale high priority US research in the ...
mil_tactics_continued_pretraining.csv
Sonar
Since digital processing became available pulse compression has usually been implemented using digital correlation techniques. Military sonars often have multiple beams to provide all-round cover while simple ones only cover a narrow arc, although the beam may be rotated, relatively slowly, by mechanical scanning. Par...
mil_tactics_continued_pretraining.csv
Sonar
The display of most passive sonars used to be a two-dimensional waterfall display. The horizontal direction of the display is bearing. The vertical is frequency, or sometimes time. Another display technique is to color-code frequency-time information for bearing. More recent displays are generated by the computers, and...
mil_tactics_continued_pretraining.csv
Sonar
This is generally done using a Fourier transform to show the different frequencies making up the sound. Since every engine makes a specific sound, it is straightforward to identify the object. Databases of unique engine sounds are part of what is known as acoustic intelligence or ACINT. Another use of passive sonar is ...
mil_tactics_continued_pretraining.csv
Sonar
Today, commercial fishing vessels rely almost completely on acoustic sonar and sounders to detect fish. Fishermen also use active sonar and echo sounder technology to determine water depth, bottom contour, and bottom composition. Companies such as eSonar, Raymarine, Marport Canada, Wesmar, Furuno, Krupp, and Simrad ma...
mil_tactics_continued_pretraining.csv
Sonar
P.J. Westervelt summarizes the trends involved. Sonar in extraterrestrial contexts: The use of both active and passive sonar has been proposed for various extraterrestrial environments. One example is Titan, where active sonar could be used to determine the depth of its hydrocarbon seas, and passive sonar could be use...
mil_tactics_continued_pretraining.csv
Space force
History: Emblems of space forces The first artificial object to cross the Kármán line, the boundary between air and space, was MW 18014, an A-4 rocket launched by the German Heer on 20 June 1944 from the Peenemünde Army Research Center. The A4, more commonly known as the V-2, was the world'...
mil_tactics_continued_pretraining.csv
Space warfare
History: 1950s: During the early Cold War, a survivable reconnaissance asset was considered highly valuable. In a time before satellites, this meant building an aircraft that could fly higher or faster, or both, compared to any interceptor that would try to bring it down. Notably, the United States would introduce th...
mil_tactics_continued_pretraining.csv
Space warfare
Currently, military operations in space primarily concern either the vast tactical advantages of satellite-based surveillance, communications, and positioning systems or mechanisms used to deprive an opponent of said tactical advantages. Accordingly, most space-borne proposals which would traditionally be considered "...
mil_tactics_continued_pretraining.csv
Space warfare
This option tends to be highly destructive and indiscriminate as any attack will produce space debris, which can indiscriminately affect other satellites in similar orbits. While this option comes with the benefit of leveraging existing technologies and a certain element of surprise, as an attack cannot be detected unt...
mil_tactics_continued_pretraining.csv
Special forces
Capabilities: Special forces capabilities include the following: Special reconnaissance and surveillance in hostile environments Foreign internal defense: Training and development of other states' military and security forces Offensive action Support to counter-insurgency through population engagement and support Coun...
mil_tactics_continued_pretraining.csv
Special forces
Training continued by day and night with river crossings, mountain climbing, weapons training, unarmed combat, map reading, and small boat operations on the syllabus. Reaching a wartime strength of over 30 individual units and four assault brigades, the Commandos served in all theatres of war from the Arctic Circle to ...
mil_tactics_continued_pretraining.csv
Special forces
Army landing operations. Special Forces Tab: In 1983, nearly 40 years after the end of World War II, the US Army created the Special Forces Tab. It was later decided that personnel with at least 120 days' wartime service prior to 1955 in certain units, including the Devil's Brigade, the Alamo Scouts and the OSS Opera...
mil_tactics_continued_pretraining.csv
Special forces
The U.S. invasion of Afghanistan involved special forces from several coalition nations, who played a major role in removing the Taliban from power in 2001–2002. Special forces have continued to play a role in combating the Taliban in subsequent operations. As gender restrictions are being removed in parts of the world...
mil_tactics_continued_pretraining.csv
Staff (military)
Military staff functions: Information management: One of the key purposes of a military staff is to provide accurate, timely information (which includes the results of contingency planning) on which command decisions are based. A goal is being able to suggest approaches or help produce well-informed decisions that wi...
