enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Contract data requirements list - Wikipedia

    en.wikipedia.org/wiki/Contract_Data_Requirements...

    [1] Subpart 215.470 of the Defense Federal Acquisition Regulation Supplement (DFARS) document requires the use of the CDRL in solicitations when the contract will require delivery of data. Guidance on how to fill in and handle DD Form 1423-1 is provided in publication 5010.12-M.

  3. Operations security - Wikipedia

    en.wikipedia.org/wiki/Operations_security

    Operations security (OPSEC) is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly ...

  4. Information Operations (United States) - Wikipedia

    en.wikipedia.org/wiki/Information_Operations...

    Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting ...

  5. Joint Information Operations Warfare Center - Wikipedia

    en.wikipedia.org/wiki/Joint_Information...

    In conjunction with the October 1, 2002 transition of USSPACECOM to USSTRATCOM, the JIOC was realigned as a subordinate command to USSTRATCOM. In 2006 the JIOC was redesignated the Joint Information Operations Warfare Center (JIOWC) and at the time it was located at Lackland Air Force Base, near San Antonio , Texas [ 1 ] with the intent of ...

  6. Intelligence cycle security - Wikipedia

    en.wikipedia.org/wiki/Intelligence_cycle_security

    In 1991 [3] and 1995 US Army manuals dealing with counterintelligence, [4] CI had a broader scope against the then-major intelligence collection disciplines. While MASINT was defined as a formal discipline in 1986, [ 5 ] [ 6 ] it was sufficiently specialized not to be discussed in general counterintelligence documents of the next few years.

  7. United States government security breaches - Wikipedia

    en.wikipedia.org/wiki/United_States_government...

    He was convicted in 1992 of violations of the Arms Export Control Act and the Comprehensive Anti-Apartheid Act. February 1991 – Charles Lee Francis Anzalone, a U.S. Marine Corps corporal, was arrested for attempted espionage after passing documents and a security badge to an FBI agent posing as a KGB intelligence officer. He was convicted in ...

  8. United States government operations and exercises on ...

    en.wikipedia.org/wiki/United_States_government...

    The U.S. military and NORAD had also planned to conduct several military exercises and a drill was being held by the National Reconnaissance Office, an agency of the Department of Defense. The operations, exercises and drills were all canceled following the September 11 attacks.

  9. 39th Information Operations Squadron - Wikipedia

    en.wikipedia.org/wiki/39th_Information...

    The squadron assumed the mission of the discontinued Detachment 1, 67th Intelligence Group and was redesignated the 39th Information Operations Squadron on 1 September 1999, to better reflect its new and expanded mission. On 1 August 2000 the 39th was reassigned to the 318th Information Operations Group.