National Academies Press: OpenBook

Black and Smokeless Powders: Technologies for Finding Bombs and the Bomb Makers (1998)

Chapter: Appendix J: Acronyms and Abbreviations

« Previous: Appendix I: Glossary
Suggested Citation:"Appendix J: Acronyms and Abbreviations." National Research Council. 1998. Black and Smokeless Powders: Technologies for Finding Bombs and the Bomb Makers. Washington, DC: The National Academies Press. doi: 10.17226/6289.
×

J Acronyms and Abbreviations


ANFO

Ammonium nitrate/fuel oil

ATF

Alcohol, Tobacco, and Firearms, Bureau of


CMA

Chemical Manufacturers Association


DMNB

2,3-dimethyl-2,3-dinitrobutane

DNT

Dinitrotoluene


EGDN

Ethylene glycol dinitrate


FAA

Federal Aviation Administration

FBI

Federal Bureau of Investigation


ICAO

International Civil Aviation Organization

IED

Improvised explosive device


LOVA

Low vulnerability ammunition (powders)


3M

Minnesota Mining and Manufacturing Company

MNT

Mononitrotoluene


NC

Nitrocellulose

NG

Nitroglycerine

NQ

Nitroguanidine


OEM

Original equipment manufacturer

OTA

Office of Technology Assessment


PEL

Permissible exposure limit

PVC

Polyvinyl chloride

Suggested Citation:"Appendix J: Acronyms and Abbreviations." National Research Council. 1998. Black and Smokeless Powders: Technologies for Finding Bombs and the Bomb Makers. Washington, DC: The National Academies Press. doi: 10.17226/6289.
×
Page 164
Black and Smokeless Powders: Technologies for Finding Bombs and the Bomb Makers Get This Book
×
 Black and Smokeless Powders: Technologies for Finding Bombs and the Bomb Makers
Buy Paperback | $45.00 Buy Ebook | $36.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Some 600 pipe bomb explosions have occurred annually in the United States during the past several years. How can technology help protect the public from these homemade devices?

This book, a response to a Congressional mandate, focuses on ways to improve public safety by preventing bombings involving smokeless or black powders and apprehending the makers of the explosive devices. It examines technologies used for detection of explosive devices before they explode—including the possible addition of marking agents to the powders—and technologies used in criminal investigations for identification of these powders—including the possible addition of taggants to the powders—in the context of current technical capabilities.

The book offers general conclusions and recommendations about the detection of devices containing smokeless and black powders and the feasibility of identifying makers of the devices from recovered powder or residue. It also makes specific recommendations about marking and tagging technologies. This volume follows the work reported in Containing the Threat from Illegal Bombings (NRC 1998), which studied similar issues for bombings that utilize high explosives.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!