Basic IMAGE version of Foils prepared 15 January 97

Foil 21 EXECUTION - INTERCEPT

From Overview of Command and Control application in CIV Project Rome Lab Special Review -- Dec 20 1996. by aJack Kantak, Vanguard Research
(0 to 5):





Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Apr 11 1999

Table of Contents for Overview of Command and Control application in CIV Project


1 CIV C2 Application Review 20 December 1996
2 BRIEFING OVERVIEW
3 BACKGROUND
4 CIV SIMULATION OBJECTIVE
5 C2 APPLICATION (C2A) OPPORTUNITIES
6 CIV C2A GOALS
7 SIM ASSETS
8 SCENARIO
9 SCENARIO OVERVIEW
10 C2A - MISSION
11 C2A - TERRORIST THREAT
12 C2A - CONSTRUCT
13 SCENARIO INTRODUCTION
14 SCENARIO INTRODUCTION (Continued)
15 RESPONSE PLANNING
16 EXECUTION - THREAT DETECTION
17 EXECUTION - THREAT DETECTION (Continued)
18 EXECUTION - AUTHORIZATION
19 EXECUTION - INTERCEPT ANALYSIS
20 EXECUTION - INTERCEPT ANALYSIS (Continued)
21 EXECUTION - INTERCEPT
22 EXECUTION - INTERCEPT (Continued)
23 EMERGENCY RESPONSE
Click outside pointer rectangle to move pointer
Click on Pointer to Hide
Click on Pointer + ALT to toggle message hiding
Click on Pointer + CNTL to abolish pointer
Click on Pointer + Shift to cycle families
Click outside + Alt is Change Image
Click outside + Control is Double Size
Click outside + Shift is Halve Size
Right Mouse Down on Pointer Toggles Index
Shift Right Mouse aligns top with scrolled Page
While With Mouse Down on Current Pointer
h hides This Message while m restores
i Toggles Index Aligned with Page Top
j Toggles Index Aligned with Scrolled View Top
a Abolishes Pointer while CNTL-Click restores
f cycles through pointer families
c cycles through members of a family
u increases Size Up and d decreases Down
Mouse Up-Down between changes of
Pointer to process new option