Jump to content

File:160516-N-ON977-184 Exercise Tricrab 2016 Clearance Diver.jpg

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
From Wikipedia, the free encyclopedia

Original file (4,928 × 3,280 pixels, file size: 12.28 MB, MIME type: image/jpeg)

Summary

Description
English: An Explosive Ordnance Disposal (EOD) technician, assigned to the Royal Australian Navy Clearance Diving Team, inspects an Improvised Explosive Device (IED) during an IED response scenario as part of Exercise Tricrab on Naval Magazine Guam, May 16, 2016. Tricrab is a combined exercise involving military forces from five different countries that focuses on strengthening relationships within the Asia-Pacific region through training and information exchanges, to enhance EOD and diving related interoperability. (U.S. Navy Combat Camera photo by Mass Communication Specialist 3rd Class Alfred A. Coffield/Released)
Date
Source http://www.navy.mil/view_image.asp?id=216737
https://www.dvidshub.net/image/2595296/tricrab-2016
Author U.S. Navy Mass Communication Specialist 3rd Class Alfred A. Coffield Fleet Combat Camera Pacific

Licensing

Public domain
This file is a work of a sailor or employee of the U.S. Navy, taken or made as part of that person's official duties. As a work of the U.S. federal government, it is in the public domain in the United States.
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

16 May 2016

image/jpeg

6c6b7bfe329ca5385612ed8b0a8e7be8bf91a5cd

12,879,669 byte

3,280 pixel

4,928 pixel

0.01 second

300 millimetre

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current15:33, 2 July 2016Thumbnail for version as of 15:33, 2 July 20164,928 × 3,280 (12.28 MB)Melbguy05User created page with UploadWizard

The following page uses this file:

Metadata