Browsing Interface : Welcome guest : log in
Home |  Graph |  ]  KB:  Language:   

Formal Language: 



KB Term:  Term intersection
English Word: 

  CounterTerrorism

Sigma KEE - CounterTerrorism
CounterTerrorism

appearance as argument number 1
-------------------------


(documentation CounterTerrorism EnglishLanguage "These are operations that include the offensive measures taken to prevent, deter, preempt, and respond to terrorism. SOF's role and additive capability is to conduct offensive measures within DOD's overall combatting terrorism efforts. SOF conduct CT missions as special operations by covert, clandestine, or low visibility means. SOF's activities within CT include, but are not limited to, intelligence operations, attacks against terrorist networks and infrastructures, hostage rescue, recovery of sensitive material from terrorist organizations, and non-kinetic activities aimed at the ideologies or motivations that spawn terrorism. (1) Intelligence Operations. These are operations to collect, exploit, and report information on terrorist organizations, personnel, assets, and/ or activities. SOF have the capability to conduct these operations in an overt, covert, and/ or clandestine manner. (2) Network and Infrastructure Attacks. These are operations that involve preemptive strikes against terrorist organizations with the objective of destroying, disorganizing, or disarming terrorist organizations before they can strike targets of national interest. (3) Hostage or Sensitive Materiel Recovery. These are operations conducted to rescue hostages and/ or recover sensitive materiel from terrorist control, requiring capabilities not normally found in conventional military units. The safety of the hostages and preventing destruction of the sensitive materiel are essential mission requirements. (4) Non-Kinetic Activities. These are actions that are focused on defeating the ideologies or motivations that spawn terrorism by non-kinetic means. These could include, but are not limited to, PSYOP, IO, CA operations, UW and/ or FID.") MilitaryProcesses.kif 1997-2028
(subclass CounterTerrorism CounterOperation) MilitaryProcesses.kif 1996-1996

appearance as argument number 2
-------------------------


(subclass CTHostageMaterielRecovery CounterTerrorism) MilitaryProcesses.kif 2060-2060
(subclass CTIntelligenceOperation CounterTerrorism) MilitaryProcesses.kif 2044-2044
(subclass CTNonKineticActivity CounterTerrorism) MilitaryProcesses.kif 2069-2069
(subclass CTNwInfraAttack CounterTerrorism) MilitaryProcesses.kif 2052-2052
(termFormat ChineseLanguage CounterTerrorism "反恐") domainEnglishFormat.kif 17558-17558
(termFormat ChineseTraditionalLanguage CounterTerrorism "反恐") domainEnglishFormat.kif 17557-17557
(termFormat EnglishLanguage CounterTerrorism "counter terrorism") domainEnglishFormat.kif 17556-17556
(termFormat EnglishLanguage CounterTerrorism "counter-terrorism") MilitaryProcesses.kif 2794-2794

antecedent
-------------------------


(=>
    (instance ?CO CounterTerrorism)
    (hasPurpose ?CO
        (exists (?AGENT ?ENEMY ?OP ?CLASS)
            (and
                (agent ?CO ?AGENT)
                (enemy ?AGENT ?ENEMY)
                (subclass ?CLASS Terrorism)
                (instance ?OP ?CLASS)
                (agent ?OP ?ENEMY)
                (prevents ?CO ?CLASS)))))
MilitaryProcesses.kif 2032-2042

consequent
-------------------------


(=>
    (and
        (instance ?STRAT CounterTerrorismStrategy)
        (instance ?PLANNING OperationPlanning)
        (result ?PLANNING ?STRAT))
    (exists (?CT)
        (and
            (patient ?PLANNING ?CT)
            (instance ?CT CounterTerrorism))))
MilitaryProcesses.kif 2082-2090


Show simplified definition (without tree view)
Show simplified definition (with tree view)

Show without tree


Sigma web home      Suggested Upper Merged Ontology (SUMO) web home
Sigma version 3.0 is open source software produced by Articulate Software and its partners