mil_tactics_continued_pretraining.csv
Staff (military)
General Staff Officer (Grade 1), informally known as G1: Ranked Lieutenant Colonel or a Colonel General Staff Officer (Grade 2), informally known as G2: Ranked Major General Staff Officer (Grade 3), informally known as G3: Ranked Captain A Branch (စစ်ရေး): A Branch, called စစ်ရေး or ရေး for short in Burmese, is respon...
mil_tactics_continued_pretraining.csv
Staff (military)
Manpower or personnel: The manpower or personnel officer supervises personnel and administration systems. This department functions as the essential administrative liaison between the subordinate units and the headquarters, handling personnel actions coming from the bottom up (such as a request for an award to be given...
mil_tactics_continued_pretraining.csv
Staff (military)
A and Q branches might be combined under a deputy assistant adjutant and quartermaster general, rank major (DAA&QMG). G branch (operations) plans and executes operations. The senior staff officer in brigade HQ held the appointment of brigade major (BM) with rank of captain or major, who coordinated the HQ. While the ...
mil_tactics_continued_pretraining.csv
Standing army
History: Ancient history: Mesopotamia: Sargon of Akkad, the founder of the Akkadian Empire, is believed to have formed the first standing professional army. Tiglath-Pileser III of Assyria (ruled 745–727 BC) created Assyria's first standing army. Tiglath-Pileser III disbanded militias and instead paid professional s...
mil_tactics_continued_pretraining.csv
Standing army
England and Great Britain: Prior to the influence of Oliver Cromwell, England lacked a standing army, instead relying on militia organized by local officials, private forces mobilized by the nobility and hired mercenaries from Europe. This changed during the English Civil War, when Cromwell formed his New Model Army of...
mil_tactics_continued_pretraining.csv
Stealth technology
History: Camouflage to aid or avoid predation predates humanity, and hunters have been using vegetation to conceal themselves, perhaps as long as people have been hunting. The earliest application of camouflage in warfare is impossible to ascertain. Methods for visual concealment in war were documented by Sun Tzu in hi...
mil_tactics_continued_pretraining.csv
Stealth technology
While writing about radar systems, authors Simon Kingsley and Shaun Quegan singled out the Vulcan's shape as acting to reduce the RCS. In contrast, the Tupolev 95 Russian long-range bomber (NATO reporting name 'Bear') was conspicuous on radar. It is now known that propellers and jet turbine blades produce a bright rada...
mil_tactics_continued_pretraining.csv
Stealth technology
Visibility: The simplest technology is visual camouflage; the use of paint or other materials to color and break up the lines of a vehicle or person. Most stealth aircraft use matte paint and dark colors, and operate only at night. Lately, interest in daylight Stealth (especially by the USAF) has emphasized the use of ...
mil_tactics_continued_pretraining.csv
Stealth technology
In Britain, BAE Systems has tested two fluidically controlled unmanned aircraft, one starting in 2010 named Demon, and another starting in 2017 named MAGMA, with the University of Manchester. In the United States, the Defense Advanced Research Projects Agency (DARPA) program named Control of Revolutionary Aircraft with...
mil_tactics_continued_pretraining.csv
Strategic defence
See also: Defence in depth Strategic depth Notes: Sources: Dupuy, Trevor N., Understanding War: Military History And The Theory Of Combat, Leo Cooper, New York, 1986 Thompson, Julian, Lifeblood of war: logistics in armed conflict, Brassey's Classics, London, 1991 Recommended reading: The Adelphi Papers, Volume 359,...
mil_tactics_continued_pretraining.csv
Strategic depth
Concept: The key precepts any military commander must consider when dealing with strategic depth are how vulnerable these assets are to a quick, preemptive attack or to a methodical offensive and whether a country can withdraw into its own territory, absorb an initial thrust, and allow the subsequent offensive to culmi...
mil_tactics_continued_pretraining.csv
Strategic goal (military)
Description: It is the highest level of organisational achievement in a military organisation, and is usually defined by the national defence policy. In terms of goal assignment it corresponds to operations performed by a front or a fleet on a theatre scale, and by an Army group or, during the World War II, by a Red Ar...
