When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of body armor performance standards - Wikipedia

    en.wikipedia.org/wiki/List_of_body_armor...

    Level 3 is high-level protection suitable for wear in high risk situations and is usually overt. This armor protects against stab threats with a strike energy of 43±0.60 J (31.7±0.44 ft·lbf). The overtest condition for this level is 65±0.80 J (47.9±0.59 ft·lbf).

  3. Interceptor multi-threat body armor system - Wikipedia

    en.wikipedia.org/wiki/Interceptor_Multi-Threat...

    In 2005, the DoD, under severe pressure from Congress after the recalls, authorized a one-time $1,000 reimbursement to soldiers who had purchased civilian body armor and other gear. [32] In 2006 they gave orders not to wear anything but military issued body armor because of fears that inadequate armor could be purchased, mainly body armor that ...

  4. Force protection condition - Wikipedia

    en.wikipedia.org/wiki/Force_Protection_Condition

    McConnell AFB entrance displaying THREATCON DELTA on the day of the 9/11 attacks. In United States military security parlance, the force protection condition (FPCON for short) is a counter-terrorist (otherwise known as antiterrorism (AT for short)) [1]:1 threat system employed by the United States Department of Defense.

  5. MOPP (protective gear) - Wikipedia

    en.wikipedia.org/wiki/MOPP_(protective_gear)

    Each MOPP level corresponds to an increasing level of protection. The readiness level will usually be dictated by the in-theatre commander. [1] [2] Mask Only – Protective mask is carried. MOPP Ready – Protective mask is carried. First set of suit, gloves, and boots are available within two hours, second set within six hours. MOPP Level 0 ...

  6. Information operations condition - Wikipedia

    en.wikipedia.org/wiki/Information_Operations...

    INFOCON (short for information operations condition) is a threat level system in the United States similar to that of FPCON. It is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack.

  7. Special access program - Wikipedia

    en.wikipedia.org/wiki/Special_access_program

    DCID 3/29, Controlled Access Program Oversight Committee, 2 June 1995; DOD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM), 28 February, 2006; DODD 5200.1-R, Information Security Program, January 1997; EO 13526, Classified National Security Information, 29 December 2009

  8. STANAG 4569 - Wikipedia

    en.wikipedia.org/wiki/STANAG_4569

    NATO AEP-55 STANAG 4569 is a NATO Standardization Agreement covering the standards for the "Protection Levels for Occupants of Logistic and Light Armored Vehicles". [ 1 ] The standard covers strikes from kinetic energy , artillery and IED blasts .

  9. List of U.S. Department of Defense agencies - Wikipedia

    en.wikipedia.org/wiki/List_of_U.S._Department_of...

    Field activities are DoD agencies which "perform a supply or service activity common to more than one military department". [1] Defense Human Resources Activity (DHRA) Defense Media Activity (DMA) Defense Technical Information Center (DTIC) Defense Technology Security Administration (DTSA) Department of Defense Education Activity (DOD EA)