Browsing Interface : Welcome guest : log in
Home |  Graph |  ]  KB:  Language:   

Formal Language: 

KB Term:  Term intersection
English Word: 

Sigma KEE - CounterTerrorism
CounterTerrorism(counter terrorism)counterterror, counterterrorist

appearance as argument number 1

(documentation CounterTerrorism EnglishLanguage "These are operations that include the offensive measures taken to prevent, deter, preempt, and respond to terrorism. SOF's role and additive capability is to conduct offensive measures within DOD's overall combatting terrorism efforts. SOF conduct CT missions as special operations by covert, clandestine, or low visibility means. SOF's activities within CT include, but are not limited to, intelligence operations, attacks against terrorist networks and infrastructures, hostage rescue, recovery of sensitive material from terrorist organizations, and non-kinetic activities aimed at the ideologies or motivations that spawn terrorism. (1) Intelligence Operations. These are operations to collect, exploit, and report information on terrorist organizations, personnel, assets, and/ or activities. SOF have the capability to conduct these operations in an overt, covert, and/ or clandestine manner. (2) Network and Infrastructure Attacks. These are operations that involve preemptive strikes against terrorist organizations with the objective of destroying, disorganizing, or disarming terrorist organizations before they can strike targets of national interest. (3) Hostage or Sensitive Materiel Recovery. These are operations conducted to rescue hostages and/ or recover sensitive materiel from terrorist control, requiring capabilities not normally found in conventional military units. The safety of the hostages and preventing destruction of the sensitive materiel are essential mission requirements. (4) Non-Kinetic Activities. These are actions that are focused on defeating the ideologies or motivations that spawn terrorism by non-kinetic means. These could include, but are not limited to, PSYOP, IO, CA operations, UW and/ or FID.") MilitaryProcesses.kif 1997-2028
(subclass CounterTerrorism CounterOperation) MilitaryProcesses.kif 1996-1996 Counter terrorism is a subclass of counter operation

appearance as argument number 2

(subclass CTHostageMaterielRecovery CounterTerrorism) MilitaryProcesses.kif 2060-2060 CT hostage materiel recovery is a subclass of counter terrorism
(subclass CTIntelligenceOperation CounterTerrorism) MilitaryProcesses.kif 2044-2044 CT intelligence operation is a subclass of counter terrorism
(subclass CTNonKineticActivity CounterTerrorism) MilitaryProcesses.kif 2069-2069 CT non kinetic activity is a subclass of counter terrorism
(subclass CTNwInfraAttack CounterTerrorism) MilitaryProcesses.kif 2052-2052 CT nw infra attack is a subclass of counter terrorism
(termFormat ChineseLanguage CounterTerrorism "反恐") domainEnglishFormat.kif 17568-17568
(termFormat ChineseTraditionalLanguage CounterTerrorism "反恐") domainEnglishFormat.kif 17567-17567
(termFormat EnglishLanguage CounterTerrorism "counter terrorism") domainEnglishFormat.kif 17566-17566
(termFormat EnglishLanguage CounterTerrorism "counter-terrorism") MilitaryProcesses.kif 2818-2818


    (instance ?CO CounterTerrorism)
    (hasPurpose ?CO
        (exists (?AGENT ?ENEMY ?OP ?CLASS)
                (agent ?CO ?AGENT)
                (enemy ?AGENT ?ENEMY)
                (subclass ?CLASS Terrorism)
                (instance ?OP ?CLASS)
                (agent ?OP ?ENEMY)
                (prevents ?CO ?CLASS)))))
MilitaryProcesses.kif 2032-2042


        (instance ?STRAT CounterTerrorismStrategy)
        (instance ?PLANNING OperationPlanning)
        (result ?PLANNING ?STRAT))
    (exists (?CT)
            (patient ?PLANNING ?CT)
            (instance ?CT CounterTerrorism))))
MilitaryProcesses.kif 2082-2090

Show full definition with tree view
Show simplified definition (without tree view)
Show simplified definition (with tree view)

Sigma web home      Suggested Upper Merged Ontology (SUMO) web home
Sigma version 3.0 is open source software produced by Articulate Software and its partners