Basic Search
Text Search
ASSIST Updates
Data updated: 16 Jan 2026.
Home
|
About Quick Search
|
ASSIST
|
ASSIST Updates
Document Details
Basic Search
Text Search
Document ID:
MIL-M-52878
Scroll down to access document images
Overview
Title:
Monitor Module, Status, ID-1921/FSS-9(V) and Monitor Module, Alarm, ID-1922/FSS-9(V)
Scope:
This specification covers the two monitor modules of the Join-Services Interior Intrusion Detection System (J-SIIDS) which are used to display the alarm and status of each protected zone to the monitor operator.
Status:
Inactive
Document Date:
01-OCT-2024
Next Review Due:
29-SEP-2034
FSC/Area:
6350
Doc Category:
Detail Specification
Responsibilities
Lead Standardization Activity:
CR4
US Army Combat Capabilities Development Command, C5ISR Center
Preparing Activity:
CR4
US Army Combat Capabilities Development Command, C5ISR Center
Coordination:
Full
Army Custodian:
CR4
US Army Combat Capabilities Development Command, C5ISR Center
Navy Custodian:
EC
Naval Information Warfare Systems Command
Air Force Custodian:
71
Air Force Sustainment Center - Oklahoma City
Amendments to military specifications or specification sheets issued after August 1, 2003 are incorporated in the modified document.
Revision History
Click on column headings for a description of column content.
Media
Document Part Description
Dist Stmt
Document Date
Pages
Size
Revision C Notice 3 - Validation
A
01-OCT-2024
1
2.0 KB
Revision C Notice 2 - Validation
A
07-NOV-2013
1
2.0 KB
Revision C Notice 1 - Inactivation
A
20-MAR-1997
1
2.8 KB
Revision C
A
20-FEB-1986
41
2765.0 KB
NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.
About Quick Search
|
Contact Us
|
FAQ
|
ASSIST
|
Privacy and Security
|
Section 508 Compliance
|
Defense Standardization Program
WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.