Preview

TM 9 1015 252 10 M119A2

Better Essays
Open Document
Open Document
61728 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
TM 9 1015 252 10 M119A2
*TM 9-1015-252-10
TECHNICAL MANUAL
OPERATOR’S MANUAL
FOR

HOWITZER, LIGHT, TOWED:
105-MM, M119A2
NSN 1015-01-482-4914 (EIC: 3WE)
LIN: H57505

*Supersedes TM 9-1015-252-10, 15 August 2006.
This information is furnished upon the condition that it will not be released to another nation without the specific authority of the Department of the Army of the United States, that it will be used for military purposes only, that individual or corporate rights originating in the information, whether patented or not, will be respected, that the recipient will report promptly to the United States, any known or suspected compromise, and that the information will be provided substantially the same degree of security afforded it by the Department of Defense of the United
States. Also, regardless of any other markings on the document, it will not be downgraded or declassified without written approval of the originating United States agency.
DISTRIBUTION STATEMENT C. Distribution authorized to U.S. Government Agencies and their contractors only for Administrative or
Operational Use, as determined on 16 September 1994. Other requests for this document shall be referred to U.S. Army TACOM Life Cycle
Management Command, ATTN: AMSTA-LCL-MPP/TECH PUBS,1 Rock Island Arsenal, Rock Island, IL 61299-7630.
WARNING - This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751 et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DOD Directive 5230.25.
DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document.

HEADQUARTERS, DEPARTMENT OF THE ARMY
SEPTEMBER 2010

TM 9-1015-252-10

WARNING SUMMARY
All personnel that operate or maintain the M119A2 howitzer and its fire control equipment must be aware of the following

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The Federal Acquisition Regulation (FAR), issued by the Department of Defense, guides the content of military contracts. Federal government organizations other than the military and intelligence agencies must follow the Federal Information Security Management Act of 2002. Federal Information Processing Standards (FIPS) 200, "Minimum Security Requirements for Federal Information and Information Systems," defines the minimum security requirements that information systems must meet. While the military does not have to follow FISMA, they do enact the security policies contained in the act. The military also implements the security controls found in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems; and NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-53, Appendix F, contains the Security Control Catalog. There is currently no specific law directing the information security policy content for defense contractors. However, Congress is proposing to make the policies in FISMA and the security controls in NIST SP 800-53 applicable to contractors that are awarded military contracts. Information Assurance Implementation, DoD Instruction 8500.2, states the computer network security controls required to be implemented in military computer networks (Enclosure 4, Attachments 1 thru 5). The other references noted in this paper give broad…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    c. It has been passed through some form of review and approval or certification process.…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    information might be granted. In order for security policies to be effective, they must be…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    1939's Internal Revenue Code

    • 274176 Words
    • 1097 Pages

    COMPILED, EDITED, INDEXED, AND PUBLISHED BY AUTHORITY OF LAW UNDER THE DIRECTION OF THE SECRETARY OF STATE…

    • 274176 Words
    • 1097 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    References: Hayes, CPT Patrick C., Faestel, CPT Paul M., Shimamoto, Paige L., & Holland COL Craig J.…

    • 1096 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Hsc Unit038

    • 1181 Words
    • 5 Pages

    • Personal data shall be obtained only for one or more specified and lawful purposes…

    • 1181 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    03 06 04

    • 896 Words
    • 2 Pages

    What information from this source seems the most important? Note key points mentioned in the source. How privacy rights are superseded by reasonable suspicion.…

    • 896 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Range Safety

    • 71848 Words
    • 288 Pages

    traffic safety requirements, these provisions do not apply to development, proof and function test ranges, or laboratories. However, Army Commands, Army Service Component Commands, Direct Reporting Units, and Marine Corps installations having such ranges and laboratories are required to develop and apply alternate standards that are appropriate to the mission and that ensure the preservation of life and property. Proponent and exception authority. The proponent of this pamphlet is the Chief of Staff, Army. The proponent has the authority to approve exceptions or waivers to this pamphlet that are consistent with controlling law and regulations. The proponent may delegate this approval authority, in writing, to a division chief within the proponent agency or its direct reporting unit or field operating agency, in the grade of colonel or the civilian equivalent. Activities may request a waiver to this pamphlet by providing justification that includes a full analysis of the expected benefits and must include formal review by the activity’s senior legal officer. All waiver requests will be endorsed by the commander or senior leader of the requesting activity and forwarded through their higher headquarters to the policy proponent. Refer to AR 25-30 for specific guidance. Suggested improvements. Army users are invited to send comments and suggested improvements on DA Form 2028 (Recommended Changes to Publications and Blank…

    • 71848 Words
    • 288 Pages
    Powerful Essays
  • Better Essays

    Artillery - Essay

    • 10282 Words
    • 42 Pages

    Historically, artillery (from French artillerie) refers to any engine used for the discharge of large projectiles during war, served by a crew of men. The term also describes ground-based troops with the primary function of manning such weapons. Artillery is sometimes known as "The King of Battle". This term includes coastal artillery which traditionally defended coastal areas against seaborne attack and controlled the passage of ships, using their ability to deny access through the threat of coastal fire. It also includes land-based field artillery. With the advent of powered flight at the start of the 20th Century, artillery also included ground-based anti-aircraft batteries.…

    • 10282 Words
    • 42 Pages
    Better Essays
  • Good Essays

    Insecure information can lead to violation of an individual’s human civil rights that may results in neglect/or physical, sexual, emotional or financial harm.…

    • 981 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    Risk Management Plan. (2007, November 29). Northrop Grumman . Retrieved October 16, 2012, from interop.mt.gov/content/docs/IM_Risk_Management_Plan_v4_0.pdf…

    • 1367 Words
    • 6 Pages
    Better Essays
  • Good Essays

    ‘Confidential information is information of some sensitivity, not already lawfully in the public domain (or not readily available from another…

    • 787 Words
    • 3 Pages
    Good Essays

Related Topics