mil_tactics_continued_pretraining.csv
Strategic studies
Higher education: The subject is taught in Africa, Asia, the Americas, and Europe. In Nigeria, Institute for Peace and Strategic Studies, Nigerian Defence Academy, University of Ibadan, Covenant University and in the Conflict, Peace and Strategic Studies at Afe Babalola University Nigeria and Nassarawa State University...
mil_tactics_continued_pretraining.csv
Submarine
History: Etymology: The word submarine means 'underwater' or 'under-sea' (as in submarine canyon, submarine pipeline) though as a noun it generally refers to a vessel that can travel underwater. The term is a contraction of submarine boat. and occurs as such in several languages, e.g. French (sous-marin), and Spanish...
mil_tactics_continued_pretraining.csv
Submarine
The Royal Navy commissioned five Holland-class submarines from Vickers, Barrow-in-Furness, under licence from the Holland Torpedo Boat Company from 1901 to 1903. Construction of the boats took longer than anticipated, with the first only ready for a diving trial at sea on 6 April 1902. Although the design had been purc...
mil_tactics_continued_pretraining.csv
Submarine
It was the first submarine combat loss since World War II. In 1982 during the Falklands War, the Argentine cruiser General Belgrano was sunk by the British submarine HMS Conqueror, the first sinking by a nuclear-powered submarine in war. Some weeks later, on 16 June, during the Lebanon War, an unnamed Israeli submarine...
mil_tactics_continued_pretraining.csv
Submarine
While submerged, MBTs generally remain flooded, which simplifies their design, and on many submarines, these tanks are a section of the space between the light hull and the pressure hull. For more precise control of depth, submarines use smaller depth control tanks (DCTs)—also called hard tanks (due to their ability to...
mil_tactics_continued_pretraining.csv
Submarine
Until the end of World War II, most submarines had an additional partial casing on the top, bow and stern, built of thinner metal, which was flooded when submerged. Germany went further with the Type XXI, a general predecessor of modern submarines, in which the pressure hull was fully enclosed inside the light hull, bu...
mil_tactics_continued_pretraining.csv
Submarine
Among the pioneers of this alternative solution was the very first submarine of the Swedish Navy, HSwMS Hajen (later renamed Ub no 1), launched in 1904. While its design was generally inspired by the first submarine commissioned by the US Navy, USS Holland, it deviated from the latter in at least three significant ways...
mil_tactics_continued_pretraining.csv
Submarine
The United States also used hydrogen peroxide in an experimental midget submarine, X-1. It was originally powered by a hydrogen peroxide/diesel engine and battery system until an explosion of her hydrogen peroxide supply on 20 May 1957. X-1 was later converted to use diesel–electric drive. Today several navies use air-...
mil_tactics_continued_pretraining.csv
Submarine
Submarines also carry radar equipment to detect surface ships and aircraft. Submarine captains are more likely to use radar detection gear than active radar to detect targets, as radar can be detected far beyond its own return range, revealing the submarine. Periscopes are rarely used, except for position fixes and to ...
mil_tactics_continued_pretraining.csv
Submarine
Both the US and British navies operate nuclear-powered submarines that deploy for periods of six months or longer. Other navies that permit women to serve on submarines operate conventionally powered submarines, which deploy for much shorter periods—usually only for a few months. Prior to the change by the US, no natio...
mil_tactics_continued_pretraining.csv
Subterranean warfare
History: Subterranean warfare was occasionally carried out during World War II. Examples are the defense of the Adzhimushkay quarry, or the use of the Odessa Catacombs during guerilla warfare by Soviet partisans. In 21st century the issue of readiness to subterranean warfare was raised before the U.S. military in view ...
mil_tactics_continued_pretraining.csv
Sun Tzu
Life: The oldest available sources disagree as to where Sun Tzu was born. The Spring and Autumn Annals and Sima Qian's later Records of the Grand Historian (Shiji) state that Sun Tzu was born in Qi. Both sources also agree that Sun Tzu was born in the late Spring and Autumn period and that he was active as a general an...
mil_tactics_continued_pretraining.csv
Sun Tzu
Scholars uncovered a collection of ancient texts written on unusually well-preserved bamboo slips. Among them were The Art of War and Sun Bin's Military Methods. Although Han dynasty bibliographies noted the latter publication as extant and written by a descendant of Sun, it had previously been lost. The rediscovery of...