September 2001
Army Logistician;Sep/Oct2001, Vol. 33 Issue 5, p44
Reports on several United States Army installations' issuance of Common Access Cards (CAC). CAC replacement of military identification cards; Military personnel and dependents that will be issued of CAC; Privileges incorporated in CAC.


Related Articles

  • Multilevel security initiatives. Widby, James B.; Dwire, Russell J. // Military Review;May/Jun1996, Vol. 76 Issue 3, p74 

    Discusses the mission of multilevel security in the US Army. Provision of command, control, communications and intelligence to the warrior; Combat service support community's need to pass unclassified data back to the operations sustaining base through the Tactical Panel Network (TPN); Ability...

  • Obscurants as a Combat Multiplier. Welch, Billy // Infantry;Sep-Dec2000, Vol. 90 Issue 3, p17 

    Discusses the establishment of obscurants as a combat multiplier. Benefits of obscurants to deny enemy to access areas and information; Design of man generated obscurants against enemies; Ability to control the environment and set condition to provide advantage in the battlefield.

  • Relevant, Responsive and Ready. Steele, William M. // Army Magazine;Oct98, Vol. 48 Issue 10, p113 

    Offers insight on the role of the United States Army Pacific (USARPAC) in providing a balance between economic developmental issues and regional military security to Korea, Indonesia and Thailand. Information on USARPAC area operations; Number of zones in which USARPAC conducts...

  • Tighter Base Security.  // Army Magazine;Aug2001, Vol. 51 Issue 8, p63 

    Reports on the plan of the United States Army to restrict access in Army bases in order to enhance security. Registration of soldiers and civilian workers' cars; Protection of barracks and other sites where troops congregate; Policies for tourists who visit base museums and other sites.

  • The Search.  // Soldiers;May2002, Vol. 57 Issue 5, Hot Topics p13 

    Presents information on searching for planted bombs in a military facility. Advantages of search-team search over a supervisor search; General procedure for a bomb search; Steps soldiers should follow once they find a suspected bomb.

  • The Battle of the Keys. Zalud, Bill; Clough, Pamela // Security: Solutions for Enterprise Security Leaders;Dec99, Vol. 36 Issue 12, p75 

    Reports on the installation of KeyTrak Inc.'s computer controlled key management system at the Family Housing and Billeting Office at Fort Meade, the United States Army base in the Washington Metropolitan Area. Problems with the management of keys to 3000 military quarters; Installation of...

  • TACKLING SAFETY WITH SIMULATION. Buckingham, James; McFadden II, Willie J.; Nowatkowski, Michael; Trainor, Timothy E. // Industrial Management;Sep/Oct2002, Vol. 44 Issue 5, p40 

    Reports that the U.S. Military Academy in West Point, New York used simulation modeling to address security issues for the scheduled college football games in the facility. Modeling of the queuing system set up to inspect vehicles at the entrance gates in order to prevent road congestion;...

  • RAMP Up Physical Security. Holmes, Jeffrey L. // Army Logistician;Jul/Aug2001, Vol. 33 Issue 4, p20 

    Focuses on Random Antiterrorism Measures Program of the United States Army. Goal of increasing physical security awareness throughout a military installation; Searches of privately owned vehicles at access control points or other high-traffic areas on an installation; Orientation briefings for...

  • My only fault is I am alive: SP. SIDDIQUI, IMRAN AHMED // Telegraph (Calcutta, India);1/6/2016, p4 

    The article reports on investigations being conducted on the Pathankot attack involving Salwinder Singh, senior Indian Police Service (IPS) officer, who is defending himself against accusations that he is failing to provide needed answers to agencies' queries.